@etainabl/nodejs-sdk 1.3.186 → 1.3.188

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.js CHANGED
@@ -818,12 +818,12 @@ var init_loggerMiddleware = __esm({
818
818
  loggerMiddleware = () => (next, context) => async (args) => {
819
819
  try {
820
820
  const response = await next(args);
821
- const { clientName, commandName, logger: logger2, dynamoDbDocumentClientOptions = {} } = context;
821
+ const { clientName, commandName, logger: logger3, dynamoDbDocumentClientOptions = {} } = context;
822
822
  const { overrideInputFilterSensitiveLog, overrideOutputFilterSensitiveLog } = dynamoDbDocumentClientOptions;
823
823
  const inputFilterSensitiveLog = overrideInputFilterSensitiveLog ?? context.inputFilterSensitiveLog;
824
824
  const outputFilterSensitiveLog = overrideOutputFilterSensitiveLog ?? context.outputFilterSensitiveLog;
825
825
  const { $metadata, ...outputWithoutMetadata } = response.output;
826
- logger2?.info?.({
826
+ logger3?.info?.({
827
827
  clientName,
828
828
  commandName,
829
829
  input: inputFilterSensitiveLog(args.input),
@@ -832,10 +832,10 @@ var init_loggerMiddleware = __esm({
832
832
  });
833
833
  return response;
834
834
  } catch (error) {
835
- const { clientName, commandName, logger: logger2, dynamoDbDocumentClientOptions = {} } = context;
835
+ const { clientName, commandName, logger: logger3, dynamoDbDocumentClientOptions = {} } = context;
836
836
  const { overrideInputFilterSensitiveLog } = dynamoDbDocumentClientOptions;
837
837
  const inputFilterSensitiveLog = overrideInputFilterSensitiveLog ?? context.inputFilterSensitiveLog;
838
- logger2?.error?.({
838
+ logger3?.error?.({
839
839
  clientName,
840
840
  commandName,
841
841
  input: inputFilterSensitiveLog(args.input),
@@ -1594,7 +1594,7 @@ var init_ByteArrayCollector = __esm({
1594
1594
  });
1595
1595
 
1596
1596
  // node_modules/@smithy/util-stream/dist-es/createBufferedReadableStream.js
1597
- function createBufferedReadableStream(upstream, size, logger2) {
1597
+ function createBufferedReadableStream(upstream, size, logger3) {
1598
1598
  const reader = upstream.getReader();
1599
1599
  let streamBufferingLoggedWarning = false;
1600
1600
  let bytesSeen = 0;
@@ -1632,7 +1632,7 @@ function createBufferedReadableStream(upstream, size, logger2) {
1632
1632
  const newSize = merge(buffers, mode, chunk3);
1633
1633
  if (!streamBufferingLoggedWarning && bytesSeen > size * 2) {
1634
1634
  streamBufferingLoggedWarning = true;
1635
- logger2?.warn(`@smithy/util-stream - stream chunk size ${chunkSize} is below threshold of ${size}, automatically buffering.`);
1635
+ logger3?.warn(`@smithy/util-stream - stream chunk size ${chunkSize} is below threshold of ${size}, automatically buffering.`);
1636
1636
  }
1637
1637
  if (newSize >= size) {
1638
1638
  controller.enqueue(flush(buffers, mode));
@@ -1692,9 +1692,9 @@ var init_createBufferedReadableStream = __esm({
1692
1692
  });
1693
1693
 
1694
1694
  // node_modules/@smithy/util-stream/dist-es/createBufferedReadable.js
1695
- function createBufferedReadable(upstream, size, logger2) {
1695
+ function createBufferedReadable(upstream, size, logger3) {
1696
1696
  if (isReadableStream(upstream)) {
1697
- return createBufferedReadableStream(upstream, size, logger2);
1697
+ return createBufferedReadableStream(upstream, size, logger3);
1698
1698
  }
1699
1699
  const downstream = new import_node_stream.Readable({ read() {
1700
1700
  } });
@@ -1727,7 +1727,7 @@ function createBufferedReadable(upstream, size, logger2) {
1727
1727
  const newSize = merge(buffers, mode, chunk3);
1728
1728
  if (!streamBufferingLoggedWarning && bytesSeen > size * 2) {
1729
1729
  streamBufferingLoggedWarning = true;
1730
- logger2?.warn(`@smithy/util-stream - stream chunk size ${chunkSize} is below threshold of ${size}, automatically buffering.`);
1730
+ logger3?.warn(`@smithy/util-stream - stream chunk size ${chunkSize} is below threshold of ${size}, automatically buffering.`);
1731
1731
  }
1732
1732
  if (newSize >= size) {
1733
1733
  downstream.push(flush(buffers, mode));
@@ -2013,7 +2013,7 @@ var init_set_request_timeout = __esm({
2013
2013
  "node_modules/@smithy/node-http-handler/dist-es/set-request-timeout.js"() {
2014
2014
  "use strict";
2015
2015
  init_timing();
2016
- setRequestTimeout = (req, reject, timeoutInMs = 0, throwOnRequestTimeout, logger2) => {
2016
+ setRequestTimeout = (req, reject, timeoutInMs = 0, throwOnRequestTimeout, logger3) => {
2017
2017
  if (timeoutInMs) {
2018
2018
  return timing.setTimeout(() => {
2019
2019
  let msg = `@smithy/node-http-handler - [${throwOnRequestTimeout ? "ERROR" : "WARN"}] a request has exceeded the configured ${timeoutInMs} ms requestTimeout.`;
@@ -2026,7 +2026,7 @@ var init_set_request_timeout = __esm({
2026
2026
  reject(error);
2027
2027
  } else {
2028
2028
  msg += ` Init client requestHandler with throwOnRequestTimeout=true to turn this into an error.`;
2029
- logger2?.warn?.(msg);
2029
+ logger3?.warn?.(msg);
2030
2030
  }
2031
2031
  }, timeoutInMs);
2032
2032
  }
@@ -2184,7 +2184,7 @@ var init_node_http_handler = __esm({
2184
2184
  }
2185
2185
  return new _NodeHttpHandler(instanceOrOptions);
2186
2186
  }
2187
- static checkSocketUsage(agent, socketWarningTimestamp, logger2 = console) {
2187
+ static checkSocketUsage(agent, socketWarningTimestamp, logger3 = console) {
2188
2188
  const { sockets, requests, maxSockets } = agent;
2189
2189
  if (typeof maxSockets !== "number" || maxSockets === Infinity) {
2190
2190
  return socketWarningTimestamp;
@@ -2198,7 +2198,7 @@ var init_node_http_handler = __esm({
2198
2198
  const socketsInUse = sockets[origin]?.length ?? 0;
2199
2199
  const requestsEnqueued = requests[origin]?.length ?? 0;
2200
2200
  if (socketsInUse >= maxSockets && requestsEnqueued >= 2 * maxSockets) {
2201
- logger2?.warn?.(`@smithy/node-http-handler:WARN - socket usage at capacity=${socketsInUse} and ${requestsEnqueued} additional requests are enqueued.
2201
+ logger3?.warn?.(`@smithy/node-http-handler:WARN - socket usage at capacity=${socketsInUse} and ${requestsEnqueued} additional requests are enqueued.
2202
2202
  See https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/node-configuring-maxsockets.html
2203
2203
  or increase socketAcquisitionWarningTimeout=(millis) in the NodeHttpHandler config.`);
2204
2204
  return Date.now();
@@ -3286,7 +3286,7 @@ var init_copyDocumentWithTransform = __esm({
3286
3286
  });
3287
3287
 
3288
3288
  // node_modules/@smithy/core/dist-es/submodules/serde/parse-utils.js
3289
- var parseBoolean, expectNumber, MAX_FLOAT, expectFloat32, expectLong, expectInt32, expectShort, expectByte, expectSizedInt, castInt, expectNonNull, expectObject, expectString, strictParseFloat32, NUMBER_REGEX, parseNumber, strictParseLong, strictParseInt32, strictParseShort, strictParseByte, stackTraceWarning, logger;
3289
+ var parseBoolean, expectNumber, MAX_FLOAT, expectFloat32, expectLong, expectInt32, expectShort, expectByte, expectSizedInt, castInt, expectNonNull, expectObject, expectString, strictParseFloat32, NUMBER_REGEX, parseNumber, strictParseLong, strictParseInt32, strictParseShort, strictParseByte, stackTraceWarning, logger2;
3290
3290
  var init_parse_utils = __esm({
3291
3291
  "node_modules/@smithy/core/dist-es/submodules/serde/parse-utils.js"() {
3292
3292
  "use strict";
@@ -3308,7 +3308,7 @@ var init_parse_utils = __esm({
3308
3308
  const parsed = parseFloat(value);
3309
3309
  if (!Number.isNaN(parsed)) {
3310
3310
  if (String(parsed) !== String(value)) {
3311
- logger.warn(stackTraceWarning(`Expected number but observed string: ${value}`));
3311
+ logger2.warn(stackTraceWarning(`Expected number but observed string: ${value}`));
3312
3312
  }
3313
3313
  return parsed;
3314
3314
  }
@@ -3384,7 +3384,7 @@ var init_parse_utils = __esm({
3384
3384
  return value;
3385
3385
  }
3386
3386
  if (["boolean", "number", "bigint"].includes(typeof value)) {
3387
- logger.warn(stackTraceWarning(`Expected string, got ${typeof value}: ${value}`));
3387
+ logger2.warn(stackTraceWarning(`Expected string, got ${typeof value}: ${value}`));
3388
3388
  return String(value);
3389
3389
  }
3390
3390
  throw new TypeError(`Expected string, got ${typeof value}: ${value}`);
@@ -3430,7 +3430,7 @@ var init_parse_utils = __esm({
3430
3430
  stackTraceWarning = (message) => {
3431
3431
  return String(new TypeError(message).stack || message).split("\n").slice(0, 5).filter((s7) => !s7.includes("stackTraceWarning")).join("\n");
3432
3432
  };
3433
- logger = {
3433
+ logger2 = {
3434
3434
  warn: console.warn
3435
3435
  };
3436
3436
  }
@@ -3996,9 +3996,9 @@ var init_command2 = __esm({
3996
3996
  this.middlewareStack.use(mw);
3997
3997
  }
3998
3998
  const stack = clientStack.concat(this.middlewareStack);
3999
- const { logger: logger2 } = configuration;
3999
+ const { logger: logger3 } = configuration;
4000
4000
  const handlerExecutionContext = {
4001
- logger: logger2,
4001
+ logger: logger3,
4002
4002
  clientName,
4003
4003
  commandName,
4004
4004
  inputFilterSensitiveLog,
@@ -5153,11 +5153,11 @@ function resolveUserAgentConfig(input) {
5153
5153
  userAgentAppId: async () => {
5154
5154
  const appId = await normalizedAppIdProvider();
5155
5155
  if (!isValidUserAgentAppId(appId)) {
5156
- const logger2 = input.logger?.constructor?.name === "NoOpLogger" || !input.logger ? console : input.logger;
5156
+ const logger3 = input.logger?.constructor?.name === "NoOpLogger" || !input.logger ? console : input.logger;
5157
5157
  if (typeof appId !== "string") {
5158
- logger2?.warn("userAgentAppId must be a string or undefined.");
5158
+ logger3?.warn("userAgentAppId must be a string or undefined.");
5159
5159
  } else if (appId.length > 50) {
5160
- logger2?.warn("The provided userAgentAppId exceeds the maximum length of 50 characters.");
5160
+ logger3?.warn("The provided userAgentAppId exceeds the maximum length of 50 characters.");
5161
5161
  }
5162
5162
  }
5163
5163
  return appId;
@@ -5934,7 +5934,7 @@ var init_resolveEndpoint = __esm({
5934
5934
  init_types2();
5935
5935
  init_utils();
5936
5936
  resolveEndpoint = (ruleSetObject, options) => {
5937
- const { endpointParams, logger: logger2 } = options;
5937
+ const { endpointParams, logger: logger3 } = options;
5938
5938
  const { parameters, rules } = ruleSetObject;
5939
5939
  options.logger?.debug?.(`${debugId} Initial EndpointParams: ${toDebugString(endpointParams)}`);
5940
5940
  const paramsWithDefault = Object.entries(parameters).filter(([, v8]) => v8.default != null).map(([k7, v8]) => [k7, v8.default]);
@@ -5949,7 +5949,7 @@ var init_resolveEndpoint = __esm({
5949
5949
  throw new EndpointError(`Missing required parameter: '${requiredParam}'`);
5950
5950
  }
5951
5951
  }
5952
- const endpoint = evaluateRules(rules, { endpointParams, logger: logger2, referenceRecord: {} });
5952
+ const endpoint = evaluateRules(rules, { endpointParams, logger: logger3, referenceRecord: {} });
5953
5953
  options.logger?.debug?.(`${debugId} Resolved endpoint: ${toDebugString(endpoint)}`);
5954
5954
  return endpoint;
5955
5955
  };
@@ -6789,19 +6789,19 @@ var init_ProviderError = __esm({
6789
6789
  name = "ProviderError";
6790
6790
  tryNextLink;
6791
6791
  constructor(message, options = true) {
6792
- let logger2;
6792
+ let logger3;
6793
6793
  let tryNextLink = true;
6794
6794
  if (typeof options === "boolean") {
6795
- logger2 = void 0;
6795
+ logger3 = void 0;
6796
6796
  tryNextLink = options;
6797
6797
  } else if (options != null && typeof options === "object") {
6798
- logger2 = options.logger;
6798
+ logger3 = options.logger;
6799
6799
  tryNextLink = options.tryNextLink ?? true;
6800
6800
  }
6801
6801
  super(message);
6802
6802
  this.tryNextLink = tryNextLink;
6803
6803
  Object.setPrototypeOf(this, _ProviderError.prototype);
6804
- logger2?.debug?.(`@smithy/property-provider ${tryNextLink ? "->" : "(!)"} ${message}`);
6804
+ logger3?.debug?.(`@smithy/property-provider ${tryNextLink ? "->" : "(!)"} ${message}`);
6805
6805
  }
6806
6806
  static from(error, options = true) {
6807
6807
  return Object.assign(new this(error.message, options), error);
@@ -10521,8 +10521,8 @@ var init_configLoader = __esm({
10521
10521
  init_fromSharedConfigFiles();
10522
10522
  init_fromStatic2();
10523
10523
  loadConfig = ({ environmentVariableSelector, configFileSelector, default: defaultValue }, configuration = {}) => {
10524
- const { signingName, logger: logger2 } = configuration;
10525
- const envOptions = { signingName, logger: logger2 };
10524
+ const { signingName, logger: logger3 } = configuration;
10525
+ const envOptions = { signingName, logger: logger3 };
10526
10526
  return memoize(chain(fromEnv(environmentVariableSelector, envOptions), fromSharedConfigFiles(configFileSelector, configuration), fromStatic2(defaultValue)));
10527
10527
  };
10528
10528
  }
@@ -11631,7 +11631,7 @@ var init_fromContainerMetadata = __esm({
11631
11631
  "http:": true,
11632
11632
  "https:": true
11633
11633
  };
11634
- getCmdsUri = async ({ logger: logger2 }) => {
11634
+ getCmdsUri = async ({ logger: logger3 }) => {
11635
11635
  if (process.env[ENV_CMDS_RELATIVE_URI]) {
11636
11636
  return {
11637
11637
  hostname: CMDS_IP,
@@ -11643,13 +11643,13 @@ var init_fromContainerMetadata = __esm({
11643
11643
  if (!parsed.hostname || !(parsed.hostname in GREENGRASS_HOSTS)) {
11644
11644
  throw new CredentialsProviderError(`${parsed.hostname} is not a valid container metadata service hostname`, {
11645
11645
  tryNextLink: false,
11646
- logger: logger2
11646
+ logger: logger3
11647
11647
  });
11648
11648
  }
11649
11649
  if (!parsed.protocol || !(parsed.protocol in GREENGRASS_PROTOCOLS)) {
11650
11650
  throw new CredentialsProviderError(`${parsed.protocol} is not a valid container metadata service protocol`, {
11651
11651
  tryNextLink: false,
11652
- logger: logger2
11652
+ logger: logger3
11653
11653
  });
11654
11654
  }
11655
11655
  return {
@@ -11659,7 +11659,7 @@ var init_fromContainerMetadata = __esm({
11659
11659
  }
11660
11660
  throw new CredentialsProviderError(`The container metadata credential provider cannot be used unless the ${ENV_CMDS_RELATIVE_URI} or ${ENV_CMDS_FULL_URI} environment variable is set`, {
11661
11661
  tryNextLink: false,
11662
- logger: logger2
11662
+ logger: logger3
11663
11663
  });
11664
11664
  };
11665
11665
  }
@@ -11773,10 +11773,10 @@ var init_getExtendedInstanceMetadataCredentials = __esm({
11773
11773
  STATIC_STABILITY_REFRESH_INTERVAL_SECONDS = 5 * 60;
11774
11774
  STATIC_STABILITY_REFRESH_INTERVAL_JITTER_WINDOW_SECONDS = 5 * 60;
11775
11775
  STATIC_STABILITY_DOC_URL = "https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html";
11776
- getExtendedInstanceMetadataCredentials = (credentials, logger2) => {
11776
+ getExtendedInstanceMetadataCredentials = (credentials, logger3) => {
11777
11777
  const refreshInterval = STATIC_STABILITY_REFRESH_INTERVAL_SECONDS + Math.floor(Math.random() * STATIC_STABILITY_REFRESH_INTERVAL_JITTER_WINDOW_SECONDS);
11778
11778
  const newExpiration = new Date(Date.now() + refreshInterval * 1e3);
11779
- logger2.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(newExpiration)}.
11779
+ logger3.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(newExpiration)}.
11780
11780
  For more information, please visit: ` + STATIC_STABILITY_DOC_URL);
11781
11781
  const originalExpiration = credentials.originalExpiration ?? credentials.expiration;
11782
11782
  return {
@@ -11795,19 +11795,19 @@ var init_staticStabilityProvider = __esm({
11795
11795
  "use strict";
11796
11796
  init_getExtendedInstanceMetadataCredentials();
11797
11797
  staticStabilityProvider = (provider, options = {}) => {
11798
- const logger2 = options?.logger || console;
11798
+ const logger3 = options?.logger || console;
11799
11799
  let pastCredentials;
11800
11800
  return async () => {
11801
11801
  let credentials;
11802
11802
  try {
11803
11803
  credentials = await provider();
11804
11804
  if (credentials.expiration && credentials.expiration.getTime() < Date.now()) {
11805
- credentials = getExtendedInstanceMetadataCredentials(credentials, logger2);
11805
+ credentials = getExtendedInstanceMetadataCredentials(credentials, logger3);
11806
11806
  }
11807
11807
  } catch (e7) {
11808
11808
  if (pastCredentials) {
11809
- logger2.warn("Credential renew failed: ", e7);
11810
- credentials = getExtendedInstanceMetadataCredentials(pastCredentials, logger2);
11809
+ logger3.warn("Credential renew failed: ", e7);
11810
+ credentials = getExtendedInstanceMetadataCredentials(pastCredentials, logger3);
11811
11811
  } else {
11812
11812
  throw e7;
11813
11813
  }
@@ -11841,7 +11841,7 @@ var init_fromInstanceMetadata = __esm({
11841
11841
  fromInstanceMetadata = (init = {}) => staticStabilityProvider(getInstanceMetadataProvider(init), { logger: init.logger });
11842
11842
  getInstanceMetadataProvider = (init = {}) => {
11843
11843
  let disableFetchToken = false;
11844
- const { logger: logger2, profile } = init;
11844
+ const { logger: logger3, profile } = init;
11845
11845
  const { timeout, maxRetries } = providerConfigFromInit(init);
11846
11846
  const getCredentials2 = async (maxRetries2, options) => {
11847
11847
  const isImdsV1Fallback = disableFetchToken || options.headers?.[X_AWS_EC2_METADATA_TOKEN] == null;
@@ -11905,7 +11905,7 @@ var init_fromInstanceMetadata = __esm({
11905
11905
  return async () => {
11906
11906
  const endpoint = await getInstanceMetadataEndpoint();
11907
11907
  if (disableFetchToken) {
11908
- logger2?.debug("AWS SDK Instance Metadata", "using v1 fallback (no token fetch)");
11908
+ logger3?.debug("AWS SDK Instance Metadata", "using v1 fallback (no token fetch)");
11909
11909
  return getCredentials2(maxRetries, { ...endpoint, timeout });
11910
11910
  } else {
11911
11911
  let token;
@@ -11919,7 +11919,7 @@ var init_fromInstanceMetadata = __esm({
11919
11919
  } else if (error.message === "TimeoutError" || [403, 404, 405].includes(error.statusCode)) {
11920
11920
  disableFetchToken = true;
11921
11921
  }
11922
- logger2?.debug("AWS SDK Instance Metadata", "using v1 fallback (initial)");
11922
+ logger3?.debug("AWS SDK Instance Metadata", "using v1 fallback (initial)");
11923
11923
  return getCredentials2(maxRetries, { ...endpoint, timeout });
11924
11924
  }
11925
11925
  return getCredentials2(maxRetries, {
@@ -12000,7 +12000,7 @@ var init_checkUrl = __esm({
12000
12000
  ECS_CONTAINER_HOST = "169.254.170.2";
12001
12001
  EKS_CONTAINER_HOST_IPv4 = "169.254.170.23";
12002
12002
  EKS_CONTAINER_HOST_IPv6 = "[fd00:ec2::23]";
12003
- checkUrl = (url, logger2) => {
12003
+ checkUrl = (url, logger3) => {
12004
12004
  if (url.protocol === "https:") {
12005
12005
  return;
12006
12006
  }
@@ -12027,7 +12027,7 @@ var init_checkUrl = __esm({
12027
12027
  throw new CredentialsProviderError(`URL not accepted. It must either be HTTPS or match one of the following:
12028
12028
  - loopback CIDR 127.0.0.0/8 or [::1/128]
12029
12029
  - ECS container host 169.254.170.2
12030
- - EKS container host 169.254.170.23 or [fd00:ec2::23]`, { logger: logger2 });
12030
+ - EKS container host 169.254.170.23 or [fd00:ec2::23]`, { logger: logger3 });
12031
12031
  };
12032
12032
  }
12033
12033
  });
@@ -12046,13 +12046,13 @@ function createGetRequest(url) {
12046
12046
  fragment: url.hash
12047
12047
  });
12048
12048
  }
12049
- async function getCredentials(response, logger2) {
12049
+ async function getCredentials(response, logger3) {
12050
12050
  const stream = sdkStreamMixin2(response.body);
12051
12051
  const str = await stream.transformToString();
12052
12052
  if (response.statusCode === 200) {
12053
12053
  const parsed = JSON.parse(str);
12054
12054
  if (typeof parsed.AccessKeyId !== "string" || typeof parsed.SecretAccessKey !== "string" || typeof parsed.Token !== "string" || typeof parsed.Expiration !== "string") {
12055
- throw new CredentialsProviderError("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }", { logger: logger2 });
12055
+ throw new CredentialsProviderError("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }", { logger: logger3 });
12056
12056
  }
12057
12057
  return {
12058
12058
  accessKeyId: parsed.AccessKeyId,
@@ -12067,12 +12067,12 @@ async function getCredentials(response, logger2) {
12067
12067
  parsedBody = JSON.parse(str);
12068
12068
  } catch (e7) {
12069
12069
  }
12070
- throw Object.assign(new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger: logger2 }), {
12070
+ throw Object.assign(new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger: logger3 }), {
12071
12071
  Code: parsedBody.Code,
12072
12072
  Message: parsedBody.Message
12073
12073
  });
12074
12074
  }
12075
- throw new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger: logger2 });
12075
+ throw new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger: logger3 });
12076
12076
  }
12077
12077
  var init_requestHelpers = __esm({
12078
12078
  "node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js"() {
@@ -14762,7 +14762,7 @@ var init_resolveSSOCredentials = __esm({
14762
14762
  init_dist_es26();
14763
14763
  init_dist_es34();
14764
14764
  SHOULD_FAIL_CREDENTIAL_CHAIN = false;
14765
- resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger: logger2 }) => {
14765
+ resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger: logger3 }) => {
14766
14766
  let token;
14767
14767
  const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
14768
14768
  if (ssoSession) {
@@ -14775,7 +14775,7 @@ var init_resolveSSOCredentials = __esm({
14775
14775
  } catch (e7) {
14776
14776
  throw new CredentialsProviderError(e7.message, {
14777
14777
  tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
14778
- logger: logger2
14778
+ logger: logger3
14779
14779
  });
14780
14780
  }
14781
14781
  } else {
@@ -14784,14 +14784,14 @@ var init_resolveSSOCredentials = __esm({
14784
14784
  } catch (e7) {
14785
14785
  throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {
14786
14786
  tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
14787
- logger: logger2
14787
+ logger: logger3
14788
14788
  });
14789
14789
  }
14790
14790
  }
14791
14791
  if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {
14792
14792
  throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {
14793
14793
  tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
14794
- logger: logger2
14794
+ logger: logger3
14795
14795
  });
14796
14796
  }
14797
14797
  const { accessToken } = token;
@@ -14810,14 +14810,14 @@ var init_resolveSSOCredentials = __esm({
14810
14810
  } catch (e7) {
14811
14811
  throw new CredentialsProviderError(e7, {
14812
14812
  tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
14813
- logger: logger2
14813
+ logger: logger3
14814
14814
  });
14815
14815
  }
14816
14816
  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {} } = ssoResp;
14817
14817
  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
14818
14818
  throw new CredentialsProviderError("SSO returns an invalid temporary credential.", {
14819
14819
  tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
14820
- logger: logger2
14820
+ logger: logger3
14821
14821
  });
14822
14822
  }
14823
14823
  const credentials = {
@@ -14844,11 +14844,11 @@ var init_validateSsoProfile = __esm({
14844
14844
  "node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js"() {
14845
14845
  "use strict";
14846
14846
  init_dist_es26();
14847
- validateSsoProfile = (profile, logger2) => {
14847
+ validateSsoProfile = (profile, logger3) => {
14848
14848
  const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
14849
14849
  if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
14850
14850
  throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}
14851
- Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger: logger2 });
14851
+ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger: logger3 });
14852
14852
  }
14853
14853
  return profile;
14854
14854
  };
@@ -14964,21 +14964,21 @@ var init_resolveCredentialSource = __esm({
14964
14964
  "use strict";
14965
14965
  init_client3();
14966
14966
  init_dist_es26();
14967
- resolveCredentialSource = (credentialSource, profileName, logger2) => {
14967
+ resolveCredentialSource = (credentialSource, profileName, logger3) => {
14968
14968
  const sourceProvidersMap = {
14969
14969
  EcsContainer: async (options) => {
14970
14970
  const { fromHttp: fromHttp2 } = await Promise.resolve().then(() => (init_dist_es42(), dist_es_exports3));
14971
14971
  const { fromContainerMetadata: fromContainerMetadata2 } = await Promise.resolve().then(() => (init_dist_es41(), dist_es_exports2));
14972
- logger2?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
14972
+ logger3?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
14973
14973
  return async () => chain(fromHttp2(options ?? {}), fromContainerMetadata2(options))().then(setNamedProvider);
14974
14974
  },
14975
14975
  Ec2InstanceMetadata: async (options) => {
14976
- logger2?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
14976
+ logger3?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
14977
14977
  const { fromInstanceMetadata: fromInstanceMetadata2 } = await Promise.resolve().then(() => (init_dist_es41(), dist_es_exports2));
14978
14978
  return async () => fromInstanceMetadata2(options)().then(setNamedProvider);
14979
14979
  },
14980
14980
  Environment: async (options) => {
14981
- logger2?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
14981
+ logger3?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
14982
14982
  const { fromEnv: fromEnv3 } = await Promise.resolve().then(() => (init_dist_es40(), dist_es_exports));
14983
14983
  return async () => fromEnv3(options)().then(setNamedProvider);
14984
14984
  }
@@ -14986,7 +14986,7 @@ var init_resolveCredentialSource = __esm({
14986
14986
  if (credentialSource in sourceProvidersMap) {
14987
14987
  return sourceProvidersMap[credentialSource];
14988
14988
  } else {
14989
- throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger: logger2 });
14989
+ throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger: logger3 });
14990
14990
  }
14991
14991
  };
14992
14992
  setNamedProvider = (creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p");
@@ -16140,7 +16140,7 @@ var init_defaultStsRoleAssumers = __esm({
16140
16140
  return async (sourceCreds, params) => {
16141
16141
  closureSourceCreds = sourceCreds;
16142
16142
  if (!stsClient) {
16143
- const { logger: logger2 = stsOptions?.parentClientConfig?.logger, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger } = stsOptions;
16143
+ const { logger: logger3 = stsOptions?.parentClientConfig?.logger, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger } = stsOptions;
16144
16144
  const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger);
16145
16145
  const isCompatibleRequestHandler = !isH2(requestHandler);
16146
16146
  stsClient = new STSClient2({
@@ -16148,7 +16148,7 @@ var init_defaultStsRoleAssumers = __esm({
16148
16148
  credentialDefaultProvider: () => async () => closureSourceCreds,
16149
16149
  region: resolvedRegion,
16150
16150
  requestHandler: isCompatibleRequestHandler ? requestHandler : void 0,
16151
- logger: logger2
16151
+ logger: logger3
16152
16152
  });
16153
16153
  }
16154
16154
  const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleCommand(params));
@@ -16172,14 +16172,14 @@ var init_defaultStsRoleAssumers = __esm({
16172
16172
  let stsClient;
16173
16173
  return async (params) => {
16174
16174
  if (!stsClient) {
16175
- const { logger: logger2 = stsOptions?.parentClientConfig?.logger, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger } = stsOptions;
16175
+ const { logger: logger3 = stsOptions?.parentClientConfig?.logger, region, requestHandler = stsOptions?.parentClientConfig?.requestHandler, credentialProviderLogger } = stsOptions;
16176
16176
  const resolvedRegion = await resolveRegion(region, stsOptions?.parentClientConfig?.region, credentialProviderLogger);
16177
16177
  const isCompatibleRequestHandler = !isH2(requestHandler);
16178
16178
  stsClient = new STSClient2({
16179
16179
  profile: stsOptions?.parentClientConfig?.profile,
16180
16180
  region: resolvedRegion,
16181
16181
  requestHandler: isCompatibleRequestHandler ? requestHandler : void 0,
16182
- logger: logger2
16182
+ logger: logger3
16183
16183
  });
16184
16184
  }
16185
16185
  const { Credentials, AssumedRoleUser } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));
@@ -16285,20 +16285,20 @@ var init_resolveAssumeRoleCredentials = __esm({
16285
16285
  init_dist_es34();
16286
16286
  init_resolveCredentialSource();
16287
16287
  init_resolveProfileData();
16288
- isAssumeRoleProfile = (arg, { profile = "default", logger: logger2 } = {}) => {
16289
- return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger: logger2 }) || isCredentialSourceProfile(arg, { profile, logger: logger2 }));
16288
+ isAssumeRoleProfile = (arg, { profile = "default", logger: logger3 } = {}) => {
16289
+ return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger: logger3 }) || isCredentialSourceProfile(arg, { profile, logger: logger3 }));
16290
16290
  };
16291
- isAssumeRoleWithSourceProfile = (arg, { profile, logger: logger2 }) => {
16291
+ isAssumeRoleWithSourceProfile = (arg, { profile, logger: logger3 }) => {
16292
16292
  const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
16293
16293
  if (withSourceProfile) {
16294
- logger2?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
16294
+ logger3?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
16295
16295
  }
16296
16296
  return withSourceProfile;
16297
16297
  };
16298
- isCredentialSourceProfile = (arg, { profile, logger: logger2 }) => {
16298
+ isCredentialSourceProfile = (arg, { profile, logger: logger3 }) => {
16299
16299
  const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
16300
16300
  if (withProviderProfile) {
16301
- logger2?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
16301
+ logger3?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
16302
16302
  }
16303
16303
  return withProviderProfile;
16304
16304
  };
@@ -16399,7 +16399,7 @@ var init_resolveProcessCredentials = __esm({
16399
16399
  import_child_process = require("child_process");
16400
16400
  import_util5 = require("util");
16401
16401
  init_getValidatedProcessCredentials();
16402
- resolveProcessCredentials = async (profileName, profiles, logger2) => {
16402
+ resolveProcessCredentials = async (profileName, profiles, logger3) => {
16403
16403
  const profile = profiles[profileName];
16404
16404
  if (profiles[profileName]) {
16405
16405
  const credentialProcess = profile["credential_process"];
@@ -16415,14 +16415,14 @@ var init_resolveProcessCredentials = __esm({
16415
16415
  }
16416
16416
  return getValidatedProcessCredentials(profileName, data, profiles);
16417
16417
  } catch (error) {
16418
- throw new CredentialsProviderError(error.message, { logger: logger2 });
16418
+ throw new CredentialsProviderError(error.message, { logger: logger3 });
16419
16419
  }
16420
16420
  } else {
16421
- throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger: logger2 });
16421
+ throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger: logger3 });
16422
16422
  }
16423
16423
  } else {
16424
16424
  throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {
16425
- logger: logger2
16425
+ logger: logger3
16426
16426
  });
16427
16427
  }
16428
16428
  };
@@ -22185,8 +22185,8 @@ __export(index_exports, {
22185
22185
  emailTemplate: () => emailTemplate_default,
22186
22186
  integrations: () => integrations_exports,
22187
22187
  logger: () => logger_default,
22188
+ loggerWithBetterStack: () => loggerWithBetterStack,
22188
22189
  monitoring: () => monitoring_exports,
22189
- notification: () => notification_exports,
22190
22190
  notificationEmailTemplate: () => notificationEmailTemplate_default,
22191
22191
  notificationQueue: () => notificationQueue_exports,
22192
22192
  openai: () => openai_exports,
@@ -22243,28 +22243,42 @@ function getBetterStackToken() {
22243
22243
  })();
22244
22244
  return tokenFetchPromise;
22245
22245
  }
22246
- var logger_default = (namespace, betterStackOptions) => {
22246
+ function createBaseLogger(namespace, options) {
22247
22247
  const transports = [new import_winston.default.transports.Console()];
22248
- const logger2 = import_winston.default.createLogger({
22248
+ const defaultMeta = {
22249
+ service: process.env.AWS_LAMBDA_FUNCTION_NAME,
22250
+ script: namespace
22251
+ };
22252
+ if (options?.feature) {
22253
+ defaultMeta.feature = options.feature;
22254
+ }
22255
+ const logger3 = import_winston.default.createLogger({
22249
22256
  level: "debug",
22250
22257
  format: process.env.ENV === "local" ? localFormat : import_winston.default.format.combine(import_winston.default.format.timestamp(), import_winston.default.format.json()),
22251
- defaultMeta: { service: process.env.AWS_LAMBDA_FUNCTION_NAME, script: namespace },
22258
+ defaultMeta,
22252
22259
  transports
22253
22260
  });
22254
- logger2.logtail = void 0;
22255
- if (betterStackOptions?.betterstack && betterStackOptions?.betterStackHost && (process.env.ENV === "prod" || process.env.ENV === "dev")) {
22256
- getBetterStackToken().then((token) => {
22257
- if (token) {
22258
- const logtail = new import_node.Logtail(token, {
22259
- endpoint: betterStackOptions.betterStackHost
22260
- });
22261
- logger2.logtail = logtail;
22262
- logger2.add(new import_winston2.LogtailTransport(logtail));
22263
- }
22264
- });
22261
+ logger3.logtail = void 0;
22262
+ return logger3;
22263
+ }
22264
+ function logger(namespace, options) {
22265
+ return createBaseLogger(namespace, options);
22266
+ }
22267
+ async function loggerWithBetterStack(namespace, options) {
22268
+ const baseLogger2 = createBaseLogger(namespace, options);
22269
+ const betterStackHost = process.env.BETTERSTACK_HOST;
22270
+ if (betterStackHost && (process.env.ENV === "prod" || process.env.ENV === "dev")) {
22271
+ const token = await getBetterStackToken();
22272
+ if (token) {
22273
+ const endpoint = betterStackHost.startsWith("https://") ? betterStackHost : `https://${betterStackHost}`;
22274
+ const logtail = new import_node.Logtail(token, { endpoint });
22275
+ baseLogger2.logtail = logtail;
22276
+ baseLogger2.add(new import_winston2.LogtailTransport(logtail));
22277
+ }
22265
22278
  }
22266
- return logger2;
22267
- };
22279
+ return baseLogger2;
22280
+ }
22281
+ var logger_default = logger;
22268
22282
 
22269
22283
  // src/api.ts
22270
22284
  var log = logger_default("etainablApi");
@@ -22448,13 +22462,13 @@ var api_default = (auth, instanceOptions = {}) => {
22448
22462
  removeAccount: factory.remove(etainablApi, "accounts"),
22449
22463
  getAccountSchema: factory.get(etainablApi, "accounts", "schema"),
22450
22464
  invalidateAccountCache: factory.customWithId(etainablApi, "put", "accounts", "invalidate-cache"),
22451
- // custom alert triggers
22452
- getCustomAlertTrigger: factory.getWithId(etainablApi, "custom-alert-triggers"),
22453
- listCustomAlertTriggers: factory.list(etainablApi, "custom-alert-triggers"),
22454
- updateCustomAlertTrigger: factory.update(etainablApi, "custom-alert-triggers"),
22455
- bulkUpdateCustomAlertTriggers: factory.create(
22465
+ // alert trigger rules
22466
+ getAlertTriggerRule: factory.getWithId(etainablApi, "alert-trigger-rules"),
22467
+ listAlertTriggerRules: factory.list(etainablApi, "alert-trigger-rules"),
22468
+ updateAlertTriggerRule: factory.update(etainablApi, "alert-trigger-rules"),
22469
+ bulkUpdateAlertTriggerRules: factory.create(
22456
22470
  etainablApi,
22457
- "custom-alert-triggers",
22471
+ "alert-trigger-rules",
22458
22472
  "bulk-update"
22459
22473
  ),
22460
22474
  // assets
@@ -23198,9 +23212,6 @@ var slack_default = {
23198
23212
  postMessage
23199
23213
  };
23200
23214
 
23201
- // src/notification.ts
23202
- var notification_exports = {};
23203
-
23204
23215
  // src/notificationQueue.ts
23205
23216
  var notificationQueue_exports = {};
23206
23217
  __export(notificationQueue_exports, {
@@ -23227,12 +23238,12 @@ function queueUrlMiddleware({ useQueueUrlAsEndpoint, endpoint }) {
23227
23238
  const { input } = args;
23228
23239
  const resolvedEndpoint = context.endpointV2;
23229
23240
  if (!endpoint && input.QueueUrl && resolvedEndpoint && useQueueUrlAsEndpoint) {
23230
- const logger2 = context.logger instanceof NoOpLogger || !context.logger?.warn ? console : context.logger;
23241
+ const logger3 = context.logger instanceof NoOpLogger || !context.logger?.warn ? console : context.logger;
23231
23242
  try {
23232
23243
  const queueUrl = new URL(input.QueueUrl);
23233
23244
  const queueUrlOrigin = new URL(queueUrl.origin);
23234
23245
  if (resolvedEndpoint.url.origin !== queueUrlOrigin.origin) {
23235
- logger2.warn(`QueueUrl=${input.QueueUrl} differs from SQSClient resolved endpoint=${resolvedEndpoint.url.toString()}, using QueueUrl host as endpoint.
23246
+ logger3.warn(`QueueUrl=${input.QueueUrl} differs from SQSClient resolved endpoint=${resolvedEndpoint.url.toString()}, using QueueUrl host as endpoint.
23236
23247
  Set [endpoint=string] or [useQueueUrlAsEndpoint=false] on the SQSClient.`);
23237
23248
  context.endpointV2 = {
23238
23249
  ...resolvedEndpoint,
@@ -23240,7 +23251,7 @@ Set [endpoint=string] or [useQueueUrlAsEndpoint=false] on the SQSClient.`);
23240
23251
  };
23241
23252
  }
23242
23253
  } catch (e7) {
23243
- logger2.warn(e7);
23254
+ logger3.warn(e7);
23244
23255
  }
23245
23256
  }
23246
23257
  return next(args);
@@ -26661,7 +26672,7 @@ init_dist_es16();
26661
26672
  var getChecksum = async (body, { checksumAlgorithmFn, base64Encoder }) => base64Encoder(await stringHasher(checksumAlgorithmFn, body));
26662
26673
 
26663
26674
  // node_modules/@aws-sdk/middleware-flexible-checksums/dist-es/validateChecksumFromResponse.js
26664
- var validateChecksumFromResponse = async (response, { config, responseAlgorithms, logger: logger2 }) => {
26675
+ var validateChecksumFromResponse = async (response, { config, responseAlgorithms, logger: logger3 }) => {
26665
26676
  const checksumAlgorithms = getChecksumAlgorithmListForResponse(responseAlgorithms);
26666
26677
  const { body: responseBody, headers: responseHeaders } = response;
26667
26678
  for (const algorithm of checksumAlgorithms) {
@@ -26673,7 +26684,7 @@ var validateChecksumFromResponse = async (response, { config, responseAlgorithms
26673
26684
  checksumAlgorithmFn = selectChecksumAlgorithmFunction(algorithm, config);
26674
26685
  } catch (error) {
26675
26686
  if (algorithm === ChecksumAlgorithm.CRC64NVME) {
26676
- logger2?.warn(`Skipping ${ChecksumAlgorithm.CRC64NVME} checksum validation: ${error.message}`);
26687
+ logger3?.warn(`Skipping ${ChecksumAlgorithm.CRC64NVME} checksum validation: ${error.message}`);
26677
26688
  continue;
26678
26689
  }
26679
26690
  throw error;
@@ -32453,8 +32464,8 @@ var EventNamesByCategory = {
32453
32464
  emailTemplate,
32454
32465
  integrations,
32455
32466
  logger,
32467
+ loggerWithBetterStack,
32456
32468
  monitoring,
32457
- notification,
32458
32469
  notificationEmailTemplate,
32459
32470
  notificationQueue,
32460
32471
  openai,