@layerzerolabs/vm-tooling 0.0.48 → 0.0.51
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{PGRNZALP.cjs → 2ASNEWIN.cjs} +668 -246
- package/dist/2ASNEWIN.cjs.map +1 -0
- package/dist/{OESMGGGL.js → 2FM75RYQ.js} +48 -16
- package/dist/2FM75RYQ.js.map +1 -0
- package/dist/{7SRULFYS.cjs → 2RWEJQEO.cjs} +12 -8
- package/dist/2RWEJQEO.cjs.map +1 -0
- package/dist/{BA2LAHMY.js → 3CLGGUZ6.js} +5 -3
- package/dist/3CLGGUZ6.js.map +1 -0
- package/dist/{DXKVHPTB.js → 43WEMDCI.js} +47 -60
- package/dist/43WEMDCI.js.map +1 -0
- package/dist/{RVTTXEXB.cjs → 4KPRGHDI.cjs} +64 -47
- package/dist/4KPRGHDI.cjs.map +1 -0
- package/dist/{WAGFMHUT.js → 4LRYG53T.js} +37 -10
- package/dist/4LRYG53T.js.map +1 -0
- package/dist/4RNWLMHM.js +45 -0
- package/dist/4RNWLMHM.js.map +1 -0
- package/dist/4RWETOR3.cjs +1332 -0
- package/dist/4RWETOR3.cjs.map +1 -0
- package/dist/{CQHBPXZ2.cjs → 4UZKQNSD.cjs} +26 -16
- package/dist/4UZKQNSD.cjs.map +1 -0
- package/dist/{BHBC6Q3Y.js → 5CI7X2D4.js} +9 -5
- package/dist/5CI7X2D4.js.map +1 -0
- package/dist/{QNKHVJNZ.js → 5OKX3IYN.js} +6 -4
- package/dist/5OKX3IYN.js.map +1 -0
- package/dist/{3EOFF6NK.cjs → 5RAWDGJY.cjs} +7 -5
- package/dist/5RAWDGJY.cjs.map +1 -0
- package/dist/{7PDYKZMF.cjs → 7ALZ3CAZ.cjs} +21 -19
- package/dist/7ALZ3CAZ.cjs.map +1 -0
- package/dist/7DH3URRX.js +6 -0
- package/dist/7DH3URRX.js.map +1 -0
- package/dist/{WDWUP4NU.cjs → 7F6M5VM7.cjs} +59 -71
- package/dist/7F6M5VM7.cjs.map +1 -0
- package/dist/{WBKUP4MX.js → 7G26DPK3.js} +17 -8
- package/dist/7G26DPK3.js.map +1 -0
- package/dist/7PP2QA5H.cjs +8 -0
- package/dist/7PP2QA5H.cjs.map +1 -0
- package/dist/AY3IP22W.cjs +39 -0
- package/dist/AY3IP22W.cjs.map +1 -0
- package/dist/{63H5FLN6.cjs → BVLAV47O.cjs} +11 -7
- package/dist/BVLAV47O.cjs.map +1 -0
- package/dist/{VDH76SF6.cjs → BXO3RC75.cjs} +19 -10
- package/dist/BXO3RC75.cjs.map +1 -0
- package/dist/{EQPMZDRH.js → CH3GQSOI.js} +13 -6
- package/dist/CH3GQSOI.js.map +1 -0
- package/dist/{RVOOJEDH.js → CNLWPLWD.js} +433 -11
- package/dist/CNLWPLWD.js.map +1 -0
- package/dist/DPDVRYLI.cjs +234 -0
- package/dist/DPDVRYLI.cjs.map +1 -0
- package/dist/{Z5NOJAAG.cjs → DW3OZE6F.cjs} +163 -133
- package/dist/DW3OZE6F.cjs.map +1 -0
- package/dist/{QWROCDWJ.cjs → EE3HP6UB.cjs} +76 -49
- package/dist/EE3HP6UB.cjs.map +1 -0
- package/dist/{EASTPCLB.js → ELFNCT57.js} +44 -4
- package/dist/ELFNCT57.js.map +1 -0
- package/dist/{RVM7QRW3.cjs → F5LIDCLG.cjs} +21 -20
- package/dist/F5LIDCLG.cjs.map +1 -0
- package/dist/{LBQPL6VK.cjs → FLI6L2YX.cjs} +8 -6
- package/dist/FLI6L2YX.cjs.map +1 -0
- package/dist/{LXXIBLJQ.js → GZ7KTF4Q.js} +4 -3
- package/dist/GZ7KTF4Q.js.map +1 -0
- package/dist/{L3BNN3KF.cjs → HHS2B7YE.cjs} +395 -175
- package/dist/HHS2B7YE.cjs.map +1 -0
- package/dist/{GAZMRBLT.js → HR64SZQX.js} +4 -3
- package/dist/HR64SZQX.js.map +1 -0
- package/dist/{OVH4V3F6.js → IE5H7TSX.js} +8 -4
- package/dist/IE5H7TSX.js.map +1 -0
- package/dist/{F5UPK5ZZ.js → IMNIF2OY.js} +225 -5
- package/dist/IMNIF2OY.js.map +1 -0
- package/dist/{XJWXQV6E.js → IVTNKY37.js} +30 -30
- package/dist/IVTNKY37.js.map +1 -0
- package/dist/{4NINFZK7.cjs → JJXZWB7K.cjs} +5 -4
- package/dist/JJXZWB7K.cjs.map +1 -0
- package/dist/{7LKSKL4C.cjs → L34TQNQN.cjs} +10 -9
- package/dist/L34TQNQN.cjs.map +1 -0
- package/dist/L3JULKNZ.js +6 -0
- package/dist/L3JULKNZ.js.map +1 -0
- package/dist/{33GUXAT7.js → LMCIXUBF.js} +16 -3
- package/dist/LMCIXUBF.js.map +1 -0
- package/dist/{YVV5I7A5.js → NDUVZQ7S.js} +4 -3
- package/dist/NDUVZQ7S.js.map +1 -0
- package/dist/{5MIIPWV7.cjs → NEQ3DTUV.cjs} +22 -9
- package/dist/NEQ3DTUV.cjs.map +1 -0
- package/dist/NSZHKDNY.cjs +82 -0
- package/dist/NSZHKDNY.cjs.map +1 -0
- package/dist/{JBULQDMK.js → NTYIDZH3.js} +54 -15
- package/dist/NTYIDZH3.js.map +1 -0
- package/dist/OAO7CCJW.js +6 -0
- package/dist/OAO7CCJW.js.map +1 -0
- package/dist/{L75NPWJX.cjs → OAYLBSRH.cjs} +64 -24
- package/dist/OAYLBSRH.cjs.map +1 -0
- package/dist/OH4A2VLX.js +232 -0
- package/dist/OH4A2VLX.js.map +1 -0
- package/dist/OOTZHKMN.cjs +8 -0
- package/dist/OOTZHKMN.cjs.map +1 -0
- package/dist/PDSRUQEX.js +78 -0
- package/dist/PDSRUQEX.js.map +1 -0
- package/dist/{QMIU5HY3.cjs → PYQO5EUZ.cjs} +34 -25
- package/dist/PYQO5EUZ.cjs.map +1 -0
- package/dist/{PXT4MQYT.cjs → Q4F544X2.cjs} +316 -252
- package/dist/Q4F544X2.cjs.map +1 -0
- package/dist/{OU33HN4T.js → QMXX45TO.js} +17 -7
- package/dist/QMXX45TO.js.map +1 -0
- package/dist/{KTOZRP5U.cjs → QO6IEDLG.cjs} +74 -45
- package/dist/QO6IEDLG.cjs.map +1 -0
- package/dist/{E75FXJNJ.js → RH2W4KPM.js} +36 -7
- package/dist/RH2W4KPM.js.map +1 -0
- package/dist/{PC55ZLZD.cjs → RRJYWXRS.cjs} +17 -10
- package/dist/RRJYWXRS.cjs.map +1 -0
- package/dist/{6FHMI4HI.cjs → SGF5U4QO.cjs} +48 -16
- package/dist/SGF5U4QO.cjs.map +1 -0
- package/dist/{IU7G43CF.cjs → SL653IYR.cjs} +45 -45
- package/dist/SL653IYR.cjs.map +1 -0
- package/dist/{OWJM6QQP.js → TO3FUAEA.js} +32 -15
- package/dist/TO3FUAEA.js.map +1 -0
- package/dist/{7EXYTS34.js → TTKDG2NN.js} +12 -3
- package/dist/TTKDG2NN.js.map +1 -0
- package/dist/{4XKJ5GJB.js → UL4OVG5P.js} +44 -14
- package/dist/UL4OVG5P.js.map +1 -0
- package/dist/{6A3MRQDI.js → VAAP26JC.js} +77 -13
- package/dist/VAAP26JC.js.map +1 -0
- package/dist/{THMQMWYA.cjs → VGCATKI5.cjs} +5 -4
- package/dist/VGCATKI5.cjs.map +1 -0
- package/dist/{CSNPKKTO.js → VLSIEZLM.js} +21 -5
- package/dist/VLSIEZLM.js.map +1 -0
- package/dist/VO65XOWD.cjs +54 -0
- package/dist/VO65XOWD.cjs.map +1 -0
- package/dist/{3BKFBGX3.cjs → VVTDADG7.cjs} +5 -4
- package/dist/VVTDADG7.cjs.map +1 -0
- package/dist/{6NLXVH5R.cjs → VYFY2754.cjs} +233 -194
- package/dist/VYFY2754.cjs.map +1 -0
- package/dist/{NMC54VEB.cjs → W7QMZBXR.cjs} +34 -18
- package/dist/W7QMZBXR.cjs.map +1 -0
- package/dist/XM743A75.js +1326 -0
- package/dist/XM743A75.js.map +1 -0
- package/dist/{RAIK357L.js → YIS2J6NC.js} +8 -4
- package/dist/YIS2J6NC.js.map +1 -0
- package/dist/{S3DLREDC.js → YU6A7BNZ.js} +7 -6
- package/dist/YU6A7BNZ.js.map +1 -0
- package/dist/{JY6PMFYV.js → YYBFDJRD.js} +5 -4
- package/dist/YYBFDJRD.js.map +1 -0
- package/dist/{3AX3IZXK.cjs → Z7BVBO5K.cjs} +12 -8
- package/dist/Z7BVBO5K.cjs.map +1 -0
- package/dist/{FYBVGT35.js → Z7OWTALH.js} +8 -6
- package/dist/Z7OWTALH.js.map +1 -0
- package/dist/config/index.cjs +8 -8
- package/dist/config/index.js +4 -4
- package/dist/config/tools.cjs +5 -5
- package/dist/config/tools.d.ts.map +1 -1
- package/dist/config/tools.js +4 -4
- package/dist/config/version-matrices.cjs +3 -3
- package/dist/config/version-matrices.d.ts.map +1 -1
- package/dist/config/version-matrices.js +2 -2
- package/dist/core/compatibility.cjs +3 -3
- package/dist/core/compatibility.js +2 -2
- package/dist/core/index.cjs +14 -13
- package/dist/core/index.js +9 -8
- package/dist/core/lock.cjs +21 -0
- package/dist/core/lock.cjs.map +1 -0
- package/dist/core/lock.d.ts +9 -0
- package/dist/core/lock.d.ts.map +1 -0
- package/dist/core/lock.js +4 -0
- package/dist/core/lock.js.map +1 -0
- package/dist/core/lock.test.cjs +18294 -0
- package/dist/core/lock.test.cjs.map +1 -0
- package/dist/core/lock.test.js +18292 -0
- package/dist/core/lock.test.js.map +1 -0
- package/dist/core/tool-executor.cjs +13 -8
- package/dist/core/tool-executor.d.ts +6 -1
- package/dist/core/tool-executor.d.ts.map +1 -1
- package/dist/core/tool-executor.js +8 -7
- package/dist/core/version-resolver.cjs +9 -9
- package/dist/core/version-resolver.js +6 -6
- package/dist/display/formatters.cjs +4 -4
- package/dist/display/formatters.d.ts +1 -1
- package/dist/display/formatters.d.ts.map +1 -1
- package/dist/display/formatters.js +2 -2
- package/dist/display/index.cjs +11 -11
- package/dist/display/index.js +7 -7
- package/dist/display/version-display.cjs +8 -8
- package/dist/display/version-display.js +6 -6
- package/dist/index.cjs +24 -21
- package/dist/index.cjs.map +1 -1
- package/dist/index.js +16 -13
- package/dist/index.js.map +1 -1
- package/dist/scripts/generate-github-matrix.cjs +325 -290
- package/dist/scripts/generate-github-matrix.cjs.map +1 -1
- package/dist/scripts/generate-github-matrix.js +67 -32
- package/dist/scripts/generate-github-matrix.js.map +1 -1
- package/dist/types/docker.cjs +3 -1
- package/dist/types/docker.cjs.map +1 -1
- package/dist/types/docker.d.ts +15 -6
- package/dist/types/docker.d.ts.map +1 -1
- package/dist/types/docker.js +3 -0
- package/dist/types/docker.js.map +1 -1
- package/dist/types/index.cjs +3 -1
- package/dist/types/index.cjs.map +1 -1
- package/dist/types/index.js +3 -0
- package/dist/types/index.js.map +1 -1
- package/dist/types/tool.cjs +3 -1
- package/dist/types/tool.cjs.map +1 -1
- package/dist/types/tool.d.ts +0 -4
- package/dist/types/tool.d.ts.map +1 -1
- package/dist/types/tool.js +3 -0
- package/dist/types/tool.js.map +1 -1
- package/dist/types/version.cjs +3 -1
- package/dist/types/version.cjs.map +1 -1
- package/dist/types/version.d.ts +1 -0
- package/dist/types/version.d.ts.map +1 -1
- package/dist/types/version.js +3 -0
- package/dist/types/version.js.map +1 -1
- package/dist/utils/finder-utils.cjs +11 -11
- package/dist/utils/finder-utils.js +4 -4
- package/dist/utils/index.cjs +17 -16
- package/dist/utils/index.cjs.map +1 -1
- package/dist/utils/index.js +7 -4
- package/dist/utils/index.js.map +1 -1
- package/dist/utils/version-utils.cjs +8 -8
- package/dist/utils/version-utils.js +4 -4
- package/dist/utils.cjs +4 -4
- package/dist/utils.js +2 -2
- package/package.json +7 -5
- package/dist/33GUXAT7.js.map +0 -1
- package/dist/3AX3IZXK.cjs.map +0 -1
- package/dist/3BKFBGX3.cjs.map +0 -1
- package/dist/3EOFF6NK.cjs.map +0 -1
- package/dist/4NINFZK7.cjs.map +0 -1
- package/dist/4XKJ5GJB.js.map +0 -1
- package/dist/5MIIPWV7.cjs.map +0 -1
- package/dist/5N3Q6FCT.cjs +0 -4
- package/dist/5N3Q6FCT.cjs.map +0 -1
- package/dist/63H5FLN6.cjs.map +0 -1
- package/dist/6A3MRQDI.js.map +0 -1
- package/dist/6FHMI4HI.cjs.map +0 -1
- package/dist/6NLXVH5R.cjs.map +0 -1
- package/dist/6UWCX7SA.js +0 -60
- package/dist/6UWCX7SA.js.map +0 -1
- package/dist/7EXYTS34.js.map +0 -1
- package/dist/7LKSKL4C.cjs.map +0 -1
- package/dist/7PDYKZMF.cjs.map +0 -1
- package/dist/7SRULFYS.cjs.map +0 -1
- package/dist/AH2UQL5E.js +0 -6
- package/dist/AH2UQL5E.js.map +0 -1
- package/dist/BA2LAHMY.js.map +0 -1
- package/dist/BHBC6Q3Y.js.map +0 -1
- package/dist/CQHBPXZ2.cjs.map +0 -1
- package/dist/CSNPKKTO.js.map +0 -1
- package/dist/DXKVHPTB.js.map +0 -1
- package/dist/E75FXJNJ.js.map +0 -1
- package/dist/EASTPCLB.js.map +0 -1
- package/dist/EKUFNO5X.js +0 -3
- package/dist/EKUFNO5X.js.map +0 -1
- package/dist/EQPMZDRH.js.map +0 -1
- package/dist/F5UPK5ZZ.js.map +0 -1
- package/dist/FYBVGT35.js.map +0 -1
- package/dist/GAZMRBLT.js.map +0 -1
- package/dist/IU7G43CF.cjs.map +0 -1
- package/dist/JBULQDMK.js.map +0 -1
- package/dist/JY6PMFYV.js.map +0 -1
- package/dist/KTOZRP5U.cjs.map +0 -1
- package/dist/L3BNN3KF.cjs.map +0 -1
- package/dist/L75NPWJX.cjs.map +0 -1
- package/dist/LBQPL6VK.cjs.map +0 -1
- package/dist/LXXIBLJQ.js.map +0 -1
- package/dist/MBTHP667.cjs +0 -39
- package/dist/MBTHP667.cjs.map +0 -1
- package/dist/NMC54VEB.cjs.map +0 -1
- package/dist/NX4KBEWA.cjs +0 -13
- package/dist/NX4KBEWA.cjs.map +0 -1
- package/dist/OESMGGGL.js.map +0 -1
- package/dist/OU33HN4T.js.map +0 -1
- package/dist/OVH4V3F6.js.map +0 -1
- package/dist/OWJM6QQP.js.map +0 -1
- package/dist/PC55ZLZD.cjs.map +0 -1
- package/dist/PGRNZALP.cjs.map +0 -1
- package/dist/PXT4MQYT.cjs.map +0 -1
- package/dist/QMIU5HY3.cjs.map +0 -1
- package/dist/QNKHVJNZ.js.map +0 -1
- package/dist/QWROCDWJ.cjs.map +0 -1
- package/dist/RAIK357L.js.map +0 -1
- package/dist/RLUL6JFM.cjs +0 -4
- package/dist/RLUL6JFM.cjs.map +0 -1
- package/dist/RVM7QRW3.cjs.map +0 -1
- package/dist/RVOOJEDH.js.map +0 -1
- package/dist/RVTTXEXB.cjs.map +0 -1
- package/dist/S3DLREDC.js.map +0 -1
- package/dist/THMQMWYA.cjs.map +0 -1
- package/dist/VDH76SF6.cjs.map +0 -1
- package/dist/VUOMXK5T.js +0 -6
- package/dist/VUOMXK5T.js.map +0 -1
- package/dist/WAGFMHUT.js.map +0 -1
- package/dist/WBKUP4MX.js.map +0 -1
- package/dist/WDWUP4NU.cjs.map +0 -1
- package/dist/XH4FQTBY.cjs +0 -62
- package/dist/XH4FQTBY.cjs.map +0 -1
- package/dist/XJWXQV6E.js.map +0 -1
- package/dist/YVV5I7A5.js.map +0 -1
- package/dist/Z5NOJAAG.cjs.map +0 -1
- package/dist/ZEW74YLA.js +0 -3
- package/dist/ZEW74YLA.js.map +0 -1
|
@@ -1,43 +1,56 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var
|
|
4
|
-
var
|
|
5
|
-
require('./
|
|
6
|
-
var
|
|
7
|
-
var
|
|
3
|
+
var OAYLBSRH_cjs = require('./OAYLBSRH.cjs');
|
|
4
|
+
var VVTDADG7_cjs = require('./VVTDADG7.cjs');
|
|
5
|
+
require('./DPDVRYLI.cjs');
|
|
6
|
+
var BXO3RC75_cjs = require('./BXO3RC75.cjs');
|
|
7
|
+
var VO65XOWD_cjs = require('./VO65XOWD.cjs');
|
|
8
|
+
|
|
9
|
+
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js
|
|
10
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
11
|
+
|
|
12
|
+
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
|
|
13
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
14
|
+
|
|
15
|
+
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
|
|
16
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
17
|
+
|
|
18
|
+
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
|
|
19
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
8
20
|
|
|
9
21
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
|
|
10
|
-
|
|
22
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
23
|
+
var resolveCredentialSource = /* @__PURE__ */ VO65XOWD_cjs.__name((credentialSource, profileName, logger) => {
|
|
11
24
|
const sourceProvidersMap = {
|
|
12
|
-
EcsContainer: /* @__PURE__ */
|
|
13
|
-
const { fromHttp } = await import('./
|
|
14
|
-
const { fromContainerMetadata } = await import('./
|
|
25
|
+
EcsContainer: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
|
|
26
|
+
const { fromHttp } = await import('./PYQO5EUZ.cjs');
|
|
27
|
+
const { fromContainerMetadata } = await import('./QO6IEDLG.cjs');
|
|
15
28
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
|
|
16
|
-
return async () =>
|
|
29
|
+
return async () => BXO3RC75_cjs.chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
|
|
17
30
|
}, "EcsContainer"),
|
|
18
|
-
Ec2InstanceMetadata: /* @__PURE__ */
|
|
31
|
+
Ec2InstanceMetadata: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
|
|
19
32
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
|
|
20
|
-
const { fromInstanceMetadata } = await import('./
|
|
33
|
+
const { fromInstanceMetadata } = await import('./QO6IEDLG.cjs');
|
|
21
34
|
return async () => fromInstanceMetadata(options)().then(setNamedProvider);
|
|
22
35
|
}, "Ec2InstanceMetadata"),
|
|
23
|
-
Environment: /* @__PURE__ */
|
|
36
|
+
Environment: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
|
|
24
37
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
|
|
25
|
-
const { fromEnv } = await import('./
|
|
38
|
+
const { fromEnv } = await import('./AY3IP22W.cjs');
|
|
26
39
|
return async () => fromEnv(options)().then(setNamedProvider);
|
|
27
40
|
}, "Environment")
|
|
28
41
|
};
|
|
29
42
|
if (credentialSource in sourceProvidersMap) {
|
|
30
43
|
return sourceProvidersMap[credentialSource];
|
|
31
44
|
} else {
|
|
32
|
-
throw new
|
|
45
|
+
throw new BXO3RC75_cjs.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, {
|
|
33
46
|
logger
|
|
34
47
|
});
|
|
35
48
|
}
|
|
36
49
|
}, "resolveCredentialSource");
|
|
37
|
-
var setNamedProvider = /* @__PURE__ */
|
|
50
|
+
var setNamedProvider = /* @__PURE__ */ VO65XOWD_cjs.__name((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p"), "setNamedProvider");
|
|
38
51
|
|
|
39
52
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
|
|
40
|
-
var isAssumeRoleProfile = /* @__PURE__ */
|
|
53
|
+
var isAssumeRoleProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile = "default", logger } = {}) => {
|
|
41
54
|
return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && [
|
|
42
55
|
"undefined",
|
|
43
56
|
"string"
|
|
@@ -55,26 +68,26 @@ var isAssumeRoleProfile = /* @__PURE__ */ NX4KBEWA_cjs.__name((arg, { profile =
|
|
|
55
68
|
logger
|
|
56
69
|
}));
|
|
57
70
|
}, "isAssumeRoleProfile");
|
|
58
|
-
var isAssumeRoleWithSourceProfile = /* @__PURE__ */
|
|
71
|
+
var isAssumeRoleWithSourceProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile, logger }) => {
|
|
59
72
|
const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
60
73
|
if (withSourceProfile) {
|
|
61
74
|
logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
|
|
62
75
|
}
|
|
63
76
|
return withSourceProfile;
|
|
64
77
|
}, "isAssumeRoleWithSourceProfile");
|
|
65
|
-
var isCredentialSourceProfile = /* @__PURE__ */
|
|
78
|
+
var isCredentialSourceProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile, logger }) => {
|
|
66
79
|
const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
67
80
|
if (withProviderProfile) {
|
|
68
81
|
logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
|
|
69
82
|
}
|
|
70
83
|
return withProviderProfile;
|
|
71
84
|
}, "isCredentialSourceProfile");
|
|
72
|
-
var resolveAssumeRoleCredentials = /* @__PURE__ */
|
|
85
|
+
var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
73
86
|
options.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");
|
|
74
87
|
const profileData = profiles[profileName];
|
|
75
88
|
const { source_profile, region } = profileData;
|
|
76
89
|
if (!options.roleAssumer) {
|
|
77
|
-
const { getDefaultRoleAssumer } = await import('./
|
|
90
|
+
const { getDefaultRoleAssumer } = await import('./Q4F544X2.cjs');
|
|
78
91
|
options.roleAssumer = getDefaultRoleAssumer({
|
|
79
92
|
...options.clientConfig,
|
|
80
93
|
credentialProviderLogger: options.logger,
|
|
@@ -85,7 +98,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (pr
|
|
|
85
98
|
}, options.clientPlugins);
|
|
86
99
|
}
|
|
87
100
|
if (source_profile && source_profile in visitedProfiles) {
|
|
88
|
-
throw new
|
|
101
|
+
throw new BXO3RC75_cjs.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${OAYLBSRH_cjs.getProfileName(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "), {
|
|
89
102
|
logger: options.logger
|
|
90
103
|
});
|
|
91
104
|
}
|
|
@@ -95,7 +108,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (pr
|
|
|
95
108
|
[source_profile]: true
|
|
96
109
|
}, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {})) : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();
|
|
97
110
|
if (isCredentialSourceWithoutRoleArn(profileData)) {
|
|
98
|
-
return sourceCredsProvider.then((creds) =>
|
|
111
|
+
return sourceCredsProvider.then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
|
|
99
112
|
} else {
|
|
100
113
|
const params = {
|
|
101
114
|
RoleArn: profileData.role_arn,
|
|
@@ -106,7 +119,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (pr
|
|
|
106
119
|
const { mfa_serial } = profileData;
|
|
107
120
|
if (mfa_serial) {
|
|
108
121
|
if (!options.mfaCodeProvider) {
|
|
109
|
-
throw new
|
|
122
|
+
throw new BXO3RC75_cjs.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, {
|
|
110
123
|
logger: options.logger,
|
|
111
124
|
tryNextLink: false
|
|
112
125
|
});
|
|
@@ -115,23 +128,25 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (pr
|
|
|
115
128
|
params.TokenCode = await options.mfaCodeProvider(mfa_serial);
|
|
116
129
|
}
|
|
117
130
|
const sourceCreds = await sourceCredsProvider;
|
|
118
|
-
return options.roleAssumer(sourceCreds, params).then((creds) =>
|
|
131
|
+
return options.roleAssumer(sourceCreds, params).then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
|
|
119
132
|
}
|
|
120
133
|
}, "resolveAssumeRoleCredentials");
|
|
121
|
-
var isCredentialSourceWithoutRoleArn = /* @__PURE__ */
|
|
134
|
+
var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ VO65XOWD_cjs.__name((section) => {
|
|
122
135
|
return !section.role_arn && !!section.credential_source;
|
|
123
136
|
}, "isCredentialSourceWithoutRoleArn");
|
|
124
137
|
|
|
125
138
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
|
|
126
|
-
|
|
127
|
-
var
|
|
139
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
140
|
+
var isProcessProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
|
|
141
|
+
var resolveProcessCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (options, profile) => import('./4UZKQNSD.cjs').then(({ fromProcess }) => fromProcess({
|
|
128
142
|
...options,
|
|
129
143
|
profile
|
|
130
|
-
})().then((creds) =>
|
|
144
|
+
})().then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
|
|
131
145
|
|
|
132
146
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
|
|
133
|
-
|
|
134
|
-
|
|
147
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
148
|
+
var resolveSsoCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, profileData, options = {}) => {
|
|
149
|
+
const { fromSSO } = await import('./EE3HP6UB.cjs');
|
|
135
150
|
return fromSSO({
|
|
136
151
|
profile,
|
|
137
152
|
logger: options.logger,
|
|
@@ -139,23 +154,24 @@ var resolveSsoCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profile,
|
|
|
139
154
|
clientConfig: options.clientConfig
|
|
140
155
|
})().then((creds) => {
|
|
141
156
|
if (profileData.sso_session) {
|
|
142
|
-
return
|
|
157
|
+
return VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO", "r");
|
|
143
158
|
} else {
|
|
144
|
-
return
|
|
159
|
+
return VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO_LEGACY", "t");
|
|
145
160
|
}
|
|
146
161
|
});
|
|
147
162
|
}, "resolveSsoCredentials");
|
|
148
|
-
var isSsoProfile = /* @__PURE__ */
|
|
163
|
+
var isSsoProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
|
|
149
164
|
|
|
150
165
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
|
|
151
|
-
|
|
166
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
167
|
+
var isStaticCredsProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && [
|
|
152
168
|
"undefined",
|
|
153
169
|
"string"
|
|
154
170
|
].indexOf(typeof arg.aws_session_token) > -1 && [
|
|
155
171
|
"undefined",
|
|
156
172
|
"string"
|
|
157
173
|
].indexOf(typeof arg.aws_account_id) > -1, "isStaticCredsProfile");
|
|
158
|
-
var resolveStaticCredentials = /* @__PURE__ */
|
|
174
|
+
var resolveStaticCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, options) => {
|
|
159
175
|
options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
|
|
160
176
|
const credentials = {
|
|
161
177
|
accessKeyId: profile.aws_access_key_id,
|
|
@@ -168,25 +184,26 @@ var resolveStaticCredentials = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profil
|
|
|
168
184
|
accountId: profile.aws_account_id
|
|
169
185
|
}
|
|
170
186
|
};
|
|
171
|
-
return
|
|
187
|
+
return VVTDADG7_cjs.setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
|
|
172
188
|
}, "resolveStaticCredentials");
|
|
173
189
|
|
|
174
190
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
|
|
175
|
-
|
|
191
|
+
VO65XOWD_cjs.init_cjs_shims();
|
|
192
|
+
var isWebIdentityProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && [
|
|
176
193
|
"undefined",
|
|
177
194
|
"string"
|
|
178
195
|
].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
|
|
179
|
-
var resolveWebIdentityCredentials = /* @__PURE__ */
|
|
196
|
+
var resolveWebIdentityCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, options) => import('./RRJYWXRS.cjs').then(({ fromTokenFile }) => fromTokenFile({
|
|
180
197
|
webIdentityTokenFile: profile.web_identity_token_file,
|
|
181
198
|
roleArn: profile.role_arn,
|
|
182
199
|
roleSessionName: profile.role_session_name,
|
|
183
200
|
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
|
|
184
201
|
logger: options.logger,
|
|
185
202
|
parentClientConfig: options.parentClientConfig
|
|
186
|
-
})().then((creds) =>
|
|
203
|
+
})().then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q"))), "resolveWebIdentityCredentials");
|
|
187
204
|
|
|
188
205
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
|
|
189
|
-
var resolveProfileData = /* @__PURE__ */
|
|
206
|
+
var resolveProfileData = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
|
|
190
207
|
const data = profiles[profileName];
|
|
191
208
|
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
192
209
|
return resolveStaticCredentials(data, options);
|
|
@@ -209,13 +226,13 @@ var resolveProfileData = /* @__PURE__ */ NX4KBEWA_cjs.__name(async (profileName,
|
|
|
209
226
|
if (isSsoProfile(data)) {
|
|
210
227
|
return await resolveSsoCredentials(profileName, data, options);
|
|
211
228
|
}
|
|
212
|
-
throw new
|
|
229
|
+
throw new BXO3RC75_cjs.CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, {
|
|
213
230
|
logger: options.logger
|
|
214
231
|
});
|
|
215
232
|
}, "resolveProfileData");
|
|
216
233
|
|
|
217
234
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
|
|
218
|
-
var fromIni = /* @__PURE__ */
|
|
235
|
+
var fromIni = /* @__PURE__ */ VO65XOWD_cjs.__name((_init = {}) => async ({ callerClientConfig } = {}) => {
|
|
219
236
|
const init = {
|
|
220
237
|
..._init,
|
|
221
238
|
parentClientConfig: {
|
|
@@ -224,12 +241,12 @@ var fromIni = /* @__PURE__ */ NX4KBEWA_cjs.__name((_init = {}) => async ({ calle
|
|
|
224
241
|
}
|
|
225
242
|
};
|
|
226
243
|
init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
|
|
227
|
-
const profiles = await
|
|
228
|
-
return resolveProfileData(
|
|
244
|
+
const profiles = await OAYLBSRH_cjs.parseKnownFiles(init);
|
|
245
|
+
return resolveProfileData(OAYLBSRH_cjs.getProfileName({
|
|
229
246
|
profile: _init.profile ?? callerClientConfig?.profile
|
|
230
247
|
}), profiles, init);
|
|
231
248
|
}, "fromIni");
|
|
232
249
|
|
|
233
250
|
exports.fromIni = fromIni;
|
|
234
|
-
//# sourceMappingURL=
|
|
235
|
-
//# sourceMappingURL=
|
|
251
|
+
//# sourceMappingURL=4KPRGHDI.cjs.map
|
|
252
|
+
//# sourceMappingURL=4KPRGHDI.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["init_cjs_shims","resolveCredentialSource","__name","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAEO,IAAMC,uBAAAA,mBAA0BC,mBAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,6CAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,gBAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,kBAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,6CAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,6CAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,qCAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmBZ,mBAAA,CAAA,CAACkB,KAAAA,KAAUC,kCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,wCAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC7B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B9B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+BnC,mBAAA,CAAA,OAAOE,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,qCAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,2BAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMjC,uBAAAA,CAAwBuC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,kCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,qCAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,wCAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzCnC,2BAAA,EAAA;AACO,IAAMsE,gBAAAA,mBAAmBpE,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4BtE,mBAAA,CAAA,OAAOM,OAAAA,EAASgB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzCpB,2BAAA,EAAA;AACO,IAAM0E,wCAAwBxE,mBAAA,CAAA,OAAOsB,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,iCAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,iCAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,wCAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5BjF,2BAAA,EAAA;AACO,IAAMkF,uCAAuBhF,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2BrF,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,iCAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxCxF,2BAAA,EAAA;AACO,IAAM+F,uCAAuB7F,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC/F,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,8CAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAUxG,mBAAA,CAAA,CAACyG,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,4BAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,2BAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"4KPRGHDI.cjs","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}
|
|
@@ -1,20 +1,38 @@
|
|
|
1
|
-
import { getProfileName, parseKnownFiles, loadSsoSessionData, getSSOTokenFromFile, getSSOTokenFilepath } from './
|
|
2
|
-
import { setCredentialFeature } from './
|
|
3
|
-
import './
|
|
4
|
-
import { CredentialsProviderError, TokenProviderError } from './
|
|
5
|
-
import { __name } from './
|
|
1
|
+
import { getProfileName, parseKnownFiles, loadSsoSessionData, getSSOTokenFromFile, getSSOTokenFilepath } from './ELFNCT57.js';
|
|
2
|
+
import { setCredentialFeature } from './NDUVZQ7S.js';
|
|
3
|
+
import './OH4A2VLX.js';
|
|
4
|
+
import { CredentialsProviderError, TokenProviderError } from './TTKDG2NN.js';
|
|
5
|
+
import { init_esm_shims, __name } from './4RNWLMHM.js';
|
|
6
6
|
import { promises } from 'fs';
|
|
7
7
|
|
|
8
|
+
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js
|
|
9
|
+
init_esm_shims();
|
|
10
|
+
|
|
11
|
+
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
|
|
12
|
+
init_esm_shims();
|
|
13
|
+
|
|
8
14
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
|
|
15
|
+
init_esm_shims();
|
|
9
16
|
var isSsoProfile = /* @__PURE__ */ __name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
|
|
10
17
|
|
|
18
|
+
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
|
|
19
|
+
init_esm_shims();
|
|
20
|
+
|
|
21
|
+
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
|
|
22
|
+
init_esm_shims();
|
|
23
|
+
|
|
11
24
|
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
|
|
25
|
+
init_esm_shims();
|
|
12
26
|
var EXPIRE_WINDOW_MS = 5 * 60 * 1e3;
|
|
13
27
|
var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
|
|
14
28
|
|
|
29
|
+
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
|
|
30
|
+
init_esm_shims();
|
|
31
|
+
|
|
15
32
|
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
|
|
33
|
+
init_esm_shims();
|
|
16
34
|
var getSsoOidcClient = /* @__PURE__ */ __name(async (ssoRegion, init = {}) => {
|
|
17
|
-
const { SSOOIDCClient } = await import('./
|
|
35
|
+
const { SSOOIDCClient } = await import('./NTYIDZH3.js');
|
|
18
36
|
const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
|
|
19
37
|
region: ssoRegion ?? init.clientConfig?.region,
|
|
20
38
|
logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
|
|
@@ -24,7 +42,7 @@ var getSsoOidcClient = /* @__PURE__ */ __name(async (ssoRegion, init = {}) => {
|
|
|
24
42
|
|
|
25
43
|
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
|
|
26
44
|
var getNewSsoOidcToken = /* @__PURE__ */ __name(async (ssoToken, ssoRegion, init = {}) => {
|
|
27
|
-
const { CreateTokenCommand } = await import('./
|
|
45
|
+
const { CreateTokenCommand } = await import('./NTYIDZH3.js');
|
|
28
46
|
const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
|
|
29
47
|
return ssoOidcClient.send(new CreateTokenCommand({
|
|
30
48
|
clientId: ssoToken.clientId,
|
|
@@ -35,6 +53,7 @@ var getNewSsoOidcToken = /* @__PURE__ */ __name(async (ssoToken, ssoRegion, init
|
|
|
35
53
|
}, "getNewSsoOidcToken");
|
|
36
54
|
|
|
37
55
|
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
|
|
56
|
+
init_esm_shims();
|
|
38
57
|
var validateTokenExpiry = /* @__PURE__ */ __name((token) => {
|
|
39
58
|
if (token.expiration && token.expiration.getTime() < Date.now()) {
|
|
40
59
|
throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);
|
|
@@ -42,11 +61,15 @@ var validateTokenExpiry = /* @__PURE__ */ __name((token) => {
|
|
|
42
61
|
}, "validateTokenExpiry");
|
|
43
62
|
|
|
44
63
|
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
|
|
64
|
+
init_esm_shims();
|
|
45
65
|
var validateTokenKey = /* @__PURE__ */ __name((key, value, forRefresh = false) => {
|
|
46
66
|
if (typeof value === "undefined") {
|
|
47
67
|
throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${REFRESH_MESSAGE}`, false);
|
|
48
68
|
}
|
|
49
69
|
}, "validateTokenKey");
|
|
70
|
+
|
|
71
|
+
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js
|
|
72
|
+
init_esm_shims();
|
|
50
73
|
var { writeFile } = promises;
|
|
51
74
|
var writeSSOTokenToFile = /* @__PURE__ */ __name((id, ssoToken) => {
|
|
52
75
|
const tokenFilepath = getSSOTokenFilepath(id);
|
|
@@ -176,7 +199,7 @@ var resolveSSOCredentials = /* @__PURE__ */ __name(async ({ ssoStartUrl, ssoSess
|
|
|
176
199
|
});
|
|
177
200
|
}
|
|
178
201
|
const { accessToken } = token;
|
|
179
|
-
const { SSOClient, GetRoleCredentialsCommand } = await import('./
|
|
202
|
+
const { SSOClient, GetRoleCredentialsCommand } = await import('./UL4OVG5P.js');
|
|
180
203
|
const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
|
|
181
204
|
logger: clientConfig?.logger ?? parentClientConfig?.logger,
|
|
182
205
|
region: clientConfig?.region ?? ssoRegion
|
|
@@ -222,6 +245,7 @@ var resolveSSOCredentials = /* @__PURE__ */ __name(async ({ ssoStartUrl, ssoSess
|
|
|
222
245
|
}, "resolveSSOCredentials");
|
|
223
246
|
|
|
224
247
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
|
|
248
|
+
init_esm_shims();
|
|
225
249
|
var validateSsoProfile = /* @__PURE__ */ __name((profile, logger) => {
|
|
226
250
|
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
|
|
227
251
|
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
|
|
@@ -306,6 +330,9 @@ var fromSSO = /* @__PURE__ */ __name((init = {}) => async ({ callerClientConfig
|
|
|
306
330
|
}
|
|
307
331
|
}, "fromSSO");
|
|
308
332
|
|
|
333
|
+
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/types.js
|
|
334
|
+
init_esm_shims();
|
|
335
|
+
|
|
309
336
|
export { fromSSO, isSsoProfile, validateSsoProfile };
|
|
310
|
-
//# sourceMappingURL=
|
|
311
|
-
//# sourceMappingURL=
|
|
337
|
+
//# sourceMappingURL=4LRYG53T.js.map
|
|
338
|
+
//# sourceMappingURL=4LRYG53T.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/types.js"],"names":["isSsoProfile","arg","sso_start_url","sso_account_id","sso_session","sso_region","sso_role_name","EXPIRE_WINDOW_MS","REFRESH_MESSAGE","getSsoOidcClient","ssoRegion","init","SSOOIDCClient","ssoOidcClient","Object","assign","clientConfig","region","logger","parentClientConfig","getNewSsoOidcToken","ssoToken","CreateTokenCommand","send","clientId","clientSecret","refreshToken","grantType","validateTokenExpiry","token","expiration","getTime","Date","now","TokenProviderError","validateTokenKey","key","value","forRefresh","writeFile","fsPromises","writeSSOTokenToFile","id","tokenFilepath","getSSOTokenFilepath","tokenString","JSON","stringify","lastRefreshAttemptTime","fromSso","_init","callerClientConfig","debug","profiles","parseKnownFiles","profileName","getProfileName","profile","ssoSessionName","ssoSessions","loadSsoSessionData","ssoSession","ssoSessionRequiredKey","getSSOTokenFromFile","e","accessToken","expiresAt","existingToken","setTime","newSsoOidcToken","expiresIn","newTokenExpiration","toISOString","error","SHOULD_FAIL_CREDENTIAL_CHAIN","resolveSSOCredentials","ssoStartUrl","ssoAccountId","ssoRoleName","ssoClient","refreshMessage","_token","getSsoTokenProvider","CredentialsProviderError","message","tryNextLink","SSOClient","GetRoleCredentialsCommand","sso","ssoResp","accountId","roleName","roleCredentials","accessKeyId","secretAccessKey","sessionToken","credentialScope","credentials","setCredentialFeature","validateSsoProfile","keys","join","fromSSO","session","conflictMsg"],"mappings":";;;;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMA,YAAAA,2BAAgBC,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIC,aAAAA,KAAkB,QAAA,IAC1B,OAAOD,GAAAA,CAAIE,cAAAA,KAAmB,YAC9B,OAAOF,GAAAA,CAAIG,WAAAA,KAAgB,QAAA,IAC3B,OAAOH,GAAAA,CAAII,eAAe,QAAA,IAC1B,OAAOJ,GAAAA,CAAIK,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA;;;ACA5B,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMC,gBAAAA,GAAmB,IAAI,EAAA,GAAK,GAAA;AAClC,IAAMC,eAAAA,GAAkB,CAAA,+EAAA,CAAA;;;ACD/B,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMC,gBAAAA,mBAAmB,MAAA,CAAA,OAAOC,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACvD,EAAA,MAAM,EAAEC,aAAAA,EAAa,GAAK,MAAM,OAAO,eAAA,CAAA;AACvC,EAAA,MAAMC,aAAAA,GAAgB,IAAID,aAAAA,CAAcE,MAAAA,CAAOC,MAAAA,CAAO,EAAC,EAAGJ,IAAAA,CAAKK,YAAAA,IAAgB,EAAC,EAAG;IAC/EC,MAAAA,EAAQP,SAAAA,IAAaC,KAAKK,YAAAA,EAAcC,MAAAA;AACxCC,IAAAA,MAAAA,EAAQP,IAAAA,CAAKK,YAAAA,EAAcE,MAAAA,IAAUP,IAAAA,CAAKQ,kBAAAA,EAAoBD;AAClE,GAAA,CAAA,CAAA;AACA,EAAA,OAAOL,aAAAA;AACX,CAAA,EAPgC,kBAAA,CAAA;;;ADCzB,IAAMO,qCAAqB,MAAA,CAAA,OAAOC,QAAAA,EAAUX,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACnE,EAAA,MAAM,EAAEW,kBAAAA,EAAkB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC5C,EAAA,MAAMT,aAAAA,GAAgB,MAAMJ,gBAAAA,CAAiBC,SAAAA,EAAWC,IAAAA,CAAAA;AACxD,EAAA,OAAOE,aAAAA,CAAcU,IAAAA,CAAK,IAAID,kBAAAA,CAAmB;AAC7CE,IAAAA,QAAAA,EAAUH,QAAAA,CAASG,QAAAA;AACnBC,IAAAA,YAAAA,EAAcJ,QAAAA,CAASI,YAAAA;AACvBC,IAAAA,YAAAA,EAAcL,QAAAA,CAASK,YAAAA;IACvBC,SAAAA,EAAW;AACf,GAAA,CAAA,CAAA;AACJ,CAAA,EATkC,oBAAA,CAAA;;;AEDlC,cAAA,EAAA;AAEO,IAAMC,mBAAAA,2BAAuBC,KAAAA,KAAAA;AAChC,EAAA,IAAIA,KAAAA,CAAMC,cAAcD,KAAAA,CAAMC,UAAAA,CAAWC,SAAO,GAAKC,IAAAA,CAAKC,KAAG,EAAI;AAC7D,IAAA,MAAM,IAAIC,kBAAAA,CAAmB,CAAA,kBAAA,EAAqB1B,eAAAA,IAAmB,KAAA,CAAA;AACzE,EAAA;AACJ,CAAA,EAJmC,qBAAA,CAAA;;;ACFnC,cAAA,EAAA;AAEO,IAAM2B,gBAAAA,mBAAmB,MAAA,CAAA,CAACC,GAAAA,EAAKC,KAAAA,EAAOC,aAAa,KAAA,KAAK;AAC3D,EAAA,IAAI,OAAOD,UAAU,WAAA,EAAa;AAC9B,IAAA,MAAM,IAAIH,kBAAAA,CAAmB,CAAA,uBAAA,EAA0BE,GAAAA,CAAAA,cAAAA,EAAoBE,UAAAA,GAAa,kBAAA,GAAqB,EAAA,CAAA,EAAA,EAAO9B,eAAAA,CAAAA,CAAAA,EAAmB,KAAA,CAAA;AAC3I,EAAA;AACJ,CAAA,EAJgC,kBAAA,CAAA;;;ACFhC,cAAA,EAAA;AAEA,IAAM,EAAE+B,WAAS,GAAKC,QAAAA;AACf,IAAMC,mBAAAA,mBAAsB,MAAA,CAAA,CAACC,EAAAA,EAAIrB,QAAAA,KAAAA;AACpC,EAAA,MAAMsB,aAAAA,GAAgBC,oBAAoBF,EAAAA,CAAAA;AAC1C,EAAA,MAAMG,WAAAA,GAAcC,IAAAA,CAAKC,SAAAA,CAAU1B,QAAAA,EAAU,MAAM,CAAA,CAAA;AACnD,EAAA,OAAOkB,SAAAA,CAAUI,eAAeE,WAAAA,CAAAA;AACpC,CAAA,EAJmC,qBAAA,CAAA;;;ANInC,IAAMG,sBAAAA,mBAAyB,IAAIhB,IAAAA,CAAK,CAAA,CAAA;AACjC,IAAMiB,OAAAA,mBAAU,MAAA,CAAA,CAACC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMxC,IAAAA,GAAO;IACT,GAAGuC,KAAAA;IACH/B,kBAAAA,EAAoB;MAChB,GAAGgC,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM/B;AACb;AACJ,GAAA;AACAR,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,oCAAA,CAAA;AACnB,EAAA,MAAMC,QAAAA,GAAW,MAAMC,eAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,EAAA,MAAM4C,cAAcC,cAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,MAAMA,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,EAAA,IAAI,CAACE,OAAAA,EAAS;AACV,IAAA,MAAM,IAAIvB,kBAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,oDAA+D,KAAA,CAAA;EAC5G,CAAA,MAAA,IACS,CAACE,OAAAA,CAAQ,aAAA,CAAA,EAAgB;AAC9B,IAAA,MAAM,IAAIvB,kBAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACvG,EAAA;AACA,EAAA,MAAMG,cAAAA,GAAiBD,QAAQ,aAAA,CAAA;AAC/B,EAAA,MAAME,WAAAA,GAAc,MAAMC,kBAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,EAAA,MAAMkD,UAAAA,GAAaF,YAAYD,cAAAA,CAAAA;AAC/B,EAAA,IAAI,CAACG,UAAAA,EAAY;AACb,IAAA,MAAM,IAAI3B,kBAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,oDAAkE,KAAA,CAAA;AACnH,EAAA;AACA,EAAA,KAAA,MAAWI,qBAAAA,IAAyB;AAAC,IAAA,eAAA;AAAiB,IAAA;AAAe,GAAA,EAAA;AACjE,IAAA,IAAI,CAACD,UAAAA,CAAWC,qBAAAA,CAAAA,EAAwB;AACpC,MAAA,MAAM,IAAI5B,kBAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,CAAAA,gCAAAA,EAAiDI,qBAAAA,MAA2B,KAAA,CAAA;AAC7H,IAAA;AACJ,EAAA;AACA,EAAoBD,WAAW,eAAA;AAC/B,EAAA,MAAMnD,SAAAA,GAAYmD,WAAW,YAAA,CAAA;AAC7B,EAAA,IAAIxC,QAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,QAAAA,GAAW,MAAM0C,oBAAoBL,cAAAA,CAAAA;AACzC,EAAA,CAAA,CAAA,OACOM,CAAAA,EAAG;AACN,IAAA,MAAM,IAAI9B,kBAAAA,CAAmB,CAAA,8CAAA,EAAiDqB,WAAAA,CAAAA,8BAAAA,EAA4C/C,eAAAA,IAAmB,KAAA,CAAA;AACjJ,EAAA;AACA2B,EAAAA,gBAAAA,CAAiB,aAAA,EAAed,SAAS4C,WAAW,CAAA;AACpD9B,EAAAA,gBAAAA,CAAiB,WAAA,EAAad,SAAS6C,SAAS,CAAA;AAChD,EAAA,MAAM,EAAED,WAAAA,EAAaC,SAAAA,EAAS,GAAK7C,QAAAA;AACnC,EAAA,MAAM8C,aAAAA,GAAgB;IAAEtC,KAAAA,EAAOoC,WAAAA;IAAanC,UAAAA,EAAY,IAAIE,KAAKkC,SAAAA;AAAW,GAAA;AAC5E,EAAA,IAAIC,cAAcrC,UAAAA,CAAWC,OAAAA,KAAYC,IAAAA,CAAKC,GAAAA,KAAQ1B,gBAAAA,EAAkB;AACpE,IAAA,OAAO4D,aAAAA;AACX,EAAA;AACA,EAAA,IAAInC,KAAKC,GAAAA,EAAG,GAAKe,uBAAuBjB,OAAAA,EAAO,GAAK,KAAK,GAAA,EAAM;AAC3DH,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACAhC,EAAAA,gBAAAA,CAAiB,UAAA,EAAYd,QAAAA,CAASG,QAAAA,EAAU,IAAA,CAAA;AAChDW,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASI,YAAAA,EAAc,IAAA,CAAA;AACxDU,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASK,YAAAA,EAAc,IAAA,CAAA;AACxD,EAAA,IAAI;AACAsB,IAAAA,sBAAAA,CAAuBoB,OAAAA,CAAQpC,IAAAA,CAAKC,GAAAA,EAAG,CAAA;AACvC,IAAA,MAAMoC,eAAAA,GAAkB,MAAMjD,kBAAAA,CAAmBC,QAAAA,EAAUX,WAAWC,IAAAA,CAAAA;AACtEwB,IAAAA,gBAAAA,CAAiB,aAAA,EAAekC,gBAAgBJ,WAAW,CAAA;AAC3D9B,IAAAA,gBAAAA,CAAiB,WAAA,EAAakC,gBAAgBC,SAAS,CAAA;AACvD,IAAA,MAAMC,kBAAAA,GAAqB,IAAIvC,IAAAA,CAAKA,IAAAA,CAAKC,KAAG,GAAKoC,eAAAA,CAAgBC,YAAY,GAAA,CAAA;AAC7E,IAAA,IAAI;AACA,MAAA,MAAM7B,oBAAoBiB,cAAAA,EAAgB;QACtC,GAAGrC,QAAAA;AACH4C,QAAAA,WAAAA,EAAaI,eAAAA,CAAgBJ,WAAAA;AAC7BC,QAAAA,SAAAA,EAAWK,mBAAmBC,WAAAA,EAAW;AACzC9C,QAAAA,YAAAA,EAAc2C,eAAAA,CAAgB3C;OAClC,CAAA;AACJ,IAAA,CAAA,CAAA,OACO+C,KAAAA,EAAO;AACd,IAAA;AACA,IAAA,OAAO;AACH5C,MAAAA,KAAAA,EAAOwC,eAAAA,CAAgBJ,WAAAA;MACvBnC,UAAAA,EAAYyC;AAChB,KAAA;AACJ,EAAA,CAAA,CAAA,OACOE,KAAAA,EAAO;AACV7C,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACJ,CAAA,EA/EuB,SAAA,CAAA;;;ADJvB,IAAMO,4BAAAA,GAA+B,KAAA;AAC9B,IAAMC,qBAAAA,mBAAwB,MAAA,CAAA,OAAO,EAAEC,WAAAA,EAAaf,UAAAA,EAAYgB,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAaC,SAAAA,EAAW/D,YAAAA,EAAcG,kBAAAA,EAAoBsC,OAAAA,EAASvC,QAAM,KAAG;AACxK,EAAA,IAAIW,KAAAA;AACJ,EAAA,MAAMmD,cAAAA,GAAiB,CAAA,6EAAA,CAAA;AACvB,EAAA,IAAInB,UAAAA,EAAY;AACZ,IAAA,IAAI;AACA,MAAA,MAAMoB,MAAAA,GAAS,MAAMC,OAAAA,CAAoB;AAAEzB,QAAAA;AAAQ,OAAA,CAAA,EAAA;AACnD5B,MAAAA,KAAAA,GAAQ;AACJoC,QAAAA,WAAAA,EAAagB,MAAAA,CAAOpD,KAAAA;AACpBqC,QAAAA,SAAAA,EAAW,IAAIlC,IAAAA,CAAKiD,MAAAA,CAAOnD,UAAU,EAAE0C,WAAAA;AAC3C,OAAA;AACJ,IAAA,CAAA,CAAA,OACOR,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,wBAAAA,CAAyBnB,CAAAA,CAAEoB,OAAAA,EAAS;QAC1CC,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;EACJ,CAAA,MACK;AACD,IAAA,IAAI;AACAW,MAAAA,KAAAA,GAAQ,MAAMkC,oBAAoBa,WAAAA,CAAAA;AACtC,IAAA,CAAA,CAAA,OACOZ,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,wBAAAA,CAAyB,CAAA,yDAAA,EAA4DH,cAAAA,CAAAA,CAAAA,EAAkB;QAC7GK,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;AACJ,EAAA;AACA,EAAA,IAAI,IAAIc,IAAAA,CAAKH,KAAAA,CAAMqC,SAAS,CAAA,CAAEnC,SAAO,GAAKC,IAAAA,CAAKC,GAAAA,EAAG,IAAM,CAAA,EAAG;AACvD,IAAA,MAAM,IAAIkD,wBAAAA,CAAyB,CAAA,0DAAA,EAA6DH,cAAAA,CAAAA,CAAAA,EAAkB;MAC9GK,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE+C,aAAW,GAAKpC,KAAAA;AACxB,EAAA,MAAM,EAAEyD,SAAAA,EAAWC,yBAAAA,EAAyB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9D,EAAA,MAAMC,GAAAA,GAAMT,SAAAA,IACR,IAAIO,SAAAA,CAAUxE,MAAAA,CAAOC,OAAO,EAAC,EAAGC,YAAAA,IAAgB,EAAC,EAAG;IAChDE,MAAAA,EAAQF,YAAAA,EAAcE,UAAUC,kBAAAA,EAAoBD,MAAAA;AACpDD,IAAAA,MAAAA,EAAQD,cAAcC,MAAAA,IAAUP;AACpC,GAAA,CAAA,CAAA;AACJ,EAAA,IAAI+E,OAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,OAAAA,GAAU,MAAMD,GAAAA,CAAIjE,IAAAA,CAAK,IAAIgE,yBAAAA,CAA0B;MACnDG,SAAAA,EAAWb,YAAAA;MACXc,QAAAA,EAAUb,WAAAA;AACVb,MAAAA;AACJ,KAAA,CAAA,CAAA;AACJ,EAAA,CAAA,CAAA,OACOD,CAAAA,EAAG;AACN,IAAA,MAAM,IAAImB,yBAAyBnB,CAAAA,EAAG;MAClCqB,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE0E,eAAAA,EAAiB,EAAEC,WAAAA,EAAaC,eAAAA,EAAiBC,YAAAA,EAAcjE,UAAAA,EAAYkE,eAAAA,EAAiBN,SAAAA,EAAS,GAAK,EAAC,EAAC,GAAMD,OAAAA;AAC1H,EAAA,IAAI,CAACI,WAAAA,IAAe,CAACC,mBAAmB,CAACC,YAAAA,IAAgB,CAACjE,UAAAA,EAAY;AAClE,IAAA,MAAM,IAAIqD,yBAAyB,8CAAA,EAAgD;MAC/EE,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM+E,WAAAA,GAAc;AAChBJ,IAAAA,WAAAA;AACAC,IAAAA,eAAAA;AACAC,IAAAA,YAAAA;IACAjE,UAAAA,EAAY,IAAIE,KAAKF,UAAAA,CAAAA;AACrB,IAAA,GAAIkE,eAAAA,IAAmB;AAAEA,MAAAA;AAAgB,KAAA;AACzC,IAAA,GAAIN,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACA,EAAA,IAAI7B,UAAAA,EAAY;AACZqC,IAAAA,oBAAAA,CAAqBD,WAAAA,EAAa,mBAAmB,GAAA,CAAA;EACzD,CAAA,MACK;AACDC,IAAAA,oBAAAA,CAAqBD,WAAAA,EAAa,0BAA0B,GAAA,CAAA;AAChE,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EA9EqC,uBAAA,CAAA;;;AQLrC,cAAA,EAAA;AACO,IAAME,kBAAAA,mBAAqB,MAAA,CAAA,CAAC1C,OAAAA,EAASvC,MAAAA,KAAAA;AACxC,EAAA,MAAM,EAAEhB,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,eAAa,GAAKmD,OAAAA;AACrE,EAAA,IAAI,CAACvD,aAAAA,IAAiB,CAACC,kBAAkB,CAACE,UAAAA,IAAc,CAACC,aAAAA,EAAe;AACpE,IAAA,MAAM,IAAI6E,yBAAyB,CAAA,8IAAA,EACwBrE,MAAAA,CAAOsF,KAAK3C,OAAAA,CAAAA,CAAS4C,IAAAA,CAAK,IAAA,CAAA;AAA6F,kFAAA,CAAA,EAAA;MAAEhB,WAAAA,EAAa,KAAA;AAAOnE,MAAAA;KAAO,CAAA;AACnN,EAAA;AACA,EAAA,OAAOuC,OAAAA;AACX,CAAA,EAPkC,oBAAA;;;AVI3B,IAAM6C,OAAAA,mBAAU,MAAA,CAAA,CAAC3F,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEwC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACpExC,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM,EAAEwB,WAAAA,EAAaC,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAajB,YAAU,GAAKlD,IAAAA;AAC1E,EAAA,MAAM,EAAEoE,WAAS,GAAKpE,IAAAA;AACtB,EAAA,MAAM4C,cAAcC,cAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,IAAI,CAACmB,eAAe,CAACC,YAAAA,IAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,IAAe,CAACjB,UAAAA,EAAY;AAC5E,IAAA,MAAMR,QAAAA,GAAW,MAAMC,eAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,IAAA,MAAM8C,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,IAAA,IAAI,CAACE,OAAAA,EAAS;AACV,MAAA,MAAM,IAAI0B,wBAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,eAAAA,CAAAA,EAA8B;AAAErC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OAAO,CAAA;AACtG,IAAA;AACA,IAAA,IAAI,CAAClB,YAAAA,CAAayD,OAAAA,CAAAA,EAAU;AACxB,MAAA,MAAM,IAAI0B,wBAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,wCAAAA,CAAAA,EAAuD;AACjGrC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OACjB,CAAA;AACJ,IAAA;AACA,IAAA,IAAIuC,SAASrD,WAAAA,EAAa;AACtB,MAAA,MAAMuD,WAAAA,GAAc,MAAMC,kBAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,MAAA,MAAM4F,OAAAA,GAAU5C,WAAAA,CAAYF,OAAAA,CAAQrD,WAAW,CAAA;AAC/C,MAAA,MAAMoG,WAAAA,GAAc,CAAA,2BAAA,EAA8BjD,WAAAA,CAAAA,iBAAAA,EAA+BE,QAAQrD,WAAW,CAAA,CAAA;AACpG,MAAA,IAAIM,SAAAA,IAAaA,SAAAA,KAAc6F,OAAAA,CAAQlG,UAAAA,EAAY;AAC/C,QAAA,MAAM,IAAI8E,wBAAAA,CAAyB,CAAA,sBAAA,CAAA,GAA2BqB,WAAAA,EAAa;UACvEnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACA,MAAA,IAAI0D,WAAAA,IAAeA,WAAAA,KAAgB2B,OAAAA,CAAQrG,aAAAA,EAAe;AACtD,QAAA,MAAM,IAAIiF,wBAAAA,CAAyB,CAAA,yBAAA,CAAA,GAA8BqB,WAAAA,EAAa;UAC1EnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACAuC,MAAAA,OAAAA,CAAQpD,aAAakG,OAAAA,CAAQlG,UAAAA;AAC7BoD,MAAAA,OAAAA,CAAQvD,gBAAgBqG,OAAAA,CAAQrG,aAAAA;AACpC,IAAA;AACA,IAAA,MAAM,EAAEA,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,aAAAA,EAAeF,aAAW,GAAK+F,kBAAAA,CAAmB1C,OAAAA,EAAS9C,IAAAA,CAAKO,MAAM,CAAA;AACzH,IAAA,OAAOyD,qBAAAA,CAAsB;MACzBC,WAAAA,EAAa1E,aAAAA;MACb2D,UAAAA,EAAYzD,WAAAA;MACZyE,YAAAA,EAAc1E,cAAAA;MACdO,SAAAA,EAAWL,UAAAA;MACXyE,WAAAA,EAAaxE,aAAAA;AACbyE,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA,CAAA,MAAA,IACS,CAACqB,WAAAA,IAAe,CAACC,gBAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,EAAa;AAClE,IAAA,MAAM,IAAIK,yBAAyB,8HAAA,EAC8B;MAAEE,WAAAA,EAAa,KAAA;AAAOnE,MAAAA,MAAAA,EAAQP,IAAAA,CAAKO;KAAO,CAAA;EAC/G,CAAA,MACK;AACD,IAAA,OAAOyD,qBAAAA,CAAsB;AACzBC,MAAAA,WAAAA;AACAf,MAAAA,UAAAA;AACAgB,MAAAA,YAAAA;AACAnE,MAAAA,SAAAA;AACAoE,MAAAA,WAAAA;AACAC,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA;AACJ,CAAA,EAnEuB,SAAA;;;AWLvB,cAAA,EAAA","file":"4LRYG53T.js","sourcesContent":["export * from \"./fromSSO\";\nexport * from \"./isSsoProfile\";\nexport * from \"./types\";\nexport * from \"./validateSsoProfile\";\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, loadSsoSessionData, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { isSsoProfile } from \"./isSsoProfile\";\nimport { resolveSSOCredentials } from \"./resolveSSOCredentials\";\nimport { validateSsoProfile } from \"./validateSsoProfile\";\nexport const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-sso - fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n const { ssoClient } = init;\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n const profiles = await parseKnownFiles(init);\n const profile = profiles[profileName];\n if (!profile) {\n throw new CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });\n }\n if (!isSsoProfile(profile)) {\n throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {\n logger: init.logger,\n });\n }\n if (profile?.sso_session) {\n const ssoSessions = await loadSsoSessionData(init);\n const session = ssoSessions[profile.sso_session];\n const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;\n if (ssoRegion && ssoRegion !== session.sso_region) {\n throw new CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {\n throw new CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n profile.sso_region = session.sso_region;\n profile.sso_start_url = session.sso_start_url;\n }\n const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);\n return resolveSSOCredentials({\n ssoStartUrl: sso_start_url,\n ssoSession: sso_session,\n ssoAccountId: sso_account_id,\n ssoRegion: sso_region,\n ssoRoleName: sso_role_name,\n ssoClient: ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n throw new CredentialsProviderError(\"Incomplete configuration. The fromSSO() argument hash must include \" +\n '\"ssoStartUrl\", \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"', { tryNextLink: false, logger: init.logger });\n }\n else {\n return resolveSSOCredentials({\n ssoStartUrl,\n ssoSession,\n ssoAccountId,\n ssoRegion,\n ssoRoleName,\n ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n};\n","export const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { fromSso as getSsoTokenProvider } from \"@aws-sdk/token-providers\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getSSOTokenFromFile } from \"@smithy/shared-ini-file-loader\";\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\nexport const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }) => {\n let token;\n const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;\n if (ssoSession) {\n try {\n const _token = await getSsoTokenProvider({ profile })();\n token = {\n accessToken: _token.token,\n expiresAt: new Date(_token.expiration).toISOString(),\n };\n }\n catch (e) {\n throw new CredentialsProviderError(e.message, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n else {\n try {\n token = await getSSOTokenFromFile(ssoStartUrl);\n }\n catch (e) {\n throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {\n throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { accessToken } = token;\n const { SSOClient, GetRoleCredentialsCommand } = await import(\"./loadSso\");\n const sso = ssoClient ||\n new SSOClient(Object.assign({}, clientConfig ?? {}, {\n logger: clientConfig?.logger ?? parentClientConfig?.logger,\n region: clientConfig?.region ?? ssoRegion,\n }));\n let ssoResp;\n try {\n ssoResp = await sso.send(new GetRoleCredentialsCommand({\n accountId: ssoAccountId,\n roleName: ssoRoleName,\n accessToken,\n }));\n }\n catch (e) {\n throw new CredentialsProviderError(e, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;\n if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const credentials = {\n accessKeyId,\n secretAccessKey,\n sessionToken,\n expiration: new Date(expiration),\n ...(credentialScope && { credentialScope }),\n ...(accountId && { accountId }),\n };\n if (ssoSession) {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO\", \"s\");\n }\n else {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO_LEGACY\", \"u\");\n }\n return credentials;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, getSSOTokenFromFile, loadSsoSessionData, parseKnownFiles, } from \"@smithy/shared-ini-file-loader\";\nimport { EXPIRE_WINDOW_MS, REFRESH_MESSAGE } from \"./constants\";\nimport { getNewSsoOidcToken } from \"./getNewSsoOidcToken\";\nimport { validateTokenExpiry } from \"./validateTokenExpiry\";\nimport { validateTokenKey } from \"./validateTokenKey\";\nimport { writeSSOTokenToFile } from \"./writeSSOTokenToFile\";\nconst lastRefreshAttemptTime = new Date(0);\nexport const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/token-providers - fromSso\");\n const profiles = await parseKnownFiles(init);\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n const profile = profiles[profileName];\n if (!profile) {\n throw new TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);\n }\n else if (!profile[\"sso_session\"]) {\n throw new TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);\n }\n const ssoSessionName = profile[\"sso_session\"];\n const ssoSessions = await loadSsoSessionData(init);\n const ssoSession = ssoSessions[ssoSessionName];\n if (!ssoSession) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);\n }\n for (const ssoSessionRequiredKey of [\"sso_start_url\", \"sso_region\"]) {\n if (!ssoSession[ssoSessionRequiredKey]) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);\n }\n }\n const ssoStartUrl = ssoSession[\"sso_start_url\"];\n const ssoRegion = ssoSession[\"sso_region\"];\n let ssoToken;\n try {\n ssoToken = await getSSOTokenFromFile(ssoSessionName);\n }\n catch (e) {\n throw new TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`, false);\n }\n validateTokenKey(\"accessToken\", ssoToken.accessToken);\n validateTokenKey(\"expiresAt\", ssoToken.expiresAt);\n const { accessToken, expiresAt } = ssoToken;\n const existingToken = { token: accessToken, expiration: new Date(expiresAt) };\n if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {\n return existingToken;\n }\n if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1000) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n validateTokenKey(\"clientId\", ssoToken.clientId, true);\n validateTokenKey(\"clientSecret\", ssoToken.clientSecret, true);\n validateTokenKey(\"refreshToken\", ssoToken.refreshToken, true);\n try {\n lastRefreshAttemptTime.setTime(Date.now());\n const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);\n validateTokenKey(\"accessToken\", newSsoOidcToken.accessToken);\n validateTokenKey(\"expiresIn\", newSsoOidcToken.expiresIn);\n const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);\n try {\n await writeSSOTokenToFile(ssoSessionName, {\n ...ssoToken,\n accessToken: newSsoOidcToken.accessToken,\n expiresAt: newTokenExpiration.toISOString(),\n refreshToken: newSsoOidcToken.refreshToken,\n });\n }\n catch (error) {\n }\n return {\n token: newSsoOidcToken.accessToken,\n expiration: newTokenExpiration,\n };\n }\n catch (error) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n};\n","export const EXPIRE_WINDOW_MS = 5 * 60 * 1000;\nexport const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;\n","import { getSsoOidcClient } from \"./getSsoOidcClient\";\nexport const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {\n const { CreateTokenCommand } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);\n return ssoOidcClient.send(new CreateTokenCommand({\n clientId: ssoToken.clientId,\n clientSecret: ssoToken.clientSecret,\n refreshToken: ssoToken.refreshToken,\n grantType: \"refresh_token\",\n }));\n};\n","export const getSsoOidcClient = async (ssoRegion, init = {}) => {\n const { SSOOIDCClient } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {\n region: ssoRegion ?? init.clientConfig?.region,\n logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger,\n }));\n return ssoOidcClient;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenExpiry = (token) => {\n if (token.expiration && token.expiration.getTime() < Date.now()) {\n throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenKey = (key, value, forRefresh = false) => {\n if (typeof value === \"undefined\") {\n throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? \". Cannot refresh\" : \"\"}. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { getSSOTokenFilepath } from \"@smithy/shared-ini-file-loader\";\nimport { promises as fsPromises } from \"fs\";\nconst { writeFile } = fsPromises;\nexport const writeSSOTokenToFile = (id, ssoToken) => {\n const tokenFilepath = getSSOTokenFilepath(id);\n const tokenString = JSON.stringify(ssoToken, null, 2);\n return writeFile(tokenFilepath, tokenString);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nexport const validateSsoProfile = (profile, logger) => {\n const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", ` +\n `\"sso_region\", \"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\", \")}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });\n }\n return profile;\n};\n","export {};\n"]}
|
package/dist/4RNWLMHM.js
ADDED
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
var __create = Object.create;
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __getProtoOf = Object.getPrototypeOf;
|
|
6
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
7
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
8
|
+
var __require = /* @__PURE__ */ ((x) => typeof require !== "undefined" ? require : typeof Proxy !== "undefined" ? new Proxy(x, {
|
|
9
|
+
get: (a, b) => (typeof require !== "undefined" ? require : a)[b]
|
|
10
|
+
}) : x)(function(x) {
|
|
11
|
+
if (typeof require !== "undefined") return require.apply(this, arguments);
|
|
12
|
+
throw Error('Dynamic require of "' + x + '" is not supported');
|
|
13
|
+
});
|
|
14
|
+
var __esm = (fn, res) => function __init() {
|
|
15
|
+
return fn && (res = (0, fn[__getOwnPropNames(fn)[0]])(fn = 0)), res;
|
|
16
|
+
};
|
|
17
|
+
var __commonJS = (cb, mod) => function __require2() {
|
|
18
|
+
return mod || (0, cb[__getOwnPropNames(cb)[0]])((mod = { exports: {} }).exports, mod), mod.exports;
|
|
19
|
+
};
|
|
20
|
+
var __copyProps = (to, from, except, desc) => {
|
|
21
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
22
|
+
for (let key of __getOwnPropNames(from))
|
|
23
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
24
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
25
|
+
}
|
|
26
|
+
return to;
|
|
27
|
+
};
|
|
28
|
+
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
29
|
+
// If the importer is in node compatibility mode or this is not an ESM
|
|
30
|
+
// file that has been converted to a CommonJS file using a Babel-
|
|
31
|
+
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
32
|
+
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
33
|
+
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
34
|
+
mod
|
|
35
|
+
));
|
|
36
|
+
|
|
37
|
+
// ../../node_modules/.pnpm/tsup@8.4.0_@swc+core@1.12.5_@swc+helpers@0.5.17__postcss@8.5.3_tsx@4.20.4_typescript@5.8.2_yaml@2.8.0/node_modules/tsup/assets/esm_shims.js
|
|
38
|
+
var init_esm_shims = __esm({
|
|
39
|
+
"../../node_modules/.pnpm/tsup@8.4.0_@swc+core@1.12.5_@swc+helpers@0.5.17__postcss@8.5.3_tsx@4.20.4_typescript@5.8.2_yaml@2.8.0/node_modules/tsup/assets/esm_shims.js"() {
|
|
40
|
+
}
|
|
41
|
+
});
|
|
42
|
+
|
|
43
|
+
export { __commonJS, __name, __require, __toESM, init_esm_shims };
|
|
44
|
+
//# sourceMappingURL=4RNWLMHM.js.map
|
|
45
|
+
//# sourceMappingURL=4RNWLMHM.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../node_modules/.pnpm/tsup@8.4.0_@swc+core@1.12.5_@swc+helpers@0.5.17__postcss@8.5.3_tsx@4.20.4_typescript@5.8.2_yaml@2.8.0/node_modules/tsup/assets/esm_shims.js"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,IAAA,cAAA,GAAA,KAAA,CAAA","file":"4RNWLMHM.js","sourcesContent":["// Shim globals in esm bundle\nimport { fileURLToPath } from 'url'\nimport path from 'path'\n\nconst getFilename = () => fileURLToPath(import.meta.url)\nconst getDirname = () => path.dirname(getFilename())\n\nexport const __dirname = /* @__PURE__ */ getDirname()\nexport const __filename = /* @__PURE__ */ getFilename()\n"]}
|