@artik0din/turbogha 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,903 @@
1
+ export const id = 136;
2
+ export const ids = [136];
3
+ export const modules = {
4
+
5
+ /***/ 63723:
6
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
7
+
8
+
9
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
10
+ exports.STSClient = exports.__Client = void 0;
11
+ const middleware_host_header_1 = __webpack_require__(52590);
12
+ const middleware_logger_1 = __webpack_require__(85242);
13
+ const middleware_recursion_detection_1 = __webpack_require__(81568);
14
+ const middleware_user_agent_1 = __webpack_require__(32959);
15
+ const config_resolver_1 = __webpack_require__(39316);
16
+ const core_1 = __webpack_require__(90402);
17
+ const schema_1 = __webpack_require__(26890);
18
+ const middleware_content_length_1 = __webpack_require__(47212);
19
+ const middleware_endpoint_1 = __webpack_require__(40099);
20
+ const middleware_retry_1 = __webpack_require__(19618);
21
+ const smithy_client_1 = __webpack_require__(61411);
22
+ Object.defineProperty(exports, "__Client", ({ enumerable: true, get: function () { return smithy_client_1.Client; } }));
23
+ const httpAuthSchemeProvider_1 = __webpack_require__(27851);
24
+ const EndpointParameters_1 = __webpack_require__(76811);
25
+ const runtimeConfig_1 = __webpack_require__(36578);
26
+ const runtimeExtensions_1 = __webpack_require__(37742);
27
+ class STSClient extends smithy_client_1.Client {
28
+ config;
29
+ constructor(...[configuration]) {
30
+ const _config_0 = (0, runtimeConfig_1.getRuntimeConfig)(configuration || {});
31
+ super(_config_0);
32
+ this.initConfig = _config_0;
33
+ const _config_1 = (0, EndpointParameters_1.resolveClientEndpointParameters)(_config_0);
34
+ const _config_2 = (0, middleware_user_agent_1.resolveUserAgentConfig)(_config_1);
35
+ const _config_3 = (0, middleware_retry_1.resolveRetryConfig)(_config_2);
36
+ const _config_4 = (0, config_resolver_1.resolveRegionConfig)(_config_3);
37
+ const _config_5 = (0, middleware_host_header_1.resolveHostHeaderConfig)(_config_4);
38
+ const _config_6 = (0, middleware_endpoint_1.resolveEndpointConfig)(_config_5);
39
+ const _config_7 = (0, httpAuthSchemeProvider_1.resolveHttpAuthSchemeConfig)(_config_6);
40
+ const _config_8 = (0, runtimeExtensions_1.resolveRuntimeExtensions)(_config_7, configuration?.extensions || []);
41
+ this.config = _config_8;
42
+ this.middlewareStack.use((0, schema_1.getSchemaSerdePlugin)(this.config));
43
+ this.middlewareStack.use((0, middleware_user_agent_1.getUserAgentPlugin)(this.config));
44
+ this.middlewareStack.use((0, middleware_retry_1.getRetryPlugin)(this.config));
45
+ this.middlewareStack.use((0, middleware_content_length_1.getContentLengthPlugin)(this.config));
46
+ this.middlewareStack.use((0, middleware_host_header_1.getHostHeaderPlugin)(this.config));
47
+ this.middlewareStack.use((0, middleware_logger_1.getLoggerPlugin)(this.config));
48
+ this.middlewareStack.use((0, middleware_recursion_detection_1.getRecursionDetectionPlugin)(this.config));
49
+ this.middlewareStack.use((0, core_1.getHttpAuthSchemeEndpointRuleSetPlugin)(this.config, {
50
+ httpAuthSchemeParametersProvider: httpAuthSchemeProvider_1.defaultSTSHttpAuthSchemeParametersProvider,
51
+ identityProviderConfigProvider: async (config) => new core_1.DefaultIdentityProviderConfig({
52
+ "aws.auth#sigv4": config.credentials,
53
+ }),
54
+ }));
55
+ this.middlewareStack.use((0, core_1.getHttpSigningPlugin)(this.config));
56
+ }
57
+ destroy() {
58
+ super.destroy();
59
+ }
60
+ }
61
+ exports.STSClient = STSClient;
62
+
63
+
64
+ /***/ }),
65
+
66
+ /***/ 34532:
67
+ /***/ ((__unused_webpack_module, exports) => {
68
+
69
+
70
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
71
+ exports.resolveHttpAuthRuntimeConfig = exports.getHttpAuthExtensionConfiguration = void 0;
72
+ const getHttpAuthExtensionConfiguration = (runtimeConfig) => {
73
+ const _httpAuthSchemes = runtimeConfig.httpAuthSchemes;
74
+ let _httpAuthSchemeProvider = runtimeConfig.httpAuthSchemeProvider;
75
+ let _credentials = runtimeConfig.credentials;
76
+ return {
77
+ setHttpAuthScheme(httpAuthScheme) {
78
+ const index = _httpAuthSchemes.findIndex((scheme) => scheme.schemeId === httpAuthScheme.schemeId);
79
+ if (index === -1) {
80
+ _httpAuthSchemes.push(httpAuthScheme);
81
+ }
82
+ else {
83
+ _httpAuthSchemes.splice(index, 1, httpAuthScheme);
84
+ }
85
+ },
86
+ httpAuthSchemes() {
87
+ return _httpAuthSchemes;
88
+ },
89
+ setHttpAuthSchemeProvider(httpAuthSchemeProvider) {
90
+ _httpAuthSchemeProvider = httpAuthSchemeProvider;
91
+ },
92
+ httpAuthSchemeProvider() {
93
+ return _httpAuthSchemeProvider;
94
+ },
95
+ setCredentials(credentials) {
96
+ _credentials = credentials;
97
+ },
98
+ credentials() {
99
+ return _credentials;
100
+ },
101
+ };
102
+ };
103
+ exports.getHttpAuthExtensionConfiguration = getHttpAuthExtensionConfiguration;
104
+ const resolveHttpAuthRuntimeConfig = (config) => {
105
+ return {
106
+ httpAuthSchemes: config.httpAuthSchemes(),
107
+ httpAuthSchemeProvider: config.httpAuthSchemeProvider(),
108
+ credentials: config.credentials(),
109
+ };
110
+ };
111
+ exports.resolveHttpAuthRuntimeConfig = resolveHttpAuthRuntimeConfig;
112
+
113
+
114
+ /***/ }),
115
+
116
+ /***/ 27851:
117
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
118
+
119
+
120
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
121
+ exports.resolveHttpAuthSchemeConfig = exports.resolveStsAuthConfig = exports.defaultSTSHttpAuthSchemeProvider = exports.defaultSTSHttpAuthSchemeParametersProvider = void 0;
122
+ const core_1 = __webpack_require__(8704);
123
+ const util_middleware_1 = __webpack_require__(76324);
124
+ const STSClient_1 = __webpack_require__(63723);
125
+ const defaultSTSHttpAuthSchemeParametersProvider = async (config, context, input) => {
126
+ return {
127
+ operation: (0, util_middleware_1.getSmithyContext)(context).operation,
128
+ region: (await (0, util_middleware_1.normalizeProvider)(config.region)()) ||
129
+ (() => {
130
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
131
+ })(),
132
+ };
133
+ };
134
+ exports.defaultSTSHttpAuthSchemeParametersProvider = defaultSTSHttpAuthSchemeParametersProvider;
135
+ function createAwsAuthSigv4HttpAuthOption(authParameters) {
136
+ return {
137
+ schemeId: "aws.auth#sigv4",
138
+ signingProperties: {
139
+ name: "sts",
140
+ region: authParameters.region,
141
+ },
142
+ propertiesExtractor: (config, context) => ({
143
+ signingProperties: {
144
+ config,
145
+ context,
146
+ },
147
+ }),
148
+ };
149
+ }
150
+ function createSmithyApiNoAuthHttpAuthOption(authParameters) {
151
+ return {
152
+ schemeId: "smithy.api#noAuth",
153
+ };
154
+ }
155
+ const defaultSTSHttpAuthSchemeProvider = (authParameters) => {
156
+ const options = [];
157
+ switch (authParameters.operation) {
158
+ case "AssumeRoleWithWebIdentity": {
159
+ options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
160
+ break;
161
+ }
162
+ default: {
163
+ options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
164
+ }
165
+ }
166
+ return options;
167
+ };
168
+ exports.defaultSTSHttpAuthSchemeProvider = defaultSTSHttpAuthSchemeProvider;
169
+ const resolveStsAuthConfig = (input) => Object.assign(input, {
170
+ stsClientCtor: STSClient_1.STSClient,
171
+ });
172
+ exports.resolveStsAuthConfig = resolveStsAuthConfig;
173
+ const resolveHttpAuthSchemeConfig = (config) => {
174
+ const config_0 = (0, exports.resolveStsAuthConfig)(config);
175
+ const config_1 = (0, core_1.resolveAwsSdkSigV4Config)(config_0);
176
+ return Object.assign(config_1, {
177
+ authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
178
+ });
179
+ };
180
+ exports.resolveHttpAuthSchemeConfig = resolveHttpAuthSchemeConfig;
181
+
182
+
183
+ /***/ }),
184
+
185
+ /***/ 76811:
186
+ /***/ ((__unused_webpack_module, exports) => {
187
+
188
+
189
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
190
+ exports.commonParams = exports.resolveClientEndpointParameters = void 0;
191
+ const resolveClientEndpointParameters = (options) => {
192
+ return Object.assign(options, {
193
+ useDualstackEndpoint: options.useDualstackEndpoint ?? false,
194
+ useFipsEndpoint: options.useFipsEndpoint ?? false,
195
+ useGlobalEndpoint: options.useGlobalEndpoint ?? false,
196
+ defaultSigningName: "sts",
197
+ });
198
+ };
199
+ exports.resolveClientEndpointParameters = resolveClientEndpointParameters;
200
+ exports.commonParams = {
201
+ UseGlobalEndpoint: { type: "builtInParams", name: "useGlobalEndpoint" },
202
+ UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
203
+ Endpoint: { type: "builtInParams", name: "endpoint" },
204
+ Region: { type: "builtInParams", name: "region" },
205
+ UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" },
206
+ };
207
+
208
+
209
+ /***/ }),
210
+
211
+ /***/ 59765:
212
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
213
+
214
+
215
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
216
+ exports.defaultEndpointResolver = void 0;
217
+ const util_endpoints_1 = __webpack_require__(83068);
218
+ const util_endpoints_2 = __webpack_require__(79674);
219
+ const ruleset_1 = __webpack_require__(31670);
220
+ const cache = new util_endpoints_2.EndpointCache({
221
+ size: 50,
222
+ params: ["Endpoint", "Region", "UseDualStack", "UseFIPS", "UseGlobalEndpoint"],
223
+ });
224
+ const defaultEndpointResolver = (endpointParams, context = {}) => {
225
+ return cache.get(endpointParams, () => (0, util_endpoints_2.resolveEndpoint)(ruleset_1.ruleSet, {
226
+ endpointParams: endpointParams,
227
+ logger: context.logger,
228
+ }));
229
+ };
230
+ exports.defaultEndpointResolver = defaultEndpointResolver;
231
+ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunctions;
232
+
233
+
234
+ /***/ }),
235
+
236
+ /***/ 31670:
237
+ /***/ ((__unused_webpack_module, exports) => {
238
+
239
+
240
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
241
+ exports.ruleSet = void 0;
242
+ const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
243
+ const a = false, b = true, c = "booleanEquals", d = "stringEquals", e = "sigv4", f = "sts", g = "us-east-1", h = "endpoint", i = "https://sts.{Region}.{PartitionResult#dnsSuffix}", j = "tree", k = "error", l = "getAttr", m = { [F]: false, [G]: "string" }, n = { [F]: true, "default": false, [G]: "boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": e, "signingName": f, "signingRegion": g }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: d, [I]: [q, "aws-global"] }], [h]: u, [G]: h }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
244
+ const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], rules: [{ conditions: [{ [H]: d, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: h }, w, { conditions: [{ [H]: d, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, g] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-east-2"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-1"] }], endpoint: u, [G]: h }, { conditions: [{ [H]: d, [I]: [q, "us-west-2"] }], endpoint: u, [G]: h }, { endpoint: { url: i, properties: { authSchemes: [{ name: e, signingName: f, signingRegion: "{Region}" }] }, headers: v }, [G]: h }], [G]: j }, { conditions: C, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: h }], [G]: j }, { conditions: [p], rules: [{ conditions: [r], rules: [{ conditions: [x, y], rules: [{ conditions: [{ [H]: c, [I]: [b, z] }, B], rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }], [G]: j }, { conditions: D, rules: [{ conditions: [{ [H]: c, [I]: [z, b] }], rules: [{ conditions: [{ [H]: d, [I]: [{ [H]: l, [I]: [A, "name"] }, "aws-us-gov"] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: h }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }], [G]: j }, { conditions: E, rules: [{ conditions: [B], rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: h }], [G]: j }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }], [G]: j }, w, { endpoint: { url: i, properties: v, headers: v }, [G]: h }], [G]: j }], [G]: j }, { error: "Invalid Configuration: Missing Region", [G]: k }] };
245
+ exports.ruleSet = _data;
246
+
247
+
248
+ /***/ }),
249
+
250
+ /***/ 1136:
251
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
252
+
253
+
254
+
255
+ var STSClient = __webpack_require__(63723);
256
+ var smithyClient = __webpack_require__(61411);
257
+ var middlewareEndpoint = __webpack_require__(40099);
258
+ var EndpointParameters = __webpack_require__(76811);
259
+ var schema = __webpack_require__(26890);
260
+ var client = __webpack_require__(5152);
261
+ var regionConfigResolver = __webpack_require__(36463);
262
+
263
+ let STSServiceException$1 = class STSServiceException extends smithyClient.ServiceException {
264
+ constructor(options) {
265
+ super(options);
266
+ Object.setPrototypeOf(this, STSServiceException.prototype);
267
+ }
268
+ };
269
+
270
+ let ExpiredTokenException$1 = class ExpiredTokenException extends STSServiceException$1 {
271
+ name = "ExpiredTokenException";
272
+ $fault = "client";
273
+ constructor(opts) {
274
+ super({
275
+ name: "ExpiredTokenException",
276
+ $fault: "client",
277
+ ...opts,
278
+ });
279
+ Object.setPrototypeOf(this, ExpiredTokenException.prototype);
280
+ }
281
+ };
282
+ let MalformedPolicyDocumentException$1 = class MalformedPolicyDocumentException extends STSServiceException$1 {
283
+ name = "MalformedPolicyDocumentException";
284
+ $fault = "client";
285
+ constructor(opts) {
286
+ super({
287
+ name: "MalformedPolicyDocumentException",
288
+ $fault: "client",
289
+ ...opts,
290
+ });
291
+ Object.setPrototypeOf(this, MalformedPolicyDocumentException.prototype);
292
+ }
293
+ };
294
+ let PackedPolicyTooLargeException$1 = class PackedPolicyTooLargeException extends STSServiceException$1 {
295
+ name = "PackedPolicyTooLargeException";
296
+ $fault = "client";
297
+ constructor(opts) {
298
+ super({
299
+ name: "PackedPolicyTooLargeException",
300
+ $fault: "client",
301
+ ...opts,
302
+ });
303
+ Object.setPrototypeOf(this, PackedPolicyTooLargeException.prototype);
304
+ }
305
+ };
306
+ let RegionDisabledException$1 = class RegionDisabledException extends STSServiceException$1 {
307
+ name = "RegionDisabledException";
308
+ $fault = "client";
309
+ constructor(opts) {
310
+ super({
311
+ name: "RegionDisabledException",
312
+ $fault: "client",
313
+ ...opts,
314
+ });
315
+ Object.setPrototypeOf(this, RegionDisabledException.prototype);
316
+ }
317
+ };
318
+ let IDPRejectedClaimException$1 = class IDPRejectedClaimException extends STSServiceException$1 {
319
+ name = "IDPRejectedClaimException";
320
+ $fault = "client";
321
+ constructor(opts) {
322
+ super({
323
+ name: "IDPRejectedClaimException",
324
+ $fault: "client",
325
+ ...opts,
326
+ });
327
+ Object.setPrototypeOf(this, IDPRejectedClaimException.prototype);
328
+ }
329
+ };
330
+ let InvalidIdentityTokenException$1 = class InvalidIdentityTokenException extends STSServiceException$1 {
331
+ name = "InvalidIdentityTokenException";
332
+ $fault = "client";
333
+ constructor(opts) {
334
+ super({
335
+ name: "InvalidIdentityTokenException",
336
+ $fault: "client",
337
+ ...opts,
338
+ });
339
+ Object.setPrototypeOf(this, InvalidIdentityTokenException.prototype);
340
+ }
341
+ };
342
+ let IDPCommunicationErrorException$1 = class IDPCommunicationErrorException extends STSServiceException$1 {
343
+ name = "IDPCommunicationErrorException";
344
+ $fault = "client";
345
+ constructor(opts) {
346
+ super({
347
+ name: "IDPCommunicationErrorException",
348
+ $fault: "client",
349
+ ...opts,
350
+ });
351
+ Object.setPrototypeOf(this, IDPCommunicationErrorException.prototype);
352
+ }
353
+ };
354
+
355
+ const _A = "Arn";
356
+ const _AKI = "AccessKeyId";
357
+ const _AR = "AssumeRole";
358
+ const _ARI = "AssumedRoleId";
359
+ const _ARR = "AssumeRoleRequest";
360
+ const _ARRs = "AssumeRoleResponse";
361
+ const _ARU = "AssumedRoleUser";
362
+ const _ARWWI = "AssumeRoleWithWebIdentity";
363
+ const _ARWWIR = "AssumeRoleWithWebIdentityRequest";
364
+ const _ARWWIRs = "AssumeRoleWithWebIdentityResponse";
365
+ const _Au = "Audience";
366
+ const _C = "Credentials";
367
+ const _CA = "ContextAssertion";
368
+ const _DS = "DurationSeconds";
369
+ const _E = "Expiration";
370
+ const _EI = "ExternalId";
371
+ const _ETE = "ExpiredTokenException";
372
+ const _IDPCEE = "IDPCommunicationErrorException";
373
+ const _IDPRCE = "IDPRejectedClaimException";
374
+ const _IITE = "InvalidIdentityTokenException";
375
+ const _K = "Key";
376
+ const _MPDE = "MalformedPolicyDocumentException";
377
+ const _P = "Policy";
378
+ const _PA = "PolicyArns";
379
+ const _PAr = "ProviderArn";
380
+ const _PC = "ProvidedContexts";
381
+ const _PCLT = "ProvidedContextsListType";
382
+ const _PCr = "ProvidedContext";
383
+ const _PDT = "PolicyDescriptorType";
384
+ const _PI = "ProviderId";
385
+ const _PPS = "PackedPolicySize";
386
+ const _PPTLE = "PackedPolicyTooLargeException";
387
+ const _Pr = "Provider";
388
+ const _RA = "RoleArn";
389
+ const _RDE = "RegionDisabledException";
390
+ const _RSN = "RoleSessionName";
391
+ const _SAK = "SecretAccessKey";
392
+ const _SFWIT = "SubjectFromWebIdentityToken";
393
+ const _SI = "SourceIdentity";
394
+ const _SN = "SerialNumber";
395
+ const _ST = "SessionToken";
396
+ const _T = "Tags";
397
+ const _TC = "TokenCode";
398
+ const _TTK = "TransitiveTagKeys";
399
+ const _Ta = "Tag";
400
+ const _V = "Value";
401
+ const _WIT = "WebIdentityToken";
402
+ const _a = "arn";
403
+ const _aKST = "accessKeySecretType";
404
+ const _aQE = "awsQueryError";
405
+ const _c = "client";
406
+ const _cTT = "clientTokenType";
407
+ const _e = "error";
408
+ const _hE = "httpError";
409
+ const _m = "message";
410
+ const _pDLT = "policyDescriptorListType";
411
+ const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sts";
412
+ const _tLT = "tagListType";
413
+ const n0 = "com.amazonaws.sts";
414
+ var accessKeySecretType = [0, n0, _aKST, 8, 0];
415
+ var clientTokenType = [0, n0, _cTT, 8, 0];
416
+ var AssumedRoleUser = [3, n0, _ARU, 0, [_ARI, _A], [0, 0]];
417
+ var AssumeRoleRequest = [
418
+ 3,
419
+ n0,
420
+ _ARR,
421
+ 0,
422
+ [_RA, _RSN, _PA, _P, _DS, _T, _TTK, _EI, _SN, _TC, _SI, _PC],
423
+ [0, 0, () => policyDescriptorListType, 0, 1, () => tagListType, 64 | 0, 0, 0, 0, 0, () => ProvidedContextsListType],
424
+ ];
425
+ var AssumeRoleResponse = [
426
+ 3,
427
+ n0,
428
+ _ARRs,
429
+ 0,
430
+ [_C, _ARU, _PPS, _SI],
431
+ [[() => Credentials, 0], () => AssumedRoleUser, 1, 0],
432
+ ];
433
+ var AssumeRoleWithWebIdentityRequest = [
434
+ 3,
435
+ n0,
436
+ _ARWWIR,
437
+ 0,
438
+ [_RA, _RSN, _WIT, _PI, _PA, _P, _DS],
439
+ [0, 0, [() => clientTokenType, 0], 0, () => policyDescriptorListType, 0, 1],
440
+ ];
441
+ var AssumeRoleWithWebIdentityResponse = [
442
+ 3,
443
+ n0,
444
+ _ARWWIRs,
445
+ 0,
446
+ [_C, _SFWIT, _ARU, _PPS, _Pr, _Au, _SI],
447
+ [[() => Credentials, 0], 0, () => AssumedRoleUser, 1, 0, 0, 0],
448
+ ];
449
+ var Credentials = [
450
+ 3,
451
+ n0,
452
+ _C,
453
+ 0,
454
+ [_AKI, _SAK, _ST, _E],
455
+ [0, [() => accessKeySecretType, 0], 0, 4],
456
+ ];
457
+ var ExpiredTokenException = [
458
+ -3,
459
+ n0,
460
+ _ETE,
461
+ {
462
+ [_e]: _c,
463
+ [_hE]: 400,
464
+ [_aQE]: [`ExpiredTokenException`, 400],
465
+ },
466
+ [_m],
467
+ [0],
468
+ ];
469
+ schema.TypeRegistry.for(n0).registerError(ExpiredTokenException, ExpiredTokenException$1);
470
+ var IDPCommunicationErrorException = [
471
+ -3,
472
+ n0,
473
+ _IDPCEE,
474
+ {
475
+ [_e]: _c,
476
+ [_hE]: 400,
477
+ [_aQE]: [`IDPCommunicationError`, 400],
478
+ },
479
+ [_m],
480
+ [0],
481
+ ];
482
+ schema.TypeRegistry.for(n0).registerError(IDPCommunicationErrorException, IDPCommunicationErrorException$1);
483
+ var IDPRejectedClaimException = [
484
+ -3,
485
+ n0,
486
+ _IDPRCE,
487
+ {
488
+ [_e]: _c,
489
+ [_hE]: 403,
490
+ [_aQE]: [`IDPRejectedClaim`, 403],
491
+ },
492
+ [_m],
493
+ [0],
494
+ ];
495
+ schema.TypeRegistry.for(n0).registerError(IDPRejectedClaimException, IDPRejectedClaimException$1);
496
+ var InvalidIdentityTokenException = [
497
+ -3,
498
+ n0,
499
+ _IITE,
500
+ {
501
+ [_e]: _c,
502
+ [_hE]: 400,
503
+ [_aQE]: [`InvalidIdentityToken`, 400],
504
+ },
505
+ [_m],
506
+ [0],
507
+ ];
508
+ schema.TypeRegistry.for(n0).registerError(InvalidIdentityTokenException, InvalidIdentityTokenException$1);
509
+ var MalformedPolicyDocumentException = [
510
+ -3,
511
+ n0,
512
+ _MPDE,
513
+ {
514
+ [_e]: _c,
515
+ [_hE]: 400,
516
+ [_aQE]: [`MalformedPolicyDocument`, 400],
517
+ },
518
+ [_m],
519
+ [0],
520
+ ];
521
+ schema.TypeRegistry.for(n0).registerError(MalformedPolicyDocumentException, MalformedPolicyDocumentException$1);
522
+ var PackedPolicyTooLargeException = [
523
+ -3,
524
+ n0,
525
+ _PPTLE,
526
+ {
527
+ [_e]: _c,
528
+ [_hE]: 400,
529
+ [_aQE]: [`PackedPolicyTooLarge`, 400],
530
+ },
531
+ [_m],
532
+ [0],
533
+ ];
534
+ schema.TypeRegistry.for(n0).registerError(PackedPolicyTooLargeException, PackedPolicyTooLargeException$1);
535
+ var PolicyDescriptorType = [3, n0, _PDT, 0, [_a], [0]];
536
+ var ProvidedContext = [3, n0, _PCr, 0, [_PAr, _CA], [0, 0]];
537
+ var RegionDisabledException = [
538
+ -3,
539
+ n0,
540
+ _RDE,
541
+ {
542
+ [_e]: _c,
543
+ [_hE]: 403,
544
+ [_aQE]: [`RegionDisabledException`, 403],
545
+ },
546
+ [_m],
547
+ [0],
548
+ ];
549
+ schema.TypeRegistry.for(n0).registerError(RegionDisabledException, RegionDisabledException$1);
550
+ var Tag = [3, n0, _Ta, 0, [_K, _V], [0, 0]];
551
+ var STSServiceException = [-3, _s, "STSServiceException", 0, [], []];
552
+ schema.TypeRegistry.for(_s).registerError(STSServiceException, STSServiceException$1);
553
+ var policyDescriptorListType = [1, n0, _pDLT, 0, () => PolicyDescriptorType];
554
+ var ProvidedContextsListType = [1, n0, _PCLT, 0, () => ProvidedContext];
555
+ var tagListType = [1, n0, _tLT, 0, () => Tag];
556
+ var AssumeRole = [9, n0, _AR, 0, () => AssumeRoleRequest, () => AssumeRoleResponse];
557
+ var AssumeRoleWithWebIdentity = [
558
+ 9,
559
+ n0,
560
+ _ARWWI,
561
+ 0,
562
+ () => AssumeRoleWithWebIdentityRequest,
563
+ () => AssumeRoleWithWebIdentityResponse,
564
+ ];
565
+
566
+ class AssumeRoleCommand extends smithyClient.Command
567
+ .classBuilder()
568
+ .ep(EndpointParameters.commonParams)
569
+ .m(function (Command, cs, config, o) {
570
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
571
+ })
572
+ .s("AWSSecurityTokenServiceV20110615", "AssumeRole", {})
573
+ .n("STSClient", "AssumeRoleCommand")
574
+ .sc(AssumeRole)
575
+ .build() {
576
+ }
577
+
578
+ class AssumeRoleWithWebIdentityCommand extends smithyClient.Command
579
+ .classBuilder()
580
+ .ep(EndpointParameters.commonParams)
581
+ .m(function (Command, cs, config, o) {
582
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
583
+ })
584
+ .s("AWSSecurityTokenServiceV20110615", "AssumeRoleWithWebIdentity", {})
585
+ .n("STSClient", "AssumeRoleWithWebIdentityCommand")
586
+ .sc(AssumeRoleWithWebIdentity)
587
+ .build() {
588
+ }
589
+
590
+ const commands = {
591
+ AssumeRoleCommand,
592
+ AssumeRoleWithWebIdentityCommand,
593
+ };
594
+ class STS extends STSClient.STSClient {
595
+ }
596
+ smithyClient.createAggregatedClient(commands, STS);
597
+
598
+ const getAccountIdFromAssumedRoleUser = (assumedRoleUser) => {
599
+ if (typeof assumedRoleUser?.Arn === "string") {
600
+ const arnComponents = assumedRoleUser.Arn.split(":");
601
+ if (arnComponents.length > 4 && arnComponents[4] !== "") {
602
+ return arnComponents[4];
603
+ }
604
+ }
605
+ return undefined;
606
+ };
607
+ const resolveRegion = async (_region, _parentRegion, credentialProviderLogger, loaderConfig = {}) => {
608
+ const region = typeof _region === "function" ? await _region() : _region;
609
+ const parentRegion = typeof _parentRegion === "function" ? await _parentRegion() : _parentRegion;
610
+ const stsDefaultRegion = await regionConfigResolver.stsRegionDefaultResolver(loaderConfig)();
611
+ credentialProviderLogger?.debug?.("@aws-sdk/client-sts::resolveRegion", "accepting first of:", `${region} (credential provider clientConfig)`, `${parentRegion} (contextual client)`, `${stsDefaultRegion} (STS default: AWS_REGION, profile region, or us-east-1)`);
612
+ return region ?? parentRegion ?? stsDefaultRegion;
613
+ };
614
+ const getDefaultRoleAssumer$1 = (stsOptions, STSClient) => {
615
+ let stsClient;
616
+ let closureSourceCreds;
617
+ return async (sourceCreds, params) => {
618
+ closureSourceCreds = sourceCreds;
619
+ if (!stsClient) {
620
+ const { logger = stsOptions?.parentClientConfig?.logger, profile = stsOptions?.parentClientConfig?.profile, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger, userAgentAppId = stsOptions?.parentClientConfig?.userAgentAppId, } = stsOptions;
621
+ const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger, {
622
+ logger,
623
+ profile,
624
+ });
625
+ const isCompatibleRequestHandler = !isH2(requestHandler);
626
+ stsClient = new STSClient({
627
+ ...stsOptions,
628
+ userAgentAppId,
629
+ profile,
630
+ credentialDefaultProvider: () => async () => closureSourceCreds,
631
+ region: resolvedRegion,
632
+ requestHandler: isCompatibleRequestHandler ? requestHandler : undefined,
633
+ logger: logger,
634
+ });
635
+ }
636
+ const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleCommand(params));
637
+ if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
638
+ throw new Error(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);
639
+ }
640
+ const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser);
641
+ const credentials = {
642
+ accessKeyId: Credentials.AccessKeyId,
643
+ secretAccessKey: Credentials.SecretAccessKey,
644
+ sessionToken: Credentials.SessionToken,
645
+ expiration: Credentials.Expiration,
646
+ ...(Credentials.CredentialScope && { credentialScope: Credentials.CredentialScope }),
647
+ ...(accountId && { accountId }),
648
+ };
649
+ client.setCredentialFeature(credentials, "CREDENTIALS_STS_ASSUME_ROLE", "i");
650
+ return credentials;
651
+ };
652
+ };
653
+ const getDefaultRoleAssumerWithWebIdentity$1 = (stsOptions, STSClient) => {
654
+ let stsClient;
655
+ return async (params) => {
656
+ if (!stsClient) {
657
+ const { logger = stsOptions?.parentClientConfig?.logger, profile = stsOptions?.parentClientConfig?.profile, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger, userAgentAppId = stsOptions?.parentClientConfig?.userAgentAppId, } = stsOptions;
658
+ const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger, {
659
+ logger,
660
+ profile,
661
+ });
662
+ const isCompatibleRequestHandler = !isH2(requestHandler);
663
+ stsClient = new STSClient({
664
+ ...stsOptions,
665
+ userAgentAppId,
666
+ profile,
667
+ region: resolvedRegion,
668
+ requestHandler: isCompatibleRequestHandler ? requestHandler : undefined,
669
+ logger: logger,
670
+ });
671
+ }
672
+ const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));
673
+ if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
674
+ throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${params.RoleArn}`);
675
+ }
676
+ const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser);
677
+ const credentials = {
678
+ accessKeyId: Credentials.AccessKeyId,
679
+ secretAccessKey: Credentials.SecretAccessKey,
680
+ sessionToken: Credentials.SessionToken,
681
+ expiration: Credentials.Expiration,
682
+ ...(Credentials.CredentialScope && { credentialScope: Credentials.CredentialScope }),
683
+ ...(accountId && { accountId }),
684
+ };
685
+ if (accountId) {
686
+ client.setCredentialFeature(credentials, "RESOLVED_ACCOUNT_ID", "T");
687
+ }
688
+ client.setCredentialFeature(credentials, "CREDENTIALS_STS_ASSUME_ROLE_WEB_ID", "k");
689
+ return credentials;
690
+ };
691
+ };
692
+ const isH2 = (requestHandler) => {
693
+ return requestHandler?.metadata?.handlerProtocol === "h2";
694
+ };
695
+
696
+ const getCustomizableStsClientCtor = (baseCtor, customizations) => {
697
+ if (!customizations)
698
+ return baseCtor;
699
+ else
700
+ return class CustomizableSTSClient extends baseCtor {
701
+ constructor(config) {
702
+ super(config);
703
+ for (const customization of customizations) {
704
+ this.middlewareStack.use(customization);
705
+ }
706
+ }
707
+ };
708
+ };
709
+ const getDefaultRoleAssumer = (stsOptions = {}, stsPlugins) => getDefaultRoleAssumer$1(stsOptions, getCustomizableStsClientCtor(STSClient.STSClient, stsPlugins));
710
+ const getDefaultRoleAssumerWithWebIdentity = (stsOptions = {}, stsPlugins) => getDefaultRoleAssumerWithWebIdentity$1(stsOptions, getCustomizableStsClientCtor(STSClient.STSClient, stsPlugins));
711
+ const decorateDefaultCredentialProvider = (provider) => (input) => provider({
712
+ roleAssumer: getDefaultRoleAssumer(input),
713
+ roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity(input),
714
+ ...input,
715
+ });
716
+
717
+ Object.defineProperty(exports, "$Command", ({
718
+ enumerable: true,
719
+ get: function () { return smithyClient.Command; }
720
+ }));
721
+ exports.AssumeRoleCommand = AssumeRoleCommand;
722
+ exports.AssumeRoleWithWebIdentityCommand = AssumeRoleWithWebIdentityCommand;
723
+ exports.ExpiredTokenException = ExpiredTokenException$1;
724
+ exports.IDPCommunicationErrorException = IDPCommunicationErrorException$1;
725
+ exports.IDPRejectedClaimException = IDPRejectedClaimException$1;
726
+ exports.InvalidIdentityTokenException = InvalidIdentityTokenException$1;
727
+ exports.MalformedPolicyDocumentException = MalformedPolicyDocumentException$1;
728
+ exports.PackedPolicyTooLargeException = PackedPolicyTooLargeException$1;
729
+ exports.RegionDisabledException = RegionDisabledException$1;
730
+ exports.STS = STS;
731
+ exports.STSServiceException = STSServiceException$1;
732
+ exports.decorateDefaultCredentialProvider = decorateDefaultCredentialProvider;
733
+ exports.getDefaultRoleAssumer = getDefaultRoleAssumer;
734
+ exports.getDefaultRoleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity;
735
+ Object.keys(STSClient).forEach(function (k) {
736
+ if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
737
+ enumerable: true,
738
+ get: function () { return STSClient[k]; }
739
+ });
740
+ });
741
+
742
+
743
+ /***/ }),
744
+
745
+ /***/ 36578:
746
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
747
+
748
+
749
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
750
+ exports.getRuntimeConfig = void 0;
751
+ const tslib_1 = __webpack_require__(61860);
752
+ const package_json_1 = tslib_1.__importDefault(__webpack_require__(39955));
753
+ const core_1 = __webpack_require__(8704);
754
+ const util_user_agent_node_1 = __webpack_require__(51656);
755
+ const config_resolver_1 = __webpack_require__(39316);
756
+ const core_2 = __webpack_require__(90402);
757
+ const hash_node_1 = __webpack_require__(5092);
758
+ const middleware_retry_1 = __webpack_require__(19618);
759
+ const node_config_provider_1 = __webpack_require__(55704);
760
+ const node_http_handler_1 = __webpack_require__(61279);
761
+ const util_body_length_node_1 = __webpack_require__(13638);
762
+ const util_retry_1 = __webpack_require__(15518);
763
+ const runtimeConfig_shared_1 = __webpack_require__(24443);
764
+ const smithy_client_1 = __webpack_require__(61411);
765
+ const util_defaults_mode_node_1 = __webpack_require__(15435);
766
+ const smithy_client_2 = __webpack_require__(61411);
767
+ const getRuntimeConfig = (config) => {
768
+ (0, smithy_client_2.emitWarningIfUnsupportedVersion)(process.version);
769
+ const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
770
+ const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
771
+ const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
772
+ (0, core_1.emitWarningIfUnsupportedVersion)(process.version);
773
+ const loaderConfig = {
774
+ profile: config?.profile,
775
+ logger: clientSharedValues.logger,
776
+ };
777
+ return {
778
+ ...clientSharedValues,
779
+ ...config,
780
+ runtime: "node",
781
+ defaultsMode,
782
+ authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
783
+ bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
784
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ??
785
+ (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
786
+ httpAuthSchemes: config?.httpAuthSchemes ?? [
787
+ {
788
+ schemeId: "aws.auth#sigv4",
789
+ identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4") ||
790
+ (async (idProps) => await config.credentialDefaultProvider(idProps?.__config || {})()),
791
+ signer: new core_1.AwsSdkSigV4Signer(),
792
+ },
793
+ {
794
+ schemeId: "smithy.api#noAuth",
795
+ identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
796
+ signer: new core_2.NoAuthSigner(),
797
+ },
798
+ ],
799
+ maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
800
+ region: config?.region ??
801
+ (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
802
+ requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
803
+ retryMode: config?.retryMode ??
804
+ (0, node_config_provider_1.loadConfig)({
805
+ ...middleware_retry_1.NODE_RETRY_MODE_CONFIG_OPTIONS,
806
+ default: async () => (await defaultConfigProvider()).retryMode || util_retry_1.DEFAULT_RETRY_MODE,
807
+ }, config),
808
+ sha256: config?.sha256 ?? hash_node_1.Hash.bind(null, "sha256"),
809
+ streamCollector: config?.streamCollector ?? node_http_handler_1.streamCollector,
810
+ useDualstackEndpoint: config?.useDualstackEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
811
+ useFipsEndpoint: config?.useFipsEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
812
+ userAgentAppId: config?.userAgentAppId ?? (0, node_config_provider_1.loadConfig)(util_user_agent_node_1.NODE_APP_ID_CONFIG_OPTIONS, loaderConfig),
813
+ };
814
+ };
815
+ exports.getRuntimeConfig = getRuntimeConfig;
816
+
817
+
818
+ /***/ }),
819
+
820
+ /***/ 24443:
821
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
822
+
823
+
824
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
825
+ exports.getRuntimeConfig = void 0;
826
+ const core_1 = __webpack_require__(8704);
827
+ const protocols_1 = __webpack_require__(37288);
828
+ const core_2 = __webpack_require__(90402);
829
+ const smithy_client_1 = __webpack_require__(61411);
830
+ const url_parser_1 = __webpack_require__(14494);
831
+ const util_base64_1 = __webpack_require__(68385);
832
+ const util_utf8_1 = __webpack_require__(71577);
833
+ const httpAuthSchemeProvider_1 = __webpack_require__(27851);
834
+ const endpointResolver_1 = __webpack_require__(59765);
835
+ const getRuntimeConfig = (config) => {
836
+ return {
837
+ apiVersion: "2011-06-15",
838
+ base64Decoder: config?.base64Decoder ?? util_base64_1.fromBase64,
839
+ base64Encoder: config?.base64Encoder ?? util_base64_1.toBase64,
840
+ disableHostPrefix: config?.disableHostPrefix ?? false,
841
+ endpointProvider: config?.endpointProvider ?? endpointResolver_1.defaultEndpointResolver,
842
+ extensions: config?.extensions ?? [],
843
+ httpAuthSchemeProvider: config?.httpAuthSchemeProvider ?? httpAuthSchemeProvider_1.defaultSTSHttpAuthSchemeProvider,
844
+ httpAuthSchemes: config?.httpAuthSchemes ?? [
845
+ {
846
+ schemeId: "aws.auth#sigv4",
847
+ identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
848
+ signer: new core_1.AwsSdkSigV4Signer(),
849
+ },
850
+ {
851
+ schemeId: "smithy.api#noAuth",
852
+ identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
853
+ signer: new core_2.NoAuthSigner(),
854
+ },
855
+ ],
856
+ logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
857
+ protocol: config?.protocol ??
858
+ new protocols_1.AwsQueryProtocol({
859
+ defaultNamespace: "com.amazonaws.sts",
860
+ xmlNamespace: "https://sts.amazonaws.com/doc/2011-06-15/",
861
+ version: "2011-06-15",
862
+ }),
863
+ serviceId: config?.serviceId ?? "STS",
864
+ urlParser: config?.urlParser ?? url_parser_1.parseUrl,
865
+ utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
866
+ utf8Encoder: config?.utf8Encoder ?? util_utf8_1.toUtf8,
867
+ };
868
+ };
869
+ exports.getRuntimeConfig = getRuntimeConfig;
870
+
871
+
872
+ /***/ }),
873
+
874
+ /***/ 37742:
875
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
876
+
877
+
878
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
879
+ exports.resolveRuntimeExtensions = void 0;
880
+ const region_config_resolver_1 = __webpack_require__(36463);
881
+ const protocol_http_1 = __webpack_require__(72356);
882
+ const smithy_client_1 = __webpack_require__(61411);
883
+ const httpAuthExtensionConfiguration_1 = __webpack_require__(34532);
884
+ const resolveRuntimeExtensions = (runtimeConfig, extensions) => {
885
+ const extensionConfiguration = Object.assign((0, region_config_resolver_1.getAwsRegionExtensionConfiguration)(runtimeConfig), (0, smithy_client_1.getDefaultExtensionConfiguration)(runtimeConfig), (0, protocol_http_1.getHttpHandlerExtensionConfiguration)(runtimeConfig), (0, httpAuthExtensionConfiguration_1.getHttpAuthExtensionConfiguration)(runtimeConfig));
886
+ extensions.forEach((extension) => extension.configure(extensionConfiguration));
887
+ return Object.assign(runtimeConfig, (0, region_config_resolver_1.resolveAwsRegionExtensionConfiguration)(extensionConfiguration), (0, smithy_client_1.resolveDefaultRuntimeConfig)(extensionConfiguration), (0, protocol_http_1.resolveHttpHandlerRuntimeConfig)(extensionConfiguration), (0, httpAuthExtensionConfiguration_1.resolveHttpAuthRuntimeConfig)(extensionConfiguration));
888
+ };
889
+ exports.resolveRuntimeExtensions = resolveRuntimeExtensions;
890
+
891
+
892
+ /***/ }),
893
+
894
+ /***/ 39955:
895
+ /***/ ((module) => {
896
+
897
+ module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.940.0","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:cjs\' \'yarn:build:es\' \'yarn:build:types\'","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"rimraf ./dist-* && rimraf *.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=18.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.940.0","@aws-sdk/middleware-host-header":"3.936.0","@aws-sdk/middleware-logger":"3.936.0","@aws-sdk/middleware-recursion-detection":"3.936.0","@aws-sdk/middleware-user-agent":"3.940.0","@aws-sdk/region-config-resolver":"3.936.0","@aws-sdk/types":"3.936.0","@aws-sdk/util-endpoints":"3.936.0","@aws-sdk/util-user-agent-browser":"3.936.0","@aws-sdk/util-user-agent-node":"3.940.0","@smithy/config-resolver":"^4.4.3","@smithy/core":"^3.18.5","@smithy/fetch-http-handler":"^5.3.6","@smithy/hash-node":"^4.2.5","@smithy/invalid-dependency":"^4.2.5","@smithy/middleware-content-length":"^4.2.5","@smithy/middleware-endpoint":"^4.3.12","@smithy/middleware-retry":"^4.4.12","@smithy/middleware-serde":"^4.2.6","@smithy/middleware-stack":"^4.2.5","@smithy/node-config-provider":"^4.3.5","@smithy/node-http-handler":"^4.4.5","@smithy/protocol-http":"^5.3.5","@smithy/smithy-client":"^4.9.8","@smithy/types":"^4.9.0","@smithy/url-parser":"^4.2.5","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.11","@smithy/util-defaults-mode-node":"^4.2.14","@smithy/util-endpoints":"^3.2.5","@smithy/util-middleware":"^4.2.5","@smithy/util-retry":"^4.2.5","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","rimraf":"3.0.2","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"}}}');
898
+
899
+ /***/ })
900
+
901
+ };
902
+
903
+ //# sourceMappingURL=136.index.js.map