@etainabl/nodejs-sdk 1.3.166 → 1.3.167

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (36) hide show
  1. package/dist/esm/{chunk-WRTOEGQL.js → chunk-3J7VUCCC.js} +2 -2
  2. package/dist/esm/{chunk-EVJULQPT.js → chunk-COGWOFTA.js} +2 -2
  3. package/dist/esm/chunk-PLDDJCW6.js +49 -0
  4. package/dist/esm/{chunk-AQUTK7AW.js → chunk-YFU6P2WU.js} +2 -2
  5. package/dist/esm/{dist-es-MHO4ZWXK.js → dist-es-4M6QLI3Z.js} +2 -2
  6. package/dist/esm/{dist-es-32LEW3C7.js → dist-es-DNTTNOP2.js} +2 -2
  7. package/dist/esm/{dist-es-YDCANF64.js → dist-es-LSJVIQHH.js} +2 -2
  8. package/dist/esm/{dist-es-MRJ45ZBG.js → dist-es-OELE3ZU6.js} +10 -10
  9. package/dist/esm/{dist-es-GCETMDH7.js → dist-es-QLMS2EJQ.js} +2 -2
  10. package/dist/esm/{dist-es-YPLWYQ2P.js → dist-es-RLY6WB4O.js} +3 -3
  11. package/dist/esm/{dist-es-NBFOPILZ.js → dist-es-VW2LACDX.js} +5 -5
  12. package/dist/esm/{event-streams-C2D437DF.js → event-streams-JLZWM2TX.js} +2 -2
  13. package/dist/esm/index.js +59364 -42
  14. package/dist/esm/index.js.map +1 -1
  15. package/dist/esm/{loadSso-QXCYUPG5.js → loadSso-OCDZAUKH.js} +4 -4
  16. package/dist/esm/{sso-oidc-EU7F5QE4.js → sso-oidc-M2EXZ76U.js} +4 -4
  17. package/dist/esm/{sts-7N2XX5PT.js → sts-KKJVSQNR.js} +4 -4
  18. package/dist/index.js +59795 -475
  19. package/dist/index.js.map +1 -1
  20. package/package.json +1 -1
  21. package/dist/esm/chunk-PZ5AY32C.js +0 -10
  22. /package/dist/esm/{chunk-WRTOEGQL.js.map → chunk-3J7VUCCC.js.map} +0 -0
  23. /package/dist/esm/{chunk-EVJULQPT.js.map → chunk-COGWOFTA.js.map} +0 -0
  24. /package/dist/esm/{chunk-PZ5AY32C.js.map → chunk-PLDDJCW6.js.map} +0 -0
  25. /package/dist/esm/{chunk-AQUTK7AW.js.map → chunk-YFU6P2WU.js.map} +0 -0
  26. /package/dist/esm/{dist-es-MHO4ZWXK.js.map → dist-es-4M6QLI3Z.js.map} +0 -0
  27. /package/dist/esm/{dist-es-32LEW3C7.js.map → dist-es-DNTTNOP2.js.map} +0 -0
  28. /package/dist/esm/{dist-es-YDCANF64.js.map → dist-es-LSJVIQHH.js.map} +0 -0
  29. /package/dist/esm/{dist-es-MRJ45ZBG.js.map → dist-es-OELE3ZU6.js.map} +0 -0
  30. /package/dist/esm/{dist-es-GCETMDH7.js.map → dist-es-QLMS2EJQ.js.map} +0 -0
  31. /package/dist/esm/{dist-es-YPLWYQ2P.js.map → dist-es-RLY6WB4O.js.map} +0 -0
  32. /package/dist/esm/{dist-es-NBFOPILZ.js.map → dist-es-VW2LACDX.js.map} +0 -0
  33. /package/dist/esm/{event-streams-C2D437DF.js.map → event-streams-JLZWM2TX.js.map} +0 -0
  34. /package/dist/esm/{loadSso-QXCYUPG5.js.map → loadSso-OCDZAUKH.js.map} +0 -0
  35. /package/dist/esm/{sso-oidc-EU7F5QE4.js.map → sso-oidc-M2EXZ76U.js.map} +0 -0
  36. /package/dist/esm/{sts-7N2XX5PT.js.map → sts-KKJVSQNR.js.map} +0 -0
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  collectBodyString,
3
3
  extendedEncodeURIComponent
4
- } from "./chunk-EVJULQPT.js";
4
+ } from "./chunk-COGWOFTA.js";
5
5
  import {
6
6
  HttpRequest
7
7
  } from "./chunk-JI6PVVK3.js";
@@ -252,4 +252,4 @@ export {
252
252
  parseJsonErrorBody,
253
253
  loadRestJsonErrorCode
254
254
  };
255
- //# sourceMappingURL=chunk-WRTOEGQL.js.map
255
+ //# sourceMappingURL=chunk-3J7VUCCC.js.map
@@ -4443,7 +4443,7 @@ var inferPhysicalRegion = async () => {
4443
4443
  }
4444
4444
  if (!process.env[ENV_IMDS_DISABLED]) {
4445
4445
  try {
4446
- const { getInstanceMetadataEndpoint, httpRequest } = await import("./dist-es-32LEW3C7.js");
4446
+ const { getInstanceMetadataEndpoint, httpRequest } = await import("./dist-es-DNTTNOP2.js");
4447
4447
  const endpoint = await getInstanceMetadataEndpoint();
4448
4448
  return (await httpRequest({ ...endpoint, path: IMDS_REGION_PATH })).toString();
4449
4449
  } catch (e) {
@@ -4536,4 +4536,4 @@ export {
4536
4536
  getAwsRegionExtensionConfiguration,
4537
4537
  resolveAwsRegionExtensionConfiguration
4538
4538
  };
4539
- //# sourceMappingURL=chunk-EVJULQPT.js.map
4539
+ //# sourceMappingURL=chunk-COGWOFTA.js.map
@@ -0,0 +1,49 @@
1
+ var __create = Object.create;
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __getProtoOf = Object.getPrototypeOf;
6
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
7
+ var __require = /* @__PURE__ */ ((x) => typeof require !== "undefined" ? require : typeof Proxy !== "undefined" ? new Proxy(x, {
8
+ get: (a, b) => (typeof require !== "undefined" ? require : a)[b]
9
+ }) : x)(function(x) {
10
+ if (typeof require !== "undefined") return require.apply(this, arguments);
11
+ throw Error('Dynamic require of "' + x + '" is not supported');
12
+ });
13
+ var __esm = (fn, res) => function __init() {
14
+ return fn && (res = (0, fn[__getOwnPropNames(fn)[0]])(fn = 0)), res;
15
+ };
16
+ var __commonJS = (cb, mod) => function __require2() {
17
+ return mod || (0, cb[__getOwnPropNames(cb)[0]])((mod = { exports: {} }).exports, mod), mod.exports;
18
+ };
19
+ var __export = (target, all) => {
20
+ for (var name in all)
21
+ __defProp(target, name, { get: all[name], enumerable: true });
22
+ };
23
+ var __copyProps = (to, from, except, desc) => {
24
+ if (from && typeof from === "object" || typeof from === "function") {
25
+ for (let key of __getOwnPropNames(from))
26
+ if (!__hasOwnProp.call(to, key) && key !== except)
27
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
28
+ }
29
+ return to;
30
+ };
31
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
32
+ // If the importer is in node compatibility mode or this is not an ESM
33
+ // file that has been converted to a CommonJS file using a Babel-
34
+ // compatible transform (i.e. "__esModule" has not been set), then set
35
+ // "default" to the CommonJS "module.exports" for node compatibility.
36
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
37
+ mod
38
+ ));
39
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
40
+
41
+ export {
42
+ __require,
43
+ __esm,
44
+ __commonJS,
45
+ __export,
46
+ __toESM,
47
+ __toCommonJS
48
+ };
49
+ //# sourceMappingURL=chunk-PLDDJCW6.js.map
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  collectBodyString
3
- } from "./chunk-EVJULQPT.js";
3
+ } from "./chunk-COGWOFTA.js";
4
4
 
5
5
  // node_modules/@smithy/smithy-client/dist-es/get-value-from-text-node.js
6
6
  var getValueFromTextNode = (obj) => {
@@ -1421,4 +1421,4 @@ export {
1421
1421
  parseXmlErrorBody,
1422
1422
  loadRestXmlErrorCode
1423
1423
  };
1424
- //# sourceMappingURL=chunk-AQUTK7AW.js.map
1424
+ //# sourceMappingURL=chunk-YFU6P2WU.js.map
@@ -10,7 +10,7 @@ import {
10
10
  import {
11
11
  CredentialsProviderError
12
12
  } from "./chunk-R2ZTENKB.js";
13
- import "./chunk-PZ5AY32C.js";
13
+ import "./chunk-PLDDJCW6.js";
14
14
 
15
15
  // node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
16
16
  import { exec } from "child_process";
@@ -87,4 +87,4 @@ var fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {
87
87
  export {
88
88
  fromProcess
89
89
  };
90
- //# sourceMappingURL=dist-es-MHO4ZWXK.js.map
90
+ //# sourceMappingURL=dist-es-4M6QLI3Z.js.map
@@ -8,7 +8,7 @@ import {
8
8
  CredentialsProviderError,
9
9
  ProviderError
10
10
  } from "./chunk-R2ZTENKB.js";
11
- import "./chunk-PZ5AY32C.js";
11
+ import "./chunk-PLDDJCW6.js";
12
12
 
13
13
  // node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
14
14
  import { parse } from "url";
@@ -377,4 +377,4 @@ export {
377
377
  httpRequest,
378
378
  providerConfigFromInit
379
379
  };
380
- //# sourceMappingURL=dist-es-32LEW3C7.js.map
380
+ //# sourceMappingURL=dist-es-DNTTNOP2.js.map
@@ -15,7 +15,7 @@ import {
15
15
  import {
16
16
  CredentialsProviderError
17
17
  } from "./chunk-R2ZTENKB.js";
18
- import "./chunk-PZ5AY32C.js";
18
+ import "./chunk-PLDDJCW6.js";
19
19
 
20
20
  // node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
21
21
  import fs from "fs/promises";
@@ -165,4 +165,4 @@ Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI
165
165
  export {
166
166
  fromHttp
167
167
  };
168
- //# sourceMappingURL=dist-es-YDCANF64.js.map
168
+ //# sourceMappingURL=dist-es-LSJVIQHH.js.map
@@ -13,25 +13,25 @@ import {
13
13
  import {
14
14
  CredentialsProviderError
15
15
  } from "./chunk-R2ZTENKB.js";
16
- import "./chunk-PZ5AY32C.js";
16
+ import "./chunk-PLDDJCW6.js";
17
17
 
18
18
  // node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
19
19
  var resolveCredentialSource = (credentialSource, profileName, logger) => {
20
20
  const sourceProvidersMap = {
21
21
  EcsContainer: async (options) => {
22
- const { fromHttp } = await import("./dist-es-YDCANF64.js");
23
- const { fromContainerMetadata } = await import("./dist-es-32LEW3C7.js");
22
+ const { fromHttp } = await import("./dist-es-LSJVIQHH.js");
23
+ const { fromContainerMetadata } = await import("./dist-es-DNTTNOP2.js");
24
24
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
25
25
  return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
26
26
  },
27
27
  Ec2InstanceMetadata: async (options) => {
28
28
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
29
- const { fromInstanceMetadata } = await import("./dist-es-32LEW3C7.js");
29
+ const { fromInstanceMetadata } = await import("./dist-es-DNTTNOP2.js");
30
30
  return async () => fromInstanceMetadata(options)().then(setNamedProvider);
31
31
  },
32
32
  Environment: async (options) => {
33
33
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
34
- const { fromEnv } = await import("./dist-es-GCETMDH7.js");
34
+ const { fromEnv } = await import("./dist-es-QLMS2EJQ.js");
35
35
  return async () => fromEnv(options)().then(setNamedProvider);
36
36
  }
37
37
  };
@@ -66,7 +66,7 @@ var resolveAssumeRoleCredentials = async (profileName, profiles, options, visite
66
66
  const profileData = profiles[profileName];
67
67
  const { source_profile, region } = profileData;
68
68
  if (!options.roleAssumer) {
69
- const { getDefaultRoleAssumer } = await import("./sts-7N2XX5PT.js");
69
+ const { getDefaultRoleAssumer } = await import("./sts-KKJVSQNR.js");
70
70
  options.roleAssumer = getDefaultRoleAssumer({
71
71
  ...options.clientConfig,
72
72
  credentialProviderLogger: options.logger,
@@ -111,14 +111,14 @@ var isCredentialSourceWithoutRoleArn = (section) => {
111
111
 
112
112
  // node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
113
113
  var isProcessProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string";
114
- var resolveProcessCredentials = async (options, profile) => import("./dist-es-MHO4ZWXK.js").then(({ fromProcess }) => fromProcess({
114
+ var resolveProcessCredentials = async (options, profile) => import("./dist-es-4M6QLI3Z.js").then(({ fromProcess }) => fromProcess({
115
115
  ...options,
116
116
  profile
117
117
  })().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v")));
118
118
 
119
119
  // node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
120
120
  var resolveSsoCredentials = async (profile, profileData, options = {}) => {
121
- const { fromSSO } = await import("./dist-es-NBFOPILZ.js");
121
+ const { fromSSO } = await import("./dist-es-VW2LACDX.js");
122
122
  return fromSSO({
123
123
  profile,
124
124
  logger: options.logger,
@@ -150,7 +150,7 @@ var resolveStaticCredentials = async (profile, options) => {
150
150
 
151
151
  // node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
152
152
  var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
153
- var resolveWebIdentityCredentials = async (profile, options) => import("./dist-es-YPLWYQ2P.js").then(({ fromTokenFile }) => fromTokenFile({
153
+ var resolveWebIdentityCredentials = async (profile, options) => import("./dist-es-RLY6WB4O.js").then(({ fromTokenFile }) => fromTokenFile({
154
154
  webIdentityTokenFile: profile.web_identity_token_file,
155
155
  roleArn: profile.role_arn,
156
156
  roleSessionName: profile.role_session_name,
@@ -201,4 +201,4 @@ var fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {
201
201
  export {
202
202
  fromIni
203
203
  };
204
- //# sourceMappingURL=dist-es-MRJ45ZBG.js.map
204
+ //# sourceMappingURL=dist-es-OELE3ZU6.js.map
@@ -9,7 +9,7 @@ import {
9
9
  } from "./chunk-LARQKHST.js";
10
10
  import "./chunk-UZGMBQZB.js";
11
11
  import "./chunk-R2ZTENKB.js";
12
- import "./chunk-PZ5AY32C.js";
12
+ import "./chunk-PLDDJCW6.js";
13
13
  export {
14
14
  ENV_ACCOUNT_ID,
15
15
  ENV_CREDENTIAL_SCOPE,
@@ -19,4 +19,4 @@ export {
19
19
  ENV_SESSION,
20
20
  fromEnv
21
21
  };
22
- //# sourceMappingURL=dist-es-GCETMDH7.js.map
22
+ //# sourceMappingURL=dist-es-QLMS2EJQ.js.map
@@ -4,7 +4,7 @@ import {
4
4
  import {
5
5
  CredentialsProviderError
6
6
  } from "./chunk-R2ZTENKB.js";
7
- import "./chunk-PZ5AY32C.js";
7
+ import "./chunk-PLDDJCW6.js";
8
8
 
9
9
  // node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
10
10
  import { readFileSync } from "fs";
@@ -15,7 +15,7 @@ var fromWebToken = (init) => async (awsIdentityProperties) => {
15
15
  const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
16
16
  let { roleAssumerWithWebIdentity } = init;
17
17
  if (!roleAssumerWithWebIdentity) {
18
- const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-7N2XX5PT.js");
18
+ const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-KKJVSQNR.js");
19
19
  roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
20
20
  ...init.clientConfig,
21
21
  credentialProviderLogger: init.logger,
@@ -65,4 +65,4 @@ export {
65
65
  fromTokenFile,
66
66
  fromWebToken
67
67
  };
68
- //# sourceMappingURL=dist-es-YPLWYQ2P.js.map
68
+ //# sourceMappingURL=dist-es-RLY6WB4O.js.map
@@ -17,7 +17,7 @@ import {
17
17
  CredentialsProviderError,
18
18
  ProviderError
19
19
  } from "./chunk-R2ZTENKB.js";
20
- import "./chunk-PZ5AY32C.js";
20
+ import "./chunk-PLDDJCW6.js";
21
21
 
22
22
  // node_modules/@smithy/property-provider/dist-es/TokenProviderError.js
23
23
  var TokenProviderError = class _TokenProviderError extends ProviderError {
@@ -62,7 +62,7 @@ var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the
62
62
 
63
63
  // node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
64
64
  var getSsoOidcClient = async (ssoRegion, init = {}) => {
65
- const { SSOOIDCClient } = await import("./sso-oidc-EU7F5QE4.js");
65
+ const { SSOOIDCClient } = await import("./sso-oidc-M2EXZ76U.js");
66
66
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
67
67
  region: ssoRegion ?? init.clientConfig?.region,
68
68
  logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
@@ -72,7 +72,7 @@ var getSsoOidcClient = async (ssoRegion, init = {}) => {
72
72
 
73
73
  // node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
74
74
  var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {
75
- const { CreateTokenCommand } = await import("./sso-oidc-EU7F5QE4.js");
75
+ const { CreateTokenCommand } = await import("./sso-oidc-M2EXZ76U.js");
76
76
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
77
77
  return ssoOidcClient.send(new CreateTokenCommand({
78
78
  clientId: ssoToken.clientId,
@@ -219,7 +219,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
219
219
  });
220
220
  }
221
221
  const { accessToken } = token;
222
- const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-QXCYUPG5.js");
222
+ const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-OCDZAUKH.js");
223
223
  const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
224
224
  logger: clientConfig?.logger ?? parentClientConfig?.logger,
225
225
  region: clientConfig?.region ?? ssoRegion
@@ -341,4 +341,4 @@ export {
341
341
  isSsoProfile,
342
342
  validateSsoProfile
343
343
  };
344
- //# sourceMappingURL=dist-es-NBFOPILZ.js.map
344
+ //# sourceMappingURL=dist-es-VW2LACDX.js.map
@@ -4,7 +4,7 @@ import {
4
4
  import {
5
5
  fromUtf8
6
6
  } from "./chunk-KH6HADHN.js";
7
- import "./chunk-PZ5AY32C.js";
7
+ import "./chunk-PLDDJCW6.js";
8
8
 
9
9
  // node_modules/@smithy/core/dist-es/submodules/event-streams/EventStreamSerde.js
10
10
  var EventStreamSerde = class {
@@ -195,4 +195,4 @@ var EventStreamSerde = class {
195
195
  export {
196
196
  EventStreamSerde
197
197
  };
198
- //# sourceMappingURL=event-streams-C2D437DF.js.map
198
+ //# sourceMappingURL=event-streams-JLZWM2TX.js.map