@etainabl/nodejs-sdk 1.3.176 → 1.3.179

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (26) hide show
  1. package/dist/esm/{chunk-HR3W7R4B.js → chunk-2N3MHFXC.js} +23 -5
  2. package/dist/esm/chunk-2N3MHFXC.js.map +1 -0
  3. package/dist/esm/{chunk-4G647IUM.js → chunk-MOHFNRAW.js} +2 -2
  4. package/dist/esm/{chunk-UR6FJOYI.js → chunk-WZHLTH2I.js} +2 -2
  5. package/dist/esm/{dist-es-XOZGODLE.js → dist-es-MCMK7LMC.js} +4 -4
  6. package/dist/esm/{dist-es-QWNQVMYC.js → dist-es-YMAKE32J.js} +4 -4
  7. package/dist/esm/{dist-es-JA6GH4HX.js → dist-es-YSZAYJCN.js} +2 -2
  8. package/dist/esm/index.js +47 -16
  9. package/dist/esm/index.js.map +1 -1
  10. package/dist/esm/{loadSso-66ZTLICD.js → loadSso-G7F52TGQ.js} +3 -3
  11. package/dist/esm/{sso-oidc-Z2X56STB.js → sso-oidc-45CVA5J4.js} +3 -3
  12. package/dist/esm/{sts-XINKL27T.js → sts-FE6UEDK6.js} +3 -3
  13. package/dist/index.d.cts +37 -5
  14. package/dist/index.d.ts +37 -5
  15. package/dist/index.js +63 -14
  16. package/dist/index.js.map +1 -1
  17. package/package.json +2 -1
  18. package/dist/esm/chunk-HR3W7R4B.js.map +0 -1
  19. /package/dist/esm/{chunk-4G647IUM.js.map → chunk-MOHFNRAW.js.map} +0 -0
  20. /package/dist/esm/{chunk-UR6FJOYI.js.map → chunk-WZHLTH2I.js.map} +0 -0
  21. /package/dist/esm/{dist-es-XOZGODLE.js.map → dist-es-MCMK7LMC.js.map} +0 -0
  22. /package/dist/esm/{dist-es-QWNQVMYC.js.map → dist-es-YMAKE32J.js.map} +0 -0
  23. /package/dist/esm/{dist-es-JA6GH4HX.js.map → dist-es-YSZAYJCN.js.map} +0 -0
  24. /package/dist/esm/{loadSso-66ZTLICD.js.map → loadSso-G7F52TGQ.js.map} +0 -0
  25. /package/dist/esm/{sso-oidc-Z2X56STB.js.map → sso-oidc-45CVA5J4.js.map} +0 -0
  26. /package/dist/esm/{sts-XINKL27T.js.map → sts-FE6UEDK6.js.map} +0 -0
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  collectBodyString
3
- } from "./chunk-HR3W7R4B.js";
3
+ } from "./chunk-2N3MHFXC.js";
4
4
 
5
5
  // node_modules/@smithy/smithy-client/dist-es/get-value-from-text-node.js
6
6
  var getValueFromTextNode = (obj) => {
@@ -1421,4 +1421,4 @@ export {
1421
1421
  parseXmlErrorBody,
1422
1422
  loadRestXmlErrorCode
1423
1423
  };
1424
- //# sourceMappingURL=chunk-4G647IUM.js.map
1424
+ //# sourceMappingURL=chunk-MOHFNRAW.js.map
@@ -1,7 +1,7 @@
1
1
  import {
2
2
  collectBodyString,
3
3
  extendedEncodeURIComponent
4
- } from "./chunk-HR3W7R4B.js";
4
+ } from "./chunk-2N3MHFXC.js";
5
5
  import {
6
6
  HttpRequest
7
7
  } from "./chunk-D74LA2XQ.js";
@@ -254,4 +254,4 @@ export {
254
254
  parseJsonErrorBody,
255
255
  loadRestJsonErrorCode
256
256
  };
257
- //# sourceMappingURL=chunk-UR6FJOYI.js.map
257
+ //# sourceMappingURL=chunk-WZHLTH2I.js.map
@@ -64,7 +64,7 @@ var resolveAssumeRoleCredentials = async (profileName, profiles, options, visite
64
64
  const profileData = profiles[profileName];
65
65
  const { source_profile, region } = profileData;
66
66
  if (!options.roleAssumer) {
67
- const { getDefaultRoleAssumer } = await import("./sts-XINKL27T.js");
67
+ const { getDefaultRoleAssumer } = await import("./sts-FE6UEDK6.js");
68
68
  options.roleAssumer = getDefaultRoleAssumer({
69
69
  ...options.clientConfig,
70
70
  credentialProviderLogger: options.logger,
@@ -116,7 +116,7 @@ var resolveProcessCredentials = async (options, profile) => import("./dist-es-LL
116
116
 
117
117
  // node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
118
118
  var resolveSsoCredentials = async (profile, profileData, options = {}) => {
119
- const { fromSSO } = await import("./dist-es-QWNQVMYC.js");
119
+ const { fromSSO } = await import("./dist-es-YMAKE32J.js");
120
120
  return fromSSO({
121
121
  profile,
122
122
  logger: options.logger,
@@ -148,7 +148,7 @@ var resolveStaticCredentials = async (profile, options) => {
148
148
 
149
149
  // node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
150
150
  var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
151
- var resolveWebIdentityCredentials = async (profile, options) => import("./dist-es-JA6GH4HX.js").then(({ fromTokenFile }) => fromTokenFile({
151
+ var resolveWebIdentityCredentials = async (profile, options) => import("./dist-es-YSZAYJCN.js").then(({ fromTokenFile }) => fromTokenFile({
152
152
  webIdentityTokenFile: profile.web_identity_token_file,
153
153
  roleArn: profile.role_arn,
154
154
  roleSessionName: profile.role_session_name,
@@ -199,4 +199,4 @@ var fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {
199
199
  export {
200
200
  fromIni
201
201
  };
202
- //# sourceMappingURL=dist-es-XOZGODLE.js.map
202
+ //# sourceMappingURL=dist-es-MCMK7LMC.js.map
@@ -32,7 +32,7 @@ var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the
32
32
 
33
33
  // node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
34
34
  var getSsoOidcClient = async (ssoRegion, init = {}) => {
35
- const { SSOOIDCClient } = await import("./sso-oidc-Z2X56STB.js");
35
+ const { SSOOIDCClient } = await import("./sso-oidc-45CVA5J4.js");
36
36
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
37
37
  region: ssoRegion ?? init.clientConfig?.region,
38
38
  logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
@@ -42,7 +42,7 @@ var getSsoOidcClient = async (ssoRegion, init = {}) => {
42
42
 
43
43
  // node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
44
44
  var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {
45
- const { CreateTokenCommand } = await import("./sso-oidc-Z2X56STB.js");
45
+ const { CreateTokenCommand } = await import("./sso-oidc-45CVA5J4.js");
46
46
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
47
47
  return ssoOidcClient.send(new CreateTokenCommand({
48
48
  clientId: ssoToken.clientId,
@@ -189,7 +189,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
189
189
  });
190
190
  }
191
191
  const { accessToken } = token;
192
- const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-66ZTLICD.js");
192
+ const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-G7F52TGQ.js");
193
193
  const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
194
194
  logger: clientConfig?.logger ?? parentClientConfig?.logger,
195
195
  region: clientConfig?.region ?? ssoRegion
@@ -311,4 +311,4 @@ export {
311
311
  isSsoProfile,
312
312
  validateSsoProfile
313
313
  };
314
- //# sourceMappingURL=dist-es-QWNQVMYC.js.map
314
+ //# sourceMappingURL=dist-es-YMAKE32J.js.map
@@ -15,7 +15,7 @@ var fromWebToken = (init) => async (awsIdentityProperties) => {
15
15
  const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
16
16
  let { roleAssumerWithWebIdentity } = init;
17
17
  if (!roleAssumerWithWebIdentity) {
18
- const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-XINKL27T.js");
18
+ const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-FE6UEDK6.js");
19
19
  roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
20
20
  ...init.clientConfig,
21
21
  credentialProviderLogger: init.logger,
@@ -65,4 +65,4 @@ export {
65
65
  fromTokenFile,
66
66
  fromWebToken
67
67
  };
68
- //# sourceMappingURL=dist-es-JA6GH4HX.js.map
68
+ //# sourceMappingURL=dist-es-YSZAYJCN.js.map
package/dist/esm/index.js CHANGED
@@ -2,7 +2,7 @@ import {
2
2
  loadRestXmlErrorCode,
3
3
  parseXmlBody,
4
4
  parseXmlErrorBody
5
- } from "./chunk-4G647IUM.js";
5
+ } from "./chunk-MOHFNRAW.js";
6
6
  import {
7
7
  ENV_KEY,
8
8
  ENV_SECRET,
@@ -29,7 +29,7 @@ import {
29
29
  parseJsonErrorBody,
30
30
  requestBuilder,
31
31
  take
32
- } from "./chunk-UR6FJOYI.js";
32
+ } from "./chunk-WZHLTH2I.js";
33
33
  import {
34
34
  AwsSdkSigV4ASigner,
35
35
  AwsSdkSigV4Signer,
@@ -96,7 +96,7 @@ import {
96
96
  setFeature,
97
97
  toUint8Array,
98
98
  withBaseException
99
- } from "./chunk-HR3W7R4B.js";
99
+ } from "./chunk-2N3MHFXC.js";
100
100
  import {
101
101
  loadConfig,
102
102
  memoize,
@@ -59452,6 +59452,7 @@ import https from "https";
59452
59452
  import winston from "winston";
59453
59453
  import { Logtail } from "@logtail/node";
59454
59454
  import { LogtailTransport } from "@logtail/winston";
59455
+ import { SSMClient, GetParameterCommand } from "@aws-sdk/client-ssm";
59455
59456
  var localFormat = winston.format.combine(
59456
59457
  winston.format.timestamp({ format: "HH:mm:ss" }),
59457
59458
  winston.format.colorize(),
@@ -59462,22 +59463,52 @@ var localFormat = winston.format.combine(
59462
59463
  return `${timestamp} ${level} ${namespace} ${message}${metaStr}`;
59463
59464
  })
59464
59465
  );
59466
+ var cachedToken = null;
59467
+ var tokenFetchPromise = null;
59468
+ function getBetterStackToken() {
59469
+ if (cachedToken) {
59470
+ return Promise.resolve(cachedToken);
59471
+ }
59472
+ if (tokenFetchPromise) {
59473
+ return tokenFetchPromise;
59474
+ }
59475
+ tokenFetchPromise = (async () => {
59476
+ try {
59477
+ const ssm = new SSMClient({});
59478
+ const command = new GetParameterCommand({
59479
+ Name: "/services/betterstack_token",
59480
+ WithDecryption: true
59481
+ });
59482
+ const response = await ssm.send(command);
59483
+ cachedToken = response.Parameter?.Value ?? null;
59484
+ return cachedToken;
59485
+ } catch (error) {
59486
+ console.warn("Failed to fetch BetterStack token from SSM:", error);
59487
+ return null;
59488
+ }
59489
+ })();
59490
+ return tokenFetchPromise;
59491
+ }
59465
59492
  var logger_default = (namespace, betterStackOptions) => {
59466
59493
  const transports = [new winston.transports.Console()];
59467
- let logtail;
59468
- if (betterStackOptions?.betterstack && betterStackOptions?.betterStackToken && betterStackOptions?.betterStackHost && (process.env.ENV === "prod" || process.env.ENV === "dev")) {
59469
- logtail = new Logtail(betterStackOptions.betterStackToken, {
59470
- endpoint: betterStackOptions.betterStackHost
59471
- });
59472
- transports.push(new LogtailTransport(logtail));
59473
- }
59474
59494
  const logger = winston.createLogger({
59475
59495
  level: "debug",
59476
59496
  format: process.env.ENV === "local" ? localFormat : winston.format.combine(winston.format.timestamp(), winston.format.json()),
59477
59497
  defaultMeta: { service: process.env.AWS_LAMBDA_FUNCTION_NAME, script: namespace },
59478
59498
  transports
59479
59499
  });
59480
- logger.logtail = logtail;
59500
+ logger.logtail = void 0;
59501
+ if (betterStackOptions?.betterstack && betterStackOptions?.betterStackHost && (process.env.ENV === "prod" || process.env.ENV === "dev")) {
59502
+ getBetterStackToken().then((token) => {
59503
+ if (token) {
59504
+ const logtail = new Logtail(token, {
59505
+ endpoint: betterStackOptions.betterStackHost
59506
+ });
59507
+ logger.logtail = logtail;
59508
+ logger.add(new LogtailTransport(logtail));
59509
+ }
59510
+ });
59511
+ }
59481
59512
  return logger;
59482
59513
  };
59483
59514
 
@@ -61123,11 +61154,11 @@ var defaultProvider = (init = {}) => memoize(chain(async () => {
61123
61154
  if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
61124
61155
  throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
61125
61156
  }
61126
- const { fromSSO } = await import("./dist-es-QWNQVMYC.js");
61157
+ const { fromSSO } = await import("./dist-es-YMAKE32J.js");
61127
61158
  return fromSSO(init)();
61128
61159
  }, async () => {
61129
61160
  init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
61130
- const { fromIni } = await import("./dist-es-XOZGODLE.js");
61161
+ const { fromIni } = await import("./dist-es-MCMK7LMC.js");
61131
61162
  return fromIni(init)();
61132
61163
  }, async () => {
61133
61164
  init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
@@ -61135,7 +61166,7 @@ var defaultProvider = (init = {}) => memoize(chain(async () => {
61135
61166
  return fromProcess(init)();
61136
61167
  }, async () => {
61137
61168
  init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
61138
- const { fromTokenFile } = await import("./dist-es-JA6GH4HX.js");
61169
+ const { fromTokenFile } = await import("./dist-es-YSZAYJCN.js");
61139
61170
  return fromTokenFile(init)();
61140
61171
  }, async () => {
61141
61172
  init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
@@ -69519,8 +69550,8 @@ var NotificationTemplateCategories = [
69519
69550
  "scraper"
69520
69551
  ];
69521
69552
  var EventNamesByCategory = {
69522
- automation: ["runError", "runCompleted", "hasnotRun", "fileNotExpected"],
69523
- report: ["runCompleted", "runError"],
69553
+ automation: ["automationFailed", "runCompleted", "hasnotRun", "fileNotExpected"],
69554
+ report: ["reportSuccess", "reportFailed"],
69524
69555
  team: ["newUserSignIn"],
69525
69556
  dataQuality: ["thresholdBreached", "approachingThreshold", "readingOverdue", "readingDueSoon", "contractRenewalUpcoming", "contractRenewalOverdue"],
69526
69557
  discussion: ["commentAdded", "mentionInComment"],