@layerzerolabs/vm-tooling 0.0.66 → 0.0.73

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (310) hide show
  1. package/dist/{JEOLJJ6F.js → 35BIBLTE.js} +5 -5
  2. package/dist/{JEOLJJ6F.js.map → 35BIBLTE.js.map} +1 -1
  3. package/dist/36UU6CJU.cjs +57 -0
  4. package/dist/36UU6CJU.cjs.map +1 -0
  5. package/dist/{JZHAF3IW.js → 3YHRHIKS.js} +8 -11
  6. package/dist/3YHRHIKS.js.map +1 -0
  7. package/dist/{EPPFFBGP.cjs → 4CTWHZA4.cjs} +3 -3
  8. package/dist/{EPPFFBGP.cjs.map → 4CTWHZA4.cjs.map} +1 -1
  9. package/dist/55HL3CFD.js +50 -0
  10. package/dist/55HL3CFD.js.map +1 -0
  11. package/dist/{DEL75SYN.cjs → 6MCEHW2U.cjs} +49 -49
  12. package/dist/{DEL75SYN.cjs.map → 6MCEHW2U.cjs.map} +1 -1
  13. package/dist/{TQMUPD75.cjs → 6NIOUVPA.cjs} +25 -4
  14. package/dist/6NIOUVPA.cjs.map +1 -0
  15. package/dist/{GBR35MZ7.js → 6OU7NCZK.js} +6 -6
  16. package/dist/{GBR35MZ7.js.map → 6OU7NCZK.js.map} +1 -1
  17. package/dist/{OAO7CCJW.js → 6QZPR4XG.js} +2 -2
  18. package/dist/6QZPR4XG.js.map +1 -0
  19. package/dist/6YTOLRHQ.js +6 -0
  20. package/dist/6YTOLRHQ.js.map +1 -0
  21. package/dist/{UN57VWAW.cjs → 7ZH64OYR.cjs} +4 -4
  22. package/dist/{UN57VWAW.cjs.map → 7ZH64OYR.cjs.map} +1 -1
  23. package/dist/ACDTMA6Q.cjs +72 -0
  24. package/dist/ACDTMA6Q.cjs.map +1 -0
  25. package/dist/{BNMJ5QME.cjs → ASYXJJD4.cjs} +49 -49
  26. package/dist/{BNMJ5QME.cjs.map → ASYXJJD4.cjs.map} +1 -1
  27. package/dist/{MMIV5S36.js → BTXB2LKA.js} +14 -8
  28. package/dist/BTXB2LKA.js.map +1 -0
  29. package/dist/{KTAMTSBK.cjs → BVXMXRYL.cjs} +7 -7
  30. package/dist/{KTAMTSBK.cjs.map → BVXMXRYL.cjs.map} +1 -1
  31. package/dist/D3JHHTB6.js +152 -0
  32. package/dist/D3JHHTB6.js.map +1 -0
  33. package/dist/{DPCW4JIV.cjs → DB5GRF5K.cjs} +14 -8
  34. package/dist/DB5GRF5K.cjs.map +1 -0
  35. package/dist/{QMXX45TO.js → EDWLY6YP.js} +3 -3
  36. package/dist/{QMXX45TO.js.map → EDWLY6YP.js.map} +1 -1
  37. package/dist/EYP6JZRD.cjs +86 -0
  38. package/dist/EYP6JZRD.cjs.map +1 -0
  39. package/dist/F35TPZS3.js +121 -0
  40. package/dist/F35TPZS3.js.map +1 -0
  41. package/dist/{3PEVFTZ5.js → FL2DFW3Y.js} +5 -4
  42. package/dist/FL2DFW3Y.js.map +1 -0
  43. package/dist/{GERMNIDG.cjs → FOFSZBOK.cjs} +87 -107
  44. package/dist/FOFSZBOK.cjs.map +1 -0
  45. package/dist/FQUILSS5.js +52 -0
  46. package/dist/FQUILSS5.js.map +1 -0
  47. package/dist/FUT2FDDD.cjs +48 -0
  48. package/dist/FUT2FDDD.cjs.map +1 -0
  49. package/dist/GIS4KMDM.js +6 -0
  50. package/dist/GIS4KMDM.js.map +1 -0
  51. package/dist/{BOOCAPHW.js → GLJJOBCM.js} +6 -6
  52. package/dist/{BOOCAPHW.js.map → GLJJOBCM.js.map} +1 -1
  53. package/dist/{22KWM667.cjs → GSWL56ZH.cjs} +36 -72
  54. package/dist/GSWL56ZH.cjs.map +1 -0
  55. package/dist/{6YQKZHZ5.js → H7LPHZJT.js} +86 -103
  56. package/dist/H7LPHZJT.js.map +1 -0
  57. package/dist/IDMMHZJ3.cjs +8 -0
  58. package/dist/IDMMHZJ3.cjs.map +1 -0
  59. package/dist/{QPWLW7SN.js → II7QHMLF.js} +31 -66
  60. package/dist/II7QHMLF.js.map +1 -0
  61. package/dist/KSZMBVFB.cjs +154 -0
  62. package/dist/KSZMBVFB.cjs.map +1 -0
  63. package/dist/{HVBHNWI7.js → LF6BYBZY.js} +3 -3
  64. package/dist/{HVBHNWI7.js.map → LF6BYBZY.js.map} +1 -1
  65. package/dist/{OZNFYXME.cjs → LH4V3GFX.cjs} +3 -3
  66. package/dist/{OZNFYXME.cjs.map → LH4V3GFX.cjs.map} +1 -1
  67. package/dist/LNCARCBD.cjs +48 -0
  68. package/dist/LNCARCBD.cjs.map +1 -0
  69. package/dist/M6KBN6B2.cjs +21 -0
  70. package/dist/M6KBN6B2.cjs.map +1 -0
  71. package/dist/{4QL6ZBHT.cjs → MQTCD42Y.cjs} +6 -6
  72. package/dist/{4QL6ZBHT.cjs.map → MQTCD42Y.cjs.map} +1 -1
  73. package/dist/N67IGBHN.js +29 -0
  74. package/dist/N67IGBHN.js.map +1 -0
  75. package/dist/O2C74Z3Q.cjs +17 -0
  76. package/dist/O2C74Z3Q.cjs.map +1 -0
  77. package/dist/{Y3REZYJA.js → OANFSFAO.js} +7 -7
  78. package/dist/{Y3REZYJA.js.map → OANFSFAO.js.map} +1 -1
  79. package/dist/OLQR7R3W.js +84 -0
  80. package/dist/OLQR7R3W.js.map +1 -0
  81. package/dist/ORWR6LWW.js +26 -0
  82. package/dist/ORWR6LWW.js.map +1 -0
  83. package/dist/OUJ5TG6W.js +26 -0
  84. package/dist/OUJ5TG6W.js.map +1 -0
  85. package/dist/{Q3ORCLJH.cjs → PUL6NSHI.cjs} +46 -53
  86. package/dist/PUL6NSHI.cjs.map +1 -0
  87. package/dist/{W5XVOHRB.js → S37YVMJL.js} +6 -6
  88. package/dist/{W5XVOHRB.js.map → S37YVMJL.js.map} +1 -1
  89. package/dist/S3PHE6F2.cjs +8 -0
  90. package/dist/S3PHE6F2.cjs.map +1 -0
  91. package/dist/{Y5ZXTD76.cjs → SHJCZ6NL.cjs} +49 -49
  92. package/dist/{Y5ZXTD76.cjs.map → SHJCZ6NL.cjs.map} +1 -1
  93. package/dist/{FAOU2ZJO.js → TXDLSUBD.js} +4 -4
  94. package/dist/{FAOU2ZJO.js.map → TXDLSUBD.js.map} +1 -1
  95. package/dist/VPKYL66J.cjs +18270 -0
  96. package/dist/VPKYL66J.cjs.map +1 -0
  97. package/dist/{CMSYZVLH.js → WDAYI6EQ.js} +3 -3
  98. package/dist/{CMSYZVLH.js.map → WDAYI6EQ.js.map} +1 -1
  99. package/dist/XCMLC6HI.js +18267 -0
  100. package/dist/XCMLC6HI.js.map +1 -0
  101. package/dist/XYT4PCRV.cjs +31 -0
  102. package/dist/XYT4PCRV.cjs.map +1 -0
  103. package/dist/Y27GTZ2Q.js +19 -0
  104. package/dist/Y27GTZ2Q.js.map +1 -0
  105. package/dist/YLHOHCRW.js +15 -0
  106. package/dist/YLHOHCRW.js.map +1 -0
  107. package/dist/{GSHFVQRI.cjs → Z253B63X.cjs} +2 -2
  108. package/dist/Z253B63X.cjs.map +1 -0
  109. package/dist/{ER722VGO.cjs → ZD3LAY33.cjs} +17 -20
  110. package/dist/ZD3LAY33.cjs.map +1 -0
  111. package/dist/{37UR3RSN.cjs → ZQFCLTYU.cjs} +4 -4
  112. package/dist/{37UR3RSN.cjs.map → ZQFCLTYU.cjs.map} +1 -1
  113. package/dist/commands/aptos.cjs +22 -0
  114. package/dist/commands/aptos.cjs.map +1 -0
  115. package/dist/commands/aptos.d.ts +3 -0
  116. package/dist/commands/aptos.d.ts.map +1 -0
  117. package/dist/commands/aptos.js +13 -0
  118. package/dist/commands/aptos.js.map +1 -0
  119. package/dist/commands/iota.cjs +23 -0
  120. package/dist/commands/iota.cjs.map +1 -0
  121. package/dist/commands/iota.d.ts +3 -0
  122. package/dist/commands/iota.d.ts.map +1 -0
  123. package/dist/commands/iota.js +14 -0
  124. package/dist/commands/iota.js.map +1 -0
  125. package/dist/commands/starknet.cjs +13 -0
  126. package/dist/commands/starknet.cjs.map +1 -0
  127. package/dist/commands/{starknet/build-typescript-sdk.d.ts → starknet.d.ts} +1 -1
  128. package/dist/commands/starknet.d.ts.map +1 -0
  129. package/dist/commands/starknet.js +4 -0
  130. package/dist/commands/starknet.js.map +1 -0
  131. package/dist/commands/sui.cjs +23 -0
  132. package/dist/commands/sui.cjs.map +1 -0
  133. package/dist/commands/sui.d.ts +3 -0
  134. package/dist/commands/sui.d.ts.map +1 -0
  135. package/dist/commands/sui.js +14 -0
  136. package/dist/commands/sui.js.map +1 -0
  137. package/dist/commands/utility/sui-like.cjs +22 -0
  138. package/dist/commands/utility/sui-like.cjs.map +1 -0
  139. package/dist/commands/utility/sui-like.d.ts +16 -0
  140. package/dist/commands/utility/sui-like.d.ts.map +1 -0
  141. package/dist/commands/utility/sui-like.js +13 -0
  142. package/dist/commands/utility/sui-like.js.map +1 -0
  143. package/dist/config/docker-images.cjs +13 -0
  144. package/dist/config/docker-images.cjs.map +1 -0
  145. package/dist/config/docker-images.d.ts +145 -0
  146. package/dist/config/docker-images.d.ts.map +1 -0
  147. package/dist/config/docker-images.js +4 -0
  148. package/dist/config/docker-images.js.map +1 -0
  149. package/dist/config/docker-images.test.cjs +21 -0
  150. package/dist/config/docker-images.test.cjs.map +1 -0
  151. package/dist/config/docker-images.test.js +19 -0
  152. package/dist/config/docker-images.test.js.map +1 -0
  153. package/dist/config/index.cjs +21 -8
  154. package/dist/config/index.d.ts +3 -2
  155. package/dist/config/index.d.ts.map +1 -1
  156. package/dist/config/index.js +3 -2
  157. package/dist/config/tools.cjs +9 -4
  158. package/dist/config/tools.d.ts +1 -0
  159. package/dist/config/tools.d.ts.map +1 -1
  160. package/dist/config/tools.js +3 -2
  161. package/dist/config/version-matrices.cjs +2 -2
  162. package/dist/config/version-matrices.d.ts +8 -1
  163. package/dist/config/version-matrices.d.ts.map +1 -1
  164. package/dist/config/version-matrices.js +1 -1
  165. package/dist/core/index.cjs +10 -21
  166. package/dist/core/index.d.ts +2 -3
  167. package/dist/core/index.d.ts.map +1 -1
  168. package/dist/core/index.js +8 -7
  169. package/dist/core/lock.cjs +4 -4
  170. package/dist/core/lock.d.ts.map +1 -1
  171. package/dist/core/lock.js +1 -1
  172. package/dist/core/lock.test.cjs +11 -18274
  173. package/dist/core/lock.test.cjs.map +1 -1
  174. package/dist/core/lock.test.js +3 -18266
  175. package/dist/core/lock.test.js.map +1 -1
  176. package/dist/core/tool-executor.cjs +8 -7
  177. package/dist/core/tool-executor.d.ts +3 -2
  178. package/dist/core/tool-executor.d.ts.map +1 -1
  179. package/dist/core/tool-executor.js +7 -6
  180. package/dist/core/version-resolver.cjs +5 -13
  181. package/dist/core/version-resolver.d.ts +1 -24
  182. package/dist/core/version-resolver.d.ts.map +1 -1
  183. package/dist/core/version-resolver.js +4 -4
  184. package/dist/display/formatters.cjs +5 -4
  185. package/dist/display/formatters.d.ts +1 -1
  186. package/dist/display/formatters.d.ts.map +1 -1
  187. package/dist/display/formatters.js +4 -3
  188. package/dist/display/index.cjs +8 -7
  189. package/dist/display/index.js +5 -4
  190. package/dist/display/version-display.cjs +7 -6
  191. package/dist/display/version-display.d.ts.map +1 -1
  192. package/dist/display/version-display.js +5 -4
  193. package/dist/index.cjs +84 -56
  194. package/dist/index.cjs.map +1 -1
  195. package/dist/index.d.ts.map +1 -1
  196. package/dist/index.js +77 -49
  197. package/dist/index.js.map +1 -1
  198. package/dist/scripts/generate-github-matrix.cjs +73 -67
  199. package/dist/scripts/generate-github-matrix.cjs.map +1 -1
  200. package/dist/scripts/generate-github-matrix.js +30 -24
  201. package/dist/scripts/generate-github-matrix.js.map +1 -1
  202. package/dist/types/docker.cjs +8 -3
  203. package/dist/types/docker.cjs.map +1 -1
  204. package/dist/types/docker.d.ts +32 -15
  205. package/dist/types/docker.d.ts.map +1 -1
  206. package/dist/types/docker.js +2 -4
  207. package/dist/types/docker.js.map +1 -1
  208. package/dist/types/index.cjs +10 -3
  209. package/dist/types/index.cjs.map +1 -1
  210. package/dist/types/index.d.ts +2 -3
  211. package/dist/types/index.d.ts.map +1 -1
  212. package/dist/types/index.js +4 -4
  213. package/dist/types/index.js.map +1 -1
  214. package/dist/types/tool.cjs +2 -3
  215. package/dist/types/tool.cjs.map +1 -1
  216. package/dist/types/tool.d.ts +3 -7
  217. package/dist/types/tool.d.ts.map +1 -1
  218. package/dist/types/tool.js +2 -4
  219. package/dist/types/tool.js.map +1 -1
  220. package/dist/utils/docker.cjs +15 -5
  221. package/dist/utils/docker.d.ts +6 -3
  222. package/dist/utils/docker.d.ts.map +1 -1
  223. package/dist/utils/docker.js +4 -2
  224. package/dist/utils/finder.cjs +15 -18
  225. package/dist/utils/finder.d.ts +5 -5
  226. package/dist/utils/finder.d.ts.map +1 -1
  227. package/dist/utils/finder.js +3 -2
  228. package/dist/utils/version.cjs +7 -6
  229. package/dist/utils/version.d.ts +3 -4
  230. package/dist/utils/version.d.ts.map +1 -1
  231. package/dist/utils/version.js +3 -2
  232. package/dist/utils.cjs +5 -8
  233. package/dist/utils.d.ts +1 -4
  234. package/dist/utils.d.ts.map +1 -1
  235. package/dist/utils.js +3 -2
  236. package/package.json +5 -6
  237. package/dist/22KWM667.cjs.map +0 -1
  238. package/dist/3H446V2K.js +0 -6
  239. package/dist/3H446V2K.js.map +0 -1
  240. package/dist/3PEVFTZ5.js.map +0 -1
  241. package/dist/6YQKZHZ5.js.map +0 -1
  242. package/dist/7PSRMQMS.cjs +0 -51
  243. package/dist/7PSRMQMS.cjs.map +0 -1
  244. package/dist/BG3MG6IF.cjs +0 -127
  245. package/dist/BG3MG6IF.cjs.map +0 -1
  246. package/dist/DN5VBC3L.js +0 -128
  247. package/dist/DN5VBC3L.js.map +0 -1
  248. package/dist/DPCW4JIV.cjs.map +0 -1
  249. package/dist/ER722VGO.cjs.map +0 -1
  250. package/dist/FKPK53TD.cjs +0 -8
  251. package/dist/FKPK53TD.cjs.map +0 -1
  252. package/dist/GERMNIDG.cjs.map +0 -1
  253. package/dist/GSHFVQRI.cjs.map +0 -1
  254. package/dist/JZHAF3IW.js.map +0 -1
  255. package/dist/KFXJIHI6.js +0 -20
  256. package/dist/KFXJIHI6.js.map +0 -1
  257. package/dist/KPYTMXHJ.cjs +0 -22
  258. package/dist/KPYTMXHJ.cjs.map +0 -1
  259. package/dist/M4PGJV5D.js +0 -6
  260. package/dist/M4PGJV5D.js.map +0 -1
  261. package/dist/MMIV5S36.js.map +0 -1
  262. package/dist/OAO7CCJW.js.map +0 -1
  263. package/dist/PWDCAN6N.js +0 -37
  264. package/dist/PWDCAN6N.js.map +0 -1
  265. package/dist/Q3ORCLJH.cjs.map +0 -1
  266. package/dist/QPWLW7SN.js.map +0 -1
  267. package/dist/QYB5VPZE.cjs +0 -39
  268. package/dist/QYB5VPZE.cjs.map +0 -1
  269. package/dist/R2U2WXP4.js +0 -49
  270. package/dist/R2U2WXP4.js.map +0 -1
  271. package/dist/TQMUPD75.cjs.map +0 -1
  272. package/dist/XYNAO6GV.js +0 -119
  273. package/dist/XYNAO6GV.js.map +0 -1
  274. package/dist/Y7OWS2C2.cjs +0 -8
  275. package/dist/Y7OWS2C2.cjs.map +0 -1
  276. package/dist/commands/starknet/build-typescript-sdk.cjs +0 -13
  277. package/dist/commands/starknet/build-typescript-sdk.cjs.map +0 -1
  278. package/dist/commands/starknet/build-typescript-sdk.d.ts.map +0 -1
  279. package/dist/commands/starknet/build-typescript-sdk.js +0 -4
  280. package/dist/commands/starknet/build-typescript-sdk.js.map +0 -1
  281. package/dist/commands/starknet/index.cjs +0 -14
  282. package/dist/commands/starknet/index.cjs.map +0 -1
  283. package/dist/commands/starknet/index.d.ts +0 -2
  284. package/dist/commands/starknet/index.d.ts.map +0 -1
  285. package/dist/commands/starknet/index.js +0 -5
  286. package/dist/commands/starknet/index.js.map +0 -1
  287. package/dist/commands/sui/build.cjs +0 -20
  288. package/dist/commands/sui/build.cjs.map +0 -1
  289. package/dist/commands/sui/build.d.ts +0 -3
  290. package/dist/commands/sui/build.d.ts.map +0 -1
  291. package/dist/commands/sui/build.js +0 -11
  292. package/dist/commands/sui/build.js.map +0 -1
  293. package/dist/commands/sui/index.cjs +0 -21
  294. package/dist/commands/sui/index.cjs.map +0 -1
  295. package/dist/commands/sui/index.d.ts +0 -2
  296. package/dist/commands/sui/index.d.ts.map +0 -1
  297. package/dist/commands/sui/index.js +0 -12
  298. package/dist/commands/sui/index.js.map +0 -1
  299. package/dist/core/compatibility.cjs +0 -13
  300. package/dist/core/compatibility.cjs.map +0 -1
  301. package/dist/core/compatibility.d.ts +0 -8
  302. package/dist/core/compatibility.d.ts.map +0 -1
  303. package/dist/core/compatibility.js +0 -4
  304. package/dist/core/compatibility.js.map +0 -1
  305. package/dist/types/version.cjs +0 -8
  306. package/dist/types/version.cjs.map +0 -1
  307. package/dist/types/version.d.ts +0 -25
  308. package/dist/types/version.d.ts.map +0 -1
  309. package/dist/types/version.js +0 -6
  310. package/dist/types/version.js.map +0 -1
@@ -1,5 +1,5 @@
1
- import { parseKnownFiles, getProfileName } from './ELFNCT57.js';
2
1
  import { setCredentialFeature } from './NDUVZQ7S.js';
2
+ import { parseKnownFiles, getProfileName } from './ELFNCT57.js';
3
3
  import './OH4A2VLX.js';
4
4
  import { CredentialsProviderError, chain } from './TTKDG2NN.js';
5
5
  import { init_esm_shims, __name } from './4RNWLMHM.js';
@@ -85,7 +85,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ __name(async (profileName, pr
85
85
  const profileData = profiles[profileName];
86
86
  const { source_profile, region } = profileData;
87
87
  if (!options.roleAssumer) {
88
- const { getDefaultRoleAssumer } = await import('./JEOLJJ6F.js');
88
+ const { getDefaultRoleAssumer } = await import('./35BIBLTE.js');
89
89
  options.roleAssumer = getDefaultRoleAssumer({
90
90
  ...options.clientConfig,
91
91
  credentialProviderLogger: options.logger,
@@ -136,7 +136,7 @@ var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ __name((section) => {
136
136
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
137
137
  init_esm_shims();
138
138
  var isProcessProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
139
- var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile) => import('./QMXX45TO.js').then(({ fromProcess }) => fromProcess({
139
+ var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile) => import('./EDWLY6YP.js').then(({ fromProcess }) => fromProcess({
140
140
  ...options,
141
141
  profile
142
142
  })().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
@@ -144,7 +144,7 @@ var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile)
144
144
  // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
145
145
  init_esm_shims();
146
146
  var resolveSsoCredentials = /* @__PURE__ */ __name(async (profile, profileData, options = {}) => {
147
- const { fromSSO } = await import('./W5XVOHRB.js');
147
+ const { fromSSO } = await import('./S37YVMJL.js');
148
148
  return fromSSO({
149
149
  profile,
150
150
  logger: options.logger,
@@ -191,7 +191,7 @@ var isWebIdentityProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeo
191
191
  "undefined",
192
192
  "string"
193
193
  ].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
194
- var resolveWebIdentityCredentials = /* @__PURE__ */ __name(async (profile, options) => import('./HVBHNWI7.js').then(({ fromTokenFile }) => fromTokenFile({
194
+ var resolveWebIdentityCredentials = /* @__PURE__ */ __name(async (profile, options) => import('./LF6BYBZY.js').then(({ fromTokenFile }) => fromTokenFile({
195
195
  webIdentityTokenFile: profile.web_identity_token_file,
196
196
  roleArn: profile.role_arn,
197
197
  roleSessionName: profile.role_session_name,
@@ -246,5 +246,5 @@ var fromIni = /* @__PURE__ */ __name((_init = {}) => async ({ callerClientConfig
246
246
  }, "fromIni");
247
247
 
248
248
  export { fromIni };
249
- //# sourceMappingURL=Y3REZYJA.js.map
250
- //# sourceMappingURL=Y3REZYJA.js.map
249
+ //# sourceMappingURL=OANFSFAO.js.map
250
+ //# sourceMappingURL=OANFSFAO.js.map
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["resolveCredentialSource","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAEO,IAAMA,uBAAAA,mBAA0B,MAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,gCAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,eAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,KAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,gCAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,gCAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,eAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,wBAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmB,MAAA,CAAA,CAACM,KAAAA,KAAUC,qBAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,2BAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC,MAAA,CAAA,CAACR,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B,MAAA,CAAA,CAACT,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+B,MAAA,CAAA,OAAOjC,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,wBAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,cAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMhC,uBAAAA,CAAwBsC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,qBAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,wBAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,2BAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzC,cAAA,EAAA;AACO,IAAMmC,gBAAAA,mBAAmB,MAAA,CAAA,CAAC/C,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4B,MAAA,CAAA,OAAOhE,OAAAA,EAASgB,OAAAA,KAAY,OAAO,eAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzC,cAAA,EAAA;AACO,IAAMsD,wCAAwB,MAAA,CAAA,OAAOlD,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,eAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,oBAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,oBAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,2BAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5B,cAAA,EAAA;AACO,IAAMC,uCAAuB,MAAA,CAAA,CAAC3D,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2B,MAAA,CAAA,OAAO/D,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,oBAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxC,cAAA,EAAA;AACO,IAAMO,uCAAuB,MAAA,CAAA,CAACxE,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC,MAAA,CAAA,OAAOzE,OAAAA,EAAShB,OAAAA,KAAY,OAAO,eAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,iCAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,wBAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAU,MAAA,CAAA,CAACC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,eAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,cAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"Y3REZYJA.js","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}
1
+ {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["resolveCredentialSource","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAEO,IAAMA,uBAAAA,mBAA0B,MAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,gCAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,eAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,KAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,gCAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,gCAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,eAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,wBAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmB,MAAA,CAAA,CAACM,KAAAA,KAAUC,qBAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,2BAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC,MAAA,CAAA,CAACR,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B,MAAA,CAAA,CAACT,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+B,MAAA,CAAA,OAAOjC,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,wBAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,cAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMhC,uBAAAA,CAAwBsC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,qBAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,wBAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,2BAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzC,cAAA,EAAA;AACO,IAAMmC,gBAAAA,mBAAmB,MAAA,CAAA,CAAC/C,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4B,MAAA,CAAA,OAAOhE,OAAAA,EAASgB,OAAAA,KAAY,OAAO,eAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzC,cAAA,EAAA;AACO,IAAMsD,wCAAwB,MAAA,CAAA,OAAOlD,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,eAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,oBAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,oBAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,2BAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5B,cAAA,EAAA;AACO,IAAMC,uCAAuB,MAAA,CAAA,CAAC3D,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2B,MAAA,CAAA,OAAO/D,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,oBAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxC,cAAA,EAAA;AACO,IAAMO,uCAAuB,MAAA,CAAA,CAACxE,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC,MAAA,CAAA,OAAOzE,OAAAA,EAAShB,OAAAA,KAAY,OAAO,eAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,iCAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,wBAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAU,MAAA,CAAA,CAACC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,eAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,cAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"OANFSFAO.js","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}
@@ -0,0 +1,84 @@
1
+ import { executeToolCommand } from './II7QHMLF.js';
2
+ import { init_esm_shims, __name } from './4RNWLMHM.js';
3
+
4
+ // src/commands/utility/sui-like.ts
5
+ init_esm_shims();
6
+ var permissionFixScripts = [
7
+ "chmod -R 777 build",
8
+ "find build -type f -exec chmod 644 {} +",
9
+ "chmod 644 Move.lock"
10
+ ];
11
+ var SuiWrapper = class {
12
+ static {
13
+ __name(this, "SuiWrapper");
14
+ }
15
+ command;
16
+ configScript;
17
+ defaultVolumes;
18
+ constructor(command, configScript, defaultVolumes) {
19
+ this.command = command;
20
+ this.configScript = configScript;
21
+ this.defaultVolumes = defaultVolumes;
22
+ }
23
+ async run(subcommand, args, options) {
24
+ if (options.volumes.length) {
25
+ throw new Error(`Volume option is not supported by the \`${this.command}\` wrapper`);
26
+ }
27
+ await this.initializeConfig(options);
28
+ await this.downloadDependencies(subcommand, options);
29
+ await executeToolCommand(this.command, [
30
+ "move",
31
+ subcommand,
32
+ "--skip-fetch-latest-git-deps",
33
+ ...args
34
+ ], {
35
+ ...options,
36
+ volumes: this.defaultVolumes
37
+ });
38
+ await this.fixArtifactPermissions(options);
39
+ }
40
+ // Initialize config in the Docker volume if it doesn't exist.
41
+ async initializeConfig(options) {
42
+ await executeToolCommand(this.command, [
43
+ "-c",
44
+ this.configScript
45
+ ], {
46
+ ...options,
47
+ volumes: this.defaultVolumes.map((volume) => ({
48
+ ...volume,
49
+ locked: true
50
+ })),
51
+ customEntrypoint: "/bin/sh"
52
+ });
53
+ }
54
+ // Fetch dependencies into the shared Docker volume with a lock.
55
+ // TODO Fetch dependencies with a read write lock.
56
+ async downloadDependencies(subcommand, options) {
57
+ await executeToolCommand(this.command, [
58
+ "move",
59
+ subcommand,
60
+ "--fetch-deps-only"
61
+ ], {
62
+ ...options,
63
+ volumes: this.defaultVolumes.map((volume) => ({
64
+ ...volume,
65
+ locked: true
66
+ }))
67
+ });
68
+ }
69
+ async fixArtifactPermissions(options) {
70
+ for (const script of permissionFixScripts) {
71
+ await executeToolCommand(this.command, [
72
+ "-c",
73
+ script
74
+ ], {
75
+ ...options,
76
+ customEntrypoint: "/bin/sh"
77
+ });
78
+ }
79
+ }
80
+ };
81
+
82
+ export { SuiWrapper };
83
+ //# sourceMappingURL=OLQR7R3W.js.map
84
+ //# sourceMappingURL=OLQR7R3W.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/commands/utility/sui-like.ts"],"names":["permissionFixScripts","SuiWrapper","command","configScript","defaultVolumes","run","subcommand","args","options","volumes","length","Error","initializeConfig","downloadDependencies","executeToolCommand","fixArtifactPermissions","map","volume","locked","customEntrypoint","script"],"mappings":";;;;AACA,cAAA,EAAA;AAUA,IAAMA,oBAAAA,GAAuB;AACzB,EAAA,oBAAA;AACA,EAAA,yCAAA;AACA,EAAA;;AAGG,IAAMC,aAAN,MAAMA;EAhBb;;;;;;EAiBI,WAAA,CACqBC,OAAAA,EACAC,cACAC,cAAAA,EACnB;SAHmBF,OAAAA,GAAAA,OAAAA;SACAC,YAAAA,GAAAA,YAAAA;SACAC,cAAAA,GAAAA,cAAAA;AAClB,EAAA;EAEH,MAAaC,GAAAA,CACTC,UAAAA,EACAC,IAAAA,EACAC,OAAAA,EACa;AACb,IAAA,IAAIA,OAAAA,CAAQC,QAAQC,MAAAA,EAAQ;AACxB,MAAA,MAAM,IAAIC,KAAAA,CAAM,CAAA,wCAAA,EAA2C,IAAA,CAAKT,OAAO,CAAA,UAAA,CAAY,CAAA;AACvF,IAAA;AAEA,IAAA,MAAM,IAAA,CAAKU,iBAAiBJ,OAAAA,CAAAA;AAC5B,IAAA,MAAM,IAAA,CAAKK,oBAAAA,CAAqBP,UAAAA,EAAYE,OAAAA,CAAAA;AAE5C,IAAA,MAAMM,kBAAAA,CACF,KAAKZ,OAAAA,EACL;AAAC,MAAA,MAAA;AAAQI,MAAAA,UAAAA;AAAY,MAAA,8BAAA;AAAmCC,MAAAA,GAAAA;AACxD,KAAA,EAAA;MACI,GAAGC,OAAAA;AACHC,MAAAA,OAAAA,EAAS,IAAA,CAAKL;KAClB,CAAA;AAGJ,IAAA,MAAM,IAAA,CAAKW,uBAAuBP,OAAAA,CAAAA;AACtC,EAAA;;AAGA,EAAA,MAAcI,iBAAiBJ,OAAAA,EAAqD;AAChF,IAAA,MAAMM,kBAAAA,CAAmB,KAAKZ,OAAAA,EAAS;AAAC,MAAA,IAAA;MAAM,IAAA,CAAKC;AAAe,KAAA,EAAA;MAC9D,GAAGK,OAAAA;AACHC,MAAAA,OAAAA,EAAS,IAAA,CAAKL,cAAAA,CAAeY,GAAAA,CAAI,CAACC,MAAAA,MAAY;QAAE,GAAGA,MAAAA;QAAQC,MAAAA,EAAQ;OAAK,CAAA,CAAA;MACxEC,gBAAAA,EAAkB;KACtB,CAAA;AACJ,EAAA;;;EAIA,MAAcN,oBAAAA,CACVP,YACAE,OAAAA,EACa;AACb,IAAA,MAAMM,kBAAAA,CAAmB,KAAKZ,OAAAA,EAAS;AAAC,MAAA,MAAA;AAAQI,MAAAA,UAAAA;AAAY,MAAA;AAAsB,KAAA,EAAA;MAC9E,GAAGE,OAAAA;AACHC,MAAAA,OAAAA,EAAS,IAAA,CAAKL,cAAAA,CAAeY,GAAAA,CAAI,CAACC,MAAAA,MAAY;QAAE,GAAGA,MAAAA;QAAQC,MAAAA,EAAQ;OAAK,CAAA;KAC5E,CAAA;AACJ,EAAA;AAEA,EAAA,MAAcH,uBAAuBP,OAAAA,EAAqD;AACtF,IAAA,KAAA,MAAWY,UAAUpB,oBAAAA,EAAsB;AACvC,MAAA,MAAMc,kBAAAA,CAAmB,KAAKZ,OAAAA,EAAS;AAAC,QAAA,IAAA;AAAMkB,QAAAA;AAAS,OAAA,EAAA;QACnD,GAAGZ,OAAAA;QACHW,gBAAAA,EAAkB;OACtB,CAAA;AACJ,IAAA;AACJ,EAAA;AACJ","file":"OLQR7R3W.js","sourcesContent":["import type { ToolCommandExecutionOptions } from '../../core';\nimport { executeToolCommand } from '../../core';\nimport type { VolumeMapping } from '../../types';\n\ntype SuiCommand = 'sui' | 'iota';\ntype SuiSubcommand = 'build' | 'test';\n\n// Fix permissions for Turbo cache; make build outputs readable by all.\n// This ensures Turbo can properly cache the build artifacts.\n//\n// Also, Move.lock files can be created with restrictive permissions during build.\nconst permissionFixScripts = [\n 'chmod -R 777 build',\n 'find build -type f -exec chmod 644 {} +',\n 'chmod 644 Move.lock',\n];\n\nexport class SuiWrapper {\n constructor(\n private readonly command: SuiCommand,\n private readonly configScript: string,\n private readonly defaultVolumes: readonly VolumeMapping[],\n ) {}\n\n public async run(\n subcommand: SuiSubcommand,\n args: string[],\n options: ToolCommandExecutionOptions,\n ): Promise<void> {\n if (options.volumes.length) {\n throw new Error(`Volume option is not supported by the \\`${this.command}\\` wrapper`);\n }\n\n await this.initializeConfig(options);\n await this.downloadDependencies(subcommand, options);\n\n await executeToolCommand(\n this.command,\n ['move', subcommand, '--skip-fetch-latest-git-deps', ...args],\n {\n ...options,\n volumes: this.defaultVolumes,\n },\n );\n\n await this.fixArtifactPermissions(options);\n }\n\n // Initialize config in the Docker volume if it doesn't exist.\n private async initializeConfig(options: ToolCommandExecutionOptions): Promise<void> {\n await executeToolCommand(this.command, ['-c', this.configScript], {\n ...options,\n volumes: this.defaultVolumes.map((volume) => ({ ...volume, locked: true })),\n customEntrypoint: '/bin/sh',\n });\n }\n\n // Fetch dependencies into the shared Docker volume with a lock.\n // TODO Fetch dependencies with a read write lock.\n private async downloadDependencies(\n subcommand: SuiSubcommand,\n options: ToolCommandExecutionOptions,\n ): Promise<void> {\n await executeToolCommand(this.command, ['move', subcommand, '--fetch-deps-only'], {\n ...options,\n volumes: this.defaultVolumes.map((volume) => ({ ...volume, locked: true })),\n });\n }\n\n private async fixArtifactPermissions(options: ToolCommandExecutionOptions): Promise<void> {\n for (const script of permissionFixScripts) {\n await executeToolCommand(this.command, ['-c', script], {\n ...options,\n customEntrypoint: '/bin/sh',\n });\n }\n }\n}\n"]}
@@ -0,0 +1,26 @@
1
+ import { init_esm_shims } from './4RNWLMHM.js';
2
+ import * as z from 'zod';
3
+
4
+ // src/types/docker.ts
5
+ init_esm_shims();
6
+ var volumeMappingBaseSchema = z.object({
7
+ containerPath: z.string()
8
+ });
9
+ var hostVolumeMappingSchema = volumeMappingBaseSchema.extend({
10
+ type: z.literal("host"),
11
+ hostPath: z.string()
12
+ });
13
+ var isolateVolumeMappingSchema = volumeMappingBaseSchema.extend({
14
+ type: z.literal("isolate"),
15
+ name: z.string(),
16
+ shared: z.optional(z.boolean()),
17
+ locked: z.optional(z.boolean())
18
+ });
19
+ var volumeMappingSchema = z.union([
20
+ hostVolumeMappingSchema,
21
+ isolateVolumeMappingSchema
22
+ ]);
23
+
24
+ export { volumeMappingSchema };
25
+ //# sourceMappingURL=ORWR6LWW.js.map
26
+ //# sourceMappingURL=ORWR6LWW.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/types/docker.ts"],"names":["volumeMappingBaseSchema","object","containerPath","string","hostVolumeMappingSchema","extend","type","literal","hostPath","isolateVolumeMappingSchema","name","shared","optional","boolean","locked","volumeMappingSchema","union"],"mappings":";;;;AAAA,cAAA,EAAA;AAEA,IAAMA,0BAA4BC,CAAAA,CAAAA,MAAAA,CAAO;AACrCC,EAAAA,aAAAA,EAAiBC,CAAAA,CAAAA,MAAAA;AACrB,CAAA,CAAA;AAEA,IAAMC,uBAAAA,GAA0BJ,wBAAwBK,MAAAA,CAAO;AAC3DC,EAAAA,IAAAA,EAAQC,UAAQ,MAAA,CAAA;AAChBC,EAAAA,QAAAA,EAAYL,CAAAA,CAAAA,MAAAA;AAChB,CAAA,CAAA;AAEA,IAAMM,0BAAAA,GAA6BT,wBAAwBK,MAAAA,CAAO;AAC9DC,EAAAA,IAAAA,EAAQC,UAAQ,SAAA,CAAA;AAChBG,EAAAA,IAAAA,EAAQP,CAAAA,CAAAA,MAAAA,EAAM;EACdQ,MAAAA,EAAUC,CAAAA,CAAAA,QAAAA,CAAWC,WAAO,CAAA;EAC5BC,MAAAA,EAAUF,CAAAA,CAAAA,QAAAA,CAAWC,WAAO;AAChC,CAAA,CAAA;AAEO,IAAME,sBAAwBC,CAAAA,CAAAA,KAAAA,CAAM;AAACZ,EAAAA,uBAAAA;AAAyBK,EAAAA;AAA2B,CAAA","file":"ORWR6LWW.js","sourcesContent":["import * as z from 'zod';\n\nconst volumeMappingBaseSchema = z.object({\n containerPath: z.string(),\n});\n\nconst hostVolumeMappingSchema = volumeMappingBaseSchema.extend({\n type: z.literal('host'),\n hostPath: z.string(),\n});\n\nconst isolateVolumeMappingSchema = volumeMappingBaseSchema.extend({\n type: z.literal('isolate'),\n name: z.string(),\n shared: z.optional(z.boolean()),\n locked: z.optional(z.boolean()),\n});\n\nexport const volumeMappingSchema = z.union([hostVolumeMappingSchema, isolateVolumeMappingSchema]);\n\nexport type VolumeMapping = z.infer<typeof volumeMappingSchema>;\n\n/**\n * Environment variable configuration for Docker containers\n */\nexport interface EnvironmentVariable {\n name: string;\n value: string;\n}\n"]}
@@ -0,0 +1,26 @@
1
+ import { executeToolCommand } from './II7QHMLF.js';
2
+ import { init_esm_shims, __name } from './4RNWLMHM.js';
3
+ import { writeFile } from 'node:fs/promises';
4
+ import { join } from 'node:path';
5
+ import * as z from 'zod';
6
+
7
+ // src/commands/aptos.ts
8
+ init_esm_shims();
9
+ var outputSchema = z.object({
10
+ Result: z.array(z.string())
11
+ });
12
+ var saveModuleOrder = /* @__PURE__ */ __name(async (processOutput, directory) => {
13
+ await writeFile(join(directory, "modules.json"), JSON.stringify(outputSchema.parse(processOutput.json()).Result.map((item) => `${item.split("::")[1]}.mv`), null, 2));
14
+ }, "saveModuleOrder");
15
+ var compile = /* @__PURE__ */ __name(async (args, options) => {
16
+ const output = await executeToolCommand("aptos", [
17
+ "move",
18
+ "compile",
19
+ ...args
20
+ ], options);
21
+ await saveModuleOrder(output, options.cwd);
22
+ }, "compile");
23
+
24
+ export { compile };
25
+ //# sourceMappingURL=OUJ5TG6W.js.map
26
+ //# sourceMappingURL=OUJ5TG6W.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/commands/aptos.ts"],"names":["outputSchema","object","Result","array","string","saveModuleOrder","processOutput","directory","writeFile","join","JSON","stringify","parse","json","map","item","split","compile","args","options","output","executeToolCommand","cwd"],"mappings":";;;;;;;AAAA,cAAA,EAAA;AAOA,IAAMA,eAAiBC,CAAAA,CAAAA,MAAAA,CAAO;EAC1BC,MAAAA,EAAUC,CAAAA,CAAAA,KAAAA,CAAQC,UAAM;AAC5B,CAAA,CAAA;AAEA,IAAMC,eAAAA,mBAAkB,MAAA,CAAA,OAAOC,aAAAA,EAA8BC,SAAAA,KAAAA;AACzD,EAAA,MAAMC,SAAAA,CACFC,IAAAA,CAAKF,SAAAA,EAAW,cAAA,CAAA,EAChBG,IAAAA,CAAKC,SAAAA,CACDX,YAAAA,CACKY,KAAAA,CAAMN,aAAAA,CAAcO,IAAAA,EAAI,CAAA,CACxBX,MAAAA,CAAOY,GAAAA,CAAI,CAACC,IAAAA,KAAS,CAAA,EAAGA,IAAAA,CAAKC,KAAAA,CAAM,IAAA,CAAA,CAAM,CAAA,CAAE,CAAA,GAAA,CAAK,CAAA,EACrD,IAAA,EACA,CAAA,CAAA,CAAA;AAGZ,CAAA,EAXwB,iBAAA,CAAA;AAajB,IAAMC,OAAAA,mBAAU,MAAA,CAAA,OAAOC,IAAAA,EAAgBC,OAAAA,KAAAA;AAC1C,EAAA,MAAMC,MAAAA,GAAS,MAAMC,kBAAAA,CAAmB,OAAA,EAAS;AAAC,IAAA,MAAA;AAAQ,IAAA,SAAA;AAAcH,IAAAA,GAAAA;KAAOC,OAAAA,CAAAA;AAC/E,EAAA,MAAMd,eAAAA,CAAgBe,MAAAA,EAAQD,OAAAA,CAAQG,GAAG,CAAA;AAC7C,CAAA,EAHuB,SAAA","file":"OUJ5TG6W.js","sourcesContent":["import { writeFile } from 'node:fs/promises';\nimport { join } from 'node:path';\nimport * as z from 'zod';\nimport { type ProcessOutput } from 'zx';\n\nimport { executeToolCommand, type ToolCommandExecutionOptions } from '../core';\n\nconst outputSchema = z.object({\n Result: z.array(z.string()),\n});\n\nconst saveModuleOrder = async (processOutput: ProcessOutput, directory: string): Promise<void> => {\n await writeFile(\n join(directory, 'modules.json'),\n JSON.stringify(\n outputSchema\n .parse(processOutput.json())\n .Result.map((item) => `${item.split('::')[1]}.mv`),\n null,\n 2,\n ),\n );\n};\n\nexport const compile = async (args: string[], options: ToolCommandExecutionOptions) => {\n const output = await executeToolCommand('aptos', ['move', 'compile', ...args], options);\n await saveModuleOrder(output, options.cwd);\n};\n"]}
@@ -8,57 +8,51 @@ U7VZULNU_cjs.init_cjs_shims();
8
8
  var versionMatrices = {
9
9
  [layerzeroDefinitions.ChainType.EVM]: [
10
10
  {
11
- versions: {
12
- forge: "1.3.6",
13
- hardhat: "2.26.3"
11
+ images: {
12
+ forge: "evm:forge-1.3.6-hardhat-2.26.3-patch-1",
13
+ hardhat: "evm:forge-1.3.6-hardhat-2.26.3-patch-1"
14
14
  },
15
- patch: 1,
16
15
  stable: true
17
- },
18
- {
19
- // Built in the old `monorepo` repository.
20
- versions: {
21
- hardhat: "2.19.3"
22
- }
23
16
  }
24
17
  ],
25
18
  [layerzeroDefinitions.ChainType.SOLANA]: [
26
19
  {
27
20
  // Built in the old `monorepo` repository.
28
- versions: {
29
- solana: "1.17.31",
30
- anchor: "0.29.0"
21
+ images: {
22
+ solana: "solana:anchor-0.29.0-solana-1.17.31",
23
+ anchor: "solana:anchor-0.29.0-solana-1.17.31"
31
24
  },
32
25
  description: "Stable and well-tested",
33
26
  stable: true
34
27
  },
35
28
  {
36
- versions: {
37
- solana: "2.2.20",
38
- anchor: "0.31.1"
29
+ images: {
30
+ anchor: "solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11",
31
+ solana: "solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11",
32
+ "solana-verify": "solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11"
39
33
  },
40
34
  description: "Latest stable release"
41
35
  }
42
36
  ],
43
37
  [layerzeroDefinitions.ChainType.APTOSMOVE]: [
44
38
  {
45
- versions: {
46
- aptos: "4.7.0",
47
- initiad: "0.6.3",
48
- movement: "3.5.0"
39
+ images: {
40
+ aptos: "aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0",
41
+ initiad: "aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0",
42
+ movement: "aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0"
49
43
  }
50
44
  },
51
45
  {
52
- versions: {
53
- aptos: "4.7.0",
54
- initiad: "0.6.3"
46
+ images: {
47
+ aptos: "aptos:aptos-4.7.0-initiad-0.6.3",
48
+ initiad: "aptos:aptos-4.7.0-initiad-0.6.3"
55
49
  },
56
50
  stable: true
57
51
  },
58
52
  {
59
53
  // Built in the old `monorepo` repository.
60
- versions: {
61
- aptos: "4.6.0"
54
+ images: {
55
+ aptos: "aptos:aptos-4.6.0"
62
56
  }
63
57
  }
64
58
  ],
@@ -68,48 +62,48 @@ var versionMatrices = {
68
62
  // bytecode and initial state even for contracts deployed already.
69
63
  // Therefore, we cannot update the compiler version even when the minor version is the same
70
64
  // since it would change the resulting bytecode and thus the contract address.
71
- versions: {
72
- blueprint: "0.25.0-beta.1"
65
+ images: {
66
+ blueprint: "ton:blueprint-0.25.0-beta.1-patch-2"
73
67
  },
74
- patch: 2,
75
68
  stable: true
76
69
  }
77
70
  ],
78
71
  [layerzeroDefinitions.ChainType.STARKNET]: [
79
72
  {
80
- versions: {
81
- scarb: "2.12.0"
73
+ images: {
74
+ scarb: "starknet:scarb-2.14.0"
82
75
  },
83
- patch: 4
76
+ stable: true
84
77
  },
85
78
  {
86
- versions: {
87
- scarb: "2.12.0"
88
- },
89
- patch: 3,
90
- stable: true
79
+ images: {
80
+ scarb: "starknet:scarb-2.13.1-patch-2"
81
+ }
82
+ },
83
+ {
84
+ images: {
85
+ scarb: "starknet:scarb-2.12.0-patch-4"
86
+ }
91
87
  }
92
88
  ],
93
89
  [layerzeroDefinitions.ChainType.SUIMOVE]: [
94
90
  {
95
- // Built in the old `monorepo` repository.
96
- versions: {
97
- sui: "1.54.1-beta.0"
98
- },
99
- stable: true
91
+ images: {
92
+ sui: "sui:iota-1.9.2-sui-1.54.1",
93
+ iota: "sui:iota-1.9.2-sui-1.54.1"
94
+ }
100
95
  },
101
96
  {
102
- // Test building from monorepo-internal
103
- versions: {
104
- sui: "1.54.1"
97
+ images: {
98
+ sui: "sui:sui-1.54.1-patch-1"
105
99
  },
106
- patch: 1
100
+ stable: true
107
101
  }
108
102
  ],
109
103
  [layerzeroDefinitions.ChainType.STELLAR]: [
110
104
  {
111
- versions: {
112
- stellar: "23.1.4"
105
+ images: {
106
+ stellar: "stellar:stellar-23.1.4"
113
107
  },
114
108
  description: "Latest stable Stellar CLI release",
115
109
  stable: true
@@ -117,14 +111,13 @@ var versionMatrices = {
117
111
  ],
118
112
  [layerzeroDefinitions.ChainType.CANTON]: [
119
113
  {
120
- versions: {
121
- daml: "3.3.0-snapshot.20250507.0"
122
- },
123
- patch: 1
114
+ images: {
115
+ daml: "canton:daml-3.3.0-snapshot.20250507.0-patch-1"
116
+ }
124
117
  }
125
118
  ]
126
119
  };
127
120
 
128
121
  exports.versionMatrices = versionMatrices;
129
- //# sourceMappingURL=Q3ORCLJH.cjs.map
130
- //# sourceMappingURL=Q3ORCLJH.cjs.map
122
+ //# sourceMappingURL=PUL6NSHI.cjs.map
123
+ //# sourceMappingURL=PUL6NSHI.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/config/version-matrices.ts"],"names":["init_cjs_shims","versionMatrices","ChainType","EVM","images","forge","hardhat","stable","SOLANA","solana","anchor","description","APTOSMOVE","aptos","initiad","movement","TON","blueprint","STARKNET","scarb","SUIMOVE","sui","iota","STELLAR","stellar","CANTON","daml"],"mappings":";;;;;;AAAAA,2BAAA,EAAA;AAcO,IAAMC,eAAAA,GAAoF;EAC7F,CAACC,8BAAAA,CAAUC,GAAG,GAAG;AACb,IAAA;MACIC,MAAAA,EAAQ;QACJC,KAAAA,EAAO,wCAAA;QACPC,OAAAA,EAAS;AACb,OAAA;MACAC,MAAAA,EAAQ;AACZ;;EAEJ,CAACL,8BAAAA,CAAUM,MAAM,GAAG;AAChB,IAAA;;MAEIJ,MAAAA,EAAQ;QACJK,MAAAA,EAAQ,qCAAA;QACRC,MAAAA,EAAQ;AACZ,OAAA;MACAC,WAAAA,EAAa,wBAAA;MACbJ,MAAAA,EAAQ;AACZ,KAAA;AACA,IAAA;MACIH,MAAAA,EAAQ;QACJM,MAAAA,EAAQ,yDAAA;QACRD,MAAAA,EAAQ,yDAAA;QACR,eAAA,EAAiB;AACrB,OAAA;MACAE,WAAAA,EAAa;AACjB;;EAEJ,CAACT,8BAAAA,CAAUU,SAAS,GAAG;AACnB,IAAA;MACIR,MAAAA,EAAQ;QACJS,KAAAA,EAAO,gDAAA;QACPC,OAAAA,EAAS,gDAAA;QACTC,QAAAA,EAAU;AACd;AACJ,KAAA;AACA,IAAA;MACIX,MAAAA,EAAQ;QACJS,KAAAA,EAAO,iCAAA;QACPC,OAAAA,EAAS;AACb,OAAA;MACAP,MAAAA,EAAQ;AACZ,KAAA;AACA,IAAA;;MAEIH,MAAAA,EAAQ;QACJS,KAAAA,EAAO;AACX;AACJ;;EAEJ,CAACX,8BAAAA,CAAUc,GAAG,GAAG;AACb,IAAA;;;;;MAKIZ,MAAAA,EAAQ;QACJa,SAAAA,EAAW;AACf,OAAA;MACAV,MAAAA,EAAQ;AACZ;;EAEJ,CAACL,8BAAAA,CAAUgB,QAAQ,GAAG;AAClB,IAAA;MACId,MAAAA,EAAQ;QACJe,KAAAA,EAAO;AACX,OAAA;MACAZ,MAAAA,EAAQ;AACZ,KAAA;AACA,IAAA;MACIH,MAAAA,EAAQ;QACJe,KAAAA,EAAO;AACX;AACJ,KAAA;AACA,IAAA;MACIf,MAAAA,EAAQ;QACJe,KAAAA,EAAO;AACX;AACJ;;EAEJ,CAACjB,8BAAAA,CAAUkB,OAAO,GAAG;AACjB,IAAA;MACIhB,MAAAA,EAAQ;QACJiB,GAAAA,EAAK,2BAAA;QACLC,IAAAA,EAAM;AACV;AACJ,KAAA;AACA,IAAA;MACIlB,MAAAA,EAAQ;QACJiB,GAAAA,EAAK;AACT,OAAA;MACAd,MAAAA,EAAQ;AACZ;;EAEJ,CAACL,8BAAAA,CAAUqB,OAAO,GAAG;AACjB,IAAA;MACInB,MAAAA,EAAQ;QACJoB,OAAAA,EAAS;AACb,OAAA;MACAb,WAAAA,EAAa,mCAAA;MACbJ,MAAAA,EAAQ;AACZ;;EAEJ,CAACL,8BAAAA,CAAUuB,MAAM,GAAG;AAChB,IAAA;MACIrB,MAAAA,EAAQ;QACJsB,IAAAA,EAAM;AACV;AACJ;;AAER","file":"PUL6NSHI.cjs","sourcesContent":["import { ChainType } from '@layerzerolabs/layerzero-definitions';\n\nimport type { ImageId } from './docker-images';\n\nexport interface VersionCombination {\n images: { [key: string]: ImageId }; // Tool name -> version mapping\n description?: string; // Optional description for this combination\n stable?: boolean;\n}\n\n/**\n * Version compatibility matrices for each tool type\n * Default combination is the first one marked as isRecommended=true\n */\nexport const versionMatrices: Record<ChainType, [VersionCombination, ...VersionCombination[]]> = {\n [ChainType.EVM]: [\n {\n images: {\n forge: 'evm:forge-1.3.6-hardhat-2.26.3-patch-1',\n hardhat: 'evm:forge-1.3.6-hardhat-2.26.3-patch-1',\n },\n stable: true,\n },\n ],\n [ChainType.SOLANA]: [\n {\n // Built in the old `monorepo` repository.\n images: {\n solana: 'solana:anchor-0.29.0-solana-1.17.31',\n anchor: 'solana:anchor-0.29.0-solana-1.17.31',\n },\n description: 'Stable and well-tested',\n stable: true,\n },\n {\n images: {\n anchor: 'solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11',\n solana: 'solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11',\n 'solana-verify': 'solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11',\n },\n description: 'Latest stable release',\n },\n ],\n [ChainType.APTOSMOVE]: [\n {\n images: {\n aptos: 'aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0',\n initiad: 'aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0',\n movement: 'aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0',\n },\n },\n {\n images: {\n aptos: 'aptos:aptos-4.7.0-initiad-0.6.3',\n initiad: 'aptos:aptos-4.7.0-initiad-0.6.3',\n },\n stable: true,\n },\n {\n // Built in the old `monorepo` repository.\n images: {\n aptos: 'aptos:aptos-4.6.0',\n },\n },\n ],\n [ChainType.TON]: [\n {\n // In TON's offchain SDK, we derive contract addresses dynamically from their\n // bytecode and initial state even for contracts deployed already.\n // Therefore, we cannot update the compiler version even when the minor version is the same\n // since it would change the resulting bytecode and thus the contract address.\n images: {\n blueprint: 'ton:blueprint-0.25.0-beta.1-patch-2',\n },\n stable: true,\n },\n ],\n [ChainType.STARKNET]: [\n {\n images: {\n scarb: 'starknet:scarb-2.14.0',\n },\n stable: true,\n },\n {\n images: {\n scarb: 'starknet:scarb-2.13.1-patch-2',\n },\n },\n {\n images: {\n scarb: 'starknet:scarb-2.12.0-patch-4',\n },\n },\n ],\n [ChainType.SUIMOVE]: [\n {\n images: {\n sui: 'sui:iota-1.9.2-sui-1.54.1',\n iota: 'sui:iota-1.9.2-sui-1.54.1',\n },\n },\n {\n images: {\n sui: 'sui:sui-1.54.1-patch-1',\n },\n stable: true,\n },\n ],\n [ChainType.STELLAR]: [\n {\n images: {\n stellar: 'stellar:stellar-23.1.4',\n },\n description: 'Latest stable Stellar CLI release',\n stable: true,\n },\n ],\n [ChainType.CANTON]: [\n {\n images: {\n daml: 'canton:daml-3.3.0-snapshot.20250507.0-patch-1',\n },\n },\n ],\n};\n"]}
@@ -1,5 +1,5 @@
1
- import { getProfileName, parseKnownFiles, loadSsoSessionData, getSSOTokenFromFile, getSSOTokenFilepath } from './ELFNCT57.js';
2
1
  import { setCredentialFeature } from './NDUVZQ7S.js';
2
+ import { getProfileName, parseKnownFiles, loadSsoSessionData, getSSOTokenFromFile, getSSOTokenFilepath } from './ELFNCT57.js';
3
3
  import './OH4A2VLX.js';
4
4
  import { CredentialsProviderError, TokenProviderError } from './TTKDG2NN.js';
5
5
  import { init_esm_shims, __name } from './4RNWLMHM.js';
@@ -32,7 +32,7 @@ init_esm_shims();
32
32
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
33
33
  init_esm_shims();
34
34
  var getSsoOidcClient = /* @__PURE__ */ __name(async (ssoRegion, init = {}) => {
35
- const { SSOOIDCClient } = await import('./GBR35MZ7.js');
35
+ const { SSOOIDCClient } = await import('./6OU7NCZK.js');
36
36
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
37
37
  region: ssoRegion ?? init.clientConfig?.region,
38
38
  logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
@@ -42,7 +42,7 @@ var getSsoOidcClient = /* @__PURE__ */ __name(async (ssoRegion, init = {}) => {
42
42
 
43
43
  // ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
44
44
  var getNewSsoOidcToken = /* @__PURE__ */ __name(async (ssoToken, ssoRegion, init = {}) => {
45
- const { CreateTokenCommand } = await import('./GBR35MZ7.js');
45
+ const { CreateTokenCommand } = await import('./6OU7NCZK.js');
46
46
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
47
47
  return ssoOidcClient.send(new CreateTokenCommand({
48
48
  clientId: ssoToken.clientId,
@@ -199,7 +199,7 @@ var resolveSSOCredentials = /* @__PURE__ */ __name(async ({ ssoStartUrl, ssoSess
199
199
  });
200
200
  }
201
201
  const { accessToken } = token;
202
- const { SSOClient, GetRoleCredentialsCommand } = await import('./BOOCAPHW.js');
202
+ const { SSOClient, GetRoleCredentialsCommand } = await import('./GLJJOBCM.js');
203
203
  const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
204
204
  logger: clientConfig?.logger ?? parentClientConfig?.logger,
205
205
  region: clientConfig?.region ?? ssoRegion
@@ -334,5 +334,5 @@ var fromSSO = /* @__PURE__ */ __name((init = {}) => async ({ callerClientConfig
334
334
  init_esm_shims();
335
335
 
336
336
  export { fromSSO, isSsoProfile, validateSsoProfile };
337
- //# sourceMappingURL=W5XVOHRB.js.map
338
- //# sourceMappingURL=W5XVOHRB.js.map
337
+ //# sourceMappingURL=S37YVMJL.js.map
338
+ //# sourceMappingURL=S37YVMJL.js.map