@kya-os/mcp-i 1.6.2-canary.clientinfo.20251126041014 → 1.6.4-canary.slugfix.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/207.js +1 -0
- package/dist/25.js +1 -0
- package/dist/295.js +1 -1
- package/dist/387.js +1 -0
- package/dist/406.js +1 -0
- package/dist/448.js +1 -0
- package/dist/478.js +1 -0
- package/dist/482.js +1 -0
- package/dist/575.js +1 -0
- package/dist/67.js +1 -1
- package/dist/743.js +1 -0
- package/dist/784.js +1 -0
- package/dist/844.js +1 -0
- package/dist/866.js +1 -0
- package/dist/936.js +1 -0
- package/dist/941.js +1 -0
- package/dist/988.js +1 -0
- package/dist/cli-adapter/index.js +10 -1
- package/dist/runtime/adapter-express.js +1 -1
- package/dist/runtime/adapter-express.js.LICENSE.txt +6 -0
- package/dist/runtime/adapter-nextjs.js +1 -1
- package/dist/runtime/http.js +1 -1
- package/dist/runtime/http.js.LICENSE.txt +6 -0
- package/dist/runtime/stdio.js +1 -1
- package/package.json +1 -1
- package/dist/149.js +0 -1
- package/dist/189.js +0 -1
- package/dist/261.js +0 -1
- package/dist/28.js +0 -1
- package/dist/460.js +0 -1
- package/dist/570.js +0 -1
- package/dist/634.js +0 -1
- package/dist/647.js +0 -1
- package/dist/739.js +0 -1
- package/dist/742.js +0 -1
- package/dist/904.js +0 -1
- package/dist/938.js +0 -1
package/package.json
CHANGED
package/dist/149.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
"use strict";exports.id=149,exports.ids=[149],exports.modules={10602:(e,t,s)=>{s.d(t,{$:()=>o});const o="***SensitiveInformation***"},11149:(e,t,s)=>{s.d(t,{GetRoleCredentialsCommand:()=>M,SSOClient:()=>dt});var o=s(66403),n=s(53340),r=s(3594);const i={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var a=s(10602),c=s(92309);class d extends c.T{constructor(e){super(e),Object.setPrototypeOf(this,d.prototype)}}class u extends d{name="InvalidRequestException";$fault="client";constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,u.prototype)}}class p extends d{name="ResourceNotFoundException";$fault="client";constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,p.prototype)}}class h extends d{name="TooManyRequestsException";$fault="client";constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e}),Object.setPrototypeOf(this,h.prototype)}}class l extends d{name="UnauthorizedException";$fault="client";constructor(e){super({name:"UnauthorizedException",$fault:"client",...e}),Object.setPrototypeOf(this,l.prototype)}}const m=e=>({...e,...e.accessToken&&{accessToken:a.$}}),g=e=>({...e,...e.secretAccessKey&&{secretAccessKey:a.$},...e.sessionToken&&{sessionToken:a.$}}),y=e=>({...e,...e.roleCredentials&&{roleCredentials:g(e.roleCredentials)}});var f=s(46071),S=s(65875),b=s(93907);const v=e=>null!=e;var P=s(86343),w=s(10001),x=s(63976);const I=async(e,t)=>{const s=(0,S.l)(e,t),o=(0,b.Tj)({},v,{[U]:e[O]});s.bp("/federation/credentials");const n=(0,b.Tj)({[F]:[,(0,P.Y0)(e[z],"roleName")],[D]:[,(0,P.Y0)(e[j],"accountId")]});return s.m("GET").h(o).q(n).b(void 0),s.build()},E=async(e,t)=>{if(200!==e.statusCode&&e.statusCode>=300)return k(e,t);const s=(0,b.Tj)({$metadata:T(e)}),o=(0,P.Y0)((0,P.Xk)(await(0,f.Y2)(e.body,t)),"body"),n=(0,b.s)(o,{roleCredentials:w.S});return Object.assign(s,n),s},k=async(e,t)=>{const s={...e,body:await(0,f.CG)(e.body,t)},o=(0,f.cJ)(e,s.body);switch(o){case"InvalidRequestException":case"com.amazonaws.sso#InvalidRequestException":throw await A(s,t);case"ResourceNotFoundException":case"com.amazonaws.sso#ResourceNotFoundException":throw await C(s,t);case"TooManyRequestsException":case"com.amazonaws.sso#TooManyRequestsException":throw await $(s,t);case"UnauthorizedException":case"com.amazonaws.sso#UnauthorizedException":throw await q(s,t);default:const n=s.body;return R({output:e,parsedBody:n,errorCode:o})}},R=(0,x.j)(d),A=async(e,t)=>{const s=(0,b.Tj)({}),o=e.body,n=(0,b.s)(o,{message:P.lK});Object.assign(s,n);const r=new u({$metadata:T(e),...s});return(0,c.M)(r,e.body)},C=async(e,t)=>{const s=(0,b.Tj)({}),o=e.body,n=(0,b.s)(o,{message:P.lK});Object.assign(s,n);const r=new p({$metadata:T(e),...s});return(0,c.M)(r,e.body)},$=async(e,t)=>{const s=(0,b.Tj)({}),o=e.body,n=(0,b.s)(o,{message:P.lK});Object.assign(s,n);const r=new h({$metadata:T(e),...s});return(0,c.M)(r,e.body)},q=async(e,t)=>{const s=(0,b.Tj)({}),o=e.body,n=(0,b.s)(o,{message:P.lK});Object.assign(s,n);const r=new l({$metadata:T(e),...s});return(0,c.M)(r,e.body)},T=e=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]}),j="accountId",O="accessToken",D="account_id",z="roleName",F="role_name",U="x-amz-sso_bearer_token";class M extends(r.u.classBuilder().ep(i).m(function(e,t,s,r){return[(0,n.TM)(s,this.serialize,this.deserialize),(0,o.r)(s,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").f(m,y).ser(I).de(E).build()){}var K=s(67317),N=s(27847),H=s(33182),G=s(67868),Z=s(4518),L=s(20459),V=s(23369),Y=s(83007),B=s(58001),_=s(88244),W=s(79244),J=s(74499),X=s(29163),Q=s(8928),ee=s(27792),te=s(80835),se=s(6670);const oe=async(e,t,s)=>({operation:(0,te.u)(t).operation,region:await(0,se.t)(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),ne=e=>{const t=[];switch(e.operation){case"GetRoleCredentials":case"ListAccountRoles":case"ListAccounts":case"Logout":t.push({schemeId:"smithy.api#noAuth"});break;default:t.push(function(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})}}(e))}return t};var re=s(21674),ie=s(61008),ae=s(4425),ce=s(34767),de=s(91968),ue=s(28164),pe=s(41942),he=s(13820),le=s(43316),me=s(41911),ge=s(46553),ye=s(31680),fe=s(88468),Se=s(57180),be=s(31305),ve=s(96527),Pe=s(72804),we=s(69367),xe=s(19506),Ie=s(40935),Ee=s(2914),ke=s(56771),Re=s(2257),Ae=s(63305),Ce=s(37867);const $e="required",qe="fn",Te="argv",je="ref",Oe=!0,De="isSet",ze="booleanEquals",Fe="error",Ue="endpoint",Me="tree",Ke="PartitionResult",Ne="getAttr",He={[$e]:!1,type:"String"},Ge={[$e]:!0,default:!1,type:"Boolean"},Ze={[je]:"Endpoint"},Le={[qe]:ze,[Te]:[{[je]:"UseFIPS"},!0]},Ve={[qe]:ze,[Te]:[{[je]:"UseDualStack"},!0]},Ye={},Be={[qe]:Ne,[Te]:[{[je]:Ke},"supportsFIPS"]},_e={[je]:Ke},We={[qe]:ze,[Te]:[!0,{[qe]:Ne,[Te]:[_e,"supportsDualStack"]}]},Je=[Le],Xe=[Ve],Qe=[{[je]:"Region"}],et={version:"1.0",parameters:{Region:He,UseDualStack:Ge,UseFIPS:Ge,Endpoint:He},rules:[{conditions:[{[qe]:De,[Te]:[Ze]}],rules:[{conditions:Je,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:Fe},{conditions:Xe,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:Fe},{endpoint:{url:Ze,properties:Ye,headers:Ye},type:Ue}],type:Me},{conditions:[{[qe]:De,[Te]:Qe}],rules:[{conditions:[{[qe]:"aws.partition",[Te]:Qe,assign:Ke}],rules:[{conditions:[Le,Ve],rules:[{conditions:[{[qe]:ze,[Te]:[Oe,Be]},We],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Ye,headers:Ye},type:Ue}],type:Me},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:Fe}],type:Me},{conditions:Je,rules:[{conditions:[{[qe]:ze,[Te]:[Be,Oe]}],rules:[{conditions:[{[qe]:"stringEquals",[Te]:[{[qe]:Ne,[Te]:[_e,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:Ye,headers:Ye},type:Ue},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:Ye,headers:Ye},type:Ue}],type:Me},{error:"FIPS is enabled but this partition does not support FIPS",type:Fe}],type:Me},{conditions:Xe,rules:[{conditions:[We],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Ye,headers:Ye},type:Ue}],type:Me},{error:"DualStack is enabled but this partition does not support DualStack",type:Fe}],type:Me},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:Ye,headers:Ye},type:Ue}],type:Me}],type:Me},{error:"Invalid Configuration: Missing Region",type:Fe}]},tt=new Re.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),st=(e,t={})=>tt.get(e,()=>(0,Ae.s)(et,{endpointParams:e,logger:t.logger}));Ce.m.aws=ke.UF;var ot=s(72617),nt=s(70758),rt=s(97252);var it=s(96374),at=s(59326),ct=s(61701);class dt extends Q.K{config;constructor(...[e]){const t=(e=>{(0,rt.I)(process.version);const t=(0,nt.I)(e),s=()=>t().then(ot.l),o=(e=>({apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??we.E,base64Encoder:e?.base64Encoder??xe.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??st,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??ne,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new Se.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new be.m}],logger:e?.logger??new ve.N,serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??Pe.D,utf8Decoder:e?.utf8Decoder??Ie.a,utf8Encoder:e?.utf8Encoder??Ee.P}))(e);(0,re.I)(process.version);const n={profile:e?.profile,logger:o.logger};return{...o,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,le.Z)(ie.$,n),bodyLengthChecker:e?.bodyLengthChecker??ye.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,ae.pf)({serviceId:o.serviceId,clientVersion:"3.901.0"}),maxAttempts:e?.maxAttempts??(0,le.Z)(J.qs,e),region:e?.region??(0,le.Z)(de.GG,{...de.zH,...n}),requestHandler:me.$.create(e?.requestHandler??s),retryMode:e?.retryMode??(0,le.Z)({...J.kN,default:async()=>(await s()).retryMode||fe.L0},e),sha256:e?.sha256??he.V.bind(null,"sha256"),streamCollector:e?.streamCollector??ge.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,le.Z)(ue.e$,n),useFipsEndpoint:e?.useFipsEndpoint??(0,le.Z)(pe.Ko,n),userAgentAppId:e?.userAgentAppId??(0,le.Z)(ce.hV,n)}})(e||{});super(t),this.initConfig=t;const s=(o=t,Object.assign(o,{useDualstackEndpoint:o.useDualstackEndpoint??!1,useFipsEndpoint:o.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}));var o;const n=(0,G.D)(s),r=(0,J.$z)(n),i=(0,L.T)(r),a=(0,K.OV)(i),c=((e,t)=>{const s=Object.assign((0,it.R)(e),(0,ct.xA)(e),(0,at.e)(e),(e=>{const t=e.httpAuthSchemes;let s=e.httpAuthSchemeProvider,o=e.credentials;return{setHttpAuthScheme(e){const s=t.findIndex(t=>t.schemeId===e.schemeId);-1===s?t.push(e):t.splice(s,1,e)},httpAuthSchemes:()=>t,setHttpAuthSchemeProvider(e){s=e},httpAuthSchemeProvider:()=>s,setCredentials(e){o=e},credentials:()=>o}})(e));return t.forEach(e=>e.configure(s)),Object.assign(e,(0,it.$)(s),(0,ct.uv)(s),(0,at.j)(s),{httpAuthSchemes:(o=s).httpAuthSchemes(),httpAuthSchemeProvider:o.httpAuthSchemeProvider(),credentials:o.credentials()});var o})((e=>{const t=(0,ee.h)(e);return Object.assign(t,{authSchemePreference:(0,se.t)(e.authSchemePreference??[])})})((0,W.C)(a)),e?.extensions||[]);this.config=c,this.middlewareStack.use((0,Z.sM)(this.config)),this.middlewareStack.use((0,X.ey)(this.config)),this.middlewareStack.use((0,_.vK)(this.config)),this.middlewareStack.use((0,K.TC)(this.config)),this.middlewareStack.use((0,N.Y7)(this.config)),this.middlewareStack.use((0,H.n)(this.config)),this.middlewareStack.use((0,V.w)(this.config,{httpAuthSchemeParametersProvider:oe,identityProviderConfigProvider:async e=>new Y.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,B.l)(this.config))}destroy(){super.destroy()}}},31305:(e,t,s)=>{s.d(t,{m:()=>o});class o{async sign(e,t,s){return e}}},37579:(e,t,s)=>{function o(e){return encodeURIComponent(e).replace(/[!'()*]/g,function(e){return"%"+e.charCodeAt(0).toString(16).toUpperCase()})}s.d(t,{$:()=>o})},65875:(e,t,s)=>{s.d(t,{l:()=>r});var o=s(32141),n=s(37579);function r(e,t){return new i(e,t)}class i{input;context;query={};method="";headers={};path="";body=null;hostname="";resolvePathStack=[];constructor(e,t){this.input=e,this.context=t}async build(){const{hostname:e,protocol:t="https",port:s,path:n}=await this.context.endpoint();this.path=n;for(const e of this.resolvePathStack)e(this.path);return new o.K({protocol:t,hostname:this.hostname||e,port:s,method:this.method,path:this.path,query:this.query,body:this.body,headers:this.headers})}hn(e){return this.hostname=e,this}bp(e){return this.resolvePathStack.push(t=>{this.path=`${t?.endsWith("/")?t.slice(0,-1):t||""}`+e}),this}p(e,t,s,o){return this.resolvePathStack.push(r=>{this.path=((e,t,s,o,r,i)=>{if(null==t||void 0===t[s])throw new Error("No value provided for input HTTP label: "+s+".");{const t=o();if(t.length<=0)throw new Error("Empty value provided for input HTTP label: "+s+".");e=e.replace(r,i?t.split("/").map(e=>(0,n.$)(e)).join("/"):(0,n.$)(t))}return e})(r,this.input,e,t,s,o)}),this}h(e){return this.headers=e,this}q(e){return this.query=e,this}b(e){return this.body=e,this}m(e){return this.method=e,this}}}};
|
package/dist/189.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
"use strict";exports.id=189,exports.ids=[189],exports.modules={37481:(e,r,o)=>{o.d(r,{Z:()=>c});var t=o(51869),s=o(31493);const c={getFileRecord:()=>s.Jj,interceptFile(e,r){s.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>t.a,interceptToken(e,r){t.a[e]=r}}},51869:(e,r,o)=>{o.d(r,{a:()=>i,v:()=>n});var t=o(79896),s=o(55786);const{readFile:c}=t.promises,i={},n=async e=>{if(i[e])return i[e];const r=(0,s.C)(e),o=await c(r,"utf8");return JSON.parse(o)}},55786:(e,r,o)=>{o.d(r,{C:()=>i});var t=o(76982),s=o(16928),c=o(47741);const i=e=>{const r=(0,t.createHash)("sha1").update(e).digest("hex");return(0,s.join)((0,c.R)(),".aws","sso","cache",`${r}.json`)}},66189:(e,r,o)=>{o.r(r),o.d(r,{fromProcess:()=>l});var t=o(98306),s=o(67789),c=o(3721),i=o(37481),n=o(35317),a=o(39023),d=o(64172);const l=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");const o=await(0,t.Y)(e);return(async(e,r,o)=>{const t=r[e];if(!r[e])throw new c.C(`Profile ${e} could not be found in shared credentials file.`,{logger:o});{const s=t.credential_process;if(void 0===s)throw new c.C(`Profile ${e} did not contain credential_process.`,{logger:o});{const t=(0,a.promisify)(i.Z?.getTokenRecord?.().exec??n.exec);try{const{stdout:o}=await t(s);let c;try{c=JSON.parse(o.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}return((e,r,o)=>{if(1!==r.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===r.AccessKeyId||void 0===r.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(r.Expiration){const o=new Date;if(new Date(r.Expiration)<o)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let t=r.AccountId;!t&&o?.[e]?.aws_account_id&&(t=o[e].aws_account_id);const s={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,...r.SessionToken&&{sessionToken:r.SessionToken},...r.Expiration&&{expiration:new Date(r.Expiration)},...r.CredentialScope&&{credentialScope:r.CredentialScope},...t&&{accountId:t}};return(0,d.g)(s,"CREDENTIALS_PROCESS","w"),s})(e,c,r)}catch(e){throw new c.C(e.message,{logger:o})}}}})((0,s.Bz)({profile:e.profile??r?.profile}),o,e.logger)}}};
|