@layerzerolabs/vm-tooling 0.0.48 → 0.0.51

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (299) hide show
  1. package/dist/{PGRNZALP.cjs → 2ASNEWIN.cjs} +668 -246
  2. package/dist/2ASNEWIN.cjs.map +1 -0
  3. package/dist/{OESMGGGL.js → 2FM75RYQ.js} +48 -16
  4. package/dist/2FM75RYQ.js.map +1 -0
  5. package/dist/{7SRULFYS.cjs → 2RWEJQEO.cjs} +12 -8
  6. package/dist/2RWEJQEO.cjs.map +1 -0
  7. package/dist/{BA2LAHMY.js → 3CLGGUZ6.js} +5 -3
  8. package/dist/3CLGGUZ6.js.map +1 -0
  9. package/dist/{DXKVHPTB.js → 43WEMDCI.js} +47 -60
  10. package/dist/43WEMDCI.js.map +1 -0
  11. package/dist/{RVTTXEXB.cjs → 4KPRGHDI.cjs} +64 -47
  12. package/dist/4KPRGHDI.cjs.map +1 -0
  13. package/dist/{WAGFMHUT.js → 4LRYG53T.js} +37 -10
  14. package/dist/4LRYG53T.js.map +1 -0
  15. package/dist/4RNWLMHM.js +45 -0
  16. package/dist/4RNWLMHM.js.map +1 -0
  17. package/dist/4RWETOR3.cjs +1332 -0
  18. package/dist/4RWETOR3.cjs.map +1 -0
  19. package/dist/{CQHBPXZ2.cjs → 4UZKQNSD.cjs} +26 -16
  20. package/dist/4UZKQNSD.cjs.map +1 -0
  21. package/dist/{BHBC6Q3Y.js → 5CI7X2D4.js} +9 -5
  22. package/dist/5CI7X2D4.js.map +1 -0
  23. package/dist/{QNKHVJNZ.js → 5OKX3IYN.js} +6 -4
  24. package/dist/5OKX3IYN.js.map +1 -0
  25. package/dist/{3EOFF6NK.cjs → 5RAWDGJY.cjs} +7 -5
  26. package/dist/5RAWDGJY.cjs.map +1 -0
  27. package/dist/{7PDYKZMF.cjs → 7ALZ3CAZ.cjs} +21 -19
  28. package/dist/7ALZ3CAZ.cjs.map +1 -0
  29. package/dist/7DH3URRX.js +6 -0
  30. package/dist/7DH3URRX.js.map +1 -0
  31. package/dist/{WDWUP4NU.cjs → 7F6M5VM7.cjs} +59 -71
  32. package/dist/7F6M5VM7.cjs.map +1 -0
  33. package/dist/{WBKUP4MX.js → 7G26DPK3.js} +17 -8
  34. package/dist/7G26DPK3.js.map +1 -0
  35. package/dist/7PP2QA5H.cjs +8 -0
  36. package/dist/7PP2QA5H.cjs.map +1 -0
  37. package/dist/AY3IP22W.cjs +39 -0
  38. package/dist/AY3IP22W.cjs.map +1 -0
  39. package/dist/{63H5FLN6.cjs → BVLAV47O.cjs} +11 -7
  40. package/dist/BVLAV47O.cjs.map +1 -0
  41. package/dist/{VDH76SF6.cjs → BXO3RC75.cjs} +19 -10
  42. package/dist/BXO3RC75.cjs.map +1 -0
  43. package/dist/{EQPMZDRH.js → CH3GQSOI.js} +13 -6
  44. package/dist/CH3GQSOI.js.map +1 -0
  45. package/dist/{RVOOJEDH.js → CNLWPLWD.js} +433 -11
  46. package/dist/CNLWPLWD.js.map +1 -0
  47. package/dist/DPDVRYLI.cjs +234 -0
  48. package/dist/DPDVRYLI.cjs.map +1 -0
  49. package/dist/{Z5NOJAAG.cjs → DW3OZE6F.cjs} +163 -133
  50. package/dist/DW3OZE6F.cjs.map +1 -0
  51. package/dist/{QWROCDWJ.cjs → EE3HP6UB.cjs} +76 -49
  52. package/dist/EE3HP6UB.cjs.map +1 -0
  53. package/dist/{EASTPCLB.js → ELFNCT57.js} +44 -4
  54. package/dist/ELFNCT57.js.map +1 -0
  55. package/dist/{RVM7QRW3.cjs → F5LIDCLG.cjs} +21 -20
  56. package/dist/F5LIDCLG.cjs.map +1 -0
  57. package/dist/{LBQPL6VK.cjs → FLI6L2YX.cjs} +8 -6
  58. package/dist/FLI6L2YX.cjs.map +1 -0
  59. package/dist/{LXXIBLJQ.js → GZ7KTF4Q.js} +4 -3
  60. package/dist/GZ7KTF4Q.js.map +1 -0
  61. package/dist/{L3BNN3KF.cjs → HHS2B7YE.cjs} +395 -175
  62. package/dist/HHS2B7YE.cjs.map +1 -0
  63. package/dist/{GAZMRBLT.js → HR64SZQX.js} +4 -3
  64. package/dist/HR64SZQX.js.map +1 -0
  65. package/dist/{OVH4V3F6.js → IE5H7TSX.js} +8 -4
  66. package/dist/IE5H7TSX.js.map +1 -0
  67. package/dist/{F5UPK5ZZ.js → IMNIF2OY.js} +225 -5
  68. package/dist/IMNIF2OY.js.map +1 -0
  69. package/dist/{XJWXQV6E.js → IVTNKY37.js} +30 -30
  70. package/dist/IVTNKY37.js.map +1 -0
  71. package/dist/{4NINFZK7.cjs → JJXZWB7K.cjs} +5 -4
  72. package/dist/JJXZWB7K.cjs.map +1 -0
  73. package/dist/{7LKSKL4C.cjs → L34TQNQN.cjs} +10 -9
  74. package/dist/L34TQNQN.cjs.map +1 -0
  75. package/dist/L3JULKNZ.js +6 -0
  76. package/dist/L3JULKNZ.js.map +1 -0
  77. package/dist/{33GUXAT7.js → LMCIXUBF.js} +16 -3
  78. package/dist/LMCIXUBF.js.map +1 -0
  79. package/dist/{YVV5I7A5.js → NDUVZQ7S.js} +4 -3
  80. package/dist/NDUVZQ7S.js.map +1 -0
  81. package/dist/{5MIIPWV7.cjs → NEQ3DTUV.cjs} +22 -9
  82. package/dist/NEQ3DTUV.cjs.map +1 -0
  83. package/dist/NSZHKDNY.cjs +82 -0
  84. package/dist/NSZHKDNY.cjs.map +1 -0
  85. package/dist/{JBULQDMK.js → NTYIDZH3.js} +54 -15
  86. package/dist/NTYIDZH3.js.map +1 -0
  87. package/dist/OAO7CCJW.js +6 -0
  88. package/dist/OAO7CCJW.js.map +1 -0
  89. package/dist/{L75NPWJX.cjs → OAYLBSRH.cjs} +64 -24
  90. package/dist/OAYLBSRH.cjs.map +1 -0
  91. package/dist/OH4A2VLX.js +232 -0
  92. package/dist/OH4A2VLX.js.map +1 -0
  93. package/dist/OOTZHKMN.cjs +8 -0
  94. package/dist/OOTZHKMN.cjs.map +1 -0
  95. package/dist/PDSRUQEX.js +78 -0
  96. package/dist/PDSRUQEX.js.map +1 -0
  97. package/dist/{QMIU5HY3.cjs → PYQO5EUZ.cjs} +34 -25
  98. package/dist/PYQO5EUZ.cjs.map +1 -0
  99. package/dist/{PXT4MQYT.cjs → Q4F544X2.cjs} +316 -252
  100. package/dist/Q4F544X2.cjs.map +1 -0
  101. package/dist/{OU33HN4T.js → QMXX45TO.js} +17 -7
  102. package/dist/QMXX45TO.js.map +1 -0
  103. package/dist/{KTOZRP5U.cjs → QO6IEDLG.cjs} +74 -45
  104. package/dist/QO6IEDLG.cjs.map +1 -0
  105. package/dist/{E75FXJNJ.js → RH2W4KPM.js} +36 -7
  106. package/dist/RH2W4KPM.js.map +1 -0
  107. package/dist/{PC55ZLZD.cjs → RRJYWXRS.cjs} +17 -10
  108. package/dist/RRJYWXRS.cjs.map +1 -0
  109. package/dist/{6FHMI4HI.cjs → SGF5U4QO.cjs} +48 -16
  110. package/dist/SGF5U4QO.cjs.map +1 -0
  111. package/dist/{IU7G43CF.cjs → SL653IYR.cjs} +45 -45
  112. package/dist/SL653IYR.cjs.map +1 -0
  113. package/dist/{OWJM6QQP.js → TO3FUAEA.js} +32 -15
  114. package/dist/TO3FUAEA.js.map +1 -0
  115. package/dist/{7EXYTS34.js → TTKDG2NN.js} +12 -3
  116. package/dist/TTKDG2NN.js.map +1 -0
  117. package/dist/{4XKJ5GJB.js → UL4OVG5P.js} +44 -14
  118. package/dist/UL4OVG5P.js.map +1 -0
  119. package/dist/{6A3MRQDI.js → VAAP26JC.js} +77 -13
  120. package/dist/VAAP26JC.js.map +1 -0
  121. package/dist/{THMQMWYA.cjs → VGCATKI5.cjs} +5 -4
  122. package/dist/VGCATKI5.cjs.map +1 -0
  123. package/dist/{CSNPKKTO.js → VLSIEZLM.js} +21 -5
  124. package/dist/VLSIEZLM.js.map +1 -0
  125. package/dist/VO65XOWD.cjs +54 -0
  126. package/dist/VO65XOWD.cjs.map +1 -0
  127. package/dist/{3BKFBGX3.cjs → VVTDADG7.cjs} +5 -4
  128. package/dist/VVTDADG7.cjs.map +1 -0
  129. package/dist/{6NLXVH5R.cjs → VYFY2754.cjs} +233 -194
  130. package/dist/VYFY2754.cjs.map +1 -0
  131. package/dist/{NMC54VEB.cjs → W7QMZBXR.cjs} +34 -18
  132. package/dist/W7QMZBXR.cjs.map +1 -0
  133. package/dist/XM743A75.js +1326 -0
  134. package/dist/XM743A75.js.map +1 -0
  135. package/dist/{RAIK357L.js → YIS2J6NC.js} +8 -4
  136. package/dist/YIS2J6NC.js.map +1 -0
  137. package/dist/{S3DLREDC.js → YU6A7BNZ.js} +7 -6
  138. package/dist/YU6A7BNZ.js.map +1 -0
  139. package/dist/{JY6PMFYV.js → YYBFDJRD.js} +5 -4
  140. package/dist/YYBFDJRD.js.map +1 -0
  141. package/dist/{3AX3IZXK.cjs → Z7BVBO5K.cjs} +12 -8
  142. package/dist/Z7BVBO5K.cjs.map +1 -0
  143. package/dist/{FYBVGT35.js → Z7OWTALH.js} +8 -6
  144. package/dist/Z7OWTALH.js.map +1 -0
  145. package/dist/config/index.cjs +8 -8
  146. package/dist/config/index.js +4 -4
  147. package/dist/config/tools.cjs +5 -5
  148. package/dist/config/tools.d.ts.map +1 -1
  149. package/dist/config/tools.js +4 -4
  150. package/dist/config/version-matrices.cjs +3 -3
  151. package/dist/config/version-matrices.d.ts.map +1 -1
  152. package/dist/config/version-matrices.js +2 -2
  153. package/dist/core/compatibility.cjs +3 -3
  154. package/dist/core/compatibility.js +2 -2
  155. package/dist/core/index.cjs +14 -13
  156. package/dist/core/index.js +9 -8
  157. package/dist/core/lock.cjs +21 -0
  158. package/dist/core/lock.cjs.map +1 -0
  159. package/dist/core/lock.d.ts +9 -0
  160. package/dist/core/lock.d.ts.map +1 -0
  161. package/dist/core/lock.js +4 -0
  162. package/dist/core/lock.js.map +1 -0
  163. package/dist/core/lock.test.cjs +18294 -0
  164. package/dist/core/lock.test.cjs.map +1 -0
  165. package/dist/core/lock.test.js +18292 -0
  166. package/dist/core/lock.test.js.map +1 -0
  167. package/dist/core/tool-executor.cjs +13 -8
  168. package/dist/core/tool-executor.d.ts +6 -1
  169. package/dist/core/tool-executor.d.ts.map +1 -1
  170. package/dist/core/tool-executor.js +8 -7
  171. package/dist/core/version-resolver.cjs +9 -9
  172. package/dist/core/version-resolver.js +6 -6
  173. package/dist/display/formatters.cjs +4 -4
  174. package/dist/display/formatters.d.ts +1 -1
  175. package/dist/display/formatters.d.ts.map +1 -1
  176. package/dist/display/formatters.js +2 -2
  177. package/dist/display/index.cjs +11 -11
  178. package/dist/display/index.js +7 -7
  179. package/dist/display/version-display.cjs +8 -8
  180. package/dist/display/version-display.js +6 -6
  181. package/dist/index.cjs +24 -21
  182. package/dist/index.cjs.map +1 -1
  183. package/dist/index.js +16 -13
  184. package/dist/index.js.map +1 -1
  185. package/dist/scripts/generate-github-matrix.cjs +325 -290
  186. package/dist/scripts/generate-github-matrix.cjs.map +1 -1
  187. package/dist/scripts/generate-github-matrix.js +67 -32
  188. package/dist/scripts/generate-github-matrix.js.map +1 -1
  189. package/dist/types/docker.cjs +3 -1
  190. package/dist/types/docker.cjs.map +1 -1
  191. package/dist/types/docker.d.ts +15 -6
  192. package/dist/types/docker.d.ts.map +1 -1
  193. package/dist/types/docker.js +3 -0
  194. package/dist/types/docker.js.map +1 -1
  195. package/dist/types/index.cjs +3 -1
  196. package/dist/types/index.cjs.map +1 -1
  197. package/dist/types/index.js +3 -0
  198. package/dist/types/index.js.map +1 -1
  199. package/dist/types/tool.cjs +3 -1
  200. package/dist/types/tool.cjs.map +1 -1
  201. package/dist/types/tool.d.ts +0 -4
  202. package/dist/types/tool.d.ts.map +1 -1
  203. package/dist/types/tool.js +3 -0
  204. package/dist/types/tool.js.map +1 -1
  205. package/dist/types/version.cjs +3 -1
  206. package/dist/types/version.cjs.map +1 -1
  207. package/dist/types/version.d.ts +1 -0
  208. package/dist/types/version.d.ts.map +1 -1
  209. package/dist/types/version.js +3 -0
  210. package/dist/types/version.js.map +1 -1
  211. package/dist/utils/finder-utils.cjs +11 -11
  212. package/dist/utils/finder-utils.js +4 -4
  213. package/dist/utils/index.cjs +17 -16
  214. package/dist/utils/index.cjs.map +1 -1
  215. package/dist/utils/index.js +7 -4
  216. package/dist/utils/index.js.map +1 -1
  217. package/dist/utils/version-utils.cjs +8 -8
  218. package/dist/utils/version-utils.js +4 -4
  219. package/dist/utils.cjs +4 -4
  220. package/dist/utils.js +2 -2
  221. package/package.json +7 -5
  222. package/dist/33GUXAT7.js.map +0 -1
  223. package/dist/3AX3IZXK.cjs.map +0 -1
  224. package/dist/3BKFBGX3.cjs.map +0 -1
  225. package/dist/3EOFF6NK.cjs.map +0 -1
  226. package/dist/4NINFZK7.cjs.map +0 -1
  227. package/dist/4XKJ5GJB.js.map +0 -1
  228. package/dist/5MIIPWV7.cjs.map +0 -1
  229. package/dist/5N3Q6FCT.cjs +0 -4
  230. package/dist/5N3Q6FCT.cjs.map +0 -1
  231. package/dist/63H5FLN6.cjs.map +0 -1
  232. package/dist/6A3MRQDI.js.map +0 -1
  233. package/dist/6FHMI4HI.cjs.map +0 -1
  234. package/dist/6NLXVH5R.cjs.map +0 -1
  235. package/dist/6UWCX7SA.js +0 -60
  236. package/dist/6UWCX7SA.js.map +0 -1
  237. package/dist/7EXYTS34.js.map +0 -1
  238. package/dist/7LKSKL4C.cjs.map +0 -1
  239. package/dist/7PDYKZMF.cjs.map +0 -1
  240. package/dist/7SRULFYS.cjs.map +0 -1
  241. package/dist/AH2UQL5E.js +0 -6
  242. package/dist/AH2UQL5E.js.map +0 -1
  243. package/dist/BA2LAHMY.js.map +0 -1
  244. package/dist/BHBC6Q3Y.js.map +0 -1
  245. package/dist/CQHBPXZ2.cjs.map +0 -1
  246. package/dist/CSNPKKTO.js.map +0 -1
  247. package/dist/DXKVHPTB.js.map +0 -1
  248. package/dist/E75FXJNJ.js.map +0 -1
  249. package/dist/EASTPCLB.js.map +0 -1
  250. package/dist/EKUFNO5X.js +0 -3
  251. package/dist/EKUFNO5X.js.map +0 -1
  252. package/dist/EQPMZDRH.js.map +0 -1
  253. package/dist/F5UPK5ZZ.js.map +0 -1
  254. package/dist/FYBVGT35.js.map +0 -1
  255. package/dist/GAZMRBLT.js.map +0 -1
  256. package/dist/IU7G43CF.cjs.map +0 -1
  257. package/dist/JBULQDMK.js.map +0 -1
  258. package/dist/JY6PMFYV.js.map +0 -1
  259. package/dist/KTOZRP5U.cjs.map +0 -1
  260. package/dist/L3BNN3KF.cjs.map +0 -1
  261. package/dist/L75NPWJX.cjs.map +0 -1
  262. package/dist/LBQPL6VK.cjs.map +0 -1
  263. package/dist/LXXIBLJQ.js.map +0 -1
  264. package/dist/MBTHP667.cjs +0 -39
  265. package/dist/MBTHP667.cjs.map +0 -1
  266. package/dist/NMC54VEB.cjs.map +0 -1
  267. package/dist/NX4KBEWA.cjs +0 -13
  268. package/dist/NX4KBEWA.cjs.map +0 -1
  269. package/dist/OESMGGGL.js.map +0 -1
  270. package/dist/OU33HN4T.js.map +0 -1
  271. package/dist/OVH4V3F6.js.map +0 -1
  272. package/dist/OWJM6QQP.js.map +0 -1
  273. package/dist/PC55ZLZD.cjs.map +0 -1
  274. package/dist/PGRNZALP.cjs.map +0 -1
  275. package/dist/PXT4MQYT.cjs.map +0 -1
  276. package/dist/QMIU5HY3.cjs.map +0 -1
  277. package/dist/QNKHVJNZ.js.map +0 -1
  278. package/dist/QWROCDWJ.cjs.map +0 -1
  279. package/dist/RAIK357L.js.map +0 -1
  280. package/dist/RLUL6JFM.cjs +0 -4
  281. package/dist/RLUL6JFM.cjs.map +0 -1
  282. package/dist/RVM7QRW3.cjs.map +0 -1
  283. package/dist/RVOOJEDH.js.map +0 -1
  284. package/dist/RVTTXEXB.cjs.map +0 -1
  285. package/dist/S3DLREDC.js.map +0 -1
  286. package/dist/THMQMWYA.cjs.map +0 -1
  287. package/dist/VDH76SF6.cjs.map +0 -1
  288. package/dist/VUOMXK5T.js +0 -6
  289. package/dist/VUOMXK5T.js.map +0 -1
  290. package/dist/WAGFMHUT.js.map +0 -1
  291. package/dist/WBKUP4MX.js.map +0 -1
  292. package/dist/WDWUP4NU.cjs.map +0 -1
  293. package/dist/XH4FQTBY.cjs +0 -62
  294. package/dist/XH4FQTBY.cjs.map +0 -1
  295. package/dist/XJWXQV6E.js.map +0 -1
  296. package/dist/YVV5I7A5.js.map +0 -1
  297. package/dist/Z5NOJAAG.cjs.map +0 -1
  298. package/dist/ZEW74YLA.js +0 -3
  299. package/dist/ZEW74YLA.js.map +0 -1
@@ -1,43 +1,56 @@
1
1
  'use strict';
2
2
 
3
- var L75NPWJX_cjs = require('./L75NPWJX.cjs');
4
- var _3BKFBGX3_cjs = require('./3BKFBGX3.cjs');
5
- require('./XH4FQTBY.cjs');
6
- var VDH76SF6_cjs = require('./VDH76SF6.cjs');
7
- var NX4KBEWA_cjs = require('./NX4KBEWA.cjs');
3
+ var OAYLBSRH_cjs = require('./OAYLBSRH.cjs');
4
+ var VVTDADG7_cjs = require('./VVTDADG7.cjs');
5
+ require('./DPDVRYLI.cjs');
6
+ var BXO3RC75_cjs = require('./BXO3RC75.cjs');
7
+ var VO65XOWD_cjs = require('./VO65XOWD.cjs');
8
+
9
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js
10
+ VO65XOWD_cjs.init_cjs_shims();
11
+
12
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
13
+ VO65XOWD_cjs.init_cjs_shims();
14
+
15
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
16
+ VO65XOWD_cjs.init_cjs_shims();
17
+
18
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
19
+ VO65XOWD_cjs.init_cjs_shims();
8
20
 
9
21
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
10
- var resolveCredentialSource = /* @__PURE__ */ NX4KBEWA_cjs.__name((credentialSource, profileName, logger) => {
22
+ VO65XOWD_cjs.init_cjs_shims();
23
+ var resolveCredentialSource = /* @__PURE__ */ VO65XOWD_cjs.__name((credentialSource, profileName, logger) => {
11
24
  const sourceProvidersMap = {
12
- EcsContainer: /* @__PURE__ */ NX4KBEWA_cjs.__name(async (options) => {
13
- const { fromHttp } = await import('./QMIU5HY3.cjs');
14
- const { fromContainerMetadata } = await import('./KTOZRP5U.cjs');
25
+ EcsContainer: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
26
+ const { fromHttp } = await import('./PYQO5EUZ.cjs');
27
+ const { fromContainerMetadata } = await import('./QO6IEDLG.cjs');
15
28
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
16
- return async () => VDH76SF6_cjs.chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
29
+ return async () => BXO3RC75_cjs.chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
17
30
  }, "EcsContainer"),
18
- Ec2InstanceMetadata: /* @__PURE__ */ NX4KBEWA_cjs.__name(async (options) => {
31
+ Ec2InstanceMetadata: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
19
32
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
20
- const { fromInstanceMetadata } = await import('./KTOZRP5U.cjs');
33
+ const { fromInstanceMetadata } = await import('./QO6IEDLG.cjs');
21
34
  return async () => fromInstanceMetadata(options)().then(setNamedProvider);
22
35
  }, "Ec2InstanceMetadata"),
23
- Environment: /* @__PURE__ */ NX4KBEWA_cjs.__name(async (options) => {
36
+ Environment: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
24
37
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
25
- const { fromEnv } = await import('./MBTHP667.cjs');
38
+ const { fromEnv } = await import('./AY3IP22W.cjs');
26
39
  return async () => fromEnv(options)().then(setNamedProvider);
27
40
  }, "Environment")
28
41
  };
29
42
  if (credentialSource in sourceProvidersMap) {
30
43
  return sourceProvidersMap[credentialSource];
31
44
  } else {
32
- throw new VDH76SF6_cjs.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, {
45
+ throw new BXO3RC75_cjs.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, {
33
46
  logger
34
47
  });
35
48
  }
36
49
  }, "resolveCredentialSource");
37
- var setNamedProvider = /* @__PURE__ */ NX4KBEWA_cjs.__name((creds) => _3BKFBGX3_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p"), "setNamedProvider");
50
+ var setNamedProvider = /* @__PURE__ */ VO65XOWD_cjs.__name((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p"), "setNamedProvider");
38
51
 
39
52
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
40
- var isAssumeRoleProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg, { profile = "default", logger } = {}) => {
53
+ var isAssumeRoleProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile = "default", logger } = {}) => {
41
54
  return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && [
42
55
  "undefined",
43
56
  "string"
@@ -55,26 +68,26 @@ var isAssumeRoleProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg, { profile =
55
68
  logger
56
69
  }));
57
70
  }, "isAssumeRoleProfile");
58
- var isAssumeRoleWithSourceProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg, { profile, logger }) => {
71
+ var isAssumeRoleWithSourceProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile, logger }) => {
59
72
  const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
60
73
  if (withSourceProfile) {
61
74
  logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
62
75
  }
63
76
  return withSourceProfile;
64
77
  }, "isAssumeRoleWithSourceProfile");
65
- var isCredentialSourceProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg, { profile, logger }) => {
78
+ var isCredentialSourceProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile, logger }) => {
66
79
  const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
67
80
  if (withProviderProfile) {
68
81
  logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
69
82
  }
70
83
  return withProviderProfile;
71
84
  }, "isCredentialSourceProfile");
72
- var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}) => {
85
+ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}) => {
73
86
  options.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");
74
87
  const profileData = profiles[profileName];
75
88
  const { source_profile, region } = profileData;
76
89
  if (!options.roleAssumer) {
77
- const { getDefaultRoleAssumer } = await import('./PXT4MQYT.cjs');
90
+ const { getDefaultRoleAssumer } = await import('./Q4F544X2.cjs');
78
91
  options.roleAssumer = getDefaultRoleAssumer({
79
92
  ...options.clientConfig,
80
93
  credentialProviderLogger: options.logger,
@@ -85,7 +98,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (pr
85
98
  }, options.clientPlugins);
86
99
  }
87
100
  if (source_profile && source_profile in visitedProfiles) {
88
- throw new VDH76SF6_cjs.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${L75NPWJX_cjs.getProfileName(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "), {
101
+ throw new BXO3RC75_cjs.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${OAYLBSRH_cjs.getProfileName(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "), {
89
102
  logger: options.logger
90
103
  });
91
104
  }
@@ -95,7 +108,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (pr
95
108
  [source_profile]: true
96
109
  }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {})) : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();
97
110
  if (isCredentialSourceWithoutRoleArn(profileData)) {
98
- return sourceCredsProvider.then((creds) => _3BKFBGX3_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
111
+ return sourceCredsProvider.then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
99
112
  } else {
100
113
  const params = {
101
114
  RoleArn: profileData.role_arn,
@@ -106,7 +119,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (pr
106
119
  const { mfa_serial } = profileData;
107
120
  if (mfa_serial) {
108
121
  if (!options.mfaCodeProvider) {
109
- throw new VDH76SF6_cjs.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, {
122
+ throw new BXO3RC75_cjs.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, {
110
123
  logger: options.logger,
111
124
  tryNextLink: false
112
125
  });
@@ -115,23 +128,25 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (pr
115
128
  params.TokenCode = await options.mfaCodeProvider(mfa_serial);
116
129
  }
117
130
  const sourceCreds = await sourceCredsProvider;
118
- return options.roleAssumer(sourceCreds, params).then((creds) => _3BKFBGX3_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
131
+ return options.roleAssumer(sourceCreds, params).then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
119
132
  }
120
133
  }, "resolveAssumeRoleCredentials");
121
- var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ NX4KBEWA_cjs.__name((section) => {
134
+ var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ VO65XOWD_cjs.__name((section) => {
122
135
  return !section.role_arn && !!section.credential_source;
123
136
  }, "isCredentialSourceWithoutRoleArn");
124
137
 
125
138
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
126
- var isProcessProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
127
- var resolveProcessCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (options, profile) => import('./CQHBPXZ2.cjs').then(({ fromProcess }) => fromProcess({
139
+ VO65XOWD_cjs.init_cjs_shims();
140
+ var isProcessProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
141
+ var resolveProcessCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (options, profile) => import('./4UZKQNSD.cjs').then(({ fromProcess }) => fromProcess({
128
142
  ...options,
129
143
  profile
130
- })().then((creds) => _3BKFBGX3_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
144
+ })().then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
131
145
 
132
146
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
133
- var resolveSsoCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profile, profileData, options = {}) => {
134
- const { fromSSO } = await import('./QWROCDWJ.cjs');
147
+ VO65XOWD_cjs.init_cjs_shims();
148
+ var resolveSsoCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, profileData, options = {}) => {
149
+ const { fromSSO } = await import('./EE3HP6UB.cjs');
135
150
  return fromSSO({
136
151
  profile,
137
152
  logger: options.logger,
@@ -139,23 +154,24 @@ var resolveSsoCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profile,
139
154
  clientConfig: options.clientConfig
140
155
  })().then((creds) => {
141
156
  if (profileData.sso_session) {
142
- return _3BKFBGX3_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO", "r");
157
+ return VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO", "r");
143
158
  } else {
144
- return _3BKFBGX3_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO_LEGACY", "t");
159
+ return VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO_LEGACY", "t");
145
160
  }
146
161
  });
147
162
  }, "resolveSsoCredentials");
148
- var isSsoProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
163
+ var isSsoProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
149
164
 
150
165
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
151
- var isStaticCredsProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && [
166
+ VO65XOWD_cjs.init_cjs_shims();
167
+ var isStaticCredsProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && [
152
168
  "undefined",
153
169
  "string"
154
170
  ].indexOf(typeof arg.aws_session_token) > -1 && [
155
171
  "undefined",
156
172
  "string"
157
173
  ].indexOf(typeof arg.aws_account_id) > -1, "isStaticCredsProfile");
158
- var resolveStaticCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profile, options) => {
174
+ var resolveStaticCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, options) => {
159
175
  options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
160
176
  const credentials = {
161
177
  accessKeyId: profile.aws_access_key_id,
@@ -168,25 +184,26 @@ var resolveStaticCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profil
168
184
  accountId: profile.aws_account_id
169
185
  }
170
186
  };
171
- return _3BKFBGX3_cjs.setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
187
+ return VVTDADG7_cjs.setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
172
188
  }, "resolveStaticCredentials");
173
189
 
174
190
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
175
- var isWebIdentityProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && [
191
+ VO65XOWD_cjs.init_cjs_shims();
192
+ var isWebIdentityProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && [
176
193
  "undefined",
177
194
  "string"
178
195
  ].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
179
- var resolveWebIdentityCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profile, options) => import('./PC55ZLZD.cjs').then(({ fromTokenFile }) => fromTokenFile({
196
+ var resolveWebIdentityCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, options) => import('./RRJYWXRS.cjs').then(({ fromTokenFile }) => fromTokenFile({
180
197
  webIdentityTokenFile: profile.web_identity_token_file,
181
198
  roleArn: profile.role_arn,
182
199
  roleSessionName: profile.role_session_name,
183
200
  roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
184
201
  logger: options.logger,
185
202
  parentClientConfig: options.parentClientConfig
186
- })().then((creds) => _3BKFBGX3_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q"))), "resolveWebIdentityCredentials");
203
+ })().then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q"))), "resolveWebIdentityCredentials");
187
204
 
188
205
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
189
- var resolveProfileData = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
206
+ var resolveProfileData = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
190
207
  const data = profiles[profileName];
191
208
  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
192
209
  return resolveStaticCredentials(data, options);
@@ -209,13 +226,13 @@ var resolveProfileData = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profileName,
209
226
  if (isSsoProfile(data)) {
210
227
  return await resolveSsoCredentials(profileName, data, options);
211
228
  }
212
- throw new VDH76SF6_cjs.CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, {
229
+ throw new BXO3RC75_cjs.CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, {
213
230
  logger: options.logger
214
231
  });
215
232
  }, "resolveProfileData");
216
233
 
217
234
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
218
- var fromIni = /* @__PURE__ */ NX4KBEWA_cjs.__name((_init = {}) => async ({ callerClientConfig } = {}) => {
235
+ var fromIni = /* @__PURE__ */ VO65XOWD_cjs.__name((_init = {}) => async ({ callerClientConfig } = {}) => {
219
236
  const init = {
220
237
  ..._init,
221
238
  parentClientConfig: {
@@ -224,12 +241,12 @@ var fromIni = /* @__PURE__ */ NX4KBEWA_cjs.__name((_init = {}) => async ({ calle
224
241
  }
225
242
  };
226
243
  init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
227
- const profiles = await L75NPWJX_cjs.parseKnownFiles(init);
228
- return resolveProfileData(L75NPWJX_cjs.getProfileName({
244
+ const profiles = await OAYLBSRH_cjs.parseKnownFiles(init);
245
+ return resolveProfileData(OAYLBSRH_cjs.getProfileName({
229
246
  profile: _init.profile ?? callerClientConfig?.profile
230
247
  }), profiles, init);
231
248
  }, "fromIni");
232
249
 
233
250
  exports.fromIni = fromIni;
234
- //# sourceMappingURL=RVTTXEXB.cjs.map
235
- //# sourceMappingURL=RVTTXEXB.cjs.map
251
+ //# sourceMappingURL=4KPRGHDI.cjs.map
252
+ //# sourceMappingURL=4KPRGHDI.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["init_cjs_shims","resolveCredentialSource","__name","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAEO,IAAMC,uBAAAA,mBAA0BC,mBAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,6CAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,gBAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,kBAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,6CAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,6CAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,qCAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmBZ,mBAAA,CAAA,CAACkB,KAAAA,KAAUC,kCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,wCAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC7B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B9B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+BnC,mBAAA,CAAA,OAAOE,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,qCAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,2BAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMjC,uBAAAA,CAAwBuC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,kCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,qCAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,wCAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzCnC,2BAAA,EAAA;AACO,IAAMsE,gBAAAA,mBAAmBpE,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4BtE,mBAAA,CAAA,OAAOM,OAAAA,EAASgB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzCpB,2BAAA,EAAA;AACO,IAAM0E,wCAAwBxE,mBAAA,CAAA,OAAOsB,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,iCAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,iCAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,wCAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5BjF,2BAAA,EAAA;AACO,IAAMkF,uCAAuBhF,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2BrF,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,iCAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxCxF,2BAAA,EAAA;AACO,IAAM+F,uCAAuB7F,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC/F,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,8CAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAUxG,mBAAA,CAAA,CAACyG,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,4BAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,2BAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"4KPRGHDI.cjs","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}
@@ -1,20 +1,38 @@
1
- import { getProfileName, parseKnownFiles, loadSsoSessionData, getSSOTokenFromFile, getSSOTokenFilepath } from './EASTPCLB.js';
2
- import { setCredentialFeature } from './YVV5I7A5.js';
3
- import './6UWCX7SA.js';
4
- import { CredentialsProviderError, TokenProviderError } from './7EXYTS34.js';
5
- import { __name } from './VUOMXK5T.js';
1
+ import { getProfileName, parseKnownFiles, loadSsoSessionData, getSSOTokenFromFile, getSSOTokenFilepath } from './ELFNCT57.js';
2
+ import { setCredentialFeature } from './NDUVZQ7S.js';
3
+ import './OH4A2VLX.js';
4
+ import { CredentialsProviderError, TokenProviderError } from './TTKDG2NN.js';
5
+ import { init_esm_shims, __name } from './4RNWLMHM.js';
6
6
  import { promises } from 'fs';
7
7
 
8
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js
9
+ init_esm_shims();
10
+
11
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
12
+ init_esm_shims();
13
+
8
14
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
15
+ init_esm_shims();
9
16
  var isSsoProfile = /* @__PURE__ */ __name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
10
17
 
18
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
19
+ init_esm_shims();
20
+
21
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
22
+ init_esm_shims();
23
+
11
24
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
25
+ init_esm_shims();
12
26
  var EXPIRE_WINDOW_MS = 5 * 60 * 1e3;
13
27
  var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
14
28
 
29
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
30
+ init_esm_shims();
31
+
15
32
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
33
+ init_esm_shims();
16
34
  var getSsoOidcClient = /* @__PURE__ */ __name(async (ssoRegion, init = {}) => {
17
- const { SSOOIDCClient } = await import('./JBULQDMK.js');
35
+ const { SSOOIDCClient } = await import('./NTYIDZH3.js');
18
36
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
19
37
  region: ssoRegion ?? init.clientConfig?.region,
20
38
  logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
@@ -24,7 +42,7 @@ var getSsoOidcClient = /* @__PURE__ */ __name(async (ssoRegion, init = {}) => {
24
42
 
25
43
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
26
44
  var getNewSsoOidcToken = /* @__PURE__ */ __name(async (ssoToken, ssoRegion, init = {}) => {
27
- const { CreateTokenCommand } = await import('./JBULQDMK.js');
45
+ const { CreateTokenCommand } = await import('./NTYIDZH3.js');
28
46
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
29
47
  return ssoOidcClient.send(new CreateTokenCommand({
30
48
  clientId: ssoToken.clientId,
@@ -35,6 +53,7 @@ var getNewSsoOidcToken = /* @__PURE__ */ __name(async (ssoToken, ssoRegion, init
35
53
  }, "getNewSsoOidcToken");
36
54
 
37
55
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
56
+ init_esm_shims();
38
57
  var validateTokenExpiry = /* @__PURE__ */ __name((token) => {
39
58
  if (token.expiration && token.expiration.getTime() < Date.now()) {
40
59
  throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);
@@ -42,11 +61,15 @@ var validateTokenExpiry = /* @__PURE__ */ __name((token) => {
42
61
  }, "validateTokenExpiry");
43
62
 
44
63
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
64
+ init_esm_shims();
45
65
  var validateTokenKey = /* @__PURE__ */ __name((key, value, forRefresh = false) => {
46
66
  if (typeof value === "undefined") {
47
67
  throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${REFRESH_MESSAGE}`, false);
48
68
  }
49
69
  }, "validateTokenKey");
70
+
71
+ // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js
72
+ init_esm_shims();
50
73
  var { writeFile } = promises;
51
74
  var writeSSOTokenToFile = /* @__PURE__ */ __name((id, ssoToken) => {
52
75
  const tokenFilepath = getSSOTokenFilepath(id);
@@ -176,7 +199,7 @@ var resolveSSOCredentials = /* @__PURE__ */ __name(async ({ ssoStartUrl, ssoSess
176
199
  });
177
200
  }
178
201
  const { accessToken } = token;
179
- const { SSOClient, GetRoleCredentialsCommand } = await import('./4XKJ5GJB.js');
202
+ const { SSOClient, GetRoleCredentialsCommand } = await import('./UL4OVG5P.js');
180
203
  const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
181
204
  logger: clientConfig?.logger ?? parentClientConfig?.logger,
182
205
  region: clientConfig?.region ?? ssoRegion
@@ -222,6 +245,7 @@ var resolveSSOCredentials = /* @__PURE__ */ __name(async ({ ssoStartUrl, ssoSess
222
245
  }, "resolveSSOCredentials");
223
246
 
224
247
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
248
+ init_esm_shims();
225
249
  var validateSsoProfile = /* @__PURE__ */ __name((profile, logger) => {
226
250
  const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
227
251
  if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
@@ -306,6 +330,9 @@ var fromSSO = /* @__PURE__ */ __name((init = {}) => async ({ callerClientConfig
306
330
  }
307
331
  }, "fromSSO");
308
332
 
333
+ // ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/types.js
334
+ init_esm_shims();
335
+
309
336
  export { fromSSO, isSsoProfile, validateSsoProfile };
310
- //# sourceMappingURL=WAGFMHUT.js.map
311
- //# sourceMappingURL=WAGFMHUT.js.map
337
+ //# sourceMappingURL=4LRYG53T.js.map
338
+ //# sourceMappingURL=4LRYG53T.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/types.js"],"names":["isSsoProfile","arg","sso_start_url","sso_account_id","sso_session","sso_region","sso_role_name","EXPIRE_WINDOW_MS","REFRESH_MESSAGE","getSsoOidcClient","ssoRegion","init","SSOOIDCClient","ssoOidcClient","Object","assign","clientConfig","region","logger","parentClientConfig","getNewSsoOidcToken","ssoToken","CreateTokenCommand","send","clientId","clientSecret","refreshToken","grantType","validateTokenExpiry","token","expiration","getTime","Date","now","TokenProviderError","validateTokenKey","key","value","forRefresh","writeFile","fsPromises","writeSSOTokenToFile","id","tokenFilepath","getSSOTokenFilepath","tokenString","JSON","stringify","lastRefreshAttemptTime","fromSso","_init","callerClientConfig","debug","profiles","parseKnownFiles","profileName","getProfileName","profile","ssoSessionName","ssoSessions","loadSsoSessionData","ssoSession","ssoSessionRequiredKey","getSSOTokenFromFile","e","accessToken","expiresAt","existingToken","setTime","newSsoOidcToken","expiresIn","newTokenExpiration","toISOString","error","SHOULD_FAIL_CREDENTIAL_CHAIN","resolveSSOCredentials","ssoStartUrl","ssoAccountId","ssoRoleName","ssoClient","refreshMessage","_token","getSsoTokenProvider","CredentialsProviderError","message","tryNextLink","SSOClient","GetRoleCredentialsCommand","sso","ssoResp","accountId","roleName","roleCredentials","accessKeyId","secretAccessKey","sessionToken","credentialScope","credentials","setCredentialFeature","validateSsoProfile","keys","join","fromSSO","session","conflictMsg"],"mappings":";;;;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMA,YAAAA,2BAAgBC,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIC,aAAAA,KAAkB,QAAA,IAC1B,OAAOD,GAAAA,CAAIE,cAAAA,KAAmB,YAC9B,OAAOF,GAAAA,CAAIG,WAAAA,KAAgB,QAAA,IAC3B,OAAOH,GAAAA,CAAII,eAAe,QAAA,IAC1B,OAAOJ,GAAAA,CAAIK,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA;;;ACA5B,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMC,gBAAAA,GAAmB,IAAI,EAAA,GAAK,GAAA;AAClC,IAAMC,eAAAA,GAAkB,CAAA,+EAAA,CAAA;;;ACD/B,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMC,gBAAAA,mBAAmB,MAAA,CAAA,OAAOC,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACvD,EAAA,MAAM,EAAEC,aAAAA,EAAa,GAAK,MAAM,OAAO,eAAA,CAAA;AACvC,EAAA,MAAMC,aAAAA,GAAgB,IAAID,aAAAA,CAAcE,MAAAA,CAAOC,MAAAA,CAAO,EAAC,EAAGJ,IAAAA,CAAKK,YAAAA,IAAgB,EAAC,EAAG;IAC/EC,MAAAA,EAAQP,SAAAA,IAAaC,KAAKK,YAAAA,EAAcC,MAAAA;AACxCC,IAAAA,MAAAA,EAAQP,IAAAA,CAAKK,YAAAA,EAAcE,MAAAA,IAAUP,IAAAA,CAAKQ,kBAAAA,EAAoBD;AAClE,GAAA,CAAA,CAAA;AACA,EAAA,OAAOL,aAAAA;AACX,CAAA,EAPgC,kBAAA,CAAA;;;ADCzB,IAAMO,qCAAqB,MAAA,CAAA,OAAOC,QAAAA,EAAUX,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACnE,EAAA,MAAM,EAAEW,kBAAAA,EAAkB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC5C,EAAA,MAAMT,aAAAA,GAAgB,MAAMJ,gBAAAA,CAAiBC,SAAAA,EAAWC,IAAAA,CAAAA;AACxD,EAAA,OAAOE,aAAAA,CAAcU,IAAAA,CAAK,IAAID,kBAAAA,CAAmB;AAC7CE,IAAAA,QAAAA,EAAUH,QAAAA,CAASG,QAAAA;AACnBC,IAAAA,YAAAA,EAAcJ,QAAAA,CAASI,YAAAA;AACvBC,IAAAA,YAAAA,EAAcL,QAAAA,CAASK,YAAAA;IACvBC,SAAAA,EAAW;AACf,GAAA,CAAA,CAAA;AACJ,CAAA,EATkC,oBAAA,CAAA;;;AEDlC,cAAA,EAAA;AAEO,IAAMC,mBAAAA,2BAAuBC,KAAAA,KAAAA;AAChC,EAAA,IAAIA,KAAAA,CAAMC,cAAcD,KAAAA,CAAMC,UAAAA,CAAWC,SAAO,GAAKC,IAAAA,CAAKC,KAAG,EAAI;AAC7D,IAAA,MAAM,IAAIC,kBAAAA,CAAmB,CAAA,kBAAA,EAAqB1B,eAAAA,IAAmB,KAAA,CAAA;AACzE,EAAA;AACJ,CAAA,EAJmC,qBAAA,CAAA;;;ACFnC,cAAA,EAAA;AAEO,IAAM2B,gBAAAA,mBAAmB,MAAA,CAAA,CAACC,GAAAA,EAAKC,KAAAA,EAAOC,aAAa,KAAA,KAAK;AAC3D,EAAA,IAAI,OAAOD,UAAU,WAAA,EAAa;AAC9B,IAAA,MAAM,IAAIH,kBAAAA,CAAmB,CAAA,uBAAA,EAA0BE,GAAAA,CAAAA,cAAAA,EAAoBE,UAAAA,GAAa,kBAAA,GAAqB,EAAA,CAAA,EAAA,EAAO9B,eAAAA,CAAAA,CAAAA,EAAmB,KAAA,CAAA;AAC3I,EAAA;AACJ,CAAA,EAJgC,kBAAA,CAAA;;;ACFhC,cAAA,EAAA;AAEA,IAAM,EAAE+B,WAAS,GAAKC,QAAAA;AACf,IAAMC,mBAAAA,mBAAsB,MAAA,CAAA,CAACC,EAAAA,EAAIrB,QAAAA,KAAAA;AACpC,EAAA,MAAMsB,aAAAA,GAAgBC,oBAAoBF,EAAAA,CAAAA;AAC1C,EAAA,MAAMG,WAAAA,GAAcC,IAAAA,CAAKC,SAAAA,CAAU1B,QAAAA,EAAU,MAAM,CAAA,CAAA;AACnD,EAAA,OAAOkB,SAAAA,CAAUI,eAAeE,WAAAA,CAAAA;AACpC,CAAA,EAJmC,qBAAA,CAAA;;;ANInC,IAAMG,sBAAAA,mBAAyB,IAAIhB,IAAAA,CAAK,CAAA,CAAA;AACjC,IAAMiB,OAAAA,mBAAU,MAAA,CAAA,CAACC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMxC,IAAAA,GAAO;IACT,GAAGuC,KAAAA;IACH/B,kBAAAA,EAAoB;MAChB,GAAGgC,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM/B;AACb;AACJ,GAAA;AACAR,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,oCAAA,CAAA;AACnB,EAAA,MAAMC,QAAAA,GAAW,MAAMC,eAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,EAAA,MAAM4C,cAAcC,cAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,MAAMA,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,EAAA,IAAI,CAACE,OAAAA,EAAS;AACV,IAAA,MAAM,IAAIvB,kBAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,oDAA+D,KAAA,CAAA;EAC5G,CAAA,MAAA,IACS,CAACE,OAAAA,CAAQ,aAAA,CAAA,EAAgB;AAC9B,IAAA,MAAM,IAAIvB,kBAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACvG,EAAA;AACA,EAAA,MAAMG,cAAAA,GAAiBD,QAAQ,aAAA,CAAA;AAC/B,EAAA,MAAME,WAAAA,GAAc,MAAMC,kBAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,EAAA,MAAMkD,UAAAA,GAAaF,YAAYD,cAAAA,CAAAA;AAC/B,EAAA,IAAI,CAACG,UAAAA,EAAY;AACb,IAAA,MAAM,IAAI3B,kBAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,oDAAkE,KAAA,CAAA;AACnH,EAAA;AACA,EAAA,KAAA,MAAWI,qBAAAA,IAAyB;AAAC,IAAA,eAAA;AAAiB,IAAA;AAAe,GAAA,EAAA;AACjE,IAAA,IAAI,CAACD,UAAAA,CAAWC,qBAAAA,CAAAA,EAAwB;AACpC,MAAA,MAAM,IAAI5B,kBAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,CAAAA,gCAAAA,EAAiDI,qBAAAA,MAA2B,KAAA,CAAA;AAC7H,IAAA;AACJ,EAAA;AACA,EAAoBD,WAAW,eAAA;AAC/B,EAAA,MAAMnD,SAAAA,GAAYmD,WAAW,YAAA,CAAA;AAC7B,EAAA,IAAIxC,QAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,QAAAA,GAAW,MAAM0C,oBAAoBL,cAAAA,CAAAA;AACzC,EAAA,CAAA,CAAA,OACOM,CAAAA,EAAG;AACN,IAAA,MAAM,IAAI9B,kBAAAA,CAAmB,CAAA,8CAAA,EAAiDqB,WAAAA,CAAAA,8BAAAA,EAA4C/C,eAAAA,IAAmB,KAAA,CAAA;AACjJ,EAAA;AACA2B,EAAAA,gBAAAA,CAAiB,aAAA,EAAed,SAAS4C,WAAW,CAAA;AACpD9B,EAAAA,gBAAAA,CAAiB,WAAA,EAAad,SAAS6C,SAAS,CAAA;AAChD,EAAA,MAAM,EAAED,WAAAA,EAAaC,SAAAA,EAAS,GAAK7C,QAAAA;AACnC,EAAA,MAAM8C,aAAAA,GAAgB;IAAEtC,KAAAA,EAAOoC,WAAAA;IAAanC,UAAAA,EAAY,IAAIE,KAAKkC,SAAAA;AAAW,GAAA;AAC5E,EAAA,IAAIC,cAAcrC,UAAAA,CAAWC,OAAAA,KAAYC,IAAAA,CAAKC,GAAAA,KAAQ1B,gBAAAA,EAAkB;AACpE,IAAA,OAAO4D,aAAAA;AACX,EAAA;AACA,EAAA,IAAInC,KAAKC,GAAAA,EAAG,GAAKe,uBAAuBjB,OAAAA,EAAO,GAAK,KAAK,GAAA,EAAM;AAC3DH,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACAhC,EAAAA,gBAAAA,CAAiB,UAAA,EAAYd,QAAAA,CAASG,QAAAA,EAAU,IAAA,CAAA;AAChDW,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASI,YAAAA,EAAc,IAAA,CAAA;AACxDU,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASK,YAAAA,EAAc,IAAA,CAAA;AACxD,EAAA,IAAI;AACAsB,IAAAA,sBAAAA,CAAuBoB,OAAAA,CAAQpC,IAAAA,CAAKC,GAAAA,EAAG,CAAA;AACvC,IAAA,MAAMoC,eAAAA,GAAkB,MAAMjD,kBAAAA,CAAmBC,QAAAA,EAAUX,WAAWC,IAAAA,CAAAA;AACtEwB,IAAAA,gBAAAA,CAAiB,aAAA,EAAekC,gBAAgBJ,WAAW,CAAA;AAC3D9B,IAAAA,gBAAAA,CAAiB,WAAA,EAAakC,gBAAgBC,SAAS,CAAA;AACvD,IAAA,MAAMC,kBAAAA,GAAqB,IAAIvC,IAAAA,CAAKA,IAAAA,CAAKC,KAAG,GAAKoC,eAAAA,CAAgBC,YAAY,GAAA,CAAA;AAC7E,IAAA,IAAI;AACA,MAAA,MAAM7B,oBAAoBiB,cAAAA,EAAgB;QACtC,GAAGrC,QAAAA;AACH4C,QAAAA,WAAAA,EAAaI,eAAAA,CAAgBJ,WAAAA;AAC7BC,QAAAA,SAAAA,EAAWK,mBAAmBC,WAAAA,EAAW;AACzC9C,QAAAA,YAAAA,EAAc2C,eAAAA,CAAgB3C;OAClC,CAAA;AACJ,IAAA,CAAA,CAAA,OACO+C,KAAAA,EAAO;AACd,IAAA;AACA,IAAA,OAAO;AACH5C,MAAAA,KAAAA,EAAOwC,eAAAA,CAAgBJ,WAAAA;MACvBnC,UAAAA,EAAYyC;AAChB,KAAA;AACJ,EAAA,CAAA,CAAA,OACOE,KAAAA,EAAO;AACV7C,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACJ,CAAA,EA/EuB,SAAA,CAAA;;;ADJvB,IAAMO,4BAAAA,GAA+B,KAAA;AAC9B,IAAMC,qBAAAA,mBAAwB,MAAA,CAAA,OAAO,EAAEC,WAAAA,EAAaf,UAAAA,EAAYgB,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAaC,SAAAA,EAAW/D,YAAAA,EAAcG,kBAAAA,EAAoBsC,OAAAA,EAASvC,QAAM,KAAG;AACxK,EAAA,IAAIW,KAAAA;AACJ,EAAA,MAAMmD,cAAAA,GAAiB,CAAA,6EAAA,CAAA;AACvB,EAAA,IAAInB,UAAAA,EAAY;AACZ,IAAA,IAAI;AACA,MAAA,MAAMoB,MAAAA,GAAS,MAAMC,OAAAA,CAAoB;AAAEzB,QAAAA;AAAQ,OAAA,CAAA,EAAA;AACnD5B,MAAAA,KAAAA,GAAQ;AACJoC,QAAAA,WAAAA,EAAagB,MAAAA,CAAOpD,KAAAA;AACpBqC,QAAAA,SAAAA,EAAW,IAAIlC,IAAAA,CAAKiD,MAAAA,CAAOnD,UAAU,EAAE0C,WAAAA;AAC3C,OAAA;AACJ,IAAA,CAAA,CAAA,OACOR,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,wBAAAA,CAAyBnB,CAAAA,CAAEoB,OAAAA,EAAS;QAC1CC,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;EACJ,CAAA,MACK;AACD,IAAA,IAAI;AACAW,MAAAA,KAAAA,GAAQ,MAAMkC,oBAAoBa,WAAAA,CAAAA;AACtC,IAAA,CAAA,CAAA,OACOZ,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,wBAAAA,CAAyB,CAAA,yDAAA,EAA4DH,cAAAA,CAAAA,CAAAA,EAAkB;QAC7GK,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;AACJ,EAAA;AACA,EAAA,IAAI,IAAIc,IAAAA,CAAKH,KAAAA,CAAMqC,SAAS,CAAA,CAAEnC,SAAO,GAAKC,IAAAA,CAAKC,GAAAA,EAAG,IAAM,CAAA,EAAG;AACvD,IAAA,MAAM,IAAIkD,wBAAAA,CAAyB,CAAA,0DAAA,EAA6DH,cAAAA,CAAAA,CAAAA,EAAkB;MAC9GK,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE+C,aAAW,GAAKpC,KAAAA;AACxB,EAAA,MAAM,EAAEyD,SAAAA,EAAWC,yBAAAA,EAAyB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9D,EAAA,MAAMC,GAAAA,GAAMT,SAAAA,IACR,IAAIO,SAAAA,CAAUxE,MAAAA,CAAOC,OAAO,EAAC,EAAGC,YAAAA,IAAgB,EAAC,EAAG;IAChDE,MAAAA,EAAQF,YAAAA,EAAcE,UAAUC,kBAAAA,EAAoBD,MAAAA;AACpDD,IAAAA,MAAAA,EAAQD,cAAcC,MAAAA,IAAUP;AACpC,GAAA,CAAA,CAAA;AACJ,EAAA,IAAI+E,OAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,OAAAA,GAAU,MAAMD,GAAAA,CAAIjE,IAAAA,CAAK,IAAIgE,yBAAAA,CAA0B;MACnDG,SAAAA,EAAWb,YAAAA;MACXc,QAAAA,EAAUb,WAAAA;AACVb,MAAAA;AACJ,KAAA,CAAA,CAAA;AACJ,EAAA,CAAA,CAAA,OACOD,CAAAA,EAAG;AACN,IAAA,MAAM,IAAImB,yBAAyBnB,CAAAA,EAAG;MAClCqB,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE0E,eAAAA,EAAiB,EAAEC,WAAAA,EAAaC,eAAAA,EAAiBC,YAAAA,EAAcjE,UAAAA,EAAYkE,eAAAA,EAAiBN,SAAAA,EAAS,GAAK,EAAC,EAAC,GAAMD,OAAAA;AAC1H,EAAA,IAAI,CAACI,WAAAA,IAAe,CAACC,mBAAmB,CAACC,YAAAA,IAAgB,CAACjE,UAAAA,EAAY;AAClE,IAAA,MAAM,IAAIqD,yBAAyB,8CAAA,EAAgD;MAC/EE,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM+E,WAAAA,GAAc;AAChBJ,IAAAA,WAAAA;AACAC,IAAAA,eAAAA;AACAC,IAAAA,YAAAA;IACAjE,UAAAA,EAAY,IAAIE,KAAKF,UAAAA,CAAAA;AACrB,IAAA,GAAIkE,eAAAA,IAAmB;AAAEA,MAAAA;AAAgB,KAAA;AACzC,IAAA,GAAIN,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACA,EAAA,IAAI7B,UAAAA,EAAY;AACZqC,IAAAA,oBAAAA,CAAqBD,WAAAA,EAAa,mBAAmB,GAAA,CAAA;EACzD,CAAA,MACK;AACDC,IAAAA,oBAAAA,CAAqBD,WAAAA,EAAa,0BAA0B,GAAA,CAAA;AAChE,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EA9EqC,uBAAA,CAAA;;;AQLrC,cAAA,EAAA;AACO,IAAME,kBAAAA,mBAAqB,MAAA,CAAA,CAAC1C,OAAAA,EAASvC,MAAAA,KAAAA;AACxC,EAAA,MAAM,EAAEhB,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,eAAa,GAAKmD,OAAAA;AACrE,EAAA,IAAI,CAACvD,aAAAA,IAAiB,CAACC,kBAAkB,CAACE,UAAAA,IAAc,CAACC,aAAAA,EAAe;AACpE,IAAA,MAAM,IAAI6E,yBAAyB,CAAA,8IAAA,EACwBrE,MAAAA,CAAOsF,KAAK3C,OAAAA,CAAAA,CAAS4C,IAAAA,CAAK,IAAA,CAAA;AAA6F,kFAAA,CAAA,EAAA;MAAEhB,WAAAA,EAAa,KAAA;AAAOnE,MAAAA;KAAO,CAAA;AACnN,EAAA;AACA,EAAA,OAAOuC,OAAAA;AACX,CAAA,EAPkC,oBAAA;;;AVI3B,IAAM6C,OAAAA,mBAAU,MAAA,CAAA,CAAC3F,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEwC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACpExC,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM,EAAEwB,WAAAA,EAAaC,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAajB,YAAU,GAAKlD,IAAAA;AAC1E,EAAA,MAAM,EAAEoE,WAAS,GAAKpE,IAAAA;AACtB,EAAA,MAAM4C,cAAcC,cAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,IAAI,CAACmB,eAAe,CAACC,YAAAA,IAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,IAAe,CAACjB,UAAAA,EAAY;AAC5E,IAAA,MAAMR,QAAAA,GAAW,MAAMC,eAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,IAAA,MAAM8C,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,IAAA,IAAI,CAACE,OAAAA,EAAS;AACV,MAAA,MAAM,IAAI0B,wBAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,eAAAA,CAAAA,EAA8B;AAAErC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OAAO,CAAA;AACtG,IAAA;AACA,IAAA,IAAI,CAAClB,YAAAA,CAAayD,OAAAA,CAAAA,EAAU;AACxB,MAAA,MAAM,IAAI0B,wBAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,wCAAAA,CAAAA,EAAuD;AACjGrC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OACjB,CAAA;AACJ,IAAA;AACA,IAAA,IAAIuC,SAASrD,WAAAA,EAAa;AACtB,MAAA,MAAMuD,WAAAA,GAAc,MAAMC,kBAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,MAAA,MAAM4F,OAAAA,GAAU5C,WAAAA,CAAYF,OAAAA,CAAQrD,WAAW,CAAA;AAC/C,MAAA,MAAMoG,WAAAA,GAAc,CAAA,2BAAA,EAA8BjD,WAAAA,CAAAA,iBAAAA,EAA+BE,QAAQrD,WAAW,CAAA,CAAA;AACpG,MAAA,IAAIM,SAAAA,IAAaA,SAAAA,KAAc6F,OAAAA,CAAQlG,UAAAA,EAAY;AAC/C,QAAA,MAAM,IAAI8E,wBAAAA,CAAyB,CAAA,sBAAA,CAAA,GAA2BqB,WAAAA,EAAa;UACvEnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACA,MAAA,IAAI0D,WAAAA,IAAeA,WAAAA,KAAgB2B,OAAAA,CAAQrG,aAAAA,EAAe;AACtD,QAAA,MAAM,IAAIiF,wBAAAA,CAAyB,CAAA,yBAAA,CAAA,GAA8BqB,WAAAA,EAAa;UAC1EnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACAuC,MAAAA,OAAAA,CAAQpD,aAAakG,OAAAA,CAAQlG,UAAAA;AAC7BoD,MAAAA,OAAAA,CAAQvD,gBAAgBqG,OAAAA,CAAQrG,aAAAA;AACpC,IAAA;AACA,IAAA,MAAM,EAAEA,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,aAAAA,EAAeF,aAAW,GAAK+F,kBAAAA,CAAmB1C,OAAAA,EAAS9C,IAAAA,CAAKO,MAAM,CAAA;AACzH,IAAA,OAAOyD,qBAAAA,CAAsB;MACzBC,WAAAA,EAAa1E,aAAAA;MACb2D,UAAAA,EAAYzD,WAAAA;MACZyE,YAAAA,EAAc1E,cAAAA;MACdO,SAAAA,EAAWL,UAAAA;MACXyE,WAAAA,EAAaxE,aAAAA;AACbyE,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA,CAAA,MAAA,IACS,CAACqB,WAAAA,IAAe,CAACC,gBAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,EAAa;AAClE,IAAA,MAAM,IAAIK,yBAAyB,8HAAA,EAC8B;MAAEE,WAAAA,EAAa,KAAA;AAAOnE,MAAAA,MAAAA,EAAQP,IAAAA,CAAKO;KAAO,CAAA;EAC/G,CAAA,MACK;AACD,IAAA,OAAOyD,qBAAAA,CAAsB;AACzBC,MAAAA,WAAAA;AACAf,MAAAA,UAAAA;AACAgB,MAAAA,YAAAA;AACAnE,MAAAA,SAAAA;AACAoE,MAAAA,WAAAA;AACAC,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA;AACJ,CAAA,EAnEuB,SAAA;;;AWLvB,cAAA,EAAA","file":"4LRYG53T.js","sourcesContent":["export * from \"./fromSSO\";\nexport * from \"./isSsoProfile\";\nexport * from \"./types\";\nexport * from \"./validateSsoProfile\";\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, loadSsoSessionData, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { isSsoProfile } from \"./isSsoProfile\";\nimport { resolveSSOCredentials } from \"./resolveSSOCredentials\";\nimport { validateSsoProfile } from \"./validateSsoProfile\";\nexport const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-sso - fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n const { ssoClient } = init;\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n const profiles = await parseKnownFiles(init);\n const profile = profiles[profileName];\n if (!profile) {\n throw new CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });\n }\n if (!isSsoProfile(profile)) {\n throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {\n logger: init.logger,\n });\n }\n if (profile?.sso_session) {\n const ssoSessions = await loadSsoSessionData(init);\n const session = ssoSessions[profile.sso_session];\n const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;\n if (ssoRegion && ssoRegion !== session.sso_region) {\n throw new CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {\n throw new CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n profile.sso_region = session.sso_region;\n profile.sso_start_url = session.sso_start_url;\n }\n const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);\n return resolveSSOCredentials({\n ssoStartUrl: sso_start_url,\n ssoSession: sso_session,\n ssoAccountId: sso_account_id,\n ssoRegion: sso_region,\n ssoRoleName: sso_role_name,\n ssoClient: ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n throw new CredentialsProviderError(\"Incomplete configuration. The fromSSO() argument hash must include \" +\n '\"ssoStartUrl\", \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"', { tryNextLink: false, logger: init.logger });\n }\n else {\n return resolveSSOCredentials({\n ssoStartUrl,\n ssoSession,\n ssoAccountId,\n ssoRegion,\n ssoRoleName,\n ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n};\n","export const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { fromSso as getSsoTokenProvider } from \"@aws-sdk/token-providers\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getSSOTokenFromFile } from \"@smithy/shared-ini-file-loader\";\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\nexport const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }) => {\n let token;\n const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;\n if (ssoSession) {\n try {\n const _token = await getSsoTokenProvider({ profile })();\n token = {\n accessToken: _token.token,\n expiresAt: new Date(_token.expiration).toISOString(),\n };\n }\n catch (e) {\n throw new CredentialsProviderError(e.message, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n else {\n try {\n token = await getSSOTokenFromFile(ssoStartUrl);\n }\n catch (e) {\n throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {\n throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { accessToken } = token;\n const { SSOClient, GetRoleCredentialsCommand } = await import(\"./loadSso\");\n const sso = ssoClient ||\n new SSOClient(Object.assign({}, clientConfig ?? {}, {\n logger: clientConfig?.logger ?? parentClientConfig?.logger,\n region: clientConfig?.region ?? ssoRegion,\n }));\n let ssoResp;\n try {\n ssoResp = await sso.send(new GetRoleCredentialsCommand({\n accountId: ssoAccountId,\n roleName: ssoRoleName,\n accessToken,\n }));\n }\n catch (e) {\n throw new CredentialsProviderError(e, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;\n if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const credentials = {\n accessKeyId,\n secretAccessKey,\n sessionToken,\n expiration: new Date(expiration),\n ...(credentialScope && { credentialScope }),\n ...(accountId && { accountId }),\n };\n if (ssoSession) {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO\", \"s\");\n }\n else {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO_LEGACY\", \"u\");\n }\n return credentials;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, getSSOTokenFromFile, loadSsoSessionData, parseKnownFiles, } from \"@smithy/shared-ini-file-loader\";\nimport { EXPIRE_WINDOW_MS, REFRESH_MESSAGE } from \"./constants\";\nimport { getNewSsoOidcToken } from \"./getNewSsoOidcToken\";\nimport { validateTokenExpiry } from \"./validateTokenExpiry\";\nimport { validateTokenKey } from \"./validateTokenKey\";\nimport { writeSSOTokenToFile } from \"./writeSSOTokenToFile\";\nconst lastRefreshAttemptTime = new Date(0);\nexport const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/token-providers - fromSso\");\n const profiles = await parseKnownFiles(init);\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n const profile = profiles[profileName];\n if (!profile) {\n throw new TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);\n }\n else if (!profile[\"sso_session\"]) {\n throw new TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);\n }\n const ssoSessionName = profile[\"sso_session\"];\n const ssoSessions = await loadSsoSessionData(init);\n const ssoSession = ssoSessions[ssoSessionName];\n if (!ssoSession) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);\n }\n for (const ssoSessionRequiredKey of [\"sso_start_url\", \"sso_region\"]) {\n if (!ssoSession[ssoSessionRequiredKey]) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);\n }\n }\n const ssoStartUrl = ssoSession[\"sso_start_url\"];\n const ssoRegion = ssoSession[\"sso_region\"];\n let ssoToken;\n try {\n ssoToken = await getSSOTokenFromFile(ssoSessionName);\n }\n catch (e) {\n throw new TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`, false);\n }\n validateTokenKey(\"accessToken\", ssoToken.accessToken);\n validateTokenKey(\"expiresAt\", ssoToken.expiresAt);\n const { accessToken, expiresAt } = ssoToken;\n const existingToken = { token: accessToken, expiration: new Date(expiresAt) };\n if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {\n return existingToken;\n }\n if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1000) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n validateTokenKey(\"clientId\", ssoToken.clientId, true);\n validateTokenKey(\"clientSecret\", ssoToken.clientSecret, true);\n validateTokenKey(\"refreshToken\", ssoToken.refreshToken, true);\n try {\n lastRefreshAttemptTime.setTime(Date.now());\n const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);\n validateTokenKey(\"accessToken\", newSsoOidcToken.accessToken);\n validateTokenKey(\"expiresIn\", newSsoOidcToken.expiresIn);\n const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);\n try {\n await writeSSOTokenToFile(ssoSessionName, {\n ...ssoToken,\n accessToken: newSsoOidcToken.accessToken,\n expiresAt: newTokenExpiration.toISOString(),\n refreshToken: newSsoOidcToken.refreshToken,\n });\n }\n catch (error) {\n }\n return {\n token: newSsoOidcToken.accessToken,\n expiration: newTokenExpiration,\n };\n }\n catch (error) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n};\n","export const EXPIRE_WINDOW_MS = 5 * 60 * 1000;\nexport const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;\n","import { getSsoOidcClient } from \"./getSsoOidcClient\";\nexport const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {\n const { CreateTokenCommand } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);\n return ssoOidcClient.send(new CreateTokenCommand({\n clientId: ssoToken.clientId,\n clientSecret: ssoToken.clientSecret,\n refreshToken: ssoToken.refreshToken,\n grantType: \"refresh_token\",\n }));\n};\n","export const getSsoOidcClient = async (ssoRegion, init = {}) => {\n const { SSOOIDCClient } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {\n region: ssoRegion ?? init.clientConfig?.region,\n logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger,\n }));\n return ssoOidcClient;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenExpiry = (token) => {\n if (token.expiration && token.expiration.getTime() < Date.now()) {\n throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenKey = (key, value, forRefresh = false) => {\n if (typeof value === \"undefined\") {\n throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? \". Cannot refresh\" : \"\"}. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { getSSOTokenFilepath } from \"@smithy/shared-ini-file-loader\";\nimport { promises as fsPromises } from \"fs\";\nconst { writeFile } = fsPromises;\nexport const writeSSOTokenToFile = (id, ssoToken) => {\n const tokenFilepath = getSSOTokenFilepath(id);\n const tokenString = JSON.stringify(ssoToken, null, 2);\n return writeFile(tokenFilepath, tokenString);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nexport const validateSsoProfile = (profile, logger) => {\n const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", ` +\n `\"sso_region\", \"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\", \")}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });\n }\n return profile;\n};\n","export {};\n"]}
@@ -0,0 +1,45 @@
1
+ var __create = Object.create;
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __getProtoOf = Object.getPrototypeOf;
6
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
7
+ var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
8
+ var __require = /* @__PURE__ */ ((x) => typeof require !== "undefined" ? require : typeof Proxy !== "undefined" ? new Proxy(x, {
9
+ get: (a, b) => (typeof require !== "undefined" ? require : a)[b]
10
+ }) : x)(function(x) {
11
+ if (typeof require !== "undefined") return require.apply(this, arguments);
12
+ throw Error('Dynamic require of "' + x + '" is not supported');
13
+ });
14
+ var __esm = (fn, res) => function __init() {
15
+ return fn && (res = (0, fn[__getOwnPropNames(fn)[0]])(fn = 0)), res;
16
+ };
17
+ var __commonJS = (cb, mod) => function __require2() {
18
+ return mod || (0, cb[__getOwnPropNames(cb)[0]])((mod = { exports: {} }).exports, mod), mod.exports;
19
+ };
20
+ var __copyProps = (to, from, except, desc) => {
21
+ if (from && typeof from === "object" || typeof from === "function") {
22
+ for (let key of __getOwnPropNames(from))
23
+ if (!__hasOwnProp.call(to, key) && key !== except)
24
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
25
+ }
26
+ return to;
27
+ };
28
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
29
+ // If the importer is in node compatibility mode or this is not an ESM
30
+ // file that has been converted to a CommonJS file using a Babel-
31
+ // compatible transform (i.e. "__esModule" has not been set), then set
32
+ // "default" to the CommonJS "module.exports" for node compatibility.
33
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
34
+ mod
35
+ ));
36
+
37
+ // ../../node_modules/.pnpm/tsup@8.4.0_@swc+core@1.12.5_@swc+helpers@0.5.17__postcss@8.5.3_tsx@4.20.4_typescript@5.8.2_yaml@2.8.0/node_modules/tsup/assets/esm_shims.js
38
+ var init_esm_shims = __esm({
39
+ "../../node_modules/.pnpm/tsup@8.4.0_@swc+core@1.12.5_@swc+helpers@0.5.17__postcss@8.5.3_tsx@4.20.4_typescript@5.8.2_yaml@2.8.0/node_modules/tsup/assets/esm_shims.js"() {
40
+ }
41
+ });
42
+
43
+ export { __commonJS, __name, __require, __toESM, init_esm_shims };
44
+ //# sourceMappingURL=4RNWLMHM.js.map
45
+ //# sourceMappingURL=4RNWLMHM.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/tsup@8.4.0_@swc+core@1.12.5_@swc+helpers@0.5.17__postcss@8.5.3_tsx@4.20.4_typescript@5.8.2_yaml@2.8.0/node_modules/tsup/assets/esm_shims.js"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,IAAA,cAAA,GAAA,KAAA,CAAA","file":"4RNWLMHM.js","sourcesContent":["// Shim globals in esm bundle\nimport { fileURLToPath } from 'url'\nimport path from 'path'\n\nconst getFilename = () => fileURLToPath(import.meta.url)\nconst getDirname = () => path.dirname(getFilename())\n\nexport const __dirname = /* @__PURE__ */ getDirname()\nexport const __filename = /* @__PURE__ */ getFilename()\n"]}