@btc-embedded/cdk-extensions 0.22.11 → 0.22.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. package/.jsii +3 -3
  2. package/CHANGELOG.md +7 -0
  3. package/README.md +4 -0
  4. package/assets/cli/catnip.js +2 -2
  5. package/lib/constructs/EventPipe.js +1 -1
  6. package/lib/constructs/ExportedService.js +1 -1
  7. package/lib/constructs/S3Bucket.js +1 -1
  8. package/lib/constructs/SecureRestApi.js +1 -1
  9. package/lib/constructs/SecureRestApiV2.js +1 -1
  10. package/lib/constructs/api-keys/ApiKeyClientAuthorization.js +1 -1
  11. package/lib/constructs/api-keys/ApiKeyManagement.js +1 -1
  12. package/lib/constructs/api-keys/ApiKeyPreTokenHandler.js +1 -1
  13. package/lib/constructs/api-keys/ApiKeyStore.js +1 -1
  14. package/lib/extensions/ApiGatewayExtension.js +1 -1
  15. package/lib/extensions/ApplicationContainer.js +1 -1
  16. package/lib/extensions/ApplicationLoadBalancerExtension.js +1 -1
  17. package/lib/extensions/ApplicationLoadBalancerExtensionV2.js +1 -1
  18. package/lib/extensions/CloudMapExtension.js +1 -1
  19. package/lib/extensions/DeactivatableServiceExtension.js +1 -1
  20. package/lib/extensions/DeploymentConfigExtension.js +1 -1
  21. package/lib/extensions/DocumentDbAccessExtension.js +1 -1
  22. package/lib/extensions/DomainEventMessagingExtension.js +1 -1
  23. package/lib/extensions/EfsMountExtension.js +1 -1
  24. package/lib/extensions/ExtraContainerExtension.js +1 -1
  25. package/lib/extensions/HTTPApiExtension.js +1 -1
  26. package/lib/extensions/LogExtension.js +1 -1
  27. package/lib/extensions/ModifyContainerDefinitionExtension.js +1 -1
  28. package/lib/extensions/ModifyTaskDefinitionExtension.js +1 -1
  29. package/lib/extensions/OpenIdExtension.js +1 -1
  30. package/lib/extensions/OpenTelemetryExtension.js +1 -1
  31. package/lib/extensions/PostgresDbAccessExtension.js +1 -1
  32. package/lib/extensions/SharedVolumeExtension.js +1 -1
  33. package/lib/extensions/TcpKeepAliveExtension.js +1 -1
  34. package/lib/platform/ApiGateway.js +1 -1
  35. package/lib/platform/ApiGatewayVpcLink.js +2 -2
  36. package/lib/platform/ApplicationLoadBalancer.js +1 -1
  37. package/lib/platform/ApplicationLoadBalancerV2.js +2 -2
  38. package/lib/platform/BTCLogGroup.js +1 -1
  39. package/lib/platform/CognitoUserPool.js +2 -2
  40. package/lib/platform/DefaultUserPoolClients.js +1 -1
  41. package/lib/platform/DocumentDB.js +2 -2
  42. package/lib/platform/EcsCluster.js +1 -1
  43. package/lib/platform/EfsFileSystem.js +1 -1
  44. package/lib/platform/HostedZone.js +1 -1
  45. package/lib/platform/PrivateDnsNamespace.js +1 -1
  46. package/lib/platform/ResourceServer.js +1 -1
  47. package/lib/platform/Vpc.js +1 -1
  48. package/lib/platform/VpcV2.js +1 -1
  49. package/lib/stacks/ApplicationStack.js +1 -1
  50. package/lib/utils/BasePlatformStackResolver.js +1 -1
  51. package/lib/utils/StackParameter.js +1 -1
  52. package/package.json +1 -1
package/.jsii CHANGED
@@ -8497,7 +8497,7 @@
8497
8497
  },
8498
8498
  "name": "@btc-embedded/cdk-extensions",
8499
8499
  "readme": {
8500
- "markdown": "# BTC Embedded CDK Extensions\n\n# @btc-embedded/cdk-extensions\n\nA collection of reusable AWS CDK (Cloud Development Kit) extensions and constructs for building cloud infrastructure with TypeScript.\n\n## Features\n\n- **CDK Constructs**: Includes ready-to-use constructs for API Gateway, Application Load Balancer, Cognito, VPC, DocumentDB, and more.\n- **ECS Service Extensions**: Provides ECS service extensions for advanced container orchestration.\n- **Utilities**: Common utilities and helpers for stack parameters, value imports, and configuration parsing.\n- **Modular Extensions**: Easily extend AWS resources with features like logging, OpenTelemetry, EFS, Cloud Map, and custom containers.\n\n## Installation\n\n```sh\nyarn install @btc-embedded/cdk-extensions\n```\n\n## Usage Example\n\n### Basic Usage\n\n```typescript\nimport { ApiGateway } from \"@btc-embedded/cdk-extensions\";\n\n// Use constructs and extensions in your CDK app\n```\n\n### Using ApplicationStack for Simplified Configuration\n\nFor application-level stacks that reference a base platform stack, use `ApplicationStack` to ensure consistent use of the base platform stack name:\n\n```typescript\nimport { ApplicationStack } from \"@btc-embedded/cdk-extensions\";\n\nexport class MyAppStack extends ApplicationStack {\n constructor(scope: Construct, id: string) {\n super(scope, id, {\n basePlatformStackName: \"my-platform-stack\",\n env: {\n account: \"123456789012\",\n region: \"eu-central-1\",\n },\n });\n\n // Constructs and extensions automatically resolve the platform stack name\n // No need to pass basePlatformStackName repeatedly\n }\n}\n```\n\n### Config-Driven Deployments\n\nUse `createApplicationApp` for configuration-driven deployments:\n\n```typescript\nimport {\n createApplicationApp,\n ApplicationStack,\n} from \"@btc-embedded/cdk-extensions\";\nimport { z } from \"zod\";\n\nconst configSchema = z.object({\n env: z.object({ account: z.string(), region: z.string() }),\n basePlatformStackName: z.string(),\n});\n\ncreateApplicationApp({\n directory: \"./config\",\n schema: configSchema,\n createStack: (scope, config) => new MyAppStack(scope, \"MyApp\", config),\n});\n```\n\n## CLI Commands\n\n### catnip — Cloud Toolkit by the CAT Department\n\nThe `catnip` CLI tool provides commands for cloud infrastructure diagnostics and management.\n\n#### stack-diagnose\n\nDiagnose CloudFormation stack deployment failures.\n\n**Usage:**\n\n```bash\n# Auto-detect and diagnose the last failed stack\ncatnip stack-diagnose\n\n# Diagnose a specific stack\ncatnip stack-diagnose --stack-name my-stack\n\n# Customize log output and task inspection\ncatnip stack-diagnose --stack-name my-stack --tail 200 --tasks 10\n```\n\n**Description:**\n\nThe `stack-diagnose` command provides comprehensive diagnostics for failed CloudFormation stacks. If no stack name is provided, it automatically detects and diagnoses the last failed stack in your AWS account. The command displays:\n\n- **Stack Status**: Current CloudFormation stack status and reason for failure\n- **CloudFormation Events**: Recent stack events showing what failed during deployment\n- **ECS Diagnostics** (if applicable): If the stack contains ECS services, additional diagnostics are performed including:\n - Service event history\n - Recent stopped task logs\n - Container output for troubleshooting\n\n**Options:**\n\n- `--stack-name <name>` — CloudFormation stack name (optional; auto-detects last failed stack if omitted)\n- `--tail <n>` — Number of log lines to show per container (default: 100)\n- `--tasks <n>` — Number of recent stopped tasks to inspect (default: 5)\n- `--region <region>` — AWS region (uses AWS_DEFAULT_REGION / AWS_REGION environment variable if not specified)\n- `--profile <profile>` — AWS named profile for local development\n\n**Examples:**\n\n```bash\n# Quick diagnosis of last failed stack\ncatnip stack-diagnose\n\n# Diagnose specific stack with extended logging\ncatnip stack-diagnose --stack-name prod-api-stack --tail 500 --tasks 10\n\n# Use specific AWS profile and region\ncatnip stack-diagnose --profile my-profile --region eu-central-1\n```\n\n#### ecs-logs\n\nStream live logs from running ECS services in a CloudFormation stack.\n\n**Usage:**\n\n```bash\n# Stream logs from all ECS services in a stack\nnpx catnip ecs-logs --stack-name my-stack\n\n# Follow logs in real-time\nnpx catnip ecs-logs --stack-name my-stack --follow\n\n# Filter by service name and show last 50 lines\nnpx catnip ecs-logs --stack-name my-stack --tail 50 --service api\n\n# Raw JSON output (for piping to jq or pino-pretty)\nnpx catnip ecs-logs --stack-name my-stack --output raw\n\n# Pretty-printed JSON with colors\nnpx catnip ecs-logs --stack-name my-stack --output pretty\n```\n\n**Options:**\n\n- `--stack-name <name>` — CloudFormation stack name (required)\n- `--tail <n>` — Lines of history to show per container (default: 100)\n- `-f, --follow` — Keep polling for new log events\n- `--service <name>` — Filter services by name\n- `-o, --output <mode>` — Output mode: `text`, `raw`, or `pretty` (default: text)\n- `--region <region>` — AWS region\n- `--profile <profile>` — AWS profile\n\n## Documentation\n\n- [API Reference](./API.md)\n\n## License\n\nApache-2.0 © BTC Embedded Systems AG\n"
8500
+ "markdown": "# BTC Embedded CDK Extensions\n\n# @btc-embedded/cdk-extensions\n\nA collection of reusable AWS CDK (Cloud Development Kit) extensions and constructs for building cloud infrastructure with TypeScript.\n\n## Features\n\n- **CDK Constructs**: Includes ready-to-use constructs for API Gateway, Application Load Balancer, Cognito, VPC, DocumentDB, and more.\n- **ECS Service Extensions**: Provides ECS service extensions for advanced container orchestration.\n- **Utilities**: Common utilities and helpers for stack parameters, value imports, and configuration parsing.\n- **Modular Extensions**: Easily extend AWS resources with features like logging, OpenTelemetry, EFS, Cloud Map, and custom containers.\n\n## Installation\n\n```sh\nyarn install @btc-embedded/cdk-extensions\n```\n\n## Usage Example\n\n### Basic Usage\n\n```typescript\nimport { ApiGateway } from \"@btc-embedded/cdk-extensions\";\n\n// Use constructs and extensions in your CDK app\n```\n\n### Using ApplicationStack for Simplified Configuration\n\nFor application-level stacks that reference a base platform stack, use `ApplicationStack` to ensure consistent use of the base platform stack name:\n\n```typescript\nimport { ApplicationStack } from \"@btc-embedded/cdk-extensions\";\n\nexport class MyAppStack extends ApplicationStack {\n constructor(scope: Construct, id: string) {\n super(scope, id, {\n basePlatformStackName: \"my-platform-stack\",\n env: {\n account: \"123456789012\",\n region: \"eu-central-1\",\n },\n });\n\n // Constructs and extensions automatically resolve the platform stack name\n // No need to pass basePlatformStackName repeatedly\n }\n}\n```\n\n### Config-Driven Deployments\n\nUse `createApplicationApp` for configuration-driven deployments:\n\n```typescript\nimport {\n createApplicationApp,\n ApplicationStack,\n} from \"@btc-embedded/cdk-extensions\";\nimport { z } from \"zod\";\n\nconst configSchema = z.object({\n env: z.object({ account: z.string(), region: z.string() }),\n basePlatformStackName: z.string(),\n});\n\ncreateApplicationApp({\n directory: \"./config\",\n schema: configSchema,\n createStack: (scope, config) => new MyAppStack(scope, \"MyApp\", config),\n});\n```\n\n## CLI Commands\n\n### catnip — Cloud Toolkit by the CAT Department\n\nThe `catnip` CLI tool provides commands for cloud infrastructure diagnostics and management.\n\n#### stack-diagnose\n\nDiagnose CloudFormation stack deployment failures.\n\n**Usage:**\n\n```bash\n# Auto-detect and diagnose the last failed stack\ncatnip stack-diagnose\n\n# Diagnose a specific stack\ncatnip stack-diagnose --stack-name my-stack\n\n# Customize log output and task inspection\ncatnip stack-diagnose --stack-name my-stack --tail 200 --tasks 10\n```\n\n**Description:**\n\nThe `stack-diagnose` command provides comprehensive diagnostics for failed CloudFormation stacks. If no stack name is provided, it automatically detects and diagnoses the last failed stack in your AWS account. The command displays:\n\n- **Stack Status**: Current CloudFormation stack status and reason for failure\n- **CloudFormation Events**: Recent stack events showing what failed during deployment\n- **ECS Diagnostics** (if applicable): If the stack contains ECS services, additional diagnostics are performed including:\n - Service event history\n - Recent stopped task logs\n - Container output for troubleshooting\n\n**Options:**\n\n- `--stack-name <name>` — CloudFormation stack name (optional; auto-detects last failed stack if omitted)\n- `--stage <name>` — Filter stacks by stage name (e.g., 'prod', 'dev') when auto-detecting; only used if --stack-name is not provided\n- `--tail <n>` — Number of log lines to show per container (default: 100)\n- `--tasks <n>` — Number of recent stopped tasks to inspect (default: 5)\n- `--region <region>` — AWS region (uses AWS_DEFAULT_REGION / AWS_REGION environment variable if not specified)\n- `--profile <profile>` — AWS named profile for local development\n\n**Examples:**\n\n```bash\n# Quick diagnosis of last failed stack\ncatnip stack-diagnose\n\n# Auto-detect failed stack for a specific stage (useful when multiple stages in same account)\ncatnip stack-diagnose --stage prod\n\n# Diagnose specific stack with extended logging\ncatnip stack-diagnose --stack-name prod-api-stack --tail 500 --tasks 10\n\n# Use specific AWS profile and region\ncatnip stack-diagnose --profile my-profile --region eu-central-1\n```\n\n#### ecs-logs\n\nStream live logs from running ECS services in a CloudFormation stack.\n\n**Usage:**\n\n```bash\n# Stream logs from all ECS services in a stack\nnpx catnip ecs-logs --stack-name my-stack\n\n# Follow logs in real-time\nnpx catnip ecs-logs --stack-name my-stack --follow\n\n# Filter by service name and show last 50 lines\nnpx catnip ecs-logs --stack-name my-stack --tail 50 --service api\n\n# Raw JSON output (for piping to jq or pino-pretty)\nnpx catnip ecs-logs --stack-name my-stack --output raw\n\n# Pretty-printed JSON with colors\nnpx catnip ecs-logs --stack-name my-stack --output pretty\n```\n\n**Options:**\n\n- `--stack-name <name>` — CloudFormation stack name (required)\n- `--tail <n>` — Lines of history to show per container (default: 100)\n- `-f, --follow` — Keep polling for new log events\n- `--service <name>` — Filter services by name\n- `-o, --output <mode>` — Output mode: `text`, `raw`, or `pretty` (default: text)\n- `--region <region>` — AWS region\n- `--profile <profile>` — AWS profile\n\n## Documentation\n\n- [API Reference](./API.md)\n\n## License\n\nApache-2.0 © BTC Embedded Systems AG\n"
8501
8501
  },
8502
8502
  "repository": {
8503
8503
  "type": "git",
@@ -19883,6 +19883,6 @@
19883
19883
  "symbolId": "src/platform/VpcV2:VpcV2Props"
19884
19884
  }
19885
19885
  },
19886
- "version": "0.22.11",
19887
- "fingerprint": "tFOP05AizrkdYOh25E8nhxF4BCsuHDrs+B731DuvmNQ="
19886
+ "version": "0.22.12",
19887
+ "fingerprint": "vVdhIzE4n7lhVu3V5P8r4sGtCjXxsaLrtBn883wlaTw="
19888
19888
  }
package/CHANGELOG.md CHANGED
@@ -1,4 +1,11 @@
1
1
 
2
+ ## [0.22.11](https://github.com/btc-embedded/cdk-extensions/compare/v0.22.10...v0.22.11) (2026-02-25)
3
+
4
+
5
+ ### Features
6
+
7
+ * **cli:** add catnip ecs-logs command for live CloudWatch log streaming ([55716ba](https://github.com/btc-embedded/cdk-extensions/commit/55716ba1c446ccfc740e1be29b19b64d85c6f475))
8
+
2
9
  ## [0.22.10](https://github.com/btc-embedded/cdk-extensions/compare/v0.22.9...v0.22.10) (2026-02-25)
3
10
 
4
11
 
package/README.md CHANGED
@@ -110,6 +110,7 @@ The `stack-diagnose` command provides comprehensive diagnostics for failed Cloud
110
110
  **Options:**
111
111
 
112
112
  - `--stack-name <name>` — CloudFormation stack name (optional; auto-detects last failed stack if omitted)
113
+ - `--stage <name>` — Filter stacks by stage name (e.g., 'prod', 'dev') when auto-detecting; only used if --stack-name is not provided
113
114
  - `--tail <n>` — Number of log lines to show per container (default: 100)
114
115
  - `--tasks <n>` — Number of recent stopped tasks to inspect (default: 5)
115
116
  - `--region <region>` — AWS region (uses AWS_DEFAULT_REGION / AWS_REGION environment variable if not specified)
@@ -121,6 +122,9 @@ The `stack-diagnose` command provides comprehensive diagnostics for failed Cloud
121
122
  # Quick diagnosis of last failed stack
122
123
  catnip stack-diagnose
123
124
 
125
+ # Auto-detect failed stack for a specific stage (useful when multiple stages in same account)
126
+ catnip stack-diagnose --stage prod
127
+
124
128
  # Diagnose specific stack with extended logging
125
129
  catnip stack-diagnose --stack-name prod-api-stack --tail 500 --tasks 10
126
130
 
@@ -184,7 +184,7 @@ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.ht
184
184
  However, a future version may change this behavior to prefer the ENV static credentials.
185
185
  Please ensure that your environment only sets either the AWS_PROFILE or the
186
186
  AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.
187
- `),w5e=!0)),new qT.CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.",{logger:t.logger,tryNextLink:!0});return t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv"),mte.fromEnv(t)()},async e=>{t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");let{ssoStartUrl:r,ssoAccountId:n,ssoRegion:s,ssoRoleName:o,ssoSession:i}=t;if(!r&&!n&&!s&&!o&&!i)throw new qT.CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).",{logger:t.logger});let{fromSSO:a}=await Promise.resolve().then(()=>T(vee()));return a(t)(e)},async e=>{t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");let{fromIni:r}=await Promise.resolve().then(()=>T(D5e()));return r(t)(e)},async e=>{t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");let{fromProcess:r}=await Promise.resolve().then(()=>T(cte()));return r(t)(e)},async e=>{t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");let{fromTokenFile:r}=await Promise.resolve().then(()=>T(lte()));return r(t)(e)},async()=>(t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider"),(await dwr(t))()),async()=>{throw new qT.CredentialsProviderError("Could not load credentials from any providers",{tryNextLink:!1,logger:t.logger})}],$5e),gwr=t=>t?.expiration!==void 0,$5e=t=>t?.expiration!==void 0&&t.expiration.getTime()-Date.now()<3e5;BB.credentialsTreatedAsExpired=$5e;BB.credentialsWillNeedRefresh=gwr;BB.defaultProvider=fwr});var J5e=O(HB=>{"use strict";Object.defineProperty(HB,"__esModule",{value:!0});HB.ruleSet=void 0;var K5e="required",fo="fn",go="argv",Nf="ref",Op="properties",kp="headers",k5e=!0,N5e="isSet",BT="booleanEquals",fy="error",Rc="endpoint",Yu="tree",GB="PartitionResult",fte="stringEquals",L5e={[K5e]:!1,type:"string"},U5e={[K5e]:!0,default:!1,type:"boolean"},F5e={[Nf]:"Endpoint"},Q5e={[fo]:BT,[go]:[{[Nf]:"UseFIPS"},!0]},Y5e={[fo]:BT,[go]:[{[Nf]:"UseDualStack"},!0]},$i={},M5e={[fo]:"getAttr",[go]:[{[Nf]:GB},"supportsFIPS"]},q5e={[fo]:BT,[go]:[!0,{[fo]:"getAttr",[go]:[{[Nf]:GB},"supportsDualStack"]}]},gte={[fo]:"getAttr",[go]:[{[Nf]:GB},"name"]},B5e={url:"https://secretsmanager-fips.{Region}.amazonaws.com",[Op]:{},[kp]:{}},G5e={url:"https://secretsmanager.{Region}.amazonaws.com",[Op]:{},[kp]:{}},H5e=[Q5e],V5e=[Y5e],j5e=[{[Nf]:"Region"}],W5e=[{[fo]:fte,[go]:["aws",gte]}],z5e=[{[fo]:fte,[go]:["aws-us-gov",gte]}],hwr={version:"1.0",parameters:{Region:L5e,UseDualStack:U5e,UseFIPS:U5e,Endpoint:L5e},rules:[{conditions:[{[fo]:N5e,[go]:[F5e]}],rules:[{conditions:H5e,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:fy},{conditions:V5e,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:fy},{endpoint:{url:F5e,[Op]:$i,[kp]:$i},type:Rc}],type:Yu},{conditions:[{[fo]:N5e,[go]:j5e}],rules:[{conditions:[{[fo]:"aws.partition",[go]:j5e,assign:GB}],rules:[{conditions:[Q5e,Y5e],rules:[{conditions:[{[fo]:BT,[go]:[k5e,M5e]},q5e],rules:[{conditions:W5e,endpoint:B5e,type:Rc},{conditions:z5e,endpoint:B5e,type:Rc},{endpoint:{url:"https://secretsmanager-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",[Op]:$i,[kp]:$i},type:Rc}],type:Yu},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:fy}],type:Yu},{conditions:H5e,rules:[{conditions:[{[fo]:BT,[go]:[M5e,k5e]}],rules:[{endpoint:{url:"https://secretsmanager-fips.{Region}.{PartitionResult#dnsSuffix}",[Op]:$i,[kp]:$i},type:Rc}],type:Yu},{error:"FIPS is enabled but this partition does not support FIPS",type:fy}],type:Yu},{conditions:V5e,rules:[{conditions:[q5e],rules:[{conditions:W5e,endpoint:G5e,type:Rc},{conditions:[{[fo]:fte,[go]:["aws-cn",gte]}],endpoint:{url:"https://secretsmanager.{Region}.amazonaws.com.cn",[Op]:$i,[kp]:$i},type:Rc},{conditions:z5e,endpoint:G5e,type:Rc},{endpoint:{url:"https://secretsmanager.{Region}.{PartitionResult#dualStackDnsSuffix}",[Op]:$i,[kp]:$i},type:Rc}],type:Yu},{error:"DualStack is enabled but this partition does not support DualStack",type:fy}],type:Yu},{endpoint:{url:"https://secretsmanager.{Region}.{PartitionResult#dnsSuffix}",[Op]:$i,[kp]:$i},type:Rc}],type:Yu}],type:Yu},{error:"Invalid Configuration: Missing Region",type:fy}]};HB.ruleSet=hwr});var X5e=O(VB=>{"use strict";Object.defineProperty(VB,"__esModule",{value:!0});VB.defaultEndpointResolver=void 0;var Swr=yf(),hte=Hn(),ywr=J5e(),Ewr=new hte.EndpointCache({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),Cwr=(t,e={})=>Ewr.get(t,()=>(0,hte.resolveEndpoint)(ywr.ruleSet,{endpointParams:t,logger:e.logger}));VB.defaultEndpointResolver=Cwr;hte.customEndpointFunctions.aws=Swr.awsEndpointFunctions});var tQe=O(jB=>{"use strict";Object.defineProperty(jB,"__esModule",{value:!0});jB.getRuntimeConfig=void 0;var _wr=(Un(),J(Sp)),Rwr=(Ef(),J(BZ)),Twr=lt(),Awr=Sn(),Z5e=De(),eQe=He(),Pwr=QZ(),vwr=X5e(),bwr=t=>({apiVersion:"2017-10-17",base64Decoder:t?.base64Decoder??Z5e.fromBase64,base64Encoder:t?.base64Encoder??Z5e.toBase64,disableHostPrefix:t?.disableHostPrefix??!1,endpointProvider:t?.endpointProvider??vwr.defaultEndpointResolver,extensions:t?.extensions??[],httpAuthSchemeProvider:t?.httpAuthSchemeProvider??Pwr.defaultSecretsManagerHttpAuthSchemeProvider,httpAuthSchemes:t?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new _wr.AwsSdkSigV4Signer}],logger:t?.logger??new Twr.NoOpLogger,protocol:t?.protocol??Rwr.AwsJson1_1Protocol,protocolSettings:t?.protocolSettings??{defaultNamespace:"com.amazonaws.secretsmanager",version:"2017-10-17",serviceTarget:"secretsmanager"},serviceId:t?.serviceId??"Secrets Manager",urlParser:t?.urlParser??Awr.parseUrl,utf8Decoder:t?.utf8Decoder??eQe.fromUtf8,utf8Encoder:t?.utf8Encoder??eQe.toUtf8});jB.getRuntimeConfig=bwr});var aQe=O(zB=>{"use strict";Object.defineProperty(zB,"__esModule",{value:!0});zB.getRuntimeConfig=void 0;var Iwr=(Cs(),J(Es)),Dwr=Iwr.__importDefault(dWe()),rQe=(Un(),J(Sp)),xwr=O5e(),nQe=ZS(),WB=At(),wwr=Co(),sQe=ca(),Lf=Jr(),oQe=_f(),iQe=lt(),$wr=Cn(),Owr=ey(),kwr=vs(),Nwr=tQe(),Lwr=t=>{(0,iQe.emitWarningIfUnsupportedVersion)(process.version);let e=(0,Owr.resolveDefaultsModeConfig)(t),r=()=>e().then(iQe.loadConfigsForDefaultMode),n=(0,Nwr.getRuntimeConfig)(t);(0,rQe.emitWarningIfUnsupportedVersion)(process.version);let s={profile:t?.profile,logger:n.logger};return{...n,...t,runtime:"node",defaultsMode:e,authSchemePreference:t?.authSchemePreference??(0,Lf.loadConfig)(rQe.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS,s),bodyLengthChecker:t?.bodyLengthChecker??$wr.calculateBodyLength,credentialDefaultProvider:t?.credentialDefaultProvider??xwr.defaultProvider,defaultUserAgentProvider:t?.defaultUserAgentProvider??(0,nQe.createDefaultUserAgentProvider)({serviceId:n.serviceId,clientVersion:Dwr.default.version}),maxAttempts:t?.maxAttempts??(0,Lf.loadConfig)(sQe.NODE_MAX_ATTEMPT_CONFIG_OPTIONS,t),region:t?.region??(0,Lf.loadConfig)(WB.NODE_REGION_CONFIG_OPTIONS,{...WB.NODE_REGION_CONFIG_FILE_OPTIONS,...s}),requestHandler:oQe.NodeHttpHandler.create(t?.requestHandler??r),retryMode:t?.retryMode??(0,Lf.loadConfig)({...sQe.NODE_RETRY_MODE_CONFIG_OPTIONS,default:async()=>(await r()).retryMode||kwr.DEFAULT_RETRY_MODE},t),sha256:t?.sha256??wwr.Hash.bind(null,"sha256"),streamCollector:t?.streamCollector??oQe.streamCollector,useDualstackEndpoint:t?.useDualstackEndpoint??(0,Lf.loadConfig)(WB.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS,s),useFipsEndpoint:t?.useFipsEndpoint??(0,Lf.loadConfig)(WB.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS,s),userAgentAppId:t?.userAgentAppId??(0,Lf.loadConfig)(nQe.NODE_APP_ID_CONFIG_OPTIONS,s)}};zB.getRuntimeConfig=Lwr});var Pte=O(K=>{"use strict";var cQe=bS(),Uwr=IS(),Fwr=DS(),uQe=Cf(),Mwr=At(),gy=(zs(),J(US)),ho=(bt(),J(gq)),qwr=yo(),Pr=hc(),lQe=ca(),kt=lt(),dQe=QZ(),Bwr=aQe(),pQe=Tf(),mQe=qe(),Gwr=t=>Object.assign(t,{useDualstackEndpoint:t.useDualstackEndpoint??!1,useFipsEndpoint:t.useFipsEndpoint??!1,defaultSigningName:"secretsmanager"}),$r={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}},Hwr=t=>{let e=t.httpAuthSchemes,r=t.httpAuthSchemeProvider,n=t.credentials;return{setHttpAuthScheme(s){let o=e.findIndex(i=>i.schemeId===s.schemeId);o===-1?e.push(s):e.splice(o,1,s)},httpAuthSchemes(){return e},setHttpAuthSchemeProvider(s){r=s},httpAuthSchemeProvider(){return r},setCredentials(s){n=s},credentials(){return n}}},Vwr=t=>({httpAuthSchemes:t.httpAuthSchemes(),httpAuthSchemeProvider:t.httpAuthSchemeProvider(),credentials:t.credentials()}),jwr=(t,e)=>{let r=Object.assign(pQe.getAwsRegionExtensionConfiguration(t),kt.getDefaultExtensionConfiguration(t),mQe.getHttpHandlerExtensionConfiguration(t),Hwr(t));return e.forEach(n=>n.configure(r)),Object.assign(t,pQe.resolveAwsRegionExtensionConfiguration(r),kt.resolveDefaultRuntimeConfig(r),mQe.resolveHttpHandlerRuntimeConfig(r),Vwr(r))},Uf=class extends kt.Client{config;constructor(...[e]){let r=Bwr.getRuntimeConfig(e||{});super(r),this.initConfig=r;let n=Gwr(r),s=uQe.resolveUserAgentConfig(n),o=lQe.resolveRetryConfig(s),i=Mwr.resolveRegionConfig(o),a=cQe.resolveHostHeaderConfig(i),c=Pr.resolveEndpointConfig(a),u=dQe.resolveHttpAuthSchemeConfig(c),f=jwr(u,e?.extensions||[]);this.config=f,this.middlewareStack.use(ho.getSchemaSerdePlugin(this.config)),this.middlewareStack.use(uQe.getUserAgentPlugin(this.config)),this.middlewareStack.use(lQe.getRetryPlugin(this.config)),this.middlewareStack.use(qwr.getContentLengthPlugin(this.config)),this.middlewareStack.use(cQe.getHostHeaderPlugin(this.config)),this.middlewareStack.use(Uwr.getLoggerPlugin(this.config)),this.middlewareStack.use(Fwr.getRecursionDetectionPlugin(this.config)),this.middlewareStack.use(gy.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:dQe.defaultSecretsManagerHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async m=>new gy.DefaultIdentityProviderConfig({"aws.auth#sigv4":m.credentials})})),this.middlewareStack.use(gy.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}},Ss=class t extends kt.ServiceException{constructor(e){super(e),Object.setPrototypeOf(this,t.prototype)}},KB=class t extends Ss{name="DecryptionFailure";$fault="client";Message;constructor(e){super({name:"DecryptionFailure",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},QB=class t extends Ss{name="InternalServiceError";$fault="server";Message;constructor(e){super({name:"InternalServiceError",$fault:"server",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},YB=class t extends Ss{name="InvalidNextTokenException";$fault="client";Message;constructor(e){super({name:"InvalidNextTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},JB=class t extends Ss{name="InvalidParameterException";$fault="client";Message;constructor(e){super({name:"InvalidParameterException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},XB=class t extends Ss{name="InvalidRequestException";$fault="client";Message;constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},ZB=class t extends Ss{name="ResourceNotFoundException";$fault="client";Message;constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},eG=class t extends Ss{name="EncryptionFailure";$fault="client";Message;constructor(e){super({name:"EncryptionFailure",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},tG=class t extends Ss{name="LimitExceededException";$fault="client";Message;constructor(e){super({name:"LimitExceededException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},rG=class t extends Ss{name="MalformedPolicyDocumentException";$fault="client";Message;constructor(e){super({name:"MalformedPolicyDocumentException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},nG=class t extends Ss{name="PreconditionNotMetException";$fault="client";Message;constructor(e){super({name:"PreconditionNotMetException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},sG=class t extends Ss{name="ResourceExistsException";$fault="client";Message;constructor(e){super({name:"ResourceExistsException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},oG=class t extends Ss{name="PublicPolicyException";$fault="client";Message;constructor(e){super({name:"PublicPolicyException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},Wwr="AutomaticallyAfterDays",zwr="APIErrorListType",Kwr="APIErrorType",fn="ARN",fQe="AddReplicaRegions",Qwr="AddReplicaRegionListType",Ywr="BatchGetSecretValue",Jwr="BatchGetSecretValueRequest",Xwr="BatchGetSecretValueResponse",Zwr="BlockPublicPolicy",jT="CreatedDate",e$r="CheckName",t$r="CancelRotateSecret",r$r="CancelRotateSecretRequest",n$r="CancelRotateSecretResponse",bG="ClientRequestToken",s$r="CreateSecret",o$r="CreateSecretRequest",i$r="CreateSecretResponse",IG="Description",a$r="DeletionDate",gQe="DeletedDate",c$r="DecryptionFailure",u$r="DeleteResourcePolicy",l$r="DeleteResourcePolicyRequest",d$r="DeleteResourcePolicyResponse",p$r="DeleteSecret",m$r="DeleteSecretRequest",f$r="DeleteSecretResponse",g$r="DescribeSecretRequest",h$r="DescribeSecretResponse",S$r="DescribeSecret",y$r="Duration",E$r="Errors",C$r="ErrorCode",_$r="ExcludeCharacters",R$r="EncryptionFailure",T$r="ExcludeLowercase",A$r="ErrorMessage",P$r="ExcludeNumbers",v$r="ExcludePunctuation",Ste="ExternalSecretRotationMetadata",b$r="ExternalSecretRotationMetadataItem",I$r="ExternalSecretRotationMetadataType",yte="ExternalSecretRotationRoleArn",D$r="ExcludeUppercase",hQe="Filters",x$r="ForceDeleteWithoutRecovery",w$r="FiltersListType",SQe="ForceOverwriteReplicaSecret",$$r="Filter",O$r="GetRandomPassword",k$r="GetRandomPasswordRequest",N$r="GetRandomPasswordResponse",L$r="GetResourcePolicyRequest",U$r="GetResourcePolicyResponse",F$r="GetResourcePolicy",M$r="GetSecretValue",q$r="GetSecretValueRequest",B$r="GetSecretValueResponse",G$r="IncludeDeprecated",H$r="InvalidNextTokenException",V$r="IncludePlannedDeletion",j$r="InvalidParameterException",W$r="InvalidRequestException",z$r="IncludeSpace",K$r="InternalServiceError",Ete="Key",hy="KmsKeyId",Q$r="KmsKeyIds",DG="LastAccessedDate",yQe="LastChangedDate",Y$r="LimitExceededException",EQe="LastRotatedDate",J$r="ListSecrets",X$r="ListSecretsRequest",Z$r="ListSecretsResponse",eOr="ListSecretVersionIds",tOr="ListSecretVersionIdsRequest",rOr="ListSecretVersionIdsResponse",qo="Message",nOr="MalformedPolicyDocumentException",Cte="MaxResults",sOr="MoveToVersionId",qn="Name",CQe="NextRotationDate",Sy="NextToken",_Qe="OwningService",oOr="PasswordLength",iOr="PreconditionNotMetException",aOr="PublicPolicyException",RQe="PrimaryRegion",cOr="PutResourcePolicy",uOr="PutResourcePolicyRequest",lOr="PutResourcePolicyResponse",dOr="PutSecretValue",pOr="PutSecretValueRequest",mOr="PutSecretValueResponse",fOr="PolicyValidationPassed",TQe="Region",AQe="RotationEnabled",gOr="ResourceExistsException",hOr="RequireEachIncludedType",SOr="RemoveFromVersionId",yOr="RotateImmediately",_te="RotationLambdaARN",EOr="ResourceNotFoundException",COr="RandomPassword",_Or="RandomPasswordType",Rte="ResourcePolicy",Tte="RotationRules",ROr="RemoveRegionsFromReplication",TOr="RemoveRegionsFromReplicationRequest",AOr="RemoveRegionsFromReplicationResponse",POr="RemoveReplicaRegions",vOr="ReplicaRegionType",bOr="RotationRulesType",xG="ReplicationStatus",IOr="ReplicationStatusListType",DOr="RestoreSecretRequest",xOr="RestoreSecretResponse",wOr="RotateSecretRequest",$Or="RotateSecretResponse",OOr="ReplicationStatusType",kOr="ReplicateSecretToRegions",NOr="ReplicateSecretToRegionsRequest",LOr="ReplicateSecretToRegionsResponse",UOr="RestoreSecret",FOr="RotateSecret",MOr="RotationToken",qOr="RotationTokenType",BOr="RecoveryWindowInDays",GOr="Status",WT="SecretBinary",HOr="SecretBinaryType",VOr="SortBy",jOr="ScheduleExpression",sn="SecretId",WOr="SecretIdList",zOr="SecretList",KOr="SecretListEntry",QOr="SecretListType",YOr="StatusMessage",JOr="SortOrder",XOr="StopReplicationToReplica",ZOr="StopReplicationToReplicaRequest",ekr="StopReplicationToReplicaResponse",zT="SecretString",tkr="SecretStringType",rkr="SecretValues",nkr="SecretValueEntry",skr="SecretVersionsListEntry",okr="SecretVersionsListType",ikr="SecretValuesType",akr="SecretVersionsToStages",PQe="SecretVersionsToStagesMapType",wG="Tags",ckr="TagKeys",ukr="TagListType",lkr="TagResource",dkr="TagResourceRequest",pkr="Tag",$G="Type",mkr="UntagResource",fkr="UntagResourceRequest",gkr="UpdateSecret",hkr="UpdateSecretRequest",Skr="UpdateSecretResponse",ykr="UpdateSecretVersionStage",Ekr="UpdateSecretVersionStageRequest",Ckr="UpdateSecretVersionStageResponse",vQe="Value",_kr="ValidationErrors",Rkr="ValidationErrorsEntry",Tkr="ValidationErrorsType",Ju="VersionId",Akr="VersionIdsToStages",Pkr="ValidateResourcePolicy",vkr="ValidateResourcePolicyRequest",bkr="ValidateResourcePolicyResponse",bQe="VersionStage",KT="VersionStages",Ikr="Values",Dkr="Versions",ga="client",Oi="error",xkr="server",IQe="smithy.ts.sdk.synthetic.com.amazonaws.secretsmanager",ee="com.amazonaws.secretsmanager",wkr=[0,ee,_Or,8,0],$kr=[0,ee,qOr,8,0],QT=[0,ee,HOr,8,21],YT=[0,ee,tkr,8,0],DQe=[3,ee,Kwr,0,[sn,C$r,qo],[0,0,0]],xQe=[3,ee,Jwr,0,[WOr,hQe,Cte,Sy],[64,()=>VYe,1,0]],wQe=[3,ee,Xwr,0,[rkr,Sy,E$r],[[()=>Nkr,0],0,()=>Okr]],$Qe=[3,ee,r$r,0,[sn],[0],1],OQe=[3,ee,n$r,0,[fn,qn,Ju],[0,0,0]],kQe=[3,ee,o$r,0,[qn,bG,IG,hy,WT,zT,wG,fQe,SQe,$G],[0,[0,4],0,0,[()=>QT,0],[()=>YT,0],()=>NG,()=>HYe,2,0],1],NQe=[3,ee,i$r,0,[fn,qn,Ju,xG],[0,0,0,()=>kG]],LQe=[-3,ee,c$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(LQe,KB);var UQe=[3,ee,l$r,0,[sn],[0],1],FQe=[3,ee,d$r,0,[fn,qn],[0,0]],MQe=[3,ee,m$r,0,[sn,BOr,x$r],[0,1,2],1],qQe=[3,ee,f$r,0,[fn,qn,a$r],[0,0,4]],BQe=[3,ee,g$r,0,[sn],[0],1],GQe=[3,ee,h$r,0,[fn,qn,$G,IG,hy,AQe,_te,Tte,Ste,yte,EQe,yQe,DG,gQe,CQe,wG,Akr,_Qe,jT,RQe,xG],[0,0,0,0,0,2,0,()=>OG,()=>Ate,0,4,4,4,4,4,()=>NG,[2,ee,PQe,0,0,64],0,4,0,()=>kG]],HQe=[-3,ee,R$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(HQe,eG);var VQe=[3,ee,b$r,0,[Ete,vQe],[0,0]],jQe=[3,ee,$$r,0,[Ete,Ikr],[0,64]],WQe=[3,ee,k$r,0,[oOr,_$r,P$r,v$r,D$r,T$r,z$r,hOr],[1,0,2,2,2,2,2,2]],zQe=[3,ee,N$r,0,[COr],[[()=>wkr,0]]],KQe=[3,ee,L$r,0,[sn],[0],1],QQe=[3,ee,U$r,0,[fn,qn,Rte],[0,0,0]],YQe=[3,ee,q$r,0,[sn,Ju,bQe],[0,0,0],1],JQe=[3,ee,B$r,0,[fn,qn,Ju,WT,zT,KT,jT],[0,0,0,[()=>QT,0],[()=>YT,0],64,4]],XQe=[-3,ee,K$r,{[Oi]:xkr},[qo],[0]];ho.TypeRegistry.for(ee).registerError(XQe,QB);var ZQe=[-3,ee,H$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(ZQe,YB);var eYe=[-3,ee,j$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(eYe,JB);var tYe=[-3,ee,W$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(tYe,XB);var rYe=[-3,ee,Y$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(rYe,tG);var nYe=[3,ee,X$r,0,[V$r,Cte,Sy,hQe,JOr,VOr],[2,1,0,()=>VYe,0,0]],sYe=[3,ee,Z$r,0,[zOr,Sy],[()=>kkr,0]],oYe=[3,ee,tOr,0,[sn,Cte,Sy,G$r],[0,1,0,2],1],iYe=[3,ee,rOr,0,[Dkr,Sy,fn,qn],[()=>Lkr,0,0,0]],aYe=[-3,ee,nOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(aYe,rG);var cYe=[-3,ee,iOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(cYe,nG);var uYe=[-3,ee,aOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(uYe,oG);var lYe=[3,ee,uOr,0,[sn,Rte,Zwr],[0,0,2],2],dYe=[3,ee,lOr,0,[fn,qn],[0,0]],pYe=[3,ee,pOr,0,[sn,bG,WT,zT,KT,MOr],[0,[0,4],[()=>QT,0],[()=>YT,0],64,[()=>$kr,0]],1],mYe=[3,ee,mOr,0,[fn,qn,Ju,KT],[0,0,0,64]],fYe=[3,ee,TOr,0,[sn,POr],[0,64],2],gYe=[3,ee,AOr,0,[fn,xG],[0,()=>kG]],hYe=[3,ee,vOr,0,[TQe,hy],[0,0]],SYe=[3,ee,NOr,0,[sn,fQe,SQe],[0,()=>HYe,2],2],yYe=[3,ee,LOr,0,[fn,xG],[0,()=>kG]],EYe=[3,ee,OOr,0,[TQe,hy,GOr,YOr,DG],[0,0,0,0,4]],CYe=[-3,ee,gOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(CYe,sG);var _Ye=[-3,ee,EOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(_Ye,ZB);var RYe=[3,ee,DOr,0,[sn],[0],1],TYe=[3,ee,xOr,0,[fn,qn],[0,0]],AYe=[3,ee,wOr,0,[sn,bG,_te,Tte,Ste,yte,yOr],[0,[0,4],0,()=>OG,()=>Ate,0,2],1],PYe=[3,ee,$Or,0,[fn,qn,Ju],[0,0,0]],OG=[3,ee,bOr,0,[Wwr,y$r,jOr],[1,0,0]],vYe=[3,ee,KOr,0,[fn,qn,$G,IG,hy,AQe,_te,Tte,Ste,yte,EQe,yQe,DG,gQe,CQe,wG,akr,_Qe,jT,RQe],[0,0,0,0,0,2,0,()=>OG,()=>Ate,0,4,4,4,4,4,()=>NG,[2,ee,PQe,0,0,64],0,4,0]],bYe=[3,ee,nkr,0,[fn,qn,Ju,WT,zT,KT,jT],[0,0,0,[()=>QT,0],[()=>YT,0],64,4]],IYe=[3,ee,skr,0,[Ju,KT,DG,jT,Q$r],[0,64,4,4,64]],DYe=[3,ee,ZOr,0,[sn],[0],1],xYe=[3,ee,ekr,0,[fn],[0]],wYe=[3,ee,pkr,0,[Ete,vQe],[0,0]],$Ye=[3,ee,dkr,0,[sn,wG],[0,()=>NG],2],OYe=[3,ee,fkr,0,[sn,ckr],[0,64],2],kYe=[3,ee,hkr,0,[sn,bG,IG,hy,WT,zT,$G],[0,[0,4],0,0,[()=>QT,0],[()=>YT,0],0],1],NYe=[3,ee,Skr,0,[fn,qn,Ju],[0,0,0]],LYe=[3,ee,Ekr,0,[sn,bQe,SOr,sOr],[0,0,0,0],2],UYe=[3,ee,Ckr,0,[fn,qn],[0,0]],FYe=[3,ee,vkr,0,[Rte,sn],[0,0],1],MYe=[3,ee,bkr,0,[fOr,_kr],[2,()=>Ukr]],qYe=[3,ee,Rkr,0,[e$r,A$r],[0,0]],BYe="unit",GYe=[-3,IQe,"SecretsManagerServiceException",0,[],[]];ho.TypeRegistry.for(IQe).registerError(GYe,Ss);var HYe=[1,ee,Qwr,0,()=>hYe],Okr=[1,ee,zwr,0,()=>DQe],Ate=[1,ee,I$r,0,()=>VQe],VYe=[1,ee,w$r,0,()=>jQe],kG=[1,ee,IOr,0,()=>EYe],kkr=[1,ee,QOr,0,()=>vYe],Nkr=[1,ee,ikr,0,[()=>bYe,0]],Lkr=[1,ee,okr,0,()=>IYe],NG=[1,ee,ukr,0,()=>wYe],Ukr=[1,ee,Tkr,0,()=>qYe],jYe=[9,ee,Ywr,0,()=>xQe,()=>wQe],WYe=[9,ee,t$r,0,()=>$Qe,()=>OQe],zYe=[9,ee,s$r,0,()=>kQe,()=>NQe],KYe=[9,ee,u$r,0,()=>UQe,()=>FQe],QYe=[9,ee,p$r,0,()=>MQe,()=>qQe],YYe=[9,ee,S$r,0,()=>BQe,()=>GQe],JYe=[9,ee,O$r,0,()=>WQe,()=>zQe],XYe=[9,ee,F$r,0,()=>KQe,()=>QQe],ZYe=[9,ee,M$r,0,()=>YQe,()=>JQe],e7e=[9,ee,J$r,0,()=>nYe,()=>sYe],t7e=[9,ee,eOr,0,()=>oYe,()=>iYe],r7e=[9,ee,cOr,0,()=>lYe,()=>dYe],n7e=[9,ee,dOr,0,()=>pYe,()=>mYe],s7e=[9,ee,ROr,0,()=>fYe,()=>gYe],o7e=[9,ee,kOr,0,()=>SYe,()=>yYe],i7e=[9,ee,UOr,0,()=>RYe,()=>TYe],a7e=[9,ee,FOr,0,()=>AYe,()=>PYe],c7e=[9,ee,XOr,0,()=>DYe,()=>xYe],u7e=[9,ee,lkr,0,()=>$Ye,()=>BYe],l7e=[9,ee,mkr,0,()=>OYe,()=>BYe],d7e=[9,ee,gkr,0,()=>kYe,()=>NYe],p7e=[9,ee,ykr,0,()=>LYe,()=>UYe],m7e=[9,ee,Pkr,0,()=>FYe,()=>MYe],GT=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","BatchGetSecretValue",{}).n("SecretsManagerClient","BatchGetSecretValueCommand").sc(jYe).build(){},iG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","CancelRotateSecret",{}).n("SecretsManagerClient","CancelRotateSecretCommand").sc(WYe).build(){},aG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","CreateSecret",{}).n("SecretsManagerClient","CreateSecretCommand").sc(zYe).build(){},cG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","DeleteResourcePolicy",{}).n("SecretsManagerClient","DeleteResourcePolicyCommand").sc(KYe).build(){},uG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","DeleteSecret",{}).n("SecretsManagerClient","DeleteSecretCommand").sc(QYe).build(){},lG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","DescribeSecret",{}).n("SecretsManagerClient","DescribeSecretCommand").sc(YYe).build(){},dG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","GetRandomPassword",{}).n("SecretsManagerClient","GetRandomPasswordCommand").sc(JYe).build(){},pG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","GetResourcePolicy",{}).n("SecretsManagerClient","GetResourcePolicyCommand").sc(XYe).build(){},mG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","GetSecretValue",{}).n("SecretsManagerClient","GetSecretValueCommand").sc(ZYe).build(){},HT=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","ListSecrets",{}).n("SecretsManagerClient","ListSecretsCommand").sc(e7e).build(){},VT=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","ListSecretVersionIds",{}).n("SecretsManagerClient","ListSecretVersionIdsCommand").sc(t7e).build(){},fG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","PutResourcePolicy",{}).n("SecretsManagerClient","PutResourcePolicyCommand").sc(r7e).build(){},gG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","PutSecretValue",{}).n("SecretsManagerClient","PutSecretValueCommand").sc(n7e).build(){},hG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","RemoveRegionsFromReplication",{}).n("SecretsManagerClient","RemoveRegionsFromReplicationCommand").sc(s7e).build(){},SG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","ReplicateSecretToRegions",{}).n("SecretsManagerClient","ReplicateSecretToRegionsCommand").sc(o7e).build(){},yG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","RestoreSecret",{}).n("SecretsManagerClient","RestoreSecretCommand").sc(i7e).build(){},EG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","RotateSecret",{}).n("SecretsManagerClient","RotateSecretCommand").sc(a7e).build(){},CG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","StopReplicationToReplica",{}).n("SecretsManagerClient","StopReplicationToReplicaCommand").sc(c7e).build(){},_G=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","TagResource",{}).n("SecretsManagerClient","TagResourceCommand").sc(u7e).build(){},RG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","UntagResource",{}).n("SecretsManagerClient","UntagResourceCommand").sc(l7e).build(){},TG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","UpdateSecret",{}).n("SecretsManagerClient","UpdateSecretCommand").sc(d7e).build(){},AG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","UpdateSecretVersionStage",{}).n("SecretsManagerClient","UpdateSecretVersionStageCommand").sc(p7e).build(){},PG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","ValidateResourcePolicy",{}).n("SecretsManagerClient","ValidateResourcePolicyCommand").sc(m7e).build(){},Fkr={BatchGetSecretValueCommand:GT,CancelRotateSecretCommand:iG,CreateSecretCommand:aG,DeleteResourcePolicyCommand:cG,DeleteSecretCommand:uG,DescribeSecretCommand:lG,GetRandomPasswordCommand:dG,GetResourcePolicyCommand:pG,GetSecretValueCommand:mG,ListSecretsCommand:HT,ListSecretVersionIdsCommand:VT,PutResourcePolicyCommand:fG,PutSecretValueCommand:gG,RemoveRegionsFromReplicationCommand:hG,ReplicateSecretToRegionsCommand:SG,RestoreSecretCommand:yG,RotateSecretCommand:EG,StopReplicationToReplicaCommand:CG,TagResourceCommand:_G,UntagResourceCommand:RG,UpdateSecretCommand:TG,UpdateSecretVersionStageCommand:AG,ValidateResourcePolicyCommand:PG},vG=class extends Uf{};kt.createAggregatedClient(Fkr,vG);var Mkr=gy.createPaginator(Uf,GT,"NextToken","NextToken","MaxResults"),qkr=gy.createPaginator(Uf,HT,"NextToken","NextToken","MaxResults"),Bkr=gy.createPaginator(Uf,VT,"NextToken","NextToken","MaxResults"),Gkr={all:"all",description:"description",name:"name",owning_service:"owning-service",primary_region:"primary-region",tag_key:"tag-key",tag_value:"tag-value"},Hkr={Failed:"Failed",InProgress:"InProgress",InSync:"InSync"},Vkr={created_date:"created-date",last_accessed_date:"last-accessed-date",last_changed_date:"last-changed-date",name:"name"},jkr={asc:"asc",desc:"desc"};Object.defineProperty(K,"$Command",{enumerable:!0,get:function(){return kt.Command}});Object.defineProperty(K,"__Client",{enumerable:!0,get:function(){return kt.Client}});K.APIErrorType$=DQe;K.BatchGetSecretValue$=jYe;K.BatchGetSecretValueCommand=GT;K.BatchGetSecretValueRequest$=xQe;K.BatchGetSecretValueResponse$=wQe;K.CancelRotateSecret$=WYe;K.CancelRotateSecretCommand=iG;K.CancelRotateSecretRequest$=$Qe;K.CancelRotateSecretResponse$=OQe;K.CreateSecret$=zYe;K.CreateSecretCommand=aG;K.CreateSecretRequest$=kQe;K.CreateSecretResponse$=NQe;K.DecryptionFailure=KB;K.DecryptionFailure$=LQe;K.DeleteResourcePolicy$=KYe;K.DeleteResourcePolicyCommand=cG;K.DeleteResourcePolicyRequest$=UQe;K.DeleteResourcePolicyResponse$=FQe;K.DeleteSecret$=QYe;K.DeleteSecretCommand=uG;K.DeleteSecretRequest$=MQe;K.DeleteSecretResponse$=qQe;K.DescribeSecret$=YYe;K.DescribeSecretCommand=lG;K.DescribeSecretRequest$=BQe;K.DescribeSecretResponse$=GQe;K.EncryptionFailure=eG;K.EncryptionFailure$=HQe;K.ExternalSecretRotationMetadataItem$=VQe;K.Filter$=jQe;K.FilterNameStringType=Gkr;K.GetRandomPassword$=JYe;K.GetRandomPasswordCommand=dG;K.GetRandomPasswordRequest$=WQe;K.GetRandomPasswordResponse$=zQe;K.GetResourcePolicy$=XYe;K.GetResourcePolicyCommand=pG;K.GetResourcePolicyRequest$=KQe;K.GetResourcePolicyResponse$=QQe;K.GetSecretValue$=ZYe;K.GetSecretValueCommand=mG;K.GetSecretValueRequest$=YQe;K.GetSecretValueResponse$=JQe;K.InternalServiceError=QB;K.InternalServiceError$=XQe;K.InvalidNextTokenException=YB;K.InvalidNextTokenException$=ZQe;K.InvalidParameterException=JB;K.InvalidParameterException$=eYe;K.InvalidRequestException=XB;K.InvalidRequestException$=tYe;K.LimitExceededException=tG;K.LimitExceededException$=rYe;K.ListSecretVersionIds$=t7e;K.ListSecretVersionIdsCommand=VT;K.ListSecretVersionIdsRequest$=oYe;K.ListSecretVersionIdsResponse$=iYe;K.ListSecrets$=e7e;K.ListSecretsCommand=HT;K.ListSecretsRequest$=nYe;K.ListSecretsResponse$=sYe;K.MalformedPolicyDocumentException=rG;K.MalformedPolicyDocumentException$=aYe;K.PreconditionNotMetException=nG;K.PreconditionNotMetException$=cYe;K.PublicPolicyException=oG;K.PublicPolicyException$=uYe;K.PutResourcePolicy$=r7e;K.PutResourcePolicyCommand=fG;K.PutResourcePolicyRequest$=lYe;K.PutResourcePolicyResponse$=dYe;K.PutSecretValue$=n7e;K.PutSecretValueCommand=gG;K.PutSecretValueRequest$=pYe;K.PutSecretValueResponse$=mYe;K.RemoveRegionsFromReplication$=s7e;K.RemoveRegionsFromReplicationCommand=hG;K.RemoveRegionsFromReplicationRequest$=fYe;K.RemoveRegionsFromReplicationResponse$=gYe;K.ReplicaRegionType$=hYe;K.ReplicateSecretToRegions$=o7e;K.ReplicateSecretToRegionsCommand=SG;K.ReplicateSecretToRegionsRequest$=SYe;K.ReplicateSecretToRegionsResponse$=yYe;K.ReplicationStatusType$=EYe;K.ResourceExistsException=sG;K.ResourceExistsException$=CYe;K.ResourceNotFoundException=ZB;K.ResourceNotFoundException$=_Ye;K.RestoreSecret$=i7e;K.RestoreSecretCommand=yG;K.RestoreSecretRequest$=RYe;K.RestoreSecretResponse$=TYe;K.RotateSecret$=a7e;K.RotateSecretCommand=EG;K.RotateSecretRequest$=AYe;K.RotateSecretResponse$=PYe;K.RotationRulesType$=OG;K.SecretListEntry$=vYe;K.SecretValueEntry$=bYe;K.SecretVersionsListEntry$=IYe;K.SecretsManager=vG;K.SecretsManagerClient=Uf;K.SecretsManagerServiceException=Ss;K.SecretsManagerServiceException$=GYe;K.SortByType=Vkr;K.SortOrderType=jkr;K.StatusType=Hkr;K.StopReplicationToReplica$=c7e;K.StopReplicationToReplicaCommand=CG;K.StopReplicationToReplicaRequest$=DYe;K.StopReplicationToReplicaResponse$=xYe;K.Tag$=wYe;K.TagResource$=u7e;K.TagResourceCommand=_G;K.TagResourceRequest$=$Ye;K.UntagResource$=l7e;K.UntagResourceCommand=RG;K.UntagResourceRequest$=OYe;K.UpdateSecret$=d7e;K.UpdateSecretCommand=TG;K.UpdateSecretRequest$=kYe;K.UpdateSecretResponse$=NYe;K.UpdateSecretVersionStage$=p7e;K.UpdateSecretVersionStageCommand=AG;K.UpdateSecretVersionStageRequest$=LYe;K.UpdateSecretVersionStageResponse$=UYe;K.ValidateResourcePolicy$=m7e;K.ValidateResourcePolicyCommand=PG;K.ValidateResourcePolicyRequest$=FYe;K.ValidateResourcePolicyResponse$=MYe;K.ValidationErrorsEntry$=qYe;K.paginateBatchGetSecretValue=Mkr;K.paginateListSecretVersionIds=Bkr;K.paginateListSecrets=qkr});var N7e=O((Ean,mNr)=>{mNr.exports={name:"@btc-embedded/cdk-extensions",description:"A collection of useful CDK extensions and common logic",repository:{type:"git",url:"https://github.com/btc-embedded/cdk-extensions.git"},bin:{catnip:"assets/cli/catnip.js"},scripts:{build:"npx projen build",bump:"npx projen bump",bundle:"npx projen bundle","bundle:cli/catnip":"npx projen bundle:cli/catnip","bundle:constructs/api-keys/lambdas/api-client-authorization.lambda":"npx projen bundle:constructs/api-keys/lambdas/api-client-authorization.lambda","bundle:constructs/api-keys/lambdas/api-client-authorization.lambda:watch":"npx projen bundle:constructs/api-keys/lambdas/api-client-authorization.lambda:watch","bundle:constructs/api-keys/lambdas/api-key-creation.lambda":"npx projen bundle:constructs/api-keys/lambdas/api-key-creation.lambda","bundle:constructs/api-keys/lambdas/api-key-creation.lambda:watch":"npx projen bundle:constructs/api-keys/lambdas/api-key-creation.lambda:watch","bundle:constructs/api-keys/lambdas/api-key-update.lambda":"npx projen bundle:constructs/api-keys/lambdas/api-key-update.lambda","bundle:constructs/api-keys/lambdas/api-key-update.lambda:watch":"npx projen bundle:constructs/api-keys/lambdas/api-key-update.lambda:watch","bundle:constructs/api-keys/lambdas/pre-token.lambda":"npx projen bundle:constructs/api-keys/lambdas/pre-token.lambda","bundle:constructs/api-keys/lambdas/pre-token.lambda:watch":"npx projen bundle:constructs/api-keys/lambdas/pre-token.lambda:watch","bundle:test/constructs/api-keys/integration/api-key-client-authorization-runner.lambda":"npx projen bundle:test/constructs/api-keys/integration/api-key-client-authorization-runner.lambda","bundle:test/constructs/api-keys/integration/api-key-client-authorization-runner.lambda:watch":"npx projen bundle:test/constructs/api-keys/integration/api-key-client-authorization-runner.lambda:watch","bundle:test/constructs/api-keys/integration/api-key-management-runner-unauthorized.lambda":"npx projen bundle:test/constructs/api-keys/integration/api-key-management-runner-unauthorized.lambda","bundle:test/constructs/api-keys/integration/api-key-management-runner-unauthorized.lambda:watch":"npx projen bundle:test/constructs/api-keys/integration/api-key-management-runner-unauthorized.lambda:watch","bundle:test/constructs/api-keys/integration/api-key-management-runner.lambda":"npx projen bundle:test/constructs/api-keys/integration/api-key-management-runner.lambda","bundle:test/constructs/api-keys/integration/api-key-management-runner.lambda:watch":"npx projen bundle:test/constructs/api-keys/integration/api-key-management-runner.lambda:watch","bundle:test/constructs/api-keys/integration/api-key-pre-token-handler-runner.lambda":"npx projen bundle:test/constructs/api-keys/integration/api-key-pre-token-handler-runner.lambda","bundle:test/constructs/api-keys/integration/api-key-pre-token-handler-runner.lambda:watch":"npx projen bundle:test/constructs/api-keys/integration/api-key-pre-token-handler-runner.lambda:watch",clobber:"npx projen clobber",compat:"npx projen compat",compile:"npx projen compile",default:"npx projen default",docgen:"npx projen docgen",eject:"npx projen eject",eslint:"npx projen eslint",integ:"npx projen integ","integ:update":"npx projen integ:update",package:"npx projen package","package-all":"npx projen package-all","package:js":"npx projen package:js","post-compile":"npx projen post-compile","post-upgrade":"npx projen post-upgrade","pre-compile":"npx projen pre-compile","publish:git":"npx projen publish:git",release:"npx projen release",test:"npx projen test","test:watch":"npx projen test:watch",unbump:"npx projen unbump","update-docs":"npx projen update-docs",upgrade:"npx projen upgrade",watch:"npx projen watch","yalc:watch":"npx projen yalc:watch",projen:"npx projen"},author:{name:"BTC Embedded Systems AG",url:"https://www.btc-embedded.com",organization:!0},devDependencies:{"@aws-cdk-containers/ecs-service-extensions":"2.0.1-alpha.535","@aws-cdk/integ-runner":"latest","@aws-cdk/integ-tests-alpha":"latest","@aws-sdk/client-cloudformation":"^3.993.0","@aws-sdk/client-cloudwatch-logs":"^3.993.0","@aws-sdk/client-ecs":"^3.993.0","@aws-sdk/credential-providers":"^3.993.0","@types/aws-api-gateway-client":"^0.3.3","@types/jest":"^30.0.0","@types/node":"^24.10.9","@types/url-template":"^3.0.0","@typescript-eslint/eslint-plugin":"^8","@typescript-eslint/parser":"^8","aws-api-gateway-client":"^0.3.7","aws-cdk-lib":"2.232.1","aws-sdk-client-mock":"^4.1.0","cdk-nag":"^2.37.55",commander:"^14.0.3","commit-and-tag-version":"^12",constructs:"10.0.5",esbuild:"^0.27.1",eslint:"^9","eslint-config-prettier":"^10.1.8","eslint-import-resolver-typescript":"^4.4.4","eslint-plugin-import":"^2.32.0","eslint-plugin-prettier":"^5.5.5",jest:"^30.2.0","jest-junit":"^16",jsii:"~5.9.0","jsii-diff":"^1.125.0","jsii-docgen":"^10.5.0","jsii-pacmak":"^1.125.0","jsii-rosetta":"~5.9.0",nodemon:"^3.1.11",prettier:"^3.8.0",projen:"^0.99.3","ts-jest":"^29.4.6","ts-node":"^10.9.2",typedoc:"^0.28.16","typedoc-plugin-markdown":"^4.9.0",typescript:"^5.9.3","url-template":"^3.1.1",yalc:"^1.0.0-pre.53"},peerDependencies:{"@aws-cdk-containers/ecs-service-extensions":">=2.0.1-alpha.535","aws-cdk-lib":"^2.232.1",constructs:"^10.0.5"},dependencies:{"@aws-lambda-powertools/logger":"^2.30.2","@aws-lambda-powertools/parameters":"^2.30.2","@aws-lambda-powertools/parser":"^2.30.2","@aws-sdk/client-cognito-identity-provider":"^3.965.0","@aws-sdk/client-dynamodb":"^3.948.0","@aws-sdk/client-secrets-manager":"^3.971.0","@aws-sdk/lib-dynamodb":"^3.948.0","@types/aws-lambda":"^8.10.159",yaml:"^2.8.2",zod:"~3"},bundledDependencies:["@aws-lambda-powertools/logger","@aws-lambda-powertools/parameters","@aws-lambda-powertools/parser","@aws-sdk/client-cognito-identity-provider","@aws-sdk/client-dynamodb","@aws-sdk/client-secrets-manager","@aws-sdk/lib-dynamodb","@types/aws-lambda","yaml","zod"],resolutions:{"@smithy/types":"^4.12.0"},keywords:["cdk"],main:"lib/index.js",license:"Apache-2.0",version:"0.22.11",jest:{coverageProvider:"v8",maxWorkers:4,testMatch:["<rootDir>/@(src|test)/**/*(*.)@(spec|test).ts?(x)","<rootDir>/@(src|test)/**/__tests__/**/*.ts?(x)","<rootDir>/@(projenrc)/**/*(*.)@(spec|test).ts?(x)","<rootDir>/@(projenrc)/**/__tests__/**/*.ts?(x)"],clearMocks:!0,collectCoverage:!0,coverageReporters:["json","lcov","clover","cobertura","text"],coverageDirectory:"coverage",coveragePathIgnorePatterns:["/node_modules/"],testPathIgnorePatterns:["/node_modules/"],watchPathIgnorePatterns:["/node_modules/"],reporters:["default",["jest-junit",{outputDirectory:"test-reports"}]],transform:{"^.+\\.[t]sx?$":["ts-jest",{tsconfig:"tsconfig.dev.json"}]}},types:"lib/index.d.ts",stability:"experimental",jsii:{outdir:"dist",targets:{},tsc:{outDir:"lib",rootDir:"src"},excludeTypescript:["src/cli/**"]},"//":'~~ Generated by projen. To modify, edit .projenrc.ts and run "npx projen".'}});var Bte=T(qte(),1),{program:TNr,createCommand:ANr,createArgument:PNr,createOption:vNr,CommanderError:bNr,InvalidArgumentError:INr,InvalidOptionArgumentError:DNr,Command:Gte,Argument:xNr,Option:wNr,Help:$Nr}=Bte.default;var tA=T(Ax()),Ey=T(Jw());var f7e=T(IK()),g7e=T(Ax()),h7e=T(OJ()),S7e=T(Jw()),y7e=T(Pte()),E7e=T(bW());function JT(t){let e=t.region??process.env.AWS_DEFAULT_REGION??process.env.AWS_REGION;return{...e&&{region:e},...t.profile&&{credentials:(0,E7e.fromIni)({profile:t.profile})}}}function Np(t){return new f7e.CloudFormationClient(JT(t))}function LG(t){return new S7e.ECSClient(JT(t))}function UG(t){return new g7e.CloudWatchLogsClient(JT(t))}function vte(t){return new h7e.CognitoIdentityProviderClient(JT(t))}function C7e(t){return new y7e.SecretsManagerClient(JT(t))}var Tc=T(IK());async function _7e(t,e){let r=await Wkr(t),n=`${e}:`;return Object.fromEntries(Object.entries(r).filter(([s])=>s.startsWith(n)))}async function yy(t,e,r){let n=[],s;do{let o=await t.send(new Tc.ListStackResourcesCommand({StackName:e,NextToken:s}));for(let i of o.StackResourceSummaries??[])i.ResourceType===r&&i.PhysicalResourceId&&n.push(i.PhysicalResourceId);s=o.NextToken}while(s);return n}async function Wkr(t){let e={},r;do{let n=await t.send(new Tc.ListExportsCommand({NextToken:r}));for(let s of n.Exports??[])s.Name&&s.Value&&(e[s.Name]=s.Value);r=n.NextToken}while(r);return e}async function R7e(t,e){try{let n=(await t.send(new Tc.DescribeStacksCommand({StackName:e}))).Stacks?.[0];return n?{status:n.StackStatus,statusReason:n.StackStatusReason,lastUpdated:n.LastUpdatedTime}:null}catch(r){if(r.name==="ValidationError"||r.message?.includes("does not exist"))return null;throw r}}async function T7e(t,e,r=10){return((await t.send(new Tc.DescribeStackEventsCommand({StackName:e}))).StackEvents||[]).slice(0,r)}async function A7e(t){let e=["CREATE_FAILED","ROLLBACK_COMPLETE","ROLLBACK_FAILED","DELETE_FAILED","UPDATE_ROLLBACK_COMPLETE","UPDATE_ROLLBACK_FAILED","IMPORT_ROLLBACK_COMPLETE","IMPORT_ROLLBACK_FAILED"],r=await t.send(new Tc.ListStacksCommand({StackStatusFilter:e}));return!r.StackSummaries||r.StackSummaries.length===0?null:r.StackSummaries.sort((s,o)=>{let i=s.LastUpdatedTime?.getTime()||0;return(o.LastUpdatedTime?.getTime()||0)-i})[0].StackName||null}var XT="\x1B[0m",FG="\x1B[1m",zkr="\x1B[2m",Kkr="\x1B[31m",Qkr="\x1B[36m";function ZT(t){let e=` \u{1F431} catnip \u2014 ${t} `,r=Math.max(e.length+2,44),n="\u2550".repeat(r);console.log(`${Qkr}${FG}\u2554${n}\u2557`),console.log(`\u2551${e.padEnd(r)}\u2551`),console.log(`\u255A${n}\u255D${XT}`)}function Ac(t){console.log(`
187
+ `),w5e=!0)),new qT.CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.",{logger:t.logger,tryNextLink:!0});return t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv"),mte.fromEnv(t)()},async e=>{t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");let{ssoStartUrl:r,ssoAccountId:n,ssoRegion:s,ssoRoleName:o,ssoSession:i}=t;if(!r&&!n&&!s&&!o&&!i)throw new qT.CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).",{logger:t.logger});let{fromSSO:a}=await Promise.resolve().then(()=>T(vee()));return a(t)(e)},async e=>{t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");let{fromIni:r}=await Promise.resolve().then(()=>T(D5e()));return r(t)(e)},async e=>{t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");let{fromProcess:r}=await Promise.resolve().then(()=>T(cte()));return r(t)(e)},async e=>{t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");let{fromTokenFile:r}=await Promise.resolve().then(()=>T(lte()));return r(t)(e)},async()=>(t.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider"),(await dwr(t))()),async()=>{throw new qT.CredentialsProviderError("Could not load credentials from any providers",{tryNextLink:!1,logger:t.logger})}],$5e),gwr=t=>t?.expiration!==void 0,$5e=t=>t?.expiration!==void 0&&t.expiration.getTime()-Date.now()<3e5;BB.credentialsTreatedAsExpired=$5e;BB.credentialsWillNeedRefresh=gwr;BB.defaultProvider=fwr});var J5e=O(HB=>{"use strict";Object.defineProperty(HB,"__esModule",{value:!0});HB.ruleSet=void 0;var K5e="required",fo="fn",go="argv",Nf="ref",Op="properties",kp="headers",k5e=!0,N5e="isSet",BT="booleanEquals",fy="error",Rc="endpoint",Yu="tree",GB="PartitionResult",fte="stringEquals",L5e={[K5e]:!1,type:"string"},U5e={[K5e]:!0,default:!1,type:"boolean"},F5e={[Nf]:"Endpoint"},Q5e={[fo]:BT,[go]:[{[Nf]:"UseFIPS"},!0]},Y5e={[fo]:BT,[go]:[{[Nf]:"UseDualStack"},!0]},$i={},M5e={[fo]:"getAttr",[go]:[{[Nf]:GB},"supportsFIPS"]},q5e={[fo]:BT,[go]:[!0,{[fo]:"getAttr",[go]:[{[Nf]:GB},"supportsDualStack"]}]},gte={[fo]:"getAttr",[go]:[{[Nf]:GB},"name"]},B5e={url:"https://secretsmanager-fips.{Region}.amazonaws.com",[Op]:{},[kp]:{}},G5e={url:"https://secretsmanager.{Region}.amazonaws.com",[Op]:{},[kp]:{}},H5e=[Q5e],V5e=[Y5e],j5e=[{[Nf]:"Region"}],W5e=[{[fo]:fte,[go]:["aws",gte]}],z5e=[{[fo]:fte,[go]:["aws-us-gov",gte]}],hwr={version:"1.0",parameters:{Region:L5e,UseDualStack:U5e,UseFIPS:U5e,Endpoint:L5e},rules:[{conditions:[{[fo]:N5e,[go]:[F5e]}],rules:[{conditions:H5e,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:fy},{conditions:V5e,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:fy},{endpoint:{url:F5e,[Op]:$i,[kp]:$i},type:Rc}],type:Yu},{conditions:[{[fo]:N5e,[go]:j5e}],rules:[{conditions:[{[fo]:"aws.partition",[go]:j5e,assign:GB}],rules:[{conditions:[Q5e,Y5e],rules:[{conditions:[{[fo]:BT,[go]:[k5e,M5e]},q5e],rules:[{conditions:W5e,endpoint:B5e,type:Rc},{conditions:z5e,endpoint:B5e,type:Rc},{endpoint:{url:"https://secretsmanager-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",[Op]:$i,[kp]:$i},type:Rc}],type:Yu},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:fy}],type:Yu},{conditions:H5e,rules:[{conditions:[{[fo]:BT,[go]:[M5e,k5e]}],rules:[{endpoint:{url:"https://secretsmanager-fips.{Region}.{PartitionResult#dnsSuffix}",[Op]:$i,[kp]:$i},type:Rc}],type:Yu},{error:"FIPS is enabled but this partition does not support FIPS",type:fy}],type:Yu},{conditions:V5e,rules:[{conditions:[q5e],rules:[{conditions:W5e,endpoint:G5e,type:Rc},{conditions:[{[fo]:fte,[go]:["aws-cn",gte]}],endpoint:{url:"https://secretsmanager.{Region}.amazonaws.com.cn",[Op]:$i,[kp]:$i},type:Rc},{conditions:z5e,endpoint:G5e,type:Rc},{endpoint:{url:"https://secretsmanager.{Region}.{PartitionResult#dualStackDnsSuffix}",[Op]:$i,[kp]:$i},type:Rc}],type:Yu},{error:"DualStack is enabled but this partition does not support DualStack",type:fy}],type:Yu},{endpoint:{url:"https://secretsmanager.{Region}.{PartitionResult#dnsSuffix}",[Op]:$i,[kp]:$i},type:Rc}],type:Yu}],type:Yu},{error:"Invalid Configuration: Missing Region",type:fy}]};HB.ruleSet=hwr});var X5e=O(VB=>{"use strict";Object.defineProperty(VB,"__esModule",{value:!0});VB.defaultEndpointResolver=void 0;var Swr=yf(),hte=Hn(),ywr=J5e(),Ewr=new hte.EndpointCache({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),Cwr=(t,e={})=>Ewr.get(t,()=>(0,hte.resolveEndpoint)(ywr.ruleSet,{endpointParams:t,logger:e.logger}));VB.defaultEndpointResolver=Cwr;hte.customEndpointFunctions.aws=Swr.awsEndpointFunctions});var tQe=O(jB=>{"use strict";Object.defineProperty(jB,"__esModule",{value:!0});jB.getRuntimeConfig=void 0;var _wr=(Un(),J(Sp)),Rwr=(Ef(),J(BZ)),Twr=lt(),Awr=Sn(),Z5e=De(),eQe=He(),Pwr=QZ(),vwr=X5e(),bwr=t=>({apiVersion:"2017-10-17",base64Decoder:t?.base64Decoder??Z5e.fromBase64,base64Encoder:t?.base64Encoder??Z5e.toBase64,disableHostPrefix:t?.disableHostPrefix??!1,endpointProvider:t?.endpointProvider??vwr.defaultEndpointResolver,extensions:t?.extensions??[],httpAuthSchemeProvider:t?.httpAuthSchemeProvider??Pwr.defaultSecretsManagerHttpAuthSchemeProvider,httpAuthSchemes:t?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new _wr.AwsSdkSigV4Signer}],logger:t?.logger??new Twr.NoOpLogger,protocol:t?.protocol??Rwr.AwsJson1_1Protocol,protocolSettings:t?.protocolSettings??{defaultNamespace:"com.amazonaws.secretsmanager",version:"2017-10-17",serviceTarget:"secretsmanager"},serviceId:t?.serviceId??"Secrets Manager",urlParser:t?.urlParser??Awr.parseUrl,utf8Decoder:t?.utf8Decoder??eQe.fromUtf8,utf8Encoder:t?.utf8Encoder??eQe.toUtf8});jB.getRuntimeConfig=bwr});var aQe=O(zB=>{"use strict";Object.defineProperty(zB,"__esModule",{value:!0});zB.getRuntimeConfig=void 0;var Iwr=(Cs(),J(Es)),Dwr=Iwr.__importDefault(dWe()),rQe=(Un(),J(Sp)),xwr=O5e(),nQe=ZS(),WB=At(),wwr=Co(),sQe=ca(),Lf=Jr(),oQe=_f(),iQe=lt(),$wr=Cn(),Owr=ey(),kwr=vs(),Nwr=tQe(),Lwr=t=>{(0,iQe.emitWarningIfUnsupportedVersion)(process.version);let e=(0,Owr.resolveDefaultsModeConfig)(t),r=()=>e().then(iQe.loadConfigsForDefaultMode),n=(0,Nwr.getRuntimeConfig)(t);(0,rQe.emitWarningIfUnsupportedVersion)(process.version);let s={profile:t?.profile,logger:n.logger};return{...n,...t,runtime:"node",defaultsMode:e,authSchemePreference:t?.authSchemePreference??(0,Lf.loadConfig)(rQe.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS,s),bodyLengthChecker:t?.bodyLengthChecker??$wr.calculateBodyLength,credentialDefaultProvider:t?.credentialDefaultProvider??xwr.defaultProvider,defaultUserAgentProvider:t?.defaultUserAgentProvider??(0,nQe.createDefaultUserAgentProvider)({serviceId:n.serviceId,clientVersion:Dwr.default.version}),maxAttempts:t?.maxAttempts??(0,Lf.loadConfig)(sQe.NODE_MAX_ATTEMPT_CONFIG_OPTIONS,t),region:t?.region??(0,Lf.loadConfig)(WB.NODE_REGION_CONFIG_OPTIONS,{...WB.NODE_REGION_CONFIG_FILE_OPTIONS,...s}),requestHandler:oQe.NodeHttpHandler.create(t?.requestHandler??r),retryMode:t?.retryMode??(0,Lf.loadConfig)({...sQe.NODE_RETRY_MODE_CONFIG_OPTIONS,default:async()=>(await r()).retryMode||kwr.DEFAULT_RETRY_MODE},t),sha256:t?.sha256??wwr.Hash.bind(null,"sha256"),streamCollector:t?.streamCollector??oQe.streamCollector,useDualstackEndpoint:t?.useDualstackEndpoint??(0,Lf.loadConfig)(WB.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS,s),useFipsEndpoint:t?.useFipsEndpoint??(0,Lf.loadConfig)(WB.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS,s),userAgentAppId:t?.userAgentAppId??(0,Lf.loadConfig)(nQe.NODE_APP_ID_CONFIG_OPTIONS,s)}};zB.getRuntimeConfig=Lwr});var Pte=O(K=>{"use strict";var cQe=bS(),Uwr=IS(),Fwr=DS(),uQe=Cf(),Mwr=At(),gy=(zs(),J(US)),ho=(bt(),J(gq)),qwr=yo(),Pr=hc(),lQe=ca(),kt=lt(),dQe=QZ(),Bwr=aQe(),pQe=Tf(),mQe=qe(),Gwr=t=>Object.assign(t,{useDualstackEndpoint:t.useDualstackEndpoint??!1,useFipsEndpoint:t.useFipsEndpoint??!1,defaultSigningName:"secretsmanager"}),$r={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}},Hwr=t=>{let e=t.httpAuthSchemes,r=t.httpAuthSchemeProvider,n=t.credentials;return{setHttpAuthScheme(s){let o=e.findIndex(i=>i.schemeId===s.schemeId);o===-1?e.push(s):e.splice(o,1,s)},httpAuthSchemes(){return e},setHttpAuthSchemeProvider(s){r=s},httpAuthSchemeProvider(){return r},setCredentials(s){n=s},credentials(){return n}}},Vwr=t=>({httpAuthSchemes:t.httpAuthSchemes(),httpAuthSchemeProvider:t.httpAuthSchemeProvider(),credentials:t.credentials()}),jwr=(t,e)=>{let r=Object.assign(pQe.getAwsRegionExtensionConfiguration(t),kt.getDefaultExtensionConfiguration(t),mQe.getHttpHandlerExtensionConfiguration(t),Hwr(t));return e.forEach(n=>n.configure(r)),Object.assign(t,pQe.resolveAwsRegionExtensionConfiguration(r),kt.resolveDefaultRuntimeConfig(r),mQe.resolveHttpHandlerRuntimeConfig(r),Vwr(r))},Uf=class extends kt.Client{config;constructor(...[e]){let r=Bwr.getRuntimeConfig(e||{});super(r),this.initConfig=r;let n=Gwr(r),s=uQe.resolveUserAgentConfig(n),o=lQe.resolveRetryConfig(s),i=Mwr.resolveRegionConfig(o),a=cQe.resolveHostHeaderConfig(i),c=Pr.resolveEndpointConfig(a),u=dQe.resolveHttpAuthSchemeConfig(c),f=jwr(u,e?.extensions||[]);this.config=f,this.middlewareStack.use(ho.getSchemaSerdePlugin(this.config)),this.middlewareStack.use(uQe.getUserAgentPlugin(this.config)),this.middlewareStack.use(lQe.getRetryPlugin(this.config)),this.middlewareStack.use(qwr.getContentLengthPlugin(this.config)),this.middlewareStack.use(cQe.getHostHeaderPlugin(this.config)),this.middlewareStack.use(Uwr.getLoggerPlugin(this.config)),this.middlewareStack.use(Fwr.getRecursionDetectionPlugin(this.config)),this.middlewareStack.use(gy.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:dQe.defaultSecretsManagerHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async m=>new gy.DefaultIdentityProviderConfig({"aws.auth#sigv4":m.credentials})})),this.middlewareStack.use(gy.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}},Ss=class t extends kt.ServiceException{constructor(e){super(e),Object.setPrototypeOf(this,t.prototype)}},KB=class t extends Ss{name="DecryptionFailure";$fault="client";Message;constructor(e){super({name:"DecryptionFailure",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},QB=class t extends Ss{name="InternalServiceError";$fault="server";Message;constructor(e){super({name:"InternalServiceError",$fault:"server",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},YB=class t extends Ss{name="InvalidNextTokenException";$fault="client";Message;constructor(e){super({name:"InvalidNextTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},JB=class t extends Ss{name="InvalidParameterException";$fault="client";Message;constructor(e){super({name:"InvalidParameterException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},XB=class t extends Ss{name="InvalidRequestException";$fault="client";Message;constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},ZB=class t extends Ss{name="ResourceNotFoundException";$fault="client";Message;constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},eG=class t extends Ss{name="EncryptionFailure";$fault="client";Message;constructor(e){super({name:"EncryptionFailure",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},tG=class t extends Ss{name="LimitExceededException";$fault="client";Message;constructor(e){super({name:"LimitExceededException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},rG=class t extends Ss{name="MalformedPolicyDocumentException";$fault="client";Message;constructor(e){super({name:"MalformedPolicyDocumentException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},nG=class t extends Ss{name="PreconditionNotMetException";$fault="client";Message;constructor(e){super({name:"PreconditionNotMetException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},sG=class t extends Ss{name="ResourceExistsException";$fault="client";Message;constructor(e){super({name:"ResourceExistsException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},oG=class t extends Ss{name="PublicPolicyException";$fault="client";Message;constructor(e){super({name:"PublicPolicyException",$fault:"client",...e}),Object.setPrototypeOf(this,t.prototype),this.Message=e.Message}},Wwr="AutomaticallyAfterDays",zwr="APIErrorListType",Kwr="APIErrorType",fn="ARN",fQe="AddReplicaRegions",Qwr="AddReplicaRegionListType",Ywr="BatchGetSecretValue",Jwr="BatchGetSecretValueRequest",Xwr="BatchGetSecretValueResponse",Zwr="BlockPublicPolicy",jT="CreatedDate",e$r="CheckName",t$r="CancelRotateSecret",r$r="CancelRotateSecretRequest",n$r="CancelRotateSecretResponse",bG="ClientRequestToken",s$r="CreateSecret",o$r="CreateSecretRequest",i$r="CreateSecretResponse",IG="Description",a$r="DeletionDate",gQe="DeletedDate",c$r="DecryptionFailure",u$r="DeleteResourcePolicy",l$r="DeleteResourcePolicyRequest",d$r="DeleteResourcePolicyResponse",p$r="DeleteSecret",m$r="DeleteSecretRequest",f$r="DeleteSecretResponse",g$r="DescribeSecretRequest",h$r="DescribeSecretResponse",S$r="DescribeSecret",y$r="Duration",E$r="Errors",C$r="ErrorCode",_$r="ExcludeCharacters",R$r="EncryptionFailure",T$r="ExcludeLowercase",A$r="ErrorMessage",P$r="ExcludeNumbers",v$r="ExcludePunctuation",Ste="ExternalSecretRotationMetadata",b$r="ExternalSecretRotationMetadataItem",I$r="ExternalSecretRotationMetadataType",yte="ExternalSecretRotationRoleArn",D$r="ExcludeUppercase",hQe="Filters",x$r="ForceDeleteWithoutRecovery",w$r="FiltersListType",SQe="ForceOverwriteReplicaSecret",$$r="Filter",O$r="GetRandomPassword",k$r="GetRandomPasswordRequest",N$r="GetRandomPasswordResponse",L$r="GetResourcePolicyRequest",U$r="GetResourcePolicyResponse",F$r="GetResourcePolicy",M$r="GetSecretValue",q$r="GetSecretValueRequest",B$r="GetSecretValueResponse",G$r="IncludeDeprecated",H$r="InvalidNextTokenException",V$r="IncludePlannedDeletion",j$r="InvalidParameterException",W$r="InvalidRequestException",z$r="IncludeSpace",K$r="InternalServiceError",Ete="Key",hy="KmsKeyId",Q$r="KmsKeyIds",DG="LastAccessedDate",yQe="LastChangedDate",Y$r="LimitExceededException",EQe="LastRotatedDate",J$r="ListSecrets",X$r="ListSecretsRequest",Z$r="ListSecretsResponse",eOr="ListSecretVersionIds",tOr="ListSecretVersionIdsRequest",rOr="ListSecretVersionIdsResponse",qo="Message",nOr="MalformedPolicyDocumentException",Cte="MaxResults",sOr="MoveToVersionId",qn="Name",CQe="NextRotationDate",Sy="NextToken",_Qe="OwningService",oOr="PasswordLength",iOr="PreconditionNotMetException",aOr="PublicPolicyException",RQe="PrimaryRegion",cOr="PutResourcePolicy",uOr="PutResourcePolicyRequest",lOr="PutResourcePolicyResponse",dOr="PutSecretValue",pOr="PutSecretValueRequest",mOr="PutSecretValueResponse",fOr="PolicyValidationPassed",TQe="Region",AQe="RotationEnabled",gOr="ResourceExistsException",hOr="RequireEachIncludedType",SOr="RemoveFromVersionId",yOr="RotateImmediately",_te="RotationLambdaARN",EOr="ResourceNotFoundException",COr="RandomPassword",_Or="RandomPasswordType",Rte="ResourcePolicy",Tte="RotationRules",ROr="RemoveRegionsFromReplication",TOr="RemoveRegionsFromReplicationRequest",AOr="RemoveRegionsFromReplicationResponse",POr="RemoveReplicaRegions",vOr="ReplicaRegionType",bOr="RotationRulesType",xG="ReplicationStatus",IOr="ReplicationStatusListType",DOr="RestoreSecretRequest",xOr="RestoreSecretResponse",wOr="RotateSecretRequest",$Or="RotateSecretResponse",OOr="ReplicationStatusType",kOr="ReplicateSecretToRegions",NOr="ReplicateSecretToRegionsRequest",LOr="ReplicateSecretToRegionsResponse",UOr="RestoreSecret",FOr="RotateSecret",MOr="RotationToken",qOr="RotationTokenType",BOr="RecoveryWindowInDays",GOr="Status",WT="SecretBinary",HOr="SecretBinaryType",VOr="SortBy",jOr="ScheduleExpression",sn="SecretId",WOr="SecretIdList",zOr="SecretList",KOr="SecretListEntry",QOr="SecretListType",YOr="StatusMessage",JOr="SortOrder",XOr="StopReplicationToReplica",ZOr="StopReplicationToReplicaRequest",ekr="StopReplicationToReplicaResponse",zT="SecretString",tkr="SecretStringType",rkr="SecretValues",nkr="SecretValueEntry",skr="SecretVersionsListEntry",okr="SecretVersionsListType",ikr="SecretValuesType",akr="SecretVersionsToStages",PQe="SecretVersionsToStagesMapType",wG="Tags",ckr="TagKeys",ukr="TagListType",lkr="TagResource",dkr="TagResourceRequest",pkr="Tag",$G="Type",mkr="UntagResource",fkr="UntagResourceRequest",gkr="UpdateSecret",hkr="UpdateSecretRequest",Skr="UpdateSecretResponse",ykr="UpdateSecretVersionStage",Ekr="UpdateSecretVersionStageRequest",Ckr="UpdateSecretVersionStageResponse",vQe="Value",_kr="ValidationErrors",Rkr="ValidationErrorsEntry",Tkr="ValidationErrorsType",Ju="VersionId",Akr="VersionIdsToStages",Pkr="ValidateResourcePolicy",vkr="ValidateResourcePolicyRequest",bkr="ValidateResourcePolicyResponse",bQe="VersionStage",KT="VersionStages",Ikr="Values",Dkr="Versions",ga="client",Oi="error",xkr="server",IQe="smithy.ts.sdk.synthetic.com.amazonaws.secretsmanager",ee="com.amazonaws.secretsmanager",wkr=[0,ee,_Or,8,0],$kr=[0,ee,qOr,8,0],QT=[0,ee,HOr,8,21],YT=[0,ee,tkr,8,0],DQe=[3,ee,Kwr,0,[sn,C$r,qo],[0,0,0]],xQe=[3,ee,Jwr,0,[WOr,hQe,Cte,Sy],[64,()=>VYe,1,0]],wQe=[3,ee,Xwr,0,[rkr,Sy,E$r],[[()=>Nkr,0],0,()=>Okr]],$Qe=[3,ee,r$r,0,[sn],[0],1],OQe=[3,ee,n$r,0,[fn,qn,Ju],[0,0,0]],kQe=[3,ee,o$r,0,[qn,bG,IG,hy,WT,zT,wG,fQe,SQe,$G],[0,[0,4],0,0,[()=>QT,0],[()=>YT,0],()=>NG,()=>HYe,2,0],1],NQe=[3,ee,i$r,0,[fn,qn,Ju,xG],[0,0,0,()=>kG]],LQe=[-3,ee,c$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(LQe,KB);var UQe=[3,ee,l$r,0,[sn],[0],1],FQe=[3,ee,d$r,0,[fn,qn],[0,0]],MQe=[3,ee,m$r,0,[sn,BOr,x$r],[0,1,2],1],qQe=[3,ee,f$r,0,[fn,qn,a$r],[0,0,4]],BQe=[3,ee,g$r,0,[sn],[0],1],GQe=[3,ee,h$r,0,[fn,qn,$G,IG,hy,AQe,_te,Tte,Ste,yte,EQe,yQe,DG,gQe,CQe,wG,Akr,_Qe,jT,RQe,xG],[0,0,0,0,0,2,0,()=>OG,()=>Ate,0,4,4,4,4,4,()=>NG,[2,ee,PQe,0,0,64],0,4,0,()=>kG]],HQe=[-3,ee,R$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(HQe,eG);var VQe=[3,ee,b$r,0,[Ete,vQe],[0,0]],jQe=[3,ee,$$r,0,[Ete,Ikr],[0,64]],WQe=[3,ee,k$r,0,[oOr,_$r,P$r,v$r,D$r,T$r,z$r,hOr],[1,0,2,2,2,2,2,2]],zQe=[3,ee,N$r,0,[COr],[[()=>wkr,0]]],KQe=[3,ee,L$r,0,[sn],[0],1],QQe=[3,ee,U$r,0,[fn,qn,Rte],[0,0,0]],YQe=[3,ee,q$r,0,[sn,Ju,bQe],[0,0,0],1],JQe=[3,ee,B$r,0,[fn,qn,Ju,WT,zT,KT,jT],[0,0,0,[()=>QT,0],[()=>YT,0],64,4]],XQe=[-3,ee,K$r,{[Oi]:xkr},[qo],[0]];ho.TypeRegistry.for(ee).registerError(XQe,QB);var ZQe=[-3,ee,H$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(ZQe,YB);var eYe=[-3,ee,j$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(eYe,JB);var tYe=[-3,ee,W$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(tYe,XB);var rYe=[-3,ee,Y$r,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(rYe,tG);var nYe=[3,ee,X$r,0,[V$r,Cte,Sy,hQe,JOr,VOr],[2,1,0,()=>VYe,0,0]],sYe=[3,ee,Z$r,0,[zOr,Sy],[()=>kkr,0]],oYe=[3,ee,tOr,0,[sn,Cte,Sy,G$r],[0,1,0,2],1],iYe=[3,ee,rOr,0,[Dkr,Sy,fn,qn],[()=>Lkr,0,0,0]],aYe=[-3,ee,nOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(aYe,rG);var cYe=[-3,ee,iOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(cYe,nG);var uYe=[-3,ee,aOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(uYe,oG);var lYe=[3,ee,uOr,0,[sn,Rte,Zwr],[0,0,2],2],dYe=[3,ee,lOr,0,[fn,qn],[0,0]],pYe=[3,ee,pOr,0,[sn,bG,WT,zT,KT,MOr],[0,[0,4],[()=>QT,0],[()=>YT,0],64,[()=>$kr,0]],1],mYe=[3,ee,mOr,0,[fn,qn,Ju,KT],[0,0,0,64]],fYe=[3,ee,TOr,0,[sn,POr],[0,64],2],gYe=[3,ee,AOr,0,[fn,xG],[0,()=>kG]],hYe=[3,ee,vOr,0,[TQe,hy],[0,0]],SYe=[3,ee,NOr,0,[sn,fQe,SQe],[0,()=>HYe,2],2],yYe=[3,ee,LOr,0,[fn,xG],[0,()=>kG]],EYe=[3,ee,OOr,0,[TQe,hy,GOr,YOr,DG],[0,0,0,0,4]],CYe=[-3,ee,gOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(CYe,sG);var _Ye=[-3,ee,EOr,{[Oi]:ga},[qo],[0]];ho.TypeRegistry.for(ee).registerError(_Ye,ZB);var RYe=[3,ee,DOr,0,[sn],[0],1],TYe=[3,ee,xOr,0,[fn,qn],[0,0]],AYe=[3,ee,wOr,0,[sn,bG,_te,Tte,Ste,yte,yOr],[0,[0,4],0,()=>OG,()=>Ate,0,2],1],PYe=[3,ee,$Or,0,[fn,qn,Ju],[0,0,0]],OG=[3,ee,bOr,0,[Wwr,y$r,jOr],[1,0,0]],vYe=[3,ee,KOr,0,[fn,qn,$G,IG,hy,AQe,_te,Tte,Ste,yte,EQe,yQe,DG,gQe,CQe,wG,akr,_Qe,jT,RQe],[0,0,0,0,0,2,0,()=>OG,()=>Ate,0,4,4,4,4,4,()=>NG,[2,ee,PQe,0,0,64],0,4,0]],bYe=[3,ee,nkr,0,[fn,qn,Ju,WT,zT,KT,jT],[0,0,0,[()=>QT,0],[()=>YT,0],64,4]],IYe=[3,ee,skr,0,[Ju,KT,DG,jT,Q$r],[0,64,4,4,64]],DYe=[3,ee,ZOr,0,[sn],[0],1],xYe=[3,ee,ekr,0,[fn],[0]],wYe=[3,ee,pkr,0,[Ete,vQe],[0,0]],$Ye=[3,ee,dkr,0,[sn,wG],[0,()=>NG],2],OYe=[3,ee,fkr,0,[sn,ckr],[0,64],2],kYe=[3,ee,hkr,0,[sn,bG,IG,hy,WT,zT,$G],[0,[0,4],0,0,[()=>QT,0],[()=>YT,0],0],1],NYe=[3,ee,Skr,0,[fn,qn,Ju],[0,0,0]],LYe=[3,ee,Ekr,0,[sn,bQe,SOr,sOr],[0,0,0,0],2],UYe=[3,ee,Ckr,0,[fn,qn],[0,0]],FYe=[3,ee,vkr,0,[Rte,sn],[0,0],1],MYe=[3,ee,bkr,0,[fOr,_kr],[2,()=>Ukr]],qYe=[3,ee,Rkr,0,[e$r,A$r],[0,0]],BYe="unit",GYe=[-3,IQe,"SecretsManagerServiceException",0,[],[]];ho.TypeRegistry.for(IQe).registerError(GYe,Ss);var HYe=[1,ee,Qwr,0,()=>hYe],Okr=[1,ee,zwr,0,()=>DQe],Ate=[1,ee,I$r,0,()=>VQe],VYe=[1,ee,w$r,0,()=>jQe],kG=[1,ee,IOr,0,()=>EYe],kkr=[1,ee,QOr,0,()=>vYe],Nkr=[1,ee,ikr,0,[()=>bYe,0]],Lkr=[1,ee,okr,0,()=>IYe],NG=[1,ee,ukr,0,()=>wYe],Ukr=[1,ee,Tkr,0,()=>qYe],jYe=[9,ee,Ywr,0,()=>xQe,()=>wQe],WYe=[9,ee,t$r,0,()=>$Qe,()=>OQe],zYe=[9,ee,s$r,0,()=>kQe,()=>NQe],KYe=[9,ee,u$r,0,()=>UQe,()=>FQe],QYe=[9,ee,p$r,0,()=>MQe,()=>qQe],YYe=[9,ee,S$r,0,()=>BQe,()=>GQe],JYe=[9,ee,O$r,0,()=>WQe,()=>zQe],XYe=[9,ee,F$r,0,()=>KQe,()=>QQe],ZYe=[9,ee,M$r,0,()=>YQe,()=>JQe],e7e=[9,ee,J$r,0,()=>nYe,()=>sYe],t7e=[9,ee,eOr,0,()=>oYe,()=>iYe],r7e=[9,ee,cOr,0,()=>lYe,()=>dYe],n7e=[9,ee,dOr,0,()=>pYe,()=>mYe],s7e=[9,ee,ROr,0,()=>fYe,()=>gYe],o7e=[9,ee,kOr,0,()=>SYe,()=>yYe],i7e=[9,ee,UOr,0,()=>RYe,()=>TYe],a7e=[9,ee,FOr,0,()=>AYe,()=>PYe],c7e=[9,ee,XOr,0,()=>DYe,()=>xYe],u7e=[9,ee,lkr,0,()=>$Ye,()=>BYe],l7e=[9,ee,mkr,0,()=>OYe,()=>BYe],d7e=[9,ee,gkr,0,()=>kYe,()=>NYe],p7e=[9,ee,ykr,0,()=>LYe,()=>UYe],m7e=[9,ee,Pkr,0,()=>FYe,()=>MYe],GT=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","BatchGetSecretValue",{}).n("SecretsManagerClient","BatchGetSecretValueCommand").sc(jYe).build(){},iG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","CancelRotateSecret",{}).n("SecretsManagerClient","CancelRotateSecretCommand").sc(WYe).build(){},aG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","CreateSecret",{}).n("SecretsManagerClient","CreateSecretCommand").sc(zYe).build(){},cG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","DeleteResourcePolicy",{}).n("SecretsManagerClient","DeleteResourcePolicyCommand").sc(KYe).build(){},uG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","DeleteSecret",{}).n("SecretsManagerClient","DeleteSecretCommand").sc(QYe).build(){},lG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","DescribeSecret",{}).n("SecretsManagerClient","DescribeSecretCommand").sc(YYe).build(){},dG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","GetRandomPassword",{}).n("SecretsManagerClient","GetRandomPasswordCommand").sc(JYe).build(){},pG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","GetResourcePolicy",{}).n("SecretsManagerClient","GetResourcePolicyCommand").sc(XYe).build(){},mG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","GetSecretValue",{}).n("SecretsManagerClient","GetSecretValueCommand").sc(ZYe).build(){},HT=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","ListSecrets",{}).n("SecretsManagerClient","ListSecretsCommand").sc(e7e).build(){},VT=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","ListSecretVersionIds",{}).n("SecretsManagerClient","ListSecretVersionIdsCommand").sc(t7e).build(){},fG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","PutResourcePolicy",{}).n("SecretsManagerClient","PutResourcePolicyCommand").sc(r7e).build(){},gG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","PutSecretValue",{}).n("SecretsManagerClient","PutSecretValueCommand").sc(n7e).build(){},hG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","RemoveRegionsFromReplication",{}).n("SecretsManagerClient","RemoveRegionsFromReplicationCommand").sc(s7e).build(){},SG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","ReplicateSecretToRegions",{}).n("SecretsManagerClient","ReplicateSecretToRegionsCommand").sc(o7e).build(){},yG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","RestoreSecret",{}).n("SecretsManagerClient","RestoreSecretCommand").sc(i7e).build(){},EG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","RotateSecret",{}).n("SecretsManagerClient","RotateSecretCommand").sc(a7e).build(){},CG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","StopReplicationToReplica",{}).n("SecretsManagerClient","StopReplicationToReplicaCommand").sc(c7e).build(){},_G=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","TagResource",{}).n("SecretsManagerClient","TagResourceCommand").sc(u7e).build(){},RG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","UntagResource",{}).n("SecretsManagerClient","UntagResourceCommand").sc(l7e).build(){},TG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","UpdateSecret",{}).n("SecretsManagerClient","UpdateSecretCommand").sc(d7e).build(){},AG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","UpdateSecretVersionStage",{}).n("SecretsManagerClient","UpdateSecretVersionStageCommand").sc(p7e).build(){},PG=class extends kt.Command.classBuilder().ep($r).m(function(e,r,n,s){return[Pr.getEndpointPlugin(n,e.getEndpointParameterInstructions())]}).s("secretsmanager","ValidateResourcePolicy",{}).n("SecretsManagerClient","ValidateResourcePolicyCommand").sc(m7e).build(){},Fkr={BatchGetSecretValueCommand:GT,CancelRotateSecretCommand:iG,CreateSecretCommand:aG,DeleteResourcePolicyCommand:cG,DeleteSecretCommand:uG,DescribeSecretCommand:lG,GetRandomPasswordCommand:dG,GetResourcePolicyCommand:pG,GetSecretValueCommand:mG,ListSecretsCommand:HT,ListSecretVersionIdsCommand:VT,PutResourcePolicyCommand:fG,PutSecretValueCommand:gG,RemoveRegionsFromReplicationCommand:hG,ReplicateSecretToRegionsCommand:SG,RestoreSecretCommand:yG,RotateSecretCommand:EG,StopReplicationToReplicaCommand:CG,TagResourceCommand:_G,UntagResourceCommand:RG,UpdateSecretCommand:TG,UpdateSecretVersionStageCommand:AG,ValidateResourcePolicyCommand:PG},vG=class extends Uf{};kt.createAggregatedClient(Fkr,vG);var Mkr=gy.createPaginator(Uf,GT,"NextToken","NextToken","MaxResults"),qkr=gy.createPaginator(Uf,HT,"NextToken","NextToken","MaxResults"),Bkr=gy.createPaginator(Uf,VT,"NextToken","NextToken","MaxResults"),Gkr={all:"all",description:"description",name:"name",owning_service:"owning-service",primary_region:"primary-region",tag_key:"tag-key",tag_value:"tag-value"},Hkr={Failed:"Failed",InProgress:"InProgress",InSync:"InSync"},Vkr={created_date:"created-date",last_accessed_date:"last-accessed-date",last_changed_date:"last-changed-date",name:"name"},jkr={asc:"asc",desc:"desc"};Object.defineProperty(K,"$Command",{enumerable:!0,get:function(){return kt.Command}});Object.defineProperty(K,"__Client",{enumerable:!0,get:function(){return kt.Client}});K.APIErrorType$=DQe;K.BatchGetSecretValue$=jYe;K.BatchGetSecretValueCommand=GT;K.BatchGetSecretValueRequest$=xQe;K.BatchGetSecretValueResponse$=wQe;K.CancelRotateSecret$=WYe;K.CancelRotateSecretCommand=iG;K.CancelRotateSecretRequest$=$Qe;K.CancelRotateSecretResponse$=OQe;K.CreateSecret$=zYe;K.CreateSecretCommand=aG;K.CreateSecretRequest$=kQe;K.CreateSecretResponse$=NQe;K.DecryptionFailure=KB;K.DecryptionFailure$=LQe;K.DeleteResourcePolicy$=KYe;K.DeleteResourcePolicyCommand=cG;K.DeleteResourcePolicyRequest$=UQe;K.DeleteResourcePolicyResponse$=FQe;K.DeleteSecret$=QYe;K.DeleteSecretCommand=uG;K.DeleteSecretRequest$=MQe;K.DeleteSecretResponse$=qQe;K.DescribeSecret$=YYe;K.DescribeSecretCommand=lG;K.DescribeSecretRequest$=BQe;K.DescribeSecretResponse$=GQe;K.EncryptionFailure=eG;K.EncryptionFailure$=HQe;K.ExternalSecretRotationMetadataItem$=VQe;K.Filter$=jQe;K.FilterNameStringType=Gkr;K.GetRandomPassword$=JYe;K.GetRandomPasswordCommand=dG;K.GetRandomPasswordRequest$=WQe;K.GetRandomPasswordResponse$=zQe;K.GetResourcePolicy$=XYe;K.GetResourcePolicyCommand=pG;K.GetResourcePolicyRequest$=KQe;K.GetResourcePolicyResponse$=QQe;K.GetSecretValue$=ZYe;K.GetSecretValueCommand=mG;K.GetSecretValueRequest$=YQe;K.GetSecretValueResponse$=JQe;K.InternalServiceError=QB;K.InternalServiceError$=XQe;K.InvalidNextTokenException=YB;K.InvalidNextTokenException$=ZQe;K.InvalidParameterException=JB;K.InvalidParameterException$=eYe;K.InvalidRequestException=XB;K.InvalidRequestException$=tYe;K.LimitExceededException=tG;K.LimitExceededException$=rYe;K.ListSecretVersionIds$=t7e;K.ListSecretVersionIdsCommand=VT;K.ListSecretVersionIdsRequest$=oYe;K.ListSecretVersionIdsResponse$=iYe;K.ListSecrets$=e7e;K.ListSecretsCommand=HT;K.ListSecretsRequest$=nYe;K.ListSecretsResponse$=sYe;K.MalformedPolicyDocumentException=rG;K.MalformedPolicyDocumentException$=aYe;K.PreconditionNotMetException=nG;K.PreconditionNotMetException$=cYe;K.PublicPolicyException=oG;K.PublicPolicyException$=uYe;K.PutResourcePolicy$=r7e;K.PutResourcePolicyCommand=fG;K.PutResourcePolicyRequest$=lYe;K.PutResourcePolicyResponse$=dYe;K.PutSecretValue$=n7e;K.PutSecretValueCommand=gG;K.PutSecretValueRequest$=pYe;K.PutSecretValueResponse$=mYe;K.RemoveRegionsFromReplication$=s7e;K.RemoveRegionsFromReplicationCommand=hG;K.RemoveRegionsFromReplicationRequest$=fYe;K.RemoveRegionsFromReplicationResponse$=gYe;K.ReplicaRegionType$=hYe;K.ReplicateSecretToRegions$=o7e;K.ReplicateSecretToRegionsCommand=SG;K.ReplicateSecretToRegionsRequest$=SYe;K.ReplicateSecretToRegionsResponse$=yYe;K.ReplicationStatusType$=EYe;K.ResourceExistsException=sG;K.ResourceExistsException$=CYe;K.ResourceNotFoundException=ZB;K.ResourceNotFoundException$=_Ye;K.RestoreSecret$=i7e;K.RestoreSecretCommand=yG;K.RestoreSecretRequest$=RYe;K.RestoreSecretResponse$=TYe;K.RotateSecret$=a7e;K.RotateSecretCommand=EG;K.RotateSecretRequest$=AYe;K.RotateSecretResponse$=PYe;K.RotationRulesType$=OG;K.SecretListEntry$=vYe;K.SecretValueEntry$=bYe;K.SecretVersionsListEntry$=IYe;K.SecretsManager=vG;K.SecretsManagerClient=Uf;K.SecretsManagerServiceException=Ss;K.SecretsManagerServiceException$=GYe;K.SortByType=Vkr;K.SortOrderType=jkr;K.StatusType=Hkr;K.StopReplicationToReplica$=c7e;K.StopReplicationToReplicaCommand=CG;K.StopReplicationToReplicaRequest$=DYe;K.StopReplicationToReplicaResponse$=xYe;K.Tag$=wYe;K.TagResource$=u7e;K.TagResourceCommand=_G;K.TagResourceRequest$=$Ye;K.UntagResource$=l7e;K.UntagResourceCommand=RG;K.UntagResourceRequest$=OYe;K.UpdateSecret$=d7e;K.UpdateSecretCommand=TG;K.UpdateSecretRequest$=kYe;K.UpdateSecretResponse$=NYe;K.UpdateSecretVersionStage$=p7e;K.UpdateSecretVersionStageCommand=AG;K.UpdateSecretVersionStageRequest$=LYe;K.UpdateSecretVersionStageResponse$=UYe;K.ValidateResourcePolicy$=m7e;K.ValidateResourcePolicyCommand=PG;K.ValidateResourcePolicyRequest$=FYe;K.ValidateResourcePolicyResponse$=MYe;K.ValidationErrorsEntry$=qYe;K.paginateBatchGetSecretValue=Mkr;K.paginateListSecretVersionIds=Bkr;K.paginateListSecrets=qkr});var N7e=O((Ean,mNr)=>{mNr.exports={name:"@btc-embedded/cdk-extensions",description:"A collection of useful CDK extensions and common logic",repository:{type:"git",url:"https://github.com/btc-embedded/cdk-extensions.git"},bin:{catnip:"assets/cli/catnip.js"},scripts:{build:"npx projen build",bump:"npx projen bump",bundle:"npx projen bundle","bundle:cli/catnip":"npx projen bundle:cli/catnip","bundle:constructs/api-keys/lambdas/api-client-authorization.lambda":"npx projen bundle:constructs/api-keys/lambdas/api-client-authorization.lambda","bundle:constructs/api-keys/lambdas/api-client-authorization.lambda:watch":"npx projen bundle:constructs/api-keys/lambdas/api-client-authorization.lambda:watch","bundle:constructs/api-keys/lambdas/api-key-creation.lambda":"npx projen bundle:constructs/api-keys/lambdas/api-key-creation.lambda","bundle:constructs/api-keys/lambdas/api-key-creation.lambda:watch":"npx projen bundle:constructs/api-keys/lambdas/api-key-creation.lambda:watch","bundle:constructs/api-keys/lambdas/api-key-update.lambda":"npx projen bundle:constructs/api-keys/lambdas/api-key-update.lambda","bundle:constructs/api-keys/lambdas/api-key-update.lambda:watch":"npx projen bundle:constructs/api-keys/lambdas/api-key-update.lambda:watch","bundle:constructs/api-keys/lambdas/pre-token.lambda":"npx projen bundle:constructs/api-keys/lambdas/pre-token.lambda","bundle:constructs/api-keys/lambdas/pre-token.lambda:watch":"npx projen bundle:constructs/api-keys/lambdas/pre-token.lambda:watch","bundle:test/constructs/api-keys/integration/api-key-client-authorization-runner.lambda":"npx projen bundle:test/constructs/api-keys/integration/api-key-client-authorization-runner.lambda","bundle:test/constructs/api-keys/integration/api-key-client-authorization-runner.lambda:watch":"npx projen bundle:test/constructs/api-keys/integration/api-key-client-authorization-runner.lambda:watch","bundle:test/constructs/api-keys/integration/api-key-management-runner-unauthorized.lambda":"npx projen bundle:test/constructs/api-keys/integration/api-key-management-runner-unauthorized.lambda","bundle:test/constructs/api-keys/integration/api-key-management-runner-unauthorized.lambda:watch":"npx projen bundle:test/constructs/api-keys/integration/api-key-management-runner-unauthorized.lambda:watch","bundle:test/constructs/api-keys/integration/api-key-management-runner.lambda":"npx projen bundle:test/constructs/api-keys/integration/api-key-management-runner.lambda","bundle:test/constructs/api-keys/integration/api-key-management-runner.lambda:watch":"npx projen bundle:test/constructs/api-keys/integration/api-key-management-runner.lambda:watch","bundle:test/constructs/api-keys/integration/api-key-pre-token-handler-runner.lambda":"npx projen bundle:test/constructs/api-keys/integration/api-key-pre-token-handler-runner.lambda","bundle:test/constructs/api-keys/integration/api-key-pre-token-handler-runner.lambda:watch":"npx projen bundle:test/constructs/api-keys/integration/api-key-pre-token-handler-runner.lambda:watch",clobber:"npx projen clobber",compat:"npx projen compat",compile:"npx projen compile",default:"npx projen default",docgen:"npx projen docgen",eject:"npx projen eject",eslint:"npx projen eslint",integ:"npx projen integ","integ:update":"npx projen integ:update",package:"npx projen package","package-all":"npx projen package-all","package:js":"npx projen package:js","post-compile":"npx projen post-compile","post-upgrade":"npx projen post-upgrade","pre-compile":"npx projen pre-compile","publish:git":"npx projen publish:git",release:"npx projen release",test:"npx projen test","test:watch":"npx projen test:watch",unbump:"npx projen unbump","update-docs":"npx projen update-docs",upgrade:"npx projen upgrade",watch:"npx projen watch","yalc:watch":"npx projen yalc:watch",projen:"npx projen"},author:{name:"BTC Embedded Systems AG",url:"https://www.btc-embedded.com",organization:!0},devDependencies:{"@aws-cdk-containers/ecs-service-extensions":"2.0.1-alpha.535","@aws-cdk/integ-runner":"latest","@aws-cdk/integ-tests-alpha":"latest","@aws-sdk/client-cloudformation":"^3.993.0","@aws-sdk/client-cloudwatch-logs":"^3.993.0","@aws-sdk/client-ecs":"^3.993.0","@aws-sdk/credential-providers":"^3.993.0","@types/aws-api-gateway-client":"^0.3.3","@types/jest":"^30.0.0","@types/node":"^24.10.9","@types/url-template":"^3.0.0","@typescript-eslint/eslint-plugin":"^8","@typescript-eslint/parser":"^8","aws-api-gateway-client":"^0.3.7","aws-cdk-lib":"2.232.1","aws-sdk-client-mock":"^4.1.0","cdk-nag":"^2.37.55",commander:"^14.0.3","commit-and-tag-version":"^12",constructs:"10.0.5",esbuild:"^0.27.1",eslint:"^9","eslint-config-prettier":"^10.1.8","eslint-import-resolver-typescript":"^4.4.4","eslint-plugin-import":"^2.32.0","eslint-plugin-prettier":"^5.5.5",jest:"^30.2.0","jest-junit":"^16",jsii:"~5.9.0","jsii-diff":"^1.125.0","jsii-docgen":"^10.5.0","jsii-pacmak":"^1.125.0","jsii-rosetta":"~5.9.0",nodemon:"^3.1.11",prettier:"^3.8.0",projen:"^0.99.3","ts-jest":"^29.4.6","ts-node":"^10.9.2",typedoc:"^0.28.16","typedoc-plugin-markdown":"^4.9.0",typescript:"^5.9.3","url-template":"^3.1.1",yalc:"^1.0.0-pre.53"},peerDependencies:{"@aws-cdk-containers/ecs-service-extensions":">=2.0.1-alpha.535","aws-cdk-lib":"^2.232.1",constructs:"^10.0.5"},dependencies:{"@aws-lambda-powertools/logger":"^2.30.2","@aws-lambda-powertools/parameters":"^2.30.2","@aws-lambda-powertools/parser":"^2.30.2","@aws-sdk/client-cognito-identity-provider":"^3.965.0","@aws-sdk/client-dynamodb":"^3.948.0","@aws-sdk/client-secrets-manager":"^3.971.0","@aws-sdk/lib-dynamodb":"^3.948.0","@types/aws-lambda":"^8.10.159",yaml:"^2.8.2",zod:"~3"},bundledDependencies:["@aws-lambda-powertools/logger","@aws-lambda-powertools/parameters","@aws-lambda-powertools/parser","@aws-sdk/client-cognito-identity-provider","@aws-sdk/client-dynamodb","@aws-sdk/client-secrets-manager","@aws-sdk/lib-dynamodb","@types/aws-lambda","yaml","zod"],resolutions:{"@smithy/types":"^4.12.0"},keywords:["cdk"],main:"lib/index.js",license:"Apache-2.0",version:"0.22.12",jest:{coverageProvider:"v8",maxWorkers:4,testMatch:["<rootDir>/@(src|test)/**/*(*.)@(spec|test).ts?(x)","<rootDir>/@(src|test)/**/__tests__/**/*.ts?(x)","<rootDir>/@(projenrc)/**/*(*.)@(spec|test).ts?(x)","<rootDir>/@(projenrc)/**/__tests__/**/*.ts?(x)"],clearMocks:!0,collectCoverage:!0,coverageReporters:["json","lcov","clover","cobertura","text"],coverageDirectory:"coverage",coveragePathIgnorePatterns:["/node_modules/"],testPathIgnorePatterns:["/node_modules/"],watchPathIgnorePatterns:["/node_modules/"],reporters:["default",["jest-junit",{outputDirectory:"test-reports"}]],transform:{"^.+\\.[t]sx?$":["ts-jest",{tsconfig:"tsconfig.dev.json"}]}},types:"lib/index.d.ts",stability:"experimental",jsii:{outdir:"dist",targets:{},tsc:{outDir:"lib",rootDir:"src"},excludeTypescript:["src/cli/**"]},"//":'~~ Generated by projen. To modify, edit .projenrc.ts and run "npx projen".'}});var Bte=T(qte(),1),{program:TNr,createCommand:ANr,createArgument:PNr,createOption:vNr,CommanderError:bNr,InvalidArgumentError:INr,InvalidOptionArgumentError:DNr,Command:Gte,Argument:xNr,Option:wNr,Help:$Nr}=Bte.default;var tA=T(Ax()),Ey=T(Jw());var f7e=T(IK()),g7e=T(Ax()),h7e=T(OJ()),S7e=T(Jw()),y7e=T(Pte()),E7e=T(bW());function JT(t){let e=t.region??process.env.AWS_DEFAULT_REGION??process.env.AWS_REGION;return{...e&&{region:e},...t.profile&&{credentials:(0,E7e.fromIni)({profile:t.profile})}}}function Np(t){return new f7e.CloudFormationClient(JT(t))}function LG(t){return new S7e.ECSClient(JT(t))}function UG(t){return new g7e.CloudWatchLogsClient(JT(t))}function vte(t){return new h7e.CognitoIdentityProviderClient(JT(t))}function C7e(t){return new y7e.SecretsManagerClient(JT(t))}var Tc=T(IK());async function _7e(t,e){let r=await Wkr(t),n=`${e}:`;return Object.fromEntries(Object.entries(r).filter(([s])=>s.startsWith(n)))}async function yy(t,e,r){let n=[],s;do{let o=await t.send(new Tc.ListStackResourcesCommand({StackName:e,NextToken:s}));for(let i of o.StackResourceSummaries??[])i.ResourceType===r&&i.PhysicalResourceId&&n.push(i.PhysicalResourceId);s=o.NextToken}while(s);return n}async function Wkr(t){let e={},r;do{let n=await t.send(new Tc.ListExportsCommand({NextToken:r}));for(let s of n.Exports??[])s.Name&&s.Value&&(e[s.Name]=s.Value);r=n.NextToken}while(r);return e}async function R7e(t,e){try{let n=(await t.send(new Tc.DescribeStacksCommand({StackName:e}))).Stacks?.[0];return n?{status:n.StackStatus,statusReason:n.StackStatusReason,lastUpdated:n.LastUpdatedTime}:null}catch(r){if(r.name==="ValidationError"||r.message?.includes("does not exist"))return null;throw r}}async function T7e(t,e,r=10){return((await t.send(new Tc.DescribeStackEventsCommand({StackName:e}))).StackEvents||[]).slice(0,r)}async function A7e(t,e){let r=["CREATE_FAILED","ROLLBACK_COMPLETE","ROLLBACK_FAILED","DELETE_FAILED","UPDATE_ROLLBACK_COMPLETE","UPDATE_ROLLBACK_FAILED","IMPORT_ROLLBACK_COMPLETE","IMPORT_ROLLBACK_FAILED"],n=await t.send(new Tc.ListStacksCommand({StackStatusFilter:r}));if(!n.StackSummaries||n.StackSummaries.length===0)return null;let s=n.StackSummaries;return e&&(s=s.filter(i=>i.StackName?.toLowerCase().includes(e.toLowerCase())),s.length===0)?null:s.sort((i,a)=>{let c=i.LastUpdatedTime?.getTime()||0;return(a.LastUpdatedTime?.getTime()||0)-c})[0].StackName||null}var XT="\x1B[0m",FG="\x1B[1m",zkr="\x1B[2m",Kkr="\x1B[31m",Qkr="\x1B[36m";function ZT(t){let e=` \u{1F431} catnip \u2014 ${t} `,r=Math.max(e.length+2,44),n="\u2550".repeat(r);console.log(`${Qkr}${FG}\u2554${n}\u2557`),console.log(`\u2551${e.padEnd(r)}\u2551`),console.log(`\u255A${n}\u255D${XT}`)}function Ac(t){console.log(`
188
188
  ${FG}${t}${XT}`)}function Lp(t){process.stderr.write(`${Kkr}${FG}Error:${XT} ${t}
189
189
  `)}function bn(t){return`${zkr}${t}${XT}`}function Xu(t){return`${FG}${t}${XT}`}var Ff="\x1B[0m",Ykr="\x1B[1m",eA="\x1B[2m",P7e=["\x1B[32m","\x1B[33m","\x1B[34m","\x1B[35m","\x1B[36m"],Jkr={10:"TRACE",20:"DEBUG",30:"INFO",40:"WARN",50:"ERROR",60:"FATAL"},Xkr={TRACE:"\x1B[2m",DEBUG:"\x1B[36m",INFO:"\x1B[32m",WARN:"\x1B[33m",ERROR:"\x1B[31m",FATAL:"\x1B[35m"};function b7e(t){t.command("ecs-logs").description("Stream live logs from running ECS services in a CloudFormation stack").requiredOption("--stack-name <name>","CloudFormation stack name").option("--tail <n>","Lines of history to show per container on startup","100").option("-f, --follow","Keep polling for new log events (Ctrl+C to stop)").option("--service <name>","Show only services whose name contains this string").option("-o, --output <mode>","Output mode: text, raw, or pretty","text").action(async e=>{try{let r=parseInt(e.tail,10);if(isNaN(r)||r<1)throw new Error("--tail must be a positive integer");let n=e.output;if(!["text","raw","pretty"].includes(n))throw new Error("--output must be one of: text, raw, pretty");await Zkr({region:t.opts().region,profile:t.opts().profile,stackName:e.stackName,tail:r,follow:!!e.follow,service:e.service,output:n})}catch(r){Lp(r instanceof Error?r.message:String(r)),process.exit(1)}})}async function Zkr(t){let e={region:t.region,profile:t.profile},r=Np(e),n=LG(e),s=UG(e),o=t.region??process.env.AWS_DEFAULT_REGION??process.env.AWS_REGION??"default";ZT("ecs-logs"),console.log(`Stack: ${Xu(t.stackName)} | Region: ${bn(o)}`);let i=await yy(r,t.stackName,"AWS::ECS::Service");i.length===0&&(Lp(`No ECS services found in stack '${t.stackName}'.`),process.exit(1)),t.service&&(i=i.filter(u=>u.includes(t.service)),i.length===0&&(Lp(`No ECS services matching '${t.service}' found in stack '${t.stackName}'.`),process.exit(1))),t.output==="raw"&&i.length>1&&process.stderr.write(`Warning: Multiple services found. Lines from different services will be interleaved without attribution.
190
190
  `);let a=[];for(let u=0;u<i.length;u++){let f=i[u],m=P7e[u%P7e.length],h=f.split("/").pop()??f,S=tNr(f),b=(await n.send(new Ey.DescribeServicesCommand({...S&&{cluster:S},services:[f]}))).services?.[0];if(!b){process.stderr.write(`${eA}[${h}] Could not retrieve service details, skipping.${Ff}
@@ -195,5 +195,5 @@ ${FG}${t}${XT}`)}function Lp(t){process.stderr.write(`${Kkr}${FG}Error:${XT} ${t
195
195
  `);return}let i=r.timestamp,a=i?new Date(i).toISOString().replace("T"," ").replace(/\.\d+Z$/," UTC"):"",c=`${s}[${t}/${e}]${Ff}`;if(n==="pretty"){try{let u=JSON.parse(o),f=eNr(c,u,i);process.stdout.write(f+`
196
196
  `);return}catch{}console.log(`${c} ${o.trimEnd()}`);return}console.log(`${c} ${eA}[${a}]${Ff} ${o.trimEnd()}`)}function eNr(t,e,r){let n=typeof e.level=="number"?e.level:30,s=Jkr[n]??String(n),o=Xkr[s]??"",a=(typeof e.time=="number"?e.time:void 0)??r,c=a?new Date(a).toISOString().slice(11,19):"",u=typeof e.msg=="string"?e.msg:"",f=e.req,m=e.res,h="";f&&typeof f.method=="string"&&typeof f.url=="string"&&(h=`${f.method} ${f.url}`,m&&m.statusCode!==void 0&&(h+=` \u2192 ${m.statusCode}`));let S=e.err,C=S&&typeof S.message=="string"?`: ${S.message}`:"",b=[u,h].filter(Boolean).join(" ")+C,$=c?` ${eA}(${c})${Ff}`:"";return`${t} ${o}${Ykr}${s}${Ff} ${b}${$}`}function tNr(t){let e=t.split("/");return e.length>=3?e[e.length-2]:void 0}function rNr(t){return new Promise(e=>setTimeout(e,t))}var _y=T(OJ()),D7e=T(Pte());function I7e(t){return Array.isArray(t)}function bte(t){return t.replace(/([a-z])([A-Z])/g,"$1-$2").replace(/[\s_]+/g,"-").replace(/[^a-zA-Z0-9-]/g,"").toLowerCase()}function Cy(t,e){let{prefix:r,key:n,version:s}=e,o=I7e(r)?r:[r];return nNr(s,t,...o,n)}function nNr(t,...e){if(e.filter(s=>s.length>0).map((s,o)=>{if(o>0&&bte(s)!==s)throw new Error(`prefix '${s}' must be kebab-case (like '${bte(s)}')`);return s}).length<1)throw new Error("key must consist of at least one non-empty prefix");let n=s=>t&&t>1&&s===Math.min(e.length,2)-1;return e.map((s,o)=>n(o)?`${s}-v${t}`:s).join(":")}var ha={userPoolId:t=>Cy(t,{prefix:"cognito",key:"user-pool-id",version:2}),appClientId:t=>Cy(t,{prefix:"cognito",key:"application-client-id",version:2}),apiClientId:t=>Cy(t,{prefix:"cognito",key:"api-client-id",version:2}),userPoolDomain:t=>Cy(t,{prefix:"cognito",key:"user-pool-domain",version:1}),appClientSecretArn:t=>Cy(t,{prefix:"cognito",key:"app-client-secret-arn",version:1})};function x7e(t){t.command("oidc-token").description("Fetch an OIDC access token from a Cognito user pool client discovered via CloudFormation exports").requiredOption("--stack-name <name>","CloudFormation stack that exported the Cognito resources").option("--client <api|app>","Which Cognito client to use: api (client credentials) or app (user password)","api").option("--username <user>","Username (required for --client app)").option("--password <pass>","Password (or set CATNIP_PASSWORD env var; required for --client app)").option("--output <token|json>","Output format: bare access token or full JSON response","token").action(async e=>{try{await sNr({region:t.opts().region,profile:t.opts().profile,stackName:e.stackName,client:e.client,username:e.username,password:e.password??process.env.CATNIP_PASSWORD,output:e.output})}catch(r){Lp(r instanceof Error?r.message:String(r)),process.exit(1)}})}async function sNr(t){let e={region:t.region,profile:t.profile},r=Np(e),n=await _7e(r,t.stackName),s=n[ha.userPoolId(t.stackName)],o=n[ha.userPoolDomain(t.stackName)];if(!s)throw new Error(`Could not find Cognito User Pool ID in stack '${t.stackName}'. Expected CF export: '${ha.userPoolId(t.stackName)}'`);if(!o)throw new Error(`Could not find Cognito User Pool Domain in stack '${t.stackName}'. Expected CF export: '${ha.userPoolDomain(t.stackName)}'`);t.client==="api"?await oNr(t,e,s,o,n):await iNr(t,e,s,o,n)}async function oNr(t,e,r,n,s){let o=s[ha.apiClientId(t.stackName)];if(!o)throw new Error(`Could not find API Client ID in stack '${t.stackName}'. Expected CF export: '${ha.apiClientId(t.stackName)}'`);let c=(await vte(e).send(new _y.DescribeUserPoolClientCommand({UserPoolId:r,ClientId:o}))).UserPoolClient?.ClientSecret;if(!c)throw new Error("Could not retrieve client secret from Cognito. Ensure the calling principal has cognito-idp:DescribeUserPoolClient permission.");let u=`https://${cNr(n,e)}/oauth2/token`,f=Buffer.from(`${o}:${c}`).toString("base64"),m=await fetch(u,{method:"POST",headers:{"Content-Type":"application/x-www-form-urlencoded",Authorization:`Basic ${f}`},body:"grant_type=client_credentials"});if(!m.ok){let S=await m.text();throw new Error(`Token endpoint returned ${m.status}: ${S}`)}let h=await m.json();w7e(h,"access_token",t.output)}async function iNr(t,e,r,n,s){if(!t.username)throw new Error("--username is required for --client app");if(!t.password)throw new Error("--password (or CATNIP_PASSWORD env var) is required for --client app");let o=s[ha.appClientId(t.stackName)],i=s[ha.appClientSecretArn(t.stackName)];if(!o)throw new Error(`Could not find App Client ID in stack '${t.stackName}'. Expected CF export: '${ha.appClientId(t.stackName)}'`);if(!i)throw new Error(`Could not find App Client Secret ARN in stack '${t.stackName}'. Expected CF export: '${ha.appClientSecretArn(t.stackName)}'`);let u=(await C7e(e).send(new D7e.GetSecretValueCommand({SecretId:i}))).SecretString;if(!u)throw new Error(`Could not read secret value from '${i}'`);let h=(await vte(e).send(new _y.InitiateAuthCommand({AuthFlow:_y.AuthFlowType.USER_PASSWORD_AUTH,ClientId:o,AuthParameters:{USERNAME:t.username,PASSWORD:t.password,SECRET_HASH:aNr(o,u,t.username)}}))).AuthenticationResult;if(!h)throw new Error("Authentication did not return a token (challenge may be required).");w7e({id_token:h.IdToken,access_token:h.AccessToken,refresh_token:h.RefreshToken,expires_in:h.ExpiresIn,token_type:h.TokenType},"id_token",t.output)}function w7e(t,e,r){if(r==="json")console.log(JSON.stringify(t,null,2));else{let n=t[e];if(!n)throw new Error(`No '${e}' found in token response.`);console.log(n)}}function aNr(t,e,r){return require("crypto").createHmac("sha256",e).update(r+t).digest("base64")}function cNr(t,e){if(t.includes(".amazoncognito.com"))return t;let r=e.region??process.env.AWS_DEFAULT_REGION??process.env.AWS_REGION??"us-east-1";return`${t}.auth.${r}.amazoncognito.com`}var MG=T(Ax()),Up=T(Jw());async function O7e(t,e,r,n){let s=Np({}),o=await yy(s,r,"AWS::ECS::Service");if(o.length===0)throw new Error(`No ECS services found in stack '${r}'.`);for(let i of o){let a=lNr(i),c=i.split("/").pop()??i;console.log(`
197
197
  ${"\u2500".repeat(64)}`),console.log(`Service: ${Xu(c)}${a?` | Cluster: ${bn(a)}`:""}`),console.log("\u2500".repeat(64));let f=(await t.send(new Up.DescribeServicesCommand({...a&&{cluster:a},services:[i]}))).services?.[0];if(!f){console.log(" Could not retrieve service details.");continue}let m=f.clusterArn??a;Ac("\u{1F4CB} SERVICE EVENTS (last 10)");let h=(f.events??[]).slice(0,10);if(h.length===0)console.log(" No events.");else for(let V of h){let W=V.createdAt?$7e(V.createdAt):"?";console.log(` ${bn(`[${W}]`)} ${V.message??""}`)}let S=(f.deployments??[]).find(V=>V.status==="PRIMARY"),C=S?.rolloutState==="FAILED"||S?.rolloutStateReason?.toLowerCase().includes("circuit breaker")===!0;Ac("\u26A0\uFE0F CIRCUIT BREAKER"),console.log(C?` ${Xu("TRIGGERED")}${S?.rolloutStateReason?`: ${S.rolloutStateReason}`:""}`:` Not triggered (rollout state: ${S?.rolloutState??"unknown"})`);let b=f.taskDefinition,$={};if(b){let V=await t.send(new Up.DescribeTaskDefinitionCommand({taskDefinition:b}));for(let W of V.taskDefinition?.containerDefinitions??[]){let te=W.logConfiguration?.options?.["awslogs-group"];W.name&&te&&W.logConfiguration?.logDriver==="awslogs"&&($[W.name]=te)}}Ac(`\u{1F534} STOPPED TASKS (${n.tasks} most recent)`);let U=((await t.send(new Up.ListTasksCommand({cluster:m,serviceName:i,desiredStatus:"STOPPED"}))).taskArns??[]).slice(0,n.tasks);if(U.length===0){console.log(" No stopped tasks found.");continue}let B=await t.send(new Up.DescribeTasksCommand({cluster:m,tasks:U}));for(let V of B.tasks??[]){let W=V.taskArn?.split("/").pop()??"unknown",te=V.stoppedAt?$7e(V.stoppedAt):"unknown";console.log(`
198
- Task ${bn(W.slice(0,12))}\u2026 \u2014 stopped ${te}`),V.stoppedReason&&console.log(` Reason: ${V.stoppedReason}`);for(let he of V.containers??[]){let j=he.exitCode!==void 0?`exit code: ${he.exitCode}`:"",Q=he.reason?` ${he.reason}`:"";console.log(` Container ${Xu(`'${he.name??"?"}'`)} ${j}${Q?` |${Q}`:""}`)}for(let he of V.containers??[]){let j=he.name??"unknown",Q=$[j];Q&&await uNr(e,Q,j,W,n.tail)}}}}async function uNr(t,e,r,n,s){Ac(`\u{1F4DC} LOGS \u2014 ${Xu(r)} ${bn(`[${e}]`)} (last ${s} lines)`);try{let i=((await t.send(new MG.DescribeLogStreamsCommand({logGroupName:e,orderBy:"LastEventTime",descending:!0,limit:50}))).logStreams??[]).find(u=>u.logStreamName?.includes(n));if(!i?.logStreamName){console.log(` ${bn("No log stream found for this task.")}`);return}let c=(await t.send(new MG.GetLogEventsCommand({logGroupName:e,logStreamName:i.logStreamName,limit:s,startFromHead:!1}))).events??[];if(c.length===0){console.log(` ${bn("No log events found.")}`);return}for(let u of c){let f=u.timestamp?bn(`[${new Date(u.timestamp).toISOString()}]`):"";console.log(` ${f} ${u.message?.trimEnd()??""}`)}}catch(o){console.log(` ${bn(`Could not fetch logs: ${o instanceof Error?o.message:String(o)}`)}`)}}function lNr(t){let e=t.split("/");return e.length>=3?e[e.length-2]:void 0}function $7e(t){return t.toISOString().replace("T"," ").replace(/\.\d+Z$/," UTC")}var dNr=["CREATE_COMPLETE","UPDATE_COMPLETE","IMPORT_COMPLETE"];function k7e(t){t.command("stack-diagnose").description("Diagnose CloudFormation stack deployment failures (auto-detects last failed stack if stack name omitted)").option("--stack-name <name>","CloudFormation stack name").option("--tail <n>","Number of log lines to show per container","100").option("--tasks <n>","Number of recent stopped tasks to inspect","5").action(async e=>{try{let r=parseInt(e.tail,10),n=parseInt(e.tasks,10);if(isNaN(r)||r<1)throw new Error("--tail must be a positive integer");if(isNaN(n)||n<1)throw new Error("--tasks must be a positive integer");await pNr({region:t.opts().region,profile:t.opts().profile,stackName:e.stackName,tail:r,tasks:n})}catch(r){Lp(r instanceof Error?r.message:String(r)),process.exit(1)}})}async function pNr(t){let e={region:t.region,profile:t.profile},r=Np(e),n=LG(e),s=UG(e),o=t.region??process.env.AWS_DEFAULT_REGION??process.env.AWS_REGION??"default",i=t.stackName;if(i)ZT("stack-diagnose");else{let f=await A7e(r);f||(console.log("\u2713 No failed stacks found in account"),process.exit(0)),i=f,ZT("stack-diagnose"),Ac(`\u2139\uFE0F Auto-detected failed stack: ${i}`),console.log(bn(` Use --stack-name to specify a different stack
198
+ Task ${bn(W.slice(0,12))}\u2026 \u2014 stopped ${te}`),V.stoppedReason&&console.log(` Reason: ${V.stoppedReason}`);for(let he of V.containers??[]){let j=he.exitCode!==void 0?`exit code: ${he.exitCode}`:"",Q=he.reason?` ${he.reason}`:"";console.log(` Container ${Xu(`'${he.name??"?"}'`)} ${j}${Q?` |${Q}`:""}`)}for(let he of V.containers??[]){let j=he.name??"unknown",Q=$[j];Q&&await uNr(e,Q,j,W,n.tail)}}}}async function uNr(t,e,r,n,s){Ac(`\u{1F4DC} LOGS \u2014 ${Xu(r)} ${bn(`[${e}]`)} (last ${s} lines)`);try{let i=((await t.send(new MG.DescribeLogStreamsCommand({logGroupName:e,orderBy:"LastEventTime",descending:!0,limit:50}))).logStreams??[]).find(u=>u.logStreamName?.includes(n));if(!i?.logStreamName){console.log(` ${bn("No log stream found for this task.")}`);return}let c=(await t.send(new MG.GetLogEventsCommand({logGroupName:e,logStreamName:i.logStreamName,limit:s,startFromHead:!1}))).events??[];if(c.length===0){console.log(` ${bn("No log events found.")}`);return}for(let u of c){let f=u.timestamp?bn(`[${new Date(u.timestamp).toISOString()}]`):"";console.log(` ${f} ${u.message?.trimEnd()??""}`)}}catch(o){console.log(` ${bn(`Could not fetch logs: ${o instanceof Error?o.message:String(o)}`)}`)}}function lNr(t){let e=t.split("/");return e.length>=3?e[e.length-2]:void 0}function $7e(t){return t.toISOString().replace("T"," ").replace(/\.\d+Z$/," UTC")}var dNr=["CREATE_COMPLETE","UPDATE_COMPLETE","IMPORT_COMPLETE"];function k7e(t){t.command("stack-diagnose").description("Diagnose CloudFormation stack deployment failures (auto-detects last failed stack if stack name omitted)").option("--stack-name <name>","CloudFormation stack name").option("--stage <name>","Filter stacks by stage name (e.g., 'prod', 'dev') - only used when auto-detecting").option("--tail <n>","Number of log lines to show per container","100").option("--tasks <n>","Number of recent stopped tasks to inspect","5").action(async e=>{try{let r=parseInt(e.tail,10),n=parseInt(e.tasks,10);if(isNaN(r)||r<1)throw new Error("--tail must be a positive integer");if(isNaN(n)||n<1)throw new Error("--tasks must be a positive integer");await pNr({region:t.opts().region,profile:t.opts().profile,stackName:e.stackName,stage:e.stage,tail:r,tasks:n})}catch(r){Lp(r instanceof Error?r.message:String(r)),process.exit(1)}})}async function pNr(t){let e={region:t.region,profile:t.profile},r=Np(e),n=LG(e),s=UG(e),o=t.region??process.env.AWS_DEFAULT_REGION??process.env.AWS_REGION??"default",i=t.stackName;if(i)ZT("stack-diagnose");else{let f=await A7e(r,t.stage);if(!f){let h=t.stage?`\u2713 No failed stacks found matching stage '${t.stage}'`:"\u2713 No failed stacks found in account";console.log(h),process.exit(0)}i=f,ZT("stack-diagnose");let m=t.stage?` (filtered by stage: ${t.stage})`:"";Ac(`\u2139\uFE0F Auto-detected failed stack: ${i}${m}`),console.log(bn(` Use --stack-name to specify a different stack
199
199
  `))}console.log(`Stack: ${Xu(i)} | Region: ${bn(o)}`);let a=await R7e(r,i);a||(console.log(`\u26A0\uFE0F Stack not found: ${i}`),process.exit(0)),dNr.includes(a.status||"")&&(console.log(`\u2713 Stack ${i} is healthy (${a.status})`),process.exit(0)),Ac("\u{1F4E6} Stack Status"),console.log(`Status: ${a.status} \u274C`),a.statusReason&&console.log(`Reason: ${a.statusReason}`),console.log("");let c=await T7e(r,i,10);if(c.length>0){Ac("\u{1F4DC} Recent CloudFormation Events");for(let f of c){let m=f.Timestamp?f.Timestamp.toISOString().replace("T"," ").substring(0,19):"",h=f.LogicalResourceId||"",S=f.ResourceStatus||"",C=f.ResourceStatusReason||"";console.log(`[${m}] ${h} | ${S}`),C&&C!==S&&console.log(bn(` \u2192 ${C}`))}console.log("")}(await yy(r,i,"AWS::ECS::Service")).length>0&&(Ac("\u{1F433} ECS Service Diagnostics"),await O7e(n,s,i,{tail:t.tail,tasks:t.tasks}))}var{version:fNr}=N7e(),qG=new Gte().name("catnip").description("\u{1F431} catnip \u2014 cloud toolkit by the CAT department (Cloud Architecture & Technologies)").version(fNr).option("--region <region>","AWS region (default: AWS_DEFAULT_REGION / AWS_REGION)").option("--profile <profile>","AWS named profile (for local use)");b7e(qG);x7e(qG);k7e(qG);qG.parse();
@@ -145,5 +145,5 @@ class EventPipe extends construct_1.Construct {
145
145
  }
146
146
  exports.EventPipe = EventPipe;
147
147
  _a = JSII_RTTI_SYMBOL_1;
148
- EventPipe[_a] = { fqn: "@btc-embedded/cdk-extensions.EventPipe", version: "0.22.11" };
148
+ EventPipe[_a] = { fqn: "@btc-embedded/cdk-extensions.EventPipe", version: "0.22.12" };
149
149
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"EventPipe.js","sourceRoot":"","sources":["../../src/constructs/EventPipe.ts"],"names":[],"mappings":";;;;;AAAA,6CAA0C;AAC1C,iDAA6D;AAE7D,qDAAgD;AAGhD,wDAAqD;AACrD,0CAA0C;AAC1C,wEAAuE;AAsCvE,IAAY,QAiBX;AAjBD,WAAY,QAAQ;IAClB;;OAEG;IACH,uBAAW,CAAA;IACX;;OAEG;IACH,2BAAe,CAAA;IACf;;OAEG;IACH,yBAAa,CAAA;IACb;;OAEG;IACH,2BAAe,CAAA;AACjB,CAAC,EAjBW,QAAQ,wBAAR,QAAQ,QAiBnB;AAED;;GAEG;AACH,IAAY,cAcX;AAdD,WAAY,cAAc;IACxB;;;;;OAKG;IACH,2EAAgB,CAAA;IAChB;;;;OAIG;IACH,yEAAe,CAAA;AACjB,CAAC,EAdW,cAAc,8BAAd,cAAc,QAczB;AA2FD;;GAEG;AACH,MAAa,SAAU,SAAQ,qBAAS;IAGtC,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAqB;QAC7D,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,kBAAkB,GACpB,cAAc,IAAI,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;QACzE,IAAI,4BAA4B,GAC9B,YAAY,IAAI,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;QAErE,IAAI,WAAW,GAAG,OAAO,IAAI,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;QAE3E,IAAI,SAAS,GAAG,WAAW,KAAK,SAAS,CAAC;QAE1C,IAAI,SAAS,GAAG,SAAS;YACvB,CAAC,CAAC,WAAY,CAAC,QAAQ;YACvB,CAAC,CAAC,kBAAmB,CAAC,eAAe,CAAC;QAExC,IAAI,YAAY,GAAG,SAAS,CAAC;QAC7B,IAAI,IAAA,6CAAsB,EAAC,EAAE,CAAC,EAAE,CAAC;YAC/B,yBAAW,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,OAAO,CAAC,GAAG,EAAE,4BAA4B,CAAC,CAAC;YAChE,YAAY,GAAG,SAAS,CAAC;QAC3B,CAAC;QAED,IAAI,CAAC,IAAI;YACP,KAAK,CAAC,IAAI;gBACV,IAAI,cAAI,CAAC,IAAI,EAAE,eAAe,EAAE;oBAC9B,SAAS,EAAE,IAAI,0BAAgB,CAAC,qBAAqB,CAAC;iBACvD,CAAC,CAAC;QAEL,IAAI,cAAc,GAAG,KAAK,CAAC,MAAM;YAC/B,CAAC,CAAC;gBACE,OAAO,EAAE;oBACP;wBACE,OAAO,EAAE,IAAI,CAAC,SAAS,CAAC;4BACtB,IAAI,EAAE;gCACJ,GAAG,KAAK,CAAC,MAAM;6BAChB;yBACF,CAAC;qBACH;iBACF;aACF;YACH,CAAC,CAAC,SAAS,CAAC;QAEd,IAAI,gBAAgB,GAAyC,EAAE,CAAC;QAChE,IAAI,WAAW,EAAE,CAAC;YAChB,gBAAgB,GAAG;gBACjB,kBAAkB,EAAE;oBAClB,cAAc,EAAE,SAAS;iBAC1B;aACF,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,gBAAgB,GAAG;gBACjB,kCAAkC,EAAE;oBAClC,cAAc,EAAE,4BAA4B,EAAE,cAAc;wBAC1D,CAAC,CAAC,cAAc,CAAC,4BAA4B,CAAC,cAAc,CAAC;wBAC7D,CAAC,CAAC,cAAc,CAAC,cAAc,CAAC,gBAAgB,CAAC;iBACpD;gBACD,GAAG,CAAC,4BAA4B,EAAE,aAAa,IAAI;oBACjD,aAAa,EAAE,IAAI,CAAC,SAAS,CAC3B,4BAA4B,CAAC,aAAa,CAC3C,CAAC,OAAO,CAAC,iBAAiB,EAAE,IAAI,CAAC;iBACnC,CAAC;aACH,CAAC;QACJ,CAAC;QAED,IAAI,gBAAgB,GAAG;YACrB,kBAAkB,EAAE;gBAClB,SAAS,EAAE,CAAC;aACb;YACD,GAAG,CAAC,cAAc,IAAI,EAAE,cAAc,EAAE,cAAc,EAAE,CAAC;SAC1D,CAAC;QAEF,MAAM,QAAQ,GAAG,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC;YACzC,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ;gBACf,IAAI,sBAAW,CAAC,IAAI,EAAE,mBAAmB,EAAE;oBACzC,OAAO,EAAE,YAAY;iBACtB,CAAC,CAAC;YACL,CAAC,CAAC,SAAS,CAAC;QAEd,MAAM,iBAAiB,GAAG,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC;YAClD,CAAC,CAAC;gBACE,gBAAgB,EAAE;oBAChB,4BAA4B,EAAE;wBAC5B,WAAW,EAAE,QAAS,CAAC,WAAW;qBACnC;oBACD,KAAK,EAAE,KAAK,CAAC,QAAQ;iBACtB;aACF;YACH,CAAC,CAAC,EAAE,CAAC;QAEP,IAAI,mBAAO,CAAC,IAAI,EAAE,WAAW,EAAE;YAC7B,GAAG,iBAAiB;YACpB,OAAO,EAAE,IAAI,CAAC,IAAI,CAAC,OAAO;YAC1B,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,QAAQ;YAC7B,MAAM,EAAE,SAAS;YACjB,gBAAgB,EAAE,gBAAgB;YAClC,gBAAgB,EAAE,gBAAgB;YAClC,YAAY,EAAE,YAAY;SAC3B,CAAC,CAAC;QAEH,KAAK,CAAC,MAAM,CAAC,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC7C,WAAW,EAAE,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC1C,kBAAkB,EAAE,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACnD,QAAQ,EAAE,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAClC,CAAC;IAEO,cAAc,CAAC,KAAqB;QAC1C,OAAO,KAAK,CAAC,QAAQ,KAAK,SAAS,IAAI,KAAK,CAAC,QAAQ,KAAK,QAAQ,CAAC,GAAG,CAAC;IACzE,CAAC;;AA9GH,8BA+GC","sourcesContent":["import { Annotations } from \"aws-cdk-lib\";\nimport { Role, ServicePrincipal } from \"aws-cdk-lib/aws-iam\";\nimport { ILogGroup } from \"aws-cdk-lib/aws-logs\";\nimport { CfnPipe } from \"aws-cdk-lib/aws-pipes\";\nimport { IQueue } from \"aws-cdk-lib/aws-sqs\";\nimport { IStateMachine } from \"aws-cdk-lib/aws-stepfunctions\";\nimport { Construct } from \"constructs/lib/construct\";\nimport { BTCLogGroup } from \"../platform\";\nimport { isDeactivatedConstruct } from \"../utils/deactivatedConstruct\";\n\n/**\n * Properties for pipe construction.\n */\nexport interface EventPipeProps {\n  /**\n   * The source SQS queue. No other source types are supported at the moment.\n   */\n  readonly source: IQueue;\n\n  /**\n   * The target SQS queue or target step function.\n   */\n  readonly target: TargetQueue | TargetStepFunction;\n\n  /**\n   * The role used by the event pipe. If omitted, a new role is created.\n   */\n  readonly role?: Role;\n\n  /**\n   * An optional filter for the pipe.\n   */\n  readonly filter?: PipeFilter;\n\n  /**\n   * Set the log level for the pipe. Creates a new log group, if enabled.\n   * Default: Disabled.\n   */\n  readonly logLevel?: LogLevel;\n\n  /**\n   * Use an existing log group. If none is given and logging is enabled, a new log group will be created.\n   */\n  readonly logGroup?: ILogGroup;\n}\n\nexport enum LogLevel {\n  /**\n   * Deactivate logging. No log group will be created.\n   */\n  OFF = \"OFF\",\n  /**\n   * Only log errors.\n   */\n  ERROR = \"ERROR\",\n  /**\n   * Log errors and informational messages.\n   */\n  INFO = \"INFO\",\n  /**\n   * Log very verbose.\n   */\n  TRACE = \"TRACE\",\n}\n\n/**\n * The invocation type of the step function.\n */\nexport enum InvocationType {\n  /**\n   * (default) - Invoke synchronously. For more information, see\n   * [StartSyncExecution](https://docs.aws.amazon.com/step-functions/latest/apireference/API_StartSyncExecution.html)\n   * in the *AWS Step Functions API Reference*.\n   * > `REQUEST_RESPONSE` is not supported for `STANDARD` state machine workflows.\n   */\n  REQUEST_RESPONSE,\n  /**\n   * Invoke asynchronously. For more information, see\n   * [StartExecution](https://docs.aws.amazon.com/step-functions/latest/apireference/API_StartExecution.html)\n   * in the *AWS Step Functions API Reference*.\n   */\n  FIRE_AND_FORGET,\n}\n\n/**\n * The input template.\n * Note that some values in the resulting code should not have quotes around the value, e.g. if an object\n * shall be added. To reflect this, add curly brackets around the value, e.g. `{{<$.body>}}`.\n */\nexport interface InputTemplate {\n  /**\n   * @jsii ignore\n   */\n  readonly [key: string]: string;\n}\n\n/**\n * SQS queue as pipe target.\n */\nexport interface TargetQueue {\n  readonly queue: IQueue;\n}\n\n/**\n * StepFunction as pipe target.\n */\nexport interface TargetStepFunction {\n  readonly stepFunction: IStateMachine;\n  readonly parameters?: TargetStepFunctionParameters;\n}\n\n/**\n * Parameters for a step function target.\n */\nexport interface TargetStepFunctionParameters {\n  readonly inputTemplate?: InputTemplate;\n  readonly invocationType?: InvocationType;\n}\n\n/**\n * Base type for filter rules. Not all available rules are currently implemented.\n */\nexport type FilterRule =\n  | PrefixFilterRule\n  | SuffixFilterRule\n  | AnythingButFilterRule\n  | FilterEqualsIgnoreCase;\n\n/**\n * Rule that a property has to start with a prefix.\n */\nexport interface PrefixFilterRule {\n  readonly prefix: string | FilterEqualsIgnoreCase;\n}\n\n/**\n * Rule that a property has to end with a suffix.\n */\nexport interface SuffixFilterRule {\n  readonly suffix: string | FilterEqualsIgnoreCase;\n}\n\n/**\n * Rule that allows all values except the given ones.\n */\nexport interface AnythingButFilterRule {\n  /**\n   * @jsii ignore\n   */\n  readonly \"anything-but\": string[] | FilterRule;\n}\n\n/**\n * Rule that matches a string, ignoring the case.\n */\nexport interface FilterEqualsIgnoreCase {\n  /**\n   * @jsii ignore\n   */\n  readonly \"equals-ignore-case\": string | string[];\n}\n\n/**\n * A filter for messages in the pipe.\n */\nexport interface PipeFilter {\n  /**\n   * The rules for each attribute of the body.\n   * @jsii ignore\n   */\n  readonly [key: string]: FilterRule[];\n}\n\n/**\n * A wrapper for the L1 event pipe with the ability to deactivate it within the stack.\n */\nexport class EventPipe extends Construct {\n  public readonly role: Role;\n\n  constructor(scope: Construct, id: string, props: EventPipeProps) {\n    super(scope, id);\n\n    let targetStepFunction =\n      \"stepFunction\" in props.target ? props.target.stepFunction : undefined;\n    let targetStepFunctionParameters =\n      \"parameters\" in props.target ? props.target.parameters : undefined;\n\n    let targetQueue = \"queue\" in props.target ? props.target.queue : undefined;\n\n    let sqsTarget = targetQueue !== undefined;\n\n    let targetArn = sqsTarget\n      ? targetQueue!.queueArn\n      : targetStepFunction!.stateMachineArn;\n\n    let desiredState = \"RUNNING\";\n    if (isDeactivatedConstruct(id)) {\n      Annotations.of(this).addInfo(`${id} is set do be deactivated.`);\n      desiredState = \"STOPPED\";\n    }\n\n    this.role =\n      props.role ||\n      new Role(this, \"EventPipeRole\", {\n        assumedBy: new ServicePrincipal(\"pipes.amazonaws.com\"),\n      });\n\n    let filterCriteria = props.filter\n      ? {\n          filters: [\n            {\n              pattern: JSON.stringify({\n                body: {\n                  ...props.filter,\n                },\n              }),\n            },\n          ],\n        }\n      : undefined;\n\n    let targetParameters: CfnPipe.PipeTargetParametersProperty = {};\n    if (targetQueue) {\n      targetParameters = {\n        sqsQueueParameters: {\n          messageGroupId: \"default\",\n        },\n      };\n    } else {\n      targetParameters = {\n        stepFunctionStateMachineParameters: {\n          invocationType: targetStepFunctionParameters?.invocationType\n            ? InvocationType[targetStepFunctionParameters.invocationType]\n            : InvocationType[InvocationType.REQUEST_RESPONSE],\n        },\n        ...(targetStepFunctionParameters?.inputTemplate && {\n          inputTemplate: JSON.stringify(\n            targetStepFunctionParameters.inputTemplate,\n          ).replace(/\"\\{\\{(.+?)\\}\\}\"/, \"$1\"),\n        }),\n      };\n    }\n\n    let sourceParameters = {\n      sqsQueueParameters: {\n        batchSize: 1,\n      },\n      ...(filterCriteria && { filterCriteria: filterCriteria }),\n    };\n\n    const logGroup = this.loggingEnabled(props)\n      ? (props.logGroup ??\n        new BTCLogGroup(this, \"EventPipeLogGroup\", {\n          logType: \"event-pipe\",\n        }))\n      : undefined;\n\n    const pipeConfiguration = this.loggingEnabled(props)\n      ? {\n          logConfiguration: {\n            cloudwatchLogsLogDestination: {\n              logGroupArn: logGroup!.logGroupArn,\n            },\n            level: props.logLevel,\n          },\n        }\n      : {};\n\n    new CfnPipe(this, \"EventPipe\", {\n      ...pipeConfiguration,\n      roleArn: this.role.roleArn,\n      source: props.source.queueArn,\n      target: targetArn,\n      sourceParameters: sourceParameters,\n      targetParameters: targetParameters,\n      desiredState: desiredState,\n    });\n\n    props.source.grantConsumeMessages(this.role);\n    targetQueue?.grantSendMessages(this.role);\n    targetStepFunction?.grantStartExecution(this.role);\n    logGroup?.grantWrite(this.role);\n  }\n\n  private loggingEnabled(props: EventPipeProps): boolean {\n    return props.logLevel !== undefined && props.logLevel !== LogLevel.OFF;\n  }\n}\n"]}
@@ -135,5 +135,5 @@ class ExportedService extends ExportedServiceBase {
135
135
  }
136
136
  exports.ExportedService = ExportedService;
137
137
  _a = JSII_RTTI_SYMBOL_1;
138
- ExportedService[_a] = { fqn: "@btc-embedded/cdk-extensions.ExportedService", version: "0.22.11" };
138
+ ExportedService[_a] = { fqn: "@btc-embedded/cdk-extensions.ExportedService", version: "0.22.12" };
139
139
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ExportedService.js","sourceRoot":"","sources":["../../src/constructs/ExportedService.ts"],"names":[],"mappings":";;;;;AACA,iDAK6B;AAC7B,2CAAuC;AACvC,oCAA0C;AAC1C,4CAA4C;AA8D5C;;;;;GAKG;AACH,MAAe,mBACb,SAAQ,sBAAS;IAQjB,YACE,KAAgB,EAChB,EAAU,EACV,WAAmB,EACnB,aAAqB,EACrB,IAAY,EACZ,aAA6B;QAE7B,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QAC/B,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;QACnC,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,aAAa,GAAG,aAAa,CAAC;IACrC,CAAC;IAED;;;;;;OAMG;IACI,MAAM;QACX,OAAO,UAAU,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,aAAa,IAAI,IAAI,CAAC,IAAI,GAAG,CAAC;IAC1E,CAAC;IAED;;;;;OAKG;IACH,IAAI,WAAW;QACb,OAAO,IAAI,CAAC,aAAa,CAAC,WAAW,CAAC;IACxC,CAAC;IAED;;;;;;;;OAQG;IACI,SAAS,CACd,OAAgB,EAChB,cAAsB,mCAAmC;QAEzD,IAAI,CAAC,aAAa,CAAC,WAAW,CAAC,SAAS,CACtC,OAAO,CAAC,UAAU,EAClB,cAAI,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,EACnB,WAAW,CACZ,CAAC;IACJ,CAAC;CACF;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,eAAgB,SAAQ,mBAAmB;IACtD;;;;;;;;;;;OAWG;IACI,MAAM,CAAC,cAAc,CAC1B,KAAgB,EAChB,EAAU,EACV,KAAmC;QAEnC,MAAM,qBAAqB,GAAG,IAAA,kBAAS,EAAC,KAAK,CAAC,WAAW,CAAC,CAAC;QAC3D,MAAM,eAAe,GAAG,eAAe,CAAC,qBAAqB,CAC3D,qBAAqB,CACtB,CAAC;QAEF,MAAM,eAAe,GAAG,eAAe,CAAC,sBAAsB,CAAC,MAAM,CACnE,KAAK,EACL,KAAK,CAAC,SAAS,CAChB,CAAC;QACF,MAAM,aAAa,GAAG,eAAe,CAAC,kBAAkB,CAAC,MAAM,CAC7D,KAAK,EACL,KAAK,CAAC,SAAS,CAChB,CAAC;QAEF,MAAM,aAAa,GAAG,uBAAa,CAAC,mBAAmB,CACrD,KAAK,EACL,uBAAuB,EACvB,eAAe,EACf,EAAE,gBAAgB,EAAE,IAAI,EAAE,CAC3B,CAAC;QAEF,MAAM,MAAO,SAAQ,mBAAmB;YACtC;gBACE,KAAK,CACH,KAAK,EACL,EAAE,EACF,qBAAqB,EACrB,aAAa,EACb,KAAK,CAAC,IAAI,EACV,aAAa,CACd,CAAC;YACJ,CAAC;SACF;QAED,OAAO,IAAI,MAAM,EAAE,CAAC;IACtB,CAAC;IACO,MAAM,CAAC,qBAAqB,CAAC,WAAmB;QACtD,OAAO;YACL,sBAAsB,EAAE,IAAI,sBAAc,CAAC;gBACzC,MAAM,EAAE,CAAC,kBAAkB,EAAE,WAAW,CAAC;gBACzC,GAAG,EAAE,mBAAmB;gBACxB,WAAW,EAAE,+CAA+C;aAC7D,CAAC;YACF,kBAAkB,EAAE,IAAI,sBAAc,CAAC;gBACrC,MAAM,EAAE,CAAC,kBAAkB,EAAE,WAAW,CAAC;gBACzC,GAAG,EAAE,WAAW;gBAChB,WAAW,EAAE,gDAAgD;aAC9D,CAAC;SACH,CAAC;IACJ,CAAC;IAMD,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA2B;QACnE,MAAM,qBAAqB,GAAG,IAAA,kBAAS,EAAC,KAAK,CAAC,WAAW,CAAC,CAAC;QAC3D,KAAK,CACH,KAAK,EACL,EAAE,EACF,qBAAqB,EACrB,KAAK,CAAC,aAAa,EACnB,CAAC,EAAE,2DAA2D;QAC9D,KAAK,CAAC,aAAa,CACpB,CAAC;QAEF,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC,qBAAqB,CAC1D,qBAAqB,CACtB,CAAC;QAEF,sDAAsD;QACtD,IAAI,CAAC,eAAe,CAAC,sBAAsB,CAAC,MAAM,CAChD,IAAI,EACJ,KAAK,CAAC,aAAa,CAAC,eAAe,CACpC,CAAC;QACF,IAAI,CAAC,eAAe,CAAC,kBAAkB,CAAC,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,aAAa,CAAC,CAAC;IAC5E,CAAC;;AA9FH,0CA+FC","sourcesContent":["import { Service } from \"@aws-cdk-containers/ecs-service-extensions\";\nimport {\n  IConnectable,\n  ISecurityGroup,\n  Port,\n  SecurityGroup,\n} from \"aws-cdk-lib/aws-ec2\";\nimport { Construct } from \"constructs\";\nimport { StackParameter } from \"../utils\";\nimport { kebabCase } from \"../utils/common\";\n\n/**\n * Options for importing an ExportedService from another stack.\n */\nexport interface ExportedServiceLookupOptions {\n  /**\n   * The name of the stack where the service was exported.\n   */\n  readonly stackName: string;\n\n  /**\n   * The name of the exported ECS service.\n   */\n  readonly serviceName: string;\n\n  /**\n   * The port on which the service is listening.\n   */\n  readonly port: number;\n}\n\n/**\n * Public interface for an ExportedService.\n */\nexport interface IExportedService extends IConnectable {\n  /**\n   * The security group of the exported ECS service.\n   */\n  readonly securityGroup: ISecurityGroup;\n\n  /**\n   * Get the internal API URL of the service.\n   */\n  apiUrl(): string;\n\n  /**\n   * Allow an ECS service to connect to this exported service.\n   */\n  allowFrom(service: Service, description?: string): void;\n}\n\n/**\n * Properties for creating a new ExportedService.\n */\nexport interface ExportedServiceProps {\n  /**\n   * The name of the ECS service being exported.\n   */\n  readonly serviceName: string;\n\n  /**\n   * The security group of the ECS service.\n   */\n  readonly securityGroup: ISecurityGroup;\n\n  /**\n   * The namespace name where the service is registered (CloudMap namespace).\n   */\n  readonly namespaceName: string;\n}\n\n/**\n * Base class for an ECS service that can be used across stack boundaries.\n *\n * This abstract class provides common functionality for working with exported\n * ECS services, including API URL generation and connection management.\n */\nabstract class ExportedServiceBase\n  extends Construct\n  implements IExportedService\n{\n  protected readonly serviceName: string;\n  protected readonly namespaceName: string;\n  protected readonly port: number;\n  public readonly securityGroup: ISecurityGroup;\n\n  constructor(\n    scope: Construct,\n    id: string,\n    serviceName: string,\n    namespaceName: string,\n    port: number,\n    securityGroup: ISecurityGroup,\n  ) {\n    super(scope, id);\n    this.serviceName = serviceName;\n    this.namespaceName = namespaceName;\n    this.port = port;\n    this.securityGroup = securityGroup;\n  }\n\n  /**\n   * Get the internal API URL of the service.\n   *\n   * The URL format is: http://<service-name>.<namespace>:<port>/\n   *\n   * @returns The internal API URL\n   */\n  public apiUrl(): string {\n    return `http://${this.serviceName}.${this.namespaceName}:${this.port}/`;\n  }\n\n  /**\n   * Get the connections object for this service.\n   *\n   * This allows the ExportedService to be used with the standard CDK IConnectable\n   * pattern for security group management.\n   */\n  get connections() {\n    return this.securityGroup.connections;\n  }\n\n  /**\n   * Allow an ECS service to connect to this exported service.\n   *\n   * This method adds a security group ingress rule allowing traffic from the\n   * given service to this exported service on its configured port.\n   *\n   * @param service - The ECS service to allow connections from\n   * @param description - Optional description for the security group rule\n   */\n  public allowFrom(\n    service: Service,\n    description: string = \"Allow connection from ECS service\",\n  ): void {\n    this.securityGroup.connections.allowFrom(\n      service.ecsService,\n      Port.tcp(this.port),\n      description,\n    );\n  }\n}\n\n/**\n * Represents an ECS service exported from another CDK stack.\n *\n * This construct enables cross-stack service connectivity by transporting service\n * metadata (security group ID and namespace) across stack boundaries using StackParameter.\n * The port must be specified when importing the service.\n *\n * On the provider side (where the service is defined), use ExportedService\n * within the CloudMapExtension to expose the service. On the consumer side,\n * use ExportedService.fromAttributes() to import the service with the port.\n *\n * @example\n * // Provider side\n * const exportedService = new ExportedService(this, \"ExportedService\", {\n *   serviceName: 'my-service',\n *   securityGroup: service.connections.securityGroups[0],\n *   namespaceName: 'my-namespace',\n * });\n *\n * @example\n * // Consumer side\n * const exportedService = ExportedService.fromAttributes(scope, id, {\n *   stackName: 'my-service-stack',\n *   serviceName: 'my-service',\n *   port: 8080,\n * });\n *\n * exportedService.allowFrom(myService);\n * const url = exportedService.apiUrl();\n */\nexport class ExportedService extends ExportedServiceBase {\n  /**\n   * Import an ExportedService from another stack.\n   *\n   * This method imports the service metadata (security group and namespace)\n   * that was exported by the provider stack and constructs an IExportedService\n   * instance that can be used for establishing connections.\n   *\n   * @param scope - The scope in which to define the construct\n   * @param id - The construct ID\n   * @param attrs - The exported service lookup options (stackName, serviceName, and port)\n   * @returns An IExportedService instance\n   */\n  public static fromAttributes(\n    scope: Construct,\n    id: string,\n    attrs: ExportedServiceLookupOptions,\n  ): IExportedService {\n    const normalizedServiceName = kebabCase(attrs.serviceName);\n    const stackParameters = ExportedService.createStackParameters(\n      normalizedServiceName,\n    );\n\n    const securityGroupId = stackParameters.securityGroupParameter.import(\n      scope,\n      attrs.stackName,\n    );\n    const namespaceName = stackParameters.namespaceParameter.import(\n      scope,\n      attrs.stackName,\n    );\n\n    const securityGroup = SecurityGroup.fromSecurityGroupId(\n      scope,\n      \"ImportedSecurityGroup\",\n      securityGroupId,\n      { allowAllOutbound: true },\n    );\n\n    class Import extends ExportedServiceBase {\n      constructor() {\n        super(\n          scope,\n          id,\n          normalizedServiceName,\n          namespaceName,\n          attrs.port,\n          securityGroup,\n        );\n      }\n    }\n\n    return new Import();\n  }\n  private static createStackParameters(serviceName: string) {\n    return {\n      securityGroupParameter: new StackParameter({\n        prefix: [\"exported-service\", serviceName],\n        key: \"security-group-id\",\n        description: \"Security Group ID of the exported ECS service\",\n      }),\n      namespaceParameter: new StackParameter({\n        prefix: [\"exported-service\", serviceName],\n        key: \"namespace\",\n        description: \"CloudMap namespace of the exported ECS service\",\n      }),\n    };\n  }\n\n  private readonly stackParameters: ReturnType<\n    typeof ExportedService.createStackParameters\n  >;\n\n  constructor(scope: Construct, id: string, props: ExportedServiceProps) {\n    const normalizedServiceName = kebabCase(props.serviceName);\n    super(\n      scope,\n      id,\n      normalizedServiceName,\n      props.namespaceName,\n      0, // Default port - actual port is specified on consumer side\n      props.securityGroup,\n    );\n\n    this.stackParameters = ExportedService.createStackParameters(\n      normalizedServiceName,\n    );\n\n    // Export service metadata for cross-stack consumption\n    this.stackParameters.securityGroupParameter.export(\n      this,\n      props.securityGroup.securityGroupId,\n    );\n    this.stackParameters.namespaceParameter.export(this, props.namespaceName);\n  }\n}\n"]}
@@ -35,5 +35,5 @@ class S3Bucket extends aws_s3_1.Bucket {
35
35
  }
36
36
  exports.S3Bucket = S3Bucket;
37
37
  _a = JSII_RTTI_SYMBOL_1;
38
- S3Bucket[_a] = { fqn: "@btc-embedded/cdk-extensions.S3Bucket", version: "0.22.11" };
38
+ S3Bucket[_a] = { fqn: "@btc-embedded/cdk-extensions.S3Bucket", version: "0.22.12" };
39
39
  //# sourceMappingURL=data:application/json;base64,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
@@ -55,5 +55,5 @@ class SecureRestApi extends construct_1.Construct {
55
55
  }
56
56
  exports.SecureRestApi = SecureRestApi;
57
57
  _a = JSII_RTTI_SYMBOL_1;
58
- SecureRestApi[_a] = { fqn: "@btc-embedded/cdk-extensions.SecureRestApi", version: "0.22.11" };
58
+ SecureRestApi[_a] = { fqn: "@btc-embedded/cdk-extensions.SecureRestApi", version: "0.22.12" };
59
59
  //# sourceMappingURL=data:application/json;base64,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
@@ -52,5 +52,5 @@ class SecureRestApiV2 extends construct_1.Construct {
52
52
  }
53
53
  exports.SecureRestApiV2 = SecureRestApiV2;
54
54
  _a = JSII_RTTI_SYMBOL_1;
55
- SecureRestApiV2[_a] = { fqn: "@btc-embedded/cdk-extensions.SecureRestApiV2", version: "0.22.11" };
55
+ SecureRestApiV2[_a] = { fqn: "@btc-embedded/cdk-extensions.SecureRestApiV2", version: "0.22.12" };
56
56
  //# sourceMappingURL=data:application/json;base64,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
@@ -52,5 +52,5 @@ class ApiKeyClientAuthorization extends constructs_1.Construct {
52
52
  }
53
53
  exports.ApiKeyClientAuthorization = ApiKeyClientAuthorization;
54
54
  _a = JSII_RTTI_SYMBOL_1;
55
- ApiKeyClientAuthorization[_a] = { fqn: "@btc-embedded/cdk-extensions.ApiKeyClientAuthorization", version: "0.22.11" };
55
+ ApiKeyClientAuthorization[_a] = { fqn: "@btc-embedded/cdk-extensions.ApiKeyClientAuthorization", version: "0.22.12" };
56
56
  //# sourceMappingURL=data:application/json;base64,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
@@ -210,5 +210,5 @@ class ApiKeyManagement extends constructs_1.Construct {
210
210
  }
211
211
  exports.ApiKeyManagement = ApiKeyManagement;
212
212
  _a = JSII_RTTI_SYMBOL_1;
213
- ApiKeyManagement[_a] = { fqn: "@btc-embedded/cdk-extensions.ApiKeyManagement", version: "0.22.11" };
213
+ ApiKeyManagement[_a] = { fqn: "@btc-embedded/cdk-extensions.ApiKeyManagement", version: "0.22.12" };
214
214
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"ApiKeyManagement.js","sourceRoot":"","sources":["../../../src/constructs/api-keys/ApiKeyManagement.ts"],"names":[],"mappings":";;;;;AAAA,+DAOoC;AAEpC,iDAO6B;AAC7B,2CAAuC;AAEvC,mFAA6E;AAC7E,+EAAyE;AAEzE,MAAM,eAAe,GAAG,SAAS,CAAC;AAYlC;;GAEG;AACH,MAAa,gBAAiB,SAAQ,sBAAS;IAK7C;;;;;OAKG;IACH,YAAY,KAAgB,EAAE,EAAU,EAAE,KAA4B;QACpE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,CAAC,UAAU,GAAG,KAAK,CAAC,OAAO,CAAC,UAAU,CAAC;QAE3C,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC,OAAO,CAAC,WAAW,CAAC;QAEvC,MAAM,OAAO,GAAG,IAAI,wBAAO,CAAC,IAAI,EAAE,eAAe,EAAE;YACjD,WAAW,EAAE,oBAAoB;YACjC,WAAW,EAAE,2BAA2B;YACxC,qBAAqB,EAAE;gBACrB,KAAK,EAAE,CAAC,6BAAY,CAAC,QAAQ,CAAC;aAC/B;SACF,CAAC,CAAC;QAEH,IAAI,CAAC,WAAW,GAAG,GAAG,OAAO,CAAC,GAAG,EAAE,CAAC;QACpC,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QAEvB,IAAI,CAAC,cAAc,EAAE,CAAC;IACxB,CAAC;IAED;;OAEG;IACH,IAAW,OAAO;QAChB,OAAO,IAAI,CAAC,WAAW,CAAC;IAC1B,CAAC;IAED;;OAEG;IACH,IAAW,kBAAkB;QAC3B,OAAO,eAAe,CAAC;IACzB,CAAC;IAED;;;OAGG;IACH,IAAW,iBAAiB;QAC1B,OAAO,IAAI,CAAC,kBAAkB,GAAG,OAAO,CAAC;IAC3C,CAAC;IAED;;;OAGG;IACI,eAAe,CAAC,IAAW;QAChC,MAAM,SAAS,GAAG,IAAI,yBAAe,EAAE,CAAC;QACxC,SAAS,CAAC,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC,CAAC;QACxD,SAAS,CAAC,UAAU,CAAC,oBAAoB,CAAC,CAAC;QAC3C,SAAS,CAAC,MAAM,GAAG,gBAAM,CAAC,KAAK,CAAC;QAChC,IAAI,CAAC,gBAAgB,CACnB,IAAI,uBAAa,CAAC,IAAI,EAAE,iCAAiC,EAAE;YACzD,UAAU,EAAE,CAAC,SAAS,CAAC;SACxB,CAAC,CACH,CAAC;IACJ,CAAC;IAED;;OAEG;IACK,cAAc;QACpB,qDAAqD;QACrD,MAAM,cAAc,GAAG,IAAI,cAAI,CAAC,IAAI,EAAE,wBAAwB,EAAE;YAC9D,SAAS,EAAE,IAAI,0BAAgB,CAAC,0BAA0B,CAAC;SAC5D,CAAC,CAAC;QAEH,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;QAE9C,mCAAmC;QACnC,MAAM,eAAe,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;QACvE,uCAAuC;QACvC,MAAM,cAAc,GAAG,eAAe,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;QAE3D,eAAe;QACf,eAAe,CAAC,SAAS,CACvB,KAAK,EACL,IAAI,+BAAc,CAAC;YACjB,OAAO,EAAE,UAAU;YACnB,MAAM,EAAE,MAAM;YACd,OAAO,EAAE;gBACP,eAAe,EAAE,cAAc;gBAC/B,gBAAgB,EAAE;oBAChB,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC;wBACjC,SAAS,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS;wBAC/B,cAAc,EAAE,IAAI;qBACrB,CAAC;iBACH;gBACD,oBAAoB,EAAE;oBACpB;wBACE,UAAU,EAAE,KAAK;wBACjB,iBAAiB,EAAE;4BACjB,kBAAkB,EAAE;;;;;;;iDAOa,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC;;;;;;;;oBAQ5D;yBACL;qBACF;iBACF;aACF;SACF,CAAC,EACF;YACE,eAAe,EAAE,CAAC,EAAE,UAAU,EAAE,KAAK,EAAE,CAAC;YACxC,iBAAiB,EAAE,kCAAiB,CAAC,GAAG;SACzC,CACF,CAAC;QAEF,mBAAmB;QACnB,cAAc,CAAC,SAAS,CACtB,KAAK,EACL,IAAI,+BAAc,CAAC;YACjB,OAAO,EAAE,UAAU;YACnB,MAAM,EAAE,SAAS;YACjB,OAAO,EAAE;gBACP,eAAe,EAAE,cAAc;gBAC/B,gBAAgB,EAAE;oBAChB,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC;wBACjC,SAAS,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS;wBAC/B,GAAG,EAAE;4BACH,EAAE,EAAE,EAAE,CAAC,EAAE,yBAAyB,EAAE;yBACrC;wBACD,cAAc,EAAE,IAAI;qBACrB,CAAC;iBACH;gBACD,oBAAoB,EAAE;oBACpB;wBACE,UAAU,EAAE,KAAK;wBACjB,iBAAiB,EAAE;4BACjB,kBAAkB,EAAE;;;;;6CAKS,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC;;;;;;;;uBAQrD;yBACR;qBACF;iBACF;aACF;SACF,CAAC,EACF;YACE,eAAe,EAAE,CAAC,EAAE,UAAU,EAAE,KAAK,EAAE,CAAC;YACxC,iBAAiB,EAAE,kCAAiB,CAAC,GAAG;SACzC,CACF,CAAC;QAEF,eAAe;QACf,cAAc,CAAC,SAAS,CACtB,QAAQ,EACR,IAAI,+BAAc,CAAC;YACjB,OAAO,EAAE,UAAU;YACnB,MAAM,EAAE,YAAY;YACpB,OAAO,EAAE;gBACP,eAAe,EAAE,cAAc;gBAC/B,gBAAgB,EAAE;oBAChB,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC;wBACjC,SAAS,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS;wBAC/B,GAAG,EAAE;4BACH,EAAE,EAAE,EAAE,CAAC,EAAE,yBAAyB,EAAE;yBACrC;qBACF,CAAC;iBACH;gBACD,oBAAoB,EAAE;oBACpB;wBACE,UAAU,EAAE,KAAK;wBACjB,iBAAiB,EAAE;4BACjB,kBAAkB,EAAE,0CAA0C;yBAC/D;qBACF;iBACF;aACF;SACF,CAAC,EACF;YACE,eAAe,EAAE,CAAC,EAAE,UAAU,EAAE,KAAK,EAAE,CAAC;YACxC,iBAAiB,EAAE,kCAAiB,CAAC,GAAG;SACzC,CACF,CAAC;QAEF,eAAe;QACf,MAAM,eAAe,GAAG,IAAI,kDAAsB,CAChD,IAAI,EACJ,iBAAiB,EACjB,EAAE,WAAW,EAAE,EAAE,UAAU,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS,EAAE,EAAE,CACtD,CAAC;QAEF,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,eAAe,CAAC,CAAC;QAE/C,eAAe,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,kCAAiB,CAAC,eAAe,CAAC,EAAE;YACxE,eAAe,EAAE,CAAC,EAAE,UAAU,EAAE,KAAK,EAAE,CAAC;YACxC,iBAAiB,EAAE,kCAAiB,CAAC,GAAG;SACzC,CAAC,CAAC;QAEH,eAAe;QACf,MAAM,aAAa,GAAG,IAAI,8CAAoB,CAAC,IAAI,EAAE,eAAe,EAAE;YACpE,WAAW,EAAE;gBACX,UAAU,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS;gBAChC,eAAe,EAAE,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC;aACjE;SACF,CAAC,CAAC;QAEH,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,aAAa,CAAC,CAAC;QAE7C,cAAc,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,kCAAiB,CAAC,aAAa,CAAC,EAAE;YACrE,eAAe,EAAE,CAAC,EAAE,UAAU,EAAE,KAAK,EAAE,CAAC;YACxC,iBAAiB,EAAE,kCAAiB,CAAC,GAAG;SACzC,CAAC,CAAC;IACL,CAAC;;AA7OH,4CA8OC","sourcesContent":["import {\n  AuthorizationType,\n  AwsIntegration,\n  EndpointType,\n  IRestApi,\n  LambdaIntegration,\n  RestApi,\n} from \"aws-cdk-lib/aws-apigateway\";\nimport { ITable } from \"aws-cdk-lib/aws-dynamodb\";\nimport {\n  Effect,\n  IRole,\n  ManagedPolicy,\n  PolicyStatement,\n  Role,\n  ServicePrincipal,\n} from \"aws-cdk-lib/aws-iam\";\nimport { Construct } from \"constructs\";\nimport { ApiKeyAttribute, ApiKeyStore } from \"./ApiKeyStore\";\nimport { ApiKeyCreationFunction } from \"./lambdas/api-key-creation-function\";\nimport { ApiKeyUpdateFunction } from \"./lambdas/api-key-update-function\";\n\nconst MANAGEMENT_PATH = \"apiKeys\";\n\n/**\n * Properties to instantiate the {@link ApiKeyManagement} component.\n */\nexport interface ApiKeyManagementProps {\n  /**\n   * The {@link ApiKeyStore} component.\n   */\n  readonly apiKeys: ApiKeyStore;\n}\n\n/**\n * Component that provides a REST API to manage (create, modify, delete) API keys.\n */\nexport class ApiKeyManagement extends Construct {\n  private externalUrl: string;\n  private restApi: IRestApi;\n  private table: ITable;\n  private attributes: ApiKeyAttribute[];\n  /**\n   * Create a new instance of the component.\n   * @param scope The scope to be used.\n   * @param id The ID used for the component instance.\n   * @param props The {@link ApiKeyManagementProps} required for creating the instance.\n   */\n  constructor(scope: Construct, id: string, props: ApiKeyManagementProps) {\n    super(scope, id);\n\n    this.attributes = props.apiKeys.attributes;\n\n    this.table = props.apiKeys.apiKeyTable;\n\n    const restApi = new RestApi(this, \"ManagementApi\", {\n      restApiName: \"API Key Management\",\n      description: \"API for managing API keys\",\n      endpointConfiguration: {\n        types: [EndpointType.REGIONAL],\n      },\n    });\n\n    this.externalUrl = `${restApi.url}`;\n    this.restApi = restApi;\n\n    this.setUpResources();\n  }\n\n  /**\n   * Get the base URL to manage the keys.\n   */\n  public get baseUrl(): string {\n    return this.externalUrl;\n  }\n\n  /**\n   * Get the path relative to the base url to manage all keys.\n   */\n  public get keysManagementPath(): string {\n    return MANAGEMENT_PATH;\n  }\n\n  /**\n   * Get the path relative to the base url to manage a single key. Contains\n   * a placeholder {id} that has to replaced by the ID of the element to be managed.\n   */\n  public get keyManagementPath(): string {\n    return this.keysManagementPath + \"/{id}\";\n  }\n\n  /**\n   * Grant connection privileges to the passed role.\n   * @param role The role to allow access to the API.\n   */\n  public allowConnection(role: IRole): void {\n    const statement = new PolicyStatement();\n    statement.addResources(this.restApi.arnForExecuteApi());\n    statement.addActions(\"execute-api:Invoke\");\n    statement.effect = Effect.ALLOW;\n    role.addManagedPolicy(\n      new ManagedPolicy(role, \"ApiClientManagementAccessPolicy\", {\n        statements: [statement],\n      }),\n    );\n  }\n\n  /**\n   * Set up the available resources for the API.\n   */\n  private setUpResources(): void {\n    // Create IAM role for API Gateway to access DynamoDB\n    const apiGatewayRole = new Role(this, \"ApiGatewayDynamoDBRole\", {\n      assumedBy: new ServicePrincipal(\"apigateway.amazonaws.com\"),\n    });\n\n    this.table.grantReadWriteData(apiGatewayRole);\n\n    // Resource for actions on all keys\n    const apiKeysResource = this.restApi.root.addResource(MANAGEMENT_PATH);\n    // Resource for actions on a single key\n    const apiKeyResource = apiKeysResource.addResource(\"{id}\");\n\n    // Get all keys\n    apiKeysResource.addMethod(\n      \"GET\",\n      new AwsIntegration({\n        service: \"dynamodb\",\n        action: \"Scan\",\n        options: {\n          credentialsRole: apiGatewayRole,\n          requestTemplates: {\n            \"application/json\": JSON.stringify({\n              TableName: this.table.tableName,\n              ConsistentRead: true,\n            }),\n          },\n          integrationResponses: [\n            {\n              statusCode: \"200\",\n              responseTemplates: {\n                \"application/json\": `#set($inputRoot = $input.path('$'))\n                  {\n                    \"keys\": [\n                      #foreach($elem in $inputRoot.Items)\n                      {\n                        \"id\": \"$elem.id.S\",\n                        \"createdAt\": \"$elem.createdAt.S\"\n                        #foreach($attribute in ${JSON.stringify(this.attributes)})\n                          #if($elem[$attribute.apiName].S != '')\n                            ,\"$attribute.apiName\": \"$elem[$attribute.apiName].S\"\n                          #end\n                        #end\n                      }#if($foreach.hasNext),#end\n                      #end\n                    ]\n                  }`,\n              },\n            },\n          ],\n        },\n      }),\n      {\n        methodResponses: [{ statusCode: \"200\" }],\n        authorizationType: AuthorizationType.IAM,\n      },\n    );\n\n    // Get a single key\n    apiKeyResource.addMethod(\n      \"GET\",\n      new AwsIntegration({\n        service: \"dynamodb\",\n        action: \"GetItem\",\n        options: {\n          credentialsRole: apiGatewayRole,\n          requestTemplates: {\n            \"application/json\": JSON.stringify({\n              TableName: this.table.tableName,\n              Key: {\n                id: { S: \"$method.request.path.id\" },\n              },\n              ConsistentRead: true,\n            }),\n          },\n          integrationResponses: [\n            {\n              statusCode: \"200\",\n              responseTemplates: {\n                \"application/json\": `#set($inputRoot = $input.path('$'))\n                  #if($inputRoot.Item)\n                  {\n                    \"id\": \"$inputRoot.Item.id.S\",\n                    \"createdAt\": \"$inputRoot.Item.createdAt.S\"\n                    #foreach($attribute in ${JSON.stringify(this.attributes)})\n                      #if($inputRoot.Item[$attribute.apiName].S != '')\n                        ,\"$attribute.apiName\": \"$inputRoot.Item[$attribute.apiName].S\"\n                      #end\n                    #end\n                  }\n                  #else\n                  {}\n                  #end`,\n              },\n            },\n          ],\n        },\n      }),\n      {\n        methodResponses: [{ statusCode: \"200\" }],\n        authorizationType: AuthorizationType.IAM,\n      },\n    );\n\n    // Delete a key\n    apiKeyResource.addMethod(\n      \"DELETE\",\n      new AwsIntegration({\n        service: \"dynamodb\",\n        action: \"DeleteItem\",\n        options: {\n          credentialsRole: apiGatewayRole,\n          requestTemplates: {\n            \"application/json\": JSON.stringify({\n              TableName: this.table.tableName,\n              Key: {\n                id: { S: \"$method.request.path.id\" },\n              },\n            }),\n          },\n          integrationResponses: [\n            {\n              statusCode: \"200\",\n              responseTemplates: {\n                \"application/json\": '{\"message\": \"Item deleted successfully\"}',\n              },\n            },\n          ],\n        },\n      }),\n      {\n        methodResponses: [{ statusCode: \"200\" }],\n        authorizationType: AuthorizationType.IAM,\n      },\n    );\n\n    // Create a key\n    const creationHandler = new ApiKeyCreationFunction(\n      this,\n      \"CreationHandler\",\n      { environment: { TABLE_NAME: this.table.tableName } },\n    );\n\n    this.table.grantReadWriteData(creationHandler);\n\n    apiKeysResource.addMethod(\"POST\", new LambdaIntegration(creationHandler), {\n      methodResponses: [{ statusCode: \"200\" }],\n      authorizationType: AuthorizationType.IAM,\n    });\n\n    // Update a key\n    const updateHandler = new ApiKeyUpdateFunction(this, \"UpdateHandler\", {\n      environment: {\n        TABLE_NAME: this.table.tableName,\n        ATTRIBUTE_NAMES: this.attributes.map((f) => f.apiName).join(\",\"),\n      },\n    });\n\n    this.table.grantReadWriteData(updateHandler);\n\n    apiKeyResource.addMethod(\"POST\", new LambdaIntegration(updateHandler), {\n      methodResponses: [{ statusCode: \"200\" }],\n      authorizationType: AuthorizationType.IAM,\n    });\n  }\n}\n"]}