@layerzerolabs/vm-tooling 0.0.66 → 0.0.73

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (310) hide show
  1. package/dist/{JEOLJJ6F.js → 35BIBLTE.js} +5 -5
  2. package/dist/{JEOLJJ6F.js.map → 35BIBLTE.js.map} +1 -1
  3. package/dist/36UU6CJU.cjs +57 -0
  4. package/dist/36UU6CJU.cjs.map +1 -0
  5. package/dist/{JZHAF3IW.js → 3YHRHIKS.js} +8 -11
  6. package/dist/3YHRHIKS.js.map +1 -0
  7. package/dist/{EPPFFBGP.cjs → 4CTWHZA4.cjs} +3 -3
  8. package/dist/{EPPFFBGP.cjs.map → 4CTWHZA4.cjs.map} +1 -1
  9. package/dist/55HL3CFD.js +50 -0
  10. package/dist/55HL3CFD.js.map +1 -0
  11. package/dist/{DEL75SYN.cjs → 6MCEHW2U.cjs} +49 -49
  12. package/dist/{DEL75SYN.cjs.map → 6MCEHW2U.cjs.map} +1 -1
  13. package/dist/{TQMUPD75.cjs → 6NIOUVPA.cjs} +25 -4
  14. package/dist/6NIOUVPA.cjs.map +1 -0
  15. package/dist/{GBR35MZ7.js → 6OU7NCZK.js} +6 -6
  16. package/dist/{GBR35MZ7.js.map → 6OU7NCZK.js.map} +1 -1
  17. package/dist/{OAO7CCJW.js → 6QZPR4XG.js} +2 -2
  18. package/dist/6QZPR4XG.js.map +1 -0
  19. package/dist/6YTOLRHQ.js +6 -0
  20. package/dist/6YTOLRHQ.js.map +1 -0
  21. package/dist/{UN57VWAW.cjs → 7ZH64OYR.cjs} +4 -4
  22. package/dist/{UN57VWAW.cjs.map → 7ZH64OYR.cjs.map} +1 -1
  23. package/dist/ACDTMA6Q.cjs +72 -0
  24. package/dist/ACDTMA6Q.cjs.map +1 -0
  25. package/dist/{BNMJ5QME.cjs → ASYXJJD4.cjs} +49 -49
  26. package/dist/{BNMJ5QME.cjs.map → ASYXJJD4.cjs.map} +1 -1
  27. package/dist/{MMIV5S36.js → BTXB2LKA.js} +14 -8
  28. package/dist/BTXB2LKA.js.map +1 -0
  29. package/dist/{KTAMTSBK.cjs → BVXMXRYL.cjs} +7 -7
  30. package/dist/{KTAMTSBK.cjs.map → BVXMXRYL.cjs.map} +1 -1
  31. package/dist/D3JHHTB6.js +152 -0
  32. package/dist/D3JHHTB6.js.map +1 -0
  33. package/dist/{DPCW4JIV.cjs → DB5GRF5K.cjs} +14 -8
  34. package/dist/DB5GRF5K.cjs.map +1 -0
  35. package/dist/{QMXX45TO.js → EDWLY6YP.js} +3 -3
  36. package/dist/{QMXX45TO.js.map → EDWLY6YP.js.map} +1 -1
  37. package/dist/EYP6JZRD.cjs +86 -0
  38. package/dist/EYP6JZRD.cjs.map +1 -0
  39. package/dist/F35TPZS3.js +121 -0
  40. package/dist/F35TPZS3.js.map +1 -0
  41. package/dist/{3PEVFTZ5.js → FL2DFW3Y.js} +5 -4
  42. package/dist/FL2DFW3Y.js.map +1 -0
  43. package/dist/{GERMNIDG.cjs → FOFSZBOK.cjs} +87 -107
  44. package/dist/FOFSZBOK.cjs.map +1 -0
  45. package/dist/FQUILSS5.js +52 -0
  46. package/dist/FQUILSS5.js.map +1 -0
  47. package/dist/FUT2FDDD.cjs +48 -0
  48. package/dist/FUT2FDDD.cjs.map +1 -0
  49. package/dist/GIS4KMDM.js +6 -0
  50. package/dist/GIS4KMDM.js.map +1 -0
  51. package/dist/{BOOCAPHW.js → GLJJOBCM.js} +6 -6
  52. package/dist/{BOOCAPHW.js.map → GLJJOBCM.js.map} +1 -1
  53. package/dist/{22KWM667.cjs → GSWL56ZH.cjs} +36 -72
  54. package/dist/GSWL56ZH.cjs.map +1 -0
  55. package/dist/{6YQKZHZ5.js → H7LPHZJT.js} +86 -103
  56. package/dist/H7LPHZJT.js.map +1 -0
  57. package/dist/IDMMHZJ3.cjs +8 -0
  58. package/dist/IDMMHZJ3.cjs.map +1 -0
  59. package/dist/{QPWLW7SN.js → II7QHMLF.js} +31 -66
  60. package/dist/II7QHMLF.js.map +1 -0
  61. package/dist/KSZMBVFB.cjs +154 -0
  62. package/dist/KSZMBVFB.cjs.map +1 -0
  63. package/dist/{HVBHNWI7.js → LF6BYBZY.js} +3 -3
  64. package/dist/{HVBHNWI7.js.map → LF6BYBZY.js.map} +1 -1
  65. package/dist/{OZNFYXME.cjs → LH4V3GFX.cjs} +3 -3
  66. package/dist/{OZNFYXME.cjs.map → LH4V3GFX.cjs.map} +1 -1
  67. package/dist/LNCARCBD.cjs +48 -0
  68. package/dist/LNCARCBD.cjs.map +1 -0
  69. package/dist/M6KBN6B2.cjs +21 -0
  70. package/dist/M6KBN6B2.cjs.map +1 -0
  71. package/dist/{4QL6ZBHT.cjs → MQTCD42Y.cjs} +6 -6
  72. package/dist/{4QL6ZBHT.cjs.map → MQTCD42Y.cjs.map} +1 -1
  73. package/dist/N67IGBHN.js +29 -0
  74. package/dist/N67IGBHN.js.map +1 -0
  75. package/dist/O2C74Z3Q.cjs +17 -0
  76. package/dist/O2C74Z3Q.cjs.map +1 -0
  77. package/dist/{Y3REZYJA.js → OANFSFAO.js} +7 -7
  78. package/dist/{Y3REZYJA.js.map → OANFSFAO.js.map} +1 -1
  79. package/dist/OLQR7R3W.js +84 -0
  80. package/dist/OLQR7R3W.js.map +1 -0
  81. package/dist/ORWR6LWW.js +26 -0
  82. package/dist/ORWR6LWW.js.map +1 -0
  83. package/dist/OUJ5TG6W.js +26 -0
  84. package/dist/OUJ5TG6W.js.map +1 -0
  85. package/dist/{Q3ORCLJH.cjs → PUL6NSHI.cjs} +46 -53
  86. package/dist/PUL6NSHI.cjs.map +1 -0
  87. package/dist/{W5XVOHRB.js → S37YVMJL.js} +6 -6
  88. package/dist/{W5XVOHRB.js.map → S37YVMJL.js.map} +1 -1
  89. package/dist/S3PHE6F2.cjs +8 -0
  90. package/dist/S3PHE6F2.cjs.map +1 -0
  91. package/dist/{Y5ZXTD76.cjs → SHJCZ6NL.cjs} +49 -49
  92. package/dist/{Y5ZXTD76.cjs.map → SHJCZ6NL.cjs.map} +1 -1
  93. package/dist/{FAOU2ZJO.js → TXDLSUBD.js} +4 -4
  94. package/dist/{FAOU2ZJO.js.map → TXDLSUBD.js.map} +1 -1
  95. package/dist/VPKYL66J.cjs +18270 -0
  96. package/dist/VPKYL66J.cjs.map +1 -0
  97. package/dist/{CMSYZVLH.js → WDAYI6EQ.js} +3 -3
  98. package/dist/{CMSYZVLH.js.map → WDAYI6EQ.js.map} +1 -1
  99. package/dist/XCMLC6HI.js +18267 -0
  100. package/dist/XCMLC6HI.js.map +1 -0
  101. package/dist/XYT4PCRV.cjs +31 -0
  102. package/dist/XYT4PCRV.cjs.map +1 -0
  103. package/dist/Y27GTZ2Q.js +19 -0
  104. package/dist/Y27GTZ2Q.js.map +1 -0
  105. package/dist/YLHOHCRW.js +15 -0
  106. package/dist/YLHOHCRW.js.map +1 -0
  107. package/dist/{GSHFVQRI.cjs → Z253B63X.cjs} +2 -2
  108. package/dist/Z253B63X.cjs.map +1 -0
  109. package/dist/{ER722VGO.cjs → ZD3LAY33.cjs} +17 -20
  110. package/dist/ZD3LAY33.cjs.map +1 -0
  111. package/dist/{37UR3RSN.cjs → ZQFCLTYU.cjs} +4 -4
  112. package/dist/{37UR3RSN.cjs.map → ZQFCLTYU.cjs.map} +1 -1
  113. package/dist/commands/aptos.cjs +22 -0
  114. package/dist/commands/aptos.cjs.map +1 -0
  115. package/dist/commands/aptos.d.ts +3 -0
  116. package/dist/commands/aptos.d.ts.map +1 -0
  117. package/dist/commands/aptos.js +13 -0
  118. package/dist/commands/aptos.js.map +1 -0
  119. package/dist/commands/iota.cjs +23 -0
  120. package/dist/commands/iota.cjs.map +1 -0
  121. package/dist/commands/iota.d.ts +3 -0
  122. package/dist/commands/iota.d.ts.map +1 -0
  123. package/dist/commands/iota.js +14 -0
  124. package/dist/commands/iota.js.map +1 -0
  125. package/dist/commands/starknet.cjs +13 -0
  126. package/dist/commands/starknet.cjs.map +1 -0
  127. package/dist/commands/{starknet/build-typescript-sdk.d.ts → starknet.d.ts} +1 -1
  128. package/dist/commands/starknet.d.ts.map +1 -0
  129. package/dist/commands/starknet.js +4 -0
  130. package/dist/commands/starknet.js.map +1 -0
  131. package/dist/commands/sui.cjs +23 -0
  132. package/dist/commands/sui.cjs.map +1 -0
  133. package/dist/commands/sui.d.ts +3 -0
  134. package/dist/commands/sui.d.ts.map +1 -0
  135. package/dist/commands/sui.js +14 -0
  136. package/dist/commands/sui.js.map +1 -0
  137. package/dist/commands/utility/sui-like.cjs +22 -0
  138. package/dist/commands/utility/sui-like.cjs.map +1 -0
  139. package/dist/commands/utility/sui-like.d.ts +16 -0
  140. package/dist/commands/utility/sui-like.d.ts.map +1 -0
  141. package/dist/commands/utility/sui-like.js +13 -0
  142. package/dist/commands/utility/sui-like.js.map +1 -0
  143. package/dist/config/docker-images.cjs +13 -0
  144. package/dist/config/docker-images.cjs.map +1 -0
  145. package/dist/config/docker-images.d.ts +145 -0
  146. package/dist/config/docker-images.d.ts.map +1 -0
  147. package/dist/config/docker-images.js +4 -0
  148. package/dist/config/docker-images.js.map +1 -0
  149. package/dist/config/docker-images.test.cjs +21 -0
  150. package/dist/config/docker-images.test.cjs.map +1 -0
  151. package/dist/config/docker-images.test.js +19 -0
  152. package/dist/config/docker-images.test.js.map +1 -0
  153. package/dist/config/index.cjs +21 -8
  154. package/dist/config/index.d.ts +3 -2
  155. package/dist/config/index.d.ts.map +1 -1
  156. package/dist/config/index.js +3 -2
  157. package/dist/config/tools.cjs +9 -4
  158. package/dist/config/tools.d.ts +1 -0
  159. package/dist/config/tools.d.ts.map +1 -1
  160. package/dist/config/tools.js +3 -2
  161. package/dist/config/version-matrices.cjs +2 -2
  162. package/dist/config/version-matrices.d.ts +8 -1
  163. package/dist/config/version-matrices.d.ts.map +1 -1
  164. package/dist/config/version-matrices.js +1 -1
  165. package/dist/core/index.cjs +10 -21
  166. package/dist/core/index.d.ts +2 -3
  167. package/dist/core/index.d.ts.map +1 -1
  168. package/dist/core/index.js +8 -7
  169. package/dist/core/lock.cjs +4 -4
  170. package/dist/core/lock.d.ts.map +1 -1
  171. package/dist/core/lock.js +1 -1
  172. package/dist/core/lock.test.cjs +11 -18274
  173. package/dist/core/lock.test.cjs.map +1 -1
  174. package/dist/core/lock.test.js +3 -18266
  175. package/dist/core/lock.test.js.map +1 -1
  176. package/dist/core/tool-executor.cjs +8 -7
  177. package/dist/core/tool-executor.d.ts +3 -2
  178. package/dist/core/tool-executor.d.ts.map +1 -1
  179. package/dist/core/tool-executor.js +7 -6
  180. package/dist/core/version-resolver.cjs +5 -13
  181. package/dist/core/version-resolver.d.ts +1 -24
  182. package/dist/core/version-resolver.d.ts.map +1 -1
  183. package/dist/core/version-resolver.js +4 -4
  184. package/dist/display/formatters.cjs +5 -4
  185. package/dist/display/formatters.d.ts +1 -1
  186. package/dist/display/formatters.d.ts.map +1 -1
  187. package/dist/display/formatters.js +4 -3
  188. package/dist/display/index.cjs +8 -7
  189. package/dist/display/index.js +5 -4
  190. package/dist/display/version-display.cjs +7 -6
  191. package/dist/display/version-display.d.ts.map +1 -1
  192. package/dist/display/version-display.js +5 -4
  193. package/dist/index.cjs +84 -56
  194. package/dist/index.cjs.map +1 -1
  195. package/dist/index.d.ts.map +1 -1
  196. package/dist/index.js +77 -49
  197. package/dist/index.js.map +1 -1
  198. package/dist/scripts/generate-github-matrix.cjs +73 -67
  199. package/dist/scripts/generate-github-matrix.cjs.map +1 -1
  200. package/dist/scripts/generate-github-matrix.js +30 -24
  201. package/dist/scripts/generate-github-matrix.js.map +1 -1
  202. package/dist/types/docker.cjs +8 -3
  203. package/dist/types/docker.cjs.map +1 -1
  204. package/dist/types/docker.d.ts +32 -15
  205. package/dist/types/docker.d.ts.map +1 -1
  206. package/dist/types/docker.js +2 -4
  207. package/dist/types/docker.js.map +1 -1
  208. package/dist/types/index.cjs +10 -3
  209. package/dist/types/index.cjs.map +1 -1
  210. package/dist/types/index.d.ts +2 -3
  211. package/dist/types/index.d.ts.map +1 -1
  212. package/dist/types/index.js +4 -4
  213. package/dist/types/index.js.map +1 -1
  214. package/dist/types/tool.cjs +2 -3
  215. package/dist/types/tool.cjs.map +1 -1
  216. package/dist/types/tool.d.ts +3 -7
  217. package/dist/types/tool.d.ts.map +1 -1
  218. package/dist/types/tool.js +2 -4
  219. package/dist/types/tool.js.map +1 -1
  220. package/dist/utils/docker.cjs +15 -5
  221. package/dist/utils/docker.d.ts +6 -3
  222. package/dist/utils/docker.d.ts.map +1 -1
  223. package/dist/utils/docker.js +4 -2
  224. package/dist/utils/finder.cjs +15 -18
  225. package/dist/utils/finder.d.ts +5 -5
  226. package/dist/utils/finder.d.ts.map +1 -1
  227. package/dist/utils/finder.js +3 -2
  228. package/dist/utils/version.cjs +7 -6
  229. package/dist/utils/version.d.ts +3 -4
  230. package/dist/utils/version.d.ts.map +1 -1
  231. package/dist/utils/version.js +3 -2
  232. package/dist/utils.cjs +5 -8
  233. package/dist/utils.d.ts +1 -4
  234. package/dist/utils.d.ts.map +1 -1
  235. package/dist/utils.js +3 -2
  236. package/package.json +5 -6
  237. package/dist/22KWM667.cjs.map +0 -1
  238. package/dist/3H446V2K.js +0 -6
  239. package/dist/3H446V2K.js.map +0 -1
  240. package/dist/3PEVFTZ5.js.map +0 -1
  241. package/dist/6YQKZHZ5.js.map +0 -1
  242. package/dist/7PSRMQMS.cjs +0 -51
  243. package/dist/7PSRMQMS.cjs.map +0 -1
  244. package/dist/BG3MG6IF.cjs +0 -127
  245. package/dist/BG3MG6IF.cjs.map +0 -1
  246. package/dist/DN5VBC3L.js +0 -128
  247. package/dist/DN5VBC3L.js.map +0 -1
  248. package/dist/DPCW4JIV.cjs.map +0 -1
  249. package/dist/ER722VGO.cjs.map +0 -1
  250. package/dist/FKPK53TD.cjs +0 -8
  251. package/dist/FKPK53TD.cjs.map +0 -1
  252. package/dist/GERMNIDG.cjs.map +0 -1
  253. package/dist/GSHFVQRI.cjs.map +0 -1
  254. package/dist/JZHAF3IW.js.map +0 -1
  255. package/dist/KFXJIHI6.js +0 -20
  256. package/dist/KFXJIHI6.js.map +0 -1
  257. package/dist/KPYTMXHJ.cjs +0 -22
  258. package/dist/KPYTMXHJ.cjs.map +0 -1
  259. package/dist/M4PGJV5D.js +0 -6
  260. package/dist/M4PGJV5D.js.map +0 -1
  261. package/dist/MMIV5S36.js.map +0 -1
  262. package/dist/OAO7CCJW.js.map +0 -1
  263. package/dist/PWDCAN6N.js +0 -37
  264. package/dist/PWDCAN6N.js.map +0 -1
  265. package/dist/Q3ORCLJH.cjs.map +0 -1
  266. package/dist/QPWLW7SN.js.map +0 -1
  267. package/dist/QYB5VPZE.cjs +0 -39
  268. package/dist/QYB5VPZE.cjs.map +0 -1
  269. package/dist/R2U2WXP4.js +0 -49
  270. package/dist/R2U2WXP4.js.map +0 -1
  271. package/dist/TQMUPD75.cjs.map +0 -1
  272. package/dist/XYNAO6GV.js +0 -119
  273. package/dist/XYNAO6GV.js.map +0 -1
  274. package/dist/Y7OWS2C2.cjs +0 -8
  275. package/dist/Y7OWS2C2.cjs.map +0 -1
  276. package/dist/commands/starknet/build-typescript-sdk.cjs +0 -13
  277. package/dist/commands/starknet/build-typescript-sdk.cjs.map +0 -1
  278. package/dist/commands/starknet/build-typescript-sdk.d.ts.map +0 -1
  279. package/dist/commands/starknet/build-typescript-sdk.js +0 -4
  280. package/dist/commands/starknet/build-typescript-sdk.js.map +0 -1
  281. package/dist/commands/starknet/index.cjs +0 -14
  282. package/dist/commands/starknet/index.cjs.map +0 -1
  283. package/dist/commands/starknet/index.d.ts +0 -2
  284. package/dist/commands/starknet/index.d.ts.map +0 -1
  285. package/dist/commands/starknet/index.js +0 -5
  286. package/dist/commands/starknet/index.js.map +0 -1
  287. package/dist/commands/sui/build.cjs +0 -20
  288. package/dist/commands/sui/build.cjs.map +0 -1
  289. package/dist/commands/sui/build.d.ts +0 -3
  290. package/dist/commands/sui/build.d.ts.map +0 -1
  291. package/dist/commands/sui/build.js +0 -11
  292. package/dist/commands/sui/build.js.map +0 -1
  293. package/dist/commands/sui/index.cjs +0 -21
  294. package/dist/commands/sui/index.cjs.map +0 -1
  295. package/dist/commands/sui/index.d.ts +0 -2
  296. package/dist/commands/sui/index.d.ts.map +0 -1
  297. package/dist/commands/sui/index.js +0 -12
  298. package/dist/commands/sui/index.js.map +0 -1
  299. package/dist/core/compatibility.cjs +0 -13
  300. package/dist/core/compatibility.cjs.map +0 -1
  301. package/dist/core/compatibility.d.ts +0 -8
  302. package/dist/core/compatibility.d.ts.map +0 -1
  303. package/dist/core/compatibility.js +0 -4
  304. package/dist/core/compatibility.js.map +0 -1
  305. package/dist/types/version.cjs +0 -8
  306. package/dist/types/version.cjs.map +0 -1
  307. package/dist/types/version.d.ts +0 -25
  308. package/dist/types/version.d.ts.map +0 -1
  309. package/dist/types/version.js +0 -6
  310. package/dist/types/version.js.map +0 -1
@@ -0,0 +1,154 @@
1
+ 'use strict';
2
+
3
+ var U7VZULNU_cjs = require('./U7VZULNU.cjs');
4
+
5
+ // src/config/docker-images.ts
6
+ U7VZULNU_cjs.init_cjs_shims();
7
+ var images = {
8
+ ["evm:forge-1.3.6-hardhat-2.26.3-patch-1"]: {
9
+ name: "evm",
10
+ versions: {
11
+ forge: "1.3.6",
12
+ hardhat: "2.26.3"
13
+ },
14
+ patch: 1
15
+ },
16
+ ["solana:anchor-0.29.0-solana-1.17.31"]: {
17
+ // Built in the old `monorepo` repository.
18
+ name: "solana",
19
+ versions: {
20
+ solana: "1.17.31",
21
+ anchor: "0.29.0"
22
+ }
23
+ },
24
+ ["solana:anchor-0.31.1-solana-2.2.20"]: {
25
+ name: "solana",
26
+ versions: {
27
+ solana: "2.2.20",
28
+ anchor: "0.31.1"
29
+ }
30
+ },
31
+ ["solana:anchor-0.31.1-solana-2.2.20-patch-1"]: {
32
+ name: "solana",
33
+ versions: {
34
+ solana: "2.2.20",
35
+ anchor: "0.31.1"
36
+ },
37
+ patch: 1
38
+ },
39
+ ["solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11"]: {
40
+ name: "solana",
41
+ versions: {
42
+ anchor: "0.31.1",
43
+ solana: "2.2.20",
44
+ "solana-verify": "0.4.11"
45
+ }
46
+ },
47
+ ["aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0"]: {
48
+ name: "aptos",
49
+ versions: {
50
+ aptos: "4.7.0",
51
+ initiad: "0.6.3",
52
+ movement: "3.5.0"
53
+ }
54
+ },
55
+ ["aptos:aptos-4.7.0-initiad-0.6.3"]: {
56
+ name: "aptos",
57
+ versions: {
58
+ aptos: "4.7.0",
59
+ initiad: "0.6.3"
60
+ }
61
+ },
62
+ ["aptos:aptos-4.6.0"]: {
63
+ // Built in the old `monorepo` repository.
64
+ name: "aptos",
65
+ versions: {
66
+ aptos: "4.6.0"
67
+ }
68
+ },
69
+ ["ton:blueprint-0.25.0-beta.1-patch-2"]: {
70
+ // In TON's offchain SDK, we derive contract addresses dynamically from their
71
+ // bytecode and initial state even for contracts deployed already.
72
+ // Therefore, we cannot update the compiler version even when the minor version is the same
73
+ // since it would change the resulting bytecode and thus the contract address.
74
+ name: "ton",
75
+ versions: {
76
+ blueprint: "0.25.0-beta.1"
77
+ },
78
+ patch: 2
79
+ },
80
+ ["starknet:scarb-2.14.0"]: {
81
+ name: "starknet",
82
+ versions: {
83
+ scarb: "2.14.0"
84
+ }
85
+ },
86
+ ["starknet:scarb-2.14.0-patch-1"]: {
87
+ name: "starknet",
88
+ versions: {
89
+ scarb: "2.14.0"
90
+ },
91
+ patch: 1,
92
+ unreleased: true
93
+ },
94
+ ["starknet:scarb-2.13.1-patch-1"]: {
95
+ name: "starknet",
96
+ versions: {
97
+ scarb: "2.13.1"
98
+ },
99
+ patch: 1
100
+ },
101
+ ["starknet:scarb-2.13.1-patch-2"]: {
102
+ name: "starknet",
103
+ versions: {
104
+ scarb: "2.13.1"
105
+ },
106
+ patch: 2
107
+ },
108
+ ["starknet:scarb-2.12.0-patch-4"]: {
109
+ name: "starknet",
110
+ versions: {
111
+ scarb: "2.12.0"
112
+ },
113
+ patch: 4
114
+ },
115
+ ["starknet:scarb-2.12.0-patch-3"]: {
116
+ name: "starknet",
117
+ versions: {
118
+ scarb: "2.12.0"
119
+ },
120
+ patch: 3
121
+ },
122
+ ["sui:iota-1.9.2-sui-1.54.1"]: {
123
+ name: "sui",
124
+ versions: {
125
+ sui: "1.54.1",
126
+ iota: "1.9.2"
127
+ }
128
+ },
129
+ ["sui:sui-1.54.1-patch-1"]: {
130
+ // Test building from monorepo-internal
131
+ name: "sui",
132
+ versions: {
133
+ sui: "1.54.1"
134
+ },
135
+ patch: 1
136
+ },
137
+ ["stellar:stellar-23.1.4"]: {
138
+ name: "stellar",
139
+ versions: {
140
+ stellar: "23.1.4"
141
+ }
142
+ },
143
+ ["canton:daml-3.3.0-snapshot.20250507.0-patch-1"]: {
144
+ name: "canton",
145
+ versions: {
146
+ daml: "3.3.0-snapshot.20250507.0"
147
+ },
148
+ patch: 1
149
+ }
150
+ };
151
+
152
+ exports.images = images;
153
+ //# sourceMappingURL=KSZMBVFB.cjs.map
154
+ //# sourceMappingURL=KSZMBVFB.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/config/docker-images.ts"],"names":["init_cjs_shims","images","name","versions","forge","hardhat","patch","solana","anchor","aptos","initiad","movement","blueprint","scarb","unreleased","sui","iota","stellar","daml"],"mappings":";;;;;AAOAA,2BAAA,EAAA;AAMO,IAAMC,MAAAA,GAAS;AAClB,EAAA,CAAC,wCAAA,GAA2C;IACxCC,IAAAA,EAAM,KAAA;IACNC,QAAAA,EAAU;MACNC,KAAAA,EAAO,OAAA;MACPC,OAAAA,EAAS;AACb,KAAA;IACAC,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,qCAAA,GAAwC;;IAErCJ,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MACNI,MAAAA,EAAQ,SAAA;MACRC,MAAAA,EAAQ;AACZ;AACJ,GAAA;AACA,EAAA,CAAC,oCAAA,GAAuC;IACpCN,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MACNI,MAAAA,EAAQ,QAAA;MACRC,MAAAA,EAAQ;AACZ;AACJ,GAAA;AACA,EAAA,CAAC,4CAAA,GAA+C;IAC5CN,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MACNI,MAAAA,EAAQ,QAAA;MACRC,MAAAA,EAAQ;AACZ,KAAA;IACAF,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,yDAAA,GAA4D;IACzDJ,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MACNK,MAAAA,EAAQ,QAAA;MACRD,MAAAA,EAAQ,QAAA;MACR,eAAA,EAAiB;AACrB;AACJ,GAAA;AACA,EAAA,CAAC,gDAAA,GAAmD;IAChDL,IAAAA,EAAM,OAAA;IACNC,QAAAA,EAAU;MACNM,KAAAA,EAAO,OAAA;MACPC,OAAAA,EAAS,OAAA;MACTC,QAAAA,EAAU;AACd;AACJ,GAAA;AACA,EAAA,CAAC,iCAAA,GAAoC;IACjCT,IAAAA,EAAM,OAAA;IACNC,QAAAA,EAAU;MACNM,KAAAA,EAAO,OAAA;MACPC,OAAAA,EAAS;AACb;AACJ,GAAA;AACA,EAAA,CAAC,mBAAA,GAAsB;;IAEnBR,IAAAA,EAAM,OAAA;IACNC,QAAAA,EAAU;MACNM,KAAAA,EAAO;AACX;AACJ,GAAA;AACA,EAAA,CAAC,qCAAA,GAAwC;;;;;IAKrCP,IAAAA,EAAM,KAAA;IACNC,QAAAA,EAAU;MACNS,SAAAA,EAAW;AACf,KAAA;IACAN,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,uBAAA,GAA0B;IACvBJ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX;AACJ,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BX,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO,CAAA;IACPQ,UAAAA,EAAY;AAChB,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BZ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BJ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BJ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BJ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,2BAAA,GAA8B;IAC3BJ,IAAAA,EAAM,KAAA;IACNC,QAAAA,EAAU;MACNY,GAAAA,EAAK,QAAA;MACLC,IAAAA,EAAM;AACV;AACJ,GAAA;AACA,EAAA,CAAC,wBAAA,GAA2B;;IAExBd,IAAAA,EAAM,KAAA;IACNC,QAAAA,EAAU;MACNY,GAAAA,EAAK;AACT,KAAA;IACAT,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,wBAAA,GAA2B;IACxBJ,IAAAA,EAAM,SAAA;IACNC,QAAAA,EAAU;MACNc,OAAAA,EAAS;AACb;AACJ,GAAA;AACA,EAAA,CAAC,+CAAA,GAAkD;IAC/Cf,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MAAEe,IAAAA,EAAM;AAA4B,KAAA;IAC9CZ,KAAAA,EAAO;AACX;AACJ","file":"KSZMBVFB.cjs","sourcesContent":["export interface Image {\n name: string;\n versions: Record<string, string>;\n patch?: number;\n unreleased?: boolean;\n}\n\n// To add a new image, follow the steps below:\n//\n// 1. Create a PR that adds a new entry with an `unreleased` flag set to `true`.\n// 2. Wait for the main branch to build Docker images for the new entry.\n// 3. Create a PR that removes the `unreleased` flag.\n// 4. Use the Docker images in the version matrices and contract packages.\nexport const images = {\n ['evm:forge-1.3.6-hardhat-2.26.3-patch-1']: {\n name: 'evm',\n versions: {\n forge: '1.3.6',\n hardhat: '2.26.3',\n },\n patch: 1,\n },\n ['solana:anchor-0.29.0-solana-1.17.31']: {\n // Built in the old `monorepo` repository.\n name: 'solana',\n versions: {\n solana: '1.17.31',\n anchor: '0.29.0',\n },\n },\n ['solana:anchor-0.31.1-solana-2.2.20']: {\n name: 'solana',\n versions: {\n solana: '2.2.20',\n anchor: '0.31.1',\n },\n },\n ['solana:anchor-0.31.1-solana-2.2.20-patch-1']: {\n name: 'solana',\n versions: {\n solana: '2.2.20',\n anchor: '0.31.1',\n },\n patch: 1,\n },\n ['solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11']: {\n name: 'solana',\n versions: {\n anchor: '0.31.1',\n solana: '2.2.20',\n 'solana-verify': '0.4.11',\n },\n },\n ['aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0']: {\n name: 'aptos',\n versions: {\n aptos: '4.7.0',\n initiad: '0.6.3',\n movement: '3.5.0',\n },\n },\n ['aptos:aptos-4.7.0-initiad-0.6.3']: {\n name: 'aptos',\n versions: {\n aptos: '4.7.0',\n initiad: '0.6.3',\n },\n },\n ['aptos:aptos-4.6.0']: {\n // Built in the old `monorepo` repository.\n name: 'aptos',\n versions: {\n aptos: '4.6.0',\n },\n },\n ['ton:blueprint-0.25.0-beta.1-patch-2']: {\n // In TON's offchain SDK, we derive contract addresses dynamically from their\n // bytecode and initial state even for contracts deployed already.\n // Therefore, we cannot update the compiler version even when the minor version is the same\n // since it would change the resulting bytecode and thus the contract address.\n name: 'ton',\n versions: {\n blueprint: '0.25.0-beta.1',\n },\n patch: 2,\n },\n ['starknet:scarb-2.14.0']: {\n name: 'starknet',\n versions: {\n scarb: '2.14.0',\n },\n },\n ['starknet:scarb-2.14.0-patch-1']: {\n name: 'starknet',\n versions: {\n scarb: '2.14.0',\n },\n patch: 1,\n unreleased: true,\n },\n ['starknet:scarb-2.13.1-patch-1']: {\n name: 'starknet',\n versions: {\n scarb: '2.13.1',\n },\n patch: 1,\n },\n ['starknet:scarb-2.13.1-patch-2']: {\n name: 'starknet',\n versions: {\n scarb: '2.13.1',\n },\n patch: 2,\n },\n ['starknet:scarb-2.12.0-patch-4']: {\n name: 'starknet',\n versions: {\n scarb: '2.12.0',\n },\n patch: 4,\n },\n ['starknet:scarb-2.12.0-patch-3']: {\n name: 'starknet',\n versions: {\n scarb: '2.12.0',\n },\n patch: 3,\n },\n ['sui:iota-1.9.2-sui-1.54.1']: {\n name: 'sui',\n versions: {\n sui: '1.54.1',\n iota: '1.9.2',\n },\n },\n ['sui:sui-1.54.1-patch-1']: {\n // Test building from monorepo-internal\n name: 'sui',\n versions: {\n sui: '1.54.1',\n },\n patch: 1,\n },\n ['stellar:stellar-23.1.4']: {\n name: 'stellar',\n versions: {\n stellar: '23.1.4',\n },\n },\n ['canton:daml-3.3.0-snapshot.20250507.0-patch-1']: {\n name: 'canton',\n versions: { daml: '3.3.0-snapshot.20250507.0' },\n patch: 1,\n },\n} satisfies Record<string, Image>;\n\nexport type ImageId = keyof typeof images;\n"]}
@@ -16,7 +16,7 @@ var fromWebToken = /* @__PURE__ */ __name((init) => async (awsIdentityProperties
16
16
  const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
17
17
  let { roleAssumerWithWebIdentity } = init;
18
18
  if (!roleAssumerWithWebIdentity) {
19
- const { getDefaultRoleAssumerWithWebIdentity } = await import('./JEOLJJ6F.js');
19
+ const { getDefaultRoleAssumerWithWebIdentity } = await import('./35BIBLTE.js');
20
20
  roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
21
21
  ...init.clientConfig,
22
22
  credentialProviderLogger: init.logger,
@@ -66,5 +66,5 @@ var fromTokenFile = /* @__PURE__ */ __name((init = {}) => async () => {
66
66
  }, "fromTokenFile");
67
67
 
68
68
  export { fromTokenFile, fromWebToken };
69
- //# sourceMappingURL=HVBHNWI7.js.map
70
- //# sourceMappingURL=HVBHNWI7.js.map
69
+ //# sourceMappingURL=LF6BYBZY.js.map
70
+ //# sourceMappingURL=LF6BYBZY.js.map
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js"],"names":["fromWebToken","init","awsIdentityProperties","logger","debug","roleArn","roleSessionName","webIdentityToken","providerId","policyArns","policy","durationSeconds","roleAssumerWithWebIdentity","getDefaultRoleAssumerWithWebIdentity","clientConfig","credentialProviderLogger","parentClientConfig","callerClientConfig","clientPlugins","RoleArn","RoleSessionName","Date","now","WebIdentityToken","ProviderId","PolicyArns","Policy","DurationSeconds","ENV_TOKEN_FILE","ENV_ROLE_ARN","ENV_ROLE_SESSION_NAME","fromTokenFile","webIdentityTokenFile","process","env","CredentialsProviderError","credentials","readFileSync","encoding","setCredentialFeature"],"mappings":";;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMA,YAAAA,mBAAe,MAAA,CAAA,CAACC,IAAAA,KAAS,OAAOC,qBAAAA,KAAAA;AACzCD,EAAAA,IAAAA,CAAKE,MAAAA,EAAQC,MAAM,0DAAA,CAAA;AACnB,EAAA,MAAM,EAAEC,SAASC,eAAAA,EAAiBC,gBAAAA,EAAkBC,YAAYC,UAAAA,EAAYC,MAAAA,EAAQC,iBAAe,GAAKV,IAAAA;AACxG,EAAA,IAAI,EAAEW,4BAA0B,GAAKX,IAAAA;AACrC,EAAA,IAAI,CAACW,0BAAAA,EAA4B;AAC7B,IAAA,MAAM,EAAEC,oCAAAA,EAAoC,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9DD,IAAAA,0BAAAA,GAA6BC,oCAAAA,CAAqC;AAC9D,MAAA,GAAGZ,IAAAA,CAAKa,YAAAA;AACRC,MAAAA,wBAAAA,EAA0Bd,IAAAA,CAAKE,MAAAA;MAC/Ba,kBAAAA,EAAoB;AAChB,QAAA,GAAGd,qBAAAA,EAAuBe,kBAAAA;AAC1B,QAAA,GAAGhB,IAAAA,CAAKe;AACZ;AACJ,KAAA,EAAGf,KAAKiB,aAAa,CAAA;AACzB,EAAA;AACA,EAAA,OAAON,0BAAAA,CAA2B;IAC9BO,OAAAA,EAASd,OAAAA;AACTe,IAAAA,eAAAA,EAAiBd,eAAAA,IAAmB,CAAA,mBAAA,EAAsBe,IAAAA,CAAKC,GAAAA,EAAG,CAAA,CAAA;IAClEC,gBAAAA,EAAkBhB,gBAAAA;IAClBiB,UAAAA,EAAYhB,UAAAA;IACZiB,UAAAA,EAAYhB,UAAAA;IACZiB,MAAAA,EAAQhB,MAAAA;IACRiB,eAAAA,EAAiBhB;GACrB,CAAA;AACJ,CAAA,EAxB4B,cAAA;;;ADI5B,IAAMiB,cAAAA,GAAiB,6BAAA;AACvB,IAAMC,YAAAA,GAAe,cAAA;AACrB,IAAMC,qBAAAA,GAAwB,uBAAA;AACvB,IAAMC,aAAAA,mBAAgB,MAAA,CAAA,CAAC9B,IAAAA,GAAO,OAAO,YAAA;AACxCA,EAAAA,IAAAA,CAAKE,MAAAA,EAAQC,MAAM,2DAAA,CAAA;AACnB,EAAA,MAAM4B,oBAAAA,GAAuB/B,IAAAA,EAAM+B,oBAAAA,IAAwBC,OAAAA,CAAQC,IAAIN,cAAAA,CAAAA;AACvE,EAAA,MAAMvB,OAAAA,GAAUJ,IAAAA,EAAMI,OAAAA,IAAW4B,OAAAA,CAAQC,IAAIL,YAAAA,CAAAA;AAC7C,EAAA,MAAMvB,eAAAA,GAAkBL,IAAAA,EAAMK,eAAAA,IAAmB2B,OAAAA,CAAQC,IAAIJ,qBAAAA,CAAAA;AAC7D,EAAA,IAAI,CAACE,oBAAAA,IAAwB,CAAC3B,OAAAA,EAAS;AACnC,IAAA,MAAM,IAAI8B,yBAAyB,0CAAA,EAA4C;AAC3EhC,MAAAA,MAAAA,EAAQF,IAAAA,CAAKE;KACjB,CAAA;AACJ,EAAA;AACA,EAAA,MAAMiC,WAAAA,GAAc,MAAMpC,YAAAA,CAAa;IACnC,GAAGC,IAAAA;AACHM,IAAAA,gBAAAA,EAAkB8B,aAAaL,oBAAAA,EAAsB;MAAEM,QAAAA,EAAU;KAAQ,CAAA;AACzEjC,IAAAA,OAAAA;AACAC,IAAAA;AACJ,GAAA,CAAA,EAAA;AACA,EAAA,IAAI0B,oBAAAA,KAAyBC,OAAAA,CAAQC,GAAAA,CAAIN,cAAAA,CAAAA,EAAiB;AACtDW,IAAAA,oBAAAA,CAAqBH,WAAAA,EAAa,yCAAyC,GAAA,CAAA;AAC/E,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EApB6B,eAAA","file":"HVBHNWI7.js","sourcesContent":["export * from \"./fromTokenFile\";\nexport * from \"./fromWebToken\";\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { readFileSync } from \"fs\";\nimport { fromWebToken } from \"./fromWebToken\";\nconst ENV_TOKEN_FILE = \"AWS_WEB_IDENTITY_TOKEN_FILE\";\nconst ENV_ROLE_ARN = \"AWS_ROLE_ARN\";\nconst ENV_ROLE_SESSION_NAME = \"AWS_ROLE_SESSION_NAME\";\nexport const fromTokenFile = (init = {}) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-web-identity - fromTokenFile\");\n const webIdentityTokenFile = init?.webIdentityTokenFile ?? process.env[ENV_TOKEN_FILE];\n const roleArn = init?.roleArn ?? process.env[ENV_ROLE_ARN];\n const roleSessionName = init?.roleSessionName ?? process.env[ENV_ROLE_SESSION_NAME];\n if (!webIdentityTokenFile || !roleArn) {\n throw new CredentialsProviderError(\"Web identity configuration not specified\", {\n logger: init.logger,\n });\n }\n const credentials = await fromWebToken({\n ...init,\n webIdentityToken: readFileSync(webIdentityTokenFile, { encoding: \"ascii\" }),\n roleArn,\n roleSessionName,\n })();\n if (webIdentityTokenFile === process.env[ENV_TOKEN_FILE]) {\n setCredentialFeature(credentials, \"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN\", \"h\");\n }\n return credentials;\n};\n","export const fromWebToken = (init) => async (awsIdentityProperties) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-web-identity - fromWebToken\");\n const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;\n let { roleAssumerWithWebIdentity } = init;\n if (!roleAssumerWithWebIdentity) {\n const { getDefaultRoleAssumerWithWebIdentity } = await import(\"@aws-sdk/nested-clients/sts\");\n roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({\n ...init.clientConfig,\n credentialProviderLogger: init.logger,\n parentClientConfig: {\n ...awsIdentityProperties?.callerClientConfig,\n ...init.parentClientConfig,\n },\n }, init.clientPlugins);\n }\n return roleAssumerWithWebIdentity({\n RoleArn: roleArn,\n RoleSessionName: roleSessionName ?? `aws-sdk-js-session-${Date.now()}`,\n WebIdentityToken: webIdentityToken,\n ProviderId: providerId,\n PolicyArns: policyArns,\n Policy: policy,\n DurationSeconds: durationSeconds,\n });\n};\n"]}
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js"],"names":["fromWebToken","init","awsIdentityProperties","logger","debug","roleArn","roleSessionName","webIdentityToken","providerId","policyArns","policy","durationSeconds","roleAssumerWithWebIdentity","getDefaultRoleAssumerWithWebIdentity","clientConfig","credentialProviderLogger","parentClientConfig","callerClientConfig","clientPlugins","RoleArn","RoleSessionName","Date","now","WebIdentityToken","ProviderId","PolicyArns","Policy","DurationSeconds","ENV_TOKEN_FILE","ENV_ROLE_ARN","ENV_ROLE_SESSION_NAME","fromTokenFile","webIdentityTokenFile","process","env","CredentialsProviderError","credentials","readFileSync","encoding","setCredentialFeature"],"mappings":";;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMA,YAAAA,mBAAe,MAAA,CAAA,CAACC,IAAAA,KAAS,OAAOC,qBAAAA,KAAAA;AACzCD,EAAAA,IAAAA,CAAKE,MAAAA,EAAQC,MAAM,0DAAA,CAAA;AACnB,EAAA,MAAM,EAAEC,SAASC,eAAAA,EAAiBC,gBAAAA,EAAkBC,YAAYC,UAAAA,EAAYC,MAAAA,EAAQC,iBAAe,GAAKV,IAAAA;AACxG,EAAA,IAAI,EAAEW,4BAA0B,GAAKX,IAAAA;AACrC,EAAA,IAAI,CAACW,0BAAAA,EAA4B;AAC7B,IAAA,MAAM,EAAEC,oCAAAA,EAAoC,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9DD,IAAAA,0BAAAA,GAA6BC,oCAAAA,CAAqC;AAC9D,MAAA,GAAGZ,IAAAA,CAAKa,YAAAA;AACRC,MAAAA,wBAAAA,EAA0Bd,IAAAA,CAAKE,MAAAA;MAC/Ba,kBAAAA,EAAoB;AAChB,QAAA,GAAGd,qBAAAA,EAAuBe,kBAAAA;AAC1B,QAAA,GAAGhB,IAAAA,CAAKe;AACZ;AACJ,KAAA,EAAGf,KAAKiB,aAAa,CAAA;AACzB,EAAA;AACA,EAAA,OAAON,0BAAAA,CAA2B;IAC9BO,OAAAA,EAASd,OAAAA;AACTe,IAAAA,eAAAA,EAAiBd,eAAAA,IAAmB,CAAA,mBAAA,EAAsBe,IAAAA,CAAKC,GAAAA,EAAG,CAAA,CAAA;IAClEC,gBAAAA,EAAkBhB,gBAAAA;IAClBiB,UAAAA,EAAYhB,UAAAA;IACZiB,UAAAA,EAAYhB,UAAAA;IACZiB,MAAAA,EAAQhB,MAAAA;IACRiB,eAAAA,EAAiBhB;GACrB,CAAA;AACJ,CAAA,EAxB4B,cAAA;;;ADI5B,IAAMiB,cAAAA,GAAiB,6BAAA;AACvB,IAAMC,YAAAA,GAAe,cAAA;AACrB,IAAMC,qBAAAA,GAAwB,uBAAA;AACvB,IAAMC,aAAAA,mBAAgB,MAAA,CAAA,CAAC9B,IAAAA,GAAO,OAAO,YAAA;AACxCA,EAAAA,IAAAA,CAAKE,MAAAA,EAAQC,MAAM,2DAAA,CAAA;AACnB,EAAA,MAAM4B,oBAAAA,GAAuB/B,IAAAA,EAAM+B,oBAAAA,IAAwBC,OAAAA,CAAQC,IAAIN,cAAAA,CAAAA;AACvE,EAAA,MAAMvB,OAAAA,GAAUJ,IAAAA,EAAMI,OAAAA,IAAW4B,OAAAA,CAAQC,IAAIL,YAAAA,CAAAA;AAC7C,EAAA,MAAMvB,eAAAA,GAAkBL,IAAAA,EAAMK,eAAAA,IAAmB2B,OAAAA,CAAQC,IAAIJ,qBAAAA,CAAAA;AAC7D,EAAA,IAAI,CAACE,oBAAAA,IAAwB,CAAC3B,OAAAA,EAAS;AACnC,IAAA,MAAM,IAAI8B,yBAAyB,0CAAA,EAA4C;AAC3EhC,MAAAA,MAAAA,EAAQF,IAAAA,CAAKE;KACjB,CAAA;AACJ,EAAA;AACA,EAAA,MAAMiC,WAAAA,GAAc,MAAMpC,YAAAA,CAAa;IACnC,GAAGC,IAAAA;AACHM,IAAAA,gBAAAA,EAAkB8B,aAAaL,oBAAAA,EAAsB;MAAEM,QAAAA,EAAU;KAAQ,CAAA;AACzEjC,IAAAA,OAAAA;AACAC,IAAAA;AACJ,GAAA,CAAA,EAAA;AACA,EAAA,IAAI0B,oBAAAA,KAAyBC,OAAAA,CAAQC,GAAAA,CAAIN,cAAAA,CAAAA,EAAiB;AACtDW,IAAAA,oBAAAA,CAAqBH,WAAAA,EAAa,yCAAyC,GAAA,CAAA;AAC/E,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EApB6B,eAAA","file":"LF6BYBZY.js","sourcesContent":["export * from \"./fromTokenFile\";\nexport * from \"./fromWebToken\";\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { readFileSync } from \"fs\";\nimport { fromWebToken } from \"./fromWebToken\";\nconst ENV_TOKEN_FILE = \"AWS_WEB_IDENTITY_TOKEN_FILE\";\nconst ENV_ROLE_ARN = \"AWS_ROLE_ARN\";\nconst ENV_ROLE_SESSION_NAME = \"AWS_ROLE_SESSION_NAME\";\nexport const fromTokenFile = (init = {}) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-web-identity - fromTokenFile\");\n const webIdentityTokenFile = init?.webIdentityTokenFile ?? process.env[ENV_TOKEN_FILE];\n const roleArn = init?.roleArn ?? process.env[ENV_ROLE_ARN];\n const roleSessionName = init?.roleSessionName ?? process.env[ENV_ROLE_SESSION_NAME];\n if (!webIdentityTokenFile || !roleArn) {\n throw new CredentialsProviderError(\"Web identity configuration not specified\", {\n logger: init.logger,\n });\n }\n const credentials = await fromWebToken({\n ...init,\n webIdentityToken: readFileSync(webIdentityTokenFile, { encoding: \"ascii\" }),\n roleArn,\n roleSessionName,\n })();\n if (webIdentityTokenFile === process.env[ENV_TOKEN_FILE]) {\n setCredentialFeature(credentials, \"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN\", \"h\");\n }\n return credentials;\n};\n","export const fromWebToken = (init) => async (awsIdentityProperties) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-web-identity - fromWebToken\");\n const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;\n let { roleAssumerWithWebIdentity } = init;\n if (!roleAssumerWithWebIdentity) {\n const { getDefaultRoleAssumerWithWebIdentity } = await import(\"@aws-sdk/nested-clients/sts\");\n roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({\n ...init.clientConfig,\n credentialProviderLogger: init.logger,\n parentClientConfig: {\n ...awsIdentityProperties?.callerClientConfig,\n ...init.parentClientConfig,\n },\n }, init.clientPlugins);\n }\n return roleAssumerWithWebIdentity({\n RoleArn: roleArn,\n RoleSessionName: roleSessionName ?? `aws-sdk-js-session-${Date.now()}`,\n WebIdentityToken: webIdentityToken,\n ProviderId: providerId,\n PolicyArns: policyArns,\n Policy: policy,\n DurationSeconds: durationSeconds,\n });\n};\n"]}
@@ -1,7 +1,7 @@
1
1
  'use strict';
2
2
 
3
- var P5BPMTGP_cjs = require('./P5BPMTGP.cjs');
4
3
  var _7WVEMAKW_cjs = require('./7WVEMAKW.cjs');
4
+ var P5BPMTGP_cjs = require('./P5BPMTGP.cjs');
5
5
  require('./WDSPHVPJ.cjs');
6
6
  var JGLHYXTW_cjs = require('./JGLHYXTW.cjs');
7
7
  var U7VZULNU_cjs = require('./U7VZULNU.cjs');
@@ -100,5 +100,5 @@ var fromProcess = /* @__PURE__ */ U7VZULNU_cjs.__name((init = {}) => async ({ ca
100
100
  }, "fromProcess");
101
101
 
102
102
  exports.fromProcess = fromProcess;
103
- //# sourceMappingURL=OZNFYXME.cjs.map
104
- //# sourceMappingURL=OZNFYXME.cjs.map
103
+ //# sourceMappingURL=LH4V3GFX.cjs.map
104
+ //# sourceMappingURL=LH4V3GFX.cjs.map
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js"],"names":["init_cjs_shims","getValidatedProcessCredentials","__name","profileName","data","profiles","Version","Error","AccessKeyId","undefined","SecretAccessKey","Expiration","currentTime","Date","expireTime","accountId","AccountId","aws_account_id","credentials","accessKeyId","secretAccessKey","SessionToken","sessionToken","expiration","CredentialScope","credentialScope","setCredentialFeature","resolveProcessCredentials","logger","profile","credentialProcess","execPromise","promisify","exec","stdout","JSON","parse","trim","error","CredentialsProviderError","message","fromProcess","init","callerClientConfig","debug","parseKnownFiles","getProfileName"],"mappings":";;;;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AACO,IAAMC,8BAAAA,mBAAiCC,mBAAA,CAAA,CAACC,WAAAA,EAAaC,IAAAA,EAAMC,QAAAA,KAAAA;AAC9D,EAAA,IAAID,IAAAA,CAAKE,YAAY,CAAA,EAAG;AACpB,IAAA,MAAMC,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACrF,EAAA;AACA,EAAA,IAAIC,IAAAA,CAAKI,WAAAA,KAAgBC,MAAAA,IAAaL,IAAAA,CAAKM,oBAAoBD,MAAAA,EAAW;AACtE,IAAA,MAAMF,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,iDAAAA,CAA8D,CAAA;AACzF,EAAA;AACA,EAAA,IAAIC,KAAKO,UAAAA,EAAY;AACjB,IAAA,MAAMC,WAAAA,uBAAkBC,IAAAA,EAAAA;AACxB,IAAA,MAAMC,UAAAA,GAAa,IAAID,IAAAA,CAAKT,IAAAA,CAAKO,UAAU,CAAA;AAC3C,IAAA,IAAIG,aAAaF,WAAAA,EAAa;AAC1B,MAAA,MAAML,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,iDAAAA,CAA8D,CAAA;AACzF,IAAA;AACJ,EAAA;AACA,EAAA,IAAIY,YAAYX,IAAAA,CAAKY,SAAAA;AACrB,EAAA,IAAI,CAACD,SAAAA,IAAaV,QAAAA,GAAWF,WAAAA,GAAcc,cAAAA,EAAgB;AACvDF,IAAAA,SAAAA,GAAYV,QAAAA,CAASF,WAAAA,CAAAA,CAAac,cAAAA;AACtC,EAAA;AACA,EAAA,MAAMC,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAaf,IAAAA,CAAKI,WAAAA;AAClBY,IAAAA,eAAAA,EAAiBhB,IAAAA,CAAKM,eAAAA;AACtB,IAAA,GAAIN,KAAKiB,YAAAA,IAAgB;AAAEC,MAAAA,YAAAA,EAAclB,IAAAA,CAAKiB;AAAa,KAAA;AAC3D,IAAA,GAAIjB,KAAKO,UAAAA,IAAc;MAAEY,UAAAA,EAAY,IAAIV,IAAAA,CAAKT,IAAAA,CAAKO,UAAU;AAAE,KAAA;AAC/D,IAAA,GAAIP,KAAKoB,eAAAA,IAAmB;AAAEC,MAAAA,eAAAA,EAAiBrB,IAAAA,CAAKoB;AAAgB,KAAA;AACpE,IAAA,GAAIT,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACAW,EAAAA,kCAAAA,CAAqBR,WAAAA,EAAa,uBAAuB,GAAA,CAAA;AACzD,EAAA,OAAOA,WAAAA;AACX,CAAA,EA5B8C,gCAAA,CAAA;;;ADGvC,IAAMS,yBAAAA,mBAA4BzB,mBAAA,CAAA,OAAOC,WAAAA,EAAaE,QAAAA,EAAUuB,MAAAA,KAAAA;AACnE,EAAA,MAAMC,OAAAA,GAAUxB,SAASF,WAAAA,CAAAA;AACzB,EAAA,IAAIE,QAAAA,CAASF,WAAAA,CAAAA,EAAc;AACvB,IAAA,MAAM2B,iBAAAA,GAAoBD,QAAQ,oBAAA,CAAA;AAClC,IAAA,IAAIC,sBAAsBrB,MAAAA,EAAW;AACjC,MAAA,MAAMsB,WAAAA,GAAcC,eAAUC,kBAAAA,CAAAA;AAC9B,MAAA,IAAI;AACA,QAAA,MAAM,EAAEC,MAAAA,EAAM,GAAK,MAAMH,YAAYD,iBAAAA,CAAAA;AACrC,QAAA,IAAI1B,IAAAA;AACJ,QAAA,IAAI;AACAA,UAAAA,IAAAA,GAAO+B,IAAAA,CAAKC,KAAAA,CAAMF,MAAAA,CAAOG,IAAAA,EAAI,CAAA;QACjC,CAAA,CAAA,MACM;AACF,UAAA,MAAM9B,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,0CAAAA,CAAuD,CAAA;AAClF,QAAA;AACA,QAAA,OAAOF,8BAAAA,CAA+BE,WAAAA,EAAaC,IAAAA,EAAMC,QAAAA,CAAAA;AAC7D,MAAA,CAAA,CAAA,OACOiC,KAAAA,EAAO;AACV,QAAA,MAAM,IAAIC,qCAAAA,CAAyBD,KAAAA,CAAME,OAAAA,EAAS;AAAEZ,UAAAA;SAAO,CAAA;AAC/D,MAAA;IACJ,CAAA,MACK;AACD,MAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,QAAA,EAAWpC,WAAAA,CAAAA,oCAAAA,CAAAA,EAAmD;AAAEyB,QAAAA;OAAO,CAAA;AAC9G,IAAA;EACJ,CAAA,MACK;AACD,IAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,QAAA,EAAWpC,WAAAA,CAAAA,+CAAAA,CAAAA,EAA8D;AACxGyB,MAAAA;KACJ,CAAA;AACJ,EAAA;AACJ,CAAA,EA9ByC,2BAAA,CAAA;;;ADFlC,IAAMa,WAAAA,mBAAcvC,mBAAA,CAAA,CAACwC,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACxED,EAAAA,IAAAA,CAAKd,MAAAA,EAAQgB,MAAM,oDAAA,CAAA;AACnB,EAAA,MAAMvC,QAAAA,GAAW,MAAMwC,4BAAAA,CAAgBH,IAAAA,CAAAA;AACvC,EAAA,OAAOf,0BAA0BmB,2BAAAA,CAAe;IAC5CjB,OAAAA,EAASa,IAAAA,CAAKb,WAAWc,kBAAAA,EAAoBd;GACjD,CAAA,EAAIxB,QAAAA,EAAUqC,IAAAA,CAAKd,MAAM,CAAA;AAC7B,CAAA,EAN2B,aAAA","file":"OZNFYXME.cjs","sourcesContent":["export * from \"./fromProcess\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProcessCredentials } from \"./resolveProcessCredentials\";\nexport const fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-process - fromProcess\");\n const profiles = await parseKnownFiles(init);\n return resolveProcessCredentials(getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n }), profiles, init.logger);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { exec } from \"child_process\";\nimport { promisify } from \"util\";\nimport { getValidatedProcessCredentials } from \"./getValidatedProcessCredentials\";\nexport const resolveProcessCredentials = async (profileName, profiles, logger) => {\n const profile = profiles[profileName];\n if (profiles[profileName]) {\n const credentialProcess = profile[\"credential_process\"];\n if (credentialProcess !== undefined) {\n const execPromise = promisify(exec);\n try {\n const { stdout } = await execPromise(credentialProcess);\n let data;\n try {\n data = JSON.parse(stdout.trim());\n }\n catch {\n throw Error(`Profile ${profileName} credential_process returned invalid JSON.`);\n }\n return getValidatedProcessCredentials(profileName, data, profiles);\n }\n catch (error) {\n throw new CredentialsProviderError(error.message, { logger });\n }\n }\n else {\n throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });\n }\n }\n else {\n throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {\n logger,\n });\n }\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const getValidatedProcessCredentials = (profileName, data, profiles) => {\n if (data.Version !== 1) {\n throw Error(`Profile ${profileName} credential_process did not return Version 1.`);\n }\n if (data.AccessKeyId === undefined || data.SecretAccessKey === undefined) {\n throw Error(`Profile ${profileName} credential_process returned invalid credentials.`);\n }\n if (data.Expiration) {\n const currentTime = new Date();\n const expireTime = new Date(data.Expiration);\n if (expireTime < currentTime) {\n throw Error(`Profile ${profileName} credential_process returned expired credentials.`);\n }\n }\n let accountId = data.AccountId;\n if (!accountId && profiles?.[profileName]?.aws_account_id) {\n accountId = profiles[profileName].aws_account_id;\n }\n const credentials = {\n accessKeyId: data.AccessKeyId,\n secretAccessKey: data.SecretAccessKey,\n ...(data.SessionToken && { sessionToken: data.SessionToken }),\n ...(data.Expiration && { expiration: new Date(data.Expiration) }),\n ...(data.CredentialScope && { credentialScope: data.CredentialScope }),\n ...(accountId && { accountId }),\n };\n setCredentialFeature(credentials, \"CREDENTIALS_PROCESS\", \"w\");\n return credentials;\n};\n"]}
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js"],"names":["init_cjs_shims","getValidatedProcessCredentials","__name","profileName","data","profiles","Version","Error","AccessKeyId","undefined","SecretAccessKey","Expiration","currentTime","Date","expireTime","accountId","AccountId","aws_account_id","credentials","accessKeyId","secretAccessKey","SessionToken","sessionToken","expiration","CredentialScope","credentialScope","setCredentialFeature","resolveProcessCredentials","logger","profile","credentialProcess","execPromise","promisify","exec","stdout","JSON","parse","trim","error","CredentialsProviderError","message","fromProcess","init","callerClientConfig","debug","parseKnownFiles","getProfileName"],"mappings":";;;;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AACO,IAAMC,8BAAAA,mBAAiCC,mBAAA,CAAA,CAACC,WAAAA,EAAaC,IAAAA,EAAMC,QAAAA,KAAAA;AAC9D,EAAA,IAAID,IAAAA,CAAKE,YAAY,CAAA,EAAG;AACpB,IAAA,MAAMC,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACrF,EAAA;AACA,EAAA,IAAIC,IAAAA,CAAKI,WAAAA,KAAgBC,MAAAA,IAAaL,IAAAA,CAAKM,oBAAoBD,MAAAA,EAAW;AACtE,IAAA,MAAMF,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,iDAAAA,CAA8D,CAAA;AACzF,EAAA;AACA,EAAA,IAAIC,KAAKO,UAAAA,EAAY;AACjB,IAAA,MAAMC,WAAAA,uBAAkBC,IAAAA,EAAAA;AACxB,IAAA,MAAMC,UAAAA,GAAa,IAAID,IAAAA,CAAKT,IAAAA,CAAKO,UAAU,CAAA;AAC3C,IAAA,IAAIG,aAAaF,WAAAA,EAAa;AAC1B,MAAA,MAAML,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,iDAAAA,CAA8D,CAAA;AACzF,IAAA;AACJ,EAAA;AACA,EAAA,IAAIY,YAAYX,IAAAA,CAAKY,SAAAA;AACrB,EAAA,IAAI,CAACD,SAAAA,IAAaV,QAAAA,GAAWF,WAAAA,GAAcc,cAAAA,EAAgB;AACvDF,IAAAA,SAAAA,GAAYV,QAAAA,CAASF,WAAAA,CAAAA,CAAac,cAAAA;AACtC,EAAA;AACA,EAAA,MAAMC,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAaf,IAAAA,CAAKI,WAAAA;AAClBY,IAAAA,eAAAA,EAAiBhB,IAAAA,CAAKM,eAAAA;AACtB,IAAA,GAAIN,KAAKiB,YAAAA,IAAgB;AAAEC,MAAAA,YAAAA,EAAclB,IAAAA,CAAKiB;AAAa,KAAA;AAC3D,IAAA,GAAIjB,KAAKO,UAAAA,IAAc;MAAEY,UAAAA,EAAY,IAAIV,IAAAA,CAAKT,IAAAA,CAAKO,UAAU;AAAE,KAAA;AAC/D,IAAA,GAAIP,KAAKoB,eAAAA,IAAmB;AAAEC,MAAAA,eAAAA,EAAiBrB,IAAAA,CAAKoB;AAAgB,KAAA;AACpE,IAAA,GAAIT,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACAW,EAAAA,kCAAAA,CAAqBR,WAAAA,EAAa,uBAAuB,GAAA,CAAA;AACzD,EAAA,OAAOA,WAAAA;AACX,CAAA,EA5B8C,gCAAA,CAAA;;;ADGvC,IAAMS,yBAAAA,mBAA4BzB,mBAAA,CAAA,OAAOC,WAAAA,EAAaE,QAAAA,EAAUuB,MAAAA,KAAAA;AACnE,EAAA,MAAMC,OAAAA,GAAUxB,SAASF,WAAAA,CAAAA;AACzB,EAAA,IAAIE,QAAAA,CAASF,WAAAA,CAAAA,EAAc;AACvB,IAAA,MAAM2B,iBAAAA,GAAoBD,QAAQ,oBAAA,CAAA;AAClC,IAAA,IAAIC,sBAAsBrB,MAAAA,EAAW;AACjC,MAAA,MAAMsB,WAAAA,GAAcC,eAAUC,kBAAAA,CAAAA;AAC9B,MAAA,IAAI;AACA,QAAA,MAAM,EAAEC,MAAAA,EAAM,GAAK,MAAMH,YAAYD,iBAAAA,CAAAA;AACrC,QAAA,IAAI1B,IAAAA;AACJ,QAAA,IAAI;AACAA,UAAAA,IAAAA,GAAO+B,IAAAA,CAAKC,KAAAA,CAAMF,MAAAA,CAAOG,IAAAA,EAAI,CAAA;QACjC,CAAA,CAAA,MACM;AACF,UAAA,MAAM9B,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,0CAAAA,CAAuD,CAAA;AAClF,QAAA;AACA,QAAA,OAAOF,8BAAAA,CAA+BE,WAAAA,EAAaC,IAAAA,EAAMC,QAAAA,CAAAA;AAC7D,MAAA,CAAA,CAAA,OACOiC,KAAAA,EAAO;AACV,QAAA,MAAM,IAAIC,qCAAAA,CAAyBD,KAAAA,CAAME,OAAAA,EAAS;AAAEZ,UAAAA;SAAO,CAAA;AAC/D,MAAA;IACJ,CAAA,MACK;AACD,MAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,QAAA,EAAWpC,WAAAA,CAAAA,oCAAAA,CAAAA,EAAmD;AAAEyB,QAAAA;OAAO,CAAA;AAC9G,IAAA;EACJ,CAAA,MACK;AACD,IAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,QAAA,EAAWpC,WAAAA,CAAAA,+CAAAA,CAAAA,EAA8D;AACxGyB,MAAAA;KACJ,CAAA;AACJ,EAAA;AACJ,CAAA,EA9ByC,2BAAA,CAAA;;;ADFlC,IAAMa,WAAAA,mBAAcvC,mBAAA,CAAA,CAACwC,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACxED,EAAAA,IAAAA,CAAKd,MAAAA,EAAQgB,MAAM,oDAAA,CAAA;AACnB,EAAA,MAAMvC,QAAAA,GAAW,MAAMwC,4BAAAA,CAAgBH,IAAAA,CAAAA;AACvC,EAAA,OAAOf,0BAA0BmB,2BAAAA,CAAe;IAC5CjB,OAAAA,EAASa,IAAAA,CAAKb,WAAWc,kBAAAA,EAAoBd;GACjD,CAAA,EAAIxB,QAAAA,EAAUqC,IAAAA,CAAKd,MAAM,CAAA;AAC7B,CAAA,EAN2B,aAAA","file":"LH4V3GFX.cjs","sourcesContent":["export * from \"./fromProcess\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProcessCredentials } from \"./resolveProcessCredentials\";\nexport const fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-process - fromProcess\");\n const profiles = await parseKnownFiles(init);\n return resolveProcessCredentials(getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n }), profiles, init.logger);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { exec } from \"child_process\";\nimport { promisify } from \"util\";\nimport { getValidatedProcessCredentials } from \"./getValidatedProcessCredentials\";\nexport const resolveProcessCredentials = async (profileName, profiles, logger) => {\n const profile = profiles[profileName];\n if (profiles[profileName]) {\n const credentialProcess = profile[\"credential_process\"];\n if (credentialProcess !== undefined) {\n const execPromise = promisify(exec);\n try {\n const { stdout } = await execPromise(credentialProcess);\n let data;\n try {\n data = JSON.parse(stdout.trim());\n }\n catch {\n throw Error(`Profile ${profileName} credential_process returned invalid JSON.`);\n }\n return getValidatedProcessCredentials(profileName, data, profiles);\n }\n catch (error) {\n throw new CredentialsProviderError(error.message, { logger });\n }\n }\n else {\n throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });\n }\n }\n else {\n throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {\n logger,\n });\n }\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const getValidatedProcessCredentials = (profileName, data, profiles) => {\n if (data.Version !== 1) {\n throw Error(`Profile ${profileName} credential_process did not return Version 1.`);\n }\n if (data.AccessKeyId === undefined || data.SecretAccessKey === undefined) {\n throw Error(`Profile ${profileName} credential_process returned invalid credentials.`);\n }\n if (data.Expiration) {\n const currentTime = new Date();\n const expireTime = new Date(data.Expiration);\n if (expireTime < currentTime) {\n throw Error(`Profile ${profileName} credential_process returned expired credentials.`);\n }\n }\n let accountId = data.AccountId;\n if (!accountId && profiles?.[profileName]?.aws_account_id) {\n accountId = profiles[profileName].aws_account_id;\n }\n const credentials = {\n accessKeyId: data.AccessKeyId,\n secretAccessKey: data.SecretAccessKey,\n ...(data.SessionToken && { sessionToken: data.SessionToken }),\n ...(data.Expiration && { expiration: new Date(data.Expiration) }),\n ...(data.CredentialScope && { credentialScope: data.CredentialScope }),\n ...(accountId && { accountId }),\n };\n setCredentialFeature(credentials, \"CREDENTIALS_PROCESS\", \"w\");\n return credentials;\n};\n"]}
@@ -0,0 +1,48 @@
1
+ 'use strict';
2
+
3
+ var U7VZULNU_cjs = require('./U7VZULNU.cjs');
4
+ var z = require('zod');
5
+
6
+ function _interopNamespace(e) {
7
+ if (e && e.__esModule) return e;
8
+ var n = Object.create(null);
9
+ if (e) {
10
+ Object.keys(e).forEach(function (k) {
11
+ if (k !== 'default') {
12
+ var d = Object.getOwnPropertyDescriptor(e, k);
13
+ Object.defineProperty(n, k, d.get ? d : {
14
+ enumerable: true,
15
+ get: function () { return e[k]; }
16
+ });
17
+ }
18
+ });
19
+ }
20
+ n.default = e;
21
+ return Object.freeze(n);
22
+ }
23
+
24
+ var z__namespace = /*#__PURE__*/_interopNamespace(z);
25
+
26
+ // src/types/docker.ts
27
+ U7VZULNU_cjs.init_cjs_shims();
28
+ var volumeMappingBaseSchema = z__namespace.object({
29
+ containerPath: z__namespace.string()
30
+ });
31
+ var hostVolumeMappingSchema = volumeMappingBaseSchema.extend({
32
+ type: z__namespace.literal("host"),
33
+ hostPath: z__namespace.string()
34
+ });
35
+ var isolateVolumeMappingSchema = volumeMappingBaseSchema.extend({
36
+ type: z__namespace.literal("isolate"),
37
+ name: z__namespace.string(),
38
+ shared: z__namespace.optional(z__namespace.boolean()),
39
+ locked: z__namespace.optional(z__namespace.boolean())
40
+ });
41
+ var volumeMappingSchema = z__namespace.union([
42
+ hostVolumeMappingSchema,
43
+ isolateVolumeMappingSchema
44
+ ]);
45
+
46
+ exports.volumeMappingSchema = volumeMappingSchema;
47
+ //# sourceMappingURL=LNCARCBD.cjs.map
48
+ //# sourceMappingURL=LNCARCBD.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/types/docker.ts"],"names":["init_cjs_shims","volumeMappingBaseSchema","object","containerPath","string","hostVolumeMappingSchema","extend","type","literal","hostPath","isolateVolumeMappingSchema","name","shared","optional","boolean","locked","volumeMappingSchema","union"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAAA,2BAAA,EAAA;AAEA,IAAMC,0BAA4BC,YAAAA,CAAAA,MAAAA,CAAO;AACrCC,EAAAA,aAAAA,EAAiBC,YAAAA,CAAAA,MAAAA;AACrB,CAAA,CAAA;AAEA,IAAMC,uBAAAA,GAA0BJ,wBAAwBK,MAAAA,CAAO;AAC3DC,EAAAA,IAAAA,EAAQC,qBAAQ,MAAA,CAAA;AAChBC,EAAAA,QAAAA,EAAYL,YAAAA,CAAAA,MAAAA;AAChB,CAAA,CAAA;AAEA,IAAMM,0BAAAA,GAA6BT,wBAAwBK,MAAAA,CAAO;AAC9DC,EAAAA,IAAAA,EAAQC,qBAAQ,SAAA,CAAA;AAChBG,EAAAA,IAAAA,EAAQP,YAAAA,CAAAA,MAAAA,EAAM;EACdQ,MAAAA,EAAUC,YAAAA,CAAAA,QAAAA,CAAWC,sBAAO,CAAA;EAC5BC,MAAAA,EAAUF,YAAAA,CAAAA,QAAAA,CAAWC,sBAAO;AAChC,CAAA,CAAA;AAEO,IAAME,sBAAwBC,YAAAA,CAAAA,KAAAA,CAAM;AAACZ,EAAAA,uBAAAA;AAAyBK,EAAAA;AAA2B,CAAA","file":"LNCARCBD.cjs","sourcesContent":["import * as z from 'zod';\n\nconst volumeMappingBaseSchema = z.object({\n containerPath: z.string(),\n});\n\nconst hostVolumeMappingSchema = volumeMappingBaseSchema.extend({\n type: z.literal('host'),\n hostPath: z.string(),\n});\n\nconst isolateVolumeMappingSchema = volumeMappingBaseSchema.extend({\n type: z.literal('isolate'),\n name: z.string(),\n shared: z.optional(z.boolean()),\n locked: z.optional(z.boolean()),\n});\n\nexport const volumeMappingSchema = z.union([hostVolumeMappingSchema, isolateVolumeMappingSchema]);\n\nexport type VolumeMapping = z.infer<typeof volumeMappingSchema>;\n\n/**\n * Environment variable configuration for Docker containers\n */\nexport interface EnvironmentVariable {\n name: string;\n value: string;\n}\n"]}
@@ -0,0 +1,21 @@
1
+ 'use strict';
2
+
3
+ var FOFSZBOK_cjs = require('./FOFSZBOK.cjs');
4
+ var U7VZULNU_cjs = require('./U7VZULNU.cjs');
5
+
6
+ // src/display/formatters.ts
7
+ U7VZULNU_cjs.init_cjs_shims();
8
+ function formatVersionCombination(combination, isDefault) {
9
+ const tools = Object.entries(FOFSZBOK_cjs.findToolVersionsForCombination(combination)).filter(([_, version]) => version !== void 0).map(([tool, version]) => `${tool}:${version}`).join(", ");
10
+ const badges = [
11
+ isDefault ? "\u{1F3AF} Default" : null,
12
+ combination.stable ? "\u2705 Stable" : null,
13
+ combination.description
14
+ ].filter(Boolean).join(" ");
15
+ return ` ${FOFSZBOK_cjs.getCombinationId(combination)}: ${tools} ${badges}`;
16
+ }
17
+ U7VZULNU_cjs.__name(formatVersionCombination, "formatVersionCombination");
18
+
19
+ exports.formatVersionCombination = formatVersionCombination;
20
+ //# sourceMappingURL=M6KBN6B2.cjs.map
21
+ //# sourceMappingURL=M6KBN6B2.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/display/formatters.ts"],"names":["init_cjs_shims","formatVersionCombination","combination","isDefault","tools","Object","entries","findToolVersionsForCombination","filter","_","version","undefined","map","tool","join","badges","stable","description","Boolean","getCombinationId"],"mappings":";;;;;;AACAA,2BAAA,EAAA;AAMO,SAASC,wBAAAA,CACZC,aACAC,SAAAA,EAAmB;AAEnB,EAAA,MAAMC,KAAAA,GAAQC,MAAAA,CAAOC,OAAAA,CAAQC,2CAAAA,CAA+BL,WAAAA,CAAAA,CAAAA,CACvDM,MAAAA,CAAO,CAAC,CAACC,CAAAA,EAAGC,OAAAA,CAAAA,KAAaA,OAAAA,KAAYC,MAAAA,CAAAA,CACrCC,GAAAA,CAAI,CAAC,CAACC,IAAAA,EAAMH,OAAAA,CAAAA,KAAa,CAAA,EAAGG,IAAAA,CAAAA,CAAAA,EAAQH,OAAAA,CAAAA,CAAS,CAAA,CAC7CI,KAAK,IAAA,CAAA;AAEV,EAAA,MAAMC,MAAAA,GAAS;AACXZ,IAAAA,SAAAA,GAAY,mBAAA,GAAe,IAAA;AAC3BD,IAAAA,WAAAA,CAAYc,SAAS,eAAA,GAAa,IAAA;IAClCd,WAAAA,CAAYe;IAEXT,MAAAA,CAAOU,OAAAA,CAAAA,CACPJ,IAAAA,CAAK,GAAA,CAAA;AAEV,EAAA,OAAO,KAAKK,6BAAAA,CAAiBjB,WAAAA,CAAAA,CAAAA,EAAAA,EAAiBE,KAAAA,IAASW,MAAAA,CAAAA,CAAAA;AAC3D;AAlBgBd,mBAAAA,CAAAA,wBAAAA,EAAAA,0BAAAA,CAAAA","file":"M6KBN6B2.cjs","sourcesContent":["import type { VersionCombination } from '../config';\nimport { getCombinationId } from '../utils';\nimport { findToolVersionsForCombination } from '../utils/finder';\n\n/**\n * Format version combinations for display\n */\nexport function formatVersionCombination(\n combination: VersionCombination,\n isDefault?: boolean,\n): string {\n const tools = Object.entries(findToolVersionsForCombination(combination))\n .filter(([_, version]) => version !== undefined)\n .map(([tool, version]) => `${tool}:${version}`)\n .join(', ');\n\n const badges = [\n isDefault ? '🎯 Default' : null,\n combination.stable ? '✅ Stable' : null,\n combination.description,\n ]\n .filter(Boolean)\n .join(' ');\n\n return ` ${getCombinationId(combination)}: ${tools} ${badges}`;\n}\n"]}
@@ -1,7 +1,7 @@
1
1
  'use strict';
2
2
 
3
- var P5BPMTGP_cjs = require('./P5BPMTGP.cjs');
4
3
  var _7WVEMAKW_cjs = require('./7WVEMAKW.cjs');
4
+ var P5BPMTGP_cjs = require('./P5BPMTGP.cjs');
5
5
  require('./WDSPHVPJ.cjs');
6
6
  var JGLHYXTW_cjs = require('./JGLHYXTW.cjs');
7
7
  var U7VZULNU_cjs = require('./U7VZULNU.cjs');
@@ -34,7 +34,7 @@ U7VZULNU_cjs.init_cjs_shims();
34
34
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
35
35
  U7VZULNU_cjs.init_cjs_shims();
36
36
  var getSsoOidcClient = /* @__PURE__ */ U7VZULNU_cjs.__name(async (ssoRegion, init = {}) => {
37
- const { SSOOIDCClient } = await import('./BNMJ5QME.cjs');
37
+ const { SSOOIDCClient } = await import('./ASYXJJD4.cjs');
38
38
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
39
39
  region: ssoRegion ?? init.clientConfig?.region,
40
40
  logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
@@ -44,7 +44,7 @@ var getSsoOidcClient = /* @__PURE__ */ U7VZULNU_cjs.__name(async (ssoRegion, ini
44
44
 
45
45
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
46
46
  var getNewSsoOidcToken = /* @__PURE__ */ U7VZULNU_cjs.__name(async (ssoToken, ssoRegion, init = {}) => {
47
- const { CreateTokenCommand } = await import('./BNMJ5QME.cjs');
47
+ const { CreateTokenCommand } = await import('./ASYXJJD4.cjs');
48
48
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
49
49
  return ssoOidcClient.send(new CreateTokenCommand({
50
50
  clientId: ssoToken.clientId,
@@ -201,7 +201,7 @@ var resolveSSOCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async ({ ssoStar
201
201
  });
202
202
  }
203
203
  const { accessToken } = token;
204
- const { SSOClient, GetRoleCredentialsCommand } = await import('./Y5ZXTD76.cjs');
204
+ const { SSOClient, GetRoleCredentialsCommand } = await import('./SHJCZ6NL.cjs');
205
205
  const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
206
206
  logger: clientConfig?.logger ?? parentClientConfig?.logger,
207
207
  region: clientConfig?.region ?? ssoRegion
@@ -338,5 +338,5 @@ U7VZULNU_cjs.init_cjs_shims();
338
338
  exports.fromSSO = fromSSO;
339
339
  exports.isSsoProfile = isSsoProfile;
340
340
  exports.validateSsoProfile = validateSsoProfile;
341
- //# sourceMappingURL=4QL6ZBHT.cjs.map
342
- //# sourceMappingURL=4QL6ZBHT.cjs.map
341
+ //# sourceMappingURL=MQTCD42Y.cjs.map
342
+ //# sourceMappingURL=MQTCD42Y.cjs.map
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/types.js"],"names":["init_cjs_shims","isSsoProfile","arg","sso_start_url","sso_account_id","sso_session","sso_region","sso_role_name","EXPIRE_WINDOW_MS","REFRESH_MESSAGE","getSsoOidcClient","__name","ssoRegion","init","SSOOIDCClient","ssoOidcClient","Object","assign","clientConfig","region","logger","parentClientConfig","getNewSsoOidcToken","ssoToken","CreateTokenCommand","send","clientId","clientSecret","refreshToken","grantType","validateTokenExpiry","token","expiration","getTime","Date","now","TokenProviderError","validateTokenKey","key","value","forRefresh","writeFile","fsPromises","writeSSOTokenToFile","id","tokenFilepath","getSSOTokenFilepath","tokenString","JSON","stringify","lastRefreshAttemptTime","fromSso","_init","callerClientConfig","debug","profiles","parseKnownFiles","profileName","getProfileName","profile","ssoSessionName","ssoSessions","loadSsoSessionData","ssoSession","ssoSessionRequiredKey","getSSOTokenFromFile","e","accessToken","expiresAt","existingToken","setTime","newSsoOidcToken","expiresIn","newTokenExpiration","toISOString","error","SHOULD_FAIL_CREDENTIAL_CHAIN","resolveSSOCredentials","ssoStartUrl","ssoAccountId","ssoRoleName","ssoClient","refreshMessage","_token","getSsoTokenProvider","CredentialsProviderError","message","tryNextLink","SSOClient","GetRoleCredentialsCommand","sso","ssoResp","accountId","roleName","roleCredentials","accessKeyId","secretAccessKey","sessionToken","credentialScope","credentials","setCredentialFeature","validateSsoProfile","keys","join","fromSSO","session","conflictMsg"],"mappings":";;;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMC,YAAAA,wCAAgBC,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIC,aAAAA,KAAkB,QAAA,IAC1B,OAAOD,GAAAA,CAAIE,cAAAA,KAAmB,YAC9B,OAAOF,GAAAA,CAAIG,WAAAA,KAAgB,QAAA,IAC3B,OAAOH,GAAAA,CAAII,eAAe,QAAA,IAC1B,OAAOJ,GAAAA,CAAIK,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA;;;ACA5BP,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMQ,gBAAAA,GAAmB,IAAI,EAAA,GAAK,GAAA;AAClC,IAAMC,eAAAA,GAAkB,CAAA,+EAAA,CAAA;;;ACD/BT,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMU,gBAAAA,mBAAmBC,mBAAA,CAAA,OAAOC,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACvD,EAAA,MAAM,EAAEC,aAAAA,EAAa,GAAK,MAAM,OAAO,gBAAA,CAAA;AACvC,EAAA,MAAMC,aAAAA,GAAgB,IAAID,aAAAA,CAAcE,MAAAA,CAAOC,MAAAA,CAAO,EAAC,EAAGJ,IAAAA,CAAKK,YAAAA,IAAgB,EAAC,EAAG;IAC/EC,MAAAA,EAAQP,SAAAA,IAAaC,KAAKK,YAAAA,EAAcC,MAAAA;AACxCC,IAAAA,MAAAA,EAAQP,IAAAA,CAAKK,YAAAA,EAAcE,MAAAA,IAAUP,IAAAA,CAAKQ,kBAAAA,EAAoBD;AAClE,GAAA,CAAA,CAAA;AACA,EAAA,OAAOL,aAAAA;AACX,CAAA,EAPgC,kBAAA,CAAA;;;ADCzB,IAAMO,qCAAqBX,mBAAA,CAAA,OAAOY,QAAAA,EAAUX,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACnE,EAAA,MAAM,EAAEW,kBAAAA,EAAkB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC5C,EAAA,MAAMT,aAAAA,GAAgB,MAAML,gBAAAA,CAAiBE,SAAAA,EAAWC,IAAAA,CAAAA;AACxD,EAAA,OAAOE,aAAAA,CAAcU,IAAAA,CAAK,IAAID,kBAAAA,CAAmB;AAC7CE,IAAAA,QAAAA,EAAUH,QAAAA,CAASG,QAAAA;AACnBC,IAAAA,YAAAA,EAAcJ,QAAAA,CAASI,YAAAA;AACvBC,IAAAA,YAAAA,EAAcL,QAAAA,CAASK,YAAAA;IACvBC,SAAAA,EAAW;AACf,GAAA,CAAA,CAAA;AACJ,CAAA,EATkC,oBAAA,CAAA;;;AEDlC7B,2BAAA,EAAA;AAEO,IAAM8B,mBAAAA,wCAAuBC,KAAAA,KAAAA;AAChC,EAAA,IAAIA,KAAAA,CAAMC,cAAcD,KAAAA,CAAMC,UAAAA,CAAWC,SAAO,GAAKC,IAAAA,CAAKC,KAAG,EAAI;AAC7D,IAAA,MAAM,IAAIC,+BAAAA,CAAmB,CAAA,kBAAA,EAAqB3B,eAAAA,IAAmB,KAAA,CAAA;AACzE,EAAA;AACJ,CAAA,EAJmC,qBAAA,CAAA;;;ACFnCT,2BAAA,EAAA;AAEO,IAAMqC,gBAAAA,mBAAmB1B,mBAAA,CAAA,CAAC2B,GAAAA,EAAKC,KAAAA,EAAOC,aAAa,KAAA,KAAK;AAC3D,EAAA,IAAI,OAAOD,UAAU,WAAA,EAAa;AAC9B,IAAA,MAAM,IAAIH,+BAAAA,CAAmB,CAAA,uBAAA,EAA0BE,GAAAA,CAAAA,cAAAA,EAAoBE,UAAAA,GAAa,kBAAA,GAAqB,EAAA,CAAA,EAAA,EAAO/B,eAAAA,CAAAA,CAAAA,EAAmB,KAAA,CAAA;AAC3I,EAAA;AACJ,CAAA,EAJgC,kBAAA,CAAA;;;ACFhCT,2BAAA,EAAA;AAEA,IAAM,EAAEyC,WAAS,GAAKC,WAAAA;AACf,IAAMC,mBAAAA,mBAAsBhC,mBAAA,CAAA,CAACiC,EAAAA,EAAIrB,QAAAA,KAAAA;AACpC,EAAA,MAAMsB,aAAAA,GAAgBC,iCAAoBF,EAAAA,CAAAA;AAC1C,EAAA,MAAMG,WAAAA,GAAcC,IAAAA,CAAKC,SAAAA,CAAU1B,QAAAA,EAAU,MAAM,CAAA,CAAA;AACnD,EAAA,OAAOkB,SAAAA,CAAUI,eAAeE,WAAAA,CAAAA;AACpC,CAAA,EAJmC,qBAAA,CAAA;;;ANInC,IAAMG,sBAAAA,mBAAyB,IAAIhB,IAAAA,CAAK,CAAA,CAAA;AACjC,IAAMiB,OAAAA,mBAAUxC,mBAAA,CAAA,CAACyC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMxC,IAAAA,GAAO;IACT,GAAGuC,KAAAA;IACH/B,kBAAAA,EAAoB;MAChB,GAAGgC,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM/B;AACb;AACJ,GAAA;AACAR,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,oCAAA,CAAA;AACnB,EAAA,MAAMC,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,MAAMA,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,EAAA,IAAI,CAACE,OAAAA,EAAS;AACV,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,oDAA+D,KAAA,CAAA;EAC5G,CAAA,MAAA,IACS,CAACE,OAAAA,CAAQ,aAAA,CAAA,EAAgB;AAC9B,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACvG,EAAA;AACA,EAAA,MAAMG,cAAAA,GAAiBD,QAAQ,aAAA,CAAA;AAC/B,EAAA,MAAME,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,EAAA,MAAMkD,UAAAA,GAAaF,YAAYD,cAAAA,CAAAA;AAC/B,EAAA,IAAI,CAACG,UAAAA,EAAY;AACb,IAAA,MAAM,IAAI3B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,oDAAkE,KAAA,CAAA;AACnH,EAAA;AACA,EAAA,KAAA,MAAWI,qBAAAA,IAAyB;AAAC,IAAA,eAAA;AAAiB,IAAA;AAAe,GAAA,EAAA;AACjE,IAAA,IAAI,CAACD,UAAAA,CAAWC,qBAAAA,CAAAA,EAAwB;AACpC,MAAA,MAAM,IAAI5B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,CAAAA,gCAAAA,EAAiDI,qBAAAA,MAA2B,KAAA,CAAA;AAC7H,IAAA;AACJ,EAAA;AACA,EAAoBD,WAAW,eAAA;AAC/B,EAAA,MAAMnD,SAAAA,GAAYmD,WAAW,YAAA,CAAA;AAC7B,EAAA,IAAIxC,QAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,QAAAA,GAAW,MAAM0C,iCAAoBL,cAAAA,CAAAA;AACzC,EAAA,CAAA,CAAA,OACOM,CAAAA,EAAG;AACN,IAAA,MAAM,IAAI9B,+BAAAA,CAAmB,CAAA,8CAAA,EAAiDqB,WAAAA,CAAAA,8BAAAA,EAA4ChD,eAAAA,IAAmB,KAAA,CAAA;AACjJ,EAAA;AACA4B,EAAAA,gBAAAA,CAAiB,aAAA,EAAed,SAAS4C,WAAW,CAAA;AACpD9B,EAAAA,gBAAAA,CAAiB,WAAA,EAAad,SAAS6C,SAAS,CAAA;AAChD,EAAA,MAAM,EAAED,WAAAA,EAAaC,SAAAA,EAAS,GAAK7C,QAAAA;AACnC,EAAA,MAAM8C,aAAAA,GAAgB;IAAEtC,KAAAA,EAAOoC,WAAAA;IAAanC,UAAAA,EAAY,IAAIE,KAAKkC,SAAAA;AAAW,GAAA;AAC5E,EAAA,IAAIC,cAAcrC,UAAAA,CAAWC,OAAAA,KAAYC,IAAAA,CAAKC,GAAAA,KAAQ3B,gBAAAA,EAAkB;AACpE,IAAA,OAAO6D,aAAAA;AACX,EAAA;AACA,EAAA,IAAInC,KAAKC,GAAAA,EAAG,GAAKe,uBAAuBjB,OAAAA,EAAO,GAAK,KAAK,GAAA,EAAM;AAC3DH,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACAhC,EAAAA,gBAAAA,CAAiB,UAAA,EAAYd,QAAAA,CAASG,QAAAA,EAAU,IAAA,CAAA;AAChDW,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASI,YAAAA,EAAc,IAAA,CAAA;AACxDU,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASK,YAAAA,EAAc,IAAA,CAAA;AACxD,EAAA,IAAI;AACAsB,IAAAA,sBAAAA,CAAuBoB,OAAAA,CAAQpC,IAAAA,CAAKC,GAAAA,EAAG,CAAA;AACvC,IAAA,MAAMoC,eAAAA,GAAkB,MAAMjD,kBAAAA,CAAmBC,QAAAA,EAAUX,WAAWC,IAAAA,CAAAA;AACtEwB,IAAAA,gBAAAA,CAAiB,aAAA,EAAekC,gBAAgBJ,WAAW,CAAA;AAC3D9B,IAAAA,gBAAAA,CAAiB,WAAA,EAAakC,gBAAgBC,SAAS,CAAA;AACvD,IAAA,MAAMC,kBAAAA,GAAqB,IAAIvC,IAAAA,CAAKA,IAAAA,CAAKC,KAAG,GAAKoC,eAAAA,CAAgBC,YAAY,GAAA,CAAA;AAC7E,IAAA,IAAI;AACA,MAAA,MAAM7B,oBAAoBiB,cAAAA,EAAgB;QACtC,GAAGrC,QAAAA;AACH4C,QAAAA,WAAAA,EAAaI,eAAAA,CAAgBJ,WAAAA;AAC7BC,QAAAA,SAAAA,EAAWK,mBAAmBC,WAAAA,EAAW;AACzC9C,QAAAA,YAAAA,EAAc2C,eAAAA,CAAgB3C;OAClC,CAAA;AACJ,IAAA,CAAA,CAAA,OACO+C,KAAAA,EAAO;AACd,IAAA;AACA,IAAA,OAAO;AACH5C,MAAAA,KAAAA,EAAOwC,eAAAA,CAAgBJ,WAAAA;MACvBnC,UAAAA,EAAYyC;AAChB,KAAA;AACJ,EAAA,CAAA,CAAA,OACOE,KAAAA,EAAO;AACV7C,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACJ,CAAA,EA/EuB,SAAA,CAAA;;;ADJvB,IAAMO,4BAAAA,GAA+B,KAAA;AAC9B,IAAMC,qBAAAA,mBAAwBlE,mBAAA,CAAA,OAAO,EAAEmE,WAAAA,EAAaf,UAAAA,EAAYgB,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAaC,SAAAA,EAAW/D,YAAAA,EAAcG,kBAAAA,EAAoBsC,OAAAA,EAASvC,QAAM,KAAG;AACxK,EAAA,IAAIW,KAAAA;AACJ,EAAA,MAAMmD,cAAAA,GAAiB,CAAA,6EAAA,CAAA;AACvB,EAAA,IAAInB,UAAAA,EAAY;AACZ,IAAA,IAAI;AACA,MAAA,MAAMoB,MAAAA,GAAS,MAAMC,OAAAA,CAAoB;AAAEzB,QAAAA;AAAQ,OAAA,CAAA,EAAA;AACnD5B,MAAAA,KAAAA,GAAQ;AACJoC,QAAAA,WAAAA,EAAagB,MAAAA,CAAOpD,KAAAA;AACpBqC,QAAAA,SAAAA,EAAW,IAAIlC,IAAAA,CAAKiD,MAAAA,CAAOnD,UAAU,EAAE0C,WAAAA;AAC3C,OAAA;AACJ,IAAA,CAAA,CAAA,OACOR,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyBnB,CAAAA,CAAEoB,OAAAA,EAAS;QAC1CC,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;EACJ,CAAA,MACK;AACD,IAAA,IAAI;AACAW,MAAAA,KAAAA,GAAQ,MAAMkC,iCAAoBa,WAAAA,CAAAA;AACtC,IAAA,CAAA,CAAA,OACOZ,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyB,CAAA,yDAAA,EAA4DH,cAAAA,CAAAA,CAAAA,EAAkB;QAC7GK,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;AACJ,EAAA;AACA,EAAA,IAAI,IAAIc,IAAAA,CAAKH,KAAAA,CAAMqC,SAAS,CAAA,CAAEnC,SAAO,GAAKC,IAAAA,CAAKC,GAAAA,EAAG,IAAM,CAAA,EAAG;AACvD,IAAA,MAAM,IAAIkD,qCAAAA,CAAyB,CAAA,0DAAA,EAA6DH,cAAAA,CAAAA,CAAAA,EAAkB;MAC9GK,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE+C,aAAW,GAAKpC,KAAAA;AACxB,EAAA,MAAM,EAAEyD,SAAAA,EAAWC,yBAAAA,EAAyB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9D,EAAA,MAAMC,GAAAA,GAAMT,SAAAA,IACR,IAAIO,SAAAA,CAAUxE,MAAAA,CAAOC,OAAO,EAAC,EAAGC,YAAAA,IAAgB,EAAC,EAAG;IAChDE,MAAAA,EAAQF,YAAAA,EAAcE,UAAUC,kBAAAA,EAAoBD,MAAAA;AACpDD,IAAAA,MAAAA,EAAQD,cAAcC,MAAAA,IAAUP;AACpC,GAAA,CAAA,CAAA;AACJ,EAAA,IAAI+E,OAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,OAAAA,GAAU,MAAMD,GAAAA,CAAIjE,IAAAA,CAAK,IAAIgE,yBAAAA,CAA0B;MACnDG,SAAAA,EAAWb,YAAAA;MACXc,QAAAA,EAAUb,WAAAA;AACVb,MAAAA;AACJ,KAAA,CAAA,CAAA;AACJ,EAAA,CAAA,CAAA,OACOD,CAAAA,EAAG;AACN,IAAA,MAAM,IAAImB,sCAAyBnB,CAAAA,EAAG;MAClCqB,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE0E,eAAAA,EAAiB,EAAEC,WAAAA,EAAaC,eAAAA,EAAiBC,YAAAA,EAAcjE,UAAAA,EAAYkE,eAAAA,EAAiBN,SAAAA,EAAS,GAAK,EAAC,EAAC,GAAMD,OAAAA;AAC1H,EAAA,IAAI,CAACI,WAAAA,IAAe,CAACC,mBAAmB,CAACC,YAAAA,IAAgB,CAACjE,UAAAA,EAAY;AAClE,IAAA,MAAM,IAAIqD,sCAAyB,8CAAA,EAAgD;MAC/EE,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM+E,WAAAA,GAAc;AAChBJ,IAAAA,WAAAA;AACAC,IAAAA,eAAAA;AACAC,IAAAA,YAAAA;IACAjE,UAAAA,EAAY,IAAIE,KAAKF,UAAAA,CAAAA;AACrB,IAAA,GAAIkE,eAAAA,IAAmB;AAAEA,MAAAA;AAAgB,KAAA;AACzC,IAAA,GAAIN,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACA,EAAA,IAAI7B,UAAAA,EAAY;AACZqC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,mBAAmB,GAAA,CAAA;EACzD,CAAA,MACK;AACDC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,0BAA0B,GAAA,CAAA;AAChE,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EA9EqC,uBAAA,CAAA;;;AQLrCnG,2BAAA,EAAA;AACO,IAAMqG,kBAAAA,mBAAqB1F,mBAAA,CAAA,CAACgD,OAAAA,EAASvC,MAAAA,KAAAA;AACxC,EAAA,MAAM,EAAEjB,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,eAAa,GAAKoD,OAAAA;AACrE,EAAA,IAAI,CAACxD,aAAAA,IAAiB,CAACC,kBAAkB,CAACE,UAAAA,IAAc,CAACC,aAAAA,EAAe;AACpE,IAAA,MAAM,IAAI8E,sCAAyB,CAAA,8IAAA,EACwBrE,MAAAA,CAAOsF,KAAK3C,OAAAA,CAAAA,CAAS4C,IAAAA,CAAK,IAAA,CAAA;AAA6F,kFAAA,CAAA,EAAA;MAAEhB,WAAAA,EAAa,KAAA;AAAOnE,MAAAA;KAAO,CAAA;AACnN,EAAA;AACA,EAAA,OAAOuC,OAAAA;AACX,CAAA,EAPkC,oBAAA;;;AVI3B,IAAM6C,OAAAA,mBAAU7F,mBAAA,CAAA,CAACE,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEwC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACpExC,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM,EAAEwB,WAAAA,EAAaC,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAajB,YAAU,GAAKlD,IAAAA;AAC1E,EAAA,MAAM,EAAEoE,WAAS,GAAKpE,IAAAA;AACtB,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,IAAI,CAACmB,eAAe,CAACC,YAAAA,IAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,IAAe,CAACjB,UAAAA,EAAY;AAC5E,IAAA,MAAMR,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,IAAA,MAAM8C,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,IAAA,IAAI,CAACE,OAAAA,EAAS;AACV,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,eAAAA,CAAAA,EAA8B;AAAErC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OAAO,CAAA;AACtG,IAAA;AACA,IAAA,IAAI,CAACnB,YAAAA,CAAa0D,OAAAA,CAAAA,EAAU;AACxB,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,wCAAAA,CAAAA,EAAuD;AACjGrC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OACjB,CAAA;AACJ,IAAA;AACA,IAAA,IAAIuC,SAAStD,WAAAA,EAAa;AACtB,MAAA,MAAMwD,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,MAAA,MAAM4F,OAAAA,GAAU5C,WAAAA,CAAYF,OAAAA,CAAQtD,WAAW,CAAA;AAC/C,MAAA,MAAMqG,WAAAA,GAAc,CAAA,2BAAA,EAA8BjD,WAAAA,CAAAA,iBAAAA,EAA+BE,QAAQtD,WAAW,CAAA,CAAA;AACpG,MAAA,IAAIO,SAAAA,IAAaA,SAAAA,KAAc6F,OAAAA,CAAQnG,UAAAA,EAAY;AAC/C,QAAA,MAAM,IAAI+E,qCAAAA,CAAyB,CAAA,sBAAA,CAAA,GAA2BqB,WAAAA,EAAa;UACvEnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACA,MAAA,IAAI0D,WAAAA,IAAeA,WAAAA,KAAgB2B,OAAAA,CAAQtG,aAAAA,EAAe;AACtD,QAAA,MAAM,IAAIkF,qCAAAA,CAAyB,CAAA,yBAAA,CAAA,GAA8BqB,WAAAA,EAAa;UAC1EnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACAuC,MAAAA,OAAAA,CAAQrD,aAAamG,OAAAA,CAAQnG,UAAAA;AAC7BqD,MAAAA,OAAAA,CAAQxD,gBAAgBsG,OAAAA,CAAQtG,aAAAA;AACpC,IAAA;AACA,IAAA,MAAM,EAAEA,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,aAAAA,EAAeF,aAAW,GAAKgG,kBAAAA,CAAmB1C,OAAAA,EAAS9C,IAAAA,CAAKO,MAAM,CAAA;AACzH,IAAA,OAAOyD,qBAAAA,CAAsB;MACzBC,WAAAA,EAAa3E,aAAAA;MACb4D,UAAAA,EAAY1D,WAAAA;MACZ0E,YAAAA,EAAc3E,cAAAA;MACdQ,SAAAA,EAAWN,UAAAA;MACX0E,WAAAA,EAAazE,aAAAA;AACb0E,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA,CAAA,MAAA,IACS,CAACqB,WAAAA,IAAe,CAACC,gBAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,EAAa;AAClE,IAAA,MAAM,IAAIK,sCAAyB,8HAAA,EAC8B;MAAEE,WAAAA,EAAa,KAAA;AAAOnE,MAAAA,MAAAA,EAAQP,IAAAA,CAAKO;KAAO,CAAA;EAC/G,CAAA,MACK;AACD,IAAA,OAAOyD,qBAAAA,CAAsB;AACzBC,MAAAA,WAAAA;AACAf,MAAAA,UAAAA;AACAgB,MAAAA,YAAAA;AACAnE,MAAAA,SAAAA;AACAoE,MAAAA,WAAAA;AACAC,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA;AACJ,CAAA,EAnEuB,SAAA;;;AWLvBzD,2BAAA,EAAA","file":"4QL6ZBHT.cjs","sourcesContent":["export * from \"./fromSSO\";\nexport * from \"./isSsoProfile\";\nexport * from \"./types\";\nexport * from \"./validateSsoProfile\";\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, loadSsoSessionData, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { isSsoProfile } from \"./isSsoProfile\";\nimport { resolveSSOCredentials } from \"./resolveSSOCredentials\";\nimport { validateSsoProfile } from \"./validateSsoProfile\";\nexport const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-sso - fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n const { ssoClient } = init;\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n const profiles = await parseKnownFiles(init);\n const profile = profiles[profileName];\n if (!profile) {\n throw new CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });\n }\n if (!isSsoProfile(profile)) {\n throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {\n logger: init.logger,\n });\n }\n if (profile?.sso_session) {\n const ssoSessions = await loadSsoSessionData(init);\n const session = ssoSessions[profile.sso_session];\n const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;\n if (ssoRegion && ssoRegion !== session.sso_region) {\n throw new CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {\n throw new CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n profile.sso_region = session.sso_region;\n profile.sso_start_url = session.sso_start_url;\n }\n const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);\n return resolveSSOCredentials({\n ssoStartUrl: sso_start_url,\n ssoSession: sso_session,\n ssoAccountId: sso_account_id,\n ssoRegion: sso_region,\n ssoRoleName: sso_role_name,\n ssoClient: ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n throw new CredentialsProviderError(\"Incomplete configuration. The fromSSO() argument hash must include \" +\n '\"ssoStartUrl\", \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"', { tryNextLink: false, logger: init.logger });\n }\n else {\n return resolveSSOCredentials({\n ssoStartUrl,\n ssoSession,\n ssoAccountId,\n ssoRegion,\n ssoRoleName,\n ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n};\n","export const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { fromSso as getSsoTokenProvider } from \"@aws-sdk/token-providers\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getSSOTokenFromFile } from \"@smithy/shared-ini-file-loader\";\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\nexport const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }) => {\n let token;\n const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;\n if (ssoSession) {\n try {\n const _token = await getSsoTokenProvider({ profile })();\n token = {\n accessToken: _token.token,\n expiresAt: new Date(_token.expiration).toISOString(),\n };\n }\n catch (e) {\n throw new CredentialsProviderError(e.message, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n else {\n try {\n token = await getSSOTokenFromFile(ssoStartUrl);\n }\n catch (e) {\n throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {\n throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { accessToken } = token;\n const { SSOClient, GetRoleCredentialsCommand } = await import(\"./loadSso\");\n const sso = ssoClient ||\n new SSOClient(Object.assign({}, clientConfig ?? {}, {\n logger: clientConfig?.logger ?? parentClientConfig?.logger,\n region: clientConfig?.region ?? ssoRegion,\n }));\n let ssoResp;\n try {\n ssoResp = await sso.send(new GetRoleCredentialsCommand({\n accountId: ssoAccountId,\n roleName: ssoRoleName,\n accessToken,\n }));\n }\n catch (e) {\n throw new CredentialsProviderError(e, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;\n if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const credentials = {\n accessKeyId,\n secretAccessKey,\n sessionToken,\n expiration: new Date(expiration),\n ...(credentialScope && { credentialScope }),\n ...(accountId && { accountId }),\n };\n if (ssoSession) {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO\", \"s\");\n }\n else {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO_LEGACY\", \"u\");\n }\n return credentials;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, getSSOTokenFromFile, loadSsoSessionData, parseKnownFiles, } from \"@smithy/shared-ini-file-loader\";\nimport { EXPIRE_WINDOW_MS, REFRESH_MESSAGE } from \"./constants\";\nimport { getNewSsoOidcToken } from \"./getNewSsoOidcToken\";\nimport { validateTokenExpiry } from \"./validateTokenExpiry\";\nimport { validateTokenKey } from \"./validateTokenKey\";\nimport { writeSSOTokenToFile } from \"./writeSSOTokenToFile\";\nconst lastRefreshAttemptTime = new Date(0);\nexport const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/token-providers - fromSso\");\n const profiles = await parseKnownFiles(init);\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n const profile = profiles[profileName];\n if (!profile) {\n throw new TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);\n }\n else if (!profile[\"sso_session\"]) {\n throw new TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);\n }\n const ssoSessionName = profile[\"sso_session\"];\n const ssoSessions = await loadSsoSessionData(init);\n const ssoSession = ssoSessions[ssoSessionName];\n if (!ssoSession) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);\n }\n for (const ssoSessionRequiredKey of [\"sso_start_url\", \"sso_region\"]) {\n if (!ssoSession[ssoSessionRequiredKey]) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);\n }\n }\n const ssoStartUrl = ssoSession[\"sso_start_url\"];\n const ssoRegion = ssoSession[\"sso_region\"];\n let ssoToken;\n try {\n ssoToken = await getSSOTokenFromFile(ssoSessionName);\n }\n catch (e) {\n throw new TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`, false);\n }\n validateTokenKey(\"accessToken\", ssoToken.accessToken);\n validateTokenKey(\"expiresAt\", ssoToken.expiresAt);\n const { accessToken, expiresAt } = ssoToken;\n const existingToken = { token: accessToken, expiration: new Date(expiresAt) };\n if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {\n return existingToken;\n }\n if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1000) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n validateTokenKey(\"clientId\", ssoToken.clientId, true);\n validateTokenKey(\"clientSecret\", ssoToken.clientSecret, true);\n validateTokenKey(\"refreshToken\", ssoToken.refreshToken, true);\n try {\n lastRefreshAttemptTime.setTime(Date.now());\n const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);\n validateTokenKey(\"accessToken\", newSsoOidcToken.accessToken);\n validateTokenKey(\"expiresIn\", newSsoOidcToken.expiresIn);\n const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);\n try {\n await writeSSOTokenToFile(ssoSessionName, {\n ...ssoToken,\n accessToken: newSsoOidcToken.accessToken,\n expiresAt: newTokenExpiration.toISOString(),\n refreshToken: newSsoOidcToken.refreshToken,\n });\n }\n catch (error) {\n }\n return {\n token: newSsoOidcToken.accessToken,\n expiration: newTokenExpiration,\n };\n }\n catch (error) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n};\n","export const EXPIRE_WINDOW_MS = 5 * 60 * 1000;\nexport const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;\n","import { getSsoOidcClient } from \"./getSsoOidcClient\";\nexport const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {\n const { CreateTokenCommand } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);\n return ssoOidcClient.send(new CreateTokenCommand({\n clientId: ssoToken.clientId,\n clientSecret: ssoToken.clientSecret,\n refreshToken: ssoToken.refreshToken,\n grantType: \"refresh_token\",\n }));\n};\n","export const getSsoOidcClient = async (ssoRegion, init = {}) => {\n const { SSOOIDCClient } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {\n region: ssoRegion ?? init.clientConfig?.region,\n logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger,\n }));\n return ssoOidcClient;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenExpiry = (token) => {\n if (token.expiration && token.expiration.getTime() < Date.now()) {\n throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenKey = (key, value, forRefresh = false) => {\n if (typeof value === \"undefined\") {\n throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? \". Cannot refresh\" : \"\"}. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { getSSOTokenFilepath } from \"@smithy/shared-ini-file-loader\";\nimport { promises as fsPromises } from \"fs\";\nconst { writeFile } = fsPromises;\nexport const writeSSOTokenToFile = (id, ssoToken) => {\n const tokenFilepath = getSSOTokenFilepath(id);\n const tokenString = JSON.stringify(ssoToken, null, 2);\n return writeFile(tokenFilepath, tokenString);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nexport const validateSsoProfile = (profile, logger) => {\n const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", ` +\n `\"sso_region\", \"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\", \")}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });\n }\n return profile;\n};\n","export {};\n"]}
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/types.js"],"names":["init_cjs_shims","isSsoProfile","arg","sso_start_url","sso_account_id","sso_session","sso_region","sso_role_name","EXPIRE_WINDOW_MS","REFRESH_MESSAGE","getSsoOidcClient","__name","ssoRegion","init","SSOOIDCClient","ssoOidcClient","Object","assign","clientConfig","region","logger","parentClientConfig","getNewSsoOidcToken","ssoToken","CreateTokenCommand","send","clientId","clientSecret","refreshToken","grantType","validateTokenExpiry","token","expiration","getTime","Date","now","TokenProviderError","validateTokenKey","key","value","forRefresh","writeFile","fsPromises","writeSSOTokenToFile","id","tokenFilepath","getSSOTokenFilepath","tokenString","JSON","stringify","lastRefreshAttemptTime","fromSso","_init","callerClientConfig","debug","profiles","parseKnownFiles","profileName","getProfileName","profile","ssoSessionName","ssoSessions","loadSsoSessionData","ssoSession","ssoSessionRequiredKey","getSSOTokenFromFile","e","accessToken","expiresAt","existingToken","setTime","newSsoOidcToken","expiresIn","newTokenExpiration","toISOString","error","SHOULD_FAIL_CREDENTIAL_CHAIN","resolveSSOCredentials","ssoStartUrl","ssoAccountId","ssoRoleName","ssoClient","refreshMessage","_token","getSsoTokenProvider","CredentialsProviderError","message","tryNextLink","SSOClient","GetRoleCredentialsCommand","sso","ssoResp","accountId","roleName","roleCredentials","accessKeyId","secretAccessKey","sessionToken","credentialScope","credentials","setCredentialFeature","validateSsoProfile","keys","join","fromSSO","session","conflictMsg"],"mappings":";;;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMC,YAAAA,wCAAgBC,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIC,aAAAA,KAAkB,QAAA,IAC1B,OAAOD,GAAAA,CAAIE,cAAAA,KAAmB,YAC9B,OAAOF,GAAAA,CAAIG,WAAAA,KAAgB,QAAA,IAC3B,OAAOH,GAAAA,CAAII,eAAe,QAAA,IAC1B,OAAOJ,GAAAA,CAAIK,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA;;;ACA5BP,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMQ,gBAAAA,GAAmB,IAAI,EAAA,GAAK,GAAA;AAClC,IAAMC,eAAAA,GAAkB,CAAA,+EAAA,CAAA;;;ACD/BT,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMU,gBAAAA,mBAAmBC,mBAAA,CAAA,OAAOC,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACvD,EAAA,MAAM,EAAEC,aAAAA,EAAa,GAAK,MAAM,OAAO,gBAAA,CAAA;AACvC,EAAA,MAAMC,aAAAA,GAAgB,IAAID,aAAAA,CAAcE,MAAAA,CAAOC,MAAAA,CAAO,EAAC,EAAGJ,IAAAA,CAAKK,YAAAA,IAAgB,EAAC,EAAG;IAC/EC,MAAAA,EAAQP,SAAAA,IAAaC,KAAKK,YAAAA,EAAcC,MAAAA;AACxCC,IAAAA,MAAAA,EAAQP,IAAAA,CAAKK,YAAAA,EAAcE,MAAAA,IAAUP,IAAAA,CAAKQ,kBAAAA,EAAoBD;AAClE,GAAA,CAAA,CAAA;AACA,EAAA,OAAOL,aAAAA;AACX,CAAA,EAPgC,kBAAA,CAAA;;;ADCzB,IAAMO,qCAAqBX,mBAAA,CAAA,OAAOY,QAAAA,EAAUX,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACnE,EAAA,MAAM,EAAEW,kBAAAA,EAAkB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC5C,EAAA,MAAMT,aAAAA,GAAgB,MAAML,gBAAAA,CAAiBE,SAAAA,EAAWC,IAAAA,CAAAA;AACxD,EAAA,OAAOE,aAAAA,CAAcU,IAAAA,CAAK,IAAID,kBAAAA,CAAmB;AAC7CE,IAAAA,QAAAA,EAAUH,QAAAA,CAASG,QAAAA;AACnBC,IAAAA,YAAAA,EAAcJ,QAAAA,CAASI,YAAAA;AACvBC,IAAAA,YAAAA,EAAcL,QAAAA,CAASK,YAAAA;IACvBC,SAAAA,EAAW;AACf,GAAA,CAAA,CAAA;AACJ,CAAA,EATkC,oBAAA,CAAA;;;AEDlC7B,2BAAA,EAAA;AAEO,IAAM8B,mBAAAA,wCAAuBC,KAAAA,KAAAA;AAChC,EAAA,IAAIA,KAAAA,CAAMC,cAAcD,KAAAA,CAAMC,UAAAA,CAAWC,SAAO,GAAKC,IAAAA,CAAKC,KAAG,EAAI;AAC7D,IAAA,MAAM,IAAIC,+BAAAA,CAAmB,CAAA,kBAAA,EAAqB3B,eAAAA,IAAmB,KAAA,CAAA;AACzE,EAAA;AACJ,CAAA,EAJmC,qBAAA,CAAA;;;ACFnCT,2BAAA,EAAA;AAEO,IAAMqC,gBAAAA,mBAAmB1B,mBAAA,CAAA,CAAC2B,GAAAA,EAAKC,KAAAA,EAAOC,aAAa,KAAA,KAAK;AAC3D,EAAA,IAAI,OAAOD,UAAU,WAAA,EAAa;AAC9B,IAAA,MAAM,IAAIH,+BAAAA,CAAmB,CAAA,uBAAA,EAA0BE,GAAAA,CAAAA,cAAAA,EAAoBE,UAAAA,GAAa,kBAAA,GAAqB,EAAA,CAAA,EAAA,EAAO/B,eAAAA,CAAAA,CAAAA,EAAmB,KAAA,CAAA;AAC3I,EAAA;AACJ,CAAA,EAJgC,kBAAA,CAAA;;;ACFhCT,2BAAA,EAAA;AAEA,IAAM,EAAEyC,WAAS,GAAKC,WAAAA;AACf,IAAMC,mBAAAA,mBAAsBhC,mBAAA,CAAA,CAACiC,EAAAA,EAAIrB,QAAAA,KAAAA;AACpC,EAAA,MAAMsB,aAAAA,GAAgBC,iCAAoBF,EAAAA,CAAAA;AAC1C,EAAA,MAAMG,WAAAA,GAAcC,IAAAA,CAAKC,SAAAA,CAAU1B,QAAAA,EAAU,MAAM,CAAA,CAAA;AACnD,EAAA,OAAOkB,SAAAA,CAAUI,eAAeE,WAAAA,CAAAA;AACpC,CAAA,EAJmC,qBAAA,CAAA;;;ANInC,IAAMG,sBAAAA,mBAAyB,IAAIhB,IAAAA,CAAK,CAAA,CAAA;AACjC,IAAMiB,OAAAA,mBAAUxC,mBAAA,CAAA,CAACyC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMxC,IAAAA,GAAO;IACT,GAAGuC,KAAAA;IACH/B,kBAAAA,EAAoB;MAChB,GAAGgC,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM/B;AACb;AACJ,GAAA;AACAR,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,oCAAA,CAAA;AACnB,EAAA,MAAMC,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,MAAMA,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,EAAA,IAAI,CAACE,OAAAA,EAAS;AACV,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,oDAA+D,KAAA,CAAA;EAC5G,CAAA,MAAA,IACS,CAACE,OAAAA,CAAQ,aAAA,CAAA,EAAgB;AAC9B,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACvG,EAAA;AACA,EAAA,MAAMG,cAAAA,GAAiBD,QAAQ,aAAA,CAAA;AAC/B,EAAA,MAAME,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,EAAA,MAAMkD,UAAAA,GAAaF,YAAYD,cAAAA,CAAAA;AAC/B,EAAA,IAAI,CAACG,UAAAA,EAAY;AACb,IAAA,MAAM,IAAI3B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,oDAAkE,KAAA,CAAA;AACnH,EAAA;AACA,EAAA,KAAA,MAAWI,qBAAAA,IAAyB;AAAC,IAAA,eAAA;AAAiB,IAAA;AAAe,GAAA,EAAA;AACjE,IAAA,IAAI,CAACD,UAAAA,CAAWC,qBAAAA,CAAAA,EAAwB;AACpC,MAAA,MAAM,IAAI5B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,CAAAA,gCAAAA,EAAiDI,qBAAAA,MAA2B,KAAA,CAAA;AAC7H,IAAA;AACJ,EAAA;AACA,EAAoBD,WAAW,eAAA;AAC/B,EAAA,MAAMnD,SAAAA,GAAYmD,WAAW,YAAA,CAAA;AAC7B,EAAA,IAAIxC,QAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,QAAAA,GAAW,MAAM0C,iCAAoBL,cAAAA,CAAAA;AACzC,EAAA,CAAA,CAAA,OACOM,CAAAA,EAAG;AACN,IAAA,MAAM,IAAI9B,+BAAAA,CAAmB,CAAA,8CAAA,EAAiDqB,WAAAA,CAAAA,8BAAAA,EAA4ChD,eAAAA,IAAmB,KAAA,CAAA;AACjJ,EAAA;AACA4B,EAAAA,gBAAAA,CAAiB,aAAA,EAAed,SAAS4C,WAAW,CAAA;AACpD9B,EAAAA,gBAAAA,CAAiB,WAAA,EAAad,SAAS6C,SAAS,CAAA;AAChD,EAAA,MAAM,EAAED,WAAAA,EAAaC,SAAAA,EAAS,GAAK7C,QAAAA;AACnC,EAAA,MAAM8C,aAAAA,GAAgB;IAAEtC,KAAAA,EAAOoC,WAAAA;IAAanC,UAAAA,EAAY,IAAIE,KAAKkC,SAAAA;AAAW,GAAA;AAC5E,EAAA,IAAIC,cAAcrC,UAAAA,CAAWC,OAAAA,KAAYC,IAAAA,CAAKC,GAAAA,KAAQ3B,gBAAAA,EAAkB;AACpE,IAAA,OAAO6D,aAAAA;AACX,EAAA;AACA,EAAA,IAAInC,KAAKC,GAAAA,EAAG,GAAKe,uBAAuBjB,OAAAA,EAAO,GAAK,KAAK,GAAA,EAAM;AAC3DH,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACAhC,EAAAA,gBAAAA,CAAiB,UAAA,EAAYd,QAAAA,CAASG,QAAAA,EAAU,IAAA,CAAA;AAChDW,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASI,YAAAA,EAAc,IAAA,CAAA;AACxDU,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASK,YAAAA,EAAc,IAAA,CAAA;AACxD,EAAA,IAAI;AACAsB,IAAAA,sBAAAA,CAAuBoB,OAAAA,CAAQpC,IAAAA,CAAKC,GAAAA,EAAG,CAAA;AACvC,IAAA,MAAMoC,eAAAA,GAAkB,MAAMjD,kBAAAA,CAAmBC,QAAAA,EAAUX,WAAWC,IAAAA,CAAAA;AACtEwB,IAAAA,gBAAAA,CAAiB,aAAA,EAAekC,gBAAgBJ,WAAW,CAAA;AAC3D9B,IAAAA,gBAAAA,CAAiB,WAAA,EAAakC,gBAAgBC,SAAS,CAAA;AACvD,IAAA,MAAMC,kBAAAA,GAAqB,IAAIvC,IAAAA,CAAKA,IAAAA,CAAKC,KAAG,GAAKoC,eAAAA,CAAgBC,YAAY,GAAA,CAAA;AAC7E,IAAA,IAAI;AACA,MAAA,MAAM7B,oBAAoBiB,cAAAA,EAAgB;QACtC,GAAGrC,QAAAA;AACH4C,QAAAA,WAAAA,EAAaI,eAAAA,CAAgBJ,WAAAA;AAC7BC,QAAAA,SAAAA,EAAWK,mBAAmBC,WAAAA,EAAW;AACzC9C,QAAAA,YAAAA,EAAc2C,eAAAA,CAAgB3C;OAClC,CAAA;AACJ,IAAA,CAAA,CAAA,OACO+C,KAAAA,EAAO;AACd,IAAA;AACA,IAAA,OAAO;AACH5C,MAAAA,KAAAA,EAAOwC,eAAAA,CAAgBJ,WAAAA;MACvBnC,UAAAA,EAAYyC;AAChB,KAAA;AACJ,EAAA,CAAA,CAAA,OACOE,KAAAA,EAAO;AACV7C,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACJ,CAAA,EA/EuB,SAAA,CAAA;;;ADJvB,IAAMO,4BAAAA,GAA+B,KAAA;AAC9B,IAAMC,qBAAAA,mBAAwBlE,mBAAA,CAAA,OAAO,EAAEmE,WAAAA,EAAaf,UAAAA,EAAYgB,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAaC,SAAAA,EAAW/D,YAAAA,EAAcG,kBAAAA,EAAoBsC,OAAAA,EAASvC,QAAM,KAAG;AACxK,EAAA,IAAIW,KAAAA;AACJ,EAAA,MAAMmD,cAAAA,GAAiB,CAAA,6EAAA,CAAA;AACvB,EAAA,IAAInB,UAAAA,EAAY;AACZ,IAAA,IAAI;AACA,MAAA,MAAMoB,MAAAA,GAAS,MAAMC,OAAAA,CAAoB;AAAEzB,QAAAA;AAAQ,OAAA,CAAA,EAAA;AACnD5B,MAAAA,KAAAA,GAAQ;AACJoC,QAAAA,WAAAA,EAAagB,MAAAA,CAAOpD,KAAAA;AACpBqC,QAAAA,SAAAA,EAAW,IAAIlC,IAAAA,CAAKiD,MAAAA,CAAOnD,UAAU,EAAE0C,WAAAA;AAC3C,OAAA;AACJ,IAAA,CAAA,CAAA,OACOR,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyBnB,CAAAA,CAAEoB,OAAAA,EAAS;QAC1CC,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;EACJ,CAAA,MACK;AACD,IAAA,IAAI;AACAW,MAAAA,KAAAA,GAAQ,MAAMkC,iCAAoBa,WAAAA,CAAAA;AACtC,IAAA,CAAA,CAAA,OACOZ,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyB,CAAA,yDAAA,EAA4DH,cAAAA,CAAAA,CAAAA,EAAkB;QAC7GK,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;AACJ,EAAA;AACA,EAAA,IAAI,IAAIc,IAAAA,CAAKH,KAAAA,CAAMqC,SAAS,CAAA,CAAEnC,SAAO,GAAKC,IAAAA,CAAKC,GAAAA,EAAG,IAAM,CAAA,EAAG;AACvD,IAAA,MAAM,IAAIkD,qCAAAA,CAAyB,CAAA,0DAAA,EAA6DH,cAAAA,CAAAA,CAAAA,EAAkB;MAC9GK,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE+C,aAAW,GAAKpC,KAAAA;AACxB,EAAA,MAAM,EAAEyD,SAAAA,EAAWC,yBAAAA,EAAyB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9D,EAAA,MAAMC,GAAAA,GAAMT,SAAAA,IACR,IAAIO,SAAAA,CAAUxE,MAAAA,CAAOC,OAAO,EAAC,EAAGC,YAAAA,IAAgB,EAAC,EAAG;IAChDE,MAAAA,EAAQF,YAAAA,EAAcE,UAAUC,kBAAAA,EAAoBD,MAAAA;AACpDD,IAAAA,MAAAA,EAAQD,cAAcC,MAAAA,IAAUP;AACpC,GAAA,CAAA,CAAA;AACJ,EAAA,IAAI+E,OAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,OAAAA,GAAU,MAAMD,GAAAA,CAAIjE,IAAAA,CAAK,IAAIgE,yBAAAA,CAA0B;MACnDG,SAAAA,EAAWb,YAAAA;MACXc,QAAAA,EAAUb,WAAAA;AACVb,MAAAA;AACJ,KAAA,CAAA,CAAA;AACJ,EAAA,CAAA,CAAA,OACOD,CAAAA,EAAG;AACN,IAAA,MAAM,IAAImB,sCAAyBnB,CAAAA,EAAG;MAClCqB,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE0E,eAAAA,EAAiB,EAAEC,WAAAA,EAAaC,eAAAA,EAAiBC,YAAAA,EAAcjE,UAAAA,EAAYkE,eAAAA,EAAiBN,SAAAA,EAAS,GAAK,EAAC,EAAC,GAAMD,OAAAA;AAC1H,EAAA,IAAI,CAACI,WAAAA,IAAe,CAACC,mBAAmB,CAACC,YAAAA,IAAgB,CAACjE,UAAAA,EAAY;AAClE,IAAA,MAAM,IAAIqD,sCAAyB,8CAAA,EAAgD;MAC/EE,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM+E,WAAAA,GAAc;AAChBJ,IAAAA,WAAAA;AACAC,IAAAA,eAAAA;AACAC,IAAAA,YAAAA;IACAjE,UAAAA,EAAY,IAAIE,KAAKF,UAAAA,CAAAA;AACrB,IAAA,GAAIkE,eAAAA,IAAmB;AAAEA,MAAAA;AAAgB,KAAA;AACzC,IAAA,GAAIN,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACA,EAAA,IAAI7B,UAAAA,EAAY;AACZqC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,mBAAmB,GAAA,CAAA;EACzD,CAAA,MACK;AACDC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,0BAA0B,GAAA,CAAA;AAChE,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EA9EqC,uBAAA,CAAA;;;AQLrCnG,2BAAA,EAAA;AACO,IAAMqG,kBAAAA,mBAAqB1F,mBAAA,CAAA,CAACgD,OAAAA,EAASvC,MAAAA,KAAAA;AACxC,EAAA,MAAM,EAAEjB,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,eAAa,GAAKoD,OAAAA;AACrE,EAAA,IAAI,CAACxD,aAAAA,IAAiB,CAACC,kBAAkB,CAACE,UAAAA,IAAc,CAACC,aAAAA,EAAe;AACpE,IAAA,MAAM,IAAI8E,sCAAyB,CAAA,8IAAA,EACwBrE,MAAAA,CAAOsF,KAAK3C,OAAAA,CAAAA,CAAS4C,IAAAA,CAAK,IAAA,CAAA;AAA6F,kFAAA,CAAA,EAAA;MAAEhB,WAAAA,EAAa,KAAA;AAAOnE,MAAAA;KAAO,CAAA;AACnN,EAAA;AACA,EAAA,OAAOuC,OAAAA;AACX,CAAA,EAPkC,oBAAA;;;AVI3B,IAAM6C,OAAAA,mBAAU7F,mBAAA,CAAA,CAACE,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEwC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACpExC,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM,EAAEwB,WAAAA,EAAaC,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAajB,YAAU,GAAKlD,IAAAA;AAC1E,EAAA,MAAM,EAAEoE,WAAS,GAAKpE,IAAAA;AACtB,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,IAAI,CAACmB,eAAe,CAACC,YAAAA,IAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,IAAe,CAACjB,UAAAA,EAAY;AAC5E,IAAA,MAAMR,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,IAAA,MAAM8C,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,IAAA,IAAI,CAACE,OAAAA,EAAS;AACV,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,eAAAA,CAAAA,EAA8B;AAAErC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OAAO,CAAA;AACtG,IAAA;AACA,IAAA,IAAI,CAACnB,YAAAA,CAAa0D,OAAAA,CAAAA,EAAU;AACxB,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,wCAAAA,CAAAA,EAAuD;AACjGrC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OACjB,CAAA;AACJ,IAAA;AACA,IAAA,IAAIuC,SAAStD,WAAAA,EAAa;AACtB,MAAA,MAAMwD,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,MAAA,MAAM4F,OAAAA,GAAU5C,WAAAA,CAAYF,OAAAA,CAAQtD,WAAW,CAAA;AAC/C,MAAA,MAAMqG,WAAAA,GAAc,CAAA,2BAAA,EAA8BjD,WAAAA,CAAAA,iBAAAA,EAA+BE,QAAQtD,WAAW,CAAA,CAAA;AACpG,MAAA,IAAIO,SAAAA,IAAaA,SAAAA,KAAc6F,OAAAA,CAAQnG,UAAAA,EAAY;AAC/C,QAAA,MAAM,IAAI+E,qCAAAA,CAAyB,CAAA,sBAAA,CAAA,GAA2BqB,WAAAA,EAAa;UACvEnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACA,MAAA,IAAI0D,WAAAA,IAAeA,WAAAA,KAAgB2B,OAAAA,CAAQtG,aAAAA,EAAe;AACtD,QAAA,MAAM,IAAIkF,qCAAAA,CAAyB,CAAA,yBAAA,CAAA,GAA8BqB,WAAAA,EAAa;UAC1EnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACAuC,MAAAA,OAAAA,CAAQrD,aAAamG,OAAAA,CAAQnG,UAAAA;AAC7BqD,MAAAA,OAAAA,CAAQxD,gBAAgBsG,OAAAA,CAAQtG,aAAAA;AACpC,IAAA;AACA,IAAA,MAAM,EAAEA,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,aAAAA,EAAeF,aAAW,GAAKgG,kBAAAA,CAAmB1C,OAAAA,EAAS9C,IAAAA,CAAKO,MAAM,CAAA;AACzH,IAAA,OAAOyD,qBAAAA,CAAsB;MACzBC,WAAAA,EAAa3E,aAAAA;MACb4D,UAAAA,EAAY1D,WAAAA;MACZ0E,YAAAA,EAAc3E,cAAAA;MACdQ,SAAAA,EAAWN,UAAAA;MACX0E,WAAAA,EAAazE,aAAAA;AACb0E,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA,CAAA,MAAA,IACS,CAACqB,WAAAA,IAAe,CAACC,gBAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,EAAa;AAClE,IAAA,MAAM,IAAIK,sCAAyB,8HAAA,EAC8B;MAAEE,WAAAA,EAAa,KAAA;AAAOnE,MAAAA,MAAAA,EAAQP,IAAAA,CAAKO;KAAO,CAAA;EAC/G,CAAA,MACK;AACD,IAAA,OAAOyD,qBAAAA,CAAsB;AACzBC,MAAAA,WAAAA;AACAf,MAAAA,UAAAA;AACAgB,MAAAA,YAAAA;AACAnE,MAAAA,SAAAA;AACAoE,MAAAA,WAAAA;AACAC,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA;AACJ,CAAA,EAnEuB,SAAA;;;AWLvBzD,2BAAA,EAAA","file":"MQTCD42Y.cjs","sourcesContent":["export * from \"./fromSSO\";\nexport * from \"./isSsoProfile\";\nexport * from \"./types\";\nexport * from \"./validateSsoProfile\";\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, loadSsoSessionData, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { isSsoProfile } from \"./isSsoProfile\";\nimport { resolveSSOCredentials } from \"./resolveSSOCredentials\";\nimport { validateSsoProfile } from \"./validateSsoProfile\";\nexport const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-sso - fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n const { ssoClient } = init;\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n const profiles = await parseKnownFiles(init);\n const profile = profiles[profileName];\n if (!profile) {\n throw new CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });\n }\n if (!isSsoProfile(profile)) {\n throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {\n logger: init.logger,\n });\n }\n if (profile?.sso_session) {\n const ssoSessions = await loadSsoSessionData(init);\n const session = ssoSessions[profile.sso_session];\n const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;\n if (ssoRegion && ssoRegion !== session.sso_region) {\n throw new CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {\n throw new CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n profile.sso_region = session.sso_region;\n profile.sso_start_url = session.sso_start_url;\n }\n const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);\n return resolveSSOCredentials({\n ssoStartUrl: sso_start_url,\n ssoSession: sso_session,\n ssoAccountId: sso_account_id,\n ssoRegion: sso_region,\n ssoRoleName: sso_role_name,\n ssoClient: ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n throw new CredentialsProviderError(\"Incomplete configuration. The fromSSO() argument hash must include \" +\n '\"ssoStartUrl\", \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"', { tryNextLink: false, logger: init.logger });\n }\n else {\n return resolveSSOCredentials({\n ssoStartUrl,\n ssoSession,\n ssoAccountId,\n ssoRegion,\n ssoRoleName,\n ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n};\n","export const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { fromSso as getSsoTokenProvider } from \"@aws-sdk/token-providers\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getSSOTokenFromFile } from \"@smithy/shared-ini-file-loader\";\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\nexport const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }) => {\n let token;\n const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;\n if (ssoSession) {\n try {\n const _token = await getSsoTokenProvider({ profile })();\n token = {\n accessToken: _token.token,\n expiresAt: new Date(_token.expiration).toISOString(),\n };\n }\n catch (e) {\n throw new CredentialsProviderError(e.message, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n else {\n try {\n token = await getSSOTokenFromFile(ssoStartUrl);\n }\n catch (e) {\n throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {\n throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { accessToken } = token;\n const { SSOClient, GetRoleCredentialsCommand } = await import(\"./loadSso\");\n const sso = ssoClient ||\n new SSOClient(Object.assign({}, clientConfig ?? {}, {\n logger: clientConfig?.logger ?? parentClientConfig?.logger,\n region: clientConfig?.region ?? ssoRegion,\n }));\n let ssoResp;\n try {\n ssoResp = await sso.send(new GetRoleCredentialsCommand({\n accountId: ssoAccountId,\n roleName: ssoRoleName,\n accessToken,\n }));\n }\n catch (e) {\n throw new CredentialsProviderError(e, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;\n if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const credentials = {\n accessKeyId,\n secretAccessKey,\n sessionToken,\n expiration: new Date(expiration),\n ...(credentialScope && { credentialScope }),\n ...(accountId && { accountId }),\n };\n if (ssoSession) {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO\", \"s\");\n }\n else {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO_LEGACY\", \"u\");\n }\n return credentials;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, getSSOTokenFromFile, loadSsoSessionData, parseKnownFiles, } from \"@smithy/shared-ini-file-loader\";\nimport { EXPIRE_WINDOW_MS, REFRESH_MESSAGE } from \"./constants\";\nimport { getNewSsoOidcToken } from \"./getNewSsoOidcToken\";\nimport { validateTokenExpiry } from \"./validateTokenExpiry\";\nimport { validateTokenKey } from \"./validateTokenKey\";\nimport { writeSSOTokenToFile } from \"./writeSSOTokenToFile\";\nconst lastRefreshAttemptTime = new Date(0);\nexport const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/token-providers - fromSso\");\n const profiles = await parseKnownFiles(init);\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n const profile = profiles[profileName];\n if (!profile) {\n throw new TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);\n }\n else if (!profile[\"sso_session\"]) {\n throw new TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);\n }\n const ssoSessionName = profile[\"sso_session\"];\n const ssoSessions = await loadSsoSessionData(init);\n const ssoSession = ssoSessions[ssoSessionName];\n if (!ssoSession) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);\n }\n for (const ssoSessionRequiredKey of [\"sso_start_url\", \"sso_region\"]) {\n if (!ssoSession[ssoSessionRequiredKey]) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);\n }\n }\n const ssoStartUrl = ssoSession[\"sso_start_url\"];\n const ssoRegion = ssoSession[\"sso_region\"];\n let ssoToken;\n try {\n ssoToken = await getSSOTokenFromFile(ssoSessionName);\n }\n catch (e) {\n throw new TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`, false);\n }\n validateTokenKey(\"accessToken\", ssoToken.accessToken);\n validateTokenKey(\"expiresAt\", ssoToken.expiresAt);\n const { accessToken, expiresAt } = ssoToken;\n const existingToken = { token: accessToken, expiration: new Date(expiresAt) };\n if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {\n return existingToken;\n }\n if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1000) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n validateTokenKey(\"clientId\", ssoToken.clientId, true);\n validateTokenKey(\"clientSecret\", ssoToken.clientSecret, true);\n validateTokenKey(\"refreshToken\", ssoToken.refreshToken, true);\n try {\n lastRefreshAttemptTime.setTime(Date.now());\n const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);\n validateTokenKey(\"accessToken\", newSsoOidcToken.accessToken);\n validateTokenKey(\"expiresIn\", newSsoOidcToken.expiresIn);\n const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);\n try {\n await writeSSOTokenToFile(ssoSessionName, {\n ...ssoToken,\n accessToken: newSsoOidcToken.accessToken,\n expiresAt: newTokenExpiration.toISOString(),\n refreshToken: newSsoOidcToken.refreshToken,\n });\n }\n catch (error) {\n }\n return {\n token: newSsoOidcToken.accessToken,\n expiration: newTokenExpiration,\n };\n }\n catch (error) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n};\n","export const EXPIRE_WINDOW_MS = 5 * 60 * 1000;\nexport const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;\n","import { getSsoOidcClient } from \"./getSsoOidcClient\";\nexport const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {\n const { CreateTokenCommand } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);\n return ssoOidcClient.send(new CreateTokenCommand({\n clientId: ssoToken.clientId,\n clientSecret: ssoToken.clientSecret,\n refreshToken: ssoToken.refreshToken,\n grantType: \"refresh_token\",\n }));\n};\n","export const getSsoOidcClient = async (ssoRegion, init = {}) => {\n const { SSOOIDCClient } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {\n region: ssoRegion ?? init.clientConfig?.region,\n logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger,\n }));\n return ssoOidcClient;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenExpiry = (token) => {\n if (token.expiration && token.expiration.getTime() < Date.now()) {\n throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenKey = (key, value, forRefresh = false) => {\n if (typeof value === \"undefined\") {\n throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? \". Cannot refresh\" : \"\"}. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { getSSOTokenFilepath } from \"@smithy/shared-ini-file-loader\";\nimport { promises as fsPromises } from \"fs\";\nconst { writeFile } = fsPromises;\nexport const writeSSOTokenToFile = (id, ssoToken) => {\n const tokenFilepath = getSSOTokenFilepath(id);\n const tokenString = JSON.stringify(ssoToken, null, 2);\n return writeFile(tokenFilepath, tokenString);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nexport const validateSsoProfile = (profile, logger) => {\n const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", ` +\n `\"sso_region\", \"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\", \")}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });\n }\n return profile;\n};\n","export {};\n"]}
@@ -0,0 +1,29 @@
1
+ import { SuiWrapper } from './OLQR7R3W.js';
2
+ import { suiDefaultVolumes } from './H7LPHZJT.js';
3
+ import { init_esm_shims } from './4RNWLMHM.js';
4
+
5
+ // src/commands/sui.ts
6
+ init_esm_shims();
7
+ var configScript = `
8
+ mkdir -p /root/.sui/sui_config
9
+ if [ ! -f /root/.sui/sui_config/client.yaml ]; then
10
+ cat > /root/.sui/sui_config/client.yaml <<'YAML'
11
+ ---
12
+ keystore:
13
+ File: /root/.sui/sui_config/sui.keystore
14
+ envs:
15
+ - alias: testnet
16
+ rpc: "https://fullnode.testnet.sui.io:443"
17
+ ws: ~
18
+ basic_auth: ~
19
+ active_env: testnet
20
+ active_address: ~
21
+ YAML
22
+ echo "[]" > /root/.sui/sui_config/sui.keystore
23
+ fi
24
+ `;
25
+ var suiWrapper = new SuiWrapper("sui", configScript, suiDefaultVolumes);
26
+
27
+ export { suiWrapper };
28
+ //# sourceMappingURL=N67IGBHN.js.map
29
+ //# sourceMappingURL=N67IGBHN.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/commands/sui.ts"],"names":["configScript","suiWrapper","SuiWrapper","suiDefaultVolumes"],"mappings":";;;;;AAAA,cAAA,EAAA;AAMA,IAAMA,YAAAA,GAAe;;;;;;;;;;;;;;;;;;AAmBd,IAAMC,UAAAA,GAAa,IAAIC,UAAAA,CAAW,KAAA,EAAOF,cAAcG,iBAAAA","file":"N67IGBHN.js","sourcesContent":["import { suiDefaultVolumes } from '../config/tools';\nimport { SuiWrapper } from './utility/sui-like';\n\n// Initialize Sui client configuration if it doesn't exist in the Docker volume.\n// This prevents interactive prompts on fresh machines.\n// Uses testnet for network operations like --dump-bytecode-as-base64.\nconst configScript = `\nmkdir -p /root/.sui/sui_config\nif [ ! -f /root/.sui/sui_config/client.yaml ]; then\n cat > /root/.sui/sui_config/client.yaml <<'YAML'\n---\nkeystore:\n File: /root/.sui/sui_config/sui.keystore\nenvs:\n - alias: testnet\n rpc: \"https://fullnode.testnet.sui.io:443\"\n ws: ~\n basic_auth: ~\nactive_env: testnet\nactive_address: ~\nYAML\n echo \"[]\" > /root/.sui/sui_config/sui.keystore\nfi\n`;\n\nexport const suiWrapper = new SuiWrapper('sui', configScript, suiDefaultVolumes);\n"]}
@@ -0,0 +1,17 @@
1
+ 'use strict';
2
+
3
+ var EYP6JZRD_cjs = require('./EYP6JZRD.cjs');
4
+ var FOFSZBOK_cjs = require('./FOFSZBOK.cjs');
5
+ var U7VZULNU_cjs = require('./U7VZULNU.cjs');
6
+
7
+ // src/commands/iota.ts
8
+ U7VZULNU_cjs.init_cjs_shims();
9
+ var configScript = `
10
+ echo "Initializing IOTA client configuration..."
11
+ iota keytool import "test test test test test test test test test test test junk" ed25519
12
+ `;
13
+ var iotaWrapper = new EYP6JZRD_cjs.SuiWrapper("iota", configScript, FOFSZBOK_cjs.iotaDefaultVolumes);
14
+
15
+ exports.iotaWrapper = iotaWrapper;
16
+ //# sourceMappingURL=O2C74Z3Q.cjs.map
17
+ //# sourceMappingURL=O2C74Z3Q.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/commands/iota.ts"],"names":["init_cjs_shims","configScript","iotaWrapper","SuiWrapper","iotaDefaultVolumes"],"mappings":";;;;;;;AAAAA,2BAAA,EAAA;AAMA,IAAMC,YAAAA,GAAe;;;;AAKd,IAAMC,WAAAA,GAAc,IAAIC,uBAAAA,CAAW,MAAA,EAAQF,cAAcG,+BAAAA","file":"O2C74Z3Q.cjs","sourcesContent":["import { iotaDefaultVolumes } from '../config/tools';\nimport { SuiWrapper } from './utility/sui-like';\n\n// Initialize IOTA client configuration if it doesn't exist in the Docker volume.\n// This prevents interactive prompts on fresh machines.\n// Uses testnet for network operations like --dump-bytecode-as-base64.\nconst configScript = `\necho \"Initializing IOTA client configuration...\"\niota keytool import \"test test test test test test test test test test test junk\" ed25519\n`;\n\nexport const iotaWrapper = new SuiWrapper('iota', configScript, iotaDefaultVolumes);\n"]}