@layerzerolabs/vm-tooling 0.0.30

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (262) hide show
  1. package/bin/lz-tool.cjs +18 -0
  2. package/dist/2TPNSECS.cjs +274 -0
  3. package/dist/2TPNSECS.cjs.map +1 -0
  4. package/dist/33GUXAT7.js +67 -0
  5. package/dist/33GUXAT7.js.map +1 -0
  6. package/dist/3AX3IZXK.cjs +79 -0
  7. package/dist/3AX3IZXK.cjs.map +1 -0
  8. package/dist/3BKFBGX3.cjs +17 -0
  9. package/dist/3BKFBGX3.cjs.map +1 -0
  10. package/dist/3EOFF6NK.cjs +51 -0
  11. package/dist/3EOFF6NK.cjs.map +1 -0
  12. package/dist/4NINFZK7.cjs +38 -0
  13. package/dist/4NINFZK7.cjs.map +1 -0
  14. package/dist/4XKJ5GJB.js +793 -0
  15. package/dist/4XKJ5GJB.js.map +1 -0
  16. package/dist/5EKZTTNT.js +82 -0
  17. package/dist/5EKZTTNT.js.map +1 -0
  18. package/dist/5MIIPWV7.cjs +75 -0
  19. package/dist/5MIIPWV7.cjs.map +1 -0
  20. package/dist/5N3Q6FCT.cjs +4 -0
  21. package/dist/5N3Q6FCT.cjs.map +1 -0
  22. package/dist/63H5FLN6.cjs +216 -0
  23. package/dist/63H5FLN6.cjs.map +1 -0
  24. package/dist/6A3MRQDI.js +3164 -0
  25. package/dist/6A3MRQDI.js.map +1 -0
  26. package/dist/6NLXVH5R.cjs +1089 -0
  27. package/dist/6NLXVH5R.cjs.map +1 -0
  28. package/dist/6UWCX7SA.js +60 -0
  29. package/dist/6UWCX7SA.js.map +1 -0
  30. package/dist/7EXYTS34.js +125 -0
  31. package/dist/7EXYTS34.js.map +1 -0
  32. package/dist/7LKSKL4C.cjs +64 -0
  33. package/dist/7LKSKL4C.cjs.map +1 -0
  34. package/dist/7PKC46XS.js +244 -0
  35. package/dist/7PKC46XS.js.map +1 -0
  36. package/dist/7SRULFYS.cjs +55 -0
  37. package/dist/7SRULFYS.cjs.map +1 -0
  38. package/dist/AH2UQL5E.js +6 -0
  39. package/dist/AH2UQL5E.js.map +1 -0
  40. package/dist/AOG2M3LV.cjs +122 -0
  41. package/dist/AOG2M3LV.cjs.map +1 -0
  42. package/dist/BA2LAHMY.js +43 -0
  43. package/dist/BA2LAHMY.js.map +1 -0
  44. package/dist/BHBC6Q3Y.js +47 -0
  45. package/dist/BHBC6Q3Y.js.map +1 -0
  46. package/dist/CQHBPXZ2.cjs +94 -0
  47. package/dist/CQHBPXZ2.cjs.map +1 -0
  48. package/dist/CSNPKKTO.js +125 -0
  49. package/dist/CSNPKKTO.js.map +1 -0
  50. package/dist/E75FXJNJ.js +393 -0
  51. package/dist/E75FXJNJ.js.map +1 -0
  52. package/dist/EASTPCLB.js +195 -0
  53. package/dist/EASTPCLB.js.map +1 -0
  54. package/dist/EJCGU7LP.cjs +252 -0
  55. package/dist/EJCGU7LP.cjs.map +1 -0
  56. package/dist/EKUFNO5X.js +3 -0
  57. package/dist/EKUFNO5X.js.map +1 -0
  58. package/dist/EQPMZDRH.js +63 -0
  59. package/dist/EQPMZDRH.js.map +1 -0
  60. package/dist/F5UPK5ZZ.js +2445 -0
  61. package/dist/F5UPK5ZZ.js.map +1 -0
  62. package/dist/GAZMRBLT.js +36 -0
  63. package/dist/GAZMRBLT.js.map +1 -0
  64. package/dist/JBULQDMK.js +1064 -0
  65. package/dist/JBULQDMK.js.map +1 -0
  66. package/dist/JY6PMFYV.js +60 -0
  67. package/dist/JY6PMFYV.js.map +1 -0
  68. package/dist/KTOZRP5U.cjs +404 -0
  69. package/dist/KTOZRP5U.cjs.map +1 -0
  70. package/dist/L3BNN3KF.cjs +2490 -0
  71. package/dist/L3BNN3KF.cjs.map +1 -0
  72. package/dist/L75NPWJX.cjs +204 -0
  73. package/dist/L75NPWJX.cjs.map +1 -0
  74. package/dist/LBQPL6VK.cjs +46 -0
  75. package/dist/LBQPL6VK.cjs.map +1 -0
  76. package/dist/LUG7USNZ.js +120 -0
  77. package/dist/LUG7USNZ.js.map +1 -0
  78. package/dist/LXXIBLJQ.js +15 -0
  79. package/dist/LXXIBLJQ.js.map +1 -0
  80. package/dist/MBTHP667.cjs +39 -0
  81. package/dist/MBTHP667.cjs.map +1 -0
  82. package/dist/NMC54VEB.cjs +128 -0
  83. package/dist/NMC54VEB.cjs.map +1 -0
  84. package/dist/NX4KBEWA.cjs +13 -0
  85. package/dist/NX4KBEWA.cjs.map +1 -0
  86. package/dist/OU33HN4T.js +92 -0
  87. package/dist/OU33HN4T.js.map +1 -0
  88. package/dist/OVH4V3F6.js +77 -0
  89. package/dist/OVH4V3F6.js.map +1 -0
  90. package/dist/OWJM6QQP.js +233 -0
  91. package/dist/OWJM6QQP.js.map +1 -0
  92. package/dist/PC55ZLZD.cjs +66 -0
  93. package/dist/PC55ZLZD.cjs.map +1 -0
  94. package/dist/PGRNZALP.cjs +3427 -0
  95. package/dist/PGRNZALP.cjs.map +1 -0
  96. package/dist/PXT4MQYT.cjs +3191 -0
  97. package/dist/PXT4MQYT.cjs.map +1 -0
  98. package/dist/QMIU5HY3.cjs +174 -0
  99. package/dist/QMIU5HY3.cjs.map +1 -0
  100. package/dist/QNKHVJNZ.js +43 -0
  101. package/dist/QNKHVJNZ.js.map +1 -0
  102. package/dist/QSKQ7BQT.cjs +111 -0
  103. package/dist/QSKQ7BQT.cjs.map +1 -0
  104. package/dist/QWROCDWJ.cjs +315 -0
  105. package/dist/QWROCDWJ.cjs.map +1 -0
  106. package/dist/RAIK357L.js +214 -0
  107. package/dist/RAIK357L.js.map +1 -0
  108. package/dist/RLUL6JFM.cjs +4 -0
  109. package/dist/RLUL6JFM.cjs.map +1 -0
  110. package/dist/RVOOJEDH.js +3385 -0
  111. package/dist/RVOOJEDH.js.map +1 -0
  112. package/dist/RVTTXEXB.cjs +235 -0
  113. package/dist/RVTTXEXB.cjs.map +1 -0
  114. package/dist/SKAV3OJX.js +118 -0
  115. package/dist/SKAV3OJX.js.map +1 -0
  116. package/dist/TA2DABDY.cjs +126 -0
  117. package/dist/TA2DABDY.cjs.map +1 -0
  118. package/dist/THMQMWYA.cjs +17 -0
  119. package/dist/THMQMWYA.cjs.map +1 -0
  120. package/dist/TPVIFJX4.js +236 -0
  121. package/dist/TPVIFJX4.js.map +1 -0
  122. package/dist/VDH76SF6.cjs +132 -0
  123. package/dist/VDH76SF6.cjs.map +1 -0
  124. package/dist/VUOMXK5T.js +6 -0
  125. package/dist/VUOMXK5T.js.map +1 -0
  126. package/dist/W3KWDJYA.cjs +85 -0
  127. package/dist/W3KWDJYA.cjs.map +1 -0
  128. package/dist/WAGFMHUT.js +311 -0
  129. package/dist/WAGFMHUT.js.map +1 -0
  130. package/dist/WBKUP4MX.js +168 -0
  131. package/dist/WBKUP4MX.js.map +1 -0
  132. package/dist/XH4FQTBY.cjs +62 -0
  133. package/dist/XH4FQTBY.cjs.map +1 -0
  134. package/dist/YTUEW27V.js +109 -0
  135. package/dist/YTUEW27V.js.map +1 -0
  136. package/dist/YVV5I7A5.js +15 -0
  137. package/dist/YVV5I7A5.js.map +1 -0
  138. package/dist/Z5NOJAAG.cjs +796 -0
  139. package/dist/Z5NOJAAG.cjs.map +1 -0
  140. package/dist/ZEW74YLA.js +3 -0
  141. package/dist/ZEW74YLA.js.map +1 -0
  142. package/dist/config/index.cjs +27 -0
  143. package/dist/config/index.cjs.map +1 -0
  144. package/dist/config/index.d.ts +5 -0
  145. package/dist/config/index.d.ts.map +1 -0
  146. package/dist/config/index.js +6 -0
  147. package/dist/config/index.js.map +1 -0
  148. package/dist/config/tools.cjs +15 -0
  149. package/dist/config/tools.cjs.map +1 -0
  150. package/dist/config/tools.d.ts +6 -0
  151. package/dist/config/tools.d.ts.map +1 -0
  152. package/dist/config/tools.js +6 -0
  153. package/dist/config/tools.js.map +1 -0
  154. package/dist/config/version-matrices.cjs +13 -0
  155. package/dist/config/version-matrices.cjs.map +1 -0
  156. package/dist/config/version-matrices.d.ts +7 -0
  157. package/dist/config/version-matrices.d.ts.map +1 -0
  158. package/dist/config/version-matrices.js +4 -0
  159. package/dist/config/version-matrices.js.map +1 -0
  160. package/dist/core/compatibility.cjs +13 -0
  161. package/dist/core/compatibility.cjs.map +1 -0
  162. package/dist/core/compatibility.d.ts +8 -0
  163. package/dist/core/compatibility.d.ts.map +1 -0
  164. package/dist/core/compatibility.js +4 -0
  165. package/dist/core/compatibility.js.map +1 -0
  166. package/dist/core/index.cjs +35 -0
  167. package/dist/core/index.cjs.map +1 -0
  168. package/dist/core/index.d.ts +4 -0
  169. package/dist/core/index.d.ts.map +1 -0
  170. package/dist/core/index.js +10 -0
  171. package/dist/core/index.js.map +1 -0
  172. package/dist/core/tool-executor.cjs +18 -0
  173. package/dist/core/tool-executor.cjs.map +1 -0
  174. package/dist/core/tool-executor.d.ts +12 -0
  175. package/dist/core/tool-executor.d.ts.map +1 -0
  176. package/dist/core/tool-executor.js +9 -0
  177. package/dist/core/tool-executor.js.map +1 -0
  178. package/dist/core/version-resolver.cjs +25 -0
  179. package/dist/core/version-resolver.cjs.map +1 -0
  180. package/dist/core/version-resolver.d.ts +30 -0
  181. package/dist/core/version-resolver.d.ts.map +1 -0
  182. package/dist/core/version-resolver.js +8 -0
  183. package/dist/core/version-resolver.js.map +1 -0
  184. package/dist/display/formatters.cjs +17 -0
  185. package/dist/display/formatters.cjs.map +1 -0
  186. package/dist/display/formatters.d.ts +15 -0
  187. package/dist/display/formatters.d.ts.map +1 -0
  188. package/dist/display/formatters.js +4 -0
  189. package/dist/display/formatters.js.map +1 -0
  190. package/dist/display/index.cjs +30 -0
  191. package/dist/display/index.cjs.map +1 -0
  192. package/dist/display/index.d.ts +3 -0
  193. package/dist/display/index.d.ts.map +1 -0
  194. package/dist/display/index.js +9 -0
  195. package/dist/display/index.js.map +1 -0
  196. package/dist/display/version-display.cjs +21 -0
  197. package/dist/display/version-display.cjs.map +1 -0
  198. package/dist/display/version-display.d.ts +9 -0
  199. package/dist/display/version-display.d.ts.map +1 -0
  200. package/dist/display/version-display.js +8 -0
  201. package/dist/display/version-display.js.map +1 -0
  202. package/dist/index.cjs +111 -0
  203. package/dist/index.cjs.map +1 -0
  204. package/dist/index.d.ts +2 -0
  205. package/dist/index.d.ts.map +1 -0
  206. package/dist/index.js +103 -0
  207. package/dist/index.js.map +1 -0
  208. package/dist/scripts/generate-github-matrix.cjs +1946 -0
  209. package/dist/scripts/generate-github-matrix.cjs.map +1 -0
  210. package/dist/scripts/generate-github-matrix.d.ts +2 -0
  211. package/dist/scripts/generate-github-matrix.d.ts.map +1 -0
  212. package/dist/scripts/generate-github-matrix.js +1944 -0
  213. package/dist/scripts/generate-github-matrix.js.map +1 -0
  214. package/dist/types/docker.cjs +6 -0
  215. package/dist/types/docker.cjs.map +1 -0
  216. package/dist/types/docker.d.ts +10 -0
  217. package/dist/types/docker.d.ts.map +1 -0
  218. package/dist/types/docker.js +3 -0
  219. package/dist/types/docker.js.map +1 -0
  220. package/dist/types/index.cjs +6 -0
  221. package/dist/types/index.cjs.map +1 -0
  222. package/dist/types/index.d.ts +4 -0
  223. package/dist/types/index.d.ts.map +1 -0
  224. package/dist/types/index.js +3 -0
  225. package/dist/types/index.js.map +1 -0
  226. package/dist/types/tool.cjs +6 -0
  227. package/dist/types/tool.cjs.map +1 -0
  228. package/dist/types/tool.d.ts +27 -0
  229. package/dist/types/tool.d.ts.map +1 -0
  230. package/dist/types/tool.js +3 -0
  231. package/dist/types/tool.js.map +1 -0
  232. package/dist/types/version.cjs +6 -0
  233. package/dist/types/version.cjs.map +1 -0
  234. package/dist/types/version.d.ts +33 -0
  235. package/dist/types/version.d.ts.map +1 -0
  236. package/dist/types/version.js +3 -0
  237. package/dist/types/version.js.map +1 -0
  238. package/dist/utils/finder-utils.cjs +39 -0
  239. package/dist/utils/finder-utils.cjs.map +1 -0
  240. package/dist/utils/finder-utils.d.ts +31 -0
  241. package/dist/utils/finder-utils.d.ts.map +1 -0
  242. package/dist/utils/finder-utils.js +6 -0
  243. package/dist/utils/finder-utils.js.map +1 -0
  244. package/dist/utils/index.cjs +55 -0
  245. package/dist/utils/index.cjs.map +1 -0
  246. package/dist/utils/index.d.ts +3 -0
  247. package/dist/utils/index.d.ts.map +1 -0
  248. package/dist/utils/index.js +6 -0
  249. package/dist/utils/index.js.map +1 -0
  250. package/dist/utils/version-utils.cjs +27 -0
  251. package/dist/utils/version-utils.cjs.map +1 -0
  252. package/dist/utils/version-utils.d.ts +18 -0
  253. package/dist/utils/version-utils.d.ts.map +1 -0
  254. package/dist/utils/version-utils.js +6 -0
  255. package/dist/utils/version-utils.js.map +1 -0
  256. package/dist/utils.cjs +17 -0
  257. package/dist/utils.cjs.map +1 -0
  258. package/dist/utils.d.ts +9 -0
  259. package/dist/utils.d.ts.map +1 -0
  260. package/dist/utils.js +4 -0
  261. package/dist/utils.js.map +1 -0
  262. package/package.json +57 -0
@@ -0,0 +1,315 @@
1
+ 'use strict';
2
+
3
+ var L75NPWJX_cjs = require('./L75NPWJX.cjs');
4
+ var _3BKFBGX3_cjs = require('./3BKFBGX3.cjs');
5
+ require('./XH4FQTBY.cjs');
6
+ var VDH76SF6_cjs = require('./VDH76SF6.cjs');
7
+ var NX4KBEWA_cjs = require('./NX4KBEWA.cjs');
8
+ var fs = require('fs');
9
+
10
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
11
+ var isSsoProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
12
+
13
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
14
+ var EXPIRE_WINDOW_MS = 5 * 60 * 1e3;
15
+ var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
16
+
17
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
18
+ var getSsoOidcClient = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (ssoRegion, init = {}) => {
19
+ const { SSOOIDCClient } = await import('./6NLXVH5R.cjs');
20
+ const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
21
+ region: ssoRegion ?? init.clientConfig?.region,
22
+ logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
23
+ }));
24
+ return ssoOidcClient;
25
+ }, "getSsoOidcClient");
26
+
27
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
28
+ var getNewSsoOidcToken = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (ssoToken, ssoRegion, init = {}) => {
29
+ const { CreateTokenCommand } = await import('./6NLXVH5R.cjs');
30
+ const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
31
+ return ssoOidcClient.send(new CreateTokenCommand({
32
+ clientId: ssoToken.clientId,
33
+ clientSecret: ssoToken.clientSecret,
34
+ refreshToken: ssoToken.refreshToken,
35
+ grantType: "refresh_token"
36
+ }));
37
+ }, "getNewSsoOidcToken");
38
+
39
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
40
+ var validateTokenExpiry = /* @__PURE__ */ NX4KBEWA_cjs.__name((token) => {
41
+ if (token.expiration && token.expiration.getTime() < Date.now()) {
42
+ throw new VDH76SF6_cjs.TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);
43
+ }
44
+ }, "validateTokenExpiry");
45
+
46
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
47
+ var validateTokenKey = /* @__PURE__ */ NX4KBEWA_cjs.__name((key, value, forRefresh = false) => {
48
+ if (typeof value === "undefined") {
49
+ throw new VDH76SF6_cjs.TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${REFRESH_MESSAGE}`, false);
50
+ }
51
+ }, "validateTokenKey");
52
+ var { writeFile } = fs.promises;
53
+ var writeSSOTokenToFile = /* @__PURE__ */ NX4KBEWA_cjs.__name((id, ssoToken) => {
54
+ const tokenFilepath = L75NPWJX_cjs.getSSOTokenFilepath(id);
55
+ const tokenString = JSON.stringify(ssoToken, null, 2);
56
+ return writeFile(tokenFilepath, tokenString);
57
+ }, "writeSSOTokenToFile");
58
+
59
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
60
+ var lastRefreshAttemptTime = /* @__PURE__ */ new Date(0);
61
+ var fromSso = /* @__PURE__ */ NX4KBEWA_cjs.__name((_init = {}) => async ({ callerClientConfig } = {}) => {
62
+ const init = {
63
+ ..._init,
64
+ parentClientConfig: {
65
+ ...callerClientConfig,
66
+ ..._init.parentClientConfig
67
+ }
68
+ };
69
+ init.logger?.debug("@aws-sdk/token-providers - fromSso");
70
+ const profiles = await L75NPWJX_cjs.parseKnownFiles(init);
71
+ const profileName = L75NPWJX_cjs.getProfileName({
72
+ profile: init.profile ?? callerClientConfig?.profile
73
+ });
74
+ const profile = profiles[profileName];
75
+ if (!profile) {
76
+ throw new VDH76SF6_cjs.TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);
77
+ } else if (!profile["sso_session"]) {
78
+ throw new VDH76SF6_cjs.TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);
79
+ }
80
+ const ssoSessionName = profile["sso_session"];
81
+ const ssoSessions = await L75NPWJX_cjs.loadSsoSessionData(init);
82
+ const ssoSession = ssoSessions[ssoSessionName];
83
+ if (!ssoSession) {
84
+ throw new VDH76SF6_cjs.TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);
85
+ }
86
+ for (const ssoSessionRequiredKey of [
87
+ "sso_start_url",
88
+ "sso_region"
89
+ ]) {
90
+ if (!ssoSession[ssoSessionRequiredKey]) {
91
+ throw new VDH76SF6_cjs.TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);
92
+ }
93
+ }
94
+ ssoSession["sso_start_url"];
95
+ const ssoRegion = ssoSession["sso_region"];
96
+ let ssoToken;
97
+ try {
98
+ ssoToken = await L75NPWJX_cjs.getSSOTokenFromFile(ssoSessionName);
99
+ } catch (e) {
100
+ throw new VDH76SF6_cjs.TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`, false);
101
+ }
102
+ validateTokenKey("accessToken", ssoToken.accessToken);
103
+ validateTokenKey("expiresAt", ssoToken.expiresAt);
104
+ const { accessToken, expiresAt } = ssoToken;
105
+ const existingToken = {
106
+ token: accessToken,
107
+ expiration: new Date(expiresAt)
108
+ };
109
+ if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {
110
+ return existingToken;
111
+ }
112
+ if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1e3) {
113
+ validateTokenExpiry(existingToken);
114
+ return existingToken;
115
+ }
116
+ validateTokenKey("clientId", ssoToken.clientId, true);
117
+ validateTokenKey("clientSecret", ssoToken.clientSecret, true);
118
+ validateTokenKey("refreshToken", ssoToken.refreshToken, true);
119
+ try {
120
+ lastRefreshAttemptTime.setTime(Date.now());
121
+ const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);
122
+ validateTokenKey("accessToken", newSsoOidcToken.accessToken);
123
+ validateTokenKey("expiresIn", newSsoOidcToken.expiresIn);
124
+ const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1e3);
125
+ try {
126
+ await writeSSOTokenToFile(ssoSessionName, {
127
+ ...ssoToken,
128
+ accessToken: newSsoOidcToken.accessToken,
129
+ expiresAt: newTokenExpiration.toISOString(),
130
+ refreshToken: newSsoOidcToken.refreshToken
131
+ });
132
+ } catch (error) {
133
+ }
134
+ return {
135
+ token: newSsoOidcToken.accessToken,
136
+ expiration: newTokenExpiration
137
+ };
138
+ } catch (error) {
139
+ validateTokenExpiry(existingToken);
140
+ return existingToken;
141
+ }
142
+ }, "fromSso");
143
+
144
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
145
+ var SHOULD_FAIL_CREDENTIAL_CHAIN = false;
146
+ var resolveSSOCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger }) => {
147
+ let token;
148
+ const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
149
+ if (ssoSession) {
150
+ try {
151
+ const _token = await fromSso({
152
+ profile
153
+ })();
154
+ token = {
155
+ accessToken: _token.token,
156
+ expiresAt: new Date(_token.expiration).toISOString()
157
+ };
158
+ } catch (e) {
159
+ throw new VDH76SF6_cjs.CredentialsProviderError(e.message, {
160
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
161
+ logger
162
+ });
163
+ }
164
+ } else {
165
+ try {
166
+ token = await L75NPWJX_cjs.getSSOTokenFromFile(ssoStartUrl);
167
+ } catch (e) {
168
+ throw new VDH76SF6_cjs.CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {
169
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
170
+ logger
171
+ });
172
+ }
173
+ }
174
+ if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {
175
+ throw new VDH76SF6_cjs.CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {
176
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
177
+ logger
178
+ });
179
+ }
180
+ const { accessToken } = token;
181
+ const { SSOClient, GetRoleCredentialsCommand } = await import('./Z5NOJAAG.cjs');
182
+ const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
183
+ logger: clientConfig?.logger ?? parentClientConfig?.logger,
184
+ region: clientConfig?.region ?? ssoRegion
185
+ }));
186
+ let ssoResp;
187
+ try {
188
+ ssoResp = await sso.send(new GetRoleCredentialsCommand({
189
+ accountId: ssoAccountId,
190
+ roleName: ssoRoleName,
191
+ accessToken
192
+ }));
193
+ } catch (e) {
194
+ throw new VDH76SF6_cjs.CredentialsProviderError(e, {
195
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
196
+ logger
197
+ });
198
+ }
199
+ const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {} } = ssoResp;
200
+ if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
201
+ throw new VDH76SF6_cjs.CredentialsProviderError("SSO returns an invalid temporary credential.", {
202
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
203
+ logger
204
+ });
205
+ }
206
+ const credentials = {
207
+ accessKeyId,
208
+ secretAccessKey,
209
+ sessionToken,
210
+ expiration: new Date(expiration),
211
+ ...credentialScope && {
212
+ credentialScope
213
+ },
214
+ ...accountId && {
215
+ accountId
216
+ }
217
+ };
218
+ if (ssoSession) {
219
+ _3BKFBGX3_cjs.setCredentialFeature(credentials, "CREDENTIALS_SSO", "s");
220
+ } else {
221
+ _3BKFBGX3_cjs.setCredentialFeature(credentials, "CREDENTIALS_SSO_LEGACY", "u");
222
+ }
223
+ return credentials;
224
+ }, "resolveSSOCredentials");
225
+
226
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
227
+ var validateSsoProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((profile, logger) => {
228
+ const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
229
+ if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
230
+ throw new VDH76SF6_cjs.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}
231
+ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, {
232
+ tryNextLink: false,
233
+ logger
234
+ });
235
+ }
236
+ return profile;
237
+ }, "validateSsoProfile");
238
+
239
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
240
+ var fromSSO = /* @__PURE__ */ NX4KBEWA_cjs.__name((init = {}) => async ({ callerClientConfig } = {}) => {
241
+ init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
242
+ const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
243
+ const { ssoClient } = init;
244
+ const profileName = L75NPWJX_cjs.getProfileName({
245
+ profile: init.profile ?? callerClientConfig?.profile
246
+ });
247
+ if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
248
+ const profiles = await L75NPWJX_cjs.parseKnownFiles(init);
249
+ const profile = profiles[profileName];
250
+ if (!profile) {
251
+ throw new VDH76SF6_cjs.CredentialsProviderError(`Profile ${profileName} was not found.`, {
252
+ logger: init.logger
253
+ });
254
+ }
255
+ if (!isSsoProfile(profile)) {
256
+ throw new VDH76SF6_cjs.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {
257
+ logger: init.logger
258
+ });
259
+ }
260
+ if (profile?.sso_session) {
261
+ const ssoSessions = await L75NPWJX_cjs.loadSsoSessionData(init);
262
+ const session = ssoSessions[profile.sso_session];
263
+ const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;
264
+ if (ssoRegion && ssoRegion !== session.sso_region) {
265
+ throw new VDH76SF6_cjs.CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {
266
+ tryNextLink: false,
267
+ logger: init.logger
268
+ });
269
+ }
270
+ if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {
271
+ throw new VDH76SF6_cjs.CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {
272
+ tryNextLink: false,
273
+ logger: init.logger
274
+ });
275
+ }
276
+ profile.sso_region = session.sso_region;
277
+ profile.sso_start_url = session.sso_start_url;
278
+ }
279
+ const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);
280
+ return resolveSSOCredentials({
281
+ ssoStartUrl: sso_start_url,
282
+ ssoSession: sso_session,
283
+ ssoAccountId: sso_account_id,
284
+ ssoRegion: sso_region,
285
+ ssoRoleName: sso_role_name,
286
+ ssoClient,
287
+ clientConfig: init.clientConfig,
288
+ parentClientConfig: init.parentClientConfig,
289
+ profile: profileName
290
+ });
291
+ } else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
292
+ throw new VDH76SF6_cjs.CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"', {
293
+ tryNextLink: false,
294
+ logger: init.logger
295
+ });
296
+ } else {
297
+ return resolveSSOCredentials({
298
+ ssoStartUrl,
299
+ ssoSession,
300
+ ssoAccountId,
301
+ ssoRegion,
302
+ ssoRoleName,
303
+ ssoClient,
304
+ clientConfig: init.clientConfig,
305
+ parentClientConfig: init.parentClientConfig,
306
+ profile: profileName
307
+ });
308
+ }
309
+ }, "fromSSO");
310
+
311
+ exports.fromSSO = fromSSO;
312
+ exports.isSsoProfile = isSsoProfile;
313
+ exports.validateSsoProfile = validateSsoProfile;
314
+ //# sourceMappingURL=QWROCDWJ.cjs.map
315
+ //# sourceMappingURL=QWROCDWJ.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js"],"names":["isSsoProfile","arg","sso_start_url","sso_account_id","sso_session","sso_region","sso_role_name","EXPIRE_WINDOW_MS","REFRESH_MESSAGE","getSsoOidcClient","__name","ssoRegion","init","SSOOIDCClient","ssoOidcClient","Object","assign","clientConfig","region","logger","parentClientConfig","getNewSsoOidcToken","ssoToken","CreateTokenCommand","send","clientId","clientSecret","refreshToken","grantType","validateTokenExpiry","token","expiration","getTime","Date","now","TokenProviderError","validateTokenKey","key","value","forRefresh","writeFile","fsPromises","writeSSOTokenToFile","id","tokenFilepath","getSSOTokenFilepath","tokenString","JSON","stringify","lastRefreshAttemptTime","fromSso","_init","callerClientConfig","debug","profiles","parseKnownFiles","profileName","getProfileName","profile","ssoSessionName","ssoSessions","loadSsoSessionData","ssoSession","ssoSessionRequiredKey","getSSOTokenFromFile","e","accessToken","expiresAt","existingToken","setTime","newSsoOidcToken","expiresIn","newTokenExpiration","toISOString","error","SHOULD_FAIL_CREDENTIAL_CHAIN","resolveSSOCredentials","ssoStartUrl","ssoAccountId","ssoRoleName","ssoClient","refreshMessage","_token","getSsoTokenProvider","CredentialsProviderError","message","tryNextLink","SSOClient","GetRoleCredentialsCommand","sso","ssoResp","accountId","roleName","roleCredentials","accessKeyId","secretAccessKey","sessionToken","credentialScope","credentials","setCredentialFeature","validateSsoProfile","keys","join","fromSSO","session","conflictMsg"],"mappings":";;;;;;;;;;AAAO,IAAMA,YAAAA,wCAAgBC,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIC,aAAAA,KAAkB,QAAA,IAC1B,OAAOD,GAAAA,CAAIE,cAAAA,KAAmB,YAC9B,OAAOF,GAAAA,CAAIG,WAAAA,KAAgB,QAAA,IAC3B,OAAOH,GAAAA,CAAII,eAAe,QAAA,IAC1B,OAAOJ,GAAAA,CAAIK,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA;;;ACArB,IAAMC,gBAAAA,GAAmB,IAAI,EAAA,GAAK,GAAA;AAClC,IAAMC,eAAAA,GAAkB,CAAA,+EAAA,CAAA;;;ACDxB,IAAMC,gBAAAA,mBAAmBC,mBAAA,CAAA,OAAOC,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACvD,EAAA,MAAM,EAAEC,aAAAA,EAAa,GAAK,MAAM,OAAO,gBAAA,CAAA;AACvC,EAAA,MAAMC,aAAAA,GAAgB,IAAID,aAAAA,CAAcE,MAAAA,CAAOC,MAAAA,CAAO,EAAC,EAAGJ,IAAAA,CAAKK,YAAAA,IAAgB,EAAC,EAAG;IAC/EC,MAAAA,EAAQP,SAAAA,IAAaC,KAAKK,YAAAA,EAAcC,MAAAA;AACxCC,IAAAA,MAAAA,EAAQP,IAAAA,CAAKK,YAAAA,EAAcE,MAAAA,IAAUP,IAAAA,CAAKQ,kBAAAA,EAAoBD;AAClE,GAAA,CAAA,CAAA;AACA,EAAA,OAAOL,aAAAA;AACX,CAAA,EAPgC,kBAAA,CAAA;;;ACCzB,IAAMO,qCAAqBX,mBAAA,CAAA,OAAOY,QAAAA,EAAUX,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACnE,EAAA,MAAM,EAAEW,kBAAAA,EAAkB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC5C,EAAA,MAAMT,aAAAA,GAAgB,MAAML,gBAAAA,CAAiBE,SAAAA,EAAWC,IAAAA,CAAAA;AACxD,EAAA,OAAOE,aAAAA,CAAcU,IAAAA,CAAK,IAAID,kBAAAA,CAAmB;AAC7CE,IAAAA,QAAAA,EAAUH,QAAAA,CAASG,QAAAA;AACnBC,IAAAA,YAAAA,EAAcJ,QAAAA,CAASI,YAAAA;AACvBC,IAAAA,YAAAA,EAAcL,QAAAA,CAASK,YAAAA;IACvBC,SAAAA,EAAW;AACf,GAAA,CAAA,CAAA;AACJ,CAAA,EATkC,oBAAA,CAAA;;;ACC3B,IAAMC,mBAAAA,wCAAuBC,KAAAA,KAAAA;AAChC,EAAA,IAAIA,KAAAA,CAAMC,cAAcD,KAAAA,CAAMC,UAAAA,CAAWC,SAAO,GAAKC,IAAAA,CAAKC,KAAG,EAAI;AAC7D,IAAA,MAAM,IAAIC,+BAAAA,CAAmB,CAAA,kBAAA,EAAqB3B,eAAAA,IAAmB,KAAA,CAAA;AACzE,EAAA;AACJ,CAAA,EAJmC,qBAAA,CAAA;;;ACA5B,IAAM4B,gBAAAA,mBAAmB1B,mBAAA,CAAA,CAAC2B,GAAAA,EAAKC,KAAAA,EAAOC,aAAa,KAAA,KAAK;AAC3D,EAAA,IAAI,OAAOD,UAAU,WAAA,EAAa;AAC9B,IAAA,MAAM,IAAIH,+BAAAA,CAAmB,CAAA,uBAAA,EAA0BE,GAAAA,CAAAA,cAAAA,EAAoBE,UAAAA,GAAa,kBAAA,GAAqB,EAAA,CAAA,EAAA,EAAO/B,eAAAA,CAAAA,CAAAA,EAAmB,KAAA,CAAA;AAC3I,EAAA;AACJ,CAAA,EAJgC,kBAAA,CAAA;ACAhC,IAAM,EAAEgC,WAAS,GAAKC,WAAAA;AACf,IAAMC,mBAAAA,mBAAsBhC,mBAAA,CAAA,CAACiC,EAAAA,EAAIrB,QAAAA,KAAAA;AACpC,EAAA,MAAMsB,aAAAA,GAAgBC,iCAAoBF,EAAAA,CAAAA;AAC1C,EAAA,MAAMG,WAAAA,GAAcC,IAAAA,CAAKC,SAAAA,CAAU1B,QAAAA,EAAU,MAAM,CAAA,CAAA;AACnD,EAAA,OAAOkB,SAAAA,CAAUI,eAAeE,WAAAA,CAAAA;AACpC,CAAA,EAJmC,qBAAA,CAAA;;;ACInC,IAAMG,sBAAAA,mBAAyB,IAAIhB,IAAAA,CAAK,CAAA,CAAA;AACjC,IAAMiB,OAAAA,mBAAUxC,mBAAA,CAAA,CAACyC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMxC,IAAAA,GAAO;IACT,GAAGuC,KAAAA;IACH/B,kBAAAA,EAAoB;MAChB,GAAGgC,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM/B;AACb;AACJ,GAAA;AACAR,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,oCAAA,CAAA;AACnB,EAAA,MAAMC,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,MAAMA,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,EAAA,IAAI,CAACE,OAAAA,EAAS;AACV,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,oDAA+D,KAAA,CAAA;EAC5G,CAAA,MAAA,IACS,CAACE,OAAAA,CAAQ,aAAA,CAAA,EAAgB;AAC9B,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACvG,EAAA;AACA,EAAA,MAAMG,cAAAA,GAAiBD,QAAQ,aAAA,CAAA;AAC/B,EAAA,MAAME,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,EAAA,MAAMkD,UAAAA,GAAaF,YAAYD,cAAAA,CAAAA;AAC/B,EAAA,IAAI,CAACG,UAAAA,EAAY;AACb,IAAA,MAAM,IAAI3B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,oDAAkE,KAAA,CAAA;AACnH,EAAA;AACA,EAAA,KAAA,MAAWI,qBAAAA,IAAyB;AAAC,IAAA,eAAA;AAAiB,IAAA;AAAe,GAAA,EAAA;AACjE,IAAA,IAAI,CAACD,UAAAA,CAAWC,qBAAAA,CAAAA,EAAwB;AACpC,MAAA,MAAM,IAAI5B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,CAAAA,gCAAAA,EAAiDI,qBAAAA,MAA2B,KAAA,CAAA;AAC7H,IAAA;AACJ,EAAA;AACA,EAAoBD,WAAW,eAAA;AAC/B,EAAA,MAAMnD,SAAAA,GAAYmD,WAAW,YAAA,CAAA;AAC7B,EAAA,IAAIxC,QAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,QAAAA,GAAW,MAAM0C,iCAAoBL,cAAAA,CAAAA;AACzC,EAAA,CAAA,CAAA,OACOM,CAAAA,EAAG;AACN,IAAA,MAAM,IAAI9B,+BAAAA,CAAmB,CAAA,8CAAA,EAAiDqB,WAAAA,CAAAA,8BAAAA,EAA4ChD,eAAAA,IAAmB,KAAA,CAAA;AACjJ,EAAA;AACA4B,EAAAA,gBAAAA,CAAiB,aAAA,EAAed,SAAS4C,WAAW,CAAA;AACpD9B,EAAAA,gBAAAA,CAAiB,WAAA,EAAad,SAAS6C,SAAS,CAAA;AAChD,EAAA,MAAM,EAAED,WAAAA,EAAaC,SAAAA,EAAS,GAAK7C,QAAAA;AACnC,EAAA,MAAM8C,aAAAA,GAAgB;IAAEtC,KAAAA,EAAOoC,WAAAA;IAAanC,UAAAA,EAAY,IAAIE,KAAKkC,SAAAA;AAAW,GAAA;AAC5E,EAAA,IAAIC,cAAcrC,UAAAA,CAAWC,OAAAA,KAAYC,IAAAA,CAAKC,GAAAA,KAAQ3B,gBAAAA,EAAkB;AACpE,IAAA,OAAO6D,aAAAA;AACX,EAAA;AACA,EAAA,IAAInC,KAAKC,GAAAA,EAAG,GAAKe,uBAAuBjB,OAAAA,EAAO,GAAK,KAAK,GAAA,EAAM;AAC3DH,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACAhC,EAAAA,gBAAAA,CAAiB,UAAA,EAAYd,QAAAA,CAASG,QAAAA,EAAU,IAAA,CAAA;AAChDW,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASI,YAAAA,EAAc,IAAA,CAAA;AACxDU,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASK,YAAAA,EAAc,IAAA,CAAA;AACxD,EAAA,IAAI;AACAsB,IAAAA,sBAAAA,CAAuBoB,OAAAA,CAAQpC,IAAAA,CAAKC,GAAAA,EAAG,CAAA;AACvC,IAAA,MAAMoC,eAAAA,GAAkB,MAAMjD,kBAAAA,CAAmBC,QAAAA,EAAUX,WAAWC,IAAAA,CAAAA;AACtEwB,IAAAA,gBAAAA,CAAiB,aAAA,EAAekC,gBAAgBJ,WAAW,CAAA;AAC3D9B,IAAAA,gBAAAA,CAAiB,WAAA,EAAakC,gBAAgBC,SAAS,CAAA;AACvD,IAAA,MAAMC,kBAAAA,GAAqB,IAAIvC,IAAAA,CAAKA,IAAAA,CAAKC,KAAG,GAAKoC,eAAAA,CAAgBC,YAAY,GAAA,CAAA;AAC7E,IAAA,IAAI;AACA,MAAA,MAAM7B,oBAAoBiB,cAAAA,EAAgB;QACtC,GAAGrC,QAAAA;AACH4C,QAAAA,WAAAA,EAAaI,eAAAA,CAAgBJ,WAAAA;AAC7BC,QAAAA,SAAAA,EAAWK,mBAAmBC,WAAAA,EAAW;AACzC9C,QAAAA,YAAAA,EAAc2C,eAAAA,CAAgB3C;OAClC,CAAA;AACJ,IAAA,CAAA,CAAA,OACO+C,KAAAA,EAAO;AACd,IAAA;AACA,IAAA,OAAO;AACH5C,MAAAA,KAAAA,EAAOwC,eAAAA,CAAgBJ,WAAAA;MACvBnC,UAAAA,EAAYyC;AAChB,KAAA;AACJ,EAAA,CAAA,CAAA,OACOE,KAAAA,EAAO;AACV7C,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACJ,CAAA,EA/EuB,SAAA,CAAA;;;ACJvB,IAAMO,4BAAAA,GAA+B,KAAA;AAC9B,IAAMC,qBAAAA,mBAAwBlE,mBAAA,CAAA,OAAO,EAAEmE,WAAAA,EAAaf,UAAAA,EAAYgB,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAaC,SAAAA,EAAW/D,YAAAA,EAAcG,kBAAAA,EAAoBsC,OAAAA,EAASvC,QAAM,KAAG;AACxK,EAAA,IAAIW,KAAAA;AACJ,EAAA,MAAMmD,cAAAA,GAAiB,CAAA,6EAAA,CAAA;AACvB,EAAA,IAAInB,UAAAA,EAAY;AACZ,IAAA,IAAI;AACA,MAAA,MAAMoB,MAAAA,GAAS,MAAMC,OAAAA,CAAoB;AAAEzB,QAAAA;AAAQ,OAAA,CAAA,EAAA;AACnD5B,MAAAA,KAAAA,GAAQ;AACJoC,QAAAA,WAAAA,EAAagB,MAAAA,CAAOpD,KAAAA;AACpBqC,QAAAA,SAAAA,EAAW,IAAIlC,IAAAA,CAAKiD,MAAAA,CAAOnD,UAAU,EAAE0C,WAAAA;AAC3C,OAAA;AACJ,IAAA,CAAA,CAAA,OACOR,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyBnB,CAAAA,CAAEoB,OAAAA,EAAS;QAC1CC,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;EACJ,CAAA,MACK;AACD,IAAA,IAAI;AACAW,MAAAA,KAAAA,GAAQ,MAAMkC,iCAAoBa,WAAAA,CAAAA;AACtC,IAAA,CAAA,CAAA,OACOZ,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyB,CAAA,yDAAA,EAA4DH,cAAAA,CAAAA,CAAAA,EAAkB;QAC7GK,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;AACJ,EAAA;AACA,EAAA,IAAI,IAAIc,IAAAA,CAAKH,KAAAA,CAAMqC,SAAS,CAAA,CAAEnC,SAAO,GAAKC,IAAAA,CAAKC,GAAAA,EAAG,IAAM,CAAA,EAAG;AACvD,IAAA,MAAM,IAAIkD,qCAAAA,CAAyB,CAAA,0DAAA,EAA6DH,cAAAA,CAAAA,CAAAA,EAAkB;MAC9GK,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE+C,aAAW,GAAKpC,KAAAA;AACxB,EAAA,MAAM,EAAEyD,SAAAA,EAAWC,yBAAAA,EAAyB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9D,EAAA,MAAMC,GAAAA,GAAMT,SAAAA,IACR,IAAIO,SAAAA,CAAUxE,MAAAA,CAAOC,OAAO,EAAC,EAAGC,YAAAA,IAAgB,EAAC,EAAG;IAChDE,MAAAA,EAAQF,YAAAA,EAAcE,UAAUC,kBAAAA,EAAoBD,MAAAA;AACpDD,IAAAA,MAAAA,EAAQD,cAAcC,MAAAA,IAAUP;AACpC,GAAA,CAAA,CAAA;AACJ,EAAA,IAAI+E,OAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,OAAAA,GAAU,MAAMD,GAAAA,CAAIjE,IAAAA,CAAK,IAAIgE,yBAAAA,CAA0B;MACnDG,SAAAA,EAAWb,YAAAA;MACXc,QAAAA,EAAUb,WAAAA;AACVb,MAAAA;AACJ,KAAA,CAAA,CAAA;AACJ,EAAA,CAAA,CAAA,OACOD,CAAAA,EAAG;AACN,IAAA,MAAM,IAAImB,sCAAyBnB,CAAAA,EAAG;MAClCqB,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE0E,eAAAA,EAAiB,EAAEC,WAAAA,EAAaC,eAAAA,EAAiBC,YAAAA,EAAcjE,UAAAA,EAAYkE,eAAAA,EAAiBN,SAAAA,EAAS,GAAK,EAAC,EAAC,GAAMD,OAAAA;AAC1H,EAAA,IAAI,CAACI,WAAAA,IAAe,CAACC,mBAAmB,CAACC,YAAAA,IAAgB,CAACjE,UAAAA,EAAY;AAClE,IAAA,MAAM,IAAIqD,sCAAyB,8CAAA,EAAgD;MAC/EE,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM+E,WAAAA,GAAc;AAChBJ,IAAAA,WAAAA;AACAC,IAAAA,eAAAA;AACAC,IAAAA,YAAAA;IACAjE,UAAAA,EAAY,IAAIE,KAAKF,UAAAA,CAAAA;AACrB,IAAA,GAAIkE,eAAAA,IAAmB;AAAEA,MAAAA;AAAgB,KAAA;AACzC,IAAA,GAAIN,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACA,EAAA,IAAI7B,UAAAA,EAAY;AACZqC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,mBAAmB,GAAA,CAAA;EACzD,CAAA,MACK;AACDC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,0BAA0B,GAAA,CAAA;AAChE,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EA9EqC,uBAAA,CAAA;;;ACJ9B,IAAME,kBAAAA,mBAAqB1F,mBAAA,CAAA,CAACgD,OAAAA,EAASvC,MAAAA,KAAAA;AACxC,EAAA,MAAM,EAAEjB,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,eAAa,GAAKoD,OAAAA;AACrE,EAAA,IAAI,CAACxD,aAAAA,IAAiB,CAACC,kBAAkB,CAACE,UAAAA,IAAc,CAACC,aAAAA,EAAe;AACpE,IAAA,MAAM,IAAI8E,sCAAyB,CAAA,8IAAA,EACwBrE,MAAAA,CAAOsF,KAAK3C,OAAAA,CAAAA,CAAS4C,IAAAA,CAAK,IAAA,CAAA;AAA6F,kFAAA,CAAA,EAAA;MAAEhB,WAAAA,EAAa,KAAA;AAAOnE,MAAAA;KAAO,CAAA;AACnN,EAAA;AACA,EAAA,OAAOuC,OAAAA;AACX,CAAA,EAPkC,oBAAA;;;ACI3B,IAAM6C,OAAAA,mBAAU7F,mBAAA,CAAA,CAACE,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEwC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACpExC,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM,EAAEwB,WAAAA,EAAaC,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAajB,YAAU,GAAKlD,IAAAA;AAC1E,EAAA,MAAM,EAAEoE,WAAS,GAAKpE,IAAAA;AACtB,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,IAAI,CAACmB,eAAe,CAACC,YAAAA,IAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,IAAe,CAACjB,UAAAA,EAAY;AAC5E,IAAA,MAAMR,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,IAAA,MAAM8C,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,IAAA,IAAI,CAACE,OAAAA,EAAS;AACV,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,eAAAA,CAAAA,EAA8B;AAAErC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OAAO,CAAA;AACtG,IAAA;AACA,IAAA,IAAI,CAACnB,YAAAA,CAAa0D,OAAAA,CAAAA,EAAU;AACxB,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,wCAAAA,CAAAA,EAAuD;AACjGrC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OACjB,CAAA;AACJ,IAAA;AACA,IAAA,IAAIuC,SAAStD,WAAAA,EAAa;AACtB,MAAA,MAAMwD,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,MAAA,MAAM4F,OAAAA,GAAU5C,WAAAA,CAAYF,OAAAA,CAAQtD,WAAW,CAAA;AAC/C,MAAA,MAAMqG,WAAAA,GAAc,CAAA,2BAAA,EAA8BjD,WAAAA,CAAAA,iBAAAA,EAA+BE,QAAQtD,WAAW,CAAA,CAAA;AACpG,MAAA,IAAIO,SAAAA,IAAaA,SAAAA,KAAc6F,OAAAA,CAAQnG,UAAAA,EAAY;AAC/C,QAAA,MAAM,IAAI+E,qCAAAA,CAAyB,CAAA,sBAAA,CAAA,GAA2BqB,WAAAA,EAAa;UACvEnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACA,MAAA,IAAI0D,WAAAA,IAAeA,WAAAA,KAAgB2B,OAAAA,CAAQtG,aAAAA,EAAe;AACtD,QAAA,MAAM,IAAIkF,qCAAAA,CAAyB,CAAA,yBAAA,CAAA,GAA8BqB,WAAAA,EAAa;UAC1EnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACAuC,MAAAA,OAAAA,CAAQrD,aAAamG,OAAAA,CAAQnG,UAAAA;AAC7BqD,MAAAA,OAAAA,CAAQxD,gBAAgBsG,OAAAA,CAAQtG,aAAAA;AACpC,IAAA;AACA,IAAA,MAAM,EAAEA,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,aAAAA,EAAeF,aAAW,GAAKgG,kBAAAA,CAAmB1C,OAAAA,EAAS9C,IAAAA,CAAKO,MAAM,CAAA;AACzH,IAAA,OAAOyD,qBAAAA,CAAsB;MACzBC,WAAAA,EAAa3E,aAAAA;MACb4D,UAAAA,EAAY1D,WAAAA;MACZ0E,YAAAA,EAAc3E,cAAAA;MACdQ,SAAAA,EAAWN,UAAAA;MACX0E,WAAAA,EAAazE,aAAAA;AACb0E,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA,CAAA,MAAA,IACS,CAACqB,WAAAA,IAAe,CAACC,gBAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,EAAa;AAClE,IAAA,MAAM,IAAIK,sCAAyB,8HAAA,EAC8B;MAAEE,WAAAA,EAAa,KAAA;AAAOnE,MAAAA,MAAAA,EAAQP,IAAAA,CAAKO;KAAO,CAAA;EAC/G,CAAA,MACK;AACD,IAAA,OAAOyD,qBAAAA,CAAsB;AACzBC,MAAAA,WAAAA;AACAf,MAAAA,UAAAA;AACAgB,MAAAA,YAAAA;AACAnE,MAAAA,SAAAA;AACAoE,MAAAA,WAAAA;AACAC,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA;AACJ,CAAA,EAnEuB,SAAA","file":"QWROCDWJ.cjs","sourcesContent":["export const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","export const EXPIRE_WINDOW_MS = 5 * 60 * 1000;\nexport const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;\n","export const getSsoOidcClient = async (ssoRegion, init = {}) => {\n const { SSOOIDCClient } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {\n region: ssoRegion ?? init.clientConfig?.region,\n logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger,\n }));\n return ssoOidcClient;\n};\n","import { getSsoOidcClient } from \"./getSsoOidcClient\";\nexport const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {\n const { CreateTokenCommand } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);\n return ssoOidcClient.send(new CreateTokenCommand({\n clientId: ssoToken.clientId,\n clientSecret: ssoToken.clientSecret,\n refreshToken: ssoToken.refreshToken,\n grantType: \"refresh_token\",\n }));\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenExpiry = (token) => {\n if (token.expiration && token.expiration.getTime() < Date.now()) {\n throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenKey = (key, value, forRefresh = false) => {\n if (typeof value === \"undefined\") {\n throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? \". Cannot refresh\" : \"\"}. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { getSSOTokenFilepath } from \"@smithy/shared-ini-file-loader\";\nimport { promises as fsPromises } from \"fs\";\nconst { writeFile } = fsPromises;\nexport const writeSSOTokenToFile = (id, ssoToken) => {\n const tokenFilepath = getSSOTokenFilepath(id);\n const tokenString = JSON.stringify(ssoToken, null, 2);\n return writeFile(tokenFilepath, tokenString);\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, getSSOTokenFromFile, loadSsoSessionData, parseKnownFiles, } from \"@smithy/shared-ini-file-loader\";\nimport { EXPIRE_WINDOW_MS, REFRESH_MESSAGE } from \"./constants\";\nimport { getNewSsoOidcToken } from \"./getNewSsoOidcToken\";\nimport { validateTokenExpiry } from \"./validateTokenExpiry\";\nimport { validateTokenKey } from \"./validateTokenKey\";\nimport { writeSSOTokenToFile } from \"./writeSSOTokenToFile\";\nconst lastRefreshAttemptTime = new Date(0);\nexport const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/token-providers - fromSso\");\n const profiles = await parseKnownFiles(init);\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n const profile = profiles[profileName];\n if (!profile) {\n throw new TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);\n }\n else if (!profile[\"sso_session\"]) {\n throw new TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);\n }\n const ssoSessionName = profile[\"sso_session\"];\n const ssoSessions = await loadSsoSessionData(init);\n const ssoSession = ssoSessions[ssoSessionName];\n if (!ssoSession) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);\n }\n for (const ssoSessionRequiredKey of [\"sso_start_url\", \"sso_region\"]) {\n if (!ssoSession[ssoSessionRequiredKey]) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);\n }\n }\n const ssoStartUrl = ssoSession[\"sso_start_url\"];\n const ssoRegion = ssoSession[\"sso_region\"];\n let ssoToken;\n try {\n ssoToken = await getSSOTokenFromFile(ssoSessionName);\n }\n catch (e) {\n throw new TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`, false);\n }\n validateTokenKey(\"accessToken\", ssoToken.accessToken);\n validateTokenKey(\"expiresAt\", ssoToken.expiresAt);\n const { accessToken, expiresAt } = ssoToken;\n const existingToken = { token: accessToken, expiration: new Date(expiresAt) };\n if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {\n return existingToken;\n }\n if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1000) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n validateTokenKey(\"clientId\", ssoToken.clientId, true);\n validateTokenKey(\"clientSecret\", ssoToken.clientSecret, true);\n validateTokenKey(\"refreshToken\", ssoToken.refreshToken, true);\n try {\n lastRefreshAttemptTime.setTime(Date.now());\n const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);\n validateTokenKey(\"accessToken\", newSsoOidcToken.accessToken);\n validateTokenKey(\"expiresIn\", newSsoOidcToken.expiresIn);\n const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);\n try {\n await writeSSOTokenToFile(ssoSessionName, {\n ...ssoToken,\n accessToken: newSsoOidcToken.accessToken,\n expiresAt: newTokenExpiration.toISOString(),\n refreshToken: newSsoOidcToken.refreshToken,\n });\n }\n catch (error) {\n }\n return {\n token: newSsoOidcToken.accessToken,\n expiration: newTokenExpiration,\n };\n }\n catch (error) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { fromSso as getSsoTokenProvider } from \"@aws-sdk/token-providers\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getSSOTokenFromFile } from \"@smithy/shared-ini-file-loader\";\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\nexport const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }) => {\n let token;\n const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;\n if (ssoSession) {\n try {\n const _token = await getSsoTokenProvider({ profile })();\n token = {\n accessToken: _token.token,\n expiresAt: new Date(_token.expiration).toISOString(),\n };\n }\n catch (e) {\n throw new CredentialsProviderError(e.message, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n else {\n try {\n token = await getSSOTokenFromFile(ssoStartUrl);\n }\n catch (e) {\n throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {\n throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { accessToken } = token;\n const { SSOClient, GetRoleCredentialsCommand } = await import(\"./loadSso\");\n const sso = ssoClient ||\n new SSOClient(Object.assign({}, clientConfig ?? {}, {\n logger: clientConfig?.logger ?? parentClientConfig?.logger,\n region: clientConfig?.region ?? ssoRegion,\n }));\n let ssoResp;\n try {\n ssoResp = await sso.send(new GetRoleCredentialsCommand({\n accountId: ssoAccountId,\n roleName: ssoRoleName,\n accessToken,\n }));\n }\n catch (e) {\n throw new CredentialsProviderError(e, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;\n if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const credentials = {\n accessKeyId,\n secretAccessKey,\n sessionToken,\n expiration: new Date(expiration),\n ...(credentialScope && { credentialScope }),\n ...(accountId && { accountId }),\n };\n if (ssoSession) {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO\", \"s\");\n }\n else {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO_LEGACY\", \"u\");\n }\n return credentials;\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nexport const validateSsoProfile = (profile, logger) => {\n const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", ` +\n `\"sso_region\", \"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\", \")}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });\n }\n return profile;\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, loadSsoSessionData, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { isSsoProfile } from \"./isSsoProfile\";\nimport { resolveSSOCredentials } from \"./resolveSSOCredentials\";\nimport { validateSsoProfile } from \"./validateSsoProfile\";\nexport const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-sso - fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n const { ssoClient } = init;\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n const profiles = await parseKnownFiles(init);\n const profile = profiles[profileName];\n if (!profile) {\n throw new CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });\n }\n if (!isSsoProfile(profile)) {\n throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {\n logger: init.logger,\n });\n }\n if (profile?.sso_session) {\n const ssoSessions = await loadSsoSessionData(init);\n const session = ssoSessions[profile.sso_session];\n const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;\n if (ssoRegion && ssoRegion !== session.sso_region) {\n throw new CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {\n throw new CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n profile.sso_region = session.sso_region;\n profile.sso_start_url = session.sso_start_url;\n }\n const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);\n return resolveSSOCredentials({\n ssoStartUrl: sso_start_url,\n ssoSession: sso_session,\n ssoAccountId: sso_account_id,\n ssoRegion: sso_region,\n ssoRoleName: sso_role_name,\n ssoClient: ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n throw new CredentialsProviderError(\"Incomplete configuration. The fromSSO() argument hash must include \" +\n '\"ssoStartUrl\", \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"', { tryNextLink: false, logger: init.logger });\n }\n else {\n return resolveSSOCredentials({\n ssoStartUrl,\n ssoSession,\n ssoAccountId,\n ssoRegion,\n ssoRoleName,\n ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n};\n"]}
@@ -0,0 +1,214 @@
1
+ import { SCHEMA, fromUtf8 } from './33GUXAT7.js';
2
+ import { __name } from './VUOMXK5T.js';
3
+
4
+ // ../../node_modules/.pnpm/@smithy+core@3.9.1/node_modules/@smithy/core/dist-es/submodules/event-streams/EventStreamSerde.js
5
+ var EventStreamSerde = class {
6
+ static {
7
+ __name(this, "EventStreamSerde");
8
+ }
9
+ constructor({ marshaller, serializer, deserializer, serdeContext, defaultContentType }) {
10
+ this.marshaller = marshaller;
11
+ this.serializer = serializer;
12
+ this.deserializer = deserializer;
13
+ this.serdeContext = serdeContext;
14
+ this.defaultContentType = defaultContentType;
15
+ }
16
+ async serializeEventStream({ eventStream, requestSchema, initialRequest }) {
17
+ const marshaller = this.marshaller;
18
+ const eventStreamMember = requestSchema.getEventStreamMember();
19
+ const unionSchema = requestSchema.getMemberSchema(eventStreamMember);
20
+ unionSchema.getMemberSchemas();
21
+ const serializer = this.serializer;
22
+ const defaultContentType = this.defaultContentType;
23
+ const initialRequestMarker = Symbol("initialRequestMarker");
24
+ const eventStreamIterable = {
25
+ async *[Symbol.asyncIterator]() {
26
+ if (initialRequest) {
27
+ const headers = {
28
+ ":event-type": {
29
+ type: "string",
30
+ value: "initial-request"
31
+ },
32
+ ":message-type": {
33
+ type: "string",
34
+ value: "event"
35
+ },
36
+ ":content-type": {
37
+ type: "string",
38
+ value: defaultContentType
39
+ }
40
+ };
41
+ serializer.write(requestSchema, initialRequest);
42
+ const body = serializer.flush();
43
+ yield {
44
+ [initialRequestMarker]: true,
45
+ headers,
46
+ body
47
+ };
48
+ }
49
+ for await (const page of eventStream) {
50
+ yield page;
51
+ }
52
+ }
53
+ };
54
+ return marshaller.serialize(eventStreamIterable, (event) => {
55
+ if (event[initialRequestMarker]) {
56
+ return {
57
+ headers: event.headers,
58
+ body: event.body
59
+ };
60
+ }
61
+ const unionMember = Object.keys(event).find((key) => {
62
+ return key !== "__type";
63
+ }) ?? "";
64
+ const { additionalHeaders, body, eventType, explicitPayloadContentType } = this.writeEventBody(unionMember, unionSchema, event);
65
+ const headers = {
66
+ ":event-type": {
67
+ type: "string",
68
+ value: eventType
69
+ },
70
+ ":message-type": {
71
+ type: "string",
72
+ value: "event"
73
+ },
74
+ ":content-type": {
75
+ type: "string",
76
+ value: explicitPayloadContentType ?? defaultContentType
77
+ },
78
+ ...additionalHeaders
79
+ };
80
+ return {
81
+ headers,
82
+ body
83
+ };
84
+ });
85
+ }
86
+ async deserializeEventStream({ response, responseSchema, initialResponseContainer }) {
87
+ const marshaller = this.marshaller;
88
+ const eventStreamMember = responseSchema.getEventStreamMember();
89
+ const unionSchema = responseSchema.getMemberSchema(eventStreamMember);
90
+ const memberSchemas = unionSchema.getMemberSchemas();
91
+ const initialResponseMarker = Symbol("initialResponseMarker");
92
+ const asyncIterable = marshaller.deserialize(response.body, async (event) => {
93
+ const unionMember = Object.keys(event).find((key) => {
94
+ return key !== "__type";
95
+ }) ?? "";
96
+ if (unionMember === "initial-response") {
97
+ const dataObject = await this.deserializer.read(responseSchema, event[unionMember].body);
98
+ delete dataObject[eventStreamMember];
99
+ return {
100
+ [initialResponseMarker]: true,
101
+ ...dataObject
102
+ };
103
+ } else if (unionMember in memberSchemas) {
104
+ const eventStreamSchema = memberSchemas[unionMember];
105
+ return {
106
+ [unionMember]: await this.deserializer.read(eventStreamSchema, event[unionMember].body)
107
+ };
108
+ } else {
109
+ return {
110
+ $unknown: event
111
+ };
112
+ }
113
+ });
114
+ const asyncIterator = asyncIterable[Symbol.asyncIterator]();
115
+ const firstEvent = await asyncIterator.next();
116
+ if (firstEvent.done) {
117
+ return asyncIterable;
118
+ }
119
+ if (firstEvent.value?.[initialResponseMarker]) {
120
+ if (!responseSchema) {
121
+ throw new Error("@smithy::core/protocols - initial-response event encountered in event stream but no response schema given.");
122
+ }
123
+ for (const [key, value] of Object.entries(firstEvent.value)) {
124
+ initialResponseContainer[key] = value;
125
+ }
126
+ }
127
+ return {
128
+ async *[Symbol.asyncIterator]() {
129
+ if (!firstEvent?.value?.[initialResponseMarker]) {
130
+ yield firstEvent.value;
131
+ }
132
+ while (true) {
133
+ const { done, value } = await asyncIterator.next();
134
+ if (done) {
135
+ break;
136
+ }
137
+ yield value;
138
+ }
139
+ }
140
+ };
141
+ }
142
+ writeEventBody(unionMember, unionSchema, event) {
143
+ const serializer = this.serializer;
144
+ let eventType = unionMember;
145
+ let explicitPayloadMember = null;
146
+ let explicitPayloadContentType;
147
+ const isKnownSchema = unionSchema.hasMemberSchema(unionMember);
148
+ const additionalHeaders = {};
149
+ if (!isKnownSchema) {
150
+ const [type, value] = event[unionMember];
151
+ eventType = type;
152
+ serializer.write(SCHEMA.DOCUMENT, value);
153
+ } else {
154
+ const eventSchema = unionSchema.getMemberSchema(unionMember);
155
+ if (eventSchema.isStructSchema()) {
156
+ for (const [memberName, memberSchema] of eventSchema.structIterator()) {
157
+ const { eventHeader, eventPayload } = memberSchema.getMergedTraits();
158
+ if (eventPayload) {
159
+ explicitPayloadMember = memberName;
160
+ break;
161
+ } else if (eventHeader) {
162
+ const value = event[unionMember][memberName];
163
+ let type = "binary";
164
+ if (memberSchema.isNumericSchema()) {
165
+ if ((-2) ** 31 <= value && value <= 2 ** 31 - 1) {
166
+ type = "integer";
167
+ } else {
168
+ type = "long";
169
+ }
170
+ } else if (memberSchema.isTimestampSchema()) {
171
+ type = "timestamp";
172
+ } else if (memberSchema.isStringSchema()) {
173
+ type = "string";
174
+ } else if (memberSchema.isBooleanSchema()) {
175
+ type = "boolean";
176
+ }
177
+ if (value != null) {
178
+ additionalHeaders[memberName] = {
179
+ type,
180
+ value
181
+ };
182
+ delete event[unionMember][memberName];
183
+ }
184
+ }
185
+ }
186
+ if (explicitPayloadMember !== null) {
187
+ const payloadSchema = eventSchema.getMemberSchema(explicitPayloadMember);
188
+ if (payloadSchema.isBlobSchema()) {
189
+ explicitPayloadContentType = "application/octet-stream";
190
+ } else if (payloadSchema.isStringSchema()) {
191
+ explicitPayloadContentType = "text/plain";
192
+ }
193
+ serializer.write(payloadSchema, event[unionMember][explicitPayloadMember]);
194
+ } else {
195
+ serializer.write(eventSchema, event[unionMember]);
196
+ }
197
+ } else {
198
+ throw new Error("@smithy/core/event-streams - non-struct member not supported in event stream union.");
199
+ }
200
+ }
201
+ const messageSerialization = serializer.flush();
202
+ const body = typeof messageSerialization === "string" ? (this.serdeContext?.utf8Decoder ?? fromUtf8)(messageSerialization) : messageSerialization;
203
+ return {
204
+ body,
205
+ eventType,
206
+ explicitPayloadContentType,
207
+ additionalHeaders
208
+ };
209
+ }
210
+ };
211
+
212
+ export { EventStreamSerde };
213
+ //# sourceMappingURL=RAIK357L.js.map
214
+ //# sourceMappingURL=RAIK357L.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@smithy+core@3.9.1/node_modules/@smithy/core/dist-es/submodules/event-streams/EventStreamSerde.js"],"names":["EventStreamSerde","marshaller","serializer","deserializer","serdeContext","defaultContentType","serializeEventStream","eventStream","requestSchema","initialRequest","eventStreamMember","getEventStreamMember","unionSchema","getMemberSchema","getMemberSchemas","initialRequestMarker","Symbol","eventStreamIterable","asyncIterator","headers","type","value","write","body","flush","page","serialize","event","unionMember","Object","keys","find","key","additionalHeaders","eventType","explicitPayloadContentType","writeEventBody","deserializeEventStream","response","responseSchema","initialResponseContainer","memberSchemas","initialResponseMarker","asyncIterable","deserialize","dataObject","read","eventStreamSchema","$unknown","firstEvent","next","done","Error","entries","explicitPayloadMember","isKnownSchema","hasMemberSchema","SCHEMA","DOCUMENT","eventSchema","isStructSchema","memberName","memberSchema","structIterator","eventHeader","eventPayload","getMergedTraits","isNumericSchema","isTimestampSchema","isStringSchema","isBooleanSchema","payloadSchema","isBlobSchema","messageSerialization","utf8Decoder","fromUtf8"],"mappings":";;;;AAEO,IAAMA,mBAAN,MAAMA;EAFb;;;AAGI,EAAA,WAAA,CAAY,EAAEC,UAAAA,EAAYC,UAAAA,EAAYC,YAAAA,EAAcC,YAAAA,EAAcC,oBAAkB,EAAK;AACrF,IAAA,IAAA,CAAKJ,UAAAA,GAAaA,UAAAA;AAClB,IAAA,IAAA,CAAKC,UAAAA,GAAaA,UAAAA;AAClB,IAAA,IAAA,CAAKC,YAAAA,GAAeA,YAAAA;AACpB,IAAA,IAAA,CAAKC,YAAAA,GAAeA,YAAAA;AACpB,IAAA,IAAA,CAAKC,kBAAAA,GAAqBA,kBAAAA;AAC9B,EAAA;AACA,EAAA,MAAMC,oBAAAA,CAAqB,EAAEC,WAAAA,EAAaC,aAAAA,EAAeC,gBAAc,EAAK;AACxE,IAAA,MAAMR,aAAa,IAAA,CAAKA,UAAAA;AACxB,IAAA,MAAMS,iBAAAA,GAAoBF,cAAcG,oBAAAA,EAAoB;AAC5D,IAAA,MAAMC,WAAAA,GAAcJ,aAAAA,CAAcK,eAAAA,CAAgBH,iBAAAA,CAAAA;AAClD,IAAsBE,YAAYE,gBAAAA;AAClC,IAAA,MAAMZ,aAAa,IAAA,CAAKA,UAAAA;AACxB,IAAA,MAAMG,qBAAqB,IAAA,CAAKA,kBAAAA;AAChC,IAAA,MAAMU,oBAAAA,GAAuBC,OAAO,sBAAA,CAAA;AACpC,IAAA,MAAMC,mBAAAA,GAAsB;MACxB,QAAQD,MAAAA,CAAOE,aAAa,CAAA,GAAC;AACzB,QAAA,IAAIT,cAAAA,EAAgB;AAChB,UAAA,MAAMU,OAAAA,GAAU;YACZ,aAAA,EAAe;cAAEC,IAAAA,EAAM,QAAA;cAAUC,KAAAA,EAAO;AAAkB,aAAA;YAC1D,eAAA,EAAiB;cAAED,IAAAA,EAAM,QAAA;cAAUC,KAAAA,EAAO;AAAQ,aAAA;YAClD,eAAA,EAAiB;cAAED,IAAAA,EAAM,QAAA;cAAUC,KAAAA,EAAOhB;AAAmB;AACjE,WAAA;AACAH,UAAAA,UAAAA,CAAWoB,KAAAA,CAAMd,eAAeC,cAAAA,CAAAA;AAChC,UAAA,MAAMc,IAAAA,GAAOrB,WAAWsB,KAAAA,EAAK;AAC7B,UAAA,MAAM;AACF,YAAA,CAACT,oBAAAA,GAAuB,IAAA;AACxBI,YAAAA,OAAAA;AACAI,YAAAA;AACJ,WAAA;AACJ,QAAA;AACA,QAAA,WAAA,MAAiBE,QAAQlB,WAAAA,EAAa;AAClC,UAAA,MAAMkB,IAAAA;AACV,QAAA;AACJ,MAAA;AACJ,KAAA;AACA,IAAA,OAAOxB,UAAAA,CAAWyB,SAAAA,CAAUT,mBAAAA,EAAqB,CAACU,KAAAA,KAAAA;AAC9C,MAAA,IAAIA,KAAAA,CAAMZ,oBAAAA,CAAAA,EAAuB;AAC7B,QAAA,OAAO;AACHI,UAAAA,OAAAA,EAASQ,KAAAA,CAAMR,OAAAA;AACfI,UAAAA,IAAAA,EAAMI,KAAAA,CAAMJ;AAChB,SAAA;AACJ,MAAA;AACA,MAAA,MAAMK,cAAcC,MAAAA,CAAOC,IAAAA,CAAKH,KAAAA,CAAAA,CAAOI,IAAAA,CAAK,CAACC,GAAAA,KAAAA;AACzC,QAAA,OAAOA,GAAAA,KAAQ,QAAA;AACnB,MAAA,CAAA,CAAA,IAAM,EAAA;AACN,MAAA,MAAM,EAAEC,iBAAAA,EAAmBV,IAAAA,EAAMW,SAAAA,EAAWC,0BAAAA,KAA+B,IAAA,CAAKC,cAAAA,CAAeR,WAAAA,EAAahB,WAAAA,EAAae,KAAAA,CAAAA;AACzH,MAAA,MAAMR,OAAAA,GAAU;QACZ,aAAA,EAAe;UAAEC,IAAAA,EAAM,QAAA;UAAUC,KAAAA,EAAOa;AAAU,SAAA;QAClD,eAAA,EAAiB;UAAEd,IAAAA,EAAM,QAAA;UAAUC,KAAAA,EAAO;AAAQ,SAAA;QAClD,eAAA,EAAiB;UAAED,IAAAA,EAAM,QAAA;AAAUC,UAAAA,KAAAA,EAAOc,0BAAAA,IAA8B9B;AAAmB,SAAA;QAC3F,GAAG4B;AACP,OAAA;AACA,MAAA,OAAO;AACHd,QAAAA,OAAAA;AACAI,QAAAA;AACJ,OAAA;IACJ,CAAA,CAAA;AACJ,EAAA;AACA,EAAA,MAAMc,sBAAAA,CAAuB,EAAEC,QAAAA,EAAUC,cAAAA,EAAgBC,0BAAwB,EAAK;AAClF,IAAA,MAAMvC,aAAa,IAAA,CAAKA,UAAAA;AACxB,IAAA,MAAMS,iBAAAA,GAAoB6B,eAAe5B,oBAAAA,EAAoB;AAC7D,IAAA,MAAMC,WAAAA,GAAc2B,cAAAA,CAAe1B,eAAAA,CAAgBH,iBAAAA,CAAAA;AACnD,IAAA,MAAM+B,aAAAA,GAAgB7B,YAAYE,gBAAAA,EAAgB;AAClD,IAAA,MAAM4B,qBAAAA,GAAwB1B,OAAO,uBAAA,CAAA;AACrC,IAAA,MAAM2B,gBAAgB1C,UAAAA,CAAW2C,WAAAA,CAAYN,QAAAA,CAASf,IAAAA,EAAM,OAAOI,KAAAA,KAAAA;AAC/D,MAAA,MAAMC,cAAcC,MAAAA,CAAOC,IAAAA,CAAKH,KAAAA,CAAAA,CAAOI,IAAAA,CAAK,CAACC,GAAAA,KAAAA;AACzC,QAAA,OAAOA,GAAAA,KAAQ,QAAA;AACnB,MAAA,CAAA,CAAA,IAAM,EAAA;AACN,MAAA,IAAIJ,gBAAgB,kBAAA,EAAoB;AACpC,QAAA,MAAMiB,UAAAA,GAAa,MAAM,IAAA,CAAK1C,YAAAA,CAAa2C,KAAKP,cAAAA,EAAgBZ,KAAAA,CAAMC,WAAAA,CAAAA,CAAaL,IAAI,CAAA;AACvF,QAAA,OAAOsB,WAAWnC,iBAAAA,CAAAA;AAClB,QAAA,OAAO;AACH,UAAA,CAACgC,qBAAAA,GAAwB,IAAA;UACzB,GAAGG;AACP,SAAA;AACJ,MAAA,CAAA,MAAA,IACSjB,eAAea,aAAAA,EAAe;AACnC,QAAA,MAAMM,iBAAAA,GAAoBN,cAAcb,WAAAA,CAAAA;AACxC,QAAA,OAAO;UACH,CAACA,WAAAA,GAAc,MAAM,IAAA,CAAKzB,YAAAA,CAAa2C,KAAKC,iBAAAA,EAAmBpB,KAAAA,CAAMC,WAAAA,CAAAA,CAAaL,IAAI;AAC1F,SAAA;MACJ,CAAA,MACK;AACD,QAAA,OAAO;UACHyB,QAAAA,EAAUrB;AACd,SAAA;AACJ,MAAA;IACJ,CAAA,CAAA;AACA,IAAA,MAAMT,aAAAA,GAAgByB,aAAAA,CAAc3B,MAAAA,CAAOE,aAAa,CAAA,EAAC;AACzD,IAAA,MAAM+B,UAAAA,GAAa,MAAM/B,aAAAA,CAAcgC,IAAAA,EAAI;AAC3C,IAAA,IAAID,WAAWE,IAAAA,EAAM;AACjB,MAAA,OAAOR,aAAAA;AACX,IAAA;AACA,IAAA,IAAIM,UAAAA,CAAW5B,KAAAA,GAAQqB,qBAAAA,CAAAA,EAAwB;AAC3C,MAAA,IAAI,CAACH,cAAAA,EAAgB;AACjB,QAAA,MAAM,IAAIa,MAAM,4GAAA,CAAA;AACpB,MAAA;AACA,MAAA,KAAA,MAAW,CAACpB,KAAKX,KAAAA,CAAAA,IAAUQ,OAAOwB,OAAAA,CAAQJ,UAAAA,CAAW5B,KAAK,CAAA,EAAG;AACzDmB,QAAAA,wBAAAA,CAAyBR,GAAAA,CAAAA,GAAOX,KAAAA;AACpC,MAAA;AACJ,IAAA;AACA,IAAA,OAAO;MACH,QAAQL,MAAAA,CAAOE,aAAa,CAAA,GAAC;AACzB,QAAA,IAAI,CAAC+B,UAAAA,EAAY5B,KAAAA,GAAQqB,qBAAAA,CAAAA,EAAwB;AAC7C,UAAA,MAAMO,UAAAA,CAAW5B,KAAAA;AACrB,QAAA;AACA,QAAA,OAAO,IAAA,EAAM;AACT,UAAA,MAAM,EAAE8B,IAAAA,EAAM9B,KAAAA,EAAK,GAAK,MAAMH,cAAcgC,IAAAA,EAAI;AAChD,UAAA,IAAIC,IAAAA,EAAM;AACN,YAAA;AACJ,UAAA;AACA,UAAA,MAAM9B,KAAAA;AACV,QAAA;AACJ,MAAA;AACJ,KAAA;AACJ,EAAA;EACAe,cAAAA,CAAeR,WAAAA,EAAahB,aAAae,KAAAA,EAAO;AAC5C,IAAA,MAAMzB,aAAa,IAAA,CAAKA,UAAAA;AACxB,IAAA,IAAIgC,SAAAA,GAAYN,WAAAA;AAChB,IAAA,IAAI0B,qBAAAA,GAAwB,IAAA;AAC5B,IAAA,IAAInB,0BAAAA;AACJ,IAAA,MAAMoB,aAAAA,GAAgB3C,WAAAA,CAAY4C,eAAAA,CAAgB5B,WAAAA,CAAAA;AAClD,IAAA,MAAMK,oBAAoB,EAAC;AAC3B,IAAA,IAAI,CAACsB,aAAAA,EAAe;AAChB,MAAA,MAAM,CAACnC,IAAAA,EAAMC,KAAAA,CAAAA,GAASM,MAAMC,WAAAA,CAAAA;AAC5BM,MAAAA,SAAAA,GAAYd,IAAAA;AACZlB,MAAAA,UAAAA,CAAWoB,KAAAA,CAAMmC,MAAAA,CAAOC,QAAAA,EAAUrC,KAAAA,CAAAA;IACtC,CAAA,MACK;AACD,MAAA,MAAMsC,WAAAA,GAAc/C,WAAAA,CAAYC,eAAAA,CAAgBe,WAAAA,CAAAA;AAChD,MAAA,IAAI+B,WAAAA,CAAYC,gBAAc,EAAI;AAC9B,QAAA,KAAA,MAAW,CAACC,UAAAA,EAAYC,YAAAA,CAAAA,IAAiBH,WAAAA,CAAYI,gBAAc,EAAI;AACnE,UAAA,MAAM,EAAEC,WAAAA,EAAaC,YAAAA,EAAY,GAAKH,aAAaI,eAAAA,EAAe;AAClE,UAAA,IAAID,YAAAA,EAAc;AACdX,YAAAA,qBAAAA,GAAwBO,UAAAA;AACxB,YAAA;AACJ,UAAA,CAAA,MAAA,IACSG,WAAAA,EAAa;AAClB,YAAA,MAAM3C,KAAAA,GAAQM,KAAAA,CAAMC,WAAAA,CAAAA,CAAaiC,UAAAA,CAAAA;AACjC,YAAA,IAAIzC,IAAAA,GAAO,QAAA;AACX,YAAA,IAAI0C,YAAAA,CAAaK,iBAAe,EAAI;AAChC,cAAA,IAAK,QAAO,EAAA,IAAM9C,KAAAA,IAASA,KAAAA,IAAS,CAAA,IAAK,KAAK,CAAA,EAAG;AAC7CD,gBAAAA,IAAAA,GAAO,SAAA;cACX,CAAA,MACK;AACDA,gBAAAA,IAAAA,GAAO,MAAA;AACX,cAAA;YACJ,CAAA,MAAA,IACS0C,YAAAA,CAAaM,mBAAiB,EAAI;AACvChD,cAAAA,IAAAA,GAAO,WAAA;YACX,CAAA,MAAA,IACS0C,YAAAA,CAAaO,gBAAc,EAAI;AACpCjD,cAAAA,IAAAA,GAAO,QAAA;YACX,CAAA,MAAA,IACS0C,YAAAA,CAAaQ,iBAAe,EAAI;AACrClD,cAAAA,IAAAA,GAAO,SAAA;AACX,YAAA;AACA,YAAA,IAAIC,SAAS,IAAA,EAAM;AACfY,cAAAA,iBAAAA,CAAkB4B,UAAAA,CAAAA,GAAc;AAC5BzC,gBAAAA,IAAAA;AACAC,gBAAAA;AACJ,eAAA;AACA,cAAA,OAAOM,KAAAA,CAAMC,WAAAA,CAAAA,CAAaiC,UAAAA,CAAAA;AAC9B,YAAA;AACJ,UAAA;AACJ,QAAA;AACA,QAAA,IAAIP,0BAA0B,IAAA,EAAM;AAChC,UAAA,MAAMiB,aAAAA,GAAgBZ,WAAAA,CAAY9C,eAAAA,CAAgByC,qBAAAA,CAAAA;AAClD,UAAA,IAAIiB,aAAAA,CAAcC,cAAY,EAAI;AAC9BrC,YAAAA,0BAAAA,GAA6B,0BAAA;UACjC,CAAA,MAAA,IACSoC,aAAAA,CAAcF,gBAAc,EAAI;AACrClC,YAAAA,0BAAAA,GAA6B,YAAA;AACjC,UAAA;AACAjC,UAAAA,UAAAA,CAAWoB,MAAMiD,aAAAA,EAAe5C,KAAAA,CAAMC,WAAAA,CAAAA,CAAa0B,qBAAAA,CAAsB,CAAA;QAC7E,CAAA,MACK;AACDpD,UAAAA,UAAAA,CAAWoB,KAAAA,CAAMqC,WAAAA,EAAahC,KAAAA,CAAMC,WAAAA,CAAY,CAAA;AACpD,QAAA;MACJ,CAAA,MACK;AACD,QAAA,MAAM,IAAIwB,MAAM,qFAAA,CAAA;AACpB,MAAA;AACJ,IAAA;AACA,IAAA,MAAMqB,oBAAAA,GAAuBvE,WAAWsB,KAAAA,EAAK;AAC7C,IAAA,MAAMD,IAAAA,GAAO,OAAOkD,oBAAAA,KAAyB,QAAA,GAAA,CACtC,KAAKrE,YAAAA,EAAcsE,WAAAA,IAAeC,QAAAA,EAAUF,oBAAAA,CAAAA,GAC7CA,oBAAAA;AACN,IAAA,OAAO;AACHlD,MAAAA,IAAAA;AACAW,MAAAA,SAAAA;AACAC,MAAAA,0BAAAA;AACAF,MAAAA;AACJ,KAAA;AACJ,EAAA;AACJ","file":"RAIK357L.js","sourcesContent":["import { SCHEMA } from \"@smithy/core/schema\";\nimport { fromUtf8 } from \"@smithy/util-utf8\";\nexport class EventStreamSerde {\n constructor({ marshaller, serializer, deserializer, serdeContext, defaultContentType, }) {\n this.marshaller = marshaller;\n this.serializer = serializer;\n this.deserializer = deserializer;\n this.serdeContext = serdeContext;\n this.defaultContentType = defaultContentType;\n }\n async serializeEventStream({ eventStream, requestSchema, initialRequest, }) {\n const marshaller = this.marshaller;\n const eventStreamMember = requestSchema.getEventStreamMember();\n const unionSchema = requestSchema.getMemberSchema(eventStreamMember);\n const memberSchemas = unionSchema.getMemberSchemas();\n const serializer = this.serializer;\n const defaultContentType = this.defaultContentType;\n const initialRequestMarker = Symbol(\"initialRequestMarker\");\n const eventStreamIterable = {\n async *[Symbol.asyncIterator]() {\n if (initialRequest) {\n const headers = {\n \":event-type\": { type: \"string\", value: \"initial-request\" },\n \":message-type\": { type: \"string\", value: \"event\" },\n \":content-type\": { type: \"string\", value: defaultContentType },\n };\n serializer.write(requestSchema, initialRequest);\n const body = serializer.flush();\n yield {\n [initialRequestMarker]: true,\n headers,\n body,\n };\n }\n for await (const page of eventStream) {\n yield page;\n }\n },\n };\n return marshaller.serialize(eventStreamIterable, (event) => {\n if (event[initialRequestMarker]) {\n return {\n headers: event.headers,\n body: event.body,\n };\n }\n const unionMember = Object.keys(event).find((key) => {\n return key !== \"__type\";\n }) ?? \"\";\n const { additionalHeaders, body, eventType, explicitPayloadContentType } = this.writeEventBody(unionMember, unionSchema, event);\n const headers = {\n \":event-type\": { type: \"string\", value: eventType },\n \":message-type\": { type: \"string\", value: \"event\" },\n \":content-type\": { type: \"string\", value: explicitPayloadContentType ?? defaultContentType },\n ...additionalHeaders,\n };\n return {\n headers,\n body,\n };\n });\n }\n async deserializeEventStream({ response, responseSchema, initialResponseContainer, }) {\n const marshaller = this.marshaller;\n const eventStreamMember = responseSchema.getEventStreamMember();\n const unionSchema = responseSchema.getMemberSchema(eventStreamMember);\n const memberSchemas = unionSchema.getMemberSchemas();\n const initialResponseMarker = Symbol(\"initialResponseMarker\");\n const asyncIterable = marshaller.deserialize(response.body, async (event) => {\n const unionMember = Object.keys(event).find((key) => {\n return key !== \"__type\";\n }) ?? \"\";\n if (unionMember === \"initial-response\") {\n const dataObject = await this.deserializer.read(responseSchema, event[unionMember].body);\n delete dataObject[eventStreamMember];\n return {\n [initialResponseMarker]: true,\n ...dataObject,\n };\n }\n else if (unionMember in memberSchemas) {\n const eventStreamSchema = memberSchemas[unionMember];\n return {\n [unionMember]: await this.deserializer.read(eventStreamSchema, event[unionMember].body),\n };\n }\n else {\n return {\n $unknown: event,\n };\n }\n });\n const asyncIterator = asyncIterable[Symbol.asyncIterator]();\n const firstEvent = await asyncIterator.next();\n if (firstEvent.done) {\n return asyncIterable;\n }\n if (firstEvent.value?.[initialResponseMarker]) {\n if (!responseSchema) {\n throw new Error(\"@smithy::core/protocols - initial-response event encountered in event stream but no response schema given.\");\n }\n for (const [key, value] of Object.entries(firstEvent.value)) {\n initialResponseContainer[key] = value;\n }\n }\n return {\n async *[Symbol.asyncIterator]() {\n if (!firstEvent?.value?.[initialResponseMarker]) {\n yield firstEvent.value;\n }\n while (true) {\n const { done, value } = await asyncIterator.next();\n if (done) {\n break;\n }\n yield value;\n }\n },\n };\n }\n writeEventBody(unionMember, unionSchema, event) {\n const serializer = this.serializer;\n let eventType = unionMember;\n let explicitPayloadMember = null;\n let explicitPayloadContentType;\n const isKnownSchema = unionSchema.hasMemberSchema(unionMember);\n const additionalHeaders = {};\n if (!isKnownSchema) {\n const [type, value] = event[unionMember];\n eventType = type;\n serializer.write(SCHEMA.DOCUMENT, value);\n }\n else {\n const eventSchema = unionSchema.getMemberSchema(unionMember);\n if (eventSchema.isStructSchema()) {\n for (const [memberName, memberSchema] of eventSchema.structIterator()) {\n const { eventHeader, eventPayload } = memberSchema.getMergedTraits();\n if (eventPayload) {\n explicitPayloadMember = memberName;\n break;\n }\n else if (eventHeader) {\n const value = event[unionMember][memberName];\n let type = \"binary\";\n if (memberSchema.isNumericSchema()) {\n if ((-2) ** 31 <= value && value <= 2 ** 31 - 1) {\n type = \"integer\";\n }\n else {\n type = \"long\";\n }\n }\n else if (memberSchema.isTimestampSchema()) {\n type = \"timestamp\";\n }\n else if (memberSchema.isStringSchema()) {\n type = \"string\";\n }\n else if (memberSchema.isBooleanSchema()) {\n type = \"boolean\";\n }\n if (value != null) {\n additionalHeaders[memberName] = {\n type,\n value,\n };\n delete event[unionMember][memberName];\n }\n }\n }\n if (explicitPayloadMember !== null) {\n const payloadSchema = eventSchema.getMemberSchema(explicitPayloadMember);\n if (payloadSchema.isBlobSchema()) {\n explicitPayloadContentType = \"application/octet-stream\";\n }\n else if (payloadSchema.isStringSchema()) {\n explicitPayloadContentType = \"text/plain\";\n }\n serializer.write(payloadSchema, event[unionMember][explicitPayloadMember]);\n }\n else {\n serializer.write(eventSchema, event[unionMember]);\n }\n }\n else {\n throw new Error(\"@smithy/core/event-streams - non-struct member not supported in event stream union.\");\n }\n }\n const messageSerialization = serializer.flush();\n const body = typeof messageSerialization === \"string\"\n ? (this.serdeContext?.utf8Decoder ?? fromUtf8)(messageSerialization)\n : messageSerialization;\n return {\n body,\n eventType,\n explicitPayloadContentType,\n additionalHeaders,\n };\n }\n}\n"]}
@@ -0,0 +1,4 @@
1
+ 'use strict';
2
+
3
+ //# sourceMappingURL=RLUL6JFM.cjs.map
4
+ //# sourceMappingURL=RLUL6JFM.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":[],"names":[],"mappings":"","file":"RLUL6JFM.cjs"}