@layerzerolabs/vm-tooling 0.0.60 → 0.0.62
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/2AQAGKCU.cjs +39 -0
- package/dist/2AQAGKCU.cjs.map +1 -0
- package/dist/{M6YAIP2X.cjs → 37UR3RSN.cjs} +10 -10
- package/dist/{M6YAIP2X.cjs.map → 37UR3RSN.cjs.map} +1 -1
- package/dist/{CL6CDQMJ.js → 45K4IRAA.js} +5 -5
- package/dist/{CL6CDQMJ.js.map → 45K4IRAA.js.map} +1 -1
- package/dist/{IQXSRATS.cjs → 4SZ6P77Q.cjs} +30 -30
- package/dist/{IQXSRATS.cjs.map → 4SZ6P77Q.cjs.map} +1 -1
- package/dist/{NUB3VR3D.js → 5JYEGDVK.js} +4 -4
- package/dist/{NUB3VR3D.js.map → 5JYEGDVK.js.map} +1 -1
- package/dist/{IZVZ5TRG.js → 5QGJ7CFM.js} +5 -5
- package/dist/{IZVZ5TRG.js.map → 5QGJ7CFM.js.map} +1 -1
- package/dist/{VVTDADG7.cjs → 7WVEMAKW.cjs} +5 -5
- package/dist/{VVTDADG7.cjs.map → 7WVEMAKW.cjs.map} +1 -1
- package/dist/{VGCATKI5.cjs → AHQNBZE4.cjs} +5 -5
- package/dist/{VGCATKI5.cjs.map → AHQNBZE4.cjs.map} +1 -1
- package/dist/{4RWETOR3.cjs → AMF2EES3.cjs} +23 -23
- package/dist/{4RWETOR3.cjs.map → AMF2EES3.cjs.map} +1 -1
- package/dist/{OGU6CONG.js → BOOCAPHW.js} +5 -5
- package/dist/{OGU6CONG.js.map → BOOCAPHW.js.map} +1 -1
- package/dist/{BPGURM6D.js → CJNBA2MN.js} +6 -4
- package/dist/CJNBA2MN.js.map +1 -0
- package/dist/{72W2AKIC.js → CMSYZVLH.js} +3 -3
- package/dist/{72W2AKIC.js.map → CMSYZVLH.js.map} +1 -1
- package/dist/CYUSPBTH.cjs +8 -0
- package/dist/{YI6EL3AH.cjs.map → CYUSPBTH.cjs.map} +1 -1
- package/dist/{NNE5MIRH.cjs → DEL75SYN.cjs} +284 -284
- package/dist/{NNE5MIRH.cjs.map → DEL75SYN.cjs.map} +1 -1
- package/dist/DPCW4JIV.cjs +53 -0
- package/dist/DPCW4JIV.cjs.map +1 -0
- package/dist/{DK5YZCTB.cjs → EPPFFBGP.cjs} +13 -13
- package/dist/{DK5YZCTB.cjs.map → EPPFFBGP.cjs.map} +1 -1
- package/dist/{W7QMZBXR.cjs → F7OAIAEX.cjs} +26 -26
- package/dist/{W7QMZBXR.cjs.map → F7OAIAEX.cjs.map} +1 -1
- package/dist/{ZGTCJSBO.js → FAOU2ZJO.js} +3 -3
- package/dist/{ZGTCJSBO.js.map → FAOU2ZJO.js.map} +1 -1
- package/dist/{PSSBUABA.cjs → FI3AZBYE.cjs} +7 -7
- package/dist/{PSSBUABA.cjs.map → FI3AZBYE.cjs.map} +1 -1
- package/dist/FKPK53TD.cjs +8 -0
- package/dist/FKPK53TD.cjs.map +1 -0
- package/dist/{F46O4OAT.js → GQAEO3WU.js} +9 -5
- package/dist/GQAEO3WU.js.map +1 -0
- package/dist/GSHFVQRI.cjs +8 -0
- package/dist/{OOTZHKMN.cjs.map → GSHFVQRI.cjs.map} +1 -1
- package/dist/{QO6IEDLG.cjs → HMP4FGDB.cjs} +61 -61
- package/dist/{QO6IEDLG.cjs.map → HMP4FGDB.cjs.map} +1 -1
- package/dist/{2RWEJQEO.cjs → HN3U775J.cjs} +10 -10
- package/dist/{2RWEJQEO.cjs.map → HN3U775J.cjs.map} +1 -1
- package/dist/{4EYI4PYN.cjs → HSC5AWAD.cjs} +211 -211
- package/dist/{4EYI4PYN.cjs.map → HSC5AWAD.cjs.map} +1 -1
- package/dist/{BI33BCZD.js → HVBHNWI7.js} +3 -3
- package/dist/{BI33BCZD.js.map → HVBHNWI7.js.map} +1 -1
- package/dist/{W3N4CNDW.js → JEOLJJ6F.js} +4 -4
- package/dist/{W3N4CNDW.js.map → JEOLJJ6F.js.map} +1 -1
- package/dist/{BXO3RC75.cjs → JGLHYXTW.cjs} +17 -17
- package/dist/{BXO3RC75.cjs.map → JGLHYXTW.cjs.map} +1 -1
- package/dist/{HI4NXK4T.cjs → JLKKDVCL.cjs} +10 -4
- package/dist/JLKKDVCL.cjs.map +1 -0
- package/dist/{LUO6HP3P.cjs → KFOKN2M2.cjs} +62 -62
- package/dist/{LUO6HP3P.cjs.map → KFOKN2M2.cjs.map} +1 -1
- package/dist/{OSR73KYW.cjs → KONCDJAL.cjs} +18 -18
- package/dist/{OSR73KYW.cjs.map → KONCDJAL.cjs.map} +1 -1
- package/dist/{6SVY3NVF.cjs → L6RZSSWB.cjs} +22 -22
- package/dist/{6SVY3NVF.cjs.map → L6RZSSWB.cjs.map} +1 -1
- package/dist/M4PGJV5D.js +6 -0
- package/dist/M4PGJV5D.js.map +1 -0
- package/dist/MMIV5S36.js +51 -0
- package/dist/MMIV5S36.js.map +1 -0
- package/dist/{JGA7AJCX.js → NX66I36H.js} +8 -2
- package/dist/NX66I36H.js.map +1 -0
- package/dist/{FUZCR6WN.cjs → OT5L7ME6.cjs} +273 -273
- package/dist/{FUZCR6WN.cjs.map → OT5L7ME6.cjs.map} +1 -1
- package/dist/{NEQ3DTUV.cjs → OWTMHDOF.cjs} +16 -16
- package/dist/{NEQ3DTUV.cjs.map → OWTMHDOF.cjs.map} +1 -1
- package/dist/{4UZKQNSD.cjs → OZNFYXME.cjs} +20 -20
- package/dist/{4UZKQNSD.cjs.map → OZNFYXME.cjs.map} +1 -1
- package/dist/{OAYLBSRH.cjs → P5BPMTGP.cjs} +40 -40
- package/dist/{OAYLBSRH.cjs.map → P5BPMTGP.cjs.map} +1 -1
- package/dist/{64SMUTQJ.cjs → QYB5VPZE.cjs} +5 -5
- package/dist/{64SMUTQJ.cjs.map → QYB5VPZE.cjs.map} +1 -1
- package/dist/{LJR3ILZB.cjs → S5DRZSZW.cjs} +28 -24
- package/dist/S5DRZSZW.cjs.map +1 -0
- package/dist/{L5ENV2DK.cjs → SPOUVTPR.cjs} +56 -56
- package/dist/{L5ENV2DK.cjs.map → SPOUVTPR.cjs.map} +1 -1
- package/dist/{M5C4OTHX.js → TBDZQONT.js} +6 -6
- package/dist/{M5C4OTHX.js.map → TBDZQONT.js.map} +1 -1
- package/dist/{ABGH4Z56.cjs → TQMUPD75.cjs} +8 -8
- package/dist/{ABGH4Z56.cjs.map → TQMUPD75.cjs.map} +1 -1
- package/dist/{2X4NOJJL.js → U4OLGGKH.js} +5 -5
- package/dist/{2X4NOJJL.js.map → U4OLGGKH.js.map} +1 -1
- package/dist/{VO65XOWD.cjs → U7VZULNU.cjs} +2 -5
- package/dist/U7VZULNU.cjs.map +1 -0
- package/dist/{ZV7VZVS6.js → UHPHZ6AE.js} +3 -3
- package/dist/{ZV7VZVS6.js.map → UHPHZ6AE.js.map} +1 -1
- package/dist/{KS44PBXU.cjs → UN57VWAW.cjs} +438 -438
- package/dist/{KS44PBXU.cjs.map → UN57VWAW.cjs.map} +1 -1
- package/dist/{BVLAV47O.cjs → VZOUGVXS.cjs} +9 -9
- package/dist/{BVLAV47O.cjs.map → VZOUGVXS.cjs.map} +1 -1
- package/dist/{DPDVRYLI.cjs → WDSPHVPJ.cjs} +65 -65
- package/dist/{DPDVRYLI.cjs.map → WDSPHVPJ.cjs.map} +1 -1
- package/dist/{F2ZPATQF.cjs → WH45T4LS.cjs} +10 -10
- package/dist/{F2ZPATQF.cjs.map → WH45T4LS.cjs.map} +1 -1
- package/dist/{XOQZ3G2K.cjs → WHAPJZ3U.cjs} +34 -32
- package/dist/WHAPJZ3U.cjs.map +1 -0
- package/dist/{JWQN2QGP.cjs → Y5ZXTD76.cjs} +147 -147
- package/dist/{JWQN2QGP.cjs.map → Y5ZXTD76.cjs.map} +1 -1
- package/dist/YNMZEV5X.cjs +11 -0
- package/dist/{TC7EHVC2.cjs.map → YNMZEV5X.cjs.map} +1 -1
- package/dist/commands/starknet/build-typescript-sdk.cjs +13 -0
- package/dist/commands/starknet/build-typescript-sdk.cjs.map +1 -0
- package/dist/commands/starknet/build-typescript-sdk.d.ts +2 -0
- package/dist/commands/starknet/build-typescript-sdk.d.ts.map +1 -0
- package/dist/commands/starknet/build-typescript-sdk.js +4 -0
- package/dist/commands/starknet/build-typescript-sdk.js.map +1 -0
- package/dist/commands/starknet/index.cjs +14 -0
- package/dist/commands/starknet/index.cjs.map +1 -0
- package/dist/commands/starknet/index.d.ts +2 -0
- package/dist/commands/starknet/index.d.ts.map +1 -0
- package/dist/commands/starknet/index.js +5 -0
- package/dist/commands/starknet/index.js.map +1 -0
- package/dist/config/index.cjs +9 -9
- package/dist/config/index.js +2 -2
- package/dist/config/tools.cjs +4 -4
- package/dist/config/tools.d.ts.map +1 -1
- package/dist/config/tools.js +2 -2
- package/dist/config/version-matrices.cjs +3 -3
- package/dist/config/version-matrices.d.ts.map +1 -1
- package/dist/config/version-matrices.js +1 -1
- package/dist/core/compatibility.cjs +3 -3
- package/dist/core/index.cjs +14 -14
- package/dist/core/index.js +4 -4
- package/dist/core/lock.cjs +5 -5
- package/dist/core/lock.test.cjs +996 -996
- package/dist/core/tool-executor.cjs +9 -9
- package/dist/core/tool-executor.d.ts +1 -0
- package/dist/core/tool-executor.d.ts.map +1 -1
- package/dist/core/tool-executor.js +4 -4
- package/dist/core/version-resolver.cjs +8 -8
- package/dist/core/version-resolver.js +3 -3
- package/dist/display/formatters.cjs +5 -5
- package/dist/display/formatters.js +3 -3
- package/dist/display/index.cjs +9 -9
- package/dist/display/index.js +4 -4
- package/dist/display/version-display.cjs +7 -7
- package/dist/display/version-display.js +4 -4
- package/dist/index.cjs +28 -24
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +11 -7
- package/dist/index.js.map +1 -1
- package/dist/scripts/generate-github-matrix.cjs +298 -299
- package/dist/scripts/generate-github-matrix.cjs.map +1 -1
- package/dist/scripts/generate-github-matrix.js +9 -10
- package/dist/scripts/generate-github-matrix.js.map +1 -1
- package/dist/types/docker.cjs +2 -2
- package/dist/types/index.cjs +2 -2
- package/dist/types/tool.cjs +2 -2
- package/dist/types/version.cjs +2 -2
- package/dist/types/version.cjs.map +1 -1
- package/dist/types/version.d.ts +1 -0
- package/dist/types/version.d.ts.map +1 -1
- package/dist/types/version.js.map +1 -1
- package/dist/utils/docker.cjs +5 -5
- package/dist/utils/docker.js +2 -2
- package/dist/utils/error.cjs +3 -3
- package/dist/utils/finder.cjs +12 -12
- package/dist/utils/finder.js +2 -2
- package/dist/utils/version.cjs +7 -7
- package/dist/utils/version.js +2 -2
- package/dist/utils.cjs +6 -6
- package/dist/utils.js +2 -2
- package/package.json +6 -5
- package/dist/AY3IP22W.cjs +0 -39
- package/dist/AY3IP22W.cjs.map +0 -1
- package/dist/BPGURM6D.js.map +0 -1
- package/dist/F46O4OAT.js.map +0 -1
- package/dist/HI4NXK4T.cjs.map +0 -1
- package/dist/JGA7AJCX.js.map +0 -1
- package/dist/LJR3ILZB.cjs.map +0 -1
- package/dist/OOTZHKMN.cjs +0 -8
- package/dist/TC7EHVC2.cjs +0 -11
- package/dist/VO65XOWD.cjs.map +0 -1
- package/dist/XOQZ3G2K.cjs.map +0 -1
- package/dist/YI6EL3AH.cjs +0 -8
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var
|
|
4
|
-
var
|
|
5
|
-
var
|
|
6
|
-
var
|
|
7
|
-
var
|
|
3
|
+
var YNMZEV5X_cjs = require('./YNMZEV5X.cjs');
|
|
4
|
+
var L6RZSSWB_cjs = require('./L6RZSSWB.cjs');
|
|
5
|
+
var WHAPJZ3U_cjs = require('./WHAPJZ3U.cjs');
|
|
6
|
+
var TQMUPD75_cjs = require('./TQMUPD75.cjs');
|
|
7
|
+
var U7VZULNU_cjs = require('./U7VZULNU.cjs');
|
|
8
8
|
var fs = require('fs');
|
|
9
9
|
var path = require('path');
|
|
10
10
|
var process = require('process');
|
|
@@ -18,14 +18,14 @@ var path__default = /*#__PURE__*/_interopDefault(path);
|
|
|
18
18
|
var process__default = /*#__PURE__*/_interopDefault(process);
|
|
19
19
|
|
|
20
20
|
// src/core/tool-executor.ts
|
|
21
|
-
|
|
21
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
22
22
|
zx.$.verbose = true;
|
|
23
23
|
zx.$.stdio = [
|
|
24
24
|
"inherit",
|
|
25
25
|
"pipe",
|
|
26
26
|
process__default.default.stderr
|
|
27
27
|
];
|
|
28
|
-
var mergeVolumes = /* @__PURE__ */
|
|
28
|
+
var mergeVolumes = /* @__PURE__ */ U7VZULNU_cjs.__name((defaultVolumes, userVolumes) => {
|
|
29
29
|
const paths = new Set(userVolumes.map((volume) => volume.containerPath));
|
|
30
30
|
return [
|
|
31
31
|
...userVolumes,
|
|
@@ -43,7 +43,7 @@ async function ensureDockerImage(imageURI) {
|
|
|
43
43
|
console.info("\u{1F4E5} Pulling Docker image from ECR:", imageURI);
|
|
44
44
|
output = await zx.$`docker pull ${imageURI}`.nothrow();
|
|
45
45
|
} catch (error) {
|
|
46
|
-
throw new Error(`Failed to pull Docker image ${imageURI}: ${
|
|
46
|
+
throw new Error(`Failed to pull Docker image ${imageURI}: ${YNMZEV5X_cjs.stringifyError(error)}`);
|
|
47
47
|
}
|
|
48
48
|
if (output.exitCode) {
|
|
49
49
|
throw new Error([
|
|
@@ -51,21 +51,21 @@ async function ensureDockerImage(imageURI) {
|
|
|
51
51
|
` - ECR image: ${imageURI} (pull failed)`,
|
|
52
52
|
"",
|
|
53
53
|
"\u{1F4A1} Solutions:",
|
|
54
|
-
` 1. Authenticate with ECR: aws ecr get-login-password --region ${
|
|
54
|
+
` 1. Authenticate with ECR: aws ecr get-login-password --region ${WHAPJZ3U_cjs.AWS_REGION} | docker login --username AWS --password-stdin ${WHAPJZ3U_cjs.AWS_ACCOUNT_ID}.dkr.ecr.${WHAPJZ3U_cjs.AWS_REGION}.amazonaws.com`,
|
|
55
55
|
" 2. Check if the image tag exists in ECR."
|
|
56
56
|
].join("\n"));
|
|
57
57
|
}
|
|
58
58
|
console.info(`\u2705 Successfully pulled: ${imageURI}`);
|
|
59
59
|
}
|
|
60
|
-
|
|
60
|
+
U7VZULNU_cjs.__name(ensureDockerImage, "ensureDockerImage");
|
|
61
61
|
async function executeToolCommand(command, args, options) {
|
|
62
|
-
const { cwd, volumes: userVolumes, customEntrypoint: entrypoint, env: customEnvVars, script } = options;
|
|
63
|
-
const tool =
|
|
64
|
-
const type =
|
|
62
|
+
const { cwd, volumes: userVolumes, customEntrypoint: entrypoint, env: customEnvVars, script, publish } = options;
|
|
63
|
+
const tool = WHAPJZ3U_cjs.findToolByName(command);
|
|
64
|
+
const type = WHAPJZ3U_cjs.getChainTypeForTool(command);
|
|
65
65
|
if (type === void 0) {
|
|
66
66
|
throw new Error([
|
|
67
67
|
`Tool '${command}' not found or no type configuration available.`,
|
|
68
|
-
`Available tools: ${
|
|
68
|
+
`Available tools: ${WHAPJZ3U_cjs.tools.map(({ name }) => name).join(", ")}`,
|
|
69
69
|
`Try: lz-tool --list-versions to see all available tools`
|
|
70
70
|
].join("\n"));
|
|
71
71
|
}
|
|
@@ -80,8 +80,8 @@ async function executeToolCommand(command, args, options) {
|
|
|
80
80
|
}
|
|
81
81
|
}
|
|
82
82
|
}
|
|
83
|
-
const userSpecifiedVersions =
|
|
84
|
-
const versionResult =
|
|
83
|
+
const userSpecifiedVersions = L6RZSSWB_cjs.extractUserVersions(options);
|
|
84
|
+
const versionResult = L6RZSSWB_cjs.resolveTypeVersions(type, userSpecifiedVersions, options, cwd);
|
|
85
85
|
for (const warning of versionResult.warnings) {
|
|
86
86
|
console.warn(warning);
|
|
87
87
|
}
|
|
@@ -98,14 +98,14 @@ async function executeToolCommand(command, args, options) {
|
|
|
98
98
|
const resolvedVersionObj = {
|
|
99
99
|
version: resolvedVersion
|
|
100
100
|
};
|
|
101
|
-
if (!
|
|
101
|
+
if (!WHAPJZ3U_cjs.versionsSatisfied(secondaryVersion, resolvedVersionObj)) {
|
|
102
102
|
console.warn(`Warning: Local configuration version (${secondaryVersion.version}) differs from resolved version (${resolvedVersion})`);
|
|
103
103
|
}
|
|
104
104
|
} catch (error) {
|
|
105
|
-
console.warn("Could not validate secondary version:",
|
|
105
|
+
console.warn("Could not validate secondary version:", YNMZEV5X_cjs.stringifyError(error));
|
|
106
106
|
}
|
|
107
107
|
}
|
|
108
|
-
const imageURI =
|
|
108
|
+
const imageURI = WHAPJZ3U_cjs.getImageURI(tool.name, resolvedVersion);
|
|
109
109
|
const workspaceRoot = await commonNodeUtils.getFullyQualifiedRepoRootPath();
|
|
110
110
|
const relativePath = path__default.default.relative(workspaceRoot, cwd);
|
|
111
111
|
await ensureDockerImage(imageURI);
|
|
@@ -164,6 +164,10 @@ async function executeToolCommand(command, args, options) {
|
|
|
164
164
|
`${workspaceRoot}:/workspace`,
|
|
165
165
|
"-w",
|
|
166
166
|
`/workspace/${relativePath}`,
|
|
167
|
+
...publish ? [
|
|
168
|
+
"-p",
|
|
169
|
+
publish.trim()
|
|
170
|
+
] : [],
|
|
167
171
|
...volumeArgs,
|
|
168
172
|
...entrypoint ? [
|
|
169
173
|
"--entrypoint",
|
|
@@ -172,7 +176,7 @@ async function executeToolCommand(command, args, options) {
|
|
|
172
176
|
imageURI,
|
|
173
177
|
...finalArgs
|
|
174
178
|
];
|
|
175
|
-
const output = await
|
|
179
|
+
const output = await TQMUPD75_cjs.lockMany(volumes.flatMap((volume) => volume.type === "isolate" && volume.locked ? [
|
|
176
180
|
volume.name
|
|
177
181
|
] : []), () => zx.$`docker ${dockerArgs}`.nothrow());
|
|
178
182
|
saveAptosModulesOrder(command, output, workspaceRoot, relativePath);
|
|
@@ -181,7 +185,7 @@ async function executeToolCommand(command, args, options) {
|
|
|
181
185
|
process__default.default.exit(exitCode ?? 1);
|
|
182
186
|
}
|
|
183
187
|
}
|
|
184
|
-
|
|
188
|
+
U7VZULNU_cjs.__name(executeToolCommand, "executeToolCommand");
|
|
185
189
|
function saveAptosModulesOrder(command, processOutput, workspaceRoot, relPath) {
|
|
186
190
|
if ("aptos" === command) {
|
|
187
191
|
const outputJson = processOutput.json();
|
|
@@ -189,8 +193,8 @@ function saveAptosModulesOrder(command, processOutput, workspaceRoot, relPath) {
|
|
|
189
193
|
fs__default.default.writeFileSync(path__default.default.join(workspaceRoot, relPath, "modules.json"), JSON.stringify(modules, null, 2));
|
|
190
194
|
}
|
|
191
195
|
}
|
|
192
|
-
|
|
196
|
+
U7VZULNU_cjs.__name(saveAptosModulesOrder, "saveAptosModulesOrder");
|
|
193
197
|
|
|
194
198
|
exports.executeToolCommand = executeToolCommand;
|
|
195
|
-
//# sourceMappingURL=
|
|
196
|
-
//# sourceMappingURL=
|
|
199
|
+
//# sourceMappingURL=S5DRZSZW.cjs.map
|
|
200
|
+
//# sourceMappingURL=S5DRZSZW.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/core/tool-executor.ts"],"names":["init_cjs_shims","$","verbose","stdio","process","stderr","mergeVolumes","__name","defaultVolumes","userVolumes","paths","Set","map","volume","containerPath","filter","has","ensureDockerImage","imageURI","output","nothrow","stdout","includes","split","console","info","error","Error","stringifyError","exitCode","AWS_REGION","AWS_ACCOUNT_ID","join","executeToolCommand","command","args","options","cwd","volumes","customEntrypoint","entrypoint","env","customEnvVars","script","publish","tool","findToolByName","type","getChainTypeForTool","undefined","tools","name","length","overrides","uv","some","dv","userSpecifiedVersions","extractUserVersions","versionResult","resolveTypeVersions","warning","warnings","warn","resolvedVersion","resolvedVersions","getSecondaryVersionCheckValue","secondaryVersion","resolvedVersionObj","version","versionsSatisfied","getImageURI","workspaceRoot","getFullyQualifiedRepoRootPath","relativePath","path","relative","volumeArgs","hostPath","components","shared","packageName","npm_package_name","push","basename","flatMap","trim","envArgs","envVar","value","flat","finalArgs","dockerArgs","privileged","lockMany","locked","saveAptosModulesOrder","exit","processOutput","relPath","outputJson","json","modules","Result","item","fs","writeFileSync","JSON","stringify"],"mappings":";;;;;;;;;;;;;;;;;;;;AAAAA,2BAAA,EAAA;AAiBAC,IAAAA,CAAEC,OAAAA,GAAU,IAAA;AACZD,IAAAA,CAAEE,KAAAA,GAAQ;AAAC,EAAA,SAAA;AAAW,EAAA,MAAA;EAAQC,wBAAAA,CAAQC;;AAMtC,IAAMC,YAAAA,mBAAeC,mBAAA,CAAA,CACjBC,cAAAA,EACAC,WAAAA,KAAAA;AAEA,EAAA,MAAMC,KAAAA,GAAQ,IAAIC,GAAAA,CAAIF,WAAAA,CAAYG,IAAI,CAACC,MAAAA,KAAWA,MAAAA,CAAOC,aAAa,CAAA,CAAA;AAEtE,EAAA,OAAO;AAAIL,IAAAA,GAAAA,WAAAA;OAAgBD,cAAAA,CAAeO,MAAAA,CAAO,CAACF,MAAAA,KAAW,CAACH,MAAMM,GAAAA,CAAIH,MAAAA,CAAOC,aAAa,CAAA;;AAChG,CAAA,EAPqB,cAAA,CAAA;AASrB,eAAeG,kBAAkBC,QAAAA,EAAgB;AAC7C,EAAA,IAAIC,MAAAA;AAEJ,EAAA,IAAI;AAEAA,IAAAA,MAAAA,GAAS,MAAMlB,IAAAA,CAAAA,gBAAAA,EAAoBiB,QAAAA,CAAAA,CAAAA,CAAWE,OAAAA,EAAO;AAErD,IAAA,IAAID,MAAAA,CAAOE,OAAOC,QAAAA,CAASJ,QAAAA,CAASK,MAAM,GAAA,CAAA,CAAK,CAAA,CAAE,CAAA,EAAG;AAChDC,MAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,kCAAA,EAAgCP,QAAAA,CAAAA,CAAU,CAAA;AACvD,MAAA;AACJ,IAAA;AAEAM,IAAAA,OAAAA,CAAQC,IAAAA,CAAK,4CAAqCP,QAAAA,CAAAA;AAClDC,IAAAA,MAAAA,GAAS,MAAMlB,IAAAA,CAAAA,YAAAA,EAAgBiB,QAAAA,CAAAA,CAAAA,CAAWE,OAAAA,EAAO;AACrD,EAAA,CAAA,CAAA,OAASM,KAAAA,EAAgB;AACrB,IAAA,MAAM,IAAIC,MAAM,CAAA,4BAAA,EAA+BT,QAAAA,KAAaU,2BAAAA,CAAeF,KAAAA,CAAAA,CAAAA,CAAQ,CAAA;AACvF,EAAA;AAEA,EAAA,IAAIP,OAAOU,QAAAA,EAAU;AACjB,IAAA,MAAM,IAAIF,KAAAA,CACN;AACI,MAAA,6BAAA;AACA,MAAA,CAAA,eAAA,EAAkBT,QAAAA,CAAAA,cAAAA,CAAAA;AAClB,MAAA,EAAA;AACA,MAAA,sBAAA;AACA,MAAA,CAAA,gEAAA,EAAmEY,uBAAAA,CAAAA,gDAAAA,EACfC,2BAAAA,CAAAA,SAAAA,EAA0BD,uBAAAA,CAAAA,cAAAA,CAAAA;AAC9E,MAAA;AACFE,KAAAA,CAAAA,IAAAA,CAAK,IAAA,CAAA,CAAA;AAEf,EAAA;AAEAR,EAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,4BAAA,EAA0BP,QAAAA,CAAAA,CAAU,CAAA;AACrD;AAjCeD,mBAAAA,CAAAA,iBAAAA,EAAAA,mBAAAA,CAAAA;AAsCf,eAAsBgB,kBAAAA,CAClBC,OAAAA,EACAC,IAAAA,EACAC,OAAAA,EAQC;AAED,EAAA,MAAM,EACFC,GAAAA,EACAC,OAAAA,EAAS7B,WAAAA,EACT8B,gBAAAA,EAAkBC,YAClBC,GAAAA,EAAKC,aAAAA,EACLC,MAAAA,EACAC,OAAAA,EAAO,GACPR,OAAAA;AAEJ,EAAA,MAAMS,IAAAA,GAAOC,4BAAeZ,OAAAA,CAAAA;AAC5B,EAAA,MAAMa,IAAAA,GAAOC,iCAAoBd,OAAAA,CAAAA;AAEjC,EAAA,IAAIa,SAASE,MAAAA,EAAW;AACpB,IAAA,MAAM,IAAItB,KAAAA,CACN;AACI,MAAA,CAAA,MAAA,EAASO,OAAAA,CAAAA,+CAAAA,CAAAA;MACT,CAAA,iBAAA,EAAoBgB,kBAAAA,CAAMtC,GAAAA,CAAI,CAAC,EAAEuC,IAAAA,OAAWA,IAAAA,CAAAA,CAAMnB,IAAAA,CAAK,IAAA,CAAA,CAAA,CAAA;AACvD,MAAA,CAAA,uDAAA;AACFA,KAAAA,CAAAA,IAAAA,CAAK,IAAA,CAAA,CAAA;AAEf,EAAA;AAGA,EAAA,MAAMxB,cAAAA,GAAiBqC,IAAAA,CAAKrC,cAAAA,IAAkB,EAAA;AAC9C,EAAA,MAAM8B,OAAAA,GAAUhC,YAAAA,CAAaE,cAAAA,EAAgBC,WAAAA,CAAAA;AAE7C,EAAA,IAAID,cAAAA,CAAe4C,SAAS,CAAA,EAAG;AAC3B5B,IAAAA,OAAAA,CAAQC,KAAK,CAAA,gBAAA,EAAYjB,cAAAA,CAAe4C,MAAM,CAAA,6BAAA,EAAgClB,OAAAA,CAAAA,CAAS,CAAA;AACvF,IAAA,IAAIzB,WAAAA,CAAY2C,SAAS,CAAA,EAAG;AACxB,MAAA,MAAMC,SAAAA,GAAY5C,WAAAA,CAAYM,MAAAA,CAAO,CAACuC,EAAAA,KAClC9C,cAAAA,CAAe+C,IAAAA,CAAK,CAACC,EAAAA,KAAOA,EAAAA,CAAG1C,aAAAA,KAAkBwC,EAAAA,CAAGxC,aAAa,CAAA,CAAA;AAErE,MAAA,IAAIuC,SAAAA,CAAUD,SAAS,CAAA,EAAG;AACtB5B,QAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,gCAAA,EAA4B4B,SAAAA,CAAUD,MAAM,CAAA,kBAAA,CAAoB,CAAA;AACjF,MAAA;AACJ,IAAA;AACJ,EAAA;AAGA,EAAA,MAAMK,qBAAAA,GAAwBC,iCAAoBtB,OAAAA,CAAAA;AAGlD,EAAA,MAAMuB,aAAAA,GAAgBC,gCAAAA,CAAoBb,IAAAA,EAAMU,qBAAAA,EAAuBrB,SAASC,GAAAA,CAAAA;AAEhF,EAAA,KAAA,MAAWwB,OAAAA,IAAWF,cAAcG,QAAAA,EAAU;AAC1CtC,IAAAA,OAAAA,CAAQuC,KAAKF,OAAAA,CAAAA;AACjB,EAAA;AAGA,EAAA,MAAMG,eAAAA,GAAkBL,aAAAA,CAAcM,gBAAAA,CAAiB/B,OAAAA,CAAAA;AACvD,EAAA,IAAI,OAAO8B,eAAAA,KAAoB,QAAA,IAAYA,eAAAA,KAAoB,EAAA,EAAI;AAC/D,IAAA,MAAM,IAAIrC,KAAAA,CAAM,CAAA,6BAAA,EAAgCO,OAAAA,CAAAA,CAAS,CAAA;AAC7D,EAAA;AAEAV,EAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,UAAA,EAAMS,OAAAA,CAAAA,UAAAA,EAAoB8B,eAAAA,CAAAA,CAAiB,CAAA;AAGxD,EAAA,IAAInB,KAAKqB,6BAAAA,EAA+B;AACpC,IAAA,IAAI;AACA,MAAA,MAAMC,gBAAAA,GAAmBtB,KAAKqB,6BAAAA,CAA8B;AAAE7B,QAAAA;OAAI,CAAA;AAClE,MAAA,MAAM+B,kBAAAA,GAA8B;QAAEC,OAAAA,EAASL;AAAgB,OAAA;AAE/D,MAAA,IAAI,CAACM,8BAAAA,CAAkBH,gBAAAA,EAAkBC,kBAAAA,CAAAA,EAAqB;AAC1D5C,QAAAA,OAAAA,CAAQuC,KACJ,CAAA,sCAAA,EAAyCI,gBAAAA,CAAiBE,OAAO,CAAA,iCAAA,EAAoCL,eAAAA,CAAAA,CAAAA,CAAkB,CAAA;AAE/H,MAAA;AACJ,IAAA,CAAA,CAAA,OAAStC,KAAAA,EAAO;AAEZF,MAAAA,OAAAA,CAAQuC,IAAAA,CAAK,uCAAA,EAAyCnC,2BAAAA,CAAeF,KAAAA,CAAAA,CAAAA;AACzE,IAAA;AACJ,EAAA;AAGA,EAAA,MAAMR,QAAAA,GAAWqD,wBAAAA,CAAY1B,IAAAA,CAAKM,IAAAA,EAAMa,eAAAA,CAAAA;AACxC,EAAA,MAAMQ,aAAAA,GAAgB,MAAMC,6CAAAA,EAAAA;AAC5B,EAAA,MAAMC,YAAAA,GAAeC,qBAAAA,CAAKC,QAAAA,CAASJ,aAAAA,EAAenC,GAAAA,CAAAA;AAElD,EAAA,MAAMpB,kBAAkBC,QAAAA,CAAAA;AAExB,EAAA,MAAM2D,UAAAA,GAAavC,OAAAA,CACd1B,GAAAA,CAAI,CAACC,MAAAA,KAAAA;AACF,IAAA,IAAIA,MAAAA,CAAOkC,SAAS,MAAA,EAAQ;AACxB,MAAA,OAAO,CAAA,EAAGlC,MAAAA,CAAOiE,QAAQ,CAAA,CAAA,EAAIjE,OAAOC,aAAa,CAAA,CAAA;AACrD,IAAA;AAEA,IAAA,MAAMiE,UAAAA,GAAa;AAAC,MAAA,kBAAA;MAAoBlE,MAAAA,CAAOsC;;AAE/C,IAAA,IAAI,CAACtC,OAAOmE,MAAAA,EAAQ;AAGhB,MAAA,MAAMC,WAAAA,GAAc7E,yBAAQqC,GAAAA,CAAIyC,gBAAAA;AAEhC,MAAA,IAAI,CAACD,WAAAA,EAAa;AACd,QAAA,MAAM,IAAItD,MAAM,mDAAA,CAAA;AACpB,MAAA;AAEAoD,MAAAA,UAAAA,CAAWI,IAAAA,CAAKR,qBAAAA,CAAKS,QAAAA,CAASH,WAAAA,CAAAA,CAAAA;AAClC,IAAA;AAEA,IAAA,OAAO,GAAGF,UAAAA,CAAW/C,IAAAA,CAAK,GAAA,CAAA,CAAA,CAAA,EAAQnB,OAAOC,aAAa,CAAA,CAAA;EAC1D,CAAA,CAAA,CACCuE,OAAAA,CAAQ,CAACxE,MAAAA,KAAW;AAAC,IAAA,IAAA;AAAMA,IAAAA;AAAO,GAAA,CAAA;AAEvC,EAAA,IAAI2B,UAAAA,EAAY8C,MAAAA,EAAQ;AACpB9D,IAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,mCAAA,EAA+Be,UAAAA,CAAAA,CAAY,CAAA;AAC5D,EAAA;AAGA,EAAA,MAAM+C,OAAAA,GAAU7C,aAAAA,CAAc9B,GAAAA,CAAI,CAAC4E,MAAAA,KAAW;AAAC,IAAA,IAAA;AAAM,IAAA,CAAA,EAAGA,MAAAA,CAAOrC,IAAI,CAAA,CAAA,EAAIqC,MAAAA,CAAOC,KAAK,CAAA;AAAG,GAAA,CAAA,CAAEC,IAAAA,EAAI;AAE5F,EAAA,IAAIhD,aAAAA,CAAcU,SAAS,CAAA,EAAG;AAC1B5B,IAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,gBAAA,EAAYiB,aAAAA,CAAcU,MAAM,CAAA,+BAAA,CAAiC,CAAA;AAClF,EAAA;AAGA,EAAA,IAAIuC,SAAAA;AACJ,EAAA,IAAIhD,MAAAA,IAAUA,MAAAA,CAAO2C,IAAAA,EAAI,KAAO,EAAA,EAAI;AAChC9D,IAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,mCAAA,EAA+BkB,MAAAA,CAAAA,CAAQ,CAAA;AACpDgD,IAAAA,SAAAA,GAAY;AAAC,MAAA,MAAA;AAAQ,MAAA,IAAA;AAAMhD,MAAAA;;EAC/B,CAAA,MAAO;AACHgD,IAAAA,SAAAA,GAAYnD,eAAeS,MAAAA,GAAY;MAACJ,IAAAA,CAAKM,IAAAA;AAAShB,MAAAA,GAAAA;AAAQA,KAAAA,GAAAA,IAAAA;AAClE,EAAA;AAGA,EAAA,MAAMyD,UAAAA,GAAa;AACf,IAAA,KAAA;AACI/C,IAAAA,GAAAA,IAAAA,CAAKgD,UAAAA,GAAa;AAAC,MAAA;QAAkB,EAAA;AACzC,IAAA,MAAA;AACGN,IAAAA,GAAAA,OAAAA;AACH,IAAA,IAAA;AACA,IAAA,CAAA,EAAGf,aAAAA,CAAAA,WAAAA,CAAAA;AACH,IAAA,IAAA;AACA,IAAA,CAAA,WAAA,EAAcE,YAAAA,CAAAA,CAAAA;OACV9B,OAAAA,GAAU;AAAC,MAAA,IAAA;AAAMA,MAAAA,OAAAA,CAAQ0C,IAAAA;QAAU,EAAA;AACpCT,IAAAA,GAAAA,UAAAA;OACCrC,UAAAA,GAAa;AAAC,MAAA,cAAA;AAAgBA,MAAAA;QAAc,EAAA;AAChDtB,IAAAA,QAAAA;AACGyE,IAAAA,GAAAA;;AAGP,EAAA,MAAMxE,MAAAA,GAAS,MAAM2E,qBAAAA,CACjBxD,OAAAA,CAAQ+C,OAAAA,CAAQ,CAACxE,MAAAA,KACbA,MAAAA,CAAOkC,IAAAA,KAAS,SAAA,IAAalC,MAAAA,CAAOkF,MAAAA,GAAS;IAAClF,MAAAA,CAAOsC;AAAQ,GAAA,GAAA,EAAE,CAAA,EAEnE,MAAMlD,cAAW2F,UAAAA,CAAAA,CAAAA,CAAaxE,SAAO,CAAA;AAEzC4E,EAAAA,qBAAAA,CAAsB9D,OAAAA,EAASf,MAAAA,EAAQqD,aAAAA,EAAeE,YAAAA,CAAAA;AAGtD,EAAA,MAAM,EAAE7C,UAAQ,GAAKV,MAAAA;AACrB,EAAA,IAAIU,aAAa,CAAA,EAAG;AAChBzB,IAAAA,wBAAAA,CAAQ6F,IAAAA,CAAKpE,YAAY,CAAA,CAAA;AAC7B,EAAA;AACJ;AAvKsBI,mBAAAA,CAAAA,kBAAAA,EAAAA,oBAAAA,CAAAA;AAyKtB,SAAS+D,qBAAAA,CACL9D,OAAAA,EACAgE,aAAAA,EACA1B,aAAAA,EACA2B,OAAAA,EAAe;AAEf,EAAA,IAAI,YAAYjE,OAAAA,EAAS;AACrB,IAAA,MAAMkE,UAAAA,GAAmCF,cAAcG,IAAAA,EAAI;AAC3D,IAAA,MAAMC,OAAAA,GAAUF,UAAAA,CAAWG,MAAAA,CAAO3F,GAAAA,CAAI,CAAC4F,IAAAA,KAAiB,CAAA,EAAGA,IAAAA,CAAKjF,KAAAA,CAAM,IAAA,CAAA,CAAM,CAAA,CAAE,CAAA,GAAA,CAAK,CAAA;AACnFkF,IAAAA,mBAAAA,CAAGC,aAAAA,CACC/B,qBAAAA,CAAK3C,IAAAA,CAAKwC,aAAAA,EAAe2B,OAAAA,EAAS,cAAA,CAAA,EAClCQ,IAAAA,CAAKC,SAAAA,CAAUN,OAAAA,EAAS,IAAA,EAAM,CAAA,CAAA,CAAA;AAEtC,EAAA;AACJ;AAdSN,mBAAAA,CAAAA,qBAAAA,EAAAA,uBAAAA,CAAAA","file":"S5DRZSZW.cjs","sourcesContent":["import fs from 'node:fs';\nimport path from 'node:path';\nimport process from 'node:process';\nimport { $, type ProcessOutput } from 'zx';\n\nimport { getFullyQualifiedRepoRootPath } from '@layerzerolabs/common-node-utils';\n\nimport { AWS_ACCOUNT_ID, AWS_REGION, tools } from '../config';\nimport type { EnvironmentVariable, Version, VolumeMapping } from '../types';\nimport { getImageURI } from '../utils/docker';\nimport { stringifyError } from '../utils/error';\nimport { findToolByName, getChainTypeForTool } from '../utils/finder';\nimport { versionsSatisfied } from '../utils/version';\nimport { lockMany } from './lock';\nimport { extractUserVersions, resolveTypeVersions } from './version-resolver';\n\n// Configure zx to inherit stdio by default (moved from original setup)\n$.verbose = true;\n$.stdio = ['inherit', 'pipe', process.stderr];\n\n/**\n * Merge default volumes with user-specified volumes\n * User volumes take precedence when containerPath conflicts\n */\nconst mergeVolumes = (\n defaultVolumes: VolumeMapping[],\n userVolumes: VolumeMapping[],\n): VolumeMapping[] => {\n const paths = new Set(userVolumes.map((volume) => volume.containerPath));\n\n return [...userVolumes, ...defaultVolumes.filter((volume) => !paths.has(volume.containerPath))];\n};\n\nasync function ensureDockerImage(imageURI: string): Promise<void> {\n let output: ProcessOutput;\n\n try {\n // Check local images first.\n output = await $`docker image ls ${imageURI}`.nothrow();\n\n if (output.stdout.includes(imageURI.split(':')[1])) {\n console.info(`✅ Using cached Docker image: ${imageURI}`);\n return;\n }\n\n console.info('📥 Pulling Docker image from ECR:', imageURI);\n output = await $`docker pull ${imageURI}`.nothrow();\n } catch (error: unknown) {\n throw new Error(`Failed to pull Docker image ${imageURI}: ${stringifyError(error)}`);\n }\n\n if (output.exitCode) {\n throw new Error(\n [\n 'Docker image not available:',\n ` - ECR image: ${imageURI} (pull failed)`,\n '',\n '💡 Solutions:',\n ` 1. Authenticate with ECR: aws ecr get-login-password --region ${AWS_REGION} | ` +\n `docker login --username AWS --password-stdin ${AWS_ACCOUNT_ID}.dkr.ecr.${AWS_REGION}.amazonaws.com`,\n ' 2. Check if the image tag exists in ECR.',\n ].join('\\n'),\n );\n }\n\n console.info(`✅ Successfully pulled: ${imageURI}`);\n}\n\n/**\n * Enhanced tool command execution using the new version compatibility matrix system\n */\nexport async function executeToolCommand(\n command: string,\n args: string[],\n options: {\n cwd: string;\n volumes: VolumeMapping[];\n customEntrypoint?: string;\n env: EnvironmentVariable[];\n script?: string;\n [key: string]: unknown;\n publish?: string;\n },\n): Promise<void> {\n const {\n cwd,\n volumes: userVolumes,\n customEntrypoint: entrypoint,\n env: customEnvVars,\n script,\n publish,\n } = options;\n\n const tool = findToolByName(command);\n const type = getChainTypeForTool(command);\n\n if (type === undefined) {\n throw new Error(\n [\n `Tool '${command}' not found or no type configuration available.`,\n `Available tools: ${tools.map(({ name }) => name).join(', ')}`,\n `Try: lz-tool --list-versions to see all available tools`,\n ].join('\\n'),\n );\n }\n\n // Merge default volumes with user-specified volumes\n const defaultVolumes = tool.defaultVolumes ?? [];\n const volumes = mergeVolumes(defaultVolumes, userVolumes);\n\n if (defaultVolumes.length > 0) {\n console.info(`📦 Using ${defaultVolumes.length} default cache volume(s) for ${command}`);\n if (userVolumes.length > 0) {\n const overrides = userVolumes.filter((uv) =>\n defaultVolumes.some((dv) => dv.containerPath === uv.containerPath),\n );\n if (overrides.length > 0) {\n console.info(`🔧 User volumes override ${overrides.length} default volume(s)`);\n }\n }\n }\n\n // Extract user-specified versions from command line options\n const userSpecifiedVersions = extractUserVersions(options);\n\n // Resolve versions for all tools in the type using compatibility matrix\n const versionResult = resolveTypeVersions(type, userSpecifiedVersions, options, cwd);\n\n for (const warning of versionResult.warnings) {\n console.warn(warning);\n }\n\n // Get the resolved version for the current tool\n const resolvedVersion = versionResult.resolvedVersions[command];\n if (typeof resolvedVersion !== 'string' || resolvedVersion === '') {\n throw new Error(`No version resolved for tool ${command}`);\n }\n\n console.info(`🔧 ${command} version: ${resolvedVersion}`);\n\n // Check secondary version validation if available\n if (tool.getSecondaryVersionCheckValue) {\n try {\n const secondaryVersion = tool.getSecondaryVersionCheckValue({ cwd });\n const resolvedVersionObj: Version = { version: resolvedVersion };\n\n if (!versionsSatisfied(secondaryVersion, resolvedVersionObj)) {\n console.warn(\n `Warning: Local configuration version (${secondaryVersion.version}) differs from resolved version (${resolvedVersion})`,\n );\n }\n } catch (error) {\n // Secondary version check failed, but continue with resolved version\n console.warn('Could not validate secondary version:', stringifyError(error));\n }\n }\n\n // Use Docker image with merged volumes\n const imageURI = getImageURI(tool.name, resolvedVersion);\n const workspaceRoot = await getFullyQualifiedRepoRootPath();\n const relativePath = path.relative(workspaceRoot, cwd);\n\n await ensureDockerImage(imageURI);\n\n const volumeArgs = volumes\n .map((volume) => {\n if (volume.type === 'host') {\n return `${volume.hostPath}:${volume.containerPath}`;\n }\n\n const components = ['lz-tooling-cache', volume.name];\n\n if (!volume.shared) {\n // This is the package name where the `lz-tool` command is executed.\n // eslint-disable-next-line turbo/no-undeclared-env-vars\n const packageName = process.env.npm_package_name;\n\n if (!packageName) {\n throw new Error('npm_package_name environment variable not defined');\n }\n\n components.push(path.basename(packageName));\n }\n\n return `${components.join('-')}:${volume.containerPath}`;\n })\n .flatMap((volume) => ['-v', volume]);\n\n if (entrypoint?.trim()) {\n console.info(`🔧 Using custom entrypoint: ${entrypoint}`);\n }\n\n // Build the Docker command with proper argument separation\n const envArgs = customEnvVars.map((envVar) => ['-e', `${envVar.name}=${envVar.value}`]).flat();\n\n if (customEnvVars.length > 0) {\n console.info(`🌍 Using ${customEnvVars.length} custom environment variable(s)`);\n }\n\n // Handle custom script execution\n let finalArgs: string[];\n if (script && script.trim() !== '') {\n console.info(`📜 Executing custom script: ${script}`);\n finalArgs = ['bash', '-c', script];\n } else {\n finalArgs = entrypoint === undefined ? [tool.name, ...args] : args;\n }\n\n // Build the Docker command with proper argument separation\n const dockerArgs = [\n 'run',\n ...(tool.privileged ? ['--privileged'] : []),\n '--rm',\n ...envArgs,\n '-v',\n `${workspaceRoot}:/workspace`,\n '-w',\n `/workspace/${relativePath}`,\n ...(publish ? ['-p', publish.trim()] : []),\n ...volumeArgs,\n ...(entrypoint ? ['--entrypoint', entrypoint] : []),\n imageURI,\n ...finalArgs,\n ];\n\n const output = await lockMany(\n volumes.flatMap((volume) =>\n volume.type === 'isolate' && volume.locked ? [volume.name] : [],\n ),\n () => $`docker ${dockerArgs}`.nothrow(),\n );\n saveAptosModulesOrder(command, output, workspaceRoot, relativePath);\n\n // Handle the process completion\n const { exitCode } = output;\n if (exitCode !== 0) {\n process.exit(exitCode ?? 1);\n }\n}\n\nfunction saveAptosModulesOrder(\n command: string,\n processOutput: ProcessOutput,\n workspaceRoot: string,\n relPath: string,\n): void {\n if ('aptos' === command) {\n const outputJson: { Result: string[] } = processOutput.json();\n const modules = outputJson.Result.map((item: string) => `${item.split('::')[1]}.mv`);\n fs.writeFileSync(\n path.join(workspaceRoot, relPath, 'modules.json'),\n JSON.stringify(modules, null, 2),\n );\n }\n}\n"]}
|
|
@@ -1,56 +1,56 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var
|
|
4
|
-
var
|
|
5
|
-
require('./
|
|
6
|
-
var
|
|
7
|
-
var
|
|
3
|
+
var P5BPMTGP_cjs = require('./P5BPMTGP.cjs');
|
|
4
|
+
var _7WVEMAKW_cjs = require('./7WVEMAKW.cjs');
|
|
5
|
+
require('./WDSPHVPJ.cjs');
|
|
6
|
+
var JGLHYXTW_cjs = require('./JGLHYXTW.cjs');
|
|
7
|
+
var U7VZULNU_cjs = require('./U7VZULNU.cjs');
|
|
8
8
|
|
|
9
9
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js
|
|
10
|
-
|
|
10
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
11
11
|
|
|
12
12
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
|
|
13
|
-
|
|
13
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
14
14
|
|
|
15
15
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
|
|
16
|
-
|
|
16
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
17
17
|
|
|
18
18
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
|
|
19
|
-
|
|
19
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
20
20
|
|
|
21
21
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
|
|
22
|
-
|
|
23
|
-
var resolveCredentialSource = /* @__PURE__ */
|
|
22
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
23
|
+
var resolveCredentialSource = /* @__PURE__ */ U7VZULNU_cjs.__name((credentialSource, profileName, logger) => {
|
|
24
24
|
const sourceProvidersMap = {
|
|
25
|
-
EcsContainer: /* @__PURE__ */
|
|
26
|
-
const { fromHttp } = await import('./
|
|
27
|
-
const { fromContainerMetadata } = await import('./
|
|
25
|
+
EcsContainer: /* @__PURE__ */ U7VZULNU_cjs.__name(async (options) => {
|
|
26
|
+
const { fromHttp } = await import('./4SZ6P77Q.cjs');
|
|
27
|
+
const { fromContainerMetadata } = await import('./HMP4FGDB.cjs');
|
|
28
28
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
|
|
29
|
-
return async () =>
|
|
29
|
+
return async () => JGLHYXTW_cjs.chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
|
|
30
30
|
}, "EcsContainer"),
|
|
31
|
-
Ec2InstanceMetadata: /* @__PURE__ */
|
|
31
|
+
Ec2InstanceMetadata: /* @__PURE__ */ U7VZULNU_cjs.__name(async (options) => {
|
|
32
32
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
|
|
33
|
-
const { fromInstanceMetadata } = await import('./
|
|
33
|
+
const { fromInstanceMetadata } = await import('./HMP4FGDB.cjs');
|
|
34
34
|
return async () => fromInstanceMetadata(options)().then(setNamedProvider);
|
|
35
35
|
}, "Ec2InstanceMetadata"),
|
|
36
|
-
Environment: /* @__PURE__ */
|
|
36
|
+
Environment: /* @__PURE__ */ U7VZULNU_cjs.__name(async (options) => {
|
|
37
37
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
|
|
38
|
-
const { fromEnv } = await import('./
|
|
38
|
+
const { fromEnv } = await import('./2AQAGKCU.cjs');
|
|
39
39
|
return async () => fromEnv(options)().then(setNamedProvider);
|
|
40
40
|
}, "Environment")
|
|
41
41
|
};
|
|
42
42
|
if (credentialSource in sourceProvidersMap) {
|
|
43
43
|
return sourceProvidersMap[credentialSource];
|
|
44
44
|
} else {
|
|
45
|
-
throw new
|
|
45
|
+
throw new JGLHYXTW_cjs.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, {
|
|
46
46
|
logger
|
|
47
47
|
});
|
|
48
48
|
}
|
|
49
49
|
}, "resolveCredentialSource");
|
|
50
|
-
var setNamedProvider = /* @__PURE__ */
|
|
50
|
+
var setNamedProvider = /* @__PURE__ */ U7VZULNU_cjs.__name((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p"), "setNamedProvider");
|
|
51
51
|
|
|
52
52
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
|
|
53
|
-
var isAssumeRoleProfile = /* @__PURE__ */
|
|
53
|
+
var isAssumeRoleProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg, { profile = "default", logger } = {}) => {
|
|
54
54
|
return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && [
|
|
55
55
|
"undefined",
|
|
56
56
|
"string"
|
|
@@ -68,26 +68,26 @@ var isAssumeRoleProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile =
|
|
|
68
68
|
logger
|
|
69
69
|
}));
|
|
70
70
|
}, "isAssumeRoleProfile");
|
|
71
|
-
var isAssumeRoleWithSourceProfile = /* @__PURE__ */
|
|
71
|
+
var isAssumeRoleWithSourceProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg, { profile, logger }) => {
|
|
72
72
|
const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
73
73
|
if (withSourceProfile) {
|
|
74
74
|
logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
|
|
75
75
|
}
|
|
76
76
|
return withSourceProfile;
|
|
77
77
|
}, "isAssumeRoleWithSourceProfile");
|
|
78
|
-
var isCredentialSourceProfile = /* @__PURE__ */
|
|
78
|
+
var isCredentialSourceProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg, { profile, logger }) => {
|
|
79
79
|
const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
80
80
|
if (withProviderProfile) {
|
|
81
81
|
logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
|
|
82
82
|
}
|
|
83
83
|
return withProviderProfile;
|
|
84
84
|
}, "isCredentialSourceProfile");
|
|
85
|
-
var resolveAssumeRoleCredentials = /* @__PURE__ */
|
|
85
|
+
var resolveAssumeRoleCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
86
86
|
options.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");
|
|
87
87
|
const profileData = profiles[profileName];
|
|
88
88
|
const { source_profile, region } = profileData;
|
|
89
89
|
if (!options.roleAssumer) {
|
|
90
|
-
const { getDefaultRoleAssumer } = await import('./
|
|
90
|
+
const { getDefaultRoleAssumer } = await import('./DEL75SYN.cjs');
|
|
91
91
|
options.roleAssumer = getDefaultRoleAssumer({
|
|
92
92
|
...options.clientConfig,
|
|
93
93
|
credentialProviderLogger: options.logger,
|
|
@@ -98,7 +98,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (pr
|
|
|
98
98
|
}, options.clientPlugins);
|
|
99
99
|
}
|
|
100
100
|
if (source_profile && source_profile in visitedProfiles) {
|
|
101
|
-
throw new
|
|
101
|
+
throw new JGLHYXTW_cjs.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${P5BPMTGP_cjs.getProfileName(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "), {
|
|
102
102
|
logger: options.logger
|
|
103
103
|
});
|
|
104
104
|
}
|
|
@@ -108,7 +108,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (pr
|
|
|
108
108
|
[source_profile]: true
|
|
109
109
|
}, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {})) : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();
|
|
110
110
|
if (isCredentialSourceWithoutRoleArn(profileData)) {
|
|
111
|
-
return sourceCredsProvider.then((creds) =>
|
|
111
|
+
return sourceCredsProvider.then((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
|
|
112
112
|
} else {
|
|
113
113
|
const params = {
|
|
114
114
|
RoleArn: profileData.role_arn,
|
|
@@ -119,7 +119,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (pr
|
|
|
119
119
|
const { mfa_serial } = profileData;
|
|
120
120
|
if (mfa_serial) {
|
|
121
121
|
if (!options.mfaCodeProvider) {
|
|
122
|
-
throw new
|
|
122
|
+
throw new JGLHYXTW_cjs.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, {
|
|
123
123
|
logger: options.logger,
|
|
124
124
|
tryNextLink: false
|
|
125
125
|
});
|
|
@@ -128,25 +128,25 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (pr
|
|
|
128
128
|
params.TokenCode = await options.mfaCodeProvider(mfa_serial);
|
|
129
129
|
}
|
|
130
130
|
const sourceCreds = await sourceCredsProvider;
|
|
131
|
-
return options.roleAssumer(sourceCreds, params).then((creds) =>
|
|
131
|
+
return options.roleAssumer(sourceCreds, params).then((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
|
|
132
132
|
}
|
|
133
133
|
}, "resolveAssumeRoleCredentials");
|
|
134
|
-
var isCredentialSourceWithoutRoleArn = /* @__PURE__ */
|
|
134
|
+
var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ U7VZULNU_cjs.__name((section) => {
|
|
135
135
|
return !section.role_arn && !!section.credential_source;
|
|
136
136
|
}, "isCredentialSourceWithoutRoleArn");
|
|
137
137
|
|
|
138
138
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
|
|
139
|
-
|
|
140
|
-
var isProcessProfile = /* @__PURE__ */
|
|
141
|
-
var resolveProcessCredentials = /* @__PURE__ */
|
|
139
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
140
|
+
var isProcessProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
|
|
141
|
+
var resolveProcessCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (options, profile) => import('./OZNFYXME.cjs').then(({ fromProcess }) => fromProcess({
|
|
142
142
|
...options,
|
|
143
143
|
profile
|
|
144
|
-
})().then((creds) =>
|
|
144
|
+
})().then((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
|
|
145
145
|
|
|
146
146
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
|
|
147
|
-
|
|
148
|
-
var resolveSsoCredentials = /* @__PURE__ */
|
|
149
|
-
const { fromSSO } = await import('./
|
|
147
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
148
|
+
var resolveSsoCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profile, profileData, options = {}) => {
|
|
149
|
+
const { fromSSO } = await import('./KFOKN2M2.cjs');
|
|
150
150
|
return fromSSO({
|
|
151
151
|
profile,
|
|
152
152
|
logger: options.logger,
|
|
@@ -154,24 +154,24 @@ var resolveSsoCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile,
|
|
|
154
154
|
clientConfig: options.clientConfig
|
|
155
155
|
})().then((creds) => {
|
|
156
156
|
if (profileData.sso_session) {
|
|
157
|
-
return
|
|
157
|
+
return _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO", "r");
|
|
158
158
|
} else {
|
|
159
|
-
return
|
|
159
|
+
return _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO_LEGACY", "t");
|
|
160
160
|
}
|
|
161
161
|
});
|
|
162
162
|
}, "resolveSsoCredentials");
|
|
163
|
-
var isSsoProfile = /* @__PURE__ */
|
|
163
|
+
var isSsoProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
|
|
164
164
|
|
|
165
165
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
|
|
166
|
-
|
|
167
|
-
var isStaticCredsProfile = /* @__PURE__ */
|
|
166
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
167
|
+
var isStaticCredsProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && [
|
|
168
168
|
"undefined",
|
|
169
169
|
"string"
|
|
170
170
|
].indexOf(typeof arg.aws_session_token) > -1 && [
|
|
171
171
|
"undefined",
|
|
172
172
|
"string"
|
|
173
173
|
].indexOf(typeof arg.aws_account_id) > -1, "isStaticCredsProfile");
|
|
174
|
-
var resolveStaticCredentials = /* @__PURE__ */
|
|
174
|
+
var resolveStaticCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profile, options) => {
|
|
175
175
|
options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
|
|
176
176
|
const credentials = {
|
|
177
177
|
accessKeyId: profile.aws_access_key_id,
|
|
@@ -184,26 +184,26 @@ var resolveStaticCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profil
|
|
|
184
184
|
accountId: profile.aws_account_id
|
|
185
185
|
}
|
|
186
186
|
};
|
|
187
|
-
return
|
|
187
|
+
return _7WVEMAKW_cjs.setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
|
|
188
188
|
}, "resolveStaticCredentials");
|
|
189
189
|
|
|
190
190
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
|
|
191
|
-
|
|
192
|
-
var isWebIdentityProfile = /* @__PURE__ */
|
|
191
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
192
|
+
var isWebIdentityProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && [
|
|
193
193
|
"undefined",
|
|
194
194
|
"string"
|
|
195
195
|
].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
|
|
196
|
-
var resolveWebIdentityCredentials = /* @__PURE__ */
|
|
196
|
+
var resolveWebIdentityCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profile, options) => import('./EPPFFBGP.cjs').then(({ fromTokenFile }) => fromTokenFile({
|
|
197
197
|
webIdentityTokenFile: profile.web_identity_token_file,
|
|
198
198
|
roleArn: profile.role_arn,
|
|
199
199
|
roleSessionName: profile.role_session_name,
|
|
200
200
|
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
|
|
201
201
|
logger: options.logger,
|
|
202
202
|
parentClientConfig: options.parentClientConfig
|
|
203
|
-
})().then((creds) =>
|
|
203
|
+
})().then((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q"))), "resolveWebIdentityCredentials");
|
|
204
204
|
|
|
205
205
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
|
|
206
|
-
var resolveProfileData = /* @__PURE__ */
|
|
206
|
+
var resolveProfileData = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
|
|
207
207
|
const data = profiles[profileName];
|
|
208
208
|
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
209
209
|
return resolveStaticCredentials(data, options);
|
|
@@ -226,13 +226,13 @@ var resolveProfileData = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profileName,
|
|
|
226
226
|
if (isSsoProfile(data)) {
|
|
227
227
|
return await resolveSsoCredentials(profileName, data, options);
|
|
228
228
|
}
|
|
229
|
-
throw new
|
|
229
|
+
throw new JGLHYXTW_cjs.CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, {
|
|
230
230
|
logger: options.logger
|
|
231
231
|
});
|
|
232
232
|
}, "resolveProfileData");
|
|
233
233
|
|
|
234
234
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
|
|
235
|
-
var fromIni = /* @__PURE__ */
|
|
235
|
+
var fromIni = /* @__PURE__ */ U7VZULNU_cjs.__name((_init = {}) => async ({ callerClientConfig } = {}) => {
|
|
236
236
|
const init = {
|
|
237
237
|
..._init,
|
|
238
238
|
parentClientConfig: {
|
|
@@ -241,12 +241,12 @@ var fromIni = /* @__PURE__ */ VO65XOWD_cjs.__name((_init = {}) => async ({ calle
|
|
|
241
241
|
}
|
|
242
242
|
};
|
|
243
243
|
init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
|
|
244
|
-
const profiles = await
|
|
245
|
-
return resolveProfileData(
|
|
244
|
+
const profiles = await P5BPMTGP_cjs.parseKnownFiles(init);
|
|
245
|
+
return resolveProfileData(P5BPMTGP_cjs.getProfileName({
|
|
246
246
|
profile: _init.profile ?? callerClientConfig?.profile
|
|
247
247
|
}), profiles, init);
|
|
248
248
|
}, "fromIni");
|
|
249
249
|
|
|
250
250
|
exports.fromIni = fromIni;
|
|
251
|
-
//# sourceMappingURL=
|
|
252
|
-
//# sourceMappingURL=
|
|
251
|
+
//# sourceMappingURL=SPOUVTPR.cjs.map
|
|
252
|
+
//# sourceMappingURL=SPOUVTPR.cjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["init_cjs_shims","resolveCredentialSource","__name","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAEO,IAAMC,uBAAAA,mBAA0BC,mBAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,6CAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,gBAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,kBAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,6CAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,6CAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,qCAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmBZ,mBAAA,CAAA,CAACkB,KAAAA,KAAUC,kCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,wCAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC7B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B9B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+BnC,mBAAA,CAAA,OAAOE,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,qCAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,2BAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMjC,uBAAAA,CAAwBuC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,kCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,qCAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,wCAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzCnC,2BAAA,EAAA;AACO,IAAMsE,gBAAAA,mBAAmBpE,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4BtE,mBAAA,CAAA,OAAOM,OAAAA,EAASgB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzCpB,2BAAA,EAAA;AACO,IAAM0E,wCAAwBxE,mBAAA,CAAA,OAAOsB,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,iCAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,iCAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,wCAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5BjF,2BAAA,EAAA;AACO,IAAMkF,uCAAuBhF,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2BrF,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,iCAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxCxF,2BAAA,EAAA;AACO,IAAM+F,uCAAuB7F,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC/F,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,8CAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAUxG,mBAAA,CAAA,CAACyG,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,4BAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,2BAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"L5ENV2DK.cjs","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}
|
|
1
|
+
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["init_cjs_shims","resolveCredentialSource","__name","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAEO,IAAMC,uBAAAA,mBAA0BC,mBAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,6CAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,gBAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,kBAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,6CAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,6CAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,qCAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmBZ,mBAAA,CAAA,CAACkB,KAAAA,KAAUC,mCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,wCAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC7B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B9B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+BnC,mBAAA,CAAA,OAAOE,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,qCAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,2BAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMjC,uBAAAA,CAAwBuC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,mCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,qCAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,kCAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,wCAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzCnC,2BAAA,EAAA;AACO,IAAMsE,gBAAAA,mBAAmBpE,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4BtE,mBAAA,CAAA,OAAOM,OAAAA,EAASgB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,kCAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzCpB,2BAAA,EAAA;AACO,IAAM0E,wCAAwBxE,mBAAA,CAAA,OAAOsB,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,kCAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,kCAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,wCAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5BjF,2BAAA,EAAA;AACO,IAAMkF,uCAAuBhF,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2BrF,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,kCAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxCxF,2BAAA,EAAA;AACO,IAAM+F,uCAAuB7F,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC/F,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,kCAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,8CAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAUxG,mBAAA,CAAA,CAACyG,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,4BAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,2BAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"SPOUVTPR.cjs","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}
|