@aws-sdk/credential-provider-ini 3.489.0 → 3.495.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,10 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.fromIni = void 0;
4
- const shared_ini_file_loader_1 = require("@smithy/shared-ini-file-loader");
5
- const resolveProfileData_1 = require("./resolveProfileData");
6
- const fromIni = (init = {}) => async () => {
7
- const profiles = await (0, shared_ini_file_loader_1.parseKnownFiles)(init);
8
- return (0, resolveProfileData_1.resolveProfileData)((0, shared_ini_file_loader_1.getProfileName)(init), profiles, init);
9
- };
10
- exports.fromIni = fromIni;
1
+ module.exports = require("./index.js");
package/dist-cjs/index.js CHANGED
@@ -1,4 +1,173 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- const tslib_1 = require("tslib");
4
- tslib_1.__exportStar(require("./fromIni"), exports);
1
+ var __defProp = Object.defineProperty;
2
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
3
+ var __getOwnPropNames = Object.getOwnPropertyNames;
4
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
5
+ var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
+
20
+ // src/index.ts
21
+ var src_exports = {};
22
+ __export(src_exports, {
23
+ fromIni: () => fromIni
24
+ });
25
+ module.exports = __toCommonJS(src_exports);
26
+
27
+ // src/fromIni.ts
28
+
29
+
30
+ // src/resolveProfileData.ts
31
+
32
+
33
+ // src/resolveAssumeRoleCredentials.ts
34
+
35
+ var import_shared_ini_file_loader = require("@smithy/shared-ini-file-loader");
36
+
37
+ // src/resolveCredentialSource.ts
38
+ var import_credential_provider_env = require("@aws-sdk/credential-provider-env");
39
+ var import_credential_provider_imds = require("@smithy/credential-provider-imds");
40
+ var import_property_provider = require("@smithy/property-provider");
41
+ var resolveCredentialSource = /* @__PURE__ */ __name((credentialSource, profileName) => {
42
+ const sourceProvidersMap = {
43
+ EcsContainer: import_credential_provider_imds.fromContainerMetadata,
44
+ Ec2InstanceMetadata: import_credential_provider_imds.fromInstanceMetadata,
45
+ Environment: import_credential_provider_env.fromEnv
46
+ };
47
+ if (credentialSource in sourceProvidersMap) {
48
+ return sourceProvidersMap[credentialSource]();
49
+ } else {
50
+ throw new import_property_provider.CredentialsProviderError(
51
+ `Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`
52
+ );
53
+ }
54
+ }, "resolveCredentialSource");
55
+
56
+ // src/resolveAssumeRoleCredentials.ts
57
+ var isAssumeRoleProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg) || isAssumeRoleWithProviderProfile(arg)), "isAssumeRoleProfile");
58
+ var isAssumeRoleWithSourceProfile = /* @__PURE__ */ __name((arg) => typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined", "isAssumeRoleWithSourceProfile");
59
+ var isAssumeRoleWithProviderProfile = /* @__PURE__ */ __name((arg) => typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined", "isAssumeRoleWithProviderProfile");
60
+ var resolveAssumeRoleCredentials = /* @__PURE__ */ __name(async (profileName, profiles, options, visitedProfiles = {}) => {
61
+ const data = profiles[profileName];
62
+ if (!options.roleAssumer) {
63
+ throw new import_property_provider.CredentialsProviderError(
64
+ `Profile ${profileName} requires a role to be assumed, but no role assumption callback was provided.`,
65
+ false
66
+ );
67
+ }
68
+ const { source_profile } = data;
69
+ if (source_profile && source_profile in visitedProfiles) {
70
+ throw new import_property_provider.CredentialsProviderError(
71
+ `Detected a cycle attempting to resolve credentials for profile ${(0, import_shared_ini_file_loader.getProfileName)(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "),
72
+ false
73
+ );
74
+ }
75
+ const sourceCredsProvider = source_profile ? resolveProfileData(source_profile, profiles, options, {
76
+ ...visitedProfiles,
77
+ [source_profile]: true
78
+ }) : resolveCredentialSource(data.credential_source, profileName)();
79
+ const params = {
80
+ RoleArn: data.role_arn,
81
+ RoleSessionName: data.role_session_name || `aws-sdk-js-${Date.now()}`,
82
+ ExternalId: data.external_id,
83
+ DurationSeconds: parseInt(data.duration_seconds || "3600", 10)
84
+ };
85
+ const { mfa_serial } = data;
86
+ if (mfa_serial) {
87
+ if (!options.mfaCodeProvider) {
88
+ throw new import_property_provider.CredentialsProviderError(
89
+ `Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`,
90
+ false
91
+ );
92
+ }
93
+ params.SerialNumber = mfa_serial;
94
+ params.TokenCode = await options.mfaCodeProvider(mfa_serial);
95
+ }
96
+ const sourceCreds = await sourceCredsProvider;
97
+ return options.roleAssumer(sourceCreds, params);
98
+ }, "resolveAssumeRoleCredentials");
99
+
100
+ // src/resolveProcessCredentials.ts
101
+ var import_credential_provider_process = require("@aws-sdk/credential-provider-process");
102
+ var isProcessProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
103
+ var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile) => (0, import_credential_provider_process.fromProcess)({
104
+ ...options,
105
+ profile
106
+ })(), "resolveProcessCredentials");
107
+
108
+ // src/resolveSsoCredentials.ts
109
+ var import_credential_provider_sso = require("@aws-sdk/credential-provider-sso");
110
+
111
+ var resolveSsoCredentials = /* @__PURE__ */ __name((data) => {
112
+ const { sso_start_url, sso_account_id, sso_session, sso_region, sso_role_name } = (0, import_credential_provider_sso.validateSsoProfile)(data);
113
+ return (0, import_credential_provider_sso.fromSSO)({
114
+ ssoStartUrl: sso_start_url,
115
+ ssoAccountId: sso_account_id,
116
+ ssoSession: sso_session,
117
+ ssoRegion: sso_region,
118
+ ssoRoleName: sso_role_name
119
+ })();
120
+ }, "resolveSsoCredentials");
121
+
122
+ // src/resolveStaticCredentials.ts
123
+ var isStaticCredsProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1, "isStaticCredsProfile");
124
+ var resolveStaticCredentials = /* @__PURE__ */ __name((profile) => Promise.resolve({
125
+ accessKeyId: profile.aws_access_key_id,
126
+ secretAccessKey: profile.aws_secret_access_key,
127
+ sessionToken: profile.aws_session_token,
128
+ credentialScope: profile.aws_credential_scope
129
+ }), "resolveStaticCredentials");
130
+
131
+ // src/resolveWebIdentityCredentials.ts
132
+ var import_credential_provider_web_identity = require("@aws-sdk/credential-provider-web-identity");
133
+ var isWebIdentityProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
134
+ var resolveWebIdentityCredentials = /* @__PURE__ */ __name(async (profile, options) => (0, import_credential_provider_web_identity.fromTokenFile)({
135
+ webIdentityTokenFile: profile.web_identity_token_file,
136
+ roleArn: profile.role_arn,
137
+ roleSessionName: profile.role_session_name,
138
+ roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity
139
+ })(), "resolveWebIdentityCredentials");
140
+
141
+ // src/resolveProfileData.ts
142
+ var resolveProfileData = /* @__PURE__ */ __name(async (profileName, profiles, options, visitedProfiles = {}) => {
143
+ const data = profiles[profileName];
144
+ if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
145
+ return resolveStaticCredentials(data);
146
+ }
147
+ if (isAssumeRoleProfile(data)) {
148
+ return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);
149
+ }
150
+ if (isStaticCredsProfile(data)) {
151
+ return resolveStaticCredentials(data);
152
+ }
153
+ if (isWebIdentityProfile(data)) {
154
+ return resolveWebIdentityCredentials(data, options);
155
+ }
156
+ if (isProcessProfile(data)) {
157
+ return resolveProcessCredentials(options, profileName);
158
+ }
159
+ if ((0, import_credential_provider_sso.isSsoProfile)(data)) {
160
+ return resolveSsoCredentials(data);
161
+ }
162
+ throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared credentials file.`);
163
+ }, "resolveProfileData");
164
+
165
+ // src/fromIni.ts
166
+ var fromIni = /* @__PURE__ */ __name((init = {}) => async () => {
167
+ const profiles = await (0, import_shared_ini_file_loader.parseKnownFiles)(init);
168
+ return resolveProfileData((0, import_shared_ini_file_loader.getProfileName)(init), profiles, init);
169
+ }, "fromIni");
170
+ // Annotate the CommonJS export names for ESM import in node:
171
+ 0 && (module.exports = {
172
+ fromIni
173
+ });
@@ -1,52 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.resolveAssumeRoleCredentials = exports.isAssumeRoleProfile = void 0;
4
- const property_provider_1 = require("@smithy/property-provider");
5
- const shared_ini_file_loader_1 = require("@smithy/shared-ini-file-loader");
6
- const resolveCredentialSource_1 = require("./resolveCredentialSource");
7
- const resolveProfileData_1 = require("./resolveProfileData");
8
- const isAssumeRoleProfile = (arg) => Boolean(arg) &&
9
- typeof arg === "object" &&
10
- typeof arg.role_arn === "string" &&
11
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
12
- ["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
13
- ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 &&
14
- (isAssumeRoleWithSourceProfile(arg) || isAssumeRoleWithProviderProfile(arg));
15
- exports.isAssumeRoleProfile = isAssumeRoleProfile;
16
- const isAssumeRoleWithSourceProfile = (arg) => typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
17
- const isAssumeRoleWithProviderProfile = (arg) => typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
18
- const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {
19
- const data = profiles[profileName];
20
- if (!options.roleAssumer) {
21
- throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires a role to be assumed, but no role assumption callback was provided.`, false);
22
- }
23
- const { source_profile } = data;
24
- if (source_profile && source_profile in visitedProfiles) {
25
- throw new property_provider_1.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +
26
- ` ${(0, shared_ini_file_loader_1.getProfileName)(options)}. Profiles visited: ` +
27
- Object.keys(visitedProfiles).join(", "), false);
28
- }
29
- const sourceCredsProvider = source_profile
30
- ? (0, resolveProfileData_1.resolveProfileData)(source_profile, profiles, options, {
31
- ...visitedProfiles,
32
- [source_profile]: true,
33
- })
34
- : (0, resolveCredentialSource_1.resolveCredentialSource)(data.credential_source, profileName)();
35
- const params = {
36
- RoleArn: data.role_arn,
37
- RoleSessionName: data.role_session_name || `aws-sdk-js-${Date.now()}`,
38
- ExternalId: data.external_id,
39
- DurationSeconds: parseInt(data.duration_seconds || "3600", 10),
40
- };
41
- const { mfa_serial } = data;
42
- if (mfa_serial) {
43
- if (!options.mfaCodeProvider) {
44
- throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, false);
45
- }
46
- params.SerialNumber = mfa_serial;
47
- params.TokenCode = await options.mfaCodeProvider(mfa_serial);
48
- }
49
- const sourceCreds = await sourceCredsProvider;
50
- return options.roleAssumer(sourceCreds, params);
51
- };
52
- exports.resolveAssumeRoleCredentials = resolveAssumeRoleCredentials;
1
+ module.exports = require("./index.js");
@@ -1,21 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.resolveCredentialSource = void 0;
4
- const credential_provider_env_1 = require("@aws-sdk/credential-provider-env");
5
- const credential_provider_imds_1 = require("@smithy/credential-provider-imds");
6
- const property_provider_1 = require("@smithy/property-provider");
7
- const resolveCredentialSource = (credentialSource, profileName) => {
8
- const sourceProvidersMap = {
9
- EcsContainer: credential_provider_imds_1.fromContainerMetadata,
10
- Ec2InstanceMetadata: credential_provider_imds_1.fromInstanceMetadata,
11
- Environment: credential_provider_env_1.fromEnv,
12
- };
13
- if (credentialSource in sourceProvidersMap) {
14
- return sourceProvidersMap[credentialSource]();
15
- }
16
- else {
17
- throw new property_provider_1.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
18
- `expected EcsContainer or Ec2InstanceMetadata or Environment.`);
19
- }
20
- };
21
- exports.resolveCredentialSource = resolveCredentialSource;
1
+ module.exports = require("./index.js");
@@ -1,11 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.resolveProcessCredentials = exports.isProcessProfile = void 0;
4
- const credential_provider_process_1 = require("@aws-sdk/credential-provider-process");
5
- const isProcessProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string";
6
- exports.isProcessProfile = isProcessProfile;
7
- const resolveProcessCredentials = async (options, profile) => (0, credential_provider_process_1.fromProcess)({
8
- ...options,
9
- profile,
10
- })();
11
- exports.resolveProcessCredentials = resolveProcessCredentials;
1
+ module.exports = require("./index.js");
@@ -1,32 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.resolveProfileData = void 0;
4
- const property_provider_1 = require("@smithy/property-provider");
5
- const resolveAssumeRoleCredentials_1 = require("./resolveAssumeRoleCredentials");
6
- const resolveProcessCredentials_1 = require("./resolveProcessCredentials");
7
- const resolveSsoCredentials_1 = require("./resolveSsoCredentials");
8
- const resolveStaticCredentials_1 = require("./resolveStaticCredentials");
9
- const resolveWebIdentityCredentials_1 = require("./resolveWebIdentityCredentials");
10
- const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}) => {
11
- const data = profiles[profileName];
12
- if (Object.keys(visitedProfiles).length > 0 && (0, resolveStaticCredentials_1.isStaticCredsProfile)(data)) {
13
- return (0, resolveStaticCredentials_1.resolveStaticCredentials)(data);
14
- }
15
- if ((0, resolveAssumeRoleCredentials_1.isAssumeRoleProfile)(data)) {
16
- return (0, resolveAssumeRoleCredentials_1.resolveAssumeRoleCredentials)(profileName, profiles, options, visitedProfiles);
17
- }
18
- if ((0, resolveStaticCredentials_1.isStaticCredsProfile)(data)) {
19
- return (0, resolveStaticCredentials_1.resolveStaticCredentials)(data);
20
- }
21
- if ((0, resolveWebIdentityCredentials_1.isWebIdentityProfile)(data)) {
22
- return (0, resolveWebIdentityCredentials_1.resolveWebIdentityCredentials)(data, options);
23
- }
24
- if ((0, resolveProcessCredentials_1.isProcessProfile)(data)) {
25
- return (0, resolveProcessCredentials_1.resolveProcessCredentials)(options, profileName);
26
- }
27
- if ((0, resolveSsoCredentials_1.isSsoProfile)(data)) {
28
- return (0, resolveSsoCredentials_1.resolveSsoCredentials)(data);
29
- }
30
- throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared credentials file.`);
31
- };
32
- exports.resolveProfileData = resolveProfileData;
1
+ module.exports = require("./index.js");
@@ -1,17 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.resolveSsoCredentials = exports.isSsoProfile = void 0;
4
- const credential_provider_sso_1 = require("@aws-sdk/credential-provider-sso");
5
- var credential_provider_sso_2 = require("@aws-sdk/credential-provider-sso");
6
- Object.defineProperty(exports, "isSsoProfile", { enumerable: true, get: function () { return credential_provider_sso_2.isSsoProfile; } });
7
- const resolveSsoCredentials = (data) => {
8
- const { sso_start_url, sso_account_id, sso_session, sso_region, sso_role_name } = (0, credential_provider_sso_1.validateSsoProfile)(data);
9
- return (0, credential_provider_sso_1.fromSSO)({
10
- ssoStartUrl: sso_start_url,
11
- ssoAccountId: sso_account_id,
12
- ssoSession: sso_session,
13
- ssoRegion: sso_region,
14
- ssoRoleName: sso_role_name,
15
- })();
16
- };
17
- exports.resolveSsoCredentials = resolveSsoCredentials;
1
+ module.exports = require("./index.js");
@@ -1,16 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.resolveStaticCredentials = exports.isStaticCredsProfile = void 0;
4
- const isStaticCredsProfile = (arg) => Boolean(arg) &&
5
- typeof arg === "object" &&
6
- typeof arg.aws_access_key_id === "string" &&
7
- typeof arg.aws_secret_access_key === "string" &&
8
- ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
9
- exports.isStaticCredsProfile = isStaticCredsProfile;
10
- const resolveStaticCredentials = (profile) => Promise.resolve({
11
- accessKeyId: profile.aws_access_key_id,
12
- secretAccessKey: profile.aws_secret_access_key,
13
- sessionToken: profile.aws_session_token,
14
- credentialScope: profile.aws_credential_scope,
15
- });
16
- exports.resolveStaticCredentials = resolveStaticCredentials;
1
+ module.exports = require("./index.js");
@@ -1,17 +1 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.resolveWebIdentityCredentials = exports.isWebIdentityProfile = void 0;
4
- const credential_provider_web_identity_1 = require("@aws-sdk/credential-provider-web-identity");
5
- const isWebIdentityProfile = (arg) => Boolean(arg) &&
6
- typeof arg === "object" &&
7
- typeof arg.web_identity_token_file === "string" &&
8
- typeof arg.role_arn === "string" &&
9
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
10
- exports.isWebIdentityProfile = isWebIdentityProfile;
11
- const resolveWebIdentityCredentials = async (profile, options) => (0, credential_provider_web_identity_1.fromTokenFile)({
12
- webIdentityTokenFile: profile.web_identity_token_file,
13
- roleArn: profile.role_arn,
14
- roleSessionName: profile.role_session_name,
15
- roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
16
- })();
17
- exports.resolveWebIdentityCredentials = resolveWebIdentityCredentials;
1
+ module.exports = require("./index.js");
package/package.json CHANGED
@@ -1,12 +1,12 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-ini",
3
- "version": "3.489.0",
3
+ "version": "3.495.0",
4
4
  "description": "AWS credential provider that sources credentials from ~/.aws/credentials and ~/.aws/config",
5
5
  "main": "./dist-cjs/index.js",
6
6
  "module": "./dist-es/index.js",
7
7
  "scripts": {
8
8
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
9
- "build:cjs": "tsc -p tsconfig.cjs.json",
9
+ "build:cjs": "node ../../scripts/compilation/inline credential-provider-ini",
10
10
  "build:es": "tsc -p tsconfig.es.json",
11
11
  "build:include:deps": "lerna run --scope $npm_package_name --include-dependencies build",
12
12
  "build:types": "tsc -p tsconfig.types.json",
@@ -24,15 +24,15 @@
24
24
  },
25
25
  "license": "Apache-2.0",
26
26
  "dependencies": {
27
- "@aws-sdk/credential-provider-env": "3.489.0",
28
- "@aws-sdk/credential-provider-process": "3.489.0",
29
- "@aws-sdk/credential-provider-sso": "3.489.0",
30
- "@aws-sdk/credential-provider-web-identity": "3.489.0",
31
- "@aws-sdk/types": "3.489.0",
32
- "@smithy/credential-provider-imds": "^2.0.0",
33
- "@smithy/property-provider": "^2.0.0",
34
- "@smithy/shared-ini-file-loader": "^2.0.6",
35
- "@smithy/types": "^2.8.0",
27
+ "@aws-sdk/credential-provider-env": "3.495.0",
28
+ "@aws-sdk/credential-provider-process": "3.495.0",
29
+ "@aws-sdk/credential-provider-sso": "3.495.0",
30
+ "@aws-sdk/credential-provider-web-identity": "3.495.0",
31
+ "@aws-sdk/types": "3.495.0",
32
+ "@smithy/credential-provider-imds": "^2.2.0",
33
+ "@smithy/property-provider": "^2.1.0",
34
+ "@smithy/shared-ini-file-loader": "^2.3.0",
35
+ "@smithy/types": "^2.9.0",
36
36
  "tslib": "^2.5.0"
37
37
  },
38
38
  "devDependencies": {