@karmaniverous/get-dotenv 6.5.2 → 7.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/dist/chunks/{AwsRestJsonProtocol-7Uww6gmd.mjs → AwsRestJsonProtocol-DeiE3wkO.mjs} +22 -5
  2. package/dist/chunks/{createCli-pZgHlwKX.mjs → createCli-B9-MIwWj.mjs} +4 -4
  3. package/dist/chunks/{externalDataInterceptor-CnjiiRdu.mjs → externalDataInterceptor-gi2RH4ez.mjs} +2 -2
  4. package/dist/chunks/{getSSOTokenFromFile-Bct4fw5A.mjs → getSSOTokenFromFile-BfAhZf_d.mjs} +1 -1
  5. package/dist/chunks/{index-BJWV46OF.mjs → index-98yxYe1W.mjs} +73 -61
  6. package/dist/chunks/{index-CDPFly99.mjs → index-AssUn9IY.mjs} +218 -164
  7. package/dist/chunks/{index-BHKFx7ea.mjs → index-B6r8O7PJ.mjs} +5 -5
  8. package/dist/chunks/{index-Do8RFiEa.mjs → index-C21RHLO4.mjs} +2 -2
  9. package/dist/chunks/{index-Cg50N4ys.mjs → index-CAtxK29A.mjs} +2 -2
  10. package/dist/chunks/{index-Cy9EnHMK.mjs → index-CMSCF_uw.mjs} +73 -71
  11. package/dist/chunks/{index-CzwvgH1X.mjs → index-Ccay5Db0.mjs} +33 -35
  12. package/dist/chunks/{index-37ce0nLC.mjs → index-D8S1lJ24.mjs} +44 -39
  13. package/dist/chunks/{index-DeXLfLd1.mjs → index-DY7wYcXW.mjs} +18 -23
  14. package/dist/chunks/{index-Bmw8WxM1.mjs → index-DfvhftMN.mjs} +2 -2
  15. package/dist/chunks/{index-udC0OkWn.mjs → index-DtdHVcXz.mjs} +2 -2
  16. package/dist/chunks/{index-BjE-7W3n.mjs → index-mPj0Vhpw.mjs} +5 -5
  17. package/dist/chunks/{index-BfVeLAui.mjs → index-xRi3oKvY.mjs} +3 -3
  18. package/dist/chunks/{loadSso-DJONWtFw.mjs → loadSso-C-y9gQEz.mjs} +84 -73
  19. package/dist/chunks/{package-boo9EyYs.mjs → package-DiDNabNr.mjs} +1 -1
  20. package/dist/chunks/{parseKnownFiles-DsgpkpKC.mjs → parseKnownFiles-KczcjlE0.mjs} +1 -1
  21. package/dist/chunks/{readMergedOptions-uWSetyes.mjs → readMergedOptions-D6niy_Ep.mjs} +24 -3
  22. package/dist/chunks/{resolveCliOptions-7MwNdHqz.mjs → resolveCliOptions-PWF1aEM9.mjs} +1 -1
  23. package/dist/chunks/{sdk-stream-mixin-uGZKBKMz.mjs → sdk-stream-mixin-blFikF4G.mjs} +1 -1
  24. package/dist/chunks/{types-BSMtAo8_.mjs → types-Bp3u5-IH.mjs} +1 -1
  25. package/dist/cli.d.ts +4 -2
  26. package/dist/cli.mjs +5 -5
  27. package/dist/cliHost.d.ts +4 -2
  28. package/dist/cliHost.mjs +3 -3
  29. package/dist/getdotenv.cli.mjs +5 -5
  30. package/dist/index.d.ts +11 -5
  31. package/dist/index.mjs +12 -13
  32. package/dist/plugins-aws.d.ts +4 -2
  33. package/dist/plugins-aws.mjs +1 -1
  34. package/dist/plugins-batch.d.ts +4 -2
  35. package/dist/plugins-batch.mjs +1 -1
  36. package/dist/plugins-cmd.d.ts +4 -2
  37. package/dist/plugins-cmd.mjs +3 -3
  38. package/dist/plugins-init.d.ts +4 -2
  39. package/dist/plugins-init.mjs +11 -11
  40. package/dist/plugins.d.ts +4 -2
  41. package/dist/plugins.mjs +4 -4
  42. package/package.json +17 -17
@@ -1,7 +1,7 @@
1
- import { w as resolveAwsSdkSigV4Config, x as normalizeProvider, y as getSmithyContext, z as EndpointCache, A as resolveEndpoint, B as awsEndpointFunctions, D as customEndpointFunctions, t as toUtf8, i as fromUtf8, F as parseUrl, G as NoOpLogger, I as AwsSdkSigV4Signer, J as NoAuthSigner, n as toBase64, m as fromBase64, K as emitWarningIfUnsupportedVersion, L as resolveDefaultsModeConfig, M as emitWarningIfUnsupportedVersion$1, O as loadConfig, r as streamCollector, P as Hash, N as NodeHttpHandler, Q as createDefaultUserAgentProvider, R as calculateBodyLength, S as NODE_APP_ID_CONFIG_OPTIONS, T as NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, U as NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, V as NODE_RETRY_MODE_CONFIG_OPTIONS, W as DEFAULT_RETRY_MODE, X as NODE_REGION_CONFIG_FILE_OPTIONS, Y as NODE_REGION_CONFIG_OPTIONS, Z as NODE_MAX_ATTEMPT_CONFIG_OPTIONS, _ as NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, $ as loadConfigsForDefaultMode, a0 as getAwsRegionExtensionConfiguration, a1 as getDefaultExtensionConfiguration, a2 as getHttpHandlerExtensionConfiguration, a3 as resolveAwsRegionExtensionConfiguration, a4 as resolveDefaultRuntimeConfig, a5 as resolveHttpHandlerRuntimeConfig, a6 as Client, a7 as resolveUserAgentConfig, a8 as resolveRetryConfig, a9 as resolveRegionConfig, aa as resolveEndpointConfig, ab as resolveHostHeaderConfig, ac as getSchemaSerdePlugin, ad as getUserAgentPlugin, ae as getRetryPlugin, af as getContentLengthPlugin, ag as getHostHeaderPlugin, ah as getLoggerPlugin, ai as getRecursionDetectionPlugin, aj as getHttpAuthSchemeEndpointRuleSetPlugin, ak as DefaultIdentityProviderConfig, al as getHttpSigningPlugin, am as ServiceException, an as TypeRegistry, ao as Command, ap as getEndpointPlugin } from './index-CDPFly99.mjs';
2
- import { p as packageInfo } from './package-boo9EyYs.mjs';
3
- import { A as AwsRestJsonProtocol } from './AwsRestJsonProtocol-7Uww6gmd.mjs';
4
- import './readMergedOptions-uWSetyes.mjs';
1
+ import { w as resolveAwsSdkSigV4Config, x as normalizeProvider, y as getSmithyContext, z as EndpointCache, A as resolveEndpoint, B as awsEndpointFunctions, D as customEndpointFunctions, t as toUtf8, i as fromUtf8, F as parseUrl, G as NoOpLogger, I as AwsSdkSigV4Signer, J as NoAuthSigner, n as toBase64, m as fromBase64, K as emitWarningIfUnsupportedVersion, L as resolveDefaultsModeConfig, M as emitWarningIfUnsupportedVersion$1, O as loadConfig, r as streamCollector, P as Hash, N as NodeHttpHandler, Q as createDefaultUserAgentProvider, R as calculateBodyLength, S as NODE_APP_ID_CONFIG_OPTIONS, T as NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, U as NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, V as NODE_RETRY_MODE_CONFIG_OPTIONS, W as DEFAULT_RETRY_MODE, X as NODE_REGION_CONFIG_FILE_OPTIONS, Y as NODE_REGION_CONFIG_OPTIONS, Z as NODE_MAX_ATTEMPT_CONFIG_OPTIONS, _ as NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, $ as loadConfigsForDefaultMode, a0 as getAwsRegionExtensionConfiguration, a1 as getDefaultExtensionConfiguration, a2 as getHttpHandlerExtensionConfiguration, a3 as resolveAwsRegionExtensionConfiguration, a4 as resolveDefaultRuntimeConfig, a5 as resolveHttpHandlerRuntimeConfig, a6 as Client, a7 as resolveUserAgentConfig, a8 as resolveRetryConfig, a9 as resolveRegionConfig, aa as resolveEndpointConfig, ab as resolveHostHeaderConfig, ac as getSchemaSerdePlugin, ad as getUserAgentPlugin, ae as getRetryPlugin, af as getContentLengthPlugin, ag as getHostHeaderPlugin, ah as getLoggerPlugin, ai as getRecursionDetectionPlugin, aj as getHttpAuthSchemeEndpointRuleSetPlugin, ak as DefaultIdentityProviderConfig, al as getHttpSigningPlugin, am as ServiceException, an as TypeRegistry, ao as Command, ap as getEndpointPlugin } from './index-AssUn9IY.mjs';
2
+ import { p as packageInfo } from './package-DiDNabNr.mjs';
3
+ import { A as AwsRestJsonProtocol } from './AwsRestJsonProtocol-DeiE3wkO.mjs';
4
+ import './readMergedOptions-D6niy_Ep.mjs';
5
5
  import 'zod';
6
6
  import '@commander-js/extra-typings';
7
7
  import './readDotenvCascade-HLU7FsEQ.mjs';
@@ -27,7 +27,7 @@ import 'https';
27
27
  import 'stream';
28
28
  import 'process';
29
29
  import 'node:fs';
30
- import './sdk-stream-mixin-uGZKBKMz.mjs';
30
+ import './sdk-stream-mixin-blFikF4G.mjs';
31
31
 
32
32
  const defaultSigninHttpAuthSchemeParametersProvider = async (config, context, input) => {
33
33
  return {
@@ -131,7 +131,12 @@ const getRuntimeConfig$1 = (config) => {
131
131
  },
132
132
  ],
133
133
  logger: config?.logger ?? new NoOpLogger(),
134
- protocol: config?.protocol ?? new AwsRestJsonProtocol({ defaultNamespace: "com.amazonaws.signin" }),
134
+ protocol: config?.protocol ?? AwsRestJsonProtocol,
135
+ protocolSettings: config?.protocolSettings ?? {
136
+ defaultNamespace: "com.amazonaws.signin",
137
+ version: "2023-01-01",
138
+ serviceTarget: "Signin",
139
+ },
135
140
  serviceId: config?.serviceId ?? "Signin",
136
141
  urlParser: config?.urlParser ?? parseUrl,
137
142
  utf8Decoder: config?.utf8Decoder ?? fromUtf8,
@@ -255,14 +260,14 @@ class SigninClient extends Client {
255
260
  }
256
261
  }
257
262
 
258
- let SigninServiceException$1 = class SigninServiceException extends ServiceException {
263
+ class SigninServiceException extends ServiceException {
259
264
  constructor(options) {
260
265
  super(options);
261
266
  Object.setPrototypeOf(this, SigninServiceException.prototype);
262
267
  }
263
- };
268
+ }
264
269
 
265
- let AccessDeniedException$1 = class AccessDeniedException extends SigninServiceException$1 {
270
+ class AccessDeniedException extends SigninServiceException {
266
271
  name = "AccessDeniedException";
267
272
  $fault = "client";
268
273
  error;
@@ -275,8 +280,8 @@ let AccessDeniedException$1 = class AccessDeniedException extends SigninServiceE
275
280
  Object.setPrototypeOf(this, AccessDeniedException.prototype);
276
281
  this.error = opts.error;
277
282
  }
278
- };
279
- let InternalServerException$1 = class InternalServerException extends SigninServiceException$1 {
283
+ }
284
+ class InternalServerException extends SigninServiceException {
280
285
  name = "InternalServerException";
281
286
  $fault = "server";
282
287
  error;
@@ -289,8 +294,8 @@ let InternalServerException$1 = class InternalServerException extends SigninServ
289
294
  Object.setPrototypeOf(this, InternalServerException.prototype);
290
295
  this.error = opts.error;
291
296
  }
292
- };
293
- let TooManyRequestsError$1 = class TooManyRequestsError extends SigninServiceException$1 {
297
+ }
298
+ class TooManyRequestsError extends SigninServiceException {
294
299
  name = "TooManyRequestsError";
295
300
  $fault = "client";
296
301
  error;
@@ -303,8 +308,8 @@ let TooManyRequestsError$1 = class TooManyRequestsError extends SigninServiceExc
303
308
  Object.setPrototypeOf(this, TooManyRequestsError.prototype);
304
309
  this.error = opts.error;
305
310
  }
306
- };
307
- let ValidationException$1 = class ValidationException extends SigninServiceException$1 {
311
+ }
312
+ class ValidationException extends SigninServiceException {
308
313
  name = "ValidationException";
309
314
  $fault = "client";
310
315
  error;
@@ -317,7 +322,7 @@ let ValidationException$1 = class ValidationException extends SigninServiceExcep
317
322
  Object.setPrototypeOf(this, ValidationException.prototype);
318
323
  this.error = opts.error;
319
324
  }
320
- };
325
+ }
321
326
 
322
327
  const _ADE = "AccessDeniedException";
323
328
  const _AT = "AccessToken";
@@ -355,9 +360,9 @@ const _tO = "tokenOutput";
355
360
  const _tT = "tokenType";
356
361
  const n0 = "com.amazonaws.signin";
357
362
  var RefreshToken = [0, n0, _RT, 8, 0];
358
- var AccessDeniedException = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
359
- TypeRegistry.for(n0).registerError(AccessDeniedException, AccessDeniedException$1);
360
- var AccessToken = [
363
+ var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
364
+ TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
365
+ var AccessToken$ = [
361
366
  3,
362
367
  n0,
363
368
  _AT,
@@ -369,15 +374,15 @@ var AccessToken = [
369
374
  [0, { [_jN]: _sT }],
370
375
  ],
371
376
  ];
372
- var CreateOAuth2TokenRequest = [
377
+ var CreateOAuth2TokenRequest$ = [
373
378
  3,
374
379
  n0,
375
380
  _COATR,
376
381
  0,
377
382
  [_tI],
378
- [[() => CreateOAuth2TokenRequestBody, 16]],
383
+ [[() => CreateOAuth2TokenRequestBody$, 16]],
379
384
  ];
380
- var CreateOAuth2TokenRequestBody = [
385
+ var CreateOAuth2TokenRequestBody$ = [
381
386
  3,
382
387
  n0,
383
388
  _COATRB,
@@ -392,43 +397,43 @@ var CreateOAuth2TokenRequestBody = [
392
397
  [() => RefreshToken, { [_jN]: _rT }],
393
398
  ],
394
399
  ];
395
- var CreateOAuth2TokenResponse = [
400
+ var CreateOAuth2TokenResponse$ = [
396
401
  3,
397
402
  n0,
398
403
  _COATRr,
399
404
  0,
400
405
  [_tO],
401
- [[() => CreateOAuth2TokenResponseBody, 16]],
406
+ [[() => CreateOAuth2TokenResponseBody$, 16]],
402
407
  ];
403
- var CreateOAuth2TokenResponseBody = [
408
+ var CreateOAuth2TokenResponseBody$ = [
404
409
  3,
405
410
  n0,
406
411
  _COATRBr,
407
412
  0,
408
413
  [_aT, _tT, _eI, _rT, _iT],
409
414
  [
410
- [() => AccessToken, { [_jN]: _aT }],
415
+ [() => AccessToken$, { [_jN]: _aT }],
411
416
  [0, { [_jN]: _tT }],
412
417
  [1, { [_jN]: _eI }],
413
418
  [() => RefreshToken, { [_jN]: _rT }],
414
419
  [0, { [_jN]: _iT }],
415
420
  ],
416
421
  ];
417
- var InternalServerException = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
418
- TypeRegistry.for(n0).registerError(InternalServerException, InternalServerException$1);
419
- var TooManyRequestsError = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
420
- TypeRegistry.for(n0).registerError(TooManyRequestsError, TooManyRequestsError$1);
421
- var ValidationException = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
422
- TypeRegistry.for(n0).registerError(ValidationException, ValidationException$1);
423
- var SigninServiceException = [-3, _sm, "SigninServiceException", 0, [], []];
424
- TypeRegistry.for(_sm).registerError(SigninServiceException, SigninServiceException$1);
425
- var CreateOAuth2Token = [
422
+ var InternalServerException$ = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
423
+ TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
424
+ var TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
425
+ TypeRegistry.for(n0).registerError(TooManyRequestsError$, TooManyRequestsError);
426
+ var ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
427
+ TypeRegistry.for(n0).registerError(ValidationException$, ValidationException);
428
+ var SigninServiceException$ = [-3, _sm, "SigninServiceException", 0, [], []];
429
+ TypeRegistry.for(_sm).registerError(SigninServiceException$, SigninServiceException);
430
+ var CreateOAuth2Token$ = [
426
431
  9,
427
432
  n0,
428
433
  _COAT,
429
434
  { [_h]: ["POST", "/v1/token", 200] },
430
- () => CreateOAuth2TokenRequest,
431
- () => CreateOAuth2TokenResponse,
435
+ () => CreateOAuth2TokenRequest$,
436
+ () => CreateOAuth2TokenResponse$,
432
437
  ];
433
438
 
434
439
  class CreateOAuth2TokenCommand extends Command
@@ -439,8 +444,8 @@ class CreateOAuth2TokenCommand extends Command
439
444
  })
440
445
  .s("Signin", "CreateOAuth2Token", {})
441
446
  .n("SigninClient", "CreateOAuth2TokenCommand")
442
- .sc(CreateOAuth2Token)
447
+ .sc(CreateOAuth2Token$)
443
448
  .build() {
444
449
  }
445
450
 
446
- export { Command as $Command, AccessDeniedException$1 as AccessDeniedException, CreateOAuth2TokenCommand, InternalServerException$1 as InternalServerException, SigninClient, SigninServiceException$1 as SigninServiceException, TooManyRequestsError$1 as TooManyRequestsError, ValidationException$1 as ValidationException, Client as __Client };
451
+ export { Command as $Command, AccessDeniedException, AccessDeniedException$, AccessToken$, CreateOAuth2Token$, CreateOAuth2TokenCommand, CreateOAuth2TokenRequest$, CreateOAuth2TokenRequestBody$, CreateOAuth2TokenResponse$, CreateOAuth2TokenResponseBody$, InternalServerException, InternalServerException$, SigninClient, SigninServiceException, SigninServiceException$, TooManyRequestsError, TooManyRequestsError$, ValidationException, ValidationException$, Client as __Client };
@@ -1,8 +1,8 @@
1
- import { aq as ProviderError, ar as IniSectionType, as as CONFIG_PREFIX_SEPARATOR, v as readFile, at as getConfigFilepath, au as parseIni, k as getProfileName, C as CredentialsProviderError, s as setCredentialFeature } from './index-CDPFly99.mjs';
1
+ import { aq as ProviderError, ar as IniSectionType, as as CONFIG_PREFIX_SEPARATOR, v as readFile, at as getConfigFilepath, au as parseIni, k as getProfileName, C as CredentialsProviderError, s as setCredentialFeature } from './index-AssUn9IY.mjs';
2
2
  import { promises } from 'fs';
3
- import { g as getSSOTokenFilepath, a as getSSOTokenFromFile } from './getSSOTokenFromFile-Bct4fw5A.mjs';
4
- import { p as parseKnownFiles } from './parseKnownFiles-DsgpkpKC.mjs';
5
- import './readMergedOptions-uWSetyes.mjs';
3
+ import { g as getSSOTokenFilepath, a as getSSOTokenFromFile } from './getSSOTokenFromFile-BfAhZf_d.mjs';
4
+ import { p as parseKnownFiles } from './parseKnownFiles-KczcjlE0.mjs';
5
+ import './readMergedOptions-D6niy_Ep.mjs';
6
6
  import 'zod';
7
7
  import '@commander-js/extra-typings';
8
8
  import './readDotenvCascade-HLU7FsEQ.mjs';
@@ -58,9 +58,9 @@ const isSsoProfile = (arg) => arg &&
58
58
  const EXPIRE_WINDOW_MS = 5 * 60 * 1000;
59
59
  const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
60
60
 
61
- const getSsoOidcClient = async (ssoRegion, init = {}) => {
62
- const { SSOOIDCClient } = await import('./index-BJWV46OF.mjs');
63
- const coalesce = (prop) => init.clientConfig?.[prop] ?? init.parentClientConfig?.[prop];
61
+ const getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
62
+ const { SSOOIDCClient } = await import('./index-98yxYe1W.mjs');
63
+ const coalesce = (prop) => init.clientConfig?.[prop] ?? init.parentClientConfig?.[prop] ?? callerClientConfig?.[prop];
64
64
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
65
65
  region: ssoRegion ?? init.clientConfig?.region,
66
66
  logger: coalesce("logger"),
@@ -69,9 +69,9 @@ const getSsoOidcClient = async (ssoRegion, init = {}) => {
69
69
  return ssoOidcClient;
70
70
  };
71
71
 
72
- const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {
73
- const { CreateTokenCommand } = await import('./index-BJWV46OF.mjs');
74
- const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
72
+ const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConfig) => {
73
+ const { CreateTokenCommand } = await import('./index-98yxYe1W.mjs');
74
+ const ssoOidcClient = await getSsoOidcClient(ssoRegion, init, callerClientConfig);
75
75
  return ssoOidcClient.send(new CreateTokenCommand({
76
76
  clientId: ssoToken.clientId,
77
77
  clientSecret: ssoToken.clientSecret,
@@ -100,14 +100,7 @@ const writeSSOTokenToFile = (id, ssoToken) => {
100
100
  };
101
101
 
102
102
  const lastRefreshAttemptTime = new Date(0);
103
- const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {
104
- const init = {
105
- ..._init,
106
- parentClientConfig: {
107
- ...callerClientConfig,
108
- ..._init.parentClientConfig,
109
- },
110
- };
103
+ const fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
111
104
  init.logger?.debug("@aws-sdk/token-providers - fromSso");
112
105
  const profiles = await parseKnownFiles(init);
113
106
  const profileName = getProfileName({
@@ -156,7 +149,7 @@ const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {
156
149
  validateTokenKey("refreshToken", ssoToken.refreshToken, true);
157
150
  try {
158
151
  lastRefreshAttemptTime.setTime(Date.now());
159
- const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);
152
+ const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init, callerClientConfig);
160
153
  validateTokenKey("accessToken", newSsoOidcToken.accessToken);
161
154
  validateTokenKey("expiresIn", newSsoOidcToken.expiresIn);
162
155
  const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);
@@ -182,7 +175,7 @@ const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {
182
175
  };
183
176
 
184
177
  const SHOULD_FAIL_CREDENTIAL_CHAIN = false;
185
- const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, filepath, configFilepath, ignoreCache, logger, }) => {
178
+ const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger, }) => {
186
179
  let token;
187
180
  const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
188
181
  if (ssoSession) {
@@ -223,12 +216,12 @@ const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ss
223
216
  });
224
217
  }
225
218
  const { accessToken } = token;
226
- const { SSOClient, GetRoleCredentialsCommand } = await import('./loadSso-DJONWtFw.mjs');
219
+ const { SSOClient, GetRoleCredentialsCommand } = await import('./loadSso-C-y9gQEz.mjs');
227
220
  const sso = ssoClient ||
228
221
  new SSOClient(Object.assign({}, clientConfig ?? {}, {
229
- logger: clientConfig?.logger ?? parentClientConfig?.logger,
222
+ logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
230
223
  region: clientConfig?.region ?? ssoRegion,
231
- userAgentAppId: clientConfig?.userAgentAppId ?? parentClientConfig?.userAgentAppId,
224
+ userAgentAppId: clientConfig?.userAgentAppId ?? callerClientConfig?.userAgentAppId ?? parentClientConfig?.userAgentAppId,
232
225
  }));
233
226
  let ssoResp;
234
227
  try {
@@ -324,6 +317,7 @@ const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
324
317
  ssoClient: ssoClient,
325
318
  clientConfig: init.clientConfig,
326
319
  parentClientConfig: init.parentClientConfig,
320
+ callerClientConfig: init.callerClientConfig,
327
321
  profile: profileName,
328
322
  filepath: init.filepath,
329
323
  configFilepath: init.configFilepath,
@@ -345,6 +339,7 @@ const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
345
339
  ssoClient,
346
340
  clientConfig: init.clientConfig,
347
341
  parentClientConfig: init.parentClientConfig,
342
+ callerClientConfig: init.callerClientConfig,
348
343
  profile: profileName,
349
344
  filepath: init.filepath,
350
345
  configFilepath: init.configFilepath,
@@ -1,8 +1,8 @@
1
1
  import { parse } from 'url';
2
2
  import { Buffer } from 'buffer';
3
3
  import { request } from 'http';
4
- import { aq as ProviderError, C as CredentialsProviderError, F as parseUrl, O as loadConfig } from './index-CDPFly99.mjs';
5
- import './readMergedOptions-uWSetyes.mjs';
4
+ import { aq as ProviderError, C as CredentialsProviderError, F as parseUrl, O as loadConfig } from './index-AssUn9IY.mjs';
5
+ import './readMergedOptions-D6niy_Ep.mjs';
6
6
  import 'zod';
7
7
  import '@commander-js/extra-typings';
8
8
  import './readDotenvCascade-HLU7FsEQ.mjs';
@@ -1,5 +1,5 @@
1
- export { f as ENV_ACCOUNT_ID, e as ENV_CREDENTIAL_SCOPE, d as ENV_EXPIRATION, E as ENV_KEY, b as ENV_SECRET, c as ENV_SESSION, g as fromEnv } from './index-CDPFly99.mjs';
2
- import './readMergedOptions-uWSetyes.mjs';
1
+ export { f as ENV_ACCOUNT_ID, e as ENV_CREDENTIAL_SCOPE, d as ENV_EXPIRATION, E as ENV_KEY, b as ENV_SECRET, c as ENV_SESSION, g as fromEnv } from './index-AssUn9IY.mjs';
2
+ import './readMergedOptions-D6niy_Ep.mjs';
3
3
  import 'zod';
4
4
  import '@commander-js/extra-typings';
5
5
  import './readDotenvCascade-HLU7FsEQ.mjs';
@@ -1,9 +1,9 @@
1
1
  import { exec } from 'child_process';
2
2
  import { promisify } from 'util';
3
- import { s as setCredentialFeature, C as CredentialsProviderError, k as getProfileName } from './index-CDPFly99.mjs';
4
- import { e as externalDataInterceptor } from './externalDataInterceptor-CnjiiRdu.mjs';
5
- import { p as parseKnownFiles } from './parseKnownFiles-DsgpkpKC.mjs';
6
- import './readMergedOptions-uWSetyes.mjs';
3
+ import { s as setCredentialFeature, C as CredentialsProviderError, k as getProfileName } from './index-AssUn9IY.mjs';
4
+ import { e as externalDataInterceptor } from './externalDataInterceptor-gi2RH4ez.mjs';
5
+ import { p as parseKnownFiles } from './parseKnownFiles-KczcjlE0.mjs';
6
+ import './readMergedOptions-D6niy_Ep.mjs';
7
7
  import 'zod';
8
8
  import '@commander-js/extra-typings';
9
9
  import './readDotenvCascade-HLU7FsEQ.mjs';
@@ -29,7 +29,7 @@ import 'https';
29
29
  import 'stream';
30
30
  import 'process';
31
31
  import 'node:fs';
32
- import './getSSOTokenFromFile-Bct4fw5A.mjs';
32
+ import './getSSOTokenFromFile-BfAhZf_d.mjs';
33
33
  import 'fs/promises';
34
34
 
35
35
  const getValidatedProcessCredentials = (profileName, data, profiles) => {
@@ -1,7 +1,7 @@
1
1
  import fs from 'fs/promises';
2
- import { C as CredentialsProviderError, H as HttpRequest, p as parseRfc3339DateTime, N as NodeHttpHandler, s as setCredentialFeature } from './index-CDPFly99.mjs';
3
- import { s as sdkStreamMixin } from './sdk-stream-mixin-uGZKBKMz.mjs';
4
- import './readMergedOptions-uWSetyes.mjs';
2
+ import { C as CredentialsProviderError, H as HttpRequest, p as parseRfc3339DateTime, N as NodeHttpHandler, s as setCredentialFeature } from './index-AssUn9IY.mjs';
3
+ import { s as sdkStreamMixin } from './sdk-stream-mixin-blFikF4G.mjs';
4
+ import './readMergedOptions-D6niy_Ep.mjs';
5
5
  import 'zod';
6
6
  import '@commander-js/extra-typings';
7
7
  import './readDotenvCascade-HLU7FsEQ.mjs';
@@ -1,6 +1,6 @@
1
- import { w as resolveAwsSdkSigV4Config, x as normalizeProvider, y as getSmithyContext, z as EndpointCache, A as resolveEndpoint, B as awsEndpointFunctions, D as customEndpointFunctions, t as toUtf8, i as fromUtf8, F as parseUrl, G as NoOpLogger, I as AwsSdkSigV4Signer, J as NoAuthSigner, n as toBase64, m as fromBase64, K as emitWarningIfUnsupportedVersion, L as resolveDefaultsModeConfig, M as emitWarningIfUnsupportedVersion$1, O as loadConfig, r as streamCollector, P as Hash, N as NodeHttpHandler, Q as createDefaultUserAgentProvider, R as calculateBodyLength, S as NODE_APP_ID_CONFIG_OPTIONS, T as NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, U as NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, V as NODE_RETRY_MODE_CONFIG_OPTIONS, W as DEFAULT_RETRY_MODE, X as NODE_REGION_CONFIG_FILE_OPTIONS, Y as NODE_REGION_CONFIG_OPTIONS, Z as NODE_MAX_ATTEMPT_CONFIG_OPTIONS, _ as NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, $ as loadConfigsForDefaultMode, a0 as getAwsRegionExtensionConfiguration, a1 as getDefaultExtensionConfiguration, a2 as getHttpHandlerExtensionConfiguration, a3 as resolveAwsRegionExtensionConfiguration, a4 as resolveDefaultRuntimeConfig, a5 as resolveHttpHandlerRuntimeConfig, a6 as Client, a7 as resolveUserAgentConfig, a8 as resolveRetryConfig, a9 as resolveRegionConfig, aa as resolveEndpointConfig, ab as resolveHostHeaderConfig, ac as getSchemaSerdePlugin, ad as getUserAgentPlugin, ae as getRetryPlugin, af as getContentLengthPlugin, ag as getHostHeaderPlugin, ah as getLoggerPlugin, ai as getRecursionDetectionPlugin, aj as getHttpAuthSchemeEndpointRuleSetPlugin, ak as DefaultIdentityProviderConfig, al as getHttpSigningPlugin, am as ServiceException, an as TypeRegistry, ao as Command, ap as getEndpointPlugin } from './index-CDPFly99.mjs';
2
- import { A as AwsRestJsonProtocol } from './AwsRestJsonProtocol-7Uww6gmd.mjs';
3
- import './readMergedOptions-uWSetyes.mjs';
1
+ import { w as resolveAwsSdkSigV4Config, x as normalizeProvider, y as getSmithyContext, z as EndpointCache, A as resolveEndpoint, B as awsEndpointFunctions, D as customEndpointFunctions, t as toUtf8, i as fromUtf8, F as parseUrl, G as NoOpLogger, I as AwsSdkSigV4Signer, J as NoAuthSigner, n as toBase64, m as fromBase64, K as emitWarningIfUnsupportedVersion, L as resolveDefaultsModeConfig, M as emitWarningIfUnsupportedVersion$1, O as loadConfig, r as streamCollector, P as Hash, N as NodeHttpHandler, Q as createDefaultUserAgentProvider, R as calculateBodyLength, S as NODE_APP_ID_CONFIG_OPTIONS, T as NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, U as NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, V as NODE_RETRY_MODE_CONFIG_OPTIONS, W as DEFAULT_RETRY_MODE, X as NODE_REGION_CONFIG_FILE_OPTIONS, Y as NODE_REGION_CONFIG_OPTIONS, Z as NODE_MAX_ATTEMPT_CONFIG_OPTIONS, _ as NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, $ as loadConfigsForDefaultMode, a0 as getAwsRegionExtensionConfiguration, a1 as getDefaultExtensionConfiguration, a2 as getHttpHandlerExtensionConfiguration, a3 as resolveAwsRegionExtensionConfiguration, a4 as resolveDefaultRuntimeConfig, a5 as resolveHttpHandlerRuntimeConfig, a6 as Client, a7 as resolveUserAgentConfig, a8 as resolveRetryConfig, a9 as resolveRegionConfig, aa as resolveEndpointConfig, ab as resolveHostHeaderConfig, ac as getSchemaSerdePlugin, ad as getUserAgentPlugin, ae as getRetryPlugin, af as getContentLengthPlugin, ag as getHostHeaderPlugin, ah as getLoggerPlugin, ai as getRecursionDetectionPlugin, aj as getHttpAuthSchemeEndpointRuleSetPlugin, ak as DefaultIdentityProviderConfig, al as getHttpSigningPlugin, am as ServiceException, an as TypeRegistry, ao as Command, ap as getEndpointPlugin } from './index-AssUn9IY.mjs';
2
+ import { A as AwsRestJsonProtocol } from './AwsRestJsonProtocol-DeiE3wkO.mjs';
3
+ import './readMergedOptions-D6niy_Ep.mjs';
4
4
  import 'zod';
5
5
  import '@commander-js/extra-typings';
6
6
  import './readDotenvCascade-HLU7FsEQ.mjs';
@@ -26,15 +26,14 @@ import 'https';
26
26
  import 'stream';
27
27
  import 'process';
28
28
  import 'node:fs';
29
- import './sdk-stream-mixin-uGZKBKMz.mjs';
29
+ import './sdk-stream-mixin-blFikF4G.mjs';
30
30
 
31
31
  const defaultSSOHttpAuthSchemeParametersProvider = async (config, context, input) => {
32
32
  return {
33
33
  operation: getSmithyContext(context).operation,
34
- region: (await normalizeProvider(config.region)()) ||
35
- (() => {
36
- throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
37
- })(),
34
+ region: await normalizeProvider(config.region)() || (() => {
35
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
36
+ })(),
38
37
  };
39
38
  };
40
39
  function createAwsAuthSigv4HttpAuthOption(authParameters) {
@@ -60,22 +59,26 @@ function createSmithyApiNoAuthHttpAuthOption(authParameters) {
60
59
  const defaultSSOHttpAuthSchemeProvider = (authParameters) => {
61
60
  const options = [];
62
61
  switch (authParameters.operation) {
63
- case "GetRoleCredentials": {
64
- options.push(createSmithyApiNoAuthHttpAuthOption());
65
- break;
66
- }
67
- case "ListAccountRoles": {
68
- options.push(createSmithyApiNoAuthHttpAuthOption());
69
- break;
70
- }
71
- case "ListAccounts": {
72
- options.push(createSmithyApiNoAuthHttpAuthOption());
73
- break;
74
- }
75
- case "Logout": {
76
- options.push(createSmithyApiNoAuthHttpAuthOption());
77
- break;
78
- }
62
+ case "GetRoleCredentials":
63
+ {
64
+ options.push(createSmithyApiNoAuthHttpAuthOption());
65
+ break;
66
+ }
67
+ case "ListAccountRoles":
68
+ {
69
+ options.push(createSmithyApiNoAuthHttpAuthOption());
70
+ break;
71
+ }
72
+ case "ListAccounts":
73
+ {
74
+ options.push(createSmithyApiNoAuthHttpAuthOption());
75
+ break;
76
+ }
77
+ case "Logout":
78
+ {
79
+ options.push(createSmithyApiNoAuthHttpAuthOption());
80
+ break;
81
+ }
79
82
  default: {
80
83
  options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
81
84
  }
@@ -103,7 +106,7 @@ const commonParams = {
103
106
  UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" },
104
107
  };
105
108
 
106
- var version = "3.948.0";
109
+ var version = "3.965.0";
107
110
  var packageInfo = {
108
111
  version: version};
109
112
 
@@ -146,7 +149,12 @@ const getRuntimeConfig$1 = (config) => {
146
149
  },
147
150
  ],
148
151
  logger: config?.logger ?? new NoOpLogger(),
149
- protocol: config?.protocol ?? new AwsRestJsonProtocol({ defaultNamespace: "com.amazonaws.sso" }),
152
+ protocol: config?.protocol ?? AwsRestJsonProtocol,
153
+ protocolSettings: config?.protocolSettings ?? {
154
+ defaultNamespace: "com.amazonaws.sso",
155
+ version: "2019-06-10",
156
+ serviceTarget: "SWBPortalService",
157
+ },
150
158
  serviceId: config?.serviceId ?? "SSO",
151
159
  urlParser: config?.urlParser ?? parseUrl,
152
160
  utf8Decoder: config?.utf8Decoder ?? fromUtf8,
@@ -171,11 +179,9 @@ const getRuntimeConfig = (config) => {
171
179
  defaultsMode,
172
180
  authSchemePreference: config?.authSchemePreference ?? loadConfig(NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
173
181
  bodyLengthChecker: config?.bodyLengthChecker ?? calculateBodyLength,
174
- defaultUserAgentProvider: config?.defaultUserAgentProvider ??
175
- createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
182
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? createDefaultUserAgentProvider({ serviceId: clientSharedValues.serviceId, clientVersion: packageInfo.version }),
176
183
  maxAttempts: config?.maxAttempts ?? loadConfig(NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
177
- region: config?.region ??
178
- loadConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
184
+ region: config?.region ?? loadConfig(NODE_REGION_CONFIG_OPTIONS, { ...NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
179
185
  requestHandler: NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
180
186
  retryMode: config?.retryMode ??
181
187
  loadConfig({
@@ -270,14 +276,14 @@ class SSOClient extends Client {
270
276
  }
271
277
  }
272
278
 
273
- let SSOServiceException$1 = class SSOServiceException extends ServiceException {
279
+ class SSOServiceException extends ServiceException {
274
280
  constructor(options) {
275
281
  super(options);
276
282
  Object.setPrototypeOf(this, SSOServiceException.prototype);
277
283
  }
278
- };
284
+ }
279
285
 
280
- let InvalidRequestException$1 = class InvalidRequestException extends SSOServiceException$1 {
286
+ class InvalidRequestException extends SSOServiceException {
281
287
  name = "InvalidRequestException";
282
288
  $fault = "client";
283
289
  constructor(opts) {
@@ -288,8 +294,8 @@ let InvalidRequestException$1 = class InvalidRequestException extends SSOService
288
294
  });
289
295
  Object.setPrototypeOf(this, InvalidRequestException.prototype);
290
296
  }
291
- };
292
- let ResourceNotFoundException$1 = class ResourceNotFoundException extends SSOServiceException$1 {
297
+ }
298
+ class ResourceNotFoundException extends SSOServiceException {
293
299
  name = "ResourceNotFoundException";
294
300
  $fault = "client";
295
301
  constructor(opts) {
@@ -300,8 +306,8 @@ let ResourceNotFoundException$1 = class ResourceNotFoundException extends SSOSer
300
306
  });
301
307
  Object.setPrototypeOf(this, ResourceNotFoundException.prototype);
302
308
  }
303
- };
304
- let TooManyRequestsException$1 = class TooManyRequestsException extends SSOServiceException$1 {
309
+ }
310
+ class TooManyRequestsException extends SSOServiceException {
305
311
  name = "TooManyRequestsException";
306
312
  $fault = "client";
307
313
  constructor(opts) {
@@ -312,8 +318,8 @@ let TooManyRequestsException$1 = class TooManyRequestsException extends SSOServi
312
318
  });
313
319
  Object.setPrototypeOf(this, TooManyRequestsException.prototype);
314
320
  }
315
- };
316
- let UnauthorizedException$1 = class UnauthorizedException extends SSOServiceException$1 {
321
+ }
322
+ class UnauthorizedException extends SSOServiceException {
317
323
  name = "UnauthorizedException";
318
324
  $fault = "client";
319
325
  constructor(opts) {
@@ -324,7 +330,7 @@ let UnauthorizedException$1 = class UnauthorizedException extends SSOServiceExce
324
330
  });
325
331
  Object.setPrototypeOf(this, UnauthorizedException.prototype);
326
332
  }
327
- };
333
+ }
328
334
 
329
335
  const _ATT = "AccessTokenType";
330
336
  const _GRC = "GetRoleCredentials";
@@ -360,44 +366,49 @@ const n0 = "com.amazonaws.sso";
360
366
  var AccessTokenType = [0, n0, _ATT, 8, 0];
361
367
  var SecretAccessKeyType = [0, n0, _SAKT, 8, 0];
362
368
  var SessionTokenType = [0, n0, _STT, 8, 0];
363
- var GetRoleCredentialsRequest = [
364
- 3,
365
- n0,
366
- _GRCR,
369
+ var GetRoleCredentialsRequest$ = [3, n0, _GRCR,
367
370
  0,
368
371
  [_rN, _aI, _aT],
369
- [
370
- [0, { [_hQ]: _rn }],
371
- [0, { [_hQ]: _ai }],
372
- [() => AccessTokenType, { [_hH]: _xasbt }],
373
- ],
372
+ [[0, { [_hQ]: _rn }], [0, { [_hQ]: _ai }], [() => AccessTokenType, { [_hH]: _xasbt }]]
374
373
  ];
375
- var GetRoleCredentialsResponse = [3, n0, _GRCRe, 0, [_rC], [[() => RoleCredentials, 0]]];
376
- var InvalidRequestException = [-3, n0, _IRE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
377
- TypeRegistry.for(n0).registerError(InvalidRequestException, InvalidRequestException$1);
378
- var ResourceNotFoundException = [-3, n0, _RNFE, { [_e]: _c, [_hE]: 404 }, [_m], [0]];
379
- TypeRegistry.for(n0).registerError(ResourceNotFoundException, ResourceNotFoundException$1);
380
- var RoleCredentials = [
381
- 3,
382
- n0,
383
- _RC,
374
+ var GetRoleCredentialsResponse$ = [3, n0, _GRCRe,
375
+ 0,
376
+ [_rC],
377
+ [[() => RoleCredentials$, 0]]
378
+ ];
379
+ var InvalidRequestException$ = [-3, n0, _IRE,
380
+ { [_e]: _c, [_hE]: 400 },
381
+ [_m],
382
+ [0]
383
+ ];
384
+ TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
385
+ var ResourceNotFoundException$ = [-3, n0, _RNFE,
386
+ { [_e]: _c, [_hE]: 404 },
387
+ [_m],
388
+ [0]
389
+ ];
390
+ TypeRegistry.for(n0).registerError(ResourceNotFoundException$, ResourceNotFoundException);
391
+ var RoleCredentials$ = [3, n0, _RC,
384
392
  0,
385
393
  [_aKI, _sAK, _sT, _ex],
386
- [0, [() => SecretAccessKeyType, 0], [() => SessionTokenType, 0], 1],
394
+ [0, [() => SecretAccessKeyType, 0], [() => SessionTokenType, 0], 1]
395
+ ];
396
+ var TooManyRequestsException$ = [-3, n0, _TMRE,
397
+ { [_e]: _c, [_hE]: 429 },
398
+ [_m],
399
+ [0]
400
+ ];
401
+ TypeRegistry.for(n0).registerError(TooManyRequestsException$, TooManyRequestsException);
402
+ var UnauthorizedException$ = [-3, n0, _UE,
403
+ { [_e]: _c, [_hE]: 401 },
404
+ [_m],
405
+ [0]
387
406
  ];
388
- var TooManyRequestsException = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_m], [0]];
389
- TypeRegistry.for(n0).registerError(TooManyRequestsException, TooManyRequestsException$1);
390
- var UnauthorizedException = [-3, n0, _UE, { [_e]: _c, [_hE]: 401 }, [_m], [0]];
391
- TypeRegistry.for(n0).registerError(UnauthorizedException, UnauthorizedException$1);
392
- var SSOServiceException = [-3, _s, "SSOServiceException", 0, [], []];
393
- TypeRegistry.for(_s).registerError(SSOServiceException, SSOServiceException$1);
394
- var GetRoleCredentials = [
395
- 9,
396
- n0,
397
- _GRC,
398
- { [_h]: ["GET", "/federation/credentials", 200] },
399
- () => GetRoleCredentialsRequest,
400
- () => GetRoleCredentialsResponse,
407
+ TypeRegistry.for(n0).registerError(UnauthorizedException$, UnauthorizedException);
408
+ var SSOServiceException$ = [-3, _s, "SSOServiceException", 0, [], []];
409
+ TypeRegistry.for(_s).registerError(SSOServiceException$, SSOServiceException);
410
+ var GetRoleCredentials$ = [9, n0, _GRC,
411
+ { [_h]: ["GET", "/federation/credentials", 200] }, () => GetRoleCredentialsRequest$, () => GetRoleCredentialsResponse$
401
412
  ];
402
413
 
403
414
  class GetRoleCredentialsCommand extends Command
@@ -408,7 +419,7 @@ class GetRoleCredentialsCommand extends Command
408
419
  })
409
420
  .s("SWBPortalService", "GetRoleCredentials", {})
410
421
  .n("SSOClient", "GetRoleCredentialsCommand")
411
- .sc(GetRoleCredentials)
422
+ .sc(GetRoleCredentials$)
412
423
  .build() {
413
424
  }
414
425
 
@@ -1,4 +1,4 @@
1
- var version = "3.948.0";
1
+ var version = "3.965.0";
2
2
  var packageInfo = {
3
3
  version: version};
4
4
 
@@ -1,4 +1,4 @@
1
- import { l as loadSharedConfigFiles } from './index-CDPFly99.mjs';
1
+ import { l as loadSharedConfigFiles } from './index-AssUn9IY.mjs';
2
2
 
3
3
  const mergeConfigFiles = (...files) => {
4
4
  const merged = {};