@kya-os/mcp-i 1.6.3-canary.clientinfo.20251126124133 → 1.6.4-canary.slugfix.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@kya-os/mcp-i",
3
- "version": "1.6.3-canary.clientinfo.20251126124133",
3
+ "version": "1.6.4-canary.slugfix.0",
4
4
  "description": "The TypeScript MCP framework with identity features built-in",
5
5
  "type": "commonjs",
6
6
  "main": "dist/index.js",
package/dist/149.js DELETED
@@ -1 +0,0 @@
1
- "use strict";exports.id=149,exports.ids=[149],exports.modules={10602:(e,t,s)=>{s.d(t,{$:()=>o});const o="***SensitiveInformation***"},11149:(e,t,s)=>{s.d(t,{GetRoleCredentialsCommand:()=>M,SSOClient:()=>dt});var o=s(66403),n=s(53340),r=s(3594);const i={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var a=s(10602),c=s(92309);class d extends c.T{constructor(e){super(e),Object.setPrototypeOf(this,d.prototype)}}class u extends d{name="InvalidRequestException";$fault="client";constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,u.prototype)}}class p extends d{name="ResourceNotFoundException";$fault="client";constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,p.prototype)}}class h extends d{name="TooManyRequestsException";$fault="client";constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e}),Object.setPrototypeOf(this,h.prototype)}}class l extends d{name="UnauthorizedException";$fault="client";constructor(e){super({name:"UnauthorizedException",$fault:"client",...e}),Object.setPrototypeOf(this,l.prototype)}}const m=e=>({...e,...e.accessToken&&{accessToken:a.$}}),g=e=>({...e,...e.secretAccessKey&&{secretAccessKey:a.$},...e.sessionToken&&{sessionToken:a.$}}),y=e=>({...e,...e.roleCredentials&&{roleCredentials:g(e.roleCredentials)}});var f=s(46071),S=s(65875),b=s(93907);const v=e=>null!=e;var P=s(86343),w=s(10001),x=s(63976);const I=async(e,t)=>{const s=(0,S.l)(e,t),o=(0,b.Tj)({},v,{[U]:e[O]});s.bp("/federation/credentials");const n=(0,b.Tj)({[F]:[,(0,P.Y0)(e[z],"roleName")],[D]:[,(0,P.Y0)(e[j],"accountId")]});return s.m("GET").h(o).q(n).b(void 0),s.build()},E=async(e,t)=>{if(200!==e.statusCode&&e.statusCode>=300)return k(e,t);const s=(0,b.Tj)({$metadata:T(e)}),o=(0,P.Y0)((0,P.Xk)(await(0,f.Y2)(e.body,t)),"body"),n=(0,b.s)(o,{roleCredentials:w.S});return Object.assign(s,n),s},k=async(e,t)=>{const s={...e,body:await(0,f.CG)(e.body,t)},o=(0,f.cJ)(e,s.body);switch(o){case"InvalidRequestException":case"com.amazonaws.sso#InvalidRequestException":throw await A(s,t);case"ResourceNotFoundException":case"com.amazonaws.sso#ResourceNotFoundException":throw await C(s,t);case"TooManyRequestsException":case"com.amazonaws.sso#TooManyRequestsException":throw await $(s,t);case"UnauthorizedException":case"com.amazonaws.sso#UnauthorizedException":throw await q(s,t);default:const n=s.body;return R({output:e,parsedBody:n,errorCode:o})}},R=(0,x.j)(d),A=async(e,t)=>{const s=(0,b.Tj)({}),o=e.body,n=(0,b.s)(o,{message:P.lK});Object.assign(s,n);const r=new u({$metadata:T(e),...s});return(0,c.M)(r,e.body)},C=async(e,t)=>{const s=(0,b.Tj)({}),o=e.body,n=(0,b.s)(o,{message:P.lK});Object.assign(s,n);const r=new p({$metadata:T(e),...s});return(0,c.M)(r,e.body)},$=async(e,t)=>{const s=(0,b.Tj)({}),o=e.body,n=(0,b.s)(o,{message:P.lK});Object.assign(s,n);const r=new h({$metadata:T(e),...s});return(0,c.M)(r,e.body)},q=async(e,t)=>{const s=(0,b.Tj)({}),o=e.body,n=(0,b.s)(o,{message:P.lK});Object.assign(s,n);const r=new l({$metadata:T(e),...s});return(0,c.M)(r,e.body)},T=e=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]}),j="accountId",O="accessToken",D="account_id",z="roleName",F="role_name",U="x-amz-sso_bearer_token";class M extends(r.u.classBuilder().ep(i).m(function(e,t,s,r){return[(0,n.TM)(s,this.serialize,this.deserialize),(0,o.r)(s,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").f(m,y).ser(I).de(E).build()){}var K=s(67317),N=s(27847),H=s(33182),G=s(67868),Z=s(4518),L=s(20459),V=s(23369),Y=s(83007),B=s(58001),_=s(88244),W=s(79244),J=s(74499),X=s(29163),Q=s(8928),ee=s(27792),te=s(80835),se=s(6670);const oe=async(e,t,s)=>({operation:(0,te.u)(t).operation,region:await(0,se.t)(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),ne=e=>{const t=[];switch(e.operation){case"GetRoleCredentials":case"ListAccountRoles":case"ListAccounts":case"Logout":t.push({schemeId:"smithy.api#noAuth"});break;default:t.push(function(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})}}(e))}return t};var re=s(21674),ie=s(61008),ae=s(4425),ce=s(34767),de=s(91968),ue=s(28164),pe=s(41942),he=s(13820),le=s(43316),me=s(41911),ge=s(46553),ye=s(31680),fe=s(88468),Se=s(57180),be=s(31305),ve=s(96527),Pe=s(72804),we=s(69367),xe=s(19506),Ie=s(40935),Ee=s(2914),ke=s(56771),Re=s(2257),Ae=s(63305),Ce=s(37867);const $e="required",qe="fn",Te="argv",je="ref",Oe=!0,De="isSet",ze="booleanEquals",Fe="error",Ue="endpoint",Me="tree",Ke="PartitionResult",Ne="getAttr",He={[$e]:!1,type:"String"},Ge={[$e]:!0,default:!1,type:"Boolean"},Ze={[je]:"Endpoint"},Le={[qe]:ze,[Te]:[{[je]:"UseFIPS"},!0]},Ve={[qe]:ze,[Te]:[{[je]:"UseDualStack"},!0]},Ye={},Be={[qe]:Ne,[Te]:[{[je]:Ke},"supportsFIPS"]},_e={[je]:Ke},We={[qe]:ze,[Te]:[!0,{[qe]:Ne,[Te]:[_e,"supportsDualStack"]}]},Je=[Le],Xe=[Ve],Qe=[{[je]:"Region"}],et={version:"1.0",parameters:{Region:He,UseDualStack:Ge,UseFIPS:Ge,Endpoint:He},rules:[{conditions:[{[qe]:De,[Te]:[Ze]}],rules:[{conditions:Je,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:Fe},{conditions:Xe,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:Fe},{endpoint:{url:Ze,properties:Ye,headers:Ye},type:Ue}],type:Me},{conditions:[{[qe]:De,[Te]:Qe}],rules:[{conditions:[{[qe]:"aws.partition",[Te]:Qe,assign:Ke}],rules:[{conditions:[Le,Ve],rules:[{conditions:[{[qe]:ze,[Te]:[Oe,Be]},We],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Ye,headers:Ye},type:Ue}],type:Me},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:Fe}],type:Me},{conditions:Je,rules:[{conditions:[{[qe]:ze,[Te]:[Be,Oe]}],rules:[{conditions:[{[qe]:"stringEquals",[Te]:[{[qe]:Ne,[Te]:[_e,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:Ye,headers:Ye},type:Ue},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:Ye,headers:Ye},type:Ue}],type:Me},{error:"FIPS is enabled but this partition does not support FIPS",type:Fe}],type:Me},{conditions:Xe,rules:[{conditions:[We],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Ye,headers:Ye},type:Ue}],type:Me},{error:"DualStack is enabled but this partition does not support DualStack",type:Fe}],type:Me},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:Ye,headers:Ye},type:Ue}],type:Me}],type:Me},{error:"Invalid Configuration: Missing Region",type:Fe}]},tt=new Re.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),st=(e,t={})=>tt.get(e,()=>(0,Ae.s)(et,{endpointParams:e,logger:t.logger}));Ce.m.aws=ke.UF;var ot=s(72617),nt=s(70758),rt=s(97252);var it=s(96374),at=s(59326),ct=s(61701);class dt extends Q.K{config;constructor(...[e]){const t=(e=>{(0,rt.I)(process.version);const t=(0,nt.I)(e),s=()=>t().then(ot.l),o=(e=>({apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??we.E,base64Encoder:e?.base64Encoder??xe.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??st,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??ne,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new Se.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new be.m}],logger:e?.logger??new ve.N,serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??Pe.D,utf8Decoder:e?.utf8Decoder??Ie.a,utf8Encoder:e?.utf8Encoder??Ee.P}))(e);(0,re.I)(process.version);const n={profile:e?.profile,logger:o.logger};return{...o,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,le.Z)(ie.$,n),bodyLengthChecker:e?.bodyLengthChecker??ye.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,ae.pf)({serviceId:o.serviceId,clientVersion:"3.901.0"}),maxAttempts:e?.maxAttempts??(0,le.Z)(J.qs,e),region:e?.region??(0,le.Z)(de.GG,{...de.zH,...n}),requestHandler:me.$.create(e?.requestHandler??s),retryMode:e?.retryMode??(0,le.Z)({...J.kN,default:async()=>(await s()).retryMode||fe.L0},e),sha256:e?.sha256??he.V.bind(null,"sha256"),streamCollector:e?.streamCollector??ge.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,le.Z)(ue.e$,n),useFipsEndpoint:e?.useFipsEndpoint??(0,le.Z)(pe.Ko,n),userAgentAppId:e?.userAgentAppId??(0,le.Z)(ce.hV,n)}})(e||{});super(t),this.initConfig=t;const s=(o=t,Object.assign(o,{useDualstackEndpoint:o.useDualstackEndpoint??!1,useFipsEndpoint:o.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}));var o;const n=(0,G.D)(s),r=(0,J.$z)(n),i=(0,L.T)(r),a=(0,K.OV)(i),c=((e,t)=>{const s=Object.assign((0,it.R)(e),(0,ct.xA)(e),(0,at.e)(e),(e=>{const t=e.httpAuthSchemes;let s=e.httpAuthSchemeProvider,o=e.credentials;return{setHttpAuthScheme(e){const s=t.findIndex(t=>t.schemeId===e.schemeId);-1===s?t.push(e):t.splice(s,1,e)},httpAuthSchemes:()=>t,setHttpAuthSchemeProvider(e){s=e},httpAuthSchemeProvider:()=>s,setCredentials(e){o=e},credentials:()=>o}})(e));return t.forEach(e=>e.configure(s)),Object.assign(e,(0,it.$)(s),(0,ct.uv)(s),(0,at.j)(s),{httpAuthSchemes:(o=s).httpAuthSchemes(),httpAuthSchemeProvider:o.httpAuthSchemeProvider(),credentials:o.credentials()});var o})((e=>{const t=(0,ee.h)(e);return Object.assign(t,{authSchemePreference:(0,se.t)(e.authSchemePreference??[])})})((0,W.C)(a)),e?.extensions||[]);this.config=c,this.middlewareStack.use((0,Z.sM)(this.config)),this.middlewareStack.use((0,X.ey)(this.config)),this.middlewareStack.use((0,_.vK)(this.config)),this.middlewareStack.use((0,K.TC)(this.config)),this.middlewareStack.use((0,N.Y7)(this.config)),this.middlewareStack.use((0,H.n)(this.config)),this.middlewareStack.use((0,V.w)(this.config,{httpAuthSchemeParametersProvider:oe,identityProviderConfigProvider:async e=>new Y.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,B.l)(this.config))}destroy(){super.destroy()}}},31305:(e,t,s)=>{s.d(t,{m:()=>o});class o{async sign(e,t,s){return e}}},37579:(e,t,s)=>{function o(e){return encodeURIComponent(e).replace(/[!'()*]/g,function(e){return"%"+e.charCodeAt(0).toString(16).toUpperCase()})}s.d(t,{$:()=>o})},65875:(e,t,s)=>{s.d(t,{l:()=>r});var o=s(32141),n=s(37579);function r(e,t){return new i(e,t)}class i{input;context;query={};method="";headers={};path="";body=null;hostname="";resolvePathStack=[];constructor(e,t){this.input=e,this.context=t}async build(){const{hostname:e,protocol:t="https",port:s,path:n}=await this.context.endpoint();this.path=n;for(const e of this.resolvePathStack)e(this.path);return new o.K({protocol:t,hostname:this.hostname||e,port:s,method:this.method,path:this.path,query:this.query,body:this.body,headers:this.headers})}hn(e){return this.hostname=e,this}bp(e){return this.resolvePathStack.push(t=>{this.path=`${t?.endsWith("/")?t.slice(0,-1):t||""}`+e}),this}p(e,t,s,o){return this.resolvePathStack.push(r=>{this.path=((e,t,s,o,r,i)=>{if(null==t||void 0===t[s])throw new Error("No value provided for input HTTP label: "+s+".");{const t=o();if(t.length<=0)throw new Error("Empty value provided for input HTTP label: "+s+".");e=e.replace(r,i?t.split("/").map(e=>(0,n.$)(e)).join("/"):(0,n.$)(t))}return e})(r,this.input,e,t,s,o)}),this}h(e){return this.headers=e,this}q(e){return this.query=e,this}b(e){return this.body=e,this}m(e){return this.method=e,this}}}};
package/dist/189.js DELETED
@@ -1 +0,0 @@
1
- "use strict";exports.id=189,exports.ids=[189],exports.modules={37481:(e,r,o)=>{o.d(r,{Z:()=>c});var t=o(51869),s=o(31493);const c={getFileRecord:()=>s.Jj,interceptFile(e,r){s.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>t.a,interceptToken(e,r){t.a[e]=r}}},51869:(e,r,o)=>{o.d(r,{a:()=>i,v:()=>n});var t=o(79896),s=o(55786);const{readFile:c}=t.promises,i={},n=async e=>{if(i[e])return i[e];const r=(0,s.C)(e),o=await c(r,"utf8");return JSON.parse(o)}},55786:(e,r,o)=>{o.d(r,{C:()=>i});var t=o(76982),s=o(16928),c=o(47741);const i=e=>{const r=(0,t.createHash)("sha1").update(e).digest("hex");return(0,s.join)((0,c.R)(),".aws","sso","cache",`${r}.json`)}},66189:(e,r,o)=>{o.r(r),o.d(r,{fromProcess:()=>l});var t=o(98306),s=o(67789),c=o(3721),i=o(37481),n=o(35317),a=o(39023),d=o(64172);const l=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");const o=await(0,t.Y)(e);return(async(e,r,o)=>{const t=r[e];if(!r[e])throw new c.C(`Profile ${e} could not be found in shared credentials file.`,{logger:o});{const s=t.credential_process;if(void 0===s)throw new c.C(`Profile ${e} did not contain credential_process.`,{logger:o});{const t=(0,a.promisify)(i.Z?.getTokenRecord?.().exec??n.exec);try{const{stdout:o}=await t(s);let c;try{c=JSON.parse(o.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}return((e,r,o)=>{if(1!==r.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===r.AccessKeyId||void 0===r.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(r.Expiration){const o=new Date;if(new Date(r.Expiration)<o)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let t=r.AccountId;!t&&o?.[e]?.aws_account_id&&(t=o[e].aws_account_id);const s={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,...r.SessionToken&&{sessionToken:r.SessionToken},...r.Expiration&&{expiration:new Date(r.Expiration)},...r.CredentialScope&&{credentialScope:r.CredentialScope},...t&&{accountId:t}};return(0,d.g)(s,"CREDENTIALS_PROCESS","w"),s})(e,c,r)}catch(e){throw new c.C(e.message,{logger:o})}}}})((0,s.Bz)({profile:e.profile??r?.profile}),o,e.logger)}}};