@layerzerolabs/vm-tooling 0.0.60 → 0.0.62

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. package/dist/2AQAGKCU.cjs +39 -0
  2. package/dist/2AQAGKCU.cjs.map +1 -0
  3. package/dist/{M6YAIP2X.cjs → 37UR3RSN.cjs} +10 -10
  4. package/dist/{M6YAIP2X.cjs.map → 37UR3RSN.cjs.map} +1 -1
  5. package/dist/{CL6CDQMJ.js → 45K4IRAA.js} +5 -5
  6. package/dist/{CL6CDQMJ.js.map → 45K4IRAA.js.map} +1 -1
  7. package/dist/{IQXSRATS.cjs → 4SZ6P77Q.cjs} +30 -30
  8. package/dist/{IQXSRATS.cjs.map → 4SZ6P77Q.cjs.map} +1 -1
  9. package/dist/{NUB3VR3D.js → 5JYEGDVK.js} +4 -4
  10. package/dist/{NUB3VR3D.js.map → 5JYEGDVK.js.map} +1 -1
  11. package/dist/{IZVZ5TRG.js → 5QGJ7CFM.js} +5 -5
  12. package/dist/{IZVZ5TRG.js.map → 5QGJ7CFM.js.map} +1 -1
  13. package/dist/{VVTDADG7.cjs → 7WVEMAKW.cjs} +5 -5
  14. package/dist/{VVTDADG7.cjs.map → 7WVEMAKW.cjs.map} +1 -1
  15. package/dist/{VGCATKI5.cjs → AHQNBZE4.cjs} +5 -5
  16. package/dist/{VGCATKI5.cjs.map → AHQNBZE4.cjs.map} +1 -1
  17. package/dist/{4RWETOR3.cjs → AMF2EES3.cjs} +23 -23
  18. package/dist/{4RWETOR3.cjs.map → AMF2EES3.cjs.map} +1 -1
  19. package/dist/{OGU6CONG.js → BOOCAPHW.js} +5 -5
  20. package/dist/{OGU6CONG.js.map → BOOCAPHW.js.map} +1 -1
  21. package/dist/{BPGURM6D.js → CJNBA2MN.js} +6 -4
  22. package/dist/CJNBA2MN.js.map +1 -0
  23. package/dist/{72W2AKIC.js → CMSYZVLH.js} +3 -3
  24. package/dist/{72W2AKIC.js.map → CMSYZVLH.js.map} +1 -1
  25. package/dist/CYUSPBTH.cjs +8 -0
  26. package/dist/{YI6EL3AH.cjs.map → CYUSPBTH.cjs.map} +1 -1
  27. package/dist/{NNE5MIRH.cjs → DEL75SYN.cjs} +284 -284
  28. package/dist/{NNE5MIRH.cjs.map → DEL75SYN.cjs.map} +1 -1
  29. package/dist/DPCW4JIV.cjs +53 -0
  30. package/dist/DPCW4JIV.cjs.map +1 -0
  31. package/dist/{DK5YZCTB.cjs → EPPFFBGP.cjs} +13 -13
  32. package/dist/{DK5YZCTB.cjs.map → EPPFFBGP.cjs.map} +1 -1
  33. package/dist/{W7QMZBXR.cjs → F7OAIAEX.cjs} +26 -26
  34. package/dist/{W7QMZBXR.cjs.map → F7OAIAEX.cjs.map} +1 -1
  35. package/dist/{ZGTCJSBO.js → FAOU2ZJO.js} +3 -3
  36. package/dist/{ZGTCJSBO.js.map → FAOU2ZJO.js.map} +1 -1
  37. package/dist/{PSSBUABA.cjs → FI3AZBYE.cjs} +7 -7
  38. package/dist/{PSSBUABA.cjs.map → FI3AZBYE.cjs.map} +1 -1
  39. package/dist/FKPK53TD.cjs +8 -0
  40. package/dist/FKPK53TD.cjs.map +1 -0
  41. package/dist/{F46O4OAT.js → GQAEO3WU.js} +9 -5
  42. package/dist/GQAEO3WU.js.map +1 -0
  43. package/dist/GSHFVQRI.cjs +8 -0
  44. package/dist/{OOTZHKMN.cjs.map → GSHFVQRI.cjs.map} +1 -1
  45. package/dist/{QO6IEDLG.cjs → HMP4FGDB.cjs} +61 -61
  46. package/dist/{QO6IEDLG.cjs.map → HMP4FGDB.cjs.map} +1 -1
  47. package/dist/{2RWEJQEO.cjs → HN3U775J.cjs} +10 -10
  48. package/dist/{2RWEJQEO.cjs.map → HN3U775J.cjs.map} +1 -1
  49. package/dist/{4EYI4PYN.cjs → HSC5AWAD.cjs} +211 -211
  50. package/dist/{4EYI4PYN.cjs.map → HSC5AWAD.cjs.map} +1 -1
  51. package/dist/{BI33BCZD.js → HVBHNWI7.js} +3 -3
  52. package/dist/{BI33BCZD.js.map → HVBHNWI7.js.map} +1 -1
  53. package/dist/{W3N4CNDW.js → JEOLJJ6F.js} +4 -4
  54. package/dist/{W3N4CNDW.js.map → JEOLJJ6F.js.map} +1 -1
  55. package/dist/{BXO3RC75.cjs → JGLHYXTW.cjs} +17 -17
  56. package/dist/{BXO3RC75.cjs.map → JGLHYXTW.cjs.map} +1 -1
  57. package/dist/{HI4NXK4T.cjs → JLKKDVCL.cjs} +10 -4
  58. package/dist/JLKKDVCL.cjs.map +1 -0
  59. package/dist/{LUO6HP3P.cjs → KFOKN2M2.cjs} +62 -62
  60. package/dist/{LUO6HP3P.cjs.map → KFOKN2M2.cjs.map} +1 -1
  61. package/dist/{OSR73KYW.cjs → KONCDJAL.cjs} +18 -18
  62. package/dist/{OSR73KYW.cjs.map → KONCDJAL.cjs.map} +1 -1
  63. package/dist/{6SVY3NVF.cjs → L6RZSSWB.cjs} +22 -22
  64. package/dist/{6SVY3NVF.cjs.map → L6RZSSWB.cjs.map} +1 -1
  65. package/dist/M4PGJV5D.js +6 -0
  66. package/dist/M4PGJV5D.js.map +1 -0
  67. package/dist/MMIV5S36.js +51 -0
  68. package/dist/MMIV5S36.js.map +1 -0
  69. package/dist/{JGA7AJCX.js → NX66I36H.js} +8 -2
  70. package/dist/NX66I36H.js.map +1 -0
  71. package/dist/{FUZCR6WN.cjs → OT5L7ME6.cjs} +273 -273
  72. package/dist/{FUZCR6WN.cjs.map → OT5L7ME6.cjs.map} +1 -1
  73. package/dist/{NEQ3DTUV.cjs → OWTMHDOF.cjs} +16 -16
  74. package/dist/{NEQ3DTUV.cjs.map → OWTMHDOF.cjs.map} +1 -1
  75. package/dist/{4UZKQNSD.cjs → OZNFYXME.cjs} +20 -20
  76. package/dist/{4UZKQNSD.cjs.map → OZNFYXME.cjs.map} +1 -1
  77. package/dist/{OAYLBSRH.cjs → P5BPMTGP.cjs} +40 -40
  78. package/dist/{OAYLBSRH.cjs.map → P5BPMTGP.cjs.map} +1 -1
  79. package/dist/{64SMUTQJ.cjs → QYB5VPZE.cjs} +5 -5
  80. package/dist/{64SMUTQJ.cjs.map → QYB5VPZE.cjs.map} +1 -1
  81. package/dist/{LJR3ILZB.cjs → S5DRZSZW.cjs} +28 -24
  82. package/dist/S5DRZSZW.cjs.map +1 -0
  83. package/dist/{L5ENV2DK.cjs → SPOUVTPR.cjs} +56 -56
  84. package/dist/{L5ENV2DK.cjs.map → SPOUVTPR.cjs.map} +1 -1
  85. package/dist/{M5C4OTHX.js → TBDZQONT.js} +6 -6
  86. package/dist/{M5C4OTHX.js.map → TBDZQONT.js.map} +1 -1
  87. package/dist/{ABGH4Z56.cjs → TQMUPD75.cjs} +8 -8
  88. package/dist/{ABGH4Z56.cjs.map → TQMUPD75.cjs.map} +1 -1
  89. package/dist/{2X4NOJJL.js → U4OLGGKH.js} +5 -5
  90. package/dist/{2X4NOJJL.js.map → U4OLGGKH.js.map} +1 -1
  91. package/dist/{VO65XOWD.cjs → U7VZULNU.cjs} +2 -5
  92. package/dist/U7VZULNU.cjs.map +1 -0
  93. package/dist/{ZV7VZVS6.js → UHPHZ6AE.js} +3 -3
  94. package/dist/{ZV7VZVS6.js.map → UHPHZ6AE.js.map} +1 -1
  95. package/dist/{KS44PBXU.cjs → UN57VWAW.cjs} +438 -438
  96. package/dist/{KS44PBXU.cjs.map → UN57VWAW.cjs.map} +1 -1
  97. package/dist/{BVLAV47O.cjs → VZOUGVXS.cjs} +9 -9
  98. package/dist/{BVLAV47O.cjs.map → VZOUGVXS.cjs.map} +1 -1
  99. package/dist/{DPDVRYLI.cjs → WDSPHVPJ.cjs} +65 -65
  100. package/dist/{DPDVRYLI.cjs.map → WDSPHVPJ.cjs.map} +1 -1
  101. package/dist/{F2ZPATQF.cjs → WH45T4LS.cjs} +10 -10
  102. package/dist/{F2ZPATQF.cjs.map → WH45T4LS.cjs.map} +1 -1
  103. package/dist/{XOQZ3G2K.cjs → WHAPJZ3U.cjs} +34 -32
  104. package/dist/WHAPJZ3U.cjs.map +1 -0
  105. package/dist/{JWQN2QGP.cjs → Y5ZXTD76.cjs} +147 -147
  106. package/dist/{JWQN2QGP.cjs.map → Y5ZXTD76.cjs.map} +1 -1
  107. package/dist/YNMZEV5X.cjs +11 -0
  108. package/dist/{TC7EHVC2.cjs.map → YNMZEV5X.cjs.map} +1 -1
  109. package/dist/commands/starknet/build-typescript-sdk.cjs +13 -0
  110. package/dist/commands/starknet/build-typescript-sdk.cjs.map +1 -0
  111. package/dist/commands/starknet/build-typescript-sdk.d.ts +2 -0
  112. package/dist/commands/starknet/build-typescript-sdk.d.ts.map +1 -0
  113. package/dist/commands/starknet/build-typescript-sdk.js +4 -0
  114. package/dist/commands/starknet/build-typescript-sdk.js.map +1 -0
  115. package/dist/commands/starknet/index.cjs +14 -0
  116. package/dist/commands/starknet/index.cjs.map +1 -0
  117. package/dist/commands/starknet/index.d.ts +2 -0
  118. package/dist/commands/starknet/index.d.ts.map +1 -0
  119. package/dist/commands/starknet/index.js +5 -0
  120. package/dist/commands/starknet/index.js.map +1 -0
  121. package/dist/config/index.cjs +9 -9
  122. package/dist/config/index.js +2 -2
  123. package/dist/config/tools.cjs +4 -4
  124. package/dist/config/tools.d.ts.map +1 -1
  125. package/dist/config/tools.js +2 -2
  126. package/dist/config/version-matrices.cjs +3 -3
  127. package/dist/config/version-matrices.d.ts.map +1 -1
  128. package/dist/config/version-matrices.js +1 -1
  129. package/dist/core/compatibility.cjs +3 -3
  130. package/dist/core/index.cjs +14 -14
  131. package/dist/core/index.js +4 -4
  132. package/dist/core/lock.cjs +5 -5
  133. package/dist/core/lock.test.cjs +996 -996
  134. package/dist/core/tool-executor.cjs +9 -9
  135. package/dist/core/tool-executor.d.ts +1 -0
  136. package/dist/core/tool-executor.d.ts.map +1 -1
  137. package/dist/core/tool-executor.js +4 -4
  138. package/dist/core/version-resolver.cjs +8 -8
  139. package/dist/core/version-resolver.js +3 -3
  140. package/dist/display/formatters.cjs +5 -5
  141. package/dist/display/formatters.js +3 -3
  142. package/dist/display/index.cjs +9 -9
  143. package/dist/display/index.js +4 -4
  144. package/dist/display/version-display.cjs +7 -7
  145. package/dist/display/version-display.js +4 -4
  146. package/dist/index.cjs +28 -24
  147. package/dist/index.cjs.map +1 -1
  148. package/dist/index.d.ts.map +1 -1
  149. package/dist/index.js +11 -7
  150. package/dist/index.js.map +1 -1
  151. package/dist/scripts/generate-github-matrix.cjs +298 -299
  152. package/dist/scripts/generate-github-matrix.cjs.map +1 -1
  153. package/dist/scripts/generate-github-matrix.js +9 -10
  154. package/dist/scripts/generate-github-matrix.js.map +1 -1
  155. package/dist/types/docker.cjs +2 -2
  156. package/dist/types/index.cjs +2 -2
  157. package/dist/types/tool.cjs +2 -2
  158. package/dist/types/version.cjs +2 -2
  159. package/dist/types/version.cjs.map +1 -1
  160. package/dist/types/version.d.ts +1 -0
  161. package/dist/types/version.d.ts.map +1 -1
  162. package/dist/types/version.js.map +1 -1
  163. package/dist/utils/docker.cjs +5 -5
  164. package/dist/utils/docker.js +2 -2
  165. package/dist/utils/error.cjs +3 -3
  166. package/dist/utils/finder.cjs +12 -12
  167. package/dist/utils/finder.js +2 -2
  168. package/dist/utils/version.cjs +7 -7
  169. package/dist/utils/version.js +2 -2
  170. package/dist/utils.cjs +6 -6
  171. package/dist/utils.js +2 -2
  172. package/package.json +6 -5
  173. package/dist/AY3IP22W.cjs +0 -39
  174. package/dist/AY3IP22W.cjs.map +0 -1
  175. package/dist/BPGURM6D.js.map +0 -1
  176. package/dist/F46O4OAT.js.map +0 -1
  177. package/dist/HI4NXK4T.cjs.map +0 -1
  178. package/dist/JGA7AJCX.js.map +0 -1
  179. package/dist/LJR3ILZB.cjs.map +0 -1
  180. package/dist/OOTZHKMN.cjs +0 -8
  181. package/dist/TC7EHVC2.cjs +0 -11
  182. package/dist/VO65XOWD.cjs.map +0 -1
  183. package/dist/XOQZ3G2K.cjs.map +0 -1
  184. package/dist/YI6EL3AH.cjs +0 -8
@@ -1,10 +1,10 @@
1
1
  'use strict';
2
2
 
3
- var TC7EHVC2_cjs = require('./TC7EHVC2.cjs');
4
- var _6SVY3NVF_cjs = require('./6SVY3NVF.cjs');
5
- var XOQZ3G2K_cjs = require('./XOQZ3G2K.cjs');
6
- var ABGH4Z56_cjs = require('./ABGH4Z56.cjs');
7
- var VO65XOWD_cjs = require('./VO65XOWD.cjs');
3
+ var YNMZEV5X_cjs = require('./YNMZEV5X.cjs');
4
+ var L6RZSSWB_cjs = require('./L6RZSSWB.cjs');
5
+ var WHAPJZ3U_cjs = require('./WHAPJZ3U.cjs');
6
+ var TQMUPD75_cjs = require('./TQMUPD75.cjs');
7
+ var U7VZULNU_cjs = require('./U7VZULNU.cjs');
8
8
  var fs = require('fs');
9
9
  var path = require('path');
10
10
  var process = require('process');
@@ -18,14 +18,14 @@ var path__default = /*#__PURE__*/_interopDefault(path);
18
18
  var process__default = /*#__PURE__*/_interopDefault(process);
19
19
 
20
20
  // src/core/tool-executor.ts
21
- VO65XOWD_cjs.init_cjs_shims();
21
+ U7VZULNU_cjs.init_cjs_shims();
22
22
  zx.$.verbose = true;
23
23
  zx.$.stdio = [
24
24
  "inherit",
25
25
  "pipe",
26
26
  process__default.default.stderr
27
27
  ];
28
- var mergeVolumes = /* @__PURE__ */ VO65XOWD_cjs.__name((defaultVolumes, userVolumes) => {
28
+ var mergeVolumes = /* @__PURE__ */ U7VZULNU_cjs.__name((defaultVolumes, userVolumes) => {
29
29
  const paths = new Set(userVolumes.map((volume) => volume.containerPath));
30
30
  return [
31
31
  ...userVolumes,
@@ -43,7 +43,7 @@ async function ensureDockerImage(imageURI) {
43
43
  console.info("\u{1F4E5} Pulling Docker image from ECR:", imageURI);
44
44
  output = await zx.$`docker pull ${imageURI}`.nothrow();
45
45
  } catch (error) {
46
- throw new Error(`Failed to pull Docker image ${imageURI}: ${TC7EHVC2_cjs.stringifyError(error)}`);
46
+ throw new Error(`Failed to pull Docker image ${imageURI}: ${YNMZEV5X_cjs.stringifyError(error)}`);
47
47
  }
48
48
  if (output.exitCode) {
49
49
  throw new Error([
@@ -51,21 +51,21 @@ async function ensureDockerImage(imageURI) {
51
51
  ` - ECR image: ${imageURI} (pull failed)`,
52
52
  "",
53
53
  "\u{1F4A1} Solutions:",
54
- ` 1. Authenticate with ECR: aws ecr get-login-password --region ${XOQZ3G2K_cjs.AWS_REGION} | docker login --username AWS --password-stdin ${XOQZ3G2K_cjs.AWS_ACCOUNT_ID}.dkr.ecr.${XOQZ3G2K_cjs.AWS_REGION}.amazonaws.com`,
54
+ ` 1. Authenticate with ECR: aws ecr get-login-password --region ${WHAPJZ3U_cjs.AWS_REGION} | docker login --username AWS --password-stdin ${WHAPJZ3U_cjs.AWS_ACCOUNT_ID}.dkr.ecr.${WHAPJZ3U_cjs.AWS_REGION}.amazonaws.com`,
55
55
  " 2. Check if the image tag exists in ECR."
56
56
  ].join("\n"));
57
57
  }
58
58
  console.info(`\u2705 Successfully pulled: ${imageURI}`);
59
59
  }
60
- VO65XOWD_cjs.__name(ensureDockerImage, "ensureDockerImage");
60
+ U7VZULNU_cjs.__name(ensureDockerImage, "ensureDockerImage");
61
61
  async function executeToolCommand(command, args, options) {
62
- const { cwd, volumes: userVolumes, customEntrypoint: entrypoint, env: customEnvVars, script } = options;
63
- const tool = XOQZ3G2K_cjs.findToolByName(command);
64
- const type = XOQZ3G2K_cjs.getChainTypeForTool(command);
62
+ const { cwd, volumes: userVolumes, customEntrypoint: entrypoint, env: customEnvVars, script, publish } = options;
63
+ const tool = WHAPJZ3U_cjs.findToolByName(command);
64
+ const type = WHAPJZ3U_cjs.getChainTypeForTool(command);
65
65
  if (type === void 0) {
66
66
  throw new Error([
67
67
  `Tool '${command}' not found or no type configuration available.`,
68
- `Available tools: ${XOQZ3G2K_cjs.tools.map(({ name }) => name).join(", ")}`,
68
+ `Available tools: ${WHAPJZ3U_cjs.tools.map(({ name }) => name).join(", ")}`,
69
69
  `Try: lz-tool --list-versions to see all available tools`
70
70
  ].join("\n"));
71
71
  }
@@ -80,8 +80,8 @@ async function executeToolCommand(command, args, options) {
80
80
  }
81
81
  }
82
82
  }
83
- const userSpecifiedVersions = _6SVY3NVF_cjs.extractUserVersions(options);
84
- const versionResult = _6SVY3NVF_cjs.resolveTypeVersions(type, userSpecifiedVersions, options, cwd);
83
+ const userSpecifiedVersions = L6RZSSWB_cjs.extractUserVersions(options);
84
+ const versionResult = L6RZSSWB_cjs.resolveTypeVersions(type, userSpecifiedVersions, options, cwd);
85
85
  for (const warning of versionResult.warnings) {
86
86
  console.warn(warning);
87
87
  }
@@ -98,14 +98,14 @@ async function executeToolCommand(command, args, options) {
98
98
  const resolvedVersionObj = {
99
99
  version: resolvedVersion
100
100
  };
101
- if (!XOQZ3G2K_cjs.versionsSatisfied(secondaryVersion, resolvedVersionObj)) {
101
+ if (!WHAPJZ3U_cjs.versionsSatisfied(secondaryVersion, resolvedVersionObj)) {
102
102
  console.warn(`Warning: Local configuration version (${secondaryVersion.version}) differs from resolved version (${resolvedVersion})`);
103
103
  }
104
104
  } catch (error) {
105
- console.warn("Could not validate secondary version:", TC7EHVC2_cjs.stringifyError(error));
105
+ console.warn("Could not validate secondary version:", YNMZEV5X_cjs.stringifyError(error));
106
106
  }
107
107
  }
108
- const imageURI = XOQZ3G2K_cjs.getImageURI(tool.name, resolvedVersion);
108
+ const imageURI = WHAPJZ3U_cjs.getImageURI(tool.name, resolvedVersion);
109
109
  const workspaceRoot = await commonNodeUtils.getFullyQualifiedRepoRootPath();
110
110
  const relativePath = path__default.default.relative(workspaceRoot, cwd);
111
111
  await ensureDockerImage(imageURI);
@@ -164,6 +164,10 @@ async function executeToolCommand(command, args, options) {
164
164
  `${workspaceRoot}:/workspace`,
165
165
  "-w",
166
166
  `/workspace/${relativePath}`,
167
+ ...publish ? [
168
+ "-p",
169
+ publish.trim()
170
+ ] : [],
167
171
  ...volumeArgs,
168
172
  ...entrypoint ? [
169
173
  "--entrypoint",
@@ -172,7 +176,7 @@ async function executeToolCommand(command, args, options) {
172
176
  imageURI,
173
177
  ...finalArgs
174
178
  ];
175
- const output = await ABGH4Z56_cjs.lockMany(volumes.flatMap((volume) => volume.type === "isolate" && volume.locked ? [
179
+ const output = await TQMUPD75_cjs.lockMany(volumes.flatMap((volume) => volume.type === "isolate" && volume.locked ? [
176
180
  volume.name
177
181
  ] : []), () => zx.$`docker ${dockerArgs}`.nothrow());
178
182
  saveAptosModulesOrder(command, output, workspaceRoot, relativePath);
@@ -181,7 +185,7 @@ async function executeToolCommand(command, args, options) {
181
185
  process__default.default.exit(exitCode ?? 1);
182
186
  }
183
187
  }
184
- VO65XOWD_cjs.__name(executeToolCommand, "executeToolCommand");
188
+ U7VZULNU_cjs.__name(executeToolCommand, "executeToolCommand");
185
189
  function saveAptosModulesOrder(command, processOutput, workspaceRoot, relPath) {
186
190
  if ("aptos" === command) {
187
191
  const outputJson = processOutput.json();
@@ -189,8 +193,8 @@ function saveAptosModulesOrder(command, processOutput, workspaceRoot, relPath) {
189
193
  fs__default.default.writeFileSync(path__default.default.join(workspaceRoot, relPath, "modules.json"), JSON.stringify(modules, null, 2));
190
194
  }
191
195
  }
192
- VO65XOWD_cjs.__name(saveAptosModulesOrder, "saveAptosModulesOrder");
196
+ U7VZULNU_cjs.__name(saveAptosModulesOrder, "saveAptosModulesOrder");
193
197
 
194
198
  exports.executeToolCommand = executeToolCommand;
195
- //# sourceMappingURL=LJR3ILZB.cjs.map
196
- //# sourceMappingURL=LJR3ILZB.cjs.map
199
+ //# sourceMappingURL=S5DRZSZW.cjs.map
200
+ //# sourceMappingURL=S5DRZSZW.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/core/tool-executor.ts"],"names":["init_cjs_shims","$","verbose","stdio","process","stderr","mergeVolumes","__name","defaultVolumes","userVolumes","paths","Set","map","volume","containerPath","filter","has","ensureDockerImage","imageURI","output","nothrow","stdout","includes","split","console","info","error","Error","stringifyError","exitCode","AWS_REGION","AWS_ACCOUNT_ID","join","executeToolCommand","command","args","options","cwd","volumes","customEntrypoint","entrypoint","env","customEnvVars","script","publish","tool","findToolByName","type","getChainTypeForTool","undefined","tools","name","length","overrides","uv","some","dv","userSpecifiedVersions","extractUserVersions","versionResult","resolveTypeVersions","warning","warnings","warn","resolvedVersion","resolvedVersions","getSecondaryVersionCheckValue","secondaryVersion","resolvedVersionObj","version","versionsSatisfied","getImageURI","workspaceRoot","getFullyQualifiedRepoRootPath","relativePath","path","relative","volumeArgs","hostPath","components","shared","packageName","npm_package_name","push","basename","flatMap","trim","envArgs","envVar","value","flat","finalArgs","dockerArgs","privileged","lockMany","locked","saveAptosModulesOrder","exit","processOutput","relPath","outputJson","json","modules","Result","item","fs","writeFileSync","JSON","stringify"],"mappings":";;;;;;;;;;;;;;;;;;;;AAAAA,2BAAA,EAAA;AAiBAC,IAAAA,CAAEC,OAAAA,GAAU,IAAA;AACZD,IAAAA,CAAEE,KAAAA,GAAQ;AAAC,EAAA,SAAA;AAAW,EAAA,MAAA;EAAQC,wBAAAA,CAAQC;;AAMtC,IAAMC,YAAAA,mBAAeC,mBAAA,CAAA,CACjBC,cAAAA,EACAC,WAAAA,KAAAA;AAEA,EAAA,MAAMC,KAAAA,GAAQ,IAAIC,GAAAA,CAAIF,WAAAA,CAAYG,IAAI,CAACC,MAAAA,KAAWA,MAAAA,CAAOC,aAAa,CAAA,CAAA;AAEtE,EAAA,OAAO;AAAIL,IAAAA,GAAAA,WAAAA;OAAgBD,cAAAA,CAAeO,MAAAA,CAAO,CAACF,MAAAA,KAAW,CAACH,MAAMM,GAAAA,CAAIH,MAAAA,CAAOC,aAAa,CAAA;;AAChG,CAAA,EAPqB,cAAA,CAAA;AASrB,eAAeG,kBAAkBC,QAAAA,EAAgB;AAC7C,EAAA,IAAIC,MAAAA;AAEJ,EAAA,IAAI;AAEAA,IAAAA,MAAAA,GAAS,MAAMlB,IAAAA,CAAAA,gBAAAA,EAAoBiB,QAAAA,CAAAA,CAAAA,CAAWE,OAAAA,EAAO;AAErD,IAAA,IAAID,MAAAA,CAAOE,OAAOC,QAAAA,CAASJ,QAAAA,CAASK,MAAM,GAAA,CAAA,CAAK,CAAA,CAAE,CAAA,EAAG;AAChDC,MAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,kCAAA,EAAgCP,QAAAA,CAAAA,CAAU,CAAA;AACvD,MAAA;AACJ,IAAA;AAEAM,IAAAA,OAAAA,CAAQC,IAAAA,CAAK,4CAAqCP,QAAAA,CAAAA;AAClDC,IAAAA,MAAAA,GAAS,MAAMlB,IAAAA,CAAAA,YAAAA,EAAgBiB,QAAAA,CAAAA,CAAAA,CAAWE,OAAAA,EAAO;AACrD,EAAA,CAAA,CAAA,OAASM,KAAAA,EAAgB;AACrB,IAAA,MAAM,IAAIC,MAAM,CAAA,4BAAA,EAA+BT,QAAAA,KAAaU,2BAAAA,CAAeF,KAAAA,CAAAA,CAAAA,CAAQ,CAAA;AACvF,EAAA;AAEA,EAAA,IAAIP,OAAOU,QAAAA,EAAU;AACjB,IAAA,MAAM,IAAIF,KAAAA,CACN;AACI,MAAA,6BAAA;AACA,MAAA,CAAA,eAAA,EAAkBT,QAAAA,CAAAA,cAAAA,CAAAA;AAClB,MAAA,EAAA;AACA,MAAA,sBAAA;AACA,MAAA,CAAA,gEAAA,EAAmEY,uBAAAA,CAAAA,gDAAAA,EACfC,2BAAAA,CAAAA,SAAAA,EAA0BD,uBAAAA,CAAAA,cAAAA,CAAAA;AAC9E,MAAA;AACFE,KAAAA,CAAAA,IAAAA,CAAK,IAAA,CAAA,CAAA;AAEf,EAAA;AAEAR,EAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,4BAAA,EAA0BP,QAAAA,CAAAA,CAAU,CAAA;AACrD;AAjCeD,mBAAAA,CAAAA,iBAAAA,EAAAA,mBAAAA,CAAAA;AAsCf,eAAsBgB,kBAAAA,CAClBC,OAAAA,EACAC,IAAAA,EACAC,OAAAA,EAQC;AAED,EAAA,MAAM,EACFC,GAAAA,EACAC,OAAAA,EAAS7B,WAAAA,EACT8B,gBAAAA,EAAkBC,YAClBC,GAAAA,EAAKC,aAAAA,EACLC,MAAAA,EACAC,OAAAA,EAAO,GACPR,OAAAA;AAEJ,EAAA,MAAMS,IAAAA,GAAOC,4BAAeZ,OAAAA,CAAAA;AAC5B,EAAA,MAAMa,IAAAA,GAAOC,iCAAoBd,OAAAA,CAAAA;AAEjC,EAAA,IAAIa,SAASE,MAAAA,EAAW;AACpB,IAAA,MAAM,IAAItB,KAAAA,CACN;AACI,MAAA,CAAA,MAAA,EAASO,OAAAA,CAAAA,+CAAAA,CAAAA;MACT,CAAA,iBAAA,EAAoBgB,kBAAAA,CAAMtC,GAAAA,CAAI,CAAC,EAAEuC,IAAAA,OAAWA,IAAAA,CAAAA,CAAMnB,IAAAA,CAAK,IAAA,CAAA,CAAA,CAAA;AACvD,MAAA,CAAA,uDAAA;AACFA,KAAAA,CAAAA,IAAAA,CAAK,IAAA,CAAA,CAAA;AAEf,EAAA;AAGA,EAAA,MAAMxB,cAAAA,GAAiBqC,IAAAA,CAAKrC,cAAAA,IAAkB,EAAA;AAC9C,EAAA,MAAM8B,OAAAA,GAAUhC,YAAAA,CAAaE,cAAAA,EAAgBC,WAAAA,CAAAA;AAE7C,EAAA,IAAID,cAAAA,CAAe4C,SAAS,CAAA,EAAG;AAC3B5B,IAAAA,OAAAA,CAAQC,KAAK,CAAA,gBAAA,EAAYjB,cAAAA,CAAe4C,MAAM,CAAA,6BAAA,EAAgClB,OAAAA,CAAAA,CAAS,CAAA;AACvF,IAAA,IAAIzB,WAAAA,CAAY2C,SAAS,CAAA,EAAG;AACxB,MAAA,MAAMC,SAAAA,GAAY5C,WAAAA,CAAYM,MAAAA,CAAO,CAACuC,EAAAA,KAClC9C,cAAAA,CAAe+C,IAAAA,CAAK,CAACC,EAAAA,KAAOA,EAAAA,CAAG1C,aAAAA,KAAkBwC,EAAAA,CAAGxC,aAAa,CAAA,CAAA;AAErE,MAAA,IAAIuC,SAAAA,CAAUD,SAAS,CAAA,EAAG;AACtB5B,QAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,gCAAA,EAA4B4B,SAAAA,CAAUD,MAAM,CAAA,kBAAA,CAAoB,CAAA;AACjF,MAAA;AACJ,IAAA;AACJ,EAAA;AAGA,EAAA,MAAMK,qBAAAA,GAAwBC,iCAAoBtB,OAAAA,CAAAA;AAGlD,EAAA,MAAMuB,aAAAA,GAAgBC,gCAAAA,CAAoBb,IAAAA,EAAMU,qBAAAA,EAAuBrB,SAASC,GAAAA,CAAAA;AAEhF,EAAA,KAAA,MAAWwB,OAAAA,IAAWF,cAAcG,QAAAA,EAAU;AAC1CtC,IAAAA,OAAAA,CAAQuC,KAAKF,OAAAA,CAAAA;AACjB,EAAA;AAGA,EAAA,MAAMG,eAAAA,GAAkBL,aAAAA,CAAcM,gBAAAA,CAAiB/B,OAAAA,CAAAA;AACvD,EAAA,IAAI,OAAO8B,eAAAA,KAAoB,QAAA,IAAYA,eAAAA,KAAoB,EAAA,EAAI;AAC/D,IAAA,MAAM,IAAIrC,KAAAA,CAAM,CAAA,6BAAA,EAAgCO,OAAAA,CAAAA,CAAS,CAAA;AAC7D,EAAA;AAEAV,EAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,UAAA,EAAMS,OAAAA,CAAAA,UAAAA,EAAoB8B,eAAAA,CAAAA,CAAiB,CAAA;AAGxD,EAAA,IAAInB,KAAKqB,6BAAAA,EAA+B;AACpC,IAAA,IAAI;AACA,MAAA,MAAMC,gBAAAA,GAAmBtB,KAAKqB,6BAAAA,CAA8B;AAAE7B,QAAAA;OAAI,CAAA;AAClE,MAAA,MAAM+B,kBAAAA,GAA8B;QAAEC,OAAAA,EAASL;AAAgB,OAAA;AAE/D,MAAA,IAAI,CAACM,8BAAAA,CAAkBH,gBAAAA,EAAkBC,kBAAAA,CAAAA,EAAqB;AAC1D5C,QAAAA,OAAAA,CAAQuC,KACJ,CAAA,sCAAA,EAAyCI,gBAAAA,CAAiBE,OAAO,CAAA,iCAAA,EAAoCL,eAAAA,CAAAA,CAAAA,CAAkB,CAAA;AAE/H,MAAA;AACJ,IAAA,CAAA,CAAA,OAAStC,KAAAA,EAAO;AAEZF,MAAAA,OAAAA,CAAQuC,IAAAA,CAAK,uCAAA,EAAyCnC,2BAAAA,CAAeF,KAAAA,CAAAA,CAAAA;AACzE,IAAA;AACJ,EAAA;AAGA,EAAA,MAAMR,QAAAA,GAAWqD,wBAAAA,CAAY1B,IAAAA,CAAKM,IAAAA,EAAMa,eAAAA,CAAAA;AACxC,EAAA,MAAMQ,aAAAA,GAAgB,MAAMC,6CAAAA,EAAAA;AAC5B,EAAA,MAAMC,YAAAA,GAAeC,qBAAAA,CAAKC,QAAAA,CAASJ,aAAAA,EAAenC,GAAAA,CAAAA;AAElD,EAAA,MAAMpB,kBAAkBC,QAAAA,CAAAA;AAExB,EAAA,MAAM2D,UAAAA,GAAavC,OAAAA,CACd1B,GAAAA,CAAI,CAACC,MAAAA,KAAAA;AACF,IAAA,IAAIA,MAAAA,CAAOkC,SAAS,MAAA,EAAQ;AACxB,MAAA,OAAO,CAAA,EAAGlC,MAAAA,CAAOiE,QAAQ,CAAA,CAAA,EAAIjE,OAAOC,aAAa,CAAA,CAAA;AACrD,IAAA;AAEA,IAAA,MAAMiE,UAAAA,GAAa;AAAC,MAAA,kBAAA;MAAoBlE,MAAAA,CAAOsC;;AAE/C,IAAA,IAAI,CAACtC,OAAOmE,MAAAA,EAAQ;AAGhB,MAAA,MAAMC,WAAAA,GAAc7E,yBAAQqC,GAAAA,CAAIyC,gBAAAA;AAEhC,MAAA,IAAI,CAACD,WAAAA,EAAa;AACd,QAAA,MAAM,IAAItD,MAAM,mDAAA,CAAA;AACpB,MAAA;AAEAoD,MAAAA,UAAAA,CAAWI,IAAAA,CAAKR,qBAAAA,CAAKS,QAAAA,CAASH,WAAAA,CAAAA,CAAAA;AAClC,IAAA;AAEA,IAAA,OAAO,GAAGF,UAAAA,CAAW/C,IAAAA,CAAK,GAAA,CAAA,CAAA,CAAA,EAAQnB,OAAOC,aAAa,CAAA,CAAA;EAC1D,CAAA,CAAA,CACCuE,OAAAA,CAAQ,CAACxE,MAAAA,KAAW;AAAC,IAAA,IAAA;AAAMA,IAAAA;AAAO,GAAA,CAAA;AAEvC,EAAA,IAAI2B,UAAAA,EAAY8C,MAAAA,EAAQ;AACpB9D,IAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,mCAAA,EAA+Be,UAAAA,CAAAA,CAAY,CAAA;AAC5D,EAAA;AAGA,EAAA,MAAM+C,OAAAA,GAAU7C,aAAAA,CAAc9B,GAAAA,CAAI,CAAC4E,MAAAA,KAAW;AAAC,IAAA,IAAA;AAAM,IAAA,CAAA,EAAGA,MAAAA,CAAOrC,IAAI,CAAA,CAAA,EAAIqC,MAAAA,CAAOC,KAAK,CAAA;AAAG,GAAA,CAAA,CAAEC,IAAAA,EAAI;AAE5F,EAAA,IAAIhD,aAAAA,CAAcU,SAAS,CAAA,EAAG;AAC1B5B,IAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,gBAAA,EAAYiB,aAAAA,CAAcU,MAAM,CAAA,+BAAA,CAAiC,CAAA;AAClF,EAAA;AAGA,EAAA,IAAIuC,SAAAA;AACJ,EAAA,IAAIhD,MAAAA,IAAUA,MAAAA,CAAO2C,IAAAA,EAAI,KAAO,EAAA,EAAI;AAChC9D,IAAAA,OAAAA,CAAQC,IAAAA,CAAK,CAAA,mCAAA,EAA+BkB,MAAAA,CAAAA,CAAQ,CAAA;AACpDgD,IAAAA,SAAAA,GAAY;AAAC,MAAA,MAAA;AAAQ,MAAA,IAAA;AAAMhD,MAAAA;;EAC/B,CAAA,MAAO;AACHgD,IAAAA,SAAAA,GAAYnD,eAAeS,MAAAA,GAAY;MAACJ,IAAAA,CAAKM,IAAAA;AAAShB,MAAAA,GAAAA;AAAQA,KAAAA,GAAAA,IAAAA;AAClE,EAAA;AAGA,EAAA,MAAMyD,UAAAA,GAAa;AACf,IAAA,KAAA;AACI/C,IAAAA,GAAAA,IAAAA,CAAKgD,UAAAA,GAAa;AAAC,MAAA;QAAkB,EAAA;AACzC,IAAA,MAAA;AACGN,IAAAA,GAAAA,OAAAA;AACH,IAAA,IAAA;AACA,IAAA,CAAA,EAAGf,aAAAA,CAAAA,WAAAA,CAAAA;AACH,IAAA,IAAA;AACA,IAAA,CAAA,WAAA,EAAcE,YAAAA,CAAAA,CAAAA;OACV9B,OAAAA,GAAU;AAAC,MAAA,IAAA;AAAMA,MAAAA,OAAAA,CAAQ0C,IAAAA;QAAU,EAAA;AACpCT,IAAAA,GAAAA,UAAAA;OACCrC,UAAAA,GAAa;AAAC,MAAA,cAAA;AAAgBA,MAAAA;QAAc,EAAA;AAChDtB,IAAAA,QAAAA;AACGyE,IAAAA,GAAAA;;AAGP,EAAA,MAAMxE,MAAAA,GAAS,MAAM2E,qBAAAA,CACjBxD,OAAAA,CAAQ+C,OAAAA,CAAQ,CAACxE,MAAAA,KACbA,MAAAA,CAAOkC,IAAAA,KAAS,SAAA,IAAalC,MAAAA,CAAOkF,MAAAA,GAAS;IAAClF,MAAAA,CAAOsC;AAAQ,GAAA,GAAA,EAAE,CAAA,EAEnE,MAAMlD,cAAW2F,UAAAA,CAAAA,CAAAA,CAAaxE,SAAO,CAAA;AAEzC4E,EAAAA,qBAAAA,CAAsB9D,OAAAA,EAASf,MAAAA,EAAQqD,aAAAA,EAAeE,YAAAA,CAAAA;AAGtD,EAAA,MAAM,EAAE7C,UAAQ,GAAKV,MAAAA;AACrB,EAAA,IAAIU,aAAa,CAAA,EAAG;AAChBzB,IAAAA,wBAAAA,CAAQ6F,IAAAA,CAAKpE,YAAY,CAAA,CAAA;AAC7B,EAAA;AACJ;AAvKsBI,mBAAAA,CAAAA,kBAAAA,EAAAA,oBAAAA,CAAAA;AAyKtB,SAAS+D,qBAAAA,CACL9D,OAAAA,EACAgE,aAAAA,EACA1B,aAAAA,EACA2B,OAAAA,EAAe;AAEf,EAAA,IAAI,YAAYjE,OAAAA,EAAS;AACrB,IAAA,MAAMkE,UAAAA,GAAmCF,cAAcG,IAAAA,EAAI;AAC3D,IAAA,MAAMC,OAAAA,GAAUF,UAAAA,CAAWG,MAAAA,CAAO3F,GAAAA,CAAI,CAAC4F,IAAAA,KAAiB,CAAA,EAAGA,IAAAA,CAAKjF,KAAAA,CAAM,IAAA,CAAA,CAAM,CAAA,CAAE,CAAA,GAAA,CAAK,CAAA;AACnFkF,IAAAA,mBAAAA,CAAGC,aAAAA,CACC/B,qBAAAA,CAAK3C,IAAAA,CAAKwC,aAAAA,EAAe2B,OAAAA,EAAS,cAAA,CAAA,EAClCQ,IAAAA,CAAKC,SAAAA,CAAUN,OAAAA,EAAS,IAAA,EAAM,CAAA,CAAA,CAAA;AAEtC,EAAA;AACJ;AAdSN,mBAAAA,CAAAA,qBAAAA,EAAAA,uBAAAA,CAAAA","file":"S5DRZSZW.cjs","sourcesContent":["import fs from 'node:fs';\nimport path from 'node:path';\nimport process from 'node:process';\nimport { $, type ProcessOutput } from 'zx';\n\nimport { getFullyQualifiedRepoRootPath } from '@layerzerolabs/common-node-utils';\n\nimport { AWS_ACCOUNT_ID, AWS_REGION, tools } from '../config';\nimport type { EnvironmentVariable, Version, VolumeMapping } from '../types';\nimport { getImageURI } from '../utils/docker';\nimport { stringifyError } from '../utils/error';\nimport { findToolByName, getChainTypeForTool } from '../utils/finder';\nimport { versionsSatisfied } from '../utils/version';\nimport { lockMany } from './lock';\nimport { extractUserVersions, resolveTypeVersions } from './version-resolver';\n\n// Configure zx to inherit stdio by default (moved from original setup)\n$.verbose = true;\n$.stdio = ['inherit', 'pipe', process.stderr];\n\n/**\n * Merge default volumes with user-specified volumes\n * User volumes take precedence when containerPath conflicts\n */\nconst mergeVolumes = (\n defaultVolumes: VolumeMapping[],\n userVolumes: VolumeMapping[],\n): VolumeMapping[] => {\n const paths = new Set(userVolumes.map((volume) => volume.containerPath));\n\n return [...userVolumes, ...defaultVolumes.filter((volume) => !paths.has(volume.containerPath))];\n};\n\nasync function ensureDockerImage(imageURI: string): Promise<void> {\n let output: ProcessOutput;\n\n try {\n // Check local images first.\n output = await $`docker image ls ${imageURI}`.nothrow();\n\n if (output.stdout.includes(imageURI.split(':')[1])) {\n console.info(`✅ Using cached Docker image: ${imageURI}`);\n return;\n }\n\n console.info('📥 Pulling Docker image from ECR:', imageURI);\n output = await $`docker pull ${imageURI}`.nothrow();\n } catch (error: unknown) {\n throw new Error(`Failed to pull Docker image ${imageURI}: ${stringifyError(error)}`);\n }\n\n if (output.exitCode) {\n throw new Error(\n [\n 'Docker image not available:',\n ` - ECR image: ${imageURI} (pull failed)`,\n '',\n '💡 Solutions:',\n ` 1. Authenticate with ECR: aws ecr get-login-password --region ${AWS_REGION} | ` +\n `docker login --username AWS --password-stdin ${AWS_ACCOUNT_ID}.dkr.ecr.${AWS_REGION}.amazonaws.com`,\n ' 2. Check if the image tag exists in ECR.',\n ].join('\\n'),\n );\n }\n\n console.info(`✅ Successfully pulled: ${imageURI}`);\n}\n\n/**\n * Enhanced tool command execution using the new version compatibility matrix system\n */\nexport async function executeToolCommand(\n command: string,\n args: string[],\n options: {\n cwd: string;\n volumes: VolumeMapping[];\n customEntrypoint?: string;\n env: EnvironmentVariable[];\n script?: string;\n [key: string]: unknown;\n publish?: string;\n },\n): Promise<void> {\n const {\n cwd,\n volumes: userVolumes,\n customEntrypoint: entrypoint,\n env: customEnvVars,\n script,\n publish,\n } = options;\n\n const tool = findToolByName(command);\n const type = getChainTypeForTool(command);\n\n if (type === undefined) {\n throw new Error(\n [\n `Tool '${command}' not found or no type configuration available.`,\n `Available tools: ${tools.map(({ name }) => name).join(', ')}`,\n `Try: lz-tool --list-versions to see all available tools`,\n ].join('\\n'),\n );\n }\n\n // Merge default volumes with user-specified volumes\n const defaultVolumes = tool.defaultVolumes ?? [];\n const volumes = mergeVolumes(defaultVolumes, userVolumes);\n\n if (defaultVolumes.length > 0) {\n console.info(`📦 Using ${defaultVolumes.length} default cache volume(s) for ${command}`);\n if (userVolumes.length > 0) {\n const overrides = userVolumes.filter((uv) =>\n defaultVolumes.some((dv) => dv.containerPath === uv.containerPath),\n );\n if (overrides.length > 0) {\n console.info(`🔧 User volumes override ${overrides.length} default volume(s)`);\n }\n }\n }\n\n // Extract user-specified versions from command line options\n const userSpecifiedVersions = extractUserVersions(options);\n\n // Resolve versions for all tools in the type using compatibility matrix\n const versionResult = resolveTypeVersions(type, userSpecifiedVersions, options, cwd);\n\n for (const warning of versionResult.warnings) {\n console.warn(warning);\n }\n\n // Get the resolved version for the current tool\n const resolvedVersion = versionResult.resolvedVersions[command];\n if (typeof resolvedVersion !== 'string' || resolvedVersion === '') {\n throw new Error(`No version resolved for tool ${command}`);\n }\n\n console.info(`🔧 ${command} version: ${resolvedVersion}`);\n\n // Check secondary version validation if available\n if (tool.getSecondaryVersionCheckValue) {\n try {\n const secondaryVersion = tool.getSecondaryVersionCheckValue({ cwd });\n const resolvedVersionObj: Version = { version: resolvedVersion };\n\n if (!versionsSatisfied(secondaryVersion, resolvedVersionObj)) {\n console.warn(\n `Warning: Local configuration version (${secondaryVersion.version}) differs from resolved version (${resolvedVersion})`,\n );\n }\n } catch (error) {\n // Secondary version check failed, but continue with resolved version\n console.warn('Could not validate secondary version:', stringifyError(error));\n }\n }\n\n // Use Docker image with merged volumes\n const imageURI = getImageURI(tool.name, resolvedVersion);\n const workspaceRoot = await getFullyQualifiedRepoRootPath();\n const relativePath = path.relative(workspaceRoot, cwd);\n\n await ensureDockerImage(imageURI);\n\n const volumeArgs = volumes\n .map((volume) => {\n if (volume.type === 'host') {\n return `${volume.hostPath}:${volume.containerPath}`;\n }\n\n const components = ['lz-tooling-cache', volume.name];\n\n if (!volume.shared) {\n // This is the package name where the `lz-tool` command is executed.\n // eslint-disable-next-line turbo/no-undeclared-env-vars\n const packageName = process.env.npm_package_name;\n\n if (!packageName) {\n throw new Error('npm_package_name environment variable not defined');\n }\n\n components.push(path.basename(packageName));\n }\n\n return `${components.join('-')}:${volume.containerPath}`;\n })\n .flatMap((volume) => ['-v', volume]);\n\n if (entrypoint?.trim()) {\n console.info(`🔧 Using custom entrypoint: ${entrypoint}`);\n }\n\n // Build the Docker command with proper argument separation\n const envArgs = customEnvVars.map((envVar) => ['-e', `${envVar.name}=${envVar.value}`]).flat();\n\n if (customEnvVars.length > 0) {\n console.info(`🌍 Using ${customEnvVars.length} custom environment variable(s)`);\n }\n\n // Handle custom script execution\n let finalArgs: string[];\n if (script && script.trim() !== '') {\n console.info(`📜 Executing custom script: ${script}`);\n finalArgs = ['bash', '-c', script];\n } else {\n finalArgs = entrypoint === undefined ? [tool.name, ...args] : args;\n }\n\n // Build the Docker command with proper argument separation\n const dockerArgs = [\n 'run',\n ...(tool.privileged ? ['--privileged'] : []),\n '--rm',\n ...envArgs,\n '-v',\n `${workspaceRoot}:/workspace`,\n '-w',\n `/workspace/${relativePath}`,\n ...(publish ? ['-p', publish.trim()] : []),\n ...volumeArgs,\n ...(entrypoint ? ['--entrypoint', entrypoint] : []),\n imageURI,\n ...finalArgs,\n ];\n\n const output = await lockMany(\n volumes.flatMap((volume) =>\n volume.type === 'isolate' && volume.locked ? [volume.name] : [],\n ),\n () => $`docker ${dockerArgs}`.nothrow(),\n );\n saveAptosModulesOrder(command, output, workspaceRoot, relativePath);\n\n // Handle the process completion\n const { exitCode } = output;\n if (exitCode !== 0) {\n process.exit(exitCode ?? 1);\n }\n}\n\nfunction saveAptosModulesOrder(\n command: string,\n processOutput: ProcessOutput,\n workspaceRoot: string,\n relPath: string,\n): void {\n if ('aptos' === command) {\n const outputJson: { Result: string[] } = processOutput.json();\n const modules = outputJson.Result.map((item: string) => `${item.split('::')[1]}.mv`);\n fs.writeFileSync(\n path.join(workspaceRoot, relPath, 'modules.json'),\n JSON.stringify(modules, null, 2),\n );\n }\n}\n"]}
@@ -1,56 +1,56 @@
1
1
  'use strict';
2
2
 
3
- var OAYLBSRH_cjs = require('./OAYLBSRH.cjs');
4
- var VVTDADG7_cjs = require('./VVTDADG7.cjs');
5
- require('./DPDVRYLI.cjs');
6
- var BXO3RC75_cjs = require('./BXO3RC75.cjs');
7
- var VO65XOWD_cjs = require('./VO65XOWD.cjs');
3
+ var P5BPMTGP_cjs = require('./P5BPMTGP.cjs');
4
+ var _7WVEMAKW_cjs = require('./7WVEMAKW.cjs');
5
+ require('./WDSPHVPJ.cjs');
6
+ var JGLHYXTW_cjs = require('./JGLHYXTW.cjs');
7
+ var U7VZULNU_cjs = require('./U7VZULNU.cjs');
8
8
 
9
9
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js
10
- VO65XOWD_cjs.init_cjs_shims();
10
+ U7VZULNU_cjs.init_cjs_shims();
11
11
 
12
12
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
13
- VO65XOWD_cjs.init_cjs_shims();
13
+ U7VZULNU_cjs.init_cjs_shims();
14
14
 
15
15
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
16
- VO65XOWD_cjs.init_cjs_shims();
16
+ U7VZULNU_cjs.init_cjs_shims();
17
17
 
18
18
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
19
- VO65XOWD_cjs.init_cjs_shims();
19
+ U7VZULNU_cjs.init_cjs_shims();
20
20
 
21
21
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
22
- VO65XOWD_cjs.init_cjs_shims();
23
- var resolveCredentialSource = /* @__PURE__ */ VO65XOWD_cjs.__name((credentialSource, profileName, logger) => {
22
+ U7VZULNU_cjs.init_cjs_shims();
23
+ var resolveCredentialSource = /* @__PURE__ */ U7VZULNU_cjs.__name((credentialSource, profileName, logger) => {
24
24
  const sourceProvidersMap = {
25
- EcsContainer: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
26
- const { fromHttp } = await import('./IQXSRATS.cjs');
27
- const { fromContainerMetadata } = await import('./QO6IEDLG.cjs');
25
+ EcsContainer: /* @__PURE__ */ U7VZULNU_cjs.__name(async (options) => {
26
+ const { fromHttp } = await import('./4SZ6P77Q.cjs');
27
+ const { fromContainerMetadata } = await import('./HMP4FGDB.cjs');
28
28
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
29
- return async () => BXO3RC75_cjs.chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
29
+ return async () => JGLHYXTW_cjs.chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
30
30
  }, "EcsContainer"),
31
- Ec2InstanceMetadata: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
31
+ Ec2InstanceMetadata: /* @__PURE__ */ U7VZULNU_cjs.__name(async (options) => {
32
32
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
33
- const { fromInstanceMetadata } = await import('./QO6IEDLG.cjs');
33
+ const { fromInstanceMetadata } = await import('./HMP4FGDB.cjs');
34
34
  return async () => fromInstanceMetadata(options)().then(setNamedProvider);
35
35
  }, "Ec2InstanceMetadata"),
36
- Environment: /* @__PURE__ */ VO65XOWD_cjs.__name(async (options) => {
36
+ Environment: /* @__PURE__ */ U7VZULNU_cjs.__name(async (options) => {
37
37
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
38
- const { fromEnv } = await import('./AY3IP22W.cjs');
38
+ const { fromEnv } = await import('./2AQAGKCU.cjs');
39
39
  return async () => fromEnv(options)().then(setNamedProvider);
40
40
  }, "Environment")
41
41
  };
42
42
  if (credentialSource in sourceProvidersMap) {
43
43
  return sourceProvidersMap[credentialSource];
44
44
  } else {
45
- throw new BXO3RC75_cjs.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, {
45
+ throw new JGLHYXTW_cjs.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, {
46
46
  logger
47
47
  });
48
48
  }
49
49
  }, "resolveCredentialSource");
50
- var setNamedProvider = /* @__PURE__ */ VO65XOWD_cjs.__name((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p"), "setNamedProvider");
50
+ var setNamedProvider = /* @__PURE__ */ U7VZULNU_cjs.__name((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p"), "setNamedProvider");
51
51
 
52
52
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
53
- var isAssumeRoleProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile = "default", logger } = {}) => {
53
+ var isAssumeRoleProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg, { profile = "default", logger } = {}) => {
54
54
  return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && [
55
55
  "undefined",
56
56
  "string"
@@ -68,26 +68,26 @@ var isAssumeRoleProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile =
68
68
  logger
69
69
  }));
70
70
  }, "isAssumeRoleProfile");
71
- var isAssumeRoleWithSourceProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile, logger }) => {
71
+ var isAssumeRoleWithSourceProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg, { profile, logger }) => {
72
72
  const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
73
73
  if (withSourceProfile) {
74
74
  logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
75
75
  }
76
76
  return withSourceProfile;
77
77
  }, "isAssumeRoleWithSourceProfile");
78
- var isCredentialSourceProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg, { profile, logger }) => {
78
+ var isCredentialSourceProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg, { profile, logger }) => {
79
79
  const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
80
80
  if (withProviderProfile) {
81
81
  logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
82
82
  }
83
83
  return withProviderProfile;
84
84
  }, "isCredentialSourceProfile");
85
- var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}) => {
85
+ var resolveAssumeRoleCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}) => {
86
86
  options.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");
87
87
  const profileData = profiles[profileName];
88
88
  const { source_profile, region } = profileData;
89
89
  if (!options.roleAssumer) {
90
- const { getDefaultRoleAssumer } = await import('./NNE5MIRH.cjs');
90
+ const { getDefaultRoleAssumer } = await import('./DEL75SYN.cjs');
91
91
  options.roleAssumer = getDefaultRoleAssumer({
92
92
  ...options.clientConfig,
93
93
  credentialProviderLogger: options.logger,
@@ -98,7 +98,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (pr
98
98
  }, options.clientPlugins);
99
99
  }
100
100
  if (source_profile && source_profile in visitedProfiles) {
101
- throw new BXO3RC75_cjs.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${OAYLBSRH_cjs.getProfileName(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "), {
101
+ throw new JGLHYXTW_cjs.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${P5BPMTGP_cjs.getProfileName(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "), {
102
102
  logger: options.logger
103
103
  });
104
104
  }
@@ -108,7 +108,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (pr
108
108
  [source_profile]: true
109
109
  }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {})) : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();
110
110
  if (isCredentialSourceWithoutRoleArn(profileData)) {
111
- return sourceCredsProvider.then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
111
+ return sourceCredsProvider.then((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
112
112
  } else {
113
113
  const params = {
114
114
  RoleArn: profileData.role_arn,
@@ -119,7 +119,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (pr
119
119
  const { mfa_serial } = profileData;
120
120
  if (mfa_serial) {
121
121
  if (!options.mfaCodeProvider) {
122
- throw new BXO3RC75_cjs.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, {
122
+ throw new JGLHYXTW_cjs.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, {
123
123
  logger: options.logger,
124
124
  tryNextLink: false
125
125
  });
@@ -128,25 +128,25 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (pr
128
128
  params.TokenCode = await options.mfaCodeProvider(mfa_serial);
129
129
  }
130
130
  const sourceCreds = await sourceCredsProvider;
131
- return options.roleAssumer(sourceCreds, params).then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
131
+ return options.roleAssumer(sourceCreds, params).then((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
132
132
  }
133
133
  }, "resolveAssumeRoleCredentials");
134
- var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ VO65XOWD_cjs.__name((section) => {
134
+ var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ U7VZULNU_cjs.__name((section) => {
135
135
  return !section.role_arn && !!section.credential_source;
136
136
  }, "isCredentialSourceWithoutRoleArn");
137
137
 
138
138
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
139
- VO65XOWD_cjs.init_cjs_shims();
140
- var isProcessProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
141
- var resolveProcessCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (options, profile) => import('./4UZKQNSD.cjs').then(({ fromProcess }) => fromProcess({
139
+ U7VZULNU_cjs.init_cjs_shims();
140
+ var isProcessProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
141
+ var resolveProcessCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (options, profile) => import('./OZNFYXME.cjs').then(({ fromProcess }) => fromProcess({
142
142
  ...options,
143
143
  profile
144
- })().then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
144
+ })().then((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
145
145
 
146
146
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
147
- VO65XOWD_cjs.init_cjs_shims();
148
- var resolveSsoCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, profileData, options = {}) => {
149
- const { fromSSO } = await import('./LUO6HP3P.cjs');
147
+ U7VZULNU_cjs.init_cjs_shims();
148
+ var resolveSsoCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profile, profileData, options = {}) => {
149
+ const { fromSSO } = await import('./KFOKN2M2.cjs');
150
150
  return fromSSO({
151
151
  profile,
152
152
  logger: options.logger,
@@ -154,24 +154,24 @@ var resolveSsoCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile,
154
154
  clientConfig: options.clientConfig
155
155
  })().then((creds) => {
156
156
  if (profileData.sso_session) {
157
- return VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO", "r");
157
+ return _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO", "r");
158
158
  } else {
159
- return VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO_LEGACY", "t");
159
+ return _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO_LEGACY", "t");
160
160
  }
161
161
  });
162
162
  }, "resolveSsoCredentials");
163
- var isSsoProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
163
+ var isSsoProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
164
164
 
165
165
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
166
- VO65XOWD_cjs.init_cjs_shims();
167
- var isStaticCredsProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && [
166
+ U7VZULNU_cjs.init_cjs_shims();
167
+ var isStaticCredsProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && [
168
168
  "undefined",
169
169
  "string"
170
170
  ].indexOf(typeof arg.aws_session_token) > -1 && [
171
171
  "undefined",
172
172
  "string"
173
173
  ].indexOf(typeof arg.aws_account_id) > -1, "isStaticCredsProfile");
174
- var resolveStaticCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, options) => {
174
+ var resolveStaticCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profile, options) => {
175
175
  options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
176
176
  const credentials = {
177
177
  accessKeyId: profile.aws_access_key_id,
@@ -184,26 +184,26 @@ var resolveStaticCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profil
184
184
  accountId: profile.aws_account_id
185
185
  }
186
186
  };
187
- return VVTDADG7_cjs.setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
187
+ return _7WVEMAKW_cjs.setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
188
188
  }, "resolveStaticCredentials");
189
189
 
190
190
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
191
- VO65XOWD_cjs.init_cjs_shims();
192
- var isWebIdentityProfile = /* @__PURE__ */ VO65XOWD_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && [
191
+ U7VZULNU_cjs.init_cjs_shims();
192
+ var isWebIdentityProfile = /* @__PURE__ */ U7VZULNU_cjs.__name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && [
193
193
  "undefined",
194
194
  "string"
195
195
  ].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
196
- var resolveWebIdentityCredentials = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profile, options) => import('./DK5YZCTB.cjs').then(({ fromTokenFile }) => fromTokenFile({
196
+ var resolveWebIdentityCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profile, options) => import('./EPPFFBGP.cjs').then(({ fromTokenFile }) => fromTokenFile({
197
197
  webIdentityTokenFile: profile.web_identity_token_file,
198
198
  roleArn: profile.role_arn,
199
199
  roleSessionName: profile.role_session_name,
200
200
  roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
201
201
  logger: options.logger,
202
202
  parentClientConfig: options.parentClientConfig
203
- })().then((creds) => VVTDADG7_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q"))), "resolveWebIdentityCredentials");
203
+ })().then((creds) => _7WVEMAKW_cjs.setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q"))), "resolveWebIdentityCredentials");
204
204
 
205
205
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
206
- var resolveProfileData = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
206
+ var resolveProfileData = /* @__PURE__ */ U7VZULNU_cjs.__name(async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
207
207
  const data = profiles[profileName];
208
208
  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
209
209
  return resolveStaticCredentials(data, options);
@@ -226,13 +226,13 @@ var resolveProfileData = /* @__PURE__ */ VO65XOWD_cjs.__name(async (profileName,
226
226
  if (isSsoProfile(data)) {
227
227
  return await resolveSsoCredentials(profileName, data, options);
228
228
  }
229
- throw new BXO3RC75_cjs.CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, {
229
+ throw new JGLHYXTW_cjs.CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, {
230
230
  logger: options.logger
231
231
  });
232
232
  }, "resolveProfileData");
233
233
 
234
234
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
235
- var fromIni = /* @__PURE__ */ VO65XOWD_cjs.__name((_init = {}) => async ({ callerClientConfig } = {}) => {
235
+ var fromIni = /* @__PURE__ */ U7VZULNU_cjs.__name((_init = {}) => async ({ callerClientConfig } = {}) => {
236
236
  const init = {
237
237
  ..._init,
238
238
  parentClientConfig: {
@@ -241,12 +241,12 @@ var fromIni = /* @__PURE__ */ VO65XOWD_cjs.__name((_init = {}) => async ({ calle
241
241
  }
242
242
  };
243
243
  init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
244
- const profiles = await OAYLBSRH_cjs.parseKnownFiles(init);
245
- return resolveProfileData(OAYLBSRH_cjs.getProfileName({
244
+ const profiles = await P5BPMTGP_cjs.parseKnownFiles(init);
245
+ return resolveProfileData(P5BPMTGP_cjs.getProfileName({
246
246
  profile: _init.profile ?? callerClientConfig?.profile
247
247
  }), profiles, init);
248
248
  }, "fromIni");
249
249
 
250
250
  exports.fromIni = fromIni;
251
- //# sourceMappingURL=L5ENV2DK.cjs.map
252
- //# sourceMappingURL=L5ENV2DK.cjs.map
251
+ //# sourceMappingURL=SPOUVTPR.cjs.map
252
+ //# sourceMappingURL=SPOUVTPR.cjs.map
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["init_cjs_shims","resolveCredentialSource","__name","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAEO,IAAMC,uBAAAA,mBAA0BC,mBAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,6CAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,gBAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,kBAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,6CAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,6CAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,qCAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmBZ,mBAAA,CAAA,CAACkB,KAAAA,KAAUC,kCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,wCAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC7B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B9B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+BnC,mBAAA,CAAA,OAAOE,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,qCAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,2BAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMjC,uBAAAA,CAAwBuC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,kCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,qCAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,wCAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzCnC,2BAAA,EAAA;AACO,IAAMsE,gBAAAA,mBAAmBpE,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4BtE,mBAAA,CAAA,OAAOM,OAAAA,EAASgB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzCpB,2BAAA,EAAA;AACO,IAAM0E,wCAAwBxE,mBAAA,CAAA,OAAOsB,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,iCAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,iCAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,wCAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5BjF,2BAAA,EAAA;AACO,IAAMkF,uCAAuBhF,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2BrF,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,iCAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxCxF,2BAAA,EAAA;AACO,IAAM+F,uCAAuB7F,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC/F,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,iCAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,8CAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAUxG,mBAAA,CAAA,CAACyG,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,4BAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,2BAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"L5ENV2DK.cjs","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["init_cjs_shims","resolveCredentialSource","__name","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAEO,IAAMC,uBAAAA,mBAA0BC,mBAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,6CAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,gBAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,kBAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,6CAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,6CAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,qCAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmBZ,mBAAA,CAAA,CAACkB,KAAAA,KAAUC,mCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,wCAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC7B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B9B,mBAAA,CAAA,CAACqB,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+BnC,mBAAA,CAAA,OAAOE,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,qCAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,2BAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMjC,uBAAAA,CAAwBuC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,mCAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,qCAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,kCAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,wCAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzCnC,2BAAA,EAAA;AACO,IAAMsE,gBAAAA,mBAAmBpE,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4BtE,mBAAA,CAAA,OAAOM,OAAAA,EAASgB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,kCAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzCpB,2BAAA,EAAA;AACO,IAAM0E,wCAAwBxE,mBAAA,CAAA,OAAOsB,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,gBAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,kCAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,kCAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,wCAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5BjF,2BAAA,EAAA;AACO,IAAMkF,uCAAuBhF,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2BrF,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,kCAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxCxF,2BAAA,EAAA;AACO,IAAM+F,uCAAuB7F,mBAAA,CAAA,CAACqB,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC/F,mBAAA,CAAA,OAAOsB,OAAAA,EAAShB,OAAAA,KAAY,OAAO,gBAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,kCAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,8CAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAUxG,mBAAA,CAAA,CAACyG,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,4BAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,2BAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"SPOUVTPR.cjs","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}