@etainabl/nodejs-sdk 1.3.186 → 1.3.187
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/esm/index.js +42 -31
- package/dist/esm/index.js.map +1 -1
- package/dist/index.d.cts +18 -24
- package/dist/index.d.ts +18 -24
- package/dist/index.js +113 -102
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
package/dist/index.js
CHANGED
|
@@ -818,12 +818,12 @@ var init_loggerMiddleware = __esm({
|
|
|
818
818
|
loggerMiddleware = () => (next, context) => async (args) => {
|
|
819
819
|
try {
|
|
820
820
|
const response = await next(args);
|
|
821
|
-
const { clientName, commandName, logger:
|
|
821
|
+
const { clientName, commandName, logger: logger3, dynamoDbDocumentClientOptions = {} } = context;
|
|
822
822
|
const { overrideInputFilterSensitiveLog, overrideOutputFilterSensitiveLog } = dynamoDbDocumentClientOptions;
|
|
823
823
|
const inputFilterSensitiveLog = overrideInputFilterSensitiveLog ?? context.inputFilterSensitiveLog;
|
|
824
824
|
const outputFilterSensitiveLog = overrideOutputFilterSensitiveLog ?? context.outputFilterSensitiveLog;
|
|
825
825
|
const { $metadata, ...outputWithoutMetadata } = response.output;
|
|
826
|
-
|
|
826
|
+
logger3?.info?.({
|
|
827
827
|
clientName,
|
|
828
828
|
commandName,
|
|
829
829
|
input: inputFilterSensitiveLog(args.input),
|
|
@@ -832,10 +832,10 @@ var init_loggerMiddleware = __esm({
|
|
|
832
832
|
});
|
|
833
833
|
return response;
|
|
834
834
|
} catch (error) {
|
|
835
|
-
const { clientName, commandName, logger:
|
|
835
|
+
const { clientName, commandName, logger: logger3, dynamoDbDocumentClientOptions = {} } = context;
|
|
836
836
|
const { overrideInputFilterSensitiveLog } = dynamoDbDocumentClientOptions;
|
|
837
837
|
const inputFilterSensitiveLog = overrideInputFilterSensitiveLog ?? context.inputFilterSensitiveLog;
|
|
838
|
-
|
|
838
|
+
logger3?.error?.({
|
|
839
839
|
clientName,
|
|
840
840
|
commandName,
|
|
841
841
|
input: inputFilterSensitiveLog(args.input),
|
|
@@ -1594,7 +1594,7 @@ var init_ByteArrayCollector = __esm({
|
|
|
1594
1594
|
});
|
|
1595
1595
|
|
|
1596
1596
|
// node_modules/@smithy/util-stream/dist-es/createBufferedReadableStream.js
|
|
1597
|
-
function createBufferedReadableStream(upstream, size,
|
|
1597
|
+
function createBufferedReadableStream(upstream, size, logger3) {
|
|
1598
1598
|
const reader = upstream.getReader();
|
|
1599
1599
|
let streamBufferingLoggedWarning = false;
|
|
1600
1600
|
let bytesSeen = 0;
|
|
@@ -1632,7 +1632,7 @@ function createBufferedReadableStream(upstream, size, logger2) {
|
|
|
1632
1632
|
const newSize = merge(buffers, mode, chunk3);
|
|
1633
1633
|
if (!streamBufferingLoggedWarning && bytesSeen > size * 2) {
|
|
1634
1634
|
streamBufferingLoggedWarning = true;
|
|
1635
|
-
|
|
1635
|
+
logger3?.warn(`@smithy/util-stream - stream chunk size ${chunkSize} is below threshold of ${size}, automatically buffering.`);
|
|
1636
1636
|
}
|
|
1637
1637
|
if (newSize >= size) {
|
|
1638
1638
|
controller.enqueue(flush(buffers, mode));
|
|
@@ -1692,9 +1692,9 @@ var init_createBufferedReadableStream = __esm({
|
|
|
1692
1692
|
});
|
|
1693
1693
|
|
|
1694
1694
|
// node_modules/@smithy/util-stream/dist-es/createBufferedReadable.js
|
|
1695
|
-
function createBufferedReadable(upstream, size,
|
|
1695
|
+
function createBufferedReadable(upstream, size, logger3) {
|
|
1696
1696
|
if (isReadableStream(upstream)) {
|
|
1697
|
-
return createBufferedReadableStream(upstream, size,
|
|
1697
|
+
return createBufferedReadableStream(upstream, size, logger3);
|
|
1698
1698
|
}
|
|
1699
1699
|
const downstream = new import_node_stream.Readable({ read() {
|
|
1700
1700
|
} });
|
|
@@ -1727,7 +1727,7 @@ function createBufferedReadable(upstream, size, logger2) {
|
|
|
1727
1727
|
const newSize = merge(buffers, mode, chunk3);
|
|
1728
1728
|
if (!streamBufferingLoggedWarning && bytesSeen > size * 2) {
|
|
1729
1729
|
streamBufferingLoggedWarning = true;
|
|
1730
|
-
|
|
1730
|
+
logger3?.warn(`@smithy/util-stream - stream chunk size ${chunkSize} is below threshold of ${size}, automatically buffering.`);
|
|
1731
1731
|
}
|
|
1732
1732
|
if (newSize >= size) {
|
|
1733
1733
|
downstream.push(flush(buffers, mode));
|
|
@@ -2013,7 +2013,7 @@ var init_set_request_timeout = __esm({
|
|
|
2013
2013
|
"node_modules/@smithy/node-http-handler/dist-es/set-request-timeout.js"() {
|
|
2014
2014
|
"use strict";
|
|
2015
2015
|
init_timing();
|
|
2016
|
-
setRequestTimeout = (req, reject, timeoutInMs = 0, throwOnRequestTimeout,
|
|
2016
|
+
setRequestTimeout = (req, reject, timeoutInMs = 0, throwOnRequestTimeout, logger3) => {
|
|
2017
2017
|
if (timeoutInMs) {
|
|
2018
2018
|
return timing.setTimeout(() => {
|
|
2019
2019
|
let msg = `@smithy/node-http-handler - [${throwOnRequestTimeout ? "ERROR" : "WARN"}] a request has exceeded the configured ${timeoutInMs} ms requestTimeout.`;
|
|
@@ -2026,7 +2026,7 @@ var init_set_request_timeout = __esm({
|
|
|
2026
2026
|
reject(error);
|
|
2027
2027
|
} else {
|
|
2028
2028
|
msg += ` Init client requestHandler with throwOnRequestTimeout=true to turn this into an error.`;
|
|
2029
|
-
|
|
2029
|
+
logger3?.warn?.(msg);
|
|
2030
2030
|
}
|
|
2031
2031
|
}, timeoutInMs);
|
|
2032
2032
|
}
|
|
@@ -2184,7 +2184,7 @@ var init_node_http_handler = __esm({
|
|
|
2184
2184
|
}
|
|
2185
2185
|
return new _NodeHttpHandler(instanceOrOptions);
|
|
2186
2186
|
}
|
|
2187
|
-
static checkSocketUsage(agent, socketWarningTimestamp,
|
|
2187
|
+
static checkSocketUsage(agent, socketWarningTimestamp, logger3 = console) {
|
|
2188
2188
|
const { sockets, requests, maxSockets } = agent;
|
|
2189
2189
|
if (typeof maxSockets !== "number" || maxSockets === Infinity) {
|
|
2190
2190
|
return socketWarningTimestamp;
|
|
@@ -2198,7 +2198,7 @@ var init_node_http_handler = __esm({
|
|
|
2198
2198
|
const socketsInUse = sockets[origin]?.length ?? 0;
|
|
2199
2199
|
const requestsEnqueued = requests[origin]?.length ?? 0;
|
|
2200
2200
|
if (socketsInUse >= maxSockets && requestsEnqueued >= 2 * maxSockets) {
|
|
2201
|
-
|
|
2201
|
+
logger3?.warn?.(`@smithy/node-http-handler:WARN - socket usage at capacity=${socketsInUse} and ${requestsEnqueued} additional requests are enqueued.
|
|
2202
2202
|
See https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/node-configuring-maxsockets.html
|
|
2203
2203
|
or increase socketAcquisitionWarningTimeout=(millis) in the NodeHttpHandler config.`);
|
|
2204
2204
|
return Date.now();
|
|
@@ -3286,7 +3286,7 @@ var init_copyDocumentWithTransform = __esm({
|
|
|
3286
3286
|
});
|
|
3287
3287
|
|
|
3288
3288
|
// node_modules/@smithy/core/dist-es/submodules/serde/parse-utils.js
|
|
3289
|
-
var parseBoolean, expectNumber, MAX_FLOAT, expectFloat32, expectLong, expectInt32, expectShort, expectByte, expectSizedInt, castInt, expectNonNull, expectObject, expectString, strictParseFloat32, NUMBER_REGEX, parseNumber, strictParseLong, strictParseInt32, strictParseShort, strictParseByte, stackTraceWarning,
|
|
3289
|
+
var parseBoolean, expectNumber, MAX_FLOAT, expectFloat32, expectLong, expectInt32, expectShort, expectByte, expectSizedInt, castInt, expectNonNull, expectObject, expectString, strictParseFloat32, NUMBER_REGEX, parseNumber, strictParseLong, strictParseInt32, strictParseShort, strictParseByte, stackTraceWarning, logger2;
|
|
3290
3290
|
var init_parse_utils = __esm({
|
|
3291
3291
|
"node_modules/@smithy/core/dist-es/submodules/serde/parse-utils.js"() {
|
|
3292
3292
|
"use strict";
|
|
@@ -3308,7 +3308,7 @@ var init_parse_utils = __esm({
|
|
|
3308
3308
|
const parsed = parseFloat(value);
|
|
3309
3309
|
if (!Number.isNaN(parsed)) {
|
|
3310
3310
|
if (String(parsed) !== String(value)) {
|
|
3311
|
-
|
|
3311
|
+
logger2.warn(stackTraceWarning(`Expected number but observed string: ${value}`));
|
|
3312
3312
|
}
|
|
3313
3313
|
return parsed;
|
|
3314
3314
|
}
|
|
@@ -3384,7 +3384,7 @@ var init_parse_utils = __esm({
|
|
|
3384
3384
|
return value;
|
|
3385
3385
|
}
|
|
3386
3386
|
if (["boolean", "number", "bigint"].includes(typeof value)) {
|
|
3387
|
-
|
|
3387
|
+
logger2.warn(stackTraceWarning(`Expected string, got ${typeof value}: ${value}`));
|
|
3388
3388
|
return String(value);
|
|
3389
3389
|
}
|
|
3390
3390
|
throw new TypeError(`Expected string, got ${typeof value}: ${value}`);
|
|
@@ -3430,7 +3430,7 @@ var init_parse_utils = __esm({
|
|
|
3430
3430
|
stackTraceWarning = (message) => {
|
|
3431
3431
|
return String(new TypeError(message).stack || message).split("\n").slice(0, 5).filter((s7) => !s7.includes("stackTraceWarning")).join("\n");
|
|
3432
3432
|
};
|
|
3433
|
-
|
|
3433
|
+
logger2 = {
|
|
3434
3434
|
warn: console.warn
|
|
3435
3435
|
};
|
|
3436
3436
|
}
|
|
@@ -3996,9 +3996,9 @@ var init_command2 = __esm({
|
|
|
3996
3996
|
this.middlewareStack.use(mw);
|
|
3997
3997
|
}
|
|
3998
3998
|
const stack = clientStack.concat(this.middlewareStack);
|
|
3999
|
-
const { logger:
|
|
3999
|
+
const { logger: logger3 } = configuration;
|
|
4000
4000
|
const handlerExecutionContext = {
|
|
4001
|
-
logger:
|
|
4001
|
+
logger: logger3,
|
|
4002
4002
|
clientName,
|
|
4003
4003
|
commandName,
|
|
4004
4004
|
inputFilterSensitiveLog,
|
|
@@ -5153,11 +5153,11 @@ function resolveUserAgentConfig(input) {
|
|
|
5153
5153
|
userAgentAppId: async () => {
|
|
5154
5154
|
const appId = await normalizedAppIdProvider();
|
|
5155
5155
|
if (!isValidUserAgentAppId(appId)) {
|
|
5156
|
-
const
|
|
5156
|
+
const logger3 = input.logger?.constructor?.name === "NoOpLogger" || !input.logger ? console : input.logger;
|
|
5157
5157
|
if (typeof appId !== "string") {
|
|
5158
|
-
|
|
5158
|
+
logger3?.warn("userAgentAppId must be a string or undefined.");
|
|
5159
5159
|
} else if (appId.length > 50) {
|
|
5160
|
-
|
|
5160
|
+
logger3?.warn("The provided userAgentAppId exceeds the maximum length of 50 characters.");
|
|
5161
5161
|
}
|
|
5162
5162
|
}
|
|
5163
5163
|
return appId;
|
|
@@ -5934,7 +5934,7 @@ var init_resolveEndpoint = __esm({
|
|
|
5934
5934
|
init_types2();
|
|
5935
5935
|
init_utils();
|
|
5936
5936
|
resolveEndpoint = (ruleSetObject, options) => {
|
|
5937
|
-
const { endpointParams, logger:
|
|
5937
|
+
const { endpointParams, logger: logger3 } = options;
|
|
5938
5938
|
const { parameters, rules } = ruleSetObject;
|
|
5939
5939
|
options.logger?.debug?.(`${debugId} Initial EndpointParams: ${toDebugString(endpointParams)}`);
|
|
5940
5940
|
const paramsWithDefault = Object.entries(parameters).filter(([, v8]) => v8.default != null).map(([k7, v8]) => [k7, v8.default]);
|
|
@@ -5949,7 +5949,7 @@ var init_resolveEndpoint = __esm({
|
|
|
5949
5949
|
throw new EndpointError(`Missing required parameter: '${requiredParam}'`);
|
|
5950
5950
|
}
|
|
5951
5951
|
}
|
|
5952
|
-
const endpoint = evaluateRules(rules, { endpointParams, logger:
|
|
5952
|
+
const endpoint = evaluateRules(rules, { endpointParams, logger: logger3, referenceRecord: {} });
|
|
5953
5953
|
options.logger?.debug?.(`${debugId} Resolved endpoint: ${toDebugString(endpoint)}`);
|
|
5954
5954
|
return endpoint;
|
|
5955
5955
|
};
|
|
@@ -6789,19 +6789,19 @@ var init_ProviderError = __esm({
|
|
|
6789
6789
|
name = "ProviderError";
|
|
6790
6790
|
tryNextLink;
|
|
6791
6791
|
constructor(message, options = true) {
|
|
6792
|
-
let
|
|
6792
|
+
let logger3;
|
|
6793
6793
|
let tryNextLink = true;
|
|
6794
6794
|
if (typeof options === "boolean") {
|
|
6795
|
-
|
|
6795
|
+
logger3 = void 0;
|
|
6796
6796
|
tryNextLink = options;
|
|
6797
6797
|
} else if (options != null && typeof options === "object") {
|
|
6798
|
-
|
|
6798
|
+
logger3 = options.logger;
|
|
6799
6799
|
tryNextLink = options.tryNextLink ?? true;
|
|
6800
6800
|
}
|
|
6801
6801
|
super(message);
|
|
6802
6802
|
this.tryNextLink = tryNextLink;
|
|
6803
6803
|
Object.setPrototypeOf(this, _ProviderError.prototype);
|
|
6804
|
-
|
|
6804
|
+
logger3?.debug?.(`@smithy/property-provider ${tryNextLink ? "->" : "(!)"} ${message}`);
|
|
6805
6805
|
}
|
|
6806
6806
|
static from(error, options = true) {
|
|
6807
6807
|
return Object.assign(new this(error.message, options), error);
|
|
@@ -10521,8 +10521,8 @@ var init_configLoader = __esm({
|
|
|
10521
10521
|
init_fromSharedConfigFiles();
|
|
10522
10522
|
init_fromStatic2();
|
|
10523
10523
|
loadConfig = ({ environmentVariableSelector, configFileSelector, default: defaultValue }, configuration = {}) => {
|
|
10524
|
-
const { signingName, logger:
|
|
10525
|
-
const envOptions = { signingName, logger:
|
|
10524
|
+
const { signingName, logger: logger3 } = configuration;
|
|
10525
|
+
const envOptions = { signingName, logger: logger3 };
|
|
10526
10526
|
return memoize(chain(fromEnv(environmentVariableSelector, envOptions), fromSharedConfigFiles(configFileSelector, configuration), fromStatic2(defaultValue)));
|
|
10527
10527
|
};
|
|
10528
10528
|
}
|
|
@@ -11631,7 +11631,7 @@ var init_fromContainerMetadata = __esm({
|
|
|
11631
11631
|
"http:": true,
|
|
11632
11632
|
"https:": true
|
|
11633
11633
|
};
|
|
11634
|
-
getCmdsUri = async ({ logger:
|
|
11634
|
+
getCmdsUri = async ({ logger: logger3 }) => {
|
|
11635
11635
|
if (process.env[ENV_CMDS_RELATIVE_URI]) {
|
|
11636
11636
|
return {
|
|
11637
11637
|
hostname: CMDS_IP,
|
|
@@ -11643,13 +11643,13 @@ var init_fromContainerMetadata = __esm({
|
|
|
11643
11643
|
if (!parsed.hostname || !(parsed.hostname in GREENGRASS_HOSTS)) {
|
|
11644
11644
|
throw new CredentialsProviderError(`${parsed.hostname} is not a valid container metadata service hostname`, {
|
|
11645
11645
|
tryNextLink: false,
|
|
11646
|
-
logger:
|
|
11646
|
+
logger: logger3
|
|
11647
11647
|
});
|
|
11648
11648
|
}
|
|
11649
11649
|
if (!parsed.protocol || !(parsed.protocol in GREENGRASS_PROTOCOLS)) {
|
|
11650
11650
|
throw new CredentialsProviderError(`${parsed.protocol} is not a valid container metadata service protocol`, {
|
|
11651
11651
|
tryNextLink: false,
|
|
11652
|
-
logger:
|
|
11652
|
+
logger: logger3
|
|
11653
11653
|
});
|
|
11654
11654
|
}
|
|
11655
11655
|
return {
|
|
@@ -11659,7 +11659,7 @@ var init_fromContainerMetadata = __esm({
|
|
|
11659
11659
|
}
|
|
11660
11660
|
throw new CredentialsProviderError(`The container metadata credential provider cannot be used unless the ${ENV_CMDS_RELATIVE_URI} or ${ENV_CMDS_FULL_URI} environment variable is set`, {
|
|
11661
11661
|
tryNextLink: false,
|
|
11662
|
-
logger:
|
|
11662
|
+
logger: logger3
|
|
11663
11663
|
});
|
|
11664
11664
|
};
|
|
11665
11665
|
}
|
|
@@ -11773,10 +11773,10 @@ var init_getExtendedInstanceMetadataCredentials = __esm({
|
|
|
11773
11773
|
STATIC_STABILITY_REFRESH_INTERVAL_SECONDS = 5 * 60;
|
|
11774
11774
|
STATIC_STABILITY_REFRESH_INTERVAL_JITTER_WINDOW_SECONDS = 5 * 60;
|
|
11775
11775
|
STATIC_STABILITY_DOC_URL = "https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html";
|
|
11776
|
-
getExtendedInstanceMetadataCredentials = (credentials,
|
|
11776
|
+
getExtendedInstanceMetadataCredentials = (credentials, logger3) => {
|
|
11777
11777
|
const refreshInterval = STATIC_STABILITY_REFRESH_INTERVAL_SECONDS + Math.floor(Math.random() * STATIC_STABILITY_REFRESH_INTERVAL_JITTER_WINDOW_SECONDS);
|
|
11778
11778
|
const newExpiration = new Date(Date.now() + refreshInterval * 1e3);
|
|
11779
|
-
|
|
11779
|
+
logger3.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(newExpiration)}.
|
|
11780
11780
|
For more information, please visit: ` + STATIC_STABILITY_DOC_URL);
|
|
11781
11781
|
const originalExpiration = credentials.originalExpiration ?? credentials.expiration;
|
|
11782
11782
|
return {
|
|
@@ -11795,19 +11795,19 @@ var init_staticStabilityProvider = __esm({
|
|
|
11795
11795
|
"use strict";
|
|
11796
11796
|
init_getExtendedInstanceMetadataCredentials();
|
|
11797
11797
|
staticStabilityProvider = (provider, options = {}) => {
|
|
11798
|
-
const
|
|
11798
|
+
const logger3 = options?.logger || console;
|
|
11799
11799
|
let pastCredentials;
|
|
11800
11800
|
return async () => {
|
|
11801
11801
|
let credentials;
|
|
11802
11802
|
try {
|
|
11803
11803
|
credentials = await provider();
|
|
11804
11804
|
if (credentials.expiration && credentials.expiration.getTime() < Date.now()) {
|
|
11805
|
-
credentials = getExtendedInstanceMetadataCredentials(credentials,
|
|
11805
|
+
credentials = getExtendedInstanceMetadataCredentials(credentials, logger3);
|
|
11806
11806
|
}
|
|
11807
11807
|
} catch (e7) {
|
|
11808
11808
|
if (pastCredentials) {
|
|
11809
|
-
|
|
11810
|
-
credentials = getExtendedInstanceMetadataCredentials(pastCredentials,
|
|
11809
|
+
logger3.warn("Credential renew failed: ", e7);
|
|
11810
|
+
credentials = getExtendedInstanceMetadataCredentials(pastCredentials, logger3);
|
|
11811
11811
|
} else {
|
|
11812
11812
|
throw e7;
|
|
11813
11813
|
}
|
|
@@ -11841,7 +11841,7 @@ var init_fromInstanceMetadata = __esm({
|
|
|
11841
11841
|
fromInstanceMetadata = (init = {}) => staticStabilityProvider(getInstanceMetadataProvider(init), { logger: init.logger });
|
|
11842
11842
|
getInstanceMetadataProvider = (init = {}) => {
|
|
11843
11843
|
let disableFetchToken = false;
|
|
11844
|
-
const { logger:
|
|
11844
|
+
const { logger: logger3, profile } = init;
|
|
11845
11845
|
const { timeout, maxRetries } = providerConfigFromInit(init);
|
|
11846
11846
|
const getCredentials2 = async (maxRetries2, options) => {
|
|
11847
11847
|
const isImdsV1Fallback = disableFetchToken || options.headers?.[X_AWS_EC2_METADATA_TOKEN] == null;
|
|
@@ -11905,7 +11905,7 @@ var init_fromInstanceMetadata = __esm({
|
|
|
11905
11905
|
return async () => {
|
|
11906
11906
|
const endpoint = await getInstanceMetadataEndpoint();
|
|
11907
11907
|
if (disableFetchToken) {
|
|
11908
|
-
|
|
11908
|
+
logger3?.debug("AWS SDK Instance Metadata", "using v1 fallback (no token fetch)");
|
|
11909
11909
|
return getCredentials2(maxRetries, { ...endpoint, timeout });
|
|
11910
11910
|
} else {
|
|
11911
11911
|
let token;
|
|
@@ -11919,7 +11919,7 @@ var init_fromInstanceMetadata = __esm({
|
|
|
11919
11919
|
} else if (error.message === "TimeoutError" || [403, 404, 405].includes(error.statusCode)) {
|
|
11920
11920
|
disableFetchToken = true;
|
|
11921
11921
|
}
|
|
11922
|
-
|
|
11922
|
+
logger3?.debug("AWS SDK Instance Metadata", "using v1 fallback (initial)");
|
|
11923
11923
|
return getCredentials2(maxRetries, { ...endpoint, timeout });
|
|
11924
11924
|
}
|
|
11925
11925
|
return getCredentials2(maxRetries, {
|
|
@@ -12000,7 +12000,7 @@ var init_checkUrl = __esm({
|
|
|
12000
12000
|
ECS_CONTAINER_HOST = "169.254.170.2";
|
|
12001
12001
|
EKS_CONTAINER_HOST_IPv4 = "169.254.170.23";
|
|
12002
12002
|
EKS_CONTAINER_HOST_IPv6 = "[fd00:ec2::23]";
|
|
12003
|
-
checkUrl = (url,
|
|
12003
|
+
checkUrl = (url, logger3) => {
|
|
12004
12004
|
if (url.protocol === "https:") {
|
|
12005
12005
|
return;
|
|
12006
12006
|
}
|
|
@@ -12027,7 +12027,7 @@ var init_checkUrl = __esm({
|
|
|
12027
12027
|
throw new CredentialsProviderError(`URL not accepted. It must either be HTTPS or match one of the following:
|
|
12028
12028
|
- loopback CIDR 127.0.0.0/8 or [::1/128]
|
|
12029
12029
|
- ECS container host 169.254.170.2
|
|
12030
|
-
- EKS container host 169.254.170.23 or [fd00:ec2::23]`, { logger:
|
|
12030
|
+
- EKS container host 169.254.170.23 or [fd00:ec2::23]`, { logger: logger3 });
|
|
12031
12031
|
};
|
|
12032
12032
|
}
|
|
12033
12033
|
});
|
|
@@ -12046,13 +12046,13 @@ function createGetRequest(url) {
|
|
|
12046
12046
|
fragment: url.hash
|
|
12047
12047
|
});
|
|
12048
12048
|
}
|
|
12049
|
-
async function getCredentials(response,
|
|
12049
|
+
async function getCredentials(response, logger3) {
|
|
12050
12050
|
const stream = sdkStreamMixin2(response.body);
|
|
12051
12051
|
const str = await stream.transformToString();
|
|
12052
12052
|
if (response.statusCode === 200) {
|
|
12053
12053
|
const parsed = JSON.parse(str);
|
|
12054
12054
|
if (typeof parsed.AccessKeyId !== "string" || typeof parsed.SecretAccessKey !== "string" || typeof parsed.Token !== "string" || typeof parsed.Expiration !== "string") {
|
|
12055
|
-
throw new CredentialsProviderError("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }", { logger:
|
|
12055
|
+
throw new CredentialsProviderError("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }", { logger: logger3 });
|
|
12056
12056
|
}
|
|
12057
12057
|
return {
|
|
12058
12058
|
accessKeyId: parsed.AccessKeyId,
|
|
@@ -12067,12 +12067,12 @@ async function getCredentials(response, logger2) {
|
|
|
12067
12067
|
parsedBody = JSON.parse(str);
|
|
12068
12068
|
} catch (e7) {
|
|
12069
12069
|
}
|
|
12070
|
-
throw Object.assign(new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger:
|
|
12070
|
+
throw Object.assign(new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger: logger3 }), {
|
|
12071
12071
|
Code: parsedBody.Code,
|
|
12072
12072
|
Message: parsedBody.Message
|
|
12073
12073
|
});
|
|
12074
12074
|
}
|
|
12075
|
-
throw new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger:
|
|
12075
|
+
throw new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger: logger3 });
|
|
12076
12076
|
}
|
|
12077
12077
|
var init_requestHelpers = __esm({
|
|
12078
12078
|
"node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js"() {
|
|
@@ -14762,7 +14762,7 @@ var init_resolveSSOCredentials = __esm({
|
|
|
14762
14762
|
init_dist_es26();
|
|
14763
14763
|
init_dist_es34();
|
|
14764
14764
|
SHOULD_FAIL_CREDENTIAL_CHAIN = false;
|
|
14765
|
-
resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger:
|
|
14765
|
+
resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger: logger3 }) => {
|
|
14766
14766
|
let token;
|
|
14767
14767
|
const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
|
|
14768
14768
|
if (ssoSession) {
|
|
@@ -14775,7 +14775,7 @@ var init_resolveSSOCredentials = __esm({
|
|
|
14775
14775
|
} catch (e7) {
|
|
14776
14776
|
throw new CredentialsProviderError(e7.message, {
|
|
14777
14777
|
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
14778
|
-
logger:
|
|
14778
|
+
logger: logger3
|
|
14779
14779
|
});
|
|
14780
14780
|
}
|
|
14781
14781
|
} else {
|
|
@@ -14784,14 +14784,14 @@ var init_resolveSSOCredentials = __esm({
|
|
|
14784
14784
|
} catch (e7) {
|
|
14785
14785
|
throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {
|
|
14786
14786
|
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
14787
|
-
logger:
|
|
14787
|
+
logger: logger3
|
|
14788
14788
|
});
|
|
14789
14789
|
}
|
|
14790
14790
|
}
|
|
14791
14791
|
if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {
|
|
14792
14792
|
throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {
|
|
14793
14793
|
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
14794
|
-
logger:
|
|
14794
|
+
logger: logger3
|
|
14795
14795
|
});
|
|
14796
14796
|
}
|
|
14797
14797
|
const { accessToken } = token;
|
|
@@ -14810,14 +14810,14 @@ var init_resolveSSOCredentials = __esm({
|
|
|
14810
14810
|
} catch (e7) {
|
|
14811
14811
|
throw new CredentialsProviderError(e7, {
|
|
14812
14812
|
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
14813
|
-
logger:
|
|
14813
|
+
logger: logger3
|
|
14814
14814
|
});
|
|
14815
14815
|
}
|
|
14816
14816
|
const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {} } = ssoResp;
|
|
14817
14817
|
if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
|
|
14818
14818
|
throw new CredentialsProviderError("SSO returns an invalid temporary credential.", {
|
|
14819
14819
|
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
14820
|
-
logger:
|
|
14820
|
+
logger: logger3
|
|
14821
14821
|
});
|
|
14822
14822
|
}
|
|
14823
14823
|
const credentials = {
|
|
@@ -14844,11 +14844,11 @@ var init_validateSsoProfile = __esm({
|
|
|
14844
14844
|
"node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js"() {
|
|
14845
14845
|
"use strict";
|
|
14846
14846
|
init_dist_es26();
|
|
14847
|
-
validateSsoProfile = (profile,
|
|
14847
|
+
validateSsoProfile = (profile, logger3) => {
|
|
14848
14848
|
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
|
|
14849
14849
|
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
|
|
14850
14850
|
throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}
|
|
14851
|
-
Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger:
|
|
14851
|
+
Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger: logger3 });
|
|
14852
14852
|
}
|
|
14853
14853
|
return profile;
|
|
14854
14854
|
};
|
|
@@ -14964,21 +14964,21 @@ var init_resolveCredentialSource = __esm({
|
|
|
14964
14964
|
"use strict";
|
|
14965
14965
|
init_client3();
|
|
14966
14966
|
init_dist_es26();
|
|
14967
|
-
resolveCredentialSource = (credentialSource, profileName,
|
|
14967
|
+
resolveCredentialSource = (credentialSource, profileName, logger3) => {
|
|
14968
14968
|
const sourceProvidersMap = {
|
|
14969
14969
|
EcsContainer: async (options) => {
|
|
14970
14970
|
const { fromHttp: fromHttp2 } = await Promise.resolve().then(() => (init_dist_es42(), dist_es_exports3));
|
|
14971
14971
|
const { fromContainerMetadata: fromContainerMetadata2 } = await Promise.resolve().then(() => (init_dist_es41(), dist_es_exports2));
|
|
14972
|
-
|
|
14972
|
+
logger3?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
|
|
14973
14973
|
return async () => chain(fromHttp2(options ?? {}), fromContainerMetadata2(options))().then(setNamedProvider);
|
|
14974
14974
|
},
|
|
14975
14975
|
Ec2InstanceMetadata: async (options) => {
|
|
14976
|
-
|
|
14976
|
+
logger3?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
|
|
14977
14977
|
const { fromInstanceMetadata: fromInstanceMetadata2 } = await Promise.resolve().then(() => (init_dist_es41(), dist_es_exports2));
|
|
14978
14978
|
return async () => fromInstanceMetadata2(options)().then(setNamedProvider);
|
|
14979
14979
|
},
|
|
14980
14980
|
Environment: async (options) => {
|
|
14981
|
-
|
|
14981
|
+
logger3?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
|
|
14982
14982
|
const { fromEnv: fromEnv3 } = await Promise.resolve().then(() => (init_dist_es40(), dist_es_exports));
|
|
14983
14983
|
return async () => fromEnv3(options)().then(setNamedProvider);
|
|
14984
14984
|
}
|
|
@@ -14986,7 +14986,7 @@ var init_resolveCredentialSource = __esm({
|
|
|
14986
14986
|
if (credentialSource in sourceProvidersMap) {
|
|
14987
14987
|
return sourceProvidersMap[credentialSource];
|
|
14988
14988
|
} else {
|
|
14989
|
-
throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger:
|
|
14989
|
+
throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger: logger3 });
|
|
14990
14990
|
}
|
|
14991
14991
|
};
|
|
14992
14992
|
setNamedProvider = (creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p");
|
|
@@ -16140,7 +16140,7 @@ var init_defaultStsRoleAssumers = __esm({
|
|
|
16140
16140
|
return async (sourceCreds, params) => {
|
|
16141
16141
|
closureSourceCreds = sourceCreds;
|
|
16142
16142
|
if (!stsClient) {
|
|
16143
|
-
const { logger:
|
|
16143
|
+
const { logger: logger3 = stsOptions?.parentClientConfig?.logger, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger } = stsOptions;
|
|
16144
16144
|
const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger);
|
|
16145
16145
|
const isCompatibleRequestHandler = !isH2(requestHandler);
|
|
16146
16146
|
stsClient = new STSClient2({
|
|
@@ -16148,7 +16148,7 @@ var init_defaultStsRoleAssumers = __esm({
|
|
|
16148
16148
|
credentialDefaultProvider: () => async () => closureSourceCreds,
|
|
16149
16149
|
region: resolvedRegion,
|
|
16150
16150
|
requestHandler: isCompatibleRequestHandler ? requestHandler : void 0,
|
|
16151
|
-
logger:
|
|
16151
|
+
logger: logger3
|
|
16152
16152
|
});
|
|
16153
16153
|
}
|
|
16154
16154
|
const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleCommand(params));
|
|
@@ -16172,14 +16172,14 @@ var init_defaultStsRoleAssumers = __esm({
|
|
|
16172
16172
|
let stsClient;
|
|
16173
16173
|
return async (params) => {
|
|
16174
16174
|
if (!stsClient) {
|
|
16175
|
-
const { logger:
|
|
16175
|
+
const { logger: logger3 = stsOptions?.parentClientConfig?.logger, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger } = stsOptions;
|
|
16176
16176
|
const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger);
|
|
16177
16177
|
const isCompatibleRequestHandler = !isH2(requestHandler);
|
|
16178
16178
|
stsClient = new STSClient2({
|
|
16179
16179
|
profile: stsOptions?.parentClientConfig?.profile,
|
|
16180
16180
|
region: resolvedRegion,
|
|
16181
16181
|
requestHandler: isCompatibleRequestHandler ? requestHandler : void 0,
|
|
16182
|
-
logger:
|
|
16182
|
+
logger: logger3
|
|
16183
16183
|
});
|
|
16184
16184
|
}
|
|
16185
16185
|
const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));
|
|
@@ -16285,20 +16285,20 @@ var init_resolveAssumeRoleCredentials = __esm({
|
|
|
16285
16285
|
init_dist_es34();
|
|
16286
16286
|
init_resolveCredentialSource();
|
|
16287
16287
|
init_resolveProfileData();
|
|
16288
|
-
isAssumeRoleProfile = (arg, { profile = "default", logger:
|
|
16289
|
-
return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger:
|
|
16288
|
+
isAssumeRoleProfile = (arg, { profile = "default", logger: logger3 } = {}) => {
|
|
16289
|
+
return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger: logger3 }) || isCredentialSourceProfile(arg, { profile, logger: logger3 }));
|
|
16290
16290
|
};
|
|
16291
|
-
isAssumeRoleWithSourceProfile = (arg, { profile, logger:
|
|
16291
|
+
isAssumeRoleWithSourceProfile = (arg, { profile, logger: logger3 }) => {
|
|
16292
16292
|
const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
16293
16293
|
if (withSourceProfile) {
|
|
16294
|
-
|
|
16294
|
+
logger3?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
|
|
16295
16295
|
}
|
|
16296
16296
|
return withSourceProfile;
|
|
16297
16297
|
};
|
|
16298
|
-
isCredentialSourceProfile = (arg, { profile, logger:
|
|
16298
|
+
isCredentialSourceProfile = (arg, { profile, logger: logger3 }) => {
|
|
16299
16299
|
const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
16300
16300
|
if (withProviderProfile) {
|
|
16301
|
-
|
|
16301
|
+
logger3?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
|
|
16302
16302
|
}
|
|
16303
16303
|
return withProviderProfile;
|
|
16304
16304
|
};
|
|
@@ -16399,7 +16399,7 @@ var init_resolveProcessCredentials = __esm({
|
|
|
16399
16399
|
import_child_process = require("child_process");
|
|
16400
16400
|
import_util5 = require("util");
|
|
16401
16401
|
init_getValidatedProcessCredentials();
|
|
16402
|
-
resolveProcessCredentials = async (profileName, profiles,
|
|
16402
|
+
resolveProcessCredentials = async (profileName, profiles, logger3) => {
|
|
16403
16403
|
const profile = profiles[profileName];
|
|
16404
16404
|
if (profiles[profileName]) {
|
|
16405
16405
|
const credentialProcess = profile["credential_process"];
|
|
@@ -16415,14 +16415,14 @@ var init_resolveProcessCredentials = __esm({
|
|
|
16415
16415
|
}
|
|
16416
16416
|
return getValidatedProcessCredentials(profileName, data, profiles);
|
|
16417
16417
|
} catch (error) {
|
|
16418
|
-
throw new CredentialsProviderError(error.message, { logger:
|
|
16418
|
+
throw new CredentialsProviderError(error.message, { logger: logger3 });
|
|
16419
16419
|
}
|
|
16420
16420
|
} else {
|
|
16421
|
-
throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger:
|
|
16421
|
+
throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger: logger3 });
|
|
16422
16422
|
}
|
|
16423
16423
|
} else {
|
|
16424
16424
|
throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {
|
|
16425
|
-
logger:
|
|
16425
|
+
logger: logger3
|
|
16426
16426
|
});
|
|
16427
16427
|
}
|
|
16428
16428
|
};
|
|
@@ -22185,8 +22185,8 @@ __export(index_exports, {
|
|
|
22185
22185
|
emailTemplate: () => emailTemplate_default,
|
|
22186
22186
|
integrations: () => integrations_exports,
|
|
22187
22187
|
logger: () => logger_default,
|
|
22188
|
+
loggerWithBetterStack: () => loggerWithBetterStack,
|
|
22188
22189
|
monitoring: () => monitoring_exports,
|
|
22189
|
-
notification: () => notification_exports,
|
|
22190
22190
|
notificationEmailTemplate: () => notificationEmailTemplate_default,
|
|
22191
22191
|
notificationQueue: () => notificationQueue_exports,
|
|
22192
22192
|
openai: () => openai_exports,
|
|
@@ -22243,28 +22243,42 @@ function getBetterStackToken() {
|
|
|
22243
22243
|
})();
|
|
22244
22244
|
return tokenFetchPromise;
|
|
22245
22245
|
}
|
|
22246
|
-
|
|
22246
|
+
function createBaseLogger(namespace, options) {
|
|
22247
22247
|
const transports = [new import_winston.default.transports.Console()];
|
|
22248
|
-
const
|
|
22248
|
+
const defaultMeta = {
|
|
22249
|
+
service: process.env.AWS_LAMBDA_FUNCTION_NAME,
|
|
22250
|
+
script: namespace
|
|
22251
|
+
};
|
|
22252
|
+
if (options?.feature) {
|
|
22253
|
+
defaultMeta.feature = options.feature;
|
|
22254
|
+
}
|
|
22255
|
+
const logger3 = import_winston.default.createLogger({
|
|
22249
22256
|
level: "debug",
|
|
22250
22257
|
format: process.env.ENV === "local" ? localFormat : import_winston.default.format.combine(import_winston.default.format.timestamp(), import_winston.default.format.json()),
|
|
22251
|
-
defaultMeta
|
|
22258
|
+
defaultMeta,
|
|
22252
22259
|
transports
|
|
22253
22260
|
});
|
|
22254
|
-
|
|
22255
|
-
|
|
22256
|
-
|
|
22257
|
-
|
|
22258
|
-
|
|
22259
|
-
|
|
22260
|
-
|
|
22261
|
-
|
|
22262
|
-
|
|
22263
|
-
|
|
22264
|
-
|
|
22261
|
+
logger3.logtail = void 0;
|
|
22262
|
+
return logger3;
|
|
22263
|
+
}
|
|
22264
|
+
function logger(namespace, options) {
|
|
22265
|
+
return createBaseLogger(namespace, options);
|
|
22266
|
+
}
|
|
22267
|
+
async function loggerWithBetterStack(namespace, options) {
|
|
22268
|
+
const baseLogger2 = createBaseLogger(namespace, options);
|
|
22269
|
+
const betterStackHost = process.env.BETTERSTACK_HOST;
|
|
22270
|
+
if (betterStackHost && (process.env.ENV === "prod" || process.env.ENV === "dev")) {
|
|
22271
|
+
const token = await getBetterStackToken();
|
|
22272
|
+
if (token) {
|
|
22273
|
+
const endpoint = betterStackHost.startsWith("https://") ? betterStackHost : `https://${betterStackHost}`;
|
|
22274
|
+
const logtail = new import_node.Logtail(token, { endpoint });
|
|
22275
|
+
baseLogger2.logtail = logtail;
|
|
22276
|
+
baseLogger2.add(new import_winston2.LogtailTransport(logtail));
|
|
22277
|
+
}
|
|
22265
22278
|
}
|
|
22266
|
-
return
|
|
22267
|
-
}
|
|
22279
|
+
return baseLogger2;
|
|
22280
|
+
}
|
|
22281
|
+
var logger_default = logger;
|
|
22268
22282
|
|
|
22269
22283
|
// src/api.ts
|
|
22270
22284
|
var log = logger_default("etainablApi");
|
|
@@ -23198,9 +23212,6 @@ var slack_default = {
|
|
|
23198
23212
|
postMessage
|
|
23199
23213
|
};
|
|
23200
23214
|
|
|
23201
|
-
// src/notification.ts
|
|
23202
|
-
var notification_exports = {};
|
|
23203
|
-
|
|
23204
23215
|
// src/notificationQueue.ts
|
|
23205
23216
|
var notificationQueue_exports = {};
|
|
23206
23217
|
__export(notificationQueue_exports, {
|
|
@@ -23227,12 +23238,12 @@ function queueUrlMiddleware({ useQueueUrlAsEndpoint, endpoint }) {
|
|
|
23227
23238
|
const { input } = args;
|
|
23228
23239
|
const resolvedEndpoint = context.endpointV2;
|
|
23229
23240
|
if (!endpoint && input.QueueUrl && resolvedEndpoint && useQueueUrlAsEndpoint) {
|
|
23230
|
-
const
|
|
23241
|
+
const logger3 = context.logger instanceof NoOpLogger || !context.logger?.warn ? console : context.logger;
|
|
23231
23242
|
try {
|
|
23232
23243
|
const queueUrl = new URL(input.QueueUrl);
|
|
23233
23244
|
const queueUrlOrigin = new URL(queueUrl.origin);
|
|
23234
23245
|
if (resolvedEndpoint.url.origin !== queueUrlOrigin.origin) {
|
|
23235
|
-
|
|
23246
|
+
logger3.warn(`QueueUrl=${input.QueueUrl} differs from SQSClient resolved endpoint=${resolvedEndpoint.url.toString()}, using QueueUrl host as endpoint.
|
|
23236
23247
|
Set [endpoint=string] or [useQueueUrlAsEndpoint=false] on the SQSClient.`);
|
|
23237
23248
|
context.endpointV2 = {
|
|
23238
23249
|
...resolvedEndpoint,
|
|
@@ -23240,7 +23251,7 @@ Set [endpoint=string] or [useQueueUrlAsEndpoint=false] on the SQSClient.`);
|
|
|
23240
23251
|
};
|
|
23241
23252
|
}
|
|
23242
23253
|
} catch (e7) {
|
|
23243
|
-
|
|
23254
|
+
logger3.warn(e7);
|
|
23244
23255
|
}
|
|
23245
23256
|
}
|
|
23246
23257
|
return next(args);
|
|
@@ -26661,7 +26672,7 @@ init_dist_es16();
|
|
|
26661
26672
|
var getChecksum = async (body, { checksumAlgorithmFn, base64Encoder }) => base64Encoder(await stringHasher(checksumAlgorithmFn, body));
|
|
26662
26673
|
|
|
26663
26674
|
// node_modules/@aws-sdk/middleware-flexible-checksums/dist-es/validateChecksumFromResponse.js
|
|
26664
|
-
var validateChecksumFromResponse = async (response, { config, responseAlgorithms, logger:
|
|
26675
|
+
var validateChecksumFromResponse = async (response, { config, responseAlgorithms, logger: logger3 }) => {
|
|
26665
26676
|
const checksumAlgorithms = getChecksumAlgorithmListForResponse(responseAlgorithms);
|
|
26666
26677
|
const { body: responseBody, headers: responseHeaders } = response;
|
|
26667
26678
|
for (const algorithm of checksumAlgorithms) {
|
|
@@ -26673,7 +26684,7 @@ var validateChecksumFromResponse = async (response, { config, responseAlgorithms
|
|
|
26673
26684
|
checksumAlgorithmFn = selectChecksumAlgorithmFunction(algorithm, config);
|
|
26674
26685
|
} catch (error) {
|
|
26675
26686
|
if (algorithm === ChecksumAlgorithm.CRC64NVME) {
|
|
26676
|
-
|
|
26687
|
+
logger3?.warn(`Skipping ${ChecksumAlgorithm.CRC64NVME} checksum validation: ${error.message}`);
|
|
26677
26688
|
continue;
|
|
26678
26689
|
}
|
|
26679
26690
|
throw error;
|
|
@@ -32453,8 +32464,8 @@ var EventNamesByCategory = {
|
|
|
32453
32464
|
emailTemplate,
|
|
32454
32465
|
integrations,
|
|
32455
32466
|
logger,
|
|
32467
|
+
loggerWithBetterStack,
|
|
32456
32468
|
monitoring,
|
|
32457
|
-
notification,
|
|
32458
32469
|
notificationEmailTemplate,
|
|
32459
32470
|
notificationQueue,
|
|
32460
32471
|
openai,
|