@etainabl/nodejs-sdk 1.3.170 → 1.3.174

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (25) hide show
  1. package/dist/esm/{chunk-KR5LXISF.js → chunk-4G647IUM.js} +2 -2
  2. package/dist/esm/{chunk-6AFRW6DM.js → chunk-HR3W7R4B.js} +66 -66
  3. package/dist/esm/{chunk-6AFRW6DM.js.map → chunk-HR3W7R4B.js.map} +1 -1
  4. package/dist/esm/{chunk-HP5O34C3.js → chunk-UR6FJOYI.js} +2 -2
  5. package/dist/esm/{dist-es-UZVIZZYV.js → dist-es-JA6GH4HX.js} +2 -2
  6. package/dist/esm/{dist-es-KG7JV3KL.js → dist-es-QWNQVMYC.js} +4 -4
  7. package/dist/esm/{dist-es-7A5AP37F.js → dist-es-XOZGODLE.js} +4 -4
  8. package/dist/esm/index.js +2733 -2762
  9. package/dist/esm/index.js.map +1 -1
  10. package/dist/esm/{loadSso-WTBVK2SM.js → loadSso-66ZTLICD.js} +5 -5
  11. package/dist/esm/{loadSso-WTBVK2SM.js.map → loadSso-66ZTLICD.js.map} +1 -1
  12. package/dist/esm/{sso-oidc-3AEK6OAH.js → sso-oidc-Z2X56STB.js} +5 -5
  13. package/dist/esm/{sso-oidc-3AEK6OAH.js.map → sso-oidc-Z2X56STB.js.map} +1 -1
  14. package/dist/esm/{sts-AUUXBNVW.js → sts-XINKL27T.js} +5 -5
  15. package/dist/esm/{sts-AUUXBNVW.js.map → sts-XINKL27T.js.map} +1 -1
  16. package/dist/index.d.cts +166 -242
  17. package/dist/index.d.ts +166 -242
  18. package/dist/index.js +73651 -73672
  19. package/dist/index.js.map +1 -1
  20. package/package.json +4 -3
  21. /package/dist/esm/{chunk-KR5LXISF.js.map → chunk-4G647IUM.js.map} +0 -0
  22. /package/dist/esm/{chunk-HP5O34C3.js.map → chunk-UR6FJOYI.js.map} +0 -0
  23. /package/dist/esm/{dist-es-UZVIZZYV.js.map → dist-es-JA6GH4HX.js.map} +0 -0
  24. /package/dist/esm/{dist-es-KG7JV3KL.js.map → dist-es-QWNQVMYC.js.map} +0 -0
  25. /package/dist/esm/{dist-es-7A5AP37F.js.map → dist-es-XOZGODLE.js.map} +0 -0
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  collectBodyString,
3
3
  extendedEncodeURIComponent
4
- } from "./chunk-6AFRW6DM.js";
4
+ } from "./chunk-HR3W7R4B.js";
5
5
  import {
6
6
  HttpRequest
7
7
  } from "./chunk-D74LA2XQ.js";
@@ -254,4 +254,4 @@ export {
254
254
  parseJsonErrorBody,
255
255
  loadRestJsonErrorCode
256
256
  };
257
- //# sourceMappingURL=chunk-HP5O34C3.js.map
257
+ //# sourceMappingURL=chunk-UR6FJOYI.js.map
@@ -15,7 +15,7 @@ var fromWebToken = (init) => async (awsIdentityProperties) => {
15
15
  const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
16
16
  let { roleAssumerWithWebIdentity } = init;
17
17
  if (!roleAssumerWithWebIdentity) {
18
- const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-AUUXBNVW.js");
18
+ const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-XINKL27T.js");
19
19
  roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
20
20
  ...init.clientConfig,
21
21
  credentialProviderLogger: init.logger,
@@ -65,4 +65,4 @@ export {
65
65
  fromTokenFile,
66
66
  fromWebToken
67
67
  };
68
- //# sourceMappingURL=dist-es-UZVIZZYV.js.map
68
+ //# sourceMappingURL=dist-es-JA6GH4HX.js.map
@@ -32,7 +32,7 @@ var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the
32
32
 
33
33
  // node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
34
34
  var getSsoOidcClient = async (ssoRegion, init = {}) => {
35
- const { SSOOIDCClient } = await import("./sso-oidc-3AEK6OAH.js");
35
+ const { SSOOIDCClient } = await import("./sso-oidc-Z2X56STB.js");
36
36
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
37
37
  region: ssoRegion ?? init.clientConfig?.region,
38
38
  logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
@@ -42,7 +42,7 @@ var getSsoOidcClient = async (ssoRegion, init = {}) => {
42
42
 
43
43
  // node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
44
44
  var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {
45
- const { CreateTokenCommand } = await import("./sso-oidc-3AEK6OAH.js");
45
+ const { CreateTokenCommand } = await import("./sso-oidc-Z2X56STB.js");
46
46
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
47
47
  return ssoOidcClient.send(new CreateTokenCommand({
48
48
  clientId: ssoToken.clientId,
@@ -189,7 +189,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
189
189
  });
190
190
  }
191
191
  const { accessToken } = token;
192
- const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-WTBVK2SM.js");
192
+ const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-66ZTLICD.js");
193
193
  const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
194
194
  logger: clientConfig?.logger ?? parentClientConfig?.logger,
195
195
  region: clientConfig?.region ?? ssoRegion
@@ -311,4 +311,4 @@ export {
311
311
  isSsoProfile,
312
312
  validateSsoProfile
313
313
  };
314
- //# sourceMappingURL=dist-es-KG7JV3KL.js.map
314
+ //# sourceMappingURL=dist-es-QWNQVMYC.js.map
@@ -64,7 +64,7 @@ var resolveAssumeRoleCredentials = async (profileName, profiles, options, visite
64
64
  const profileData = profiles[profileName];
65
65
  const { source_profile, region } = profileData;
66
66
  if (!options.roleAssumer) {
67
- const { getDefaultRoleAssumer } = await import("./sts-AUUXBNVW.js");
67
+ const { getDefaultRoleAssumer } = await import("./sts-XINKL27T.js");
68
68
  options.roleAssumer = getDefaultRoleAssumer({
69
69
  ...options.clientConfig,
70
70
  credentialProviderLogger: options.logger,
@@ -116,7 +116,7 @@ var resolveProcessCredentials = async (options, profile) => import("./dist-es-LL
116
116
 
117
117
  // node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
118
118
  var resolveSsoCredentials = async (profile, profileData, options = {}) => {
119
- const { fromSSO } = await import("./dist-es-KG7JV3KL.js");
119
+ const { fromSSO } = await import("./dist-es-QWNQVMYC.js");
120
120
  return fromSSO({
121
121
  profile,
122
122
  logger: options.logger,
@@ -148,7 +148,7 @@ var resolveStaticCredentials = async (profile, options) => {
148
148
 
149
149
  // node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
150
150
  var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
151
- var resolveWebIdentityCredentials = async (profile, options) => import("./dist-es-UZVIZZYV.js").then(({ fromTokenFile }) => fromTokenFile({
151
+ var resolveWebIdentityCredentials = async (profile, options) => import("./dist-es-JA6GH4HX.js").then(({ fromTokenFile }) => fromTokenFile({
152
152
  webIdentityTokenFile: profile.web_identity_token_file,
153
153
  roleArn: profile.role_arn,
154
154
  roleSessionName: profile.role_session_name,
@@ -199,4 +199,4 @@ var fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {
199
199
  export {
200
200
  fromIni
201
201
  };
202
- //# sourceMappingURL=dist-es-7A5AP37F.js.map
202
+ //# sourceMappingURL=dist-es-XOZGODLE.js.map