@layerzerolabs/vm-tooling 0.0.67 → 0.0.73
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{3NQBCH72.js → 35BIBLTE.js} +7 -7
- package/dist/{3NQBCH72.js.map → 35BIBLTE.js.map} +1 -1
- package/dist/36UU6CJU.cjs +57 -0
- package/dist/36UU6CJU.cjs.map +1 -0
- package/dist/{B64IFAV2.js → 3YHRHIKS.js} +8 -11
- package/dist/3YHRHIKS.js.map +1 -0
- package/dist/{6GAMDBD5.cjs → 4CTWHZA4.cjs} +3 -3
- package/dist/{6GAMDBD5.cjs.map → 4CTWHZA4.cjs.map} +1 -1
- package/dist/{IMNIF2OY.js → 4Q36MQI5.js} +3 -3
- package/dist/{IMNIF2OY.js.map → 4Q36MQI5.js.map} +1 -1
- package/dist/{EPUR3XY7.cjs → 4SZ6P77Q.cjs} +8 -8
- package/dist/{EPUR3XY7.cjs.map → 4SZ6P77Q.cjs.map} +1 -1
- package/dist/55HL3CFD.js +50 -0
- package/dist/55HL3CFD.js.map +1 -0
- package/dist/{HEBSBDJK.cjs → 6MCEHW2U.cjs} +97 -97
- package/dist/{HEBSBDJK.cjs.map → 6MCEHW2U.cjs.map} +1 -1
- package/dist/{TQMUPD75.cjs → 6NIOUVPA.cjs} +25 -4
- package/dist/6NIOUVPA.cjs.map +1 -0
- package/dist/{DUHXR2VQ.js → 6OU7NCZK.js} +9 -9
- package/dist/{DUHXR2VQ.js.map → 6OU7NCZK.js.map} +1 -1
- package/dist/{OAO7CCJW.js → 6QZPR4XG.js} +2 -2
- package/dist/6QZPR4XG.js.map +1 -0
- package/dist/6YTOLRHQ.js +6 -0
- package/dist/6YTOLRHQ.js.map +1 -0
- package/dist/{MXUJZDCO.js → 7R7EZF6Z.js} +4 -4
- package/dist/{MXUJZDCO.js.map → 7R7EZF6Z.js.map} +1 -1
- package/dist/{BGDL7AEO.cjs → 7ZH64OYR.cjs} +32 -32
- package/dist/{BGDL7AEO.cjs.map → 7ZH64OYR.cjs.map} +1 -1
- package/dist/ACDTMA6Q.cjs +72 -0
- package/dist/ACDTMA6Q.cjs.map +1 -0
- package/dist/{DTJGFNPG.cjs → ASYXJJD4.cjs} +136 -136
- package/dist/{DTJGFNPG.cjs.map → ASYXJJD4.cjs.map} +1 -1
- package/dist/{MMIV5S36.js → BTXB2LKA.js} +14 -8
- package/dist/BTXB2LKA.js.map +1 -0
- package/dist/{MNM554UV.cjs → BVXMXRYL.cjs} +8 -8
- package/dist/{MNM554UV.cjs.map → BVXMXRYL.cjs.map} +1 -1
- package/dist/D3JHHTB6.js +152 -0
- package/dist/D3JHHTB6.js.map +1 -0
- package/dist/{DPCW4JIV.cjs → DB5GRF5K.cjs} +14 -8
- package/dist/DB5GRF5K.cjs.map +1 -0
- package/dist/{ZGO3EZDV.js → EDWLY6YP.js} +3 -3
- package/dist/{ZGO3EZDV.js.map → EDWLY6YP.js.map} +1 -1
- package/dist/EYP6JZRD.cjs +86 -0
- package/dist/EYP6JZRD.cjs.map +1 -0
- package/dist/F35TPZS3.js +121 -0
- package/dist/F35TPZS3.js.map +1 -0
- package/dist/{3PEVFTZ5.js → FL2DFW3Y.js} +5 -4
- package/dist/FL2DFW3Y.js.map +1 -0
- package/dist/{Y6WTLKDX.cjs → FOFSZBOK.cjs} +67 -107
- package/dist/FOFSZBOK.cjs.map +1 -0
- package/dist/FQUILSS5.js +52 -0
- package/dist/FQUILSS5.js.map +1 -0
- package/dist/FUT2FDDD.cjs +48 -0
- package/dist/FUT2FDDD.cjs.map +1 -0
- package/dist/GIS4KMDM.js +6 -0
- package/dist/GIS4KMDM.js.map +1 -0
- package/dist/{KPA4NAED.js → GLJJOBCM.js} +8 -8
- package/dist/{KPA4NAED.js.map → GLJJOBCM.js.map} +1 -1
- package/dist/{ETOJ4HEB.cjs → GSWL56ZH.cjs} +36 -72
- package/dist/GSWL56ZH.cjs.map +1 -0
- package/dist/{ESB4MZSG.js → H7LPHZJT.js} +67 -103
- package/dist/H7LPHZJT.js.map +1 -0
- package/dist/IDMMHZJ3.cjs +8 -0
- package/dist/IDMMHZJ3.cjs.map +1 -0
- package/dist/{V2H77GS3.js → II7QHMLF.js} +31 -66
- package/dist/II7QHMLF.js.map +1 -0
- package/dist/KSZMBVFB.cjs +154 -0
- package/dist/KSZMBVFB.cjs.map +1 -0
- package/dist/{BNKNVKCP.js → LF6BYBZY.js} +3 -3
- package/dist/{BNKNVKCP.js.map → LF6BYBZY.js.map} +1 -1
- package/dist/{S4VRTIGP.cjs → LH4V3GFX.cjs} +3 -3
- package/dist/{S4VRTIGP.cjs.map → LH4V3GFX.cjs.map} +1 -1
- package/dist/LNCARCBD.cjs +48 -0
- package/dist/LNCARCBD.cjs.map +1 -0
- package/dist/M6KBN6B2.cjs +21 -0
- package/dist/M6KBN6B2.cjs.map +1 -0
- package/dist/{2GYKOGER.cjs → MQTCD42Y.cjs} +6 -6
- package/dist/{2GYKOGER.cjs.map → MQTCD42Y.cjs.map} +1 -1
- package/dist/N67IGBHN.js +29 -0
- package/dist/N67IGBHN.js.map +1 -0
- package/dist/O2C74Z3Q.cjs +17 -0
- package/dist/O2C74Z3Q.cjs.map +1 -0
- package/dist/{EUFYRZAY.js → OANFSFAO.js} +8 -8
- package/dist/{EUFYRZAY.js.map → OANFSFAO.js.map} +1 -1
- package/dist/OLQR7R3W.js +84 -0
- package/dist/OLQR7R3W.js.map +1 -0
- package/dist/ORWR6LWW.js +26 -0
- package/dist/ORWR6LWW.js.map +1 -0
- package/dist/{WQLWQKFG.cjs → OT5L7ME6.cjs} +3 -3
- package/dist/{WQLWQKFG.cjs.map → OT5L7ME6.cjs.map} +1 -1
- package/dist/OUJ5TG6W.js +26 -0
- package/dist/OUJ5TG6W.js.map +1 -0
- package/dist/{OTNTZEBH.cjs → PUL6NSHI.cjs} +45 -52
- package/dist/PUL6NSHI.cjs.map +1 -0
- package/dist/{RNY7P54N.js → S37YVMJL.js} +6 -6
- package/dist/{RNY7P54N.js.map → S37YVMJL.js.map} +1 -1
- package/dist/S3PHE6F2.cjs +8 -0
- package/dist/S3PHE6F2.cjs.map +1 -0
- package/dist/{62SHJT74.cjs → SHJCZ6NL.cjs} +89 -89
- package/dist/{62SHJT74.cjs.map → SHJCZ6NL.cjs.map} +1 -1
- package/dist/{IE5H7TSX.js → TNPXNMQM.js} +3 -3
- package/dist/{IE5H7TSX.js.map → TNPXNMQM.js.map} +1 -1
- package/dist/{KR5GF76B.js → TXDLSUBD.js} +5 -5
- package/dist/{KR5GF76B.js.map → TXDLSUBD.js.map} +1 -1
- package/dist/VPKYL66J.cjs +18270 -0
- package/dist/VPKYL66J.cjs.map +1 -0
- package/dist/{34E242OH.js → WDAYI6EQ.js} +3 -3
- package/dist/{34E242OH.js.map → WDAYI6EQ.js.map} +1 -1
- package/dist/{UYX67GTA.cjs → WH45T4LS.cjs} +5 -5
- package/dist/{UYX67GTA.cjs.map → WH45T4LS.cjs.map} +1 -1
- package/dist/XCMLC6HI.js +18267 -0
- package/dist/XCMLC6HI.js.map +1 -0
- package/dist/XYT4PCRV.cjs +31 -0
- package/dist/XYT4PCRV.cjs.map +1 -0
- package/dist/Y27GTZ2Q.js +19 -0
- package/dist/Y27GTZ2Q.js.map +1 -0
- package/dist/YLHOHCRW.js +15 -0
- package/dist/YLHOHCRW.js.map +1 -0
- package/dist/{GSHFVQRI.cjs → Z253B63X.cjs} +2 -2
- package/dist/Z253B63X.cjs.map +1 -0
- package/dist/{MTWIFBNY.cjs → ZD3LAY33.cjs} +17 -20
- package/dist/ZD3LAY33.cjs.map +1 -0
- package/dist/{K7DJQ6PV.cjs → ZQFCLTYU.cjs} +4 -4
- package/dist/{K7DJQ6PV.cjs.map → ZQFCLTYU.cjs.map} +1 -1
- package/dist/commands/aptos.cjs +22 -0
- package/dist/commands/aptos.cjs.map +1 -0
- package/dist/commands/aptos.d.ts +3 -0
- package/dist/commands/aptos.d.ts.map +1 -0
- package/dist/commands/aptos.js +13 -0
- package/dist/commands/aptos.js.map +1 -0
- package/dist/commands/iota.cjs +23 -0
- package/dist/commands/iota.cjs.map +1 -0
- package/dist/commands/iota.d.ts +3 -0
- package/dist/commands/iota.d.ts.map +1 -0
- package/dist/commands/iota.js +14 -0
- package/dist/commands/iota.js.map +1 -0
- package/dist/commands/starknet.cjs +13 -0
- package/dist/commands/starknet.cjs.map +1 -0
- package/dist/commands/{starknet/build-typescript-sdk.d.ts → starknet.d.ts} +1 -1
- package/dist/commands/starknet.d.ts.map +1 -0
- package/dist/commands/starknet.js +4 -0
- package/dist/commands/starknet.js.map +1 -0
- package/dist/commands/sui.cjs +23 -0
- package/dist/commands/sui.cjs.map +1 -0
- package/dist/commands/sui.d.ts +3 -0
- package/dist/commands/sui.d.ts.map +1 -0
- package/dist/commands/sui.js +14 -0
- package/dist/commands/sui.js.map +1 -0
- package/dist/commands/utility/sui-like.cjs +22 -0
- package/dist/commands/utility/sui-like.cjs.map +1 -0
- package/dist/commands/utility/sui-like.d.ts +16 -0
- package/dist/commands/utility/sui-like.d.ts.map +1 -0
- package/dist/commands/utility/sui-like.js +13 -0
- package/dist/commands/utility/sui-like.js.map +1 -0
- package/dist/config/docker-images.cjs +13 -0
- package/dist/config/docker-images.cjs.map +1 -0
- package/dist/config/docker-images.d.ts +145 -0
- package/dist/config/docker-images.d.ts.map +1 -0
- package/dist/config/docker-images.js +4 -0
- package/dist/config/docker-images.js.map +1 -0
- package/dist/config/docker-images.test.cjs +21 -0
- package/dist/config/docker-images.test.cjs.map +1 -0
- package/dist/config/docker-images.test.js +19 -0
- package/dist/config/docker-images.test.js.map +1 -0
- package/dist/config/index.cjs +21 -8
- package/dist/config/index.d.ts +3 -2
- package/dist/config/index.d.ts.map +1 -1
- package/dist/config/index.js +3 -2
- package/dist/config/tools.cjs +6 -5
- package/dist/config/tools.d.ts.map +1 -1
- package/dist/config/tools.js +3 -2
- package/dist/config/version-matrices.cjs +2 -2
- package/dist/config/version-matrices.d.ts +8 -1
- package/dist/config/version-matrices.d.ts.map +1 -1
- package/dist/config/version-matrices.js +1 -1
- package/dist/core/index.cjs +10 -21
- package/dist/core/index.d.ts +2 -3
- package/dist/core/index.d.ts.map +1 -1
- package/dist/core/index.js +8 -7
- package/dist/core/lock.cjs +4 -4
- package/dist/core/lock.d.ts.map +1 -1
- package/dist/core/lock.js +1 -1
- package/dist/core/lock.test.cjs +11 -18274
- package/dist/core/lock.test.cjs.map +1 -1
- package/dist/core/lock.test.js +3 -18266
- package/dist/core/lock.test.js.map +1 -1
- package/dist/core/tool-executor.cjs +8 -7
- package/dist/core/tool-executor.d.ts +3 -2
- package/dist/core/tool-executor.d.ts.map +1 -1
- package/dist/core/tool-executor.js +7 -6
- package/dist/core/version-resolver.cjs +5 -13
- package/dist/core/version-resolver.d.ts +1 -24
- package/dist/core/version-resolver.d.ts.map +1 -1
- package/dist/core/version-resolver.js +4 -4
- package/dist/display/formatters.cjs +5 -4
- package/dist/display/formatters.d.ts +1 -1
- package/dist/display/formatters.d.ts.map +1 -1
- package/dist/display/formatters.js +4 -3
- package/dist/display/index.cjs +8 -7
- package/dist/display/index.js +5 -4
- package/dist/display/version-display.cjs +7 -6
- package/dist/display/version-display.d.ts.map +1 -1
- package/dist/display/version-display.js +5 -4
- package/dist/index.cjs +84 -56
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +77 -49
- package/dist/index.js.map +1 -1
- package/dist/scripts/generate-github-matrix.cjs +169 -163
- package/dist/scripts/generate-github-matrix.cjs.map +1 -1
- package/dist/scripts/generate-github-matrix.js +32 -26
- package/dist/scripts/generate-github-matrix.js.map +1 -1
- package/dist/types/docker.cjs +8 -3
- package/dist/types/docker.cjs.map +1 -1
- package/dist/types/docker.d.ts +32 -15
- package/dist/types/docker.d.ts.map +1 -1
- package/dist/types/docker.js +2 -4
- package/dist/types/docker.js.map +1 -1
- package/dist/types/index.cjs +10 -3
- package/dist/types/index.cjs.map +1 -1
- package/dist/types/index.d.ts +2 -3
- package/dist/types/index.d.ts.map +1 -1
- package/dist/types/index.js +4 -4
- package/dist/types/index.js.map +1 -1
- package/dist/types/tool.cjs +2 -3
- package/dist/types/tool.cjs.map +1 -1
- package/dist/types/tool.d.ts +3 -7
- package/dist/types/tool.d.ts.map +1 -1
- package/dist/types/tool.js +2 -4
- package/dist/types/tool.js.map +1 -1
- package/dist/utils/docker.cjs +15 -5
- package/dist/utils/docker.d.ts +6 -3
- package/dist/utils/docker.d.ts.map +1 -1
- package/dist/utils/docker.js +4 -2
- package/dist/utils/finder.cjs +15 -18
- package/dist/utils/finder.d.ts +5 -5
- package/dist/utils/finder.d.ts.map +1 -1
- package/dist/utils/finder.js +3 -2
- package/dist/utils/version.cjs +7 -6
- package/dist/utils/version.d.ts +3 -4
- package/dist/utils/version.d.ts.map +1 -1
- package/dist/utils/version.js +3 -2
- package/dist/utils.cjs +5 -8
- package/dist/utils.d.ts +1 -4
- package/dist/utils.d.ts.map +1 -1
- package/dist/utils.js +3 -2
- package/package.json +5 -6
- package/dist/3H446V2K.js +0 -6
- package/dist/3H446V2K.js.map +0 -1
- package/dist/3PEVFTZ5.js.map +0 -1
- package/dist/3WMXZ3YO.js +0 -75
- package/dist/3WMXZ3YO.js.map +0 -1
- package/dist/64X55IZO.js +0 -75
- package/dist/64X55IZO.js.map +0 -1
- package/dist/7YUT4HSR.cjs +0 -77
- package/dist/7YUT4HSR.cjs.map +0 -1
- package/dist/B64IFAV2.js.map +0 -1
- package/dist/DPCW4JIV.cjs.map +0 -1
- package/dist/ESB4MZSG.js.map +0 -1
- package/dist/ETOJ4HEB.cjs.map +0 -1
- package/dist/FKPK53TD.cjs +0 -8
- package/dist/FKPK53TD.cjs.map +0 -1
- package/dist/GSHFVQRI.cjs.map +0 -1
- package/dist/GTTCNWKS.cjs +0 -22
- package/dist/GTTCNWKS.cjs.map +0 -1
- package/dist/HLG5IR2C.cjs +0 -127
- package/dist/HLG5IR2C.cjs.map +0 -1
- package/dist/LVQRK66G.js +0 -20
- package/dist/LVQRK66G.js.map +0 -1
- package/dist/M4PGJV5D.js +0 -6
- package/dist/M4PGJV5D.js.map +0 -1
- package/dist/MMIV5S36.js.map +0 -1
- package/dist/MTWIFBNY.cjs.map +0 -1
- package/dist/MXT5UPPB.js +0 -119
- package/dist/MXT5UPPB.js.map +0 -1
- package/dist/NESZ4EWJ.js +0 -128
- package/dist/NESZ4EWJ.js.map +0 -1
- package/dist/O2QYRDJR.cjs +0 -77
- package/dist/O2QYRDJR.cjs.map +0 -1
- package/dist/OAO7CCJW.js.map +0 -1
- package/dist/OTNTZEBH.cjs.map +0 -1
- package/dist/PWDCAN6N.js +0 -37
- package/dist/PWDCAN6N.js.map +0 -1
- package/dist/QYB5VPZE.cjs +0 -39
- package/dist/QYB5VPZE.cjs.map +0 -1
- package/dist/TQMUPD75.cjs.map +0 -1
- package/dist/V2H77GS3.js.map +0 -1
- package/dist/Y6WTLKDX.cjs.map +0 -1
- package/dist/Y7OWS2C2.cjs +0 -8
- package/dist/Y7OWS2C2.cjs.map +0 -1
- package/dist/commands/iota/build.cjs +0 -20
- package/dist/commands/iota/build.cjs.map +0 -1
- package/dist/commands/iota/build.d.ts +0 -3
- package/dist/commands/iota/build.d.ts.map +0 -1
- package/dist/commands/iota/build.js +0 -11
- package/dist/commands/iota/build.js.map +0 -1
- package/dist/commands/iota/index.cjs +0 -21
- package/dist/commands/iota/index.cjs.map +0 -1
- package/dist/commands/iota/index.d.ts +0 -2
- package/dist/commands/iota/index.d.ts.map +0 -1
- package/dist/commands/iota/index.js +0 -14
- package/dist/commands/iota/index.js.map +0 -1
- package/dist/commands/starknet/build-typescript-sdk.cjs +0 -13
- package/dist/commands/starknet/build-typescript-sdk.cjs.map +0 -1
- package/dist/commands/starknet/build-typescript-sdk.d.ts.map +0 -1
- package/dist/commands/starknet/build-typescript-sdk.js +0 -4
- package/dist/commands/starknet/build-typescript-sdk.js.map +0 -1
- package/dist/commands/starknet/index.cjs +0 -14
- package/dist/commands/starknet/index.cjs.map +0 -1
- package/dist/commands/starknet/index.d.ts +0 -2
- package/dist/commands/starknet/index.d.ts.map +0 -1
- package/dist/commands/starknet/index.js +0 -5
- package/dist/commands/starknet/index.js.map +0 -1
- package/dist/commands/sui/build.cjs +0 -20
- package/dist/commands/sui/build.cjs.map +0 -1
- package/dist/commands/sui/build.d.ts +0 -3
- package/dist/commands/sui/build.d.ts.map +0 -1
- package/dist/commands/sui/build.js +0 -11
- package/dist/commands/sui/build.js.map +0 -1
- package/dist/commands/sui/index.cjs +0 -21
- package/dist/commands/sui/index.cjs.map +0 -1
- package/dist/commands/sui/index.d.ts +0 -2
- package/dist/commands/sui/index.d.ts.map +0 -1
- package/dist/commands/sui/index.js +0 -12
- package/dist/commands/sui/index.js.map +0 -1
- package/dist/core/compatibility.cjs +0 -13
- package/dist/core/compatibility.cjs.map +0 -1
- package/dist/core/compatibility.d.ts +0 -8
- package/dist/core/compatibility.d.ts.map +0 -1
- package/dist/core/compatibility.js +0 -4
- package/dist/core/compatibility.js.map +0 -1
- package/dist/types/version.cjs +0 -8
- package/dist/types/version.cjs.map +0 -1
- package/dist/types/version.d.ts +0 -25
- package/dist/types/version.d.ts.map +0 -1
- package/dist/types/version.js +0 -6
- package/dist/types/version.js.map +0 -1
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/config/docker-images.ts"],"names":["init_cjs_shims","images","name","versions","forge","hardhat","patch","solana","anchor","aptos","initiad","movement","blueprint","scarb","unreleased","sui","iota","stellar","daml"],"mappings":";;;;;AAOAA,2BAAA,EAAA;AAMO,IAAMC,MAAAA,GAAS;AAClB,EAAA,CAAC,wCAAA,GAA2C;IACxCC,IAAAA,EAAM,KAAA;IACNC,QAAAA,EAAU;MACNC,KAAAA,EAAO,OAAA;MACPC,OAAAA,EAAS;AACb,KAAA;IACAC,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,qCAAA,GAAwC;;IAErCJ,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MACNI,MAAAA,EAAQ,SAAA;MACRC,MAAAA,EAAQ;AACZ;AACJ,GAAA;AACA,EAAA,CAAC,oCAAA,GAAuC;IACpCN,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MACNI,MAAAA,EAAQ,QAAA;MACRC,MAAAA,EAAQ;AACZ;AACJ,GAAA;AACA,EAAA,CAAC,4CAAA,GAA+C;IAC5CN,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MACNI,MAAAA,EAAQ,QAAA;MACRC,MAAAA,EAAQ;AACZ,KAAA;IACAF,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,yDAAA,GAA4D;IACzDJ,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MACNK,MAAAA,EAAQ,QAAA;MACRD,MAAAA,EAAQ,QAAA;MACR,eAAA,EAAiB;AACrB;AACJ,GAAA;AACA,EAAA,CAAC,gDAAA,GAAmD;IAChDL,IAAAA,EAAM,OAAA;IACNC,QAAAA,EAAU;MACNM,KAAAA,EAAO,OAAA;MACPC,OAAAA,EAAS,OAAA;MACTC,QAAAA,EAAU;AACd;AACJ,GAAA;AACA,EAAA,CAAC,iCAAA,GAAoC;IACjCT,IAAAA,EAAM,OAAA;IACNC,QAAAA,EAAU;MACNM,KAAAA,EAAO,OAAA;MACPC,OAAAA,EAAS;AACb;AACJ,GAAA;AACA,EAAA,CAAC,mBAAA,GAAsB;;IAEnBR,IAAAA,EAAM,OAAA;IACNC,QAAAA,EAAU;MACNM,KAAAA,EAAO;AACX;AACJ,GAAA;AACA,EAAA,CAAC,qCAAA,GAAwC;;;;;IAKrCP,IAAAA,EAAM,KAAA;IACNC,QAAAA,EAAU;MACNS,SAAAA,EAAW;AACf,KAAA;IACAN,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,uBAAA,GAA0B;IACvBJ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX;AACJ,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BX,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO,CAAA;IACPQ,UAAAA,EAAY;AAChB,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BZ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BJ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BJ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,+BAAA,GAAkC;IAC/BJ,IAAAA,EAAM,UAAA;IACNC,QAAAA,EAAU;MACNU,KAAAA,EAAO;AACX,KAAA;IACAP,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,2BAAA,GAA8B;IAC3BJ,IAAAA,EAAM,KAAA;IACNC,QAAAA,EAAU;MACNY,GAAAA,EAAK,QAAA;MACLC,IAAAA,EAAM;AACV;AACJ,GAAA;AACA,EAAA,CAAC,wBAAA,GAA2B;;IAExBd,IAAAA,EAAM,KAAA;IACNC,QAAAA,EAAU;MACNY,GAAAA,EAAK;AACT,KAAA;IACAT,KAAAA,EAAO;AACX,GAAA;AACA,EAAA,CAAC,wBAAA,GAA2B;IACxBJ,IAAAA,EAAM,SAAA;IACNC,QAAAA,EAAU;MACNc,OAAAA,EAAS;AACb;AACJ,GAAA;AACA,EAAA,CAAC,+CAAA,GAAkD;IAC/Cf,IAAAA,EAAM,QAAA;IACNC,QAAAA,EAAU;MAAEe,IAAAA,EAAM;AAA4B,KAAA;IAC9CZ,KAAAA,EAAO;AACX;AACJ","file":"KSZMBVFB.cjs","sourcesContent":["export interface Image {\n name: string;\n versions: Record<string, string>;\n patch?: number;\n unreleased?: boolean;\n}\n\n// To add a new image, follow the steps below:\n//\n// 1. Create a PR that adds a new entry with an `unreleased` flag set to `true`.\n// 2. Wait for the main branch to build Docker images for the new entry.\n// 3. Create a PR that removes the `unreleased` flag.\n// 4. Use the Docker images in the version matrices and contract packages.\nexport const images = {\n ['evm:forge-1.3.6-hardhat-2.26.3-patch-1']: {\n name: 'evm',\n versions: {\n forge: '1.3.6',\n hardhat: '2.26.3',\n },\n patch: 1,\n },\n ['solana:anchor-0.29.0-solana-1.17.31']: {\n // Built in the old `monorepo` repository.\n name: 'solana',\n versions: {\n solana: '1.17.31',\n anchor: '0.29.0',\n },\n },\n ['solana:anchor-0.31.1-solana-2.2.20']: {\n name: 'solana',\n versions: {\n solana: '2.2.20',\n anchor: '0.31.1',\n },\n },\n ['solana:anchor-0.31.1-solana-2.2.20-patch-1']: {\n name: 'solana',\n versions: {\n solana: '2.2.20',\n anchor: '0.31.1',\n },\n patch: 1,\n },\n ['solana:anchor-0.31.1-solana-2.2.20-solana-verify-0.4.11']: {\n name: 'solana',\n versions: {\n anchor: '0.31.1',\n solana: '2.2.20',\n 'solana-verify': '0.4.11',\n },\n },\n ['aptos:aptos-4.7.0-initiad-0.6.3-movement-3.5.0']: {\n name: 'aptos',\n versions: {\n aptos: '4.7.0',\n initiad: '0.6.3',\n movement: '3.5.0',\n },\n },\n ['aptos:aptos-4.7.0-initiad-0.6.3']: {\n name: 'aptos',\n versions: {\n aptos: '4.7.0',\n initiad: '0.6.3',\n },\n },\n ['aptos:aptos-4.6.0']: {\n // Built in the old `monorepo` repository.\n name: 'aptos',\n versions: {\n aptos: '4.6.0',\n },\n },\n ['ton:blueprint-0.25.0-beta.1-patch-2']: {\n // In TON's offchain SDK, we derive contract addresses dynamically from their\n // bytecode and initial state even for contracts deployed already.\n // Therefore, we cannot update the compiler version even when the minor version is the same\n // since it would change the resulting bytecode and thus the contract address.\n name: 'ton',\n versions: {\n blueprint: '0.25.0-beta.1',\n },\n patch: 2,\n },\n ['starknet:scarb-2.14.0']: {\n name: 'starknet',\n versions: {\n scarb: '2.14.0',\n },\n },\n ['starknet:scarb-2.14.0-patch-1']: {\n name: 'starknet',\n versions: {\n scarb: '2.14.0',\n },\n patch: 1,\n unreleased: true,\n },\n ['starknet:scarb-2.13.1-patch-1']: {\n name: 'starknet',\n versions: {\n scarb: '2.13.1',\n },\n patch: 1,\n },\n ['starknet:scarb-2.13.1-patch-2']: {\n name: 'starknet',\n versions: {\n scarb: '2.13.1',\n },\n patch: 2,\n },\n ['starknet:scarb-2.12.0-patch-4']: {\n name: 'starknet',\n versions: {\n scarb: '2.12.0',\n },\n patch: 4,\n },\n ['starknet:scarb-2.12.0-patch-3']: {\n name: 'starknet',\n versions: {\n scarb: '2.12.0',\n },\n patch: 3,\n },\n ['sui:iota-1.9.2-sui-1.54.1']: {\n name: 'sui',\n versions: {\n sui: '1.54.1',\n iota: '1.9.2',\n },\n },\n ['sui:sui-1.54.1-patch-1']: {\n // Test building from monorepo-internal\n name: 'sui',\n versions: {\n sui: '1.54.1',\n },\n patch: 1,\n },\n ['stellar:stellar-23.1.4']: {\n name: 'stellar',\n versions: {\n stellar: '23.1.4',\n },\n },\n ['canton:daml-3.3.0-snapshot.20250507.0-patch-1']: {\n name: 'canton',\n versions: { daml: '3.3.0-snapshot.20250507.0' },\n patch: 1,\n },\n} satisfies Record<string, Image>;\n\nexport type ImageId = keyof typeof images;\n"]}
|
|
@@ -16,7 +16,7 @@ var fromWebToken = /* @__PURE__ */ __name((init) => async (awsIdentityProperties
|
|
|
16
16
|
const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
|
|
17
17
|
let { roleAssumerWithWebIdentity } = init;
|
|
18
18
|
if (!roleAssumerWithWebIdentity) {
|
|
19
|
-
const { getDefaultRoleAssumerWithWebIdentity } = await import('./
|
|
19
|
+
const { getDefaultRoleAssumerWithWebIdentity } = await import('./35BIBLTE.js');
|
|
20
20
|
roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
|
|
21
21
|
...init.clientConfig,
|
|
22
22
|
credentialProviderLogger: init.logger,
|
|
@@ -66,5 +66,5 @@ var fromTokenFile = /* @__PURE__ */ __name((init = {}) => async () => {
|
|
|
66
66
|
}, "fromTokenFile");
|
|
67
67
|
|
|
68
68
|
export { fromTokenFile, fromWebToken };
|
|
69
|
-
//# sourceMappingURL=
|
|
70
|
-
//# sourceMappingURL=
|
|
69
|
+
//# sourceMappingURL=LF6BYBZY.js.map
|
|
70
|
+
//# sourceMappingURL=LF6BYBZY.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js"],"names":["fromWebToken","init","awsIdentityProperties","logger","debug","roleArn","roleSessionName","webIdentityToken","providerId","policyArns","policy","durationSeconds","roleAssumerWithWebIdentity","getDefaultRoleAssumerWithWebIdentity","clientConfig","credentialProviderLogger","parentClientConfig","callerClientConfig","clientPlugins","RoleArn","RoleSessionName","Date","now","WebIdentityToken","ProviderId","PolicyArns","Policy","DurationSeconds","ENV_TOKEN_FILE","ENV_ROLE_ARN","ENV_ROLE_SESSION_NAME","fromTokenFile","webIdentityTokenFile","process","env","CredentialsProviderError","credentials","readFileSync","encoding","setCredentialFeature"],"mappings":";;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMA,YAAAA,mBAAe,MAAA,CAAA,CAACC,IAAAA,KAAS,OAAOC,qBAAAA,KAAAA;AACzCD,EAAAA,IAAAA,CAAKE,MAAAA,EAAQC,MAAM,0DAAA,CAAA;AACnB,EAAA,MAAM,EAAEC,SAASC,eAAAA,EAAiBC,gBAAAA,EAAkBC,YAAYC,UAAAA,EAAYC,MAAAA,EAAQC,iBAAe,GAAKV,IAAAA;AACxG,EAAA,IAAI,EAAEW,4BAA0B,GAAKX,IAAAA;AACrC,EAAA,IAAI,CAACW,0BAAAA,EAA4B;AAC7B,IAAA,MAAM,EAAEC,oCAAAA,EAAoC,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9DD,IAAAA,0BAAAA,GAA6BC,oCAAAA,CAAqC;AAC9D,MAAA,GAAGZ,IAAAA,CAAKa,YAAAA;AACRC,MAAAA,wBAAAA,EAA0Bd,IAAAA,CAAKE,MAAAA;MAC/Ba,kBAAAA,EAAoB;AAChB,QAAA,GAAGd,qBAAAA,EAAuBe,kBAAAA;AAC1B,QAAA,GAAGhB,IAAAA,CAAKe;AACZ;AACJ,KAAA,EAAGf,KAAKiB,aAAa,CAAA;AACzB,EAAA;AACA,EAAA,OAAON,0BAAAA,CAA2B;IAC9BO,OAAAA,EAASd,OAAAA;AACTe,IAAAA,eAAAA,EAAiBd,eAAAA,IAAmB,CAAA,mBAAA,EAAsBe,IAAAA,CAAKC,GAAAA,EAAG,CAAA,CAAA;IAClEC,gBAAAA,EAAkBhB,gBAAAA;IAClBiB,UAAAA,EAAYhB,UAAAA;IACZiB,UAAAA,EAAYhB,UAAAA;IACZiB,MAAAA,EAAQhB,MAAAA;IACRiB,eAAAA,EAAiBhB;GACrB,CAAA;AACJ,CAAA,EAxB4B,cAAA;;;ADI5B,IAAMiB,cAAAA,GAAiB,6BAAA;AACvB,IAAMC,YAAAA,GAAe,cAAA;AACrB,IAAMC,qBAAAA,GAAwB,uBAAA;AACvB,IAAMC,aAAAA,mBAAgB,MAAA,CAAA,CAAC9B,IAAAA,GAAO,OAAO,YAAA;AACxCA,EAAAA,IAAAA,CAAKE,MAAAA,EAAQC,MAAM,2DAAA,CAAA;AACnB,EAAA,MAAM4B,oBAAAA,GAAuB/B,IAAAA,EAAM+B,oBAAAA,IAAwBC,OAAAA,CAAQC,IAAIN,cAAAA,CAAAA;AACvE,EAAA,MAAMvB,OAAAA,GAAUJ,IAAAA,EAAMI,OAAAA,IAAW4B,OAAAA,CAAQC,IAAIL,YAAAA,CAAAA;AAC7C,EAAA,MAAMvB,eAAAA,GAAkBL,IAAAA,EAAMK,eAAAA,IAAmB2B,OAAAA,CAAQC,IAAIJ,qBAAAA,CAAAA;AAC7D,EAAA,IAAI,CAACE,oBAAAA,IAAwB,CAAC3B,OAAAA,EAAS;AACnC,IAAA,MAAM,IAAI8B,yBAAyB,0CAAA,EAA4C;AAC3EhC,MAAAA,MAAAA,EAAQF,IAAAA,CAAKE;KACjB,CAAA;AACJ,EAAA;AACA,EAAA,MAAMiC,WAAAA,GAAc,MAAMpC,YAAAA,CAAa;IACnC,GAAGC,IAAAA;AACHM,IAAAA,gBAAAA,EAAkB8B,aAAaL,oBAAAA,EAAsB;MAAEM,QAAAA,EAAU;KAAQ,CAAA;AACzEjC,IAAAA,OAAAA;AACAC,IAAAA;AACJ,GAAA,CAAA,EAAA;AACA,EAAA,IAAI0B,oBAAAA,KAAyBC,OAAAA,CAAQC,GAAAA,CAAIN,cAAAA,CAAAA,EAAiB;AACtDW,IAAAA,oBAAAA,CAAqBH,WAAAA,EAAa,yCAAyC,GAAA,CAAA;AAC/E,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EApB6B,eAAA","file":"
|
|
1
|
+
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-web-identity@3.879.0/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js"],"names":["fromWebToken","init","awsIdentityProperties","logger","debug","roleArn","roleSessionName","webIdentityToken","providerId","policyArns","policy","durationSeconds","roleAssumerWithWebIdentity","getDefaultRoleAssumerWithWebIdentity","clientConfig","credentialProviderLogger","parentClientConfig","callerClientConfig","clientPlugins","RoleArn","RoleSessionName","Date","now","WebIdentityToken","ProviderId","PolicyArns","Policy","DurationSeconds","ENV_TOKEN_FILE","ENV_ROLE_ARN","ENV_ROLE_SESSION_NAME","fromTokenFile","webIdentityTokenFile","process","env","CredentialsProviderError","credentials","readFileSync","encoding","setCredentialFeature"],"mappings":";;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAAO,IAAMA,YAAAA,mBAAe,MAAA,CAAA,CAACC,IAAAA,KAAS,OAAOC,qBAAAA,KAAAA;AACzCD,EAAAA,IAAAA,CAAKE,MAAAA,EAAQC,MAAM,0DAAA,CAAA;AACnB,EAAA,MAAM,EAAEC,SAASC,eAAAA,EAAiBC,gBAAAA,EAAkBC,YAAYC,UAAAA,EAAYC,MAAAA,EAAQC,iBAAe,GAAKV,IAAAA;AACxG,EAAA,IAAI,EAAEW,4BAA0B,GAAKX,IAAAA;AACrC,EAAA,IAAI,CAACW,0BAAAA,EAA4B;AAC7B,IAAA,MAAM,EAAEC,oCAAAA,EAAoC,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9DD,IAAAA,0BAAAA,GAA6BC,oCAAAA,CAAqC;AAC9D,MAAA,GAAGZ,IAAAA,CAAKa,YAAAA;AACRC,MAAAA,wBAAAA,EAA0Bd,IAAAA,CAAKE,MAAAA;MAC/Ba,kBAAAA,EAAoB;AAChB,QAAA,GAAGd,qBAAAA,EAAuBe,kBAAAA;AAC1B,QAAA,GAAGhB,IAAAA,CAAKe;AACZ;AACJ,KAAA,EAAGf,KAAKiB,aAAa,CAAA;AACzB,EAAA;AACA,EAAA,OAAON,0BAAAA,CAA2B;IAC9BO,OAAAA,EAASd,OAAAA;AACTe,IAAAA,eAAAA,EAAiBd,eAAAA,IAAmB,CAAA,mBAAA,EAAsBe,IAAAA,CAAKC,GAAAA,EAAG,CAAA,CAAA;IAClEC,gBAAAA,EAAkBhB,gBAAAA;IAClBiB,UAAAA,EAAYhB,UAAAA;IACZiB,UAAAA,EAAYhB,UAAAA;IACZiB,MAAAA,EAAQhB,MAAAA;IACRiB,eAAAA,EAAiBhB;GACrB,CAAA;AACJ,CAAA,EAxB4B,cAAA;;;ADI5B,IAAMiB,cAAAA,GAAiB,6BAAA;AACvB,IAAMC,YAAAA,GAAe,cAAA;AACrB,IAAMC,qBAAAA,GAAwB,uBAAA;AACvB,IAAMC,aAAAA,mBAAgB,MAAA,CAAA,CAAC9B,IAAAA,GAAO,OAAO,YAAA;AACxCA,EAAAA,IAAAA,CAAKE,MAAAA,EAAQC,MAAM,2DAAA,CAAA;AACnB,EAAA,MAAM4B,oBAAAA,GAAuB/B,IAAAA,EAAM+B,oBAAAA,IAAwBC,OAAAA,CAAQC,IAAIN,cAAAA,CAAAA;AACvE,EAAA,MAAMvB,OAAAA,GAAUJ,IAAAA,EAAMI,OAAAA,IAAW4B,OAAAA,CAAQC,IAAIL,YAAAA,CAAAA;AAC7C,EAAA,MAAMvB,eAAAA,GAAkBL,IAAAA,EAAMK,eAAAA,IAAmB2B,OAAAA,CAAQC,IAAIJ,qBAAAA,CAAAA;AAC7D,EAAA,IAAI,CAACE,oBAAAA,IAAwB,CAAC3B,OAAAA,EAAS;AACnC,IAAA,MAAM,IAAI8B,yBAAyB,0CAAA,EAA4C;AAC3EhC,MAAAA,MAAAA,EAAQF,IAAAA,CAAKE;KACjB,CAAA;AACJ,EAAA;AACA,EAAA,MAAMiC,WAAAA,GAAc,MAAMpC,YAAAA,CAAa;IACnC,GAAGC,IAAAA;AACHM,IAAAA,gBAAAA,EAAkB8B,aAAaL,oBAAAA,EAAsB;MAAEM,QAAAA,EAAU;KAAQ,CAAA;AACzEjC,IAAAA,OAAAA;AACAC,IAAAA;AACJ,GAAA,CAAA,EAAA;AACA,EAAA,IAAI0B,oBAAAA,KAAyBC,OAAAA,CAAQC,GAAAA,CAAIN,cAAAA,CAAAA,EAAiB;AACtDW,IAAAA,oBAAAA,CAAqBH,WAAAA,EAAa,yCAAyC,GAAA,CAAA;AAC/E,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EApB6B,eAAA","file":"LF6BYBZY.js","sourcesContent":["export * from \"./fromTokenFile\";\nexport * from \"./fromWebToken\";\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { readFileSync } from \"fs\";\nimport { fromWebToken } from \"./fromWebToken\";\nconst ENV_TOKEN_FILE = \"AWS_WEB_IDENTITY_TOKEN_FILE\";\nconst ENV_ROLE_ARN = \"AWS_ROLE_ARN\";\nconst ENV_ROLE_SESSION_NAME = \"AWS_ROLE_SESSION_NAME\";\nexport const fromTokenFile = (init = {}) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-web-identity - fromTokenFile\");\n const webIdentityTokenFile = init?.webIdentityTokenFile ?? process.env[ENV_TOKEN_FILE];\n const roleArn = init?.roleArn ?? process.env[ENV_ROLE_ARN];\n const roleSessionName = init?.roleSessionName ?? process.env[ENV_ROLE_SESSION_NAME];\n if (!webIdentityTokenFile || !roleArn) {\n throw new CredentialsProviderError(\"Web identity configuration not specified\", {\n logger: init.logger,\n });\n }\n const credentials = await fromWebToken({\n ...init,\n webIdentityToken: readFileSync(webIdentityTokenFile, { encoding: \"ascii\" }),\n roleArn,\n roleSessionName,\n })();\n if (webIdentityTokenFile === process.env[ENV_TOKEN_FILE]) {\n setCredentialFeature(credentials, \"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN\", \"h\");\n }\n return credentials;\n};\n","export const fromWebToken = (init) => async (awsIdentityProperties) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-web-identity - fromWebToken\");\n const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;\n let { roleAssumerWithWebIdentity } = init;\n if (!roleAssumerWithWebIdentity) {\n const { getDefaultRoleAssumerWithWebIdentity } = await import(\"@aws-sdk/nested-clients/sts\");\n roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({\n ...init.clientConfig,\n credentialProviderLogger: init.logger,\n parentClientConfig: {\n ...awsIdentityProperties?.callerClientConfig,\n ...init.parentClientConfig,\n },\n }, init.clientPlugins);\n }\n return roleAssumerWithWebIdentity({\n RoleArn: roleArn,\n RoleSessionName: roleSessionName ?? `aws-sdk-js-session-${Date.now()}`,\n WebIdentityToken: webIdentityToken,\n ProviderId: providerId,\n PolicyArns: policyArns,\n Policy: policy,\n DurationSeconds: durationSeconds,\n });\n};\n"]}
|
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
+
var _7WVEMAKW_cjs = require('./7WVEMAKW.cjs');
|
|
3
4
|
var P5BPMTGP_cjs = require('./P5BPMTGP.cjs');
|
|
4
5
|
require('./WDSPHVPJ.cjs');
|
|
5
|
-
var _7WVEMAKW_cjs = require('./7WVEMAKW.cjs');
|
|
6
6
|
var JGLHYXTW_cjs = require('./JGLHYXTW.cjs');
|
|
7
7
|
var U7VZULNU_cjs = require('./U7VZULNU.cjs');
|
|
8
8
|
var child_process = require('child_process');
|
|
@@ -100,5 +100,5 @@ var fromProcess = /* @__PURE__ */ U7VZULNU_cjs.__name((init = {}) => async ({ ca
|
|
|
100
100
|
}, "fromProcess");
|
|
101
101
|
|
|
102
102
|
exports.fromProcess = fromProcess;
|
|
103
|
-
//# sourceMappingURL=
|
|
104
|
-
//# sourceMappingURL=
|
|
103
|
+
//# sourceMappingURL=LH4V3GFX.cjs.map
|
|
104
|
+
//# sourceMappingURL=LH4V3GFX.cjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js"],"names":["init_cjs_shims","getValidatedProcessCredentials","__name","profileName","data","profiles","Version","Error","AccessKeyId","undefined","SecretAccessKey","Expiration","currentTime","Date","expireTime","accountId","AccountId","aws_account_id","credentials","accessKeyId","secretAccessKey","SessionToken","sessionToken","expiration","CredentialScope","credentialScope","setCredentialFeature","resolveProcessCredentials","logger","profile","credentialProcess","execPromise","promisify","exec","stdout","JSON","parse","trim","error","CredentialsProviderError","message","fromProcess","init","callerClientConfig","debug","parseKnownFiles","getProfileName"],"mappings":";;;;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AACO,IAAMC,8BAAAA,mBAAiCC,mBAAA,CAAA,CAACC,WAAAA,EAAaC,IAAAA,EAAMC,QAAAA,KAAAA;AAC9D,EAAA,IAAID,IAAAA,CAAKE,YAAY,CAAA,EAAG;AACpB,IAAA,MAAMC,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACrF,EAAA;AACA,EAAA,IAAIC,IAAAA,CAAKI,WAAAA,KAAgBC,MAAAA,IAAaL,IAAAA,CAAKM,oBAAoBD,MAAAA,EAAW;AACtE,IAAA,MAAMF,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,iDAAAA,CAA8D,CAAA;AACzF,EAAA;AACA,EAAA,IAAIC,KAAKO,UAAAA,EAAY;AACjB,IAAA,MAAMC,WAAAA,uBAAkBC,IAAAA,EAAAA;AACxB,IAAA,MAAMC,UAAAA,GAAa,IAAID,IAAAA,CAAKT,IAAAA,CAAKO,UAAU,CAAA;AAC3C,IAAA,IAAIG,aAAaF,WAAAA,EAAa;AAC1B,MAAA,MAAML,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,iDAAAA,CAA8D,CAAA;AACzF,IAAA;AACJ,EAAA;AACA,EAAA,IAAIY,YAAYX,IAAAA,CAAKY,SAAAA;AACrB,EAAA,IAAI,CAACD,SAAAA,IAAaV,QAAAA,GAAWF,WAAAA,GAAcc,cAAAA,EAAgB;AACvDF,IAAAA,SAAAA,GAAYV,QAAAA,CAASF,WAAAA,CAAAA,CAAac,cAAAA;AACtC,EAAA;AACA,EAAA,MAAMC,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAaf,IAAAA,CAAKI,WAAAA;AAClBY,IAAAA,eAAAA,EAAiBhB,IAAAA,CAAKM,eAAAA;AACtB,IAAA,GAAIN,KAAKiB,YAAAA,IAAgB;AAAEC,MAAAA,YAAAA,EAAclB,IAAAA,CAAKiB;AAAa,KAAA;AAC3D,IAAA,GAAIjB,KAAKO,UAAAA,IAAc;MAAEY,UAAAA,EAAY,IAAIV,IAAAA,CAAKT,IAAAA,CAAKO,UAAU;AAAE,KAAA;AAC/D,IAAA,GAAIP,KAAKoB,eAAAA,IAAmB;AAAEC,MAAAA,eAAAA,EAAiBrB,IAAAA,CAAKoB;AAAgB,KAAA;AACpE,IAAA,GAAIT,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACAW,EAAAA,kCAAAA,CAAqBR,WAAAA,EAAa,uBAAuB,GAAA,CAAA;AACzD,EAAA,OAAOA,WAAAA;AACX,CAAA,EA5B8C,gCAAA,CAAA;;;ADGvC,IAAMS,yBAAAA,mBAA4BzB,mBAAA,CAAA,OAAOC,WAAAA,EAAaE,QAAAA,EAAUuB,MAAAA,KAAAA;AACnE,EAAA,MAAMC,OAAAA,GAAUxB,SAASF,WAAAA,CAAAA;AACzB,EAAA,IAAIE,QAAAA,CAASF,WAAAA,CAAAA,EAAc;AACvB,IAAA,MAAM2B,iBAAAA,GAAoBD,QAAQ,oBAAA,CAAA;AAClC,IAAA,IAAIC,sBAAsBrB,MAAAA,EAAW;AACjC,MAAA,MAAMsB,WAAAA,GAAcC,eAAUC,kBAAAA,CAAAA;AAC9B,MAAA,IAAI;AACA,QAAA,MAAM,EAAEC,MAAAA,EAAM,GAAK,MAAMH,YAAYD,iBAAAA,CAAAA;AACrC,QAAA,IAAI1B,IAAAA;AACJ,QAAA,IAAI;AACAA,UAAAA,IAAAA,GAAO+B,IAAAA,CAAKC,KAAAA,CAAMF,MAAAA,CAAOG,IAAAA,EAAI,CAAA;QACjC,CAAA,CAAA,MACM;AACF,UAAA,MAAM9B,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,0CAAAA,CAAuD,CAAA;AAClF,QAAA;AACA,QAAA,OAAOF,8BAAAA,CAA+BE,WAAAA,EAAaC,IAAAA,EAAMC,QAAAA,CAAAA;AAC7D,MAAA,CAAA,CAAA,OACOiC,KAAAA,EAAO;AACV,QAAA,MAAM,IAAIC,qCAAAA,CAAyBD,KAAAA,CAAME,OAAAA,EAAS;AAAEZ,UAAAA;SAAO,CAAA;AAC/D,MAAA;IACJ,CAAA,MACK;AACD,MAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,QAAA,EAAWpC,WAAAA,CAAAA,oCAAAA,CAAAA,EAAmD;AAAEyB,QAAAA;OAAO,CAAA;AAC9G,IAAA;EACJ,CAAA,MACK;AACD,IAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,QAAA,EAAWpC,WAAAA,CAAAA,+CAAAA,CAAAA,EAA8D;AACxGyB,MAAAA;KACJ,CAAA;AACJ,EAAA;AACJ,CAAA,EA9ByC,2BAAA,CAAA;;;ADFlC,IAAMa,WAAAA,mBAAcvC,mBAAA,CAAA,CAACwC,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACxED,EAAAA,IAAAA,CAAKd,MAAAA,EAAQgB,MAAM,oDAAA,CAAA;AACnB,EAAA,MAAMvC,QAAAA,GAAW,MAAMwC,4BAAAA,CAAgBH,IAAAA,CAAAA;AACvC,EAAA,OAAOf,0BAA0BmB,2BAAAA,CAAe;IAC5CjB,OAAAA,EAASa,IAAAA,CAAKb,WAAWc,kBAAAA,EAAoBd;GACjD,CAAA,EAAIxB,QAAAA,EAAUqC,IAAAA,CAAKd,MAAM,CAAA;AAC7B,CAAA,EAN2B,aAAA","file":"
|
|
1
|
+
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-process@3.879.0/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js"],"names":["init_cjs_shims","getValidatedProcessCredentials","__name","profileName","data","profiles","Version","Error","AccessKeyId","undefined","SecretAccessKey","Expiration","currentTime","Date","expireTime","accountId","AccountId","aws_account_id","credentials","accessKeyId","secretAccessKey","SessionToken","sessionToken","expiration","CredentialScope","credentialScope","setCredentialFeature","resolveProcessCredentials","logger","profile","credentialProcess","execPromise","promisify","exec","stdout","JSON","parse","trim","error","CredentialsProviderError","message","fromProcess","init","callerClientConfig","debug","parseKnownFiles","getProfileName"],"mappings":";;;;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AACO,IAAMC,8BAAAA,mBAAiCC,mBAAA,CAAA,CAACC,WAAAA,EAAaC,IAAAA,EAAMC,QAAAA,KAAAA;AAC9D,EAAA,IAAID,IAAAA,CAAKE,YAAY,CAAA,EAAG;AACpB,IAAA,MAAMC,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACrF,EAAA;AACA,EAAA,IAAIC,IAAAA,CAAKI,WAAAA,KAAgBC,MAAAA,IAAaL,IAAAA,CAAKM,oBAAoBD,MAAAA,EAAW;AACtE,IAAA,MAAMF,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,iDAAAA,CAA8D,CAAA;AACzF,EAAA;AACA,EAAA,IAAIC,KAAKO,UAAAA,EAAY;AACjB,IAAA,MAAMC,WAAAA,uBAAkBC,IAAAA,EAAAA;AACxB,IAAA,MAAMC,UAAAA,GAAa,IAAID,IAAAA,CAAKT,IAAAA,CAAKO,UAAU,CAAA;AAC3C,IAAA,IAAIG,aAAaF,WAAAA,EAAa;AAC1B,MAAA,MAAML,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,iDAAAA,CAA8D,CAAA;AACzF,IAAA;AACJ,EAAA;AACA,EAAA,IAAIY,YAAYX,IAAAA,CAAKY,SAAAA;AACrB,EAAA,IAAI,CAACD,SAAAA,IAAaV,QAAAA,GAAWF,WAAAA,GAAcc,cAAAA,EAAgB;AACvDF,IAAAA,SAAAA,GAAYV,QAAAA,CAASF,WAAAA,CAAAA,CAAac,cAAAA;AACtC,EAAA;AACA,EAAA,MAAMC,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAaf,IAAAA,CAAKI,WAAAA;AAClBY,IAAAA,eAAAA,EAAiBhB,IAAAA,CAAKM,eAAAA;AACtB,IAAA,GAAIN,KAAKiB,YAAAA,IAAgB;AAAEC,MAAAA,YAAAA,EAAclB,IAAAA,CAAKiB;AAAa,KAAA;AAC3D,IAAA,GAAIjB,KAAKO,UAAAA,IAAc;MAAEY,UAAAA,EAAY,IAAIV,IAAAA,CAAKT,IAAAA,CAAKO,UAAU;AAAE,KAAA;AAC/D,IAAA,GAAIP,KAAKoB,eAAAA,IAAmB;AAAEC,MAAAA,eAAAA,EAAiBrB,IAAAA,CAAKoB;AAAgB,KAAA;AACpE,IAAA,GAAIT,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACAW,EAAAA,kCAAAA,CAAqBR,WAAAA,EAAa,uBAAuB,GAAA,CAAA;AACzD,EAAA,OAAOA,WAAAA;AACX,CAAA,EA5B8C,gCAAA,CAAA;;;ADGvC,IAAMS,yBAAAA,mBAA4BzB,mBAAA,CAAA,OAAOC,WAAAA,EAAaE,QAAAA,EAAUuB,MAAAA,KAAAA;AACnE,EAAA,MAAMC,OAAAA,GAAUxB,SAASF,WAAAA,CAAAA;AACzB,EAAA,IAAIE,QAAAA,CAASF,WAAAA,CAAAA,EAAc;AACvB,IAAA,MAAM2B,iBAAAA,GAAoBD,QAAQ,oBAAA,CAAA;AAClC,IAAA,IAAIC,sBAAsBrB,MAAAA,EAAW;AACjC,MAAA,MAAMsB,WAAAA,GAAcC,eAAUC,kBAAAA,CAAAA;AAC9B,MAAA,IAAI;AACA,QAAA,MAAM,EAAEC,MAAAA,EAAM,GAAK,MAAMH,YAAYD,iBAAAA,CAAAA;AACrC,QAAA,IAAI1B,IAAAA;AACJ,QAAA,IAAI;AACAA,UAAAA,IAAAA,GAAO+B,IAAAA,CAAKC,KAAAA,CAAMF,MAAAA,CAAOG,IAAAA,EAAI,CAAA;QACjC,CAAA,CAAA,MACM;AACF,UAAA,MAAM9B,KAAAA,CAAM,CAAA,QAAA,EAAWJ,WAAAA,CAAAA,0CAAAA,CAAuD,CAAA;AAClF,QAAA;AACA,QAAA,OAAOF,8BAAAA,CAA+BE,WAAAA,EAAaC,IAAAA,EAAMC,QAAAA,CAAAA;AAC7D,MAAA,CAAA,CAAA,OACOiC,KAAAA,EAAO;AACV,QAAA,MAAM,IAAIC,qCAAAA,CAAyBD,KAAAA,CAAME,OAAAA,EAAS;AAAEZ,UAAAA;SAAO,CAAA;AAC/D,MAAA;IACJ,CAAA,MACK;AACD,MAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,QAAA,EAAWpC,WAAAA,CAAAA,oCAAAA,CAAAA,EAAmD;AAAEyB,QAAAA;OAAO,CAAA;AAC9G,IAAA;EACJ,CAAA,MACK;AACD,IAAA,MAAM,IAAIW,qCAAAA,CAAyB,CAAA,QAAA,EAAWpC,WAAAA,CAAAA,+CAAAA,CAAAA,EAA8D;AACxGyB,MAAAA;KACJ,CAAA;AACJ,EAAA;AACJ,CAAA,EA9ByC,2BAAA,CAAA;;;ADFlC,IAAMa,WAAAA,mBAAcvC,mBAAA,CAAA,CAACwC,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACxED,EAAAA,IAAAA,CAAKd,MAAAA,EAAQgB,MAAM,oDAAA,CAAA;AACnB,EAAA,MAAMvC,QAAAA,GAAW,MAAMwC,4BAAAA,CAAgBH,IAAAA,CAAAA;AACvC,EAAA,OAAOf,0BAA0BmB,2BAAAA,CAAe;IAC5CjB,OAAAA,EAASa,IAAAA,CAAKb,WAAWc,kBAAAA,EAAoBd;GACjD,CAAA,EAAIxB,QAAAA,EAAUqC,IAAAA,CAAKd,MAAM,CAAA;AAC7B,CAAA,EAN2B,aAAA","file":"LH4V3GFX.cjs","sourcesContent":["export * from \"./fromProcess\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProcessCredentials } from \"./resolveProcessCredentials\";\nexport const fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-process - fromProcess\");\n const profiles = await parseKnownFiles(init);\n return resolveProcessCredentials(getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n }), profiles, init.logger);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { exec } from \"child_process\";\nimport { promisify } from \"util\";\nimport { getValidatedProcessCredentials } from \"./getValidatedProcessCredentials\";\nexport const resolveProcessCredentials = async (profileName, profiles, logger) => {\n const profile = profiles[profileName];\n if (profiles[profileName]) {\n const credentialProcess = profile[\"credential_process\"];\n if (credentialProcess !== undefined) {\n const execPromise = promisify(exec);\n try {\n const { stdout } = await execPromise(credentialProcess);\n let data;\n try {\n data = JSON.parse(stdout.trim());\n }\n catch {\n throw Error(`Profile ${profileName} credential_process returned invalid JSON.`);\n }\n return getValidatedProcessCredentials(profileName, data, profiles);\n }\n catch (error) {\n throw new CredentialsProviderError(error.message, { logger });\n }\n }\n else {\n throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });\n }\n }\n else {\n throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {\n logger,\n });\n }\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const getValidatedProcessCredentials = (profileName, data, profiles) => {\n if (data.Version !== 1) {\n throw Error(`Profile ${profileName} credential_process did not return Version 1.`);\n }\n if (data.AccessKeyId === undefined || data.SecretAccessKey === undefined) {\n throw Error(`Profile ${profileName} credential_process returned invalid credentials.`);\n }\n if (data.Expiration) {\n const currentTime = new Date();\n const expireTime = new Date(data.Expiration);\n if (expireTime < currentTime) {\n throw Error(`Profile ${profileName} credential_process returned expired credentials.`);\n }\n }\n let accountId = data.AccountId;\n if (!accountId && profiles?.[profileName]?.aws_account_id) {\n accountId = profiles[profileName].aws_account_id;\n }\n const credentials = {\n accessKeyId: data.AccessKeyId,\n secretAccessKey: data.SecretAccessKey,\n ...(data.SessionToken && { sessionToken: data.SessionToken }),\n ...(data.Expiration && { expiration: new Date(data.Expiration) }),\n ...(data.CredentialScope && { credentialScope: data.CredentialScope }),\n ...(accountId && { accountId }),\n };\n setCredentialFeature(credentials, \"CREDENTIALS_PROCESS\", \"w\");\n return credentials;\n};\n"]}
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
var U7VZULNU_cjs = require('./U7VZULNU.cjs');
|
|
4
|
+
var z = require('zod');
|
|
5
|
+
|
|
6
|
+
function _interopNamespace(e) {
|
|
7
|
+
if (e && e.__esModule) return e;
|
|
8
|
+
var n = Object.create(null);
|
|
9
|
+
if (e) {
|
|
10
|
+
Object.keys(e).forEach(function (k) {
|
|
11
|
+
if (k !== 'default') {
|
|
12
|
+
var d = Object.getOwnPropertyDescriptor(e, k);
|
|
13
|
+
Object.defineProperty(n, k, d.get ? d : {
|
|
14
|
+
enumerable: true,
|
|
15
|
+
get: function () { return e[k]; }
|
|
16
|
+
});
|
|
17
|
+
}
|
|
18
|
+
});
|
|
19
|
+
}
|
|
20
|
+
n.default = e;
|
|
21
|
+
return Object.freeze(n);
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
var z__namespace = /*#__PURE__*/_interopNamespace(z);
|
|
25
|
+
|
|
26
|
+
// src/types/docker.ts
|
|
27
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
28
|
+
var volumeMappingBaseSchema = z__namespace.object({
|
|
29
|
+
containerPath: z__namespace.string()
|
|
30
|
+
});
|
|
31
|
+
var hostVolumeMappingSchema = volumeMappingBaseSchema.extend({
|
|
32
|
+
type: z__namespace.literal("host"),
|
|
33
|
+
hostPath: z__namespace.string()
|
|
34
|
+
});
|
|
35
|
+
var isolateVolumeMappingSchema = volumeMappingBaseSchema.extend({
|
|
36
|
+
type: z__namespace.literal("isolate"),
|
|
37
|
+
name: z__namespace.string(),
|
|
38
|
+
shared: z__namespace.optional(z__namespace.boolean()),
|
|
39
|
+
locked: z__namespace.optional(z__namespace.boolean())
|
|
40
|
+
});
|
|
41
|
+
var volumeMappingSchema = z__namespace.union([
|
|
42
|
+
hostVolumeMappingSchema,
|
|
43
|
+
isolateVolumeMappingSchema
|
|
44
|
+
]);
|
|
45
|
+
|
|
46
|
+
exports.volumeMappingSchema = volumeMappingSchema;
|
|
47
|
+
//# sourceMappingURL=LNCARCBD.cjs.map
|
|
48
|
+
//# sourceMappingURL=LNCARCBD.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/types/docker.ts"],"names":["init_cjs_shims","volumeMappingBaseSchema","object","containerPath","string","hostVolumeMappingSchema","extend","type","literal","hostPath","isolateVolumeMappingSchema","name","shared","optional","boolean","locked","volumeMappingSchema","union"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAAA,2BAAA,EAAA;AAEA,IAAMC,0BAA4BC,YAAAA,CAAAA,MAAAA,CAAO;AACrCC,EAAAA,aAAAA,EAAiBC,YAAAA,CAAAA,MAAAA;AACrB,CAAA,CAAA;AAEA,IAAMC,uBAAAA,GAA0BJ,wBAAwBK,MAAAA,CAAO;AAC3DC,EAAAA,IAAAA,EAAQC,qBAAQ,MAAA,CAAA;AAChBC,EAAAA,QAAAA,EAAYL,YAAAA,CAAAA,MAAAA;AAChB,CAAA,CAAA;AAEA,IAAMM,0BAAAA,GAA6BT,wBAAwBK,MAAAA,CAAO;AAC9DC,EAAAA,IAAAA,EAAQC,qBAAQ,SAAA,CAAA;AAChBG,EAAAA,IAAAA,EAAQP,YAAAA,CAAAA,MAAAA,EAAM;EACdQ,MAAAA,EAAUC,YAAAA,CAAAA,QAAAA,CAAWC,sBAAO,CAAA;EAC5BC,MAAAA,EAAUF,YAAAA,CAAAA,QAAAA,CAAWC,sBAAO;AAChC,CAAA,CAAA;AAEO,IAAME,sBAAwBC,YAAAA,CAAAA,KAAAA,CAAM;AAACZ,EAAAA,uBAAAA;AAAyBK,EAAAA;AAA2B,CAAA","file":"LNCARCBD.cjs","sourcesContent":["import * as z from 'zod';\n\nconst volumeMappingBaseSchema = z.object({\n containerPath: z.string(),\n});\n\nconst hostVolumeMappingSchema = volumeMappingBaseSchema.extend({\n type: z.literal('host'),\n hostPath: z.string(),\n});\n\nconst isolateVolumeMappingSchema = volumeMappingBaseSchema.extend({\n type: z.literal('isolate'),\n name: z.string(),\n shared: z.optional(z.boolean()),\n locked: z.optional(z.boolean()),\n});\n\nexport const volumeMappingSchema = z.union([hostVolumeMappingSchema, isolateVolumeMappingSchema]);\n\nexport type VolumeMapping = z.infer<typeof volumeMappingSchema>;\n\n/**\n * Environment variable configuration for Docker containers\n */\nexport interface EnvironmentVariable {\n name: string;\n value: string;\n}\n"]}
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
var FOFSZBOK_cjs = require('./FOFSZBOK.cjs');
|
|
4
|
+
var U7VZULNU_cjs = require('./U7VZULNU.cjs');
|
|
5
|
+
|
|
6
|
+
// src/display/formatters.ts
|
|
7
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
8
|
+
function formatVersionCombination(combination, isDefault) {
|
|
9
|
+
const tools = Object.entries(FOFSZBOK_cjs.findToolVersionsForCombination(combination)).filter(([_, version]) => version !== void 0).map(([tool, version]) => `${tool}:${version}`).join(", ");
|
|
10
|
+
const badges = [
|
|
11
|
+
isDefault ? "\u{1F3AF} Default" : null,
|
|
12
|
+
combination.stable ? "\u2705 Stable" : null,
|
|
13
|
+
combination.description
|
|
14
|
+
].filter(Boolean).join(" ");
|
|
15
|
+
return ` ${FOFSZBOK_cjs.getCombinationId(combination)}: ${tools} ${badges}`;
|
|
16
|
+
}
|
|
17
|
+
U7VZULNU_cjs.__name(formatVersionCombination, "formatVersionCombination");
|
|
18
|
+
|
|
19
|
+
exports.formatVersionCombination = formatVersionCombination;
|
|
20
|
+
//# sourceMappingURL=M6KBN6B2.cjs.map
|
|
21
|
+
//# sourceMappingURL=M6KBN6B2.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/display/formatters.ts"],"names":["init_cjs_shims","formatVersionCombination","combination","isDefault","tools","Object","entries","findToolVersionsForCombination","filter","_","version","undefined","map","tool","join","badges","stable","description","Boolean","getCombinationId"],"mappings":";;;;;;AACAA,2BAAA,EAAA;AAMO,SAASC,wBAAAA,CACZC,aACAC,SAAAA,EAAmB;AAEnB,EAAA,MAAMC,KAAAA,GAAQC,MAAAA,CAAOC,OAAAA,CAAQC,2CAAAA,CAA+BL,WAAAA,CAAAA,CAAAA,CACvDM,MAAAA,CAAO,CAAC,CAACC,CAAAA,EAAGC,OAAAA,CAAAA,KAAaA,OAAAA,KAAYC,MAAAA,CAAAA,CACrCC,GAAAA,CAAI,CAAC,CAACC,IAAAA,EAAMH,OAAAA,CAAAA,KAAa,CAAA,EAAGG,IAAAA,CAAAA,CAAAA,EAAQH,OAAAA,CAAAA,CAAS,CAAA,CAC7CI,KAAK,IAAA,CAAA;AAEV,EAAA,MAAMC,MAAAA,GAAS;AACXZ,IAAAA,SAAAA,GAAY,mBAAA,GAAe,IAAA;AAC3BD,IAAAA,WAAAA,CAAYc,SAAS,eAAA,GAAa,IAAA;IAClCd,WAAAA,CAAYe;IAEXT,MAAAA,CAAOU,OAAAA,CAAAA,CACPJ,IAAAA,CAAK,GAAA,CAAA;AAEV,EAAA,OAAO,KAAKK,6BAAAA,CAAiBjB,WAAAA,CAAAA,CAAAA,EAAAA,EAAiBE,KAAAA,IAASW,MAAAA,CAAAA,CAAAA;AAC3D;AAlBgBd,mBAAAA,CAAAA,wBAAAA,EAAAA,0BAAAA,CAAAA","file":"M6KBN6B2.cjs","sourcesContent":["import type { VersionCombination } from '../config';\nimport { getCombinationId } from '../utils';\nimport { findToolVersionsForCombination } from '../utils/finder';\n\n/**\n * Format version combinations for display\n */\nexport function formatVersionCombination(\n combination: VersionCombination,\n isDefault?: boolean,\n): string {\n const tools = Object.entries(findToolVersionsForCombination(combination))\n .filter(([_, version]) => version !== undefined)\n .map(([tool, version]) => `${tool}:${version}`)\n .join(', ');\n\n const badges = [\n isDefault ? '🎯 Default' : null,\n combination.stable ? '✅ Stable' : null,\n combination.description,\n ]\n .filter(Boolean)\n .join(' ');\n\n return ` ${getCombinationId(combination)}: ${tools} ${badges}`;\n}\n"]}
|
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
+
var _7WVEMAKW_cjs = require('./7WVEMAKW.cjs');
|
|
3
4
|
var P5BPMTGP_cjs = require('./P5BPMTGP.cjs');
|
|
4
5
|
require('./WDSPHVPJ.cjs');
|
|
5
|
-
var _7WVEMAKW_cjs = require('./7WVEMAKW.cjs');
|
|
6
6
|
var JGLHYXTW_cjs = require('./JGLHYXTW.cjs');
|
|
7
7
|
var U7VZULNU_cjs = require('./U7VZULNU.cjs');
|
|
8
8
|
var fs = require('fs');
|
|
@@ -34,7 +34,7 @@ U7VZULNU_cjs.init_cjs_shims();
|
|
|
34
34
|
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
|
|
35
35
|
U7VZULNU_cjs.init_cjs_shims();
|
|
36
36
|
var getSsoOidcClient = /* @__PURE__ */ U7VZULNU_cjs.__name(async (ssoRegion, init = {}) => {
|
|
37
|
-
const { SSOOIDCClient } = await import('./
|
|
37
|
+
const { SSOOIDCClient } = await import('./ASYXJJD4.cjs');
|
|
38
38
|
const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
|
|
39
39
|
region: ssoRegion ?? init.clientConfig?.region,
|
|
40
40
|
logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger
|
|
@@ -44,7 +44,7 @@ var getSsoOidcClient = /* @__PURE__ */ U7VZULNU_cjs.__name(async (ssoRegion, ini
|
|
|
44
44
|
|
|
45
45
|
// ../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
|
|
46
46
|
var getNewSsoOidcToken = /* @__PURE__ */ U7VZULNU_cjs.__name(async (ssoToken, ssoRegion, init = {}) => {
|
|
47
|
-
const { CreateTokenCommand } = await import('./
|
|
47
|
+
const { CreateTokenCommand } = await import('./ASYXJJD4.cjs');
|
|
48
48
|
const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);
|
|
49
49
|
return ssoOidcClient.send(new CreateTokenCommand({
|
|
50
50
|
clientId: ssoToken.clientId,
|
|
@@ -201,7 +201,7 @@ var resolveSSOCredentials = /* @__PURE__ */ U7VZULNU_cjs.__name(async ({ ssoStar
|
|
|
201
201
|
});
|
|
202
202
|
}
|
|
203
203
|
const { accessToken } = token;
|
|
204
|
-
const { SSOClient, GetRoleCredentialsCommand } = await import('./
|
|
204
|
+
const { SSOClient, GetRoleCredentialsCommand } = await import('./SHJCZ6NL.cjs');
|
|
205
205
|
const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
|
|
206
206
|
logger: clientConfig?.logger ?? parentClientConfig?.logger,
|
|
207
207
|
region: clientConfig?.region ?? ssoRegion
|
|
@@ -338,5 +338,5 @@ U7VZULNU_cjs.init_cjs_shims();
|
|
|
338
338
|
exports.fromSSO = fromSSO;
|
|
339
339
|
exports.isSsoProfile = isSsoProfile;
|
|
340
340
|
exports.validateSsoProfile = validateSsoProfile;
|
|
341
|
-
//# sourceMappingURL=
|
|
342
|
-
//# sourceMappingURL=
|
|
341
|
+
//# sourceMappingURL=MQTCD42Y.cjs.map
|
|
342
|
+
//# sourceMappingURL=MQTCD42Y.cjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/types.js"],"names":["init_cjs_shims","isSsoProfile","arg","sso_start_url","sso_account_id","sso_session","sso_region","sso_role_name","EXPIRE_WINDOW_MS","REFRESH_MESSAGE","getSsoOidcClient","__name","ssoRegion","init","SSOOIDCClient","ssoOidcClient","Object","assign","clientConfig","region","logger","parentClientConfig","getNewSsoOidcToken","ssoToken","CreateTokenCommand","send","clientId","clientSecret","refreshToken","grantType","validateTokenExpiry","token","expiration","getTime","Date","now","TokenProviderError","validateTokenKey","key","value","forRefresh","writeFile","fsPromises","writeSSOTokenToFile","id","tokenFilepath","getSSOTokenFilepath","tokenString","JSON","stringify","lastRefreshAttemptTime","fromSso","_init","callerClientConfig","debug","profiles","parseKnownFiles","profileName","getProfileName","profile","ssoSessionName","ssoSessions","loadSsoSessionData","ssoSession","ssoSessionRequiredKey","getSSOTokenFromFile","e","accessToken","expiresAt","existingToken","setTime","newSsoOidcToken","expiresIn","newTokenExpiration","toISOString","error","SHOULD_FAIL_CREDENTIAL_CHAIN","resolveSSOCredentials","ssoStartUrl","ssoAccountId","ssoRoleName","ssoClient","refreshMessage","_token","getSsoTokenProvider","CredentialsProviderError","message","tryNextLink","SSOClient","GetRoleCredentialsCommand","sso","ssoResp","accountId","roleName","roleCredentials","accessKeyId","secretAccessKey","sessionToken","credentialScope","credentials","setCredentialFeature","validateSsoProfile","keys","join","fromSSO","session","conflictMsg"],"mappings":";;;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMC,YAAAA,wCAAgBC,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIC,aAAAA,KAAkB,QAAA,IAC1B,OAAOD,GAAAA,CAAIE,cAAAA,KAAmB,YAC9B,OAAOF,GAAAA,CAAIG,WAAAA,KAAgB,QAAA,IAC3B,OAAOH,GAAAA,CAAII,eAAe,QAAA,IAC1B,OAAOJ,GAAAA,CAAIK,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA;;;ACA5BP,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMQ,gBAAAA,GAAmB,IAAI,EAAA,GAAK,GAAA;AAClC,IAAMC,eAAAA,GAAkB,CAAA,+EAAA,CAAA;;;ACD/BT,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMU,gBAAAA,mBAAmBC,mBAAA,CAAA,OAAOC,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACvD,EAAA,MAAM,EAAEC,aAAAA,EAAa,GAAK,MAAM,OAAO,gBAAA,CAAA;AACvC,EAAA,MAAMC,aAAAA,GAAgB,IAAID,aAAAA,CAAcE,MAAAA,CAAOC,MAAAA,CAAO,EAAC,EAAGJ,IAAAA,CAAKK,YAAAA,IAAgB,EAAC,EAAG;IAC/EC,MAAAA,EAAQP,SAAAA,IAAaC,KAAKK,YAAAA,EAAcC,MAAAA;AACxCC,IAAAA,MAAAA,EAAQP,IAAAA,CAAKK,YAAAA,EAAcE,MAAAA,IAAUP,IAAAA,CAAKQ,kBAAAA,EAAoBD;AAClE,GAAA,CAAA,CAAA;AACA,EAAA,OAAOL,aAAAA;AACX,CAAA,EAPgC,kBAAA,CAAA;;;ADCzB,IAAMO,qCAAqBX,mBAAA,CAAA,OAAOY,QAAAA,EAAUX,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACnE,EAAA,MAAM,EAAEW,kBAAAA,EAAkB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC5C,EAAA,MAAMT,aAAAA,GAAgB,MAAML,gBAAAA,CAAiBE,SAAAA,EAAWC,IAAAA,CAAAA;AACxD,EAAA,OAAOE,aAAAA,CAAcU,IAAAA,CAAK,IAAID,kBAAAA,CAAmB;AAC7CE,IAAAA,QAAAA,EAAUH,QAAAA,CAASG,QAAAA;AACnBC,IAAAA,YAAAA,EAAcJ,QAAAA,CAASI,YAAAA;AACvBC,IAAAA,YAAAA,EAAcL,QAAAA,CAASK,YAAAA;IACvBC,SAAAA,EAAW;AACf,GAAA,CAAA,CAAA;AACJ,CAAA,EATkC,oBAAA,CAAA;;;AEDlC7B,2BAAA,EAAA;AAEO,IAAM8B,mBAAAA,wCAAuBC,KAAAA,KAAAA;AAChC,EAAA,IAAIA,KAAAA,CAAMC,cAAcD,KAAAA,CAAMC,UAAAA,CAAWC,SAAO,GAAKC,IAAAA,CAAKC,KAAG,EAAI;AAC7D,IAAA,MAAM,IAAIC,+BAAAA,CAAmB,CAAA,kBAAA,EAAqB3B,eAAAA,IAAmB,KAAA,CAAA;AACzE,EAAA;AACJ,CAAA,EAJmC,qBAAA,CAAA;;;ACFnCT,2BAAA,EAAA;AAEO,IAAMqC,gBAAAA,mBAAmB1B,mBAAA,CAAA,CAAC2B,GAAAA,EAAKC,KAAAA,EAAOC,aAAa,KAAA,KAAK;AAC3D,EAAA,IAAI,OAAOD,UAAU,WAAA,EAAa;AAC9B,IAAA,MAAM,IAAIH,+BAAAA,CAAmB,CAAA,uBAAA,EAA0BE,GAAAA,CAAAA,cAAAA,EAAoBE,UAAAA,GAAa,kBAAA,GAAqB,EAAA,CAAA,EAAA,EAAO/B,eAAAA,CAAAA,CAAAA,EAAmB,KAAA,CAAA;AAC3I,EAAA;AACJ,CAAA,EAJgC,kBAAA,CAAA;;;ACFhCT,2BAAA,EAAA;AAEA,IAAM,EAAEyC,WAAS,GAAKC,WAAAA;AACf,IAAMC,mBAAAA,mBAAsBhC,mBAAA,CAAA,CAACiC,EAAAA,EAAIrB,QAAAA,KAAAA;AACpC,EAAA,MAAMsB,aAAAA,GAAgBC,iCAAoBF,EAAAA,CAAAA;AAC1C,EAAA,MAAMG,WAAAA,GAAcC,IAAAA,CAAKC,SAAAA,CAAU1B,QAAAA,EAAU,MAAM,CAAA,CAAA;AACnD,EAAA,OAAOkB,SAAAA,CAAUI,eAAeE,WAAAA,CAAAA;AACpC,CAAA,EAJmC,qBAAA,CAAA;;;ANInC,IAAMG,sBAAAA,mBAAyB,IAAIhB,IAAAA,CAAK,CAAA,CAAA;AACjC,IAAMiB,OAAAA,mBAAUxC,mBAAA,CAAA,CAACyC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMxC,IAAAA,GAAO;IACT,GAAGuC,KAAAA;IACH/B,kBAAAA,EAAoB;MAChB,GAAGgC,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM/B;AACb;AACJ,GAAA;AACAR,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,oCAAA,CAAA;AACnB,EAAA,MAAMC,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,MAAMA,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,EAAA,IAAI,CAACE,OAAAA,EAAS;AACV,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,oDAA+D,KAAA,CAAA;EAC5G,CAAA,MAAA,IACS,CAACE,OAAAA,CAAQ,aAAA,CAAA,EAAgB;AAC9B,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACvG,EAAA;AACA,EAAA,MAAMG,cAAAA,GAAiBD,QAAQ,aAAA,CAAA;AAC/B,EAAA,MAAME,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,EAAA,MAAMkD,UAAAA,GAAaF,YAAYD,cAAAA,CAAAA;AAC/B,EAAA,IAAI,CAACG,UAAAA,EAAY;AACb,IAAA,MAAM,IAAI3B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,oDAAkE,KAAA,CAAA;AACnH,EAAA;AACA,EAAA,KAAA,MAAWI,qBAAAA,IAAyB;AAAC,IAAA,eAAA;AAAiB,IAAA;AAAe,GAAA,EAAA;AACjE,IAAA,IAAI,CAACD,UAAAA,CAAWC,qBAAAA,CAAAA,EAAwB;AACpC,MAAA,MAAM,IAAI5B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,CAAAA,gCAAAA,EAAiDI,qBAAAA,MAA2B,KAAA,CAAA;AAC7H,IAAA;AACJ,EAAA;AACA,EAAoBD,WAAW,eAAA;AAC/B,EAAA,MAAMnD,SAAAA,GAAYmD,WAAW,YAAA,CAAA;AAC7B,EAAA,IAAIxC,QAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,QAAAA,GAAW,MAAM0C,iCAAoBL,cAAAA,CAAAA;AACzC,EAAA,CAAA,CAAA,OACOM,CAAAA,EAAG;AACN,IAAA,MAAM,IAAI9B,+BAAAA,CAAmB,CAAA,8CAAA,EAAiDqB,WAAAA,CAAAA,8BAAAA,EAA4ChD,eAAAA,IAAmB,KAAA,CAAA;AACjJ,EAAA;AACA4B,EAAAA,gBAAAA,CAAiB,aAAA,EAAed,SAAS4C,WAAW,CAAA;AACpD9B,EAAAA,gBAAAA,CAAiB,WAAA,EAAad,SAAS6C,SAAS,CAAA;AAChD,EAAA,MAAM,EAAED,WAAAA,EAAaC,SAAAA,EAAS,GAAK7C,QAAAA;AACnC,EAAA,MAAM8C,aAAAA,GAAgB;IAAEtC,KAAAA,EAAOoC,WAAAA;IAAanC,UAAAA,EAAY,IAAIE,KAAKkC,SAAAA;AAAW,GAAA;AAC5E,EAAA,IAAIC,cAAcrC,UAAAA,CAAWC,OAAAA,KAAYC,IAAAA,CAAKC,GAAAA,KAAQ3B,gBAAAA,EAAkB;AACpE,IAAA,OAAO6D,aAAAA;AACX,EAAA;AACA,EAAA,IAAInC,KAAKC,GAAAA,EAAG,GAAKe,uBAAuBjB,OAAAA,EAAO,GAAK,KAAK,GAAA,EAAM;AAC3DH,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACAhC,EAAAA,gBAAAA,CAAiB,UAAA,EAAYd,QAAAA,CAASG,QAAAA,EAAU,IAAA,CAAA;AAChDW,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASI,YAAAA,EAAc,IAAA,CAAA;AACxDU,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASK,YAAAA,EAAc,IAAA,CAAA;AACxD,EAAA,IAAI;AACAsB,IAAAA,sBAAAA,CAAuBoB,OAAAA,CAAQpC,IAAAA,CAAKC,GAAAA,EAAG,CAAA;AACvC,IAAA,MAAMoC,eAAAA,GAAkB,MAAMjD,kBAAAA,CAAmBC,QAAAA,EAAUX,WAAWC,IAAAA,CAAAA;AACtEwB,IAAAA,gBAAAA,CAAiB,aAAA,EAAekC,gBAAgBJ,WAAW,CAAA;AAC3D9B,IAAAA,gBAAAA,CAAiB,WAAA,EAAakC,gBAAgBC,SAAS,CAAA;AACvD,IAAA,MAAMC,kBAAAA,GAAqB,IAAIvC,IAAAA,CAAKA,IAAAA,CAAKC,KAAG,GAAKoC,eAAAA,CAAgBC,YAAY,GAAA,CAAA;AAC7E,IAAA,IAAI;AACA,MAAA,MAAM7B,oBAAoBiB,cAAAA,EAAgB;QACtC,GAAGrC,QAAAA;AACH4C,QAAAA,WAAAA,EAAaI,eAAAA,CAAgBJ,WAAAA;AAC7BC,QAAAA,SAAAA,EAAWK,mBAAmBC,WAAAA,EAAW;AACzC9C,QAAAA,YAAAA,EAAc2C,eAAAA,CAAgB3C;OAClC,CAAA;AACJ,IAAA,CAAA,CAAA,OACO+C,KAAAA,EAAO;AACd,IAAA;AACA,IAAA,OAAO;AACH5C,MAAAA,KAAAA,EAAOwC,eAAAA,CAAgBJ,WAAAA;MACvBnC,UAAAA,EAAYyC;AAChB,KAAA;AACJ,EAAA,CAAA,CAAA,OACOE,KAAAA,EAAO;AACV7C,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACJ,CAAA,EA/EuB,SAAA,CAAA;;;ADJvB,IAAMO,4BAAAA,GAA+B,KAAA;AAC9B,IAAMC,qBAAAA,mBAAwBlE,mBAAA,CAAA,OAAO,EAAEmE,WAAAA,EAAaf,UAAAA,EAAYgB,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAaC,SAAAA,EAAW/D,YAAAA,EAAcG,kBAAAA,EAAoBsC,OAAAA,EAASvC,QAAM,KAAG;AACxK,EAAA,IAAIW,KAAAA;AACJ,EAAA,MAAMmD,cAAAA,GAAiB,CAAA,6EAAA,CAAA;AACvB,EAAA,IAAInB,UAAAA,EAAY;AACZ,IAAA,IAAI;AACA,MAAA,MAAMoB,MAAAA,GAAS,MAAMC,OAAAA,CAAoB;AAAEzB,QAAAA;AAAQ,OAAA,CAAA,EAAA;AACnD5B,MAAAA,KAAAA,GAAQ;AACJoC,QAAAA,WAAAA,EAAagB,MAAAA,CAAOpD,KAAAA;AACpBqC,QAAAA,SAAAA,EAAW,IAAIlC,IAAAA,CAAKiD,MAAAA,CAAOnD,UAAU,EAAE0C,WAAAA;AAC3C,OAAA;AACJ,IAAA,CAAA,CAAA,OACOR,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyBnB,CAAAA,CAAEoB,OAAAA,EAAS;QAC1CC,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;EACJ,CAAA,MACK;AACD,IAAA,IAAI;AACAW,MAAAA,KAAAA,GAAQ,MAAMkC,iCAAoBa,WAAAA,CAAAA;AACtC,IAAA,CAAA,CAAA,OACOZ,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyB,CAAA,yDAAA,EAA4DH,cAAAA,CAAAA,CAAAA,EAAkB;QAC7GK,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;AACJ,EAAA;AACA,EAAA,IAAI,IAAIc,IAAAA,CAAKH,KAAAA,CAAMqC,SAAS,CAAA,CAAEnC,SAAO,GAAKC,IAAAA,CAAKC,GAAAA,EAAG,IAAM,CAAA,EAAG;AACvD,IAAA,MAAM,IAAIkD,qCAAAA,CAAyB,CAAA,0DAAA,EAA6DH,cAAAA,CAAAA,CAAAA,EAAkB;MAC9GK,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE+C,aAAW,GAAKpC,KAAAA;AACxB,EAAA,MAAM,EAAEyD,SAAAA,EAAWC,yBAAAA,EAAyB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9D,EAAA,MAAMC,GAAAA,GAAMT,SAAAA,IACR,IAAIO,SAAAA,CAAUxE,MAAAA,CAAOC,OAAO,EAAC,EAAGC,YAAAA,IAAgB,EAAC,EAAG;IAChDE,MAAAA,EAAQF,YAAAA,EAAcE,UAAUC,kBAAAA,EAAoBD,MAAAA;AACpDD,IAAAA,MAAAA,EAAQD,cAAcC,MAAAA,IAAUP;AACpC,GAAA,CAAA,CAAA;AACJ,EAAA,IAAI+E,OAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,OAAAA,GAAU,MAAMD,GAAAA,CAAIjE,IAAAA,CAAK,IAAIgE,yBAAAA,CAA0B;MACnDG,SAAAA,EAAWb,YAAAA;MACXc,QAAAA,EAAUb,WAAAA;AACVb,MAAAA;AACJ,KAAA,CAAA,CAAA;AACJ,EAAA,CAAA,CAAA,OACOD,CAAAA,EAAG;AACN,IAAA,MAAM,IAAImB,sCAAyBnB,CAAAA,EAAG;MAClCqB,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE0E,eAAAA,EAAiB,EAAEC,WAAAA,EAAaC,eAAAA,EAAiBC,YAAAA,EAAcjE,UAAAA,EAAYkE,eAAAA,EAAiBN,SAAAA,EAAS,GAAK,EAAC,EAAC,GAAMD,OAAAA;AAC1H,EAAA,IAAI,CAACI,WAAAA,IAAe,CAACC,mBAAmB,CAACC,YAAAA,IAAgB,CAACjE,UAAAA,EAAY;AAClE,IAAA,MAAM,IAAIqD,sCAAyB,8CAAA,EAAgD;MAC/EE,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM+E,WAAAA,GAAc;AAChBJ,IAAAA,WAAAA;AACAC,IAAAA,eAAAA;AACAC,IAAAA,YAAAA;IACAjE,UAAAA,EAAY,IAAIE,KAAKF,UAAAA,CAAAA;AACrB,IAAA,GAAIkE,eAAAA,IAAmB;AAAEA,MAAAA;AAAgB,KAAA;AACzC,IAAA,GAAIN,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACA,EAAA,IAAI7B,UAAAA,EAAY;AACZqC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,mBAAmB,GAAA,CAAA;EACzD,CAAA,MACK;AACDC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,0BAA0B,GAAA,CAAA;AAChE,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EA9EqC,uBAAA,CAAA;;;AQLrCnG,2BAAA,EAAA;AACO,IAAMqG,kBAAAA,mBAAqB1F,mBAAA,CAAA,CAACgD,OAAAA,EAASvC,MAAAA,KAAAA;AACxC,EAAA,MAAM,EAAEjB,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,eAAa,GAAKoD,OAAAA;AACrE,EAAA,IAAI,CAACxD,aAAAA,IAAiB,CAACC,kBAAkB,CAACE,UAAAA,IAAc,CAACC,aAAAA,EAAe;AACpE,IAAA,MAAM,IAAI8E,sCAAyB,CAAA,8IAAA,EACwBrE,MAAAA,CAAOsF,KAAK3C,OAAAA,CAAAA,CAAS4C,IAAAA,CAAK,IAAA,CAAA;AAA6F,kFAAA,CAAA,EAAA;MAAEhB,WAAAA,EAAa,KAAA;AAAOnE,MAAAA;KAAO,CAAA;AACnN,EAAA;AACA,EAAA,OAAOuC,OAAAA;AACX,CAAA,EAPkC,oBAAA;;;AVI3B,IAAM6C,OAAAA,mBAAU7F,mBAAA,CAAA,CAACE,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEwC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACpExC,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM,EAAEwB,WAAAA,EAAaC,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAajB,YAAU,GAAKlD,IAAAA;AAC1E,EAAA,MAAM,EAAEoE,WAAS,GAAKpE,IAAAA;AACtB,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,IAAI,CAACmB,eAAe,CAACC,YAAAA,IAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,IAAe,CAACjB,UAAAA,EAAY;AAC5E,IAAA,MAAMR,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,IAAA,MAAM8C,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,IAAA,IAAI,CAACE,OAAAA,EAAS;AACV,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,eAAAA,CAAAA,EAA8B;AAAErC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OAAO,CAAA;AACtG,IAAA;AACA,IAAA,IAAI,CAACnB,YAAAA,CAAa0D,OAAAA,CAAAA,EAAU;AACxB,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,wCAAAA,CAAAA,EAAuD;AACjGrC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OACjB,CAAA;AACJ,IAAA;AACA,IAAA,IAAIuC,SAAStD,WAAAA,EAAa;AACtB,MAAA,MAAMwD,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,MAAA,MAAM4F,OAAAA,GAAU5C,WAAAA,CAAYF,OAAAA,CAAQtD,WAAW,CAAA;AAC/C,MAAA,MAAMqG,WAAAA,GAAc,CAAA,2BAAA,EAA8BjD,WAAAA,CAAAA,iBAAAA,EAA+BE,QAAQtD,WAAW,CAAA,CAAA;AACpG,MAAA,IAAIO,SAAAA,IAAaA,SAAAA,KAAc6F,OAAAA,CAAQnG,UAAAA,EAAY;AAC/C,QAAA,MAAM,IAAI+E,qCAAAA,CAAyB,CAAA,sBAAA,CAAA,GAA2BqB,WAAAA,EAAa;UACvEnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACA,MAAA,IAAI0D,WAAAA,IAAeA,WAAAA,KAAgB2B,OAAAA,CAAQtG,aAAAA,EAAe;AACtD,QAAA,MAAM,IAAIkF,qCAAAA,CAAyB,CAAA,yBAAA,CAAA,GAA8BqB,WAAAA,EAAa;UAC1EnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACAuC,MAAAA,OAAAA,CAAQrD,aAAamG,OAAAA,CAAQnG,UAAAA;AAC7BqD,MAAAA,OAAAA,CAAQxD,gBAAgBsG,OAAAA,CAAQtG,aAAAA;AACpC,IAAA;AACA,IAAA,MAAM,EAAEA,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,aAAAA,EAAeF,aAAW,GAAKgG,kBAAAA,CAAmB1C,OAAAA,EAAS9C,IAAAA,CAAKO,MAAM,CAAA;AACzH,IAAA,OAAOyD,qBAAAA,CAAsB;MACzBC,WAAAA,EAAa3E,aAAAA;MACb4D,UAAAA,EAAY1D,WAAAA;MACZ0E,YAAAA,EAAc3E,cAAAA;MACdQ,SAAAA,EAAWN,UAAAA;MACX0E,WAAAA,EAAazE,aAAAA;AACb0E,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA,CAAA,MAAA,IACS,CAACqB,WAAAA,IAAe,CAACC,gBAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,EAAa;AAClE,IAAA,MAAM,IAAIK,sCAAyB,8HAAA,EAC8B;MAAEE,WAAAA,EAAa,KAAA;AAAOnE,MAAAA,MAAAA,EAAQP,IAAAA,CAAKO;KAAO,CAAA;EAC/G,CAAA,MACK;AACD,IAAA,OAAOyD,qBAAAA,CAAsB;AACzBC,MAAAA,WAAAA;AACAf,MAAAA,UAAAA;AACAgB,MAAAA,YAAAA;AACAnE,MAAAA,SAAAA;AACAoE,MAAAA,WAAAA;AACAC,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA;AACJ,CAAA,EAnEuB,SAAA;;;AWLvBzD,2BAAA,EAAA","file":"2GYKOGER.cjs","sourcesContent":["export * from \"./fromSSO\";\nexport * from \"./isSsoProfile\";\nexport * from \"./types\";\nexport * from \"./validateSsoProfile\";\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, loadSsoSessionData, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { isSsoProfile } from \"./isSsoProfile\";\nimport { resolveSSOCredentials } from \"./resolveSSOCredentials\";\nimport { validateSsoProfile } from \"./validateSsoProfile\";\nexport const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-sso - fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n const { ssoClient } = init;\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n const profiles = await parseKnownFiles(init);\n const profile = profiles[profileName];\n if (!profile) {\n throw new CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });\n }\n if (!isSsoProfile(profile)) {\n throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {\n logger: init.logger,\n });\n }\n if (profile?.sso_session) {\n const ssoSessions = await loadSsoSessionData(init);\n const session = ssoSessions[profile.sso_session];\n const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;\n if (ssoRegion && ssoRegion !== session.sso_region) {\n throw new CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {\n throw new CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n profile.sso_region = session.sso_region;\n profile.sso_start_url = session.sso_start_url;\n }\n const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);\n return resolveSSOCredentials({\n ssoStartUrl: sso_start_url,\n ssoSession: sso_session,\n ssoAccountId: sso_account_id,\n ssoRegion: sso_region,\n ssoRoleName: sso_role_name,\n ssoClient: ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n throw new CredentialsProviderError(\"Incomplete configuration. The fromSSO() argument hash must include \" +\n '\"ssoStartUrl\", \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"', { tryNextLink: false, logger: init.logger });\n }\n else {\n return resolveSSOCredentials({\n ssoStartUrl,\n ssoSession,\n ssoAccountId,\n ssoRegion,\n ssoRoleName,\n ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n};\n","export const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { fromSso as getSsoTokenProvider } from \"@aws-sdk/token-providers\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getSSOTokenFromFile } from \"@smithy/shared-ini-file-loader\";\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\nexport const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }) => {\n let token;\n const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;\n if (ssoSession) {\n try {\n const _token = await getSsoTokenProvider({ profile })();\n token = {\n accessToken: _token.token,\n expiresAt: new Date(_token.expiration).toISOString(),\n };\n }\n catch (e) {\n throw new CredentialsProviderError(e.message, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n else {\n try {\n token = await getSSOTokenFromFile(ssoStartUrl);\n }\n catch (e) {\n throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {\n throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { accessToken } = token;\n const { SSOClient, GetRoleCredentialsCommand } = await import(\"./loadSso\");\n const sso = ssoClient ||\n new SSOClient(Object.assign({}, clientConfig ?? {}, {\n logger: clientConfig?.logger ?? parentClientConfig?.logger,\n region: clientConfig?.region ?? ssoRegion,\n }));\n let ssoResp;\n try {\n ssoResp = await sso.send(new GetRoleCredentialsCommand({\n accountId: ssoAccountId,\n roleName: ssoRoleName,\n accessToken,\n }));\n }\n catch (e) {\n throw new CredentialsProviderError(e, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;\n if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const credentials = {\n accessKeyId,\n secretAccessKey,\n sessionToken,\n expiration: new Date(expiration),\n ...(credentialScope && { credentialScope }),\n ...(accountId && { accountId }),\n };\n if (ssoSession) {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO\", \"s\");\n }\n else {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO_LEGACY\", \"u\");\n }\n return credentials;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, getSSOTokenFromFile, loadSsoSessionData, parseKnownFiles, } from \"@smithy/shared-ini-file-loader\";\nimport { EXPIRE_WINDOW_MS, REFRESH_MESSAGE } from \"./constants\";\nimport { getNewSsoOidcToken } from \"./getNewSsoOidcToken\";\nimport { validateTokenExpiry } from \"./validateTokenExpiry\";\nimport { validateTokenKey } from \"./validateTokenKey\";\nimport { writeSSOTokenToFile } from \"./writeSSOTokenToFile\";\nconst lastRefreshAttemptTime = new Date(0);\nexport const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/token-providers - fromSso\");\n const profiles = await parseKnownFiles(init);\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n const profile = profiles[profileName];\n if (!profile) {\n throw new TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);\n }\n else if (!profile[\"sso_session\"]) {\n throw new TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);\n }\n const ssoSessionName = profile[\"sso_session\"];\n const ssoSessions = await loadSsoSessionData(init);\n const ssoSession = ssoSessions[ssoSessionName];\n if (!ssoSession) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);\n }\n for (const ssoSessionRequiredKey of [\"sso_start_url\", \"sso_region\"]) {\n if (!ssoSession[ssoSessionRequiredKey]) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);\n }\n }\n const ssoStartUrl = ssoSession[\"sso_start_url\"];\n const ssoRegion = ssoSession[\"sso_region\"];\n let ssoToken;\n try {\n ssoToken = await getSSOTokenFromFile(ssoSessionName);\n }\n catch (e) {\n throw new TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`, false);\n }\n validateTokenKey(\"accessToken\", ssoToken.accessToken);\n validateTokenKey(\"expiresAt\", ssoToken.expiresAt);\n const { accessToken, expiresAt } = ssoToken;\n const existingToken = { token: accessToken, expiration: new Date(expiresAt) };\n if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {\n return existingToken;\n }\n if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1000) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n validateTokenKey(\"clientId\", ssoToken.clientId, true);\n validateTokenKey(\"clientSecret\", ssoToken.clientSecret, true);\n validateTokenKey(\"refreshToken\", ssoToken.refreshToken, true);\n try {\n lastRefreshAttemptTime.setTime(Date.now());\n const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);\n validateTokenKey(\"accessToken\", newSsoOidcToken.accessToken);\n validateTokenKey(\"expiresIn\", newSsoOidcToken.expiresIn);\n const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);\n try {\n await writeSSOTokenToFile(ssoSessionName, {\n ...ssoToken,\n accessToken: newSsoOidcToken.accessToken,\n expiresAt: newTokenExpiration.toISOString(),\n refreshToken: newSsoOidcToken.refreshToken,\n });\n }\n catch (error) {\n }\n return {\n token: newSsoOidcToken.accessToken,\n expiration: newTokenExpiration,\n };\n }\n catch (error) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n};\n","export const EXPIRE_WINDOW_MS = 5 * 60 * 1000;\nexport const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;\n","import { getSsoOidcClient } from \"./getSsoOidcClient\";\nexport const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {\n const { CreateTokenCommand } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);\n return ssoOidcClient.send(new CreateTokenCommand({\n clientId: ssoToken.clientId,\n clientSecret: ssoToken.clientSecret,\n refreshToken: ssoToken.refreshToken,\n grantType: \"refresh_token\",\n }));\n};\n","export const getSsoOidcClient = async (ssoRegion, init = {}) => {\n const { SSOOIDCClient } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {\n region: ssoRegion ?? init.clientConfig?.region,\n logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger,\n }));\n return ssoOidcClient;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenExpiry = (token) => {\n if (token.expiration && token.expiration.getTime() < Date.now()) {\n throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenKey = (key, value, forRefresh = false) => {\n if (typeof value === \"undefined\") {\n throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? \". Cannot refresh\" : \"\"}. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { getSSOTokenFilepath } from \"@smithy/shared-ini-file-loader\";\nimport { promises as fsPromises } from \"fs\";\nconst { writeFile } = fsPromises;\nexport const writeSSOTokenToFile = (id, ssoToken) => {\n const tokenFilepath = getSSOTokenFilepath(id);\n const tokenString = JSON.stringify(ssoToken, null, 2);\n return writeFile(tokenFilepath, tokenString);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nexport const validateSsoProfile = (profile, logger) => {\n const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", ` +\n `\"sso_region\", \"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\", \")}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });\n }\n return profile;\n};\n","export {};\n"]}
|
|
1
|
+
{"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js","../../../node_modules/.pnpm/@aws-sdk+token-providers@3.879.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-sso@3.879.0/node_modules/@aws-sdk/credential-provider-sso/dist-es/types.js"],"names":["init_cjs_shims","isSsoProfile","arg","sso_start_url","sso_account_id","sso_session","sso_region","sso_role_name","EXPIRE_WINDOW_MS","REFRESH_MESSAGE","getSsoOidcClient","__name","ssoRegion","init","SSOOIDCClient","ssoOidcClient","Object","assign","clientConfig","region","logger","parentClientConfig","getNewSsoOidcToken","ssoToken","CreateTokenCommand","send","clientId","clientSecret","refreshToken","grantType","validateTokenExpiry","token","expiration","getTime","Date","now","TokenProviderError","validateTokenKey","key","value","forRefresh","writeFile","fsPromises","writeSSOTokenToFile","id","tokenFilepath","getSSOTokenFilepath","tokenString","JSON","stringify","lastRefreshAttemptTime","fromSso","_init","callerClientConfig","debug","profiles","parseKnownFiles","profileName","getProfileName","profile","ssoSessionName","ssoSessions","loadSsoSessionData","ssoSession","ssoSessionRequiredKey","getSSOTokenFromFile","e","accessToken","expiresAt","existingToken","setTime","newSsoOidcToken","expiresIn","newTokenExpiration","toISOString","error","SHOULD_FAIL_CREDENTIAL_CHAIN","resolveSSOCredentials","ssoStartUrl","ssoAccountId","ssoRoleName","ssoClient","refreshMessage","_token","getSsoTokenProvider","CredentialsProviderError","message","tryNextLink","SSOClient","GetRoleCredentialsCommand","sso","ssoResp","accountId","roleName","roleCredentials","accessKeyId","secretAccessKey","sessionToken","credentialScope","credentials","setCredentialFeature","validateSsoProfile","keys","join","fromSSO","session","conflictMsg"],"mappings":";;;;;;;;;;AAAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMC,YAAAA,wCAAgBC,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIC,aAAAA,KAAkB,QAAA,IAC1B,OAAOD,GAAAA,CAAIE,cAAAA,KAAmB,YAC9B,OAAOF,GAAAA,CAAIG,WAAAA,KAAgB,QAAA,IAC3B,OAAOH,GAAAA,CAAII,eAAe,QAAA,IAC1B,OAAOJ,GAAAA,CAAIK,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA;;;ACA5BP,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMQ,gBAAAA,GAAmB,IAAI,EAAA,GAAK,GAAA;AAClC,IAAMC,eAAAA,GAAkB,CAAA,+EAAA,CAAA;;;ACD/BT,2BAAA,EAAA;;;ACAAA,2BAAA,EAAA;AAAO,IAAMU,gBAAAA,mBAAmBC,mBAAA,CAAA,OAAOC,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACvD,EAAA,MAAM,EAAEC,aAAAA,EAAa,GAAK,MAAM,OAAO,gBAAA,CAAA;AACvC,EAAA,MAAMC,aAAAA,GAAgB,IAAID,aAAAA,CAAcE,MAAAA,CAAOC,MAAAA,CAAO,EAAC,EAAGJ,IAAAA,CAAKK,YAAAA,IAAgB,EAAC,EAAG;IAC/EC,MAAAA,EAAQP,SAAAA,IAAaC,KAAKK,YAAAA,EAAcC,MAAAA;AACxCC,IAAAA,MAAAA,EAAQP,IAAAA,CAAKK,YAAAA,EAAcE,MAAAA,IAAUP,IAAAA,CAAKQ,kBAAAA,EAAoBD;AAClE,GAAA,CAAA,CAAA;AACA,EAAA,OAAOL,aAAAA;AACX,CAAA,EAPgC,kBAAA,CAAA;;;ADCzB,IAAMO,qCAAqBX,mBAAA,CAAA,OAAOY,QAAAA,EAAUX,SAAAA,EAAWC,IAAAA,GAAO,EAAC,KAAC;AACnE,EAAA,MAAM,EAAEW,kBAAAA,EAAkB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC5C,EAAA,MAAMT,aAAAA,GAAgB,MAAML,gBAAAA,CAAiBE,SAAAA,EAAWC,IAAAA,CAAAA;AACxD,EAAA,OAAOE,aAAAA,CAAcU,IAAAA,CAAK,IAAID,kBAAAA,CAAmB;AAC7CE,IAAAA,QAAAA,EAAUH,QAAAA,CAASG,QAAAA;AACnBC,IAAAA,YAAAA,EAAcJ,QAAAA,CAASI,YAAAA;AACvBC,IAAAA,YAAAA,EAAcL,QAAAA,CAASK,YAAAA;IACvBC,SAAAA,EAAW;AACf,GAAA,CAAA,CAAA;AACJ,CAAA,EATkC,oBAAA,CAAA;;;AEDlC7B,2BAAA,EAAA;AAEO,IAAM8B,mBAAAA,wCAAuBC,KAAAA,KAAAA;AAChC,EAAA,IAAIA,KAAAA,CAAMC,cAAcD,KAAAA,CAAMC,UAAAA,CAAWC,SAAO,GAAKC,IAAAA,CAAKC,KAAG,EAAI;AAC7D,IAAA,MAAM,IAAIC,+BAAAA,CAAmB,CAAA,kBAAA,EAAqB3B,eAAAA,IAAmB,KAAA,CAAA;AACzE,EAAA;AACJ,CAAA,EAJmC,qBAAA,CAAA;;;ACFnCT,2BAAA,EAAA;AAEO,IAAMqC,gBAAAA,mBAAmB1B,mBAAA,CAAA,CAAC2B,GAAAA,EAAKC,KAAAA,EAAOC,aAAa,KAAA,KAAK;AAC3D,EAAA,IAAI,OAAOD,UAAU,WAAA,EAAa;AAC9B,IAAA,MAAM,IAAIH,+BAAAA,CAAmB,CAAA,uBAAA,EAA0BE,GAAAA,CAAAA,cAAAA,EAAoBE,UAAAA,GAAa,kBAAA,GAAqB,EAAA,CAAA,EAAA,EAAO/B,eAAAA,CAAAA,CAAAA,EAAmB,KAAA,CAAA;AAC3I,EAAA;AACJ,CAAA,EAJgC,kBAAA,CAAA;;;ACFhCT,2BAAA,EAAA;AAEA,IAAM,EAAEyC,WAAS,GAAKC,WAAAA;AACf,IAAMC,mBAAAA,mBAAsBhC,mBAAA,CAAA,CAACiC,EAAAA,EAAIrB,QAAAA,KAAAA;AACpC,EAAA,MAAMsB,aAAAA,GAAgBC,iCAAoBF,EAAAA,CAAAA;AAC1C,EAAA,MAAMG,WAAAA,GAAcC,IAAAA,CAAKC,SAAAA,CAAU1B,QAAAA,EAAU,MAAM,CAAA,CAAA;AACnD,EAAA,OAAOkB,SAAAA,CAAUI,eAAeE,WAAAA,CAAAA;AACpC,CAAA,EAJmC,qBAAA,CAAA;;;ANInC,IAAMG,sBAAAA,mBAAyB,IAAIhB,IAAAA,CAAK,CAAA,CAAA;AACjC,IAAMiB,OAAAA,mBAAUxC,mBAAA,CAAA,CAACyC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMxC,IAAAA,GAAO;IACT,GAAGuC,KAAAA;IACH/B,kBAAAA,EAAoB;MAChB,GAAGgC,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM/B;AACb;AACJ,GAAA;AACAR,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,oCAAA,CAAA;AACnB,EAAA,MAAMC,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,MAAMA,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,EAAA,IAAI,CAACE,OAAAA,EAAS;AACV,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,oDAA+D,KAAA,CAAA;EAC5G,CAAA,MAAA,IACS,CAACE,OAAAA,CAAQ,aAAA,CAAA,EAAgB;AAC9B,IAAA,MAAM,IAAIvB,+BAAAA,CAAmB,CAAA,SAAA,EAAYqB,WAAAA,CAAAA,6CAAAA,CAA0D,CAAA;AACvG,EAAA;AACA,EAAA,MAAMG,cAAAA,GAAiBD,QAAQ,aAAA,CAAA;AAC/B,EAAA,MAAME,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,EAAA,MAAMkD,UAAAA,GAAaF,YAAYD,cAAAA,CAAAA;AAC/B,EAAA,IAAI,CAACG,UAAAA,EAAY;AACb,IAAA,MAAM,IAAI3B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,oDAAkE,KAAA,CAAA;AACnH,EAAA;AACA,EAAA,KAAA,MAAWI,qBAAAA,IAAyB;AAAC,IAAA,eAAA;AAAiB,IAAA;AAAe,GAAA,EAAA;AACjE,IAAA,IAAI,CAACD,UAAAA,CAAWC,qBAAAA,CAAAA,EAAwB;AACpC,MAAA,MAAM,IAAI5B,+BAAAA,CAAmB,CAAA,aAAA,EAAgBwB,cAAAA,CAAAA,gCAAAA,EAAiDI,qBAAAA,MAA2B,KAAA,CAAA;AAC7H,IAAA;AACJ,EAAA;AACA,EAAoBD,WAAW,eAAA;AAC/B,EAAA,MAAMnD,SAAAA,GAAYmD,WAAW,YAAA,CAAA;AAC7B,EAAA,IAAIxC,QAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,QAAAA,GAAW,MAAM0C,iCAAoBL,cAAAA,CAAAA;AACzC,EAAA,CAAA,CAAA,OACOM,CAAAA,EAAG;AACN,IAAA,MAAM,IAAI9B,+BAAAA,CAAmB,CAAA,8CAAA,EAAiDqB,WAAAA,CAAAA,8BAAAA,EAA4ChD,eAAAA,IAAmB,KAAA,CAAA;AACjJ,EAAA;AACA4B,EAAAA,gBAAAA,CAAiB,aAAA,EAAed,SAAS4C,WAAW,CAAA;AACpD9B,EAAAA,gBAAAA,CAAiB,WAAA,EAAad,SAAS6C,SAAS,CAAA;AAChD,EAAA,MAAM,EAAED,WAAAA,EAAaC,SAAAA,EAAS,GAAK7C,QAAAA;AACnC,EAAA,MAAM8C,aAAAA,GAAgB;IAAEtC,KAAAA,EAAOoC,WAAAA;IAAanC,UAAAA,EAAY,IAAIE,KAAKkC,SAAAA;AAAW,GAAA;AAC5E,EAAA,IAAIC,cAAcrC,UAAAA,CAAWC,OAAAA,KAAYC,IAAAA,CAAKC,GAAAA,KAAQ3B,gBAAAA,EAAkB;AACpE,IAAA,OAAO6D,aAAAA;AACX,EAAA;AACA,EAAA,IAAInC,KAAKC,GAAAA,EAAG,GAAKe,uBAAuBjB,OAAAA,EAAO,GAAK,KAAK,GAAA,EAAM;AAC3DH,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACAhC,EAAAA,gBAAAA,CAAiB,UAAA,EAAYd,QAAAA,CAASG,QAAAA,EAAU,IAAA,CAAA;AAChDW,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASI,YAAAA,EAAc,IAAA,CAAA;AACxDU,EAAAA,gBAAAA,CAAiB,cAAA,EAAgBd,QAAAA,CAASK,YAAAA,EAAc,IAAA,CAAA;AACxD,EAAA,IAAI;AACAsB,IAAAA,sBAAAA,CAAuBoB,OAAAA,CAAQpC,IAAAA,CAAKC,GAAAA,EAAG,CAAA;AACvC,IAAA,MAAMoC,eAAAA,GAAkB,MAAMjD,kBAAAA,CAAmBC,QAAAA,EAAUX,WAAWC,IAAAA,CAAAA;AACtEwB,IAAAA,gBAAAA,CAAiB,aAAA,EAAekC,gBAAgBJ,WAAW,CAAA;AAC3D9B,IAAAA,gBAAAA,CAAiB,WAAA,EAAakC,gBAAgBC,SAAS,CAAA;AACvD,IAAA,MAAMC,kBAAAA,GAAqB,IAAIvC,IAAAA,CAAKA,IAAAA,CAAKC,KAAG,GAAKoC,eAAAA,CAAgBC,YAAY,GAAA,CAAA;AAC7E,IAAA,IAAI;AACA,MAAA,MAAM7B,oBAAoBiB,cAAAA,EAAgB;QACtC,GAAGrC,QAAAA;AACH4C,QAAAA,WAAAA,EAAaI,eAAAA,CAAgBJ,WAAAA;AAC7BC,QAAAA,SAAAA,EAAWK,mBAAmBC,WAAAA,EAAW;AACzC9C,QAAAA,YAAAA,EAAc2C,eAAAA,CAAgB3C;OAClC,CAAA;AACJ,IAAA,CAAA,CAAA,OACO+C,KAAAA,EAAO;AACd,IAAA;AACA,IAAA,OAAO;AACH5C,MAAAA,KAAAA,EAAOwC,eAAAA,CAAgBJ,WAAAA;MACvBnC,UAAAA,EAAYyC;AAChB,KAAA;AACJ,EAAA,CAAA,CAAA,OACOE,KAAAA,EAAO;AACV7C,IAAAA,mBAAAA,CAAoBuC,aAAAA,CAAAA;AACpB,IAAA,OAAOA,aAAAA;AACX,EAAA;AACJ,CAAA,EA/EuB,SAAA,CAAA;;;ADJvB,IAAMO,4BAAAA,GAA+B,KAAA;AAC9B,IAAMC,qBAAAA,mBAAwBlE,mBAAA,CAAA,OAAO,EAAEmE,WAAAA,EAAaf,UAAAA,EAAYgB,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAaC,SAAAA,EAAW/D,YAAAA,EAAcG,kBAAAA,EAAoBsC,OAAAA,EAASvC,QAAM,KAAG;AACxK,EAAA,IAAIW,KAAAA;AACJ,EAAA,MAAMmD,cAAAA,GAAiB,CAAA,6EAAA,CAAA;AACvB,EAAA,IAAInB,UAAAA,EAAY;AACZ,IAAA,IAAI;AACA,MAAA,MAAMoB,MAAAA,GAAS,MAAMC,OAAAA,CAAoB;AAAEzB,QAAAA;AAAQ,OAAA,CAAA,EAAA;AACnD5B,MAAAA,KAAAA,GAAQ;AACJoC,QAAAA,WAAAA,EAAagB,MAAAA,CAAOpD,KAAAA;AACpBqC,QAAAA,SAAAA,EAAW,IAAIlC,IAAAA,CAAKiD,MAAAA,CAAOnD,UAAU,EAAE0C,WAAAA;AAC3C,OAAA;AACJ,IAAA,CAAA,CAAA,OACOR,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyBnB,CAAAA,CAAEoB,OAAAA,EAAS;QAC1CC,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;EACJ,CAAA,MACK;AACD,IAAA,IAAI;AACAW,MAAAA,KAAAA,GAAQ,MAAMkC,iCAAoBa,WAAAA,CAAAA;AACtC,IAAA,CAAA,CAAA,OACOZ,CAAAA,EAAG;AACN,MAAA,MAAM,IAAImB,qCAAAA,CAAyB,CAAA,yDAAA,EAA4DH,cAAAA,CAAAA,CAAAA,EAAkB;QAC7GK,WAAAA,EAAaX,4BAAAA;AACbxD,QAAAA;OACJ,CAAA;AACJ,IAAA;AACJ,EAAA;AACA,EAAA,IAAI,IAAIc,IAAAA,CAAKH,KAAAA,CAAMqC,SAAS,CAAA,CAAEnC,SAAO,GAAKC,IAAAA,CAAKC,GAAAA,EAAG,IAAM,CAAA,EAAG;AACvD,IAAA,MAAM,IAAIkD,qCAAAA,CAAyB,CAAA,0DAAA,EAA6DH,cAAAA,CAAAA,CAAAA,EAAkB;MAC9GK,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE+C,aAAW,GAAKpC,KAAAA;AACxB,EAAA,MAAM,EAAEyD,SAAAA,EAAWC,yBAAAA,EAAyB,GAAK,MAAM,OAAO,gBAAA,CAAA;AAC9D,EAAA,MAAMC,GAAAA,GAAMT,SAAAA,IACR,IAAIO,SAAAA,CAAUxE,MAAAA,CAAOC,OAAO,EAAC,EAAGC,YAAAA,IAAgB,EAAC,EAAG;IAChDE,MAAAA,EAAQF,YAAAA,EAAcE,UAAUC,kBAAAA,EAAoBD,MAAAA;AACpDD,IAAAA,MAAAA,EAAQD,cAAcC,MAAAA,IAAUP;AACpC,GAAA,CAAA,CAAA;AACJ,EAAA,IAAI+E,OAAAA;AACJ,EAAA,IAAI;AACAA,IAAAA,OAAAA,GAAU,MAAMD,GAAAA,CAAIjE,IAAAA,CAAK,IAAIgE,yBAAAA,CAA0B;MACnDG,SAAAA,EAAWb,YAAAA;MACXc,QAAAA,EAAUb,WAAAA;AACVb,MAAAA;AACJ,KAAA,CAAA,CAAA;AACJ,EAAA,CAAA,CAAA,OACOD,CAAAA,EAAG;AACN,IAAA,MAAM,IAAImB,sCAAyBnB,CAAAA,EAAG;MAClCqB,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM,EAAE0E,eAAAA,EAAiB,EAAEC,WAAAA,EAAaC,eAAAA,EAAiBC,YAAAA,EAAcjE,UAAAA,EAAYkE,eAAAA,EAAiBN,SAAAA,EAAS,GAAK,EAAC,EAAC,GAAMD,OAAAA;AAC1H,EAAA,IAAI,CAACI,WAAAA,IAAe,CAACC,mBAAmB,CAACC,YAAAA,IAAgB,CAACjE,UAAAA,EAAY;AAClE,IAAA,MAAM,IAAIqD,sCAAyB,8CAAA,EAAgD;MAC/EE,WAAAA,EAAaX,4BAAAA;AACbxD,MAAAA;KACJ,CAAA;AACJ,EAAA;AACA,EAAA,MAAM+E,WAAAA,GAAc;AAChBJ,IAAAA,WAAAA;AACAC,IAAAA,eAAAA;AACAC,IAAAA,YAAAA;IACAjE,UAAAA,EAAY,IAAIE,KAAKF,UAAAA,CAAAA;AACrB,IAAA,GAAIkE,eAAAA,IAAmB;AAAEA,MAAAA;AAAgB,KAAA;AACzC,IAAA,GAAIN,SAAAA,IAAa;AAAEA,MAAAA;AAAU;AACjC,GAAA;AACA,EAAA,IAAI7B,UAAAA,EAAY;AACZqC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,mBAAmB,GAAA,CAAA;EACzD,CAAA,MACK;AACDC,IAAAA,kCAAAA,CAAqBD,WAAAA,EAAa,0BAA0B,GAAA,CAAA;AAChE,EAAA;AACA,EAAA,OAAOA,WAAAA;AACX,CAAA,EA9EqC,uBAAA,CAAA;;;AQLrCnG,2BAAA,EAAA;AACO,IAAMqG,kBAAAA,mBAAqB1F,mBAAA,CAAA,CAACgD,OAAAA,EAASvC,MAAAA,KAAAA;AACxC,EAAA,MAAM,EAAEjB,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,eAAa,GAAKoD,OAAAA;AACrE,EAAA,IAAI,CAACxD,aAAAA,IAAiB,CAACC,kBAAkB,CAACE,UAAAA,IAAc,CAACC,aAAAA,EAAe;AACpE,IAAA,MAAM,IAAI8E,sCAAyB,CAAA,8IAAA,EACwBrE,MAAAA,CAAOsF,KAAK3C,OAAAA,CAAAA,CAAS4C,IAAAA,CAAK,IAAA,CAAA;AAA6F,kFAAA,CAAA,EAAA;MAAEhB,WAAAA,EAAa,KAAA;AAAOnE,MAAAA;KAAO,CAAA;AACnN,EAAA;AACA,EAAA,OAAOuC,OAAAA;AACX,CAAA,EAPkC,oBAAA;;;AVI3B,IAAM6C,OAAAA,mBAAU7F,mBAAA,CAAA,CAACE,IAAAA,GAAO,EAAC,KAAM,OAAO,EAAEwC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACpExC,EAAAA,IAAAA,CAAKO,MAAAA,EAAQkC,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM,EAAEwB,WAAAA,EAAaC,YAAAA,EAAcnE,SAAAA,EAAWoE,WAAAA,EAAajB,YAAU,GAAKlD,IAAAA;AAC1E,EAAA,MAAM,EAAEoE,WAAS,GAAKpE,IAAAA;AACtB,EAAA,MAAM4C,cAAcC,2BAAAA,CAAe;IAC/BC,OAAAA,EAAS9C,IAAAA,CAAK8C,WAAWN,kBAAAA,EAAoBM;GACjD,CAAA;AACA,EAAA,IAAI,CAACmB,eAAe,CAACC,YAAAA,IAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,IAAe,CAACjB,UAAAA,EAAY;AAC5E,IAAA,MAAMR,QAAAA,GAAW,MAAMC,4BAAAA,CAAgB3C,IAAAA,CAAAA;AACvC,IAAA,MAAM8C,OAAAA,GAAUJ,SAASE,WAAAA,CAAAA;AACzB,IAAA,IAAI,CAACE,OAAAA,EAAS;AACV,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,eAAAA,CAAAA,EAA8B;AAAErC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OAAO,CAAA;AACtG,IAAA;AACA,IAAA,IAAI,CAACnB,YAAAA,CAAa0D,OAAAA,CAAAA,EAAU;AACxB,MAAA,MAAM,IAAI0B,qCAAAA,CAAyB,CAAA,QAAA,EAAW5B,WAAAA,CAAAA,wCAAAA,CAAAA,EAAuD;AACjGrC,QAAAA,MAAAA,EAAQP,IAAAA,CAAKO;OACjB,CAAA;AACJ,IAAA;AACA,IAAA,IAAIuC,SAAStD,WAAAA,EAAa;AACtB,MAAA,MAAMwD,WAAAA,GAAc,MAAMC,+BAAAA,CAAmBjD,IAAAA,CAAAA;AAC7C,MAAA,MAAM4F,OAAAA,GAAU5C,WAAAA,CAAYF,OAAAA,CAAQtD,WAAW,CAAA;AAC/C,MAAA,MAAMqG,WAAAA,GAAc,CAAA,2BAAA,EAA8BjD,WAAAA,CAAAA,iBAAAA,EAA+BE,QAAQtD,WAAW,CAAA,CAAA;AACpG,MAAA,IAAIO,SAAAA,IAAaA,SAAAA,KAAc6F,OAAAA,CAAQnG,UAAAA,EAAY;AAC/C,QAAA,MAAM,IAAI+E,qCAAAA,CAAyB,CAAA,sBAAA,CAAA,GAA2BqB,WAAAA,EAAa;UACvEnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACA,MAAA,IAAI0D,WAAAA,IAAeA,WAAAA,KAAgB2B,OAAAA,CAAQtG,aAAAA,EAAe;AACtD,QAAA,MAAM,IAAIkF,qCAAAA,CAAyB,CAAA,yBAAA,CAAA,GAA8BqB,WAAAA,EAAa;UAC1EnB,WAAAA,EAAa,KAAA;AACbnE,UAAAA,MAAAA,EAAQP,IAAAA,CAAKO;SACjB,CAAA;AACJ,MAAA;AACAuC,MAAAA,OAAAA,CAAQrD,aAAamG,OAAAA,CAAQnG,UAAAA;AAC7BqD,MAAAA,OAAAA,CAAQxD,gBAAgBsG,OAAAA,CAAQtG,aAAAA;AACpC,IAAA;AACA,IAAA,MAAM,EAAEA,aAAAA,EAAeC,cAAAA,EAAgBE,UAAAA,EAAYC,aAAAA,EAAeF,aAAW,GAAKgG,kBAAAA,CAAmB1C,OAAAA,EAAS9C,IAAAA,CAAKO,MAAM,CAAA;AACzH,IAAA,OAAOyD,qBAAAA,CAAsB;MACzBC,WAAAA,EAAa3E,aAAAA;MACb4D,UAAAA,EAAY1D,WAAAA;MACZ0E,YAAAA,EAAc3E,cAAAA;MACdQ,SAAAA,EAAWN,UAAAA;MACX0E,WAAAA,EAAazE,aAAAA;AACb0E,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA,CAAA,MAAA,IACS,CAACqB,WAAAA,IAAe,CAACC,gBAAgB,CAACnE,SAAAA,IAAa,CAACoE,WAAAA,EAAa;AAClE,IAAA,MAAM,IAAIK,sCAAyB,8HAAA,EAC8B;MAAEE,WAAAA,EAAa,KAAA;AAAOnE,MAAAA,MAAAA,EAAQP,IAAAA,CAAKO;KAAO,CAAA;EAC/G,CAAA,MACK;AACD,IAAA,OAAOyD,qBAAAA,CAAsB;AACzBC,MAAAA,WAAAA;AACAf,MAAAA,UAAAA;AACAgB,MAAAA,YAAAA;AACAnE,MAAAA,SAAAA;AACAoE,MAAAA,WAAAA;AACAC,MAAAA,SAAAA;AACA/D,MAAAA,YAAAA,EAAcL,IAAAA,CAAKK,YAAAA;AACnBG,MAAAA,kBAAAA,EAAoBR,IAAAA,CAAKQ,kBAAAA;MACzBsC,OAAAA,EAASF;KACb,CAAA;AACJ,EAAA;AACJ,CAAA,EAnEuB,SAAA;;;AWLvBzD,2BAAA,EAAA","file":"MQTCD42Y.cjs","sourcesContent":["export * from \"./fromSSO\";\nexport * from \"./isSsoProfile\";\nexport * from \"./types\";\nexport * from \"./validateSsoProfile\";\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, loadSsoSessionData, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { isSsoProfile } from \"./isSsoProfile\";\nimport { resolveSSOCredentials } from \"./resolveSSOCredentials\";\nimport { validateSsoProfile } from \"./validateSsoProfile\";\nexport const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-sso - fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n const { ssoClient } = init;\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n const profiles = await parseKnownFiles(init);\n const profile = profiles[profileName];\n if (!profile) {\n throw new CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });\n }\n if (!isSsoProfile(profile)) {\n throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {\n logger: init.logger,\n });\n }\n if (profile?.sso_session) {\n const ssoSessions = await loadSsoSessionData(init);\n const session = ssoSessions[profile.sso_session];\n const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;\n if (ssoRegion && ssoRegion !== session.sso_region) {\n throw new CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {\n throw new CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n profile.sso_region = session.sso_region;\n profile.sso_start_url = session.sso_start_url;\n }\n const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);\n return resolveSSOCredentials({\n ssoStartUrl: sso_start_url,\n ssoSession: sso_session,\n ssoAccountId: sso_account_id,\n ssoRegion: sso_region,\n ssoRoleName: sso_role_name,\n ssoClient: ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n throw new CredentialsProviderError(\"Incomplete configuration. The fromSSO() argument hash must include \" +\n '\"ssoStartUrl\", \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"', { tryNextLink: false, logger: init.logger });\n }\n else {\n return resolveSSOCredentials({\n ssoStartUrl,\n ssoSession,\n ssoAccountId,\n ssoRegion,\n ssoRoleName,\n ssoClient,\n clientConfig: init.clientConfig,\n parentClientConfig: init.parentClientConfig,\n profile: profileName,\n });\n }\n};\n","export const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { fromSso as getSsoTokenProvider } from \"@aws-sdk/token-providers\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getSSOTokenFromFile } from \"@smithy/shared-ini-file-loader\";\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\nexport const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }) => {\n let token;\n const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;\n if (ssoSession) {\n try {\n const _token = await getSsoTokenProvider({ profile })();\n token = {\n accessToken: _token.token,\n expiresAt: new Date(_token.expiration).toISOString(),\n };\n }\n catch (e) {\n throw new CredentialsProviderError(e.message, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n else {\n try {\n token = await getSSOTokenFromFile(ssoStartUrl);\n }\n catch (e) {\n throw new CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n }\n if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {\n throw new CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { accessToken } = token;\n const { SSOClient, GetRoleCredentialsCommand } = await import(\"./loadSso\");\n const sso = ssoClient ||\n new SSOClient(Object.assign({}, clientConfig ?? {}, {\n logger: clientConfig?.logger ?? parentClientConfig?.logger,\n region: clientConfig?.region ?? ssoRegion,\n }));\n let ssoResp;\n try {\n ssoResp = await sso.send(new GetRoleCredentialsCommand({\n accountId: ssoAccountId,\n roleName: ssoRoleName,\n accessToken,\n }));\n }\n catch (e) {\n throw new CredentialsProviderError(e, {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;\n if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", {\n tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,\n logger,\n });\n }\n const credentials = {\n accessKeyId,\n secretAccessKey,\n sessionToken,\n expiration: new Date(expiration),\n ...(credentialScope && { credentialScope }),\n ...(accountId && { accountId }),\n };\n if (ssoSession) {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO\", \"s\");\n }\n else {\n setCredentialFeature(credentials, \"CREDENTIALS_SSO_LEGACY\", \"u\");\n }\n return credentials;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, getSSOTokenFromFile, loadSsoSessionData, parseKnownFiles, } from \"@smithy/shared-ini-file-loader\";\nimport { EXPIRE_WINDOW_MS, REFRESH_MESSAGE } from \"./constants\";\nimport { getNewSsoOidcToken } from \"./getNewSsoOidcToken\";\nimport { validateTokenExpiry } from \"./validateTokenExpiry\";\nimport { validateTokenKey } from \"./validateTokenKey\";\nimport { writeSSOTokenToFile } from \"./writeSSOTokenToFile\";\nconst lastRefreshAttemptTime = new Date(0);\nexport const fromSso = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/token-providers - fromSso\");\n const profiles = await parseKnownFiles(init);\n const profileName = getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n });\n const profile = profiles[profileName];\n if (!profile) {\n throw new TokenProviderError(`Profile '${profileName}' could not be found in shared credentials file.`, false);\n }\n else if (!profile[\"sso_session\"]) {\n throw new TokenProviderError(`Profile '${profileName}' is missing required property 'sso_session'.`);\n }\n const ssoSessionName = profile[\"sso_session\"];\n const ssoSessions = await loadSsoSessionData(init);\n const ssoSession = ssoSessions[ssoSessionName];\n if (!ssoSession) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' could not be found in shared credentials file.`, false);\n }\n for (const ssoSessionRequiredKey of [\"sso_start_url\", \"sso_region\"]) {\n if (!ssoSession[ssoSessionRequiredKey]) {\n throw new TokenProviderError(`Sso session '${ssoSessionName}' is missing required property '${ssoSessionRequiredKey}'.`, false);\n }\n }\n const ssoStartUrl = ssoSession[\"sso_start_url\"];\n const ssoRegion = ssoSession[\"sso_region\"];\n let ssoToken;\n try {\n ssoToken = await getSSOTokenFromFile(ssoSessionName);\n }\n catch (e) {\n throw new TokenProviderError(`The SSO session token associated with profile=${profileName} was not found or is invalid. ${REFRESH_MESSAGE}`, false);\n }\n validateTokenKey(\"accessToken\", ssoToken.accessToken);\n validateTokenKey(\"expiresAt\", ssoToken.expiresAt);\n const { accessToken, expiresAt } = ssoToken;\n const existingToken = { token: accessToken, expiration: new Date(expiresAt) };\n if (existingToken.expiration.getTime() - Date.now() > EXPIRE_WINDOW_MS) {\n return existingToken;\n }\n if (Date.now() - lastRefreshAttemptTime.getTime() < 30 * 1000) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n validateTokenKey(\"clientId\", ssoToken.clientId, true);\n validateTokenKey(\"clientSecret\", ssoToken.clientSecret, true);\n validateTokenKey(\"refreshToken\", ssoToken.refreshToken, true);\n try {\n lastRefreshAttemptTime.setTime(Date.now());\n const newSsoOidcToken = await getNewSsoOidcToken(ssoToken, ssoRegion, init);\n validateTokenKey(\"accessToken\", newSsoOidcToken.accessToken);\n validateTokenKey(\"expiresIn\", newSsoOidcToken.expiresIn);\n const newTokenExpiration = new Date(Date.now() + newSsoOidcToken.expiresIn * 1000);\n try {\n await writeSSOTokenToFile(ssoSessionName, {\n ...ssoToken,\n accessToken: newSsoOidcToken.accessToken,\n expiresAt: newTokenExpiration.toISOString(),\n refreshToken: newSsoOidcToken.refreshToken,\n });\n }\n catch (error) {\n }\n return {\n token: newSsoOidcToken.accessToken,\n expiration: newTokenExpiration,\n };\n }\n catch (error) {\n validateTokenExpiry(existingToken);\n return existingToken;\n }\n};\n","export const EXPIRE_WINDOW_MS = 5 * 60 * 1000;\nexport const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;\n","import { getSsoOidcClient } from \"./getSsoOidcClient\";\nexport const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}) => {\n const { CreateTokenCommand } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = await getSsoOidcClient(ssoRegion, init);\n return ssoOidcClient.send(new CreateTokenCommand({\n clientId: ssoToken.clientId,\n clientSecret: ssoToken.clientSecret,\n refreshToken: ssoToken.refreshToken,\n grantType: \"refresh_token\",\n }));\n};\n","export const getSsoOidcClient = async (ssoRegion, init = {}) => {\n const { SSOOIDCClient } = await import(\"@aws-sdk/nested-clients/sso-oidc\");\n const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {\n region: ssoRegion ?? init.clientConfig?.region,\n logger: init.clientConfig?.logger ?? init.parentClientConfig?.logger,\n }));\n return ssoOidcClient;\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenExpiry = (token) => {\n if (token.expiration && token.expiration.getTime() < Date.now()) {\n throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { TokenProviderError } from \"@smithy/property-provider\";\nimport { REFRESH_MESSAGE } from \"./constants\";\nexport const validateTokenKey = (key, value, forRefresh = false) => {\n if (typeof value === \"undefined\") {\n throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? \". Cannot refresh\" : \"\"}. ${REFRESH_MESSAGE}`, false);\n }\n};\n","import { getSSOTokenFilepath } from \"@smithy/shared-ini-file-loader\";\nimport { promises as fsPromises } from \"fs\";\nconst { writeFile } = fsPromises;\nexport const writeSSOTokenToFile = (id, ssoToken) => {\n const tokenFilepath = getSSOTokenFilepath(id);\n const tokenString = JSON.stringify(ssoToken, null, 2);\n return writeFile(tokenFilepath, tokenString);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nexport const validateSsoProfile = (profile, logger) => {\n const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", ` +\n `\"sso_region\", \"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\", \")}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });\n }\n return profile;\n};\n","export {};\n"]}
|
package/dist/N67IGBHN.js
ADDED
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
import { SuiWrapper } from './OLQR7R3W.js';
|
|
2
|
+
import { suiDefaultVolumes } from './H7LPHZJT.js';
|
|
3
|
+
import { init_esm_shims } from './4RNWLMHM.js';
|
|
4
|
+
|
|
5
|
+
// src/commands/sui.ts
|
|
6
|
+
init_esm_shims();
|
|
7
|
+
var configScript = `
|
|
8
|
+
mkdir -p /root/.sui/sui_config
|
|
9
|
+
if [ ! -f /root/.sui/sui_config/client.yaml ]; then
|
|
10
|
+
cat > /root/.sui/sui_config/client.yaml <<'YAML'
|
|
11
|
+
---
|
|
12
|
+
keystore:
|
|
13
|
+
File: /root/.sui/sui_config/sui.keystore
|
|
14
|
+
envs:
|
|
15
|
+
- alias: testnet
|
|
16
|
+
rpc: "https://fullnode.testnet.sui.io:443"
|
|
17
|
+
ws: ~
|
|
18
|
+
basic_auth: ~
|
|
19
|
+
active_env: testnet
|
|
20
|
+
active_address: ~
|
|
21
|
+
YAML
|
|
22
|
+
echo "[]" > /root/.sui/sui_config/sui.keystore
|
|
23
|
+
fi
|
|
24
|
+
`;
|
|
25
|
+
var suiWrapper = new SuiWrapper("sui", configScript, suiDefaultVolumes);
|
|
26
|
+
|
|
27
|
+
export { suiWrapper };
|
|
28
|
+
//# sourceMappingURL=N67IGBHN.js.map
|
|
29
|
+
//# sourceMappingURL=N67IGBHN.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/commands/sui.ts"],"names":["configScript","suiWrapper","SuiWrapper","suiDefaultVolumes"],"mappings":";;;;;AAAA,cAAA,EAAA;AAMA,IAAMA,YAAAA,GAAe;;;;;;;;;;;;;;;;;;AAmBd,IAAMC,UAAAA,GAAa,IAAIC,UAAAA,CAAW,KAAA,EAAOF,cAAcG,iBAAAA","file":"N67IGBHN.js","sourcesContent":["import { suiDefaultVolumes } from '../config/tools';\nimport { SuiWrapper } from './utility/sui-like';\n\n// Initialize Sui client configuration if it doesn't exist in the Docker volume.\n// This prevents interactive prompts on fresh machines.\n// Uses testnet for network operations like --dump-bytecode-as-base64.\nconst configScript = `\nmkdir -p /root/.sui/sui_config\nif [ ! -f /root/.sui/sui_config/client.yaml ]; then\n cat > /root/.sui/sui_config/client.yaml <<'YAML'\n---\nkeystore:\n File: /root/.sui/sui_config/sui.keystore\nenvs:\n - alias: testnet\n rpc: \"https://fullnode.testnet.sui.io:443\"\n ws: ~\n basic_auth: ~\nactive_env: testnet\nactive_address: ~\nYAML\n echo \"[]\" > /root/.sui/sui_config/sui.keystore\nfi\n`;\n\nexport const suiWrapper = new SuiWrapper('sui', configScript, suiDefaultVolumes);\n"]}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
var EYP6JZRD_cjs = require('./EYP6JZRD.cjs');
|
|
4
|
+
var FOFSZBOK_cjs = require('./FOFSZBOK.cjs');
|
|
5
|
+
var U7VZULNU_cjs = require('./U7VZULNU.cjs');
|
|
6
|
+
|
|
7
|
+
// src/commands/iota.ts
|
|
8
|
+
U7VZULNU_cjs.init_cjs_shims();
|
|
9
|
+
var configScript = `
|
|
10
|
+
echo "Initializing IOTA client configuration..."
|
|
11
|
+
iota keytool import "test test test test test test test test test test test junk" ed25519
|
|
12
|
+
`;
|
|
13
|
+
var iotaWrapper = new EYP6JZRD_cjs.SuiWrapper("iota", configScript, FOFSZBOK_cjs.iotaDefaultVolumes);
|
|
14
|
+
|
|
15
|
+
exports.iotaWrapper = iotaWrapper;
|
|
16
|
+
//# sourceMappingURL=O2C74Z3Q.cjs.map
|
|
17
|
+
//# sourceMappingURL=O2C74Z3Q.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/commands/iota.ts"],"names":["init_cjs_shims","configScript","iotaWrapper","SuiWrapper","iotaDefaultVolumes"],"mappings":";;;;;;;AAAAA,2BAAA,EAAA;AAMA,IAAMC,YAAAA,GAAe;;;;AAKd,IAAMC,WAAAA,GAAc,IAAIC,uBAAAA,CAAW,MAAA,EAAQF,cAAcG,+BAAAA","file":"O2C74Z3Q.cjs","sourcesContent":["import { iotaDefaultVolumes } from '../config/tools';\nimport { SuiWrapper } from './utility/sui-like';\n\n// Initialize IOTA client configuration if it doesn't exist in the Docker volume.\n// This prevents interactive prompts on fresh machines.\n// Uses testnet for network operations like --dump-bytecode-as-base64.\nconst configScript = `\necho \"Initializing IOTA client configuration...\"\niota keytool import \"test test test test test test test test test test test junk\" ed25519\n`;\n\nexport const iotaWrapper = new SuiWrapper('iota', configScript, iotaDefaultVolumes);\n"]}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
+
import { setCredentialFeature } from './NDUVZQ7S.js';
|
|
1
2
|
import { parseKnownFiles, getProfileName } from './ELFNCT57.js';
|
|
2
3
|
import './OH4A2VLX.js';
|
|
3
|
-
import { setCredentialFeature } from './NDUVZQ7S.js';
|
|
4
4
|
import { CredentialsProviderError, chain } from './TTKDG2NN.js';
|
|
5
5
|
import { init_esm_shims, __name } from './4RNWLMHM.js';
|
|
6
6
|
|
|
@@ -21,7 +21,7 @@ init_esm_shims();
|
|
|
21
21
|
var resolveCredentialSource = /* @__PURE__ */ __name((credentialSource, profileName, logger) => {
|
|
22
22
|
const sourceProvidersMap = {
|
|
23
23
|
EcsContainer: /* @__PURE__ */ __name(async (options) => {
|
|
24
|
-
const { fromHttp } = await import('./
|
|
24
|
+
const { fromHttp } = await import('./7R7EZF6Z.js');
|
|
25
25
|
const { fromContainerMetadata } = await import('./RH2W4KPM.js');
|
|
26
26
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
|
|
27
27
|
return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
|
|
@@ -85,7 +85,7 @@ var resolveAssumeRoleCredentials = /* @__PURE__ */ __name(async (profileName, pr
|
|
|
85
85
|
const profileData = profiles[profileName];
|
|
86
86
|
const { source_profile, region } = profileData;
|
|
87
87
|
if (!options.roleAssumer) {
|
|
88
|
-
const { getDefaultRoleAssumer } = await import('./
|
|
88
|
+
const { getDefaultRoleAssumer } = await import('./35BIBLTE.js');
|
|
89
89
|
options.roleAssumer = getDefaultRoleAssumer({
|
|
90
90
|
...options.clientConfig,
|
|
91
91
|
credentialProviderLogger: options.logger,
|
|
@@ -136,7 +136,7 @@ var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ __name((section) => {
|
|
|
136
136
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
|
|
137
137
|
init_esm_shims();
|
|
138
138
|
var isProcessProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
|
|
139
|
-
var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile) => import('./
|
|
139
|
+
var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile) => import('./EDWLY6YP.js').then(({ fromProcess }) => fromProcess({
|
|
140
140
|
...options,
|
|
141
141
|
profile
|
|
142
142
|
})().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
|
|
@@ -144,7 +144,7 @@ var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile)
|
|
|
144
144
|
// ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
|
|
145
145
|
init_esm_shims();
|
|
146
146
|
var resolveSsoCredentials = /* @__PURE__ */ __name(async (profile, profileData, options = {}) => {
|
|
147
|
-
const { fromSSO } = await import('./
|
|
147
|
+
const { fromSSO } = await import('./S37YVMJL.js');
|
|
148
148
|
return fromSSO({
|
|
149
149
|
profile,
|
|
150
150
|
logger: options.logger,
|
|
@@ -191,7 +191,7 @@ var isWebIdentityProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeo
|
|
|
191
191
|
"undefined",
|
|
192
192
|
"string"
|
|
193
193
|
].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
|
|
194
|
-
var resolveWebIdentityCredentials = /* @__PURE__ */ __name(async (profile, options) => import('./
|
|
194
|
+
var resolveWebIdentityCredentials = /* @__PURE__ */ __name(async (profile, options) => import('./LF6BYBZY.js').then(({ fromTokenFile }) => fromTokenFile({
|
|
195
195
|
webIdentityTokenFile: profile.web_identity_token_file,
|
|
196
196
|
roleArn: profile.role_arn,
|
|
197
197
|
roleSessionName: profile.role_session_name,
|
|
@@ -246,5 +246,5 @@ var fromIni = /* @__PURE__ */ __name((_init = {}) => async ({ callerClientConfig
|
|
|
246
246
|
}, "fromIni");
|
|
247
247
|
|
|
248
248
|
export { fromIni };
|
|
249
|
-
//# sourceMappingURL=
|
|
250
|
-
//# sourceMappingURL=
|
|
249
|
+
//# sourceMappingURL=OANFSFAO.js.map
|
|
250
|
+
//# sourceMappingURL=OANFSFAO.js.map
|