@kya-os/mcp-i 1.6.3-canary.clientinfo.20251126124133 → 1.6.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/189.js +1 -1
- package/dist/570.js +1 -1
- package/dist/739.js +1 -1
- package/dist/runtime/adapter-express.js +1 -1
- package/dist/runtime/adapter-express.js.LICENSE.txt +6 -0
- package/dist/runtime/adapter-nextjs.js +1 -1
- package/dist/runtime/http.js +1 -1
- package/dist/runtime/http.js.LICENSE.txt +6 -0
- package/dist/runtime/session.js +2 -0
- package/dist/runtime/stdio.js +1 -1
- package/dist/runtime/utils/tools.js +1 -0
- package/package.json +5 -5
package/dist/189.js
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";exports.id=189,exports.ids=[189],exports.modules={37481:(e,r,o)=>{o.d(r,{Z:()=>c});var t=o(51869),s=o(31493);const c={getFileRecord:()=>s.Jj,interceptFile(e,r){s.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>t.a,interceptToken(e,r){t.a[e]=r}}},51869:(e,r,o)=>{o.d(r,{a:()=>i,v:()=>n});var t=o(79896),s=o(55786);const{readFile:c}=t.promises,i={},n=async e=>{if(i[e])return i[e];const r=(0,s.C)(e),o=await c(r,"utf8");return JSON.parse(o)}},55786:(e,r,o)=>{o.d(r,{C:()=>i});var t=o(76982),s=o(16928),c=o(47741);const i=e=>{const r=(0,t.createHash)("sha1").update(e).digest("hex");return(0,s.join)((0,c.R)(),".aws","sso","cache",`${r}.json`)}},66189:(e,r,o)=>{o.
|
|
1
|
+
"use strict";exports.id=189,exports.ids=[189],exports.modules={37481:(e,r,o)=>{o.d(r,{Z:()=>c});var t=o(51869),s=o(31493);const c={getFileRecord:()=>s.Jj,interceptFile(e,r){s.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>t.a,interceptToken(e,r){t.a[e]=r}}},51869:(e,r,o)=>{o.d(r,{a:()=>i,v:()=>n});var t=o(79896),s=o(55786);const{readFile:c}=t.promises,i={},n=async e=>{if(i[e])return i[e];const r=(0,s.C)(e),o=await c(r,"utf8");return JSON.parse(o)}},55786:(e,r,o)=>{o.d(r,{C:()=>i});var t=o(76982),s=o(16928),c=o(47741);const i=e=>{const r=(0,t.createHash)("sha1").update(e).digest("hex");return(0,s.join)((0,c.R)(),".aws","sso","cache",`${r}.json`)}},66189:(e,r,o)=>{o.d(r,{fromProcess:()=>l});var t=o(98306),s=o(67789),c=o(3721),i=o(37481),n=o(35317),a=o(39023),d=o(64172);const l=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");const o=await(0,t.Y)(e);return(async(e,r,o)=>{const t=r[e];if(!r[e])throw new c.C(`Profile ${e} could not be found in shared credentials file.`,{logger:o});{const s=t.credential_process;if(void 0===s)throw new c.C(`Profile ${e} did not contain credential_process.`,{logger:o});{const t=(0,a.promisify)(i.Z?.getTokenRecord?.().exec??n.exec);try{const{stdout:o}=await t(s);let c;try{c=JSON.parse(o.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}return((e,r,o)=>{if(1!==r.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===r.AccessKeyId||void 0===r.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(r.Expiration){const o=new Date;if(new Date(r.Expiration)<o)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let t=r.AccountId;!t&&o?.[e]?.aws_account_id&&(t=o[e].aws_account_id);const s={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,...r.SessionToken&&{sessionToken:r.SessionToken},...r.Expiration&&{expiration:new Date(r.Expiration)},...r.CredentialScope&&{credentialScope:r.CredentialScope},...t&&{accountId:t}};return(0,d.g)(s,"CREDENTIALS_PROCESS","w"),s})(e,c,r)}catch(e){throw new c.C(e.message,{logger:o})}}}})((0,s.Bz)({profile:e.profile??r?.profile}),o,e.logger)}}};
|
package/dist/570.js
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";exports.id=570,exports.ids=[189,570],exports.modules={37481:(e,r,o)=>{o.d(r,{Z:()=>n});var t=o(51869),s=o(31493);const n={getFileRecord:()=>s.Jj,interceptFile(e,r){s.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>t.a,interceptToken(e,r){t.a[e]=r}}},51869:(e,r,o)=>{o.d(r,{a:()=>c,v:()=>i});var t=o(79896),s=o(55786);const{readFile:n}=t.promises,c={},i=async e=>{if(c[e])return c[e];const r=(0,s.C)(e),o=await n(r,"utf8");return JSON.parse(o)}},55786:(e,r,o)=>{o.d(r,{C:()=>c});var t=o(76982),s=o(16928),n=o(47741);const c=e=>{const r=(0,t.createHash)("sha1").update(e).digest("hex");return(0,s.join)((0,n.R)(),".aws","sso","cache",`${r}.json`)}},66189:(e,r,o)=>{o.
|
|
1
|
+
"use strict";exports.id=570,exports.ids=[189,570],exports.modules={37481:(e,r,o)=>{o.d(r,{Z:()=>n});var t=o(51869),s=o(31493);const n={getFileRecord:()=>s.Jj,interceptFile(e,r){s.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>t.a,interceptToken(e,r){t.a[e]=r}}},51869:(e,r,o)=>{o.d(r,{a:()=>c,v:()=>i});var t=o(79896),s=o(55786);const{readFile:n}=t.promises,c={},i=async e=>{if(c[e])return c[e];const r=(0,s.C)(e),o=await n(r,"utf8");return JSON.parse(o)}},55786:(e,r,o)=>{o.d(r,{C:()=>c});var t=o(76982),s=o(16928),n=o(47741);const c=e=>{const r=(0,t.createHash)("sha1").update(e).digest("hex");return(0,s.join)((0,n.R)(),".aws","sso","cache",`${r}.json`)}},66189:(e,r,o)=>{o.d(r,{fromProcess:()=>l});var t=o(98306),s=o(67789),n=o(3721),c=o(37481),i=o(35317),a=o(39023),d=o(64172);const l=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");const o=await(0,t.Y)(e);return(async(e,r,o)=>{const t=r[e];if(!r[e])throw new n.C(`Profile ${e} could not be found in shared credentials file.`,{logger:o});{const s=t.credential_process;if(void 0===s)throw new n.C(`Profile ${e} did not contain credential_process.`,{logger:o});{const t=(0,a.promisify)(c.Z?.getTokenRecord?.().exec??i.exec);try{const{stdout:o}=await t(s);let n;try{n=JSON.parse(o.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}return((e,r,o)=>{if(1!==r.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===r.AccessKeyId||void 0===r.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(r.Expiration){const o=new Date;if(new Date(r.Expiration)<o)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let t=r.AccountId;!t&&o?.[e]?.aws_account_id&&(t=o[e].aws_account_id);const s={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,...r.SessionToken&&{sessionToken:r.SessionToken},...r.Expiration&&{expiration:new Date(r.Expiration)},...r.CredentialScope&&{credentialScope:r.CredentialScope},...t&&{accountId:t}};return(0,d.g)(s,"CREDENTIALS_PROCESS","w"),s})(e,n,r)}catch(e){throw new n.C(e.message,{logger:o})}}}})((0,s.Bz)({profile:e.profile??r?.profile}),o,e.logger)}},98306:(e,r,o)=>{o.d(r,{Y:()=>s});var t=o(40338);const s=async e=>{const r=await(0,t.p)(e);return((...e)=>{const r={};for(const o of e)for(const[e,t]of Object.entries(o))void 0!==r[e]?Object.assign(r[e],t):r[e]=t;return r})(r.configFile,r.credentialsFile)}}};
|
package/dist/739.js
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";exports.id=739,exports.ids=[739],exports.modules={37481:(e,n,o)=>{o.d(n,{Z:()=>i});var r=o(51869),t=o(31493);const i={getFileRecord:()=>t.Jj,interceptFile(e,n){t.Jj[e]=Promise.resolve(n)},getTokenRecord:()=>r.a,interceptToken(e,n){r.a[e]=n}}},51869:(e,n,o)=>{o.d(n,{a:()=>s,v:()=>a});var r=o(79896),t=o(55786);const{readFile:i}=r.promises,s={},a=async e=>{if(s[e])return s[e];const n=(0,t.C)(e),o=await i(n,"utf8");return JSON.parse(o)}},55786:(e,n,o)=>{o.d(n,{C:()=>s});var r=o(76982),t=o(16928),i=o(47741);const s=e=>{const n=(0,r.createHash)("sha1").update(e).digest("hex");return(0,t.join)((0,i.R)(),".aws","sso","cache",`${n}.json`)}},70739:(e,n,o)=>{o.
|
|
1
|
+
"use strict";exports.id=739,exports.ids=[739],exports.modules={37481:(e,n,o)=>{o.d(n,{Z:()=>i});var r=o(51869),t=o(31493);const i={getFileRecord:()=>t.Jj,interceptFile(e,n){t.Jj[e]=Promise.resolve(n)},getTokenRecord:()=>r.a,interceptToken(e,n){r.a[e]=n}}},51869:(e,n,o)=>{o.d(n,{a:()=>s,v:()=>a});var r=o(79896),t=o(55786);const{readFile:i}=r.promises,s={},a=async e=>{if(s[e])return s[e];const n=(0,t.C)(e),o=await i(n,"utf8");return JSON.parse(o)}},55786:(e,n,o)=>{o.d(n,{C:()=>s});var r=o(76982),t=o(16928),i=o(47741);const s=e=>{const n=(0,r.createHash)("sha1").update(e).digest("hex");return(0,t.join)((0,i.R)(),".aws","sso","cache",`${n}.json`)}},70739:(e,n,o)=>{o.d(n,{fromTokenFile:()=>d});var r=o(64172),t=o(3721),i=o(37481),s=o(79896);const a="AWS_WEB_IDENTITY_TOKEN_FILE",d=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");const n=e?.webIdentityTokenFile??process.env[a],d=e?.roleArn??process.env.AWS_ROLE_ARN,c=e?.roleSessionName??process.env.AWS_ROLE_SESSION_NAME;if(!n||!d)throw new t.C("Web identity configuration not specified",{logger:e.logger});const l=await(e=>async n=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");const{roleArn:r,roleSessionName:t,webIdentityToken:i,providerId:s,policyArns:a,policy:d,durationSeconds:c}=e;let{roleAssumerWithWebIdentity:l}=e;if(!l){const{getDefaultRoleAssumerWithWebIdentity:r}=await o.e(742).then(o.bind(o,86742));l=r({...e.clientConfig,credentialProviderLogger:e.logger,parentClientConfig:{...n?.callerClientConfig,...e.parentClientConfig}},e.clientPlugins)}return l({RoleArn:r,RoleSessionName:t??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:i,ProviderId:s,PolicyArns:a,Policy:d,DurationSeconds:c})})({...e,webIdentityToken:i.Z?.getTokenRecord?.()[n]??(0,s.readFileSync)(n,{encoding:"ascii"}),roleArn:d,roleSessionName:c})();return n===process.env[a]&&(0,r.g)(l,"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN","h"),l}}};
|