@etainabl/nodejs-sdk 1.3.130 → 1.3.131
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/esm/{chunk-XSPB2DRU.js → chunk-6ZE6VFBF.js} +52 -1
- package/dist/esm/{chunk-XSPB2DRU.js.map → chunk-6ZE6VFBF.js.map} +1 -1
- package/dist/esm/{chunk-VSMDPKQT.js → chunk-AFIWRSL2.js} +2 -2
- package/dist/esm/{chunk-EAEPE6LV.js → chunk-GEJJRBZZ.js} +3 -3
- package/dist/esm/{chunk-DDCT4ZYV.js → chunk-JFJBZL6W.js} +2 -2
- package/dist/esm/{chunk-YUPOEH3S.js → chunk-UGK43V2L.js} +2 -2
- package/dist/esm/{dist-es-LEN5TBON.js → dist-es-AV5FKRC6.js} +2 -2
- package/dist/esm/{dist-es-MTQJIBCO.js → dist-es-HQRLUYWI.js} +2 -2
- package/dist/esm/{dist-es-4PZVI2OP.js → dist-es-N5B4V37N.js} +5 -5
- package/dist/esm/{dist-es-43LBWNIP.js → dist-es-T2FMHNMU.js} +4 -4
- package/dist/esm/index.js +689 -212
- package/dist/esm/index.js.map +1 -1
- package/dist/esm/{loadSso-TNKRSJIY.js → loadSso-KRYOAJJX.js} +5 -5
- package/dist/esm/{sso-oidc-LXV5UW7C.js → sso-oidc-RASI2Q3K.js} +5 -5
- package/dist/esm/{sts-7CU5WIQI.js → sts-IERANB7E.js} +4 -4
- package/dist/index.d.cts +41 -8
- package/dist/index.d.ts +41 -8
- package/dist/index.js +755 -229
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
- /package/dist/esm/{chunk-VSMDPKQT.js.map → chunk-AFIWRSL2.js.map} +0 -0
- /package/dist/esm/{chunk-EAEPE6LV.js.map → chunk-GEJJRBZZ.js.map} +0 -0
- /package/dist/esm/{chunk-DDCT4ZYV.js.map → chunk-JFJBZL6W.js.map} +0 -0
- /package/dist/esm/{chunk-YUPOEH3S.js.map → chunk-UGK43V2L.js.map} +0 -0
- /package/dist/esm/{dist-es-LEN5TBON.js.map → dist-es-AV5FKRC6.js.map} +0 -0
- /package/dist/esm/{dist-es-MTQJIBCO.js.map → dist-es-HQRLUYWI.js.map} +0 -0
- /package/dist/esm/{dist-es-4PZVI2OP.js.map → dist-es-N5B4V37N.js.map} +0 -0
- /package/dist/esm/{dist-es-43LBWNIP.js.map → dist-es-T2FMHNMU.js.map} +0 -0
- /package/dist/esm/{loadSso-TNKRSJIY.js.map → loadSso-KRYOAJJX.js.map} +0 -0
- /package/dist/esm/{sso-oidc-LXV5UW7C.js.map → sso-oidc-RASI2Q3K.js.map} +0 -0
- /package/dist/esm/{sts-7CU5WIQI.js.map → sts-IERANB7E.js.map} +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import {
|
|
2
2
|
collectBodyString
|
|
3
|
-
} from "./chunk-
|
|
3
|
+
} from "./chunk-JFJBZL6W.js";
|
|
4
4
|
|
|
5
5
|
// node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/parseJsonBody.js
|
|
6
6
|
var parseJsonBody = (streamBody, context) => collectBodyString(streamBody, context).then((encoded) => {
|
|
@@ -61,4 +61,4 @@ export {
|
|
|
61
61
|
parseJsonErrorBody,
|
|
62
62
|
loadRestJsonErrorCode
|
|
63
63
|
};
|
|
64
|
-
//# sourceMappingURL=chunk-
|
|
64
|
+
//# sourceMappingURL=chunk-AFIWRSL2.js.map
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import {
|
|
2
2
|
collectBodyString
|
|
3
|
-
} from "./chunk-
|
|
3
|
+
} from "./chunk-JFJBZL6W.js";
|
|
4
4
|
import {
|
|
5
5
|
getValueFromTextNode
|
|
6
|
-
} from "./chunk-
|
|
6
|
+
} from "./chunk-6ZE6VFBF.js";
|
|
7
7
|
|
|
8
8
|
// node_modules/fast-xml-parser/src/util.js
|
|
9
9
|
var nameStartChar = ":A-Za-z_\\u00C0-\\u00D6\\u00D8-\\u00F6\\u00F8-\\u02FF\\u0370-\\u037D\\u037F-\\u1FFF\\u200C-\\u200D\\u2070-\\u218F\\u2C00-\\u2FEF\\u3001-\\uD7FF\\uF900-\\uFDCF\\uFDF0-\\uFFFD";
|
|
@@ -1411,4 +1411,4 @@ export {
|
|
|
1411
1411
|
parseXmlErrorBody,
|
|
1412
1412
|
loadRestXmlErrorCode
|
|
1413
1413
|
};
|
|
1414
|
-
//# sourceMappingURL=chunk-
|
|
1414
|
+
//# sourceMappingURL=chunk-GEJJRBZZ.js.map
|
|
@@ -16,7 +16,7 @@ import {
|
|
|
16
16
|
toHex,
|
|
17
17
|
toUint8Array,
|
|
18
18
|
v4_default
|
|
19
|
-
} from "./chunk-
|
|
19
|
+
} from "./chunk-6ZE6VFBF.js";
|
|
20
20
|
import {
|
|
21
21
|
CONFIG_PREFIX_SEPARATOR
|
|
22
22
|
} from "./chunk-HAEAETXR.js";
|
|
@@ -3308,4 +3308,4 @@ export {
|
|
|
3308
3308
|
getAwsRegionExtensionConfiguration,
|
|
3309
3309
|
resolveAwsRegionExtensionConfiguration
|
|
3310
3310
|
};
|
|
3311
|
-
//# sourceMappingURL=chunk-
|
|
3311
|
+
//# sourceMappingURL=chunk-JFJBZL6W.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import {
|
|
2
2
|
HttpRequest,
|
|
3
3
|
resolvedPath
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-6ZE6VFBF.js";
|
|
5
5
|
|
|
6
6
|
// node_modules/@smithy/core/dist-es/submodules/protocols/requestBuilder.js
|
|
7
7
|
function requestBuilder(input, context) {
|
|
@@ -73,4 +73,4 @@ var RequestBuilder = class {
|
|
|
73
73
|
export {
|
|
74
74
|
requestBuilder
|
|
75
75
|
};
|
|
76
|
-
//# sourceMappingURL=chunk-
|
|
76
|
+
//# sourceMappingURL=chunk-UGK43V2L.js.map
|
|
@@ -3,7 +3,7 @@ import {
|
|
|
3
3
|
NodeHttpHandler,
|
|
4
4
|
parseRfc3339DateTime,
|
|
5
5
|
sdkStreamMixin
|
|
6
|
-
} from "./chunk-
|
|
6
|
+
} from "./chunk-6ZE6VFBF.js";
|
|
7
7
|
import {
|
|
8
8
|
setCredentialFeature
|
|
9
9
|
} from "./chunk-UZGMBQZB.js";
|
|
@@ -160,4 +160,4 @@ Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI
|
|
|
160
160
|
export {
|
|
161
161
|
fromHttp
|
|
162
162
|
};
|
|
163
|
-
//# sourceMappingURL=dist-es-
|
|
163
|
+
//# sourceMappingURL=dist-es-AV5FKRC6.js.map
|
|
@@ -14,7 +14,7 @@ var fromWebToken = (init) => async (awsIdentityProperties) => {
|
|
|
14
14
|
const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
|
|
15
15
|
let { roleAssumerWithWebIdentity } = init;
|
|
16
16
|
if (!roleAssumerWithWebIdentity) {
|
|
17
|
-
const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-
|
|
17
|
+
const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-IERANB7E.js");
|
|
18
18
|
roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
|
|
19
19
|
...init.clientConfig,
|
|
20
20
|
credentialProviderLogger: init.logger,
|
|
@@ -64,4 +64,4 @@ export {
|
|
|
64
64
|
fromTokenFile,
|
|
65
65
|
fromWebToken
|
|
66
66
|
};
|
|
67
|
-
//# sourceMappingURL=dist-es-
|
|
67
|
+
//# sourceMappingURL=dist-es-HQRLUYWI.js.map
|
|
@@ -15,7 +15,7 @@ import {
|
|
|
15
15
|
var resolveCredentialSource = (credentialSource, profileName, logger) => {
|
|
16
16
|
const sourceProvidersMap = {
|
|
17
17
|
EcsContainer: async (options) => {
|
|
18
|
-
const { fromHttp } = await import("./dist-es-
|
|
18
|
+
const { fromHttp } = await import("./dist-es-AV5FKRC6.js");
|
|
19
19
|
const { fromContainerMetadata } = await import("./dist-es-W6M73SKO.js");
|
|
20
20
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
|
|
21
21
|
return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
|
|
@@ -62,7 +62,7 @@ var resolveAssumeRoleCredentials = async (profileName, profiles, options, visite
|
|
|
62
62
|
const profileData = profiles[profileName];
|
|
63
63
|
const { source_profile, region } = profileData;
|
|
64
64
|
if (!options.roleAssumer) {
|
|
65
|
-
const { getDefaultRoleAssumer } = await import("./sts-
|
|
65
|
+
const { getDefaultRoleAssumer } = await import("./sts-IERANB7E.js");
|
|
66
66
|
options.roleAssumer = getDefaultRoleAssumer({
|
|
67
67
|
...options.clientConfig,
|
|
68
68
|
credentialProviderLogger: options.logger,
|
|
@@ -114,7 +114,7 @@ var resolveProcessCredentials = async (options, profile) => import("./dist-es-UQ
|
|
|
114
114
|
|
|
115
115
|
// node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
|
|
116
116
|
var resolveSsoCredentials = async (profile, profileData, options = {}) => {
|
|
117
|
-
const { fromSSO } = await import("./dist-es-
|
|
117
|
+
const { fromSSO } = await import("./dist-es-T2FMHNMU.js");
|
|
118
118
|
return fromSSO({
|
|
119
119
|
profile,
|
|
120
120
|
logger: options.logger,
|
|
@@ -146,7 +146,7 @@ var resolveStaticCredentials = async (profile, options) => {
|
|
|
146
146
|
|
|
147
147
|
// node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
|
|
148
148
|
var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
149
|
-
var resolveWebIdentityCredentials = async (profile, options) => import("./dist-es-
|
|
149
|
+
var resolveWebIdentityCredentials = async (profile, options) => import("./dist-es-HQRLUYWI.js").then(({ fromTokenFile }) => fromTokenFile({
|
|
150
150
|
webIdentityTokenFile: profile.web_identity_token_file,
|
|
151
151
|
roleArn: profile.role_arn,
|
|
152
152
|
roleSessionName: profile.role_session_name,
|
|
@@ -197,4 +197,4 @@ var fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {
|
|
|
197
197
|
export {
|
|
198
198
|
fromIni
|
|
199
199
|
};
|
|
200
|
-
//# sourceMappingURL=dist-es-
|
|
200
|
+
//# sourceMappingURL=dist-es-N5B4V37N.js.map
|
|
@@ -23,7 +23,7 @@ var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the
|
|
|
23
23
|
|
|
24
24
|
// node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
|
|
25
25
|
var getSsoOidcClient = async (ssoRegion, init = {}) => {
|
|
26
|
-
const { SSOOIDCClient } = await import("./sso-oidc-
|
|
26
|
+
const { SSOOIDCClient } = await import("./sso-oidc-RASI2Q3K.js");
|
|
27
27
|
const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
|
|
28
28
|
region: ssoRegion ?? init.clientConfig?.region,
|
|
29
29
|
logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
|
|
@@ -33,7 +33,7 @@ var getSsoOidcClient = async (ssoRegion, init = {}) => {
|
|
|
33
33
|
|
|
34
34
|
// node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
|
|
35
35
|
var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {
|
|
36
|
-
const { CreateTokenCommand } = await import("./sso-oidc-
|
|
36
|
+
const { CreateTokenCommand } = await import("./sso-oidc-RASI2Q3K.js");
|
|
37
37
|
const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
|
|
38
38
|
return ssoOidcClient.send(new CreateTokenCommand({
|
|
39
39
|
clientId: ssoToken.clientId,
|
|
@@ -180,7 +180,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
|
|
|
180
180
|
});
|
|
181
181
|
}
|
|
182
182
|
const { accessToken } = token;
|
|
183
|
-
const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-
|
|
183
|
+
const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-KRYOAJJX.js");
|
|
184
184
|
const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
|
|
185
185
|
logger: clientConfig?.logger ?? parentClientConfig?.logger,
|
|
186
186
|
region: clientConfig?.region ?? ssoRegion
|
|
@@ -302,4 +302,4 @@ export {
|
|
|
302
302
|
isSsoProfile,
|
|
303
303
|
validateSsoProfile
|
|
304
304
|
};
|
|
305
|
-
//# sourceMappingURL=dist-es-
|
|
305
|
+
//# sourceMappingURL=dist-es-T2FMHNMU.js.map
|