@layerzerolabs/vm-tooling 0.2.22 → 0.2.24

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (180) hide show
  1. package/LICENSE +23 -0
  2. package/dist/4JD7YXQE.js +47 -0
  3. package/dist/4JD7YXQE.js.map +1 -0
  4. package/dist/C75WADM5.js +15 -0
  5. package/dist/C75WADM5.js.map +1 -0
  6. package/dist/{GEZ3XVTG.cjs → GD5UJA6I.cjs} +11 -17
  7. package/dist/GD5UJA6I.cjs.map +1 -0
  8. package/dist/{EP2ZMEJO.js → GNUGNPEQ.js} +47 -13
  9. package/dist/GNUGNPEQ.js.map +1 -0
  10. package/dist/ICMHRFCX.cjs +78 -0
  11. package/dist/ICMHRFCX.cjs.map +1 -0
  12. package/dist/{OMZA67EH.js → J2675KOZ.js} +5 -5
  13. package/dist/J2675KOZ.js.map +1 -0
  14. package/dist/{BEHAXLXQ.js → K5MQ7DAS.js} +4 -4
  15. package/dist/{BEHAXLXQ.js.map → K5MQ7DAS.js.map} +1 -1
  16. package/dist/{Y7XA7YWK.cjs → M7FR43QL.cjs} +5 -5
  17. package/dist/M7FR43QL.cjs.map +1 -0
  18. package/dist/{UGOYXDC2.js → V3AKNVHN.js} +10 -16
  19. package/dist/V3AKNVHN.js.map +1 -0
  20. package/dist/{VH4UXRKG.cjs → VAGPJO44.cjs} +49 -15
  21. package/dist/VAGPJO44.cjs.map +1 -0
  22. package/dist/{GG2ZAAIE.cjs → VFGI4IPI.cjs} +6 -6
  23. package/dist/{GG2ZAAIE.cjs.map → VFGI4IPI.cjs.map} +1 -1
  24. package/dist/Y6ZP4DWX.cjs +49 -0
  25. package/dist/Y6ZP4DWX.cjs.map +1 -0
  26. package/dist/YI63OKDP.js +53 -0
  27. package/dist/YI63OKDP.js.map +1 -0
  28. package/dist/Z55JUIO3.cjs +17 -0
  29. package/dist/Z55JUIO3.cjs.map +1 -0
  30. package/dist/cli.cjs +9 -9
  31. package/dist/cli.js +8 -8
  32. package/dist/config.cjs +8 -12
  33. package/dist/config.d.ts +6 -4
  34. package/dist/config.d.ts.map +1 -1
  35. package/dist/config.js +1 -1
  36. package/dist/core/index.cjs +5 -5
  37. package/dist/core/index.js +4 -4
  38. package/dist/core/tool-executor.cjs +5 -5
  39. package/dist/core/tool-executor.d.ts.map +1 -1
  40. package/dist/core/tool-executor.js +4 -4
  41. package/dist/github/index.cjs +5 -16
  42. package/dist/github/index.d.ts.map +1 -1
  43. package/dist/github/index.js +4 -15
  44. package/dist/github/matrix.cjs +4 -15
  45. package/dist/github/matrix.d.ts +13 -3
  46. package/dist/github/matrix.d.ts.map +1 -1
  47. package/dist/github/matrix.js +3 -14
  48. package/dist/index.cjs +22 -29
  49. package/dist/index.cjs.map +1 -1
  50. package/dist/index.d.ts +2 -1
  51. package/dist/index.d.ts.map +1 -1
  52. package/dist/index.js +11 -22
  53. package/dist/index.js.map +1 -1
  54. package/dist/test.cjs +4 -4
  55. package/dist/test.d.ts +1 -1
  56. package/dist/test.d.ts.map +1 -1
  57. package/dist/test.js +3 -3
  58. package/dist/utils/docker.cjs +6 -6
  59. package/dist/utils/docker.d.ts +2 -2
  60. package/dist/utils/docker.d.ts.map +1 -1
  61. package/dist/utils/docker.js +2 -2
  62. package/package.json +11 -5
  63. package/dist/3NXVR3DC.cjs +0 -18
  64. package/dist/3NXVR3DC.cjs.map +0 -1
  65. package/dist/3TIEGVTO.cjs +0 -431
  66. package/dist/3TIEGVTO.cjs.map +0 -1
  67. package/dist/3V7HWCTZ.js +0 -190
  68. package/dist/3V7HWCTZ.js.map +0 -1
  69. package/dist/3YN24Z7J.js +0 -261
  70. package/dist/3YN24Z7J.js.map +0 -1
  71. package/dist/427QOV7V.js +0 -348
  72. package/dist/427QOV7V.js.map +0 -1
  73. package/dist/4DNHANRV.cjs +0 -39
  74. package/dist/4DNHANRV.cjs.map +0 -1
  75. package/dist/5IOOBAVX.cjs +0 -832
  76. package/dist/5IOOBAVX.cjs.map +0 -1
  77. package/dist/5QZDX45Q.js +0 -1975
  78. package/dist/5QZDX45Q.js.map +0 -1
  79. package/dist/634Q3MUX.cjs +0 -1128
  80. package/dist/634Q3MUX.cjs.map +0 -1
  81. package/dist/77LS3AZK.cjs +0 -1977
  82. package/dist/77LS3AZK.cjs.map +0 -1
  83. package/dist/7AUJV34E.cjs +0 -144
  84. package/dist/7AUJV34E.cjs.map +0 -1
  85. package/dist/7HA6JSWY.cjs +0 -103
  86. package/dist/7HA6JSWY.cjs.map +0 -1
  87. package/dist/7JWBGU62.js +0 -141
  88. package/dist/7JWBGU62.js.map +0 -1
  89. package/dist/7O5SJUXT.cjs +0 -354
  90. package/dist/7O5SJUXT.cjs.map +0 -1
  91. package/dist/7R4LC2OX.js +0 -3246
  92. package/dist/7R4LC2OX.js.map +0 -1
  93. package/dist/DDKMZ6EE.js +0 -6
  94. package/dist/DDKMZ6EE.js.map +0 -1
  95. package/dist/DS4LZJHX.cjs +0 -252
  96. package/dist/DS4LZJHX.cjs.map +0 -1
  97. package/dist/EP2ZMEJO.js.map +0 -1
  98. package/dist/ERGNNQ6N.js +0 -16
  99. package/dist/ERGNNQ6N.js.map +0 -1
  100. package/dist/EXBTG2GQ.js +0 -4823
  101. package/dist/EXBTG2GQ.js.map +0 -1
  102. package/dist/FBKCEQT5.cjs +0 -263
  103. package/dist/FBKCEQT5.cjs.map +0 -1
  104. package/dist/FC7UGQEI.cjs +0 -19
  105. package/dist/FC7UGQEI.cjs.map +0 -1
  106. package/dist/FDH37YWR.cjs +0 -52
  107. package/dist/FDH37YWR.cjs.map +0 -1
  108. package/dist/FQPOYRQJ.cjs +0 -59
  109. package/dist/FQPOYRQJ.cjs.map +0 -1
  110. package/dist/GEZ3XVTG.cjs.map +0 -1
  111. package/dist/GHQS37WK.js +0 -251
  112. package/dist/GHQS37WK.js.map +0 -1
  113. package/dist/GVS7FGYI.cjs +0 -49
  114. package/dist/GVS7FGYI.cjs.map +0 -1
  115. package/dist/HVDH52K5.cjs +0 -3273
  116. package/dist/HVDH52K5.cjs.map +0 -1
  117. package/dist/HVR3WYCV.js +0 -70
  118. package/dist/HVR3WYCV.js.map +0 -1
  119. package/dist/I24EDDRD.cjs +0 -30
  120. package/dist/I24EDDRD.cjs.map +0 -1
  121. package/dist/IYIFH7LC.js +0 -29
  122. package/dist/IYIFH7LC.js.map +0 -1
  123. package/dist/J2A64VZU.js +0 -143
  124. package/dist/J2A64VZU.js.map +0 -1
  125. package/dist/JXS7ZGGU.js +0 -350
  126. package/dist/JXS7ZGGU.js.map +0 -1
  127. package/dist/MDE37STN.cjs +0 -146
  128. package/dist/MDE37STN.cjs.map +0 -1
  129. package/dist/OBHJ2FSI.cjs +0 -103
  130. package/dist/OBHJ2FSI.cjs.map +0 -1
  131. package/dist/OLCI6QQA.cjs +0 -73
  132. package/dist/OLCI6QQA.cjs.map +0 -1
  133. package/dist/OMZA67EH.js.map +0 -1
  134. package/dist/PFRT6NBP.js +0 -30
  135. package/dist/PFRT6NBP.js.map +0 -1
  136. package/dist/PQ4H7UWU.js +0 -51
  137. package/dist/PQ4H7UWU.js.map +0 -1
  138. package/dist/Q5L3QIKZ.cjs +0 -825
  139. package/dist/Q5L3QIKZ.cjs.map +0 -1
  140. package/dist/QDUIE3K3.js +0 -829
  141. package/dist/QDUIE3K3.js.map +0 -1
  142. package/dist/QEUMSA6O.cjs +0 -260
  143. package/dist/QEUMSA6O.cjs.map +0 -1
  144. package/dist/QHFDWPE3.js +0 -28
  145. package/dist/QHFDWPE3.js.map +0 -1
  146. package/dist/TQHAG73D.js +0 -46
  147. package/dist/TQHAG73D.js.map +0 -1
  148. package/dist/UFZOOGMQ.js +0 -46
  149. package/dist/UFZOOGMQ.js.map +0 -1
  150. package/dist/UGOYXDC2.js.map +0 -1
  151. package/dist/UOMNLT53.cjs +0 -33
  152. package/dist/UOMNLT53.cjs.map +0 -1
  153. package/dist/UUMDUUBJ.cjs +0 -194
  154. package/dist/UUMDUUBJ.cjs.map +0 -1
  155. package/dist/VEHBRPVG.js +0 -175
  156. package/dist/VEHBRPVG.js.map +0 -1
  157. package/dist/VH4UXRKG.cjs.map +0 -1
  158. package/dist/VM366GYK.js +0 -101
  159. package/dist/VM366GYK.js.map +0 -1
  160. package/dist/W3F4RJVY.js +0 -1103
  161. package/dist/W3F4RJVY.js.map +0 -1
  162. package/dist/W4QDYLOA.js +0 -17
  163. package/dist/W4QDYLOA.js.map +0 -1
  164. package/dist/WSDEGNMI.cjs +0 -56
  165. package/dist/WSDEGNMI.cjs.map +0 -1
  166. package/dist/WSES6SE2.js +0 -420
  167. package/dist/WSES6SE2.js.map +0 -1
  168. package/dist/XCUEIITH.js +0 -101
  169. package/dist/XCUEIITH.js.map +0 -1
  170. package/dist/XVWZAEKK.js +0 -807
  171. package/dist/XVWZAEKK.js.map +0 -1
  172. package/dist/Y7XA7YWK.cjs.map +0 -1
  173. package/dist/YHGTF22I.cjs +0 -4881
  174. package/dist/YHGTF22I.cjs.map +0 -1
  175. package/dist/Z7SRDY43.js +0 -250
  176. package/dist/Z7SRDY43.js.map +0 -1
  177. package/dist/ZGCH6KFP.cjs +0 -354
  178. package/dist/ZGCH6KFP.cjs.map +0 -1
  179. package/dist/ZTSEHGET.cjs +0 -182
  180. package/dist/ZTSEHGET.cjs.map +0 -1
package/dist/Z7SRDY43.js DELETED
@@ -1,250 +0,0 @@
1
- import { chain } from './QHFDWPE3.js';
2
- import { parseKnownFiles, getProfileName } from './GHQS37WK.js';
3
- import { setCredentialFeature } from './ERGNNQ6N.js';
4
- import { CredentialsProviderError } from './UFZOOGMQ.js';
5
- import { init_esm_shims, __name } from './6AHA7PAZ.js';
6
-
7
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js
8
- init_esm_shims();
9
-
10
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
11
- init_esm_shims();
12
-
13
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
14
- init_esm_shims();
15
-
16
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
17
- init_esm_shims();
18
-
19
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
20
- init_esm_shims();
21
- var resolveCredentialSource = /* @__PURE__ */ __name((credentialSource, profileName, logger) => {
22
- const sourceProvidersMap = {
23
- EcsContainer: /* @__PURE__ */ __name(async (options) => {
24
- const { fromHttp } = await import('./427QOV7V.js');
25
- const { fromContainerMetadata } = await import('./WSES6SE2.js');
26
- logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
27
- return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
28
- }, "EcsContainer"),
29
- Ec2InstanceMetadata: /* @__PURE__ */ __name(async (options) => {
30
- logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
31
- const { fromInstanceMetadata } = await import('./WSES6SE2.js');
32
- return async () => fromInstanceMetadata(options)().then(setNamedProvider);
33
- }, "Ec2InstanceMetadata"),
34
- Environment: /* @__PURE__ */ __name(async (options) => {
35
- logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
36
- const { fromEnv } = await import('./DDKMZ6EE.js');
37
- return async () => fromEnv(options)().then(setNamedProvider);
38
- }, "Environment")
39
- };
40
- if (credentialSource in sourceProvidersMap) {
41
- return sourceProvidersMap[credentialSource];
42
- } else {
43
- throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, {
44
- logger
45
- });
46
- }
47
- }, "resolveCredentialSource");
48
- var setNamedProvider = /* @__PURE__ */ __name((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p"), "setNamedProvider");
49
-
50
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
51
- var isAssumeRoleProfile = /* @__PURE__ */ __name((arg, { profile = "default", logger } = {}) => {
52
- return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && [
53
- "undefined",
54
- "string"
55
- ].indexOf(typeof arg.role_session_name) > -1 && [
56
- "undefined",
57
- "string"
58
- ].indexOf(typeof arg.external_id) > -1 && [
59
- "undefined",
60
- "string"
61
- ].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, {
62
- profile,
63
- logger
64
- }) || isCredentialSourceProfile(arg, {
65
- profile,
66
- logger
67
- }));
68
- }, "isAssumeRoleProfile");
69
- var isAssumeRoleWithSourceProfile = /* @__PURE__ */ __name((arg, { profile, logger }) => {
70
- const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
71
- if (withSourceProfile) {
72
- logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
73
- }
74
- return withSourceProfile;
75
- }, "isAssumeRoleWithSourceProfile");
76
- var isCredentialSourceProfile = /* @__PURE__ */ __name((arg, { profile, logger }) => {
77
- const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
78
- if (withProviderProfile) {
79
- logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
80
- }
81
- return withProviderProfile;
82
- }, "isCredentialSourceProfile");
83
- var resolveAssumeRoleCredentials = /* @__PURE__ */ __name(async (profileName, profiles, options, visitedProfiles = {}) => {
84
- options.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");
85
- const profileData = profiles[profileName];
86
- const { source_profile, region } = profileData;
87
- if (!options.roleAssumer) {
88
- const { getDefaultRoleAssumer } = await import('./7R4LC2OX.js');
89
- options.roleAssumer = getDefaultRoleAssumer({
90
- ...options.clientConfig,
91
- credentialProviderLogger: options.logger,
92
- parentClientConfig: {
93
- ...options?.parentClientConfig,
94
- region: region ?? options?.parentClientConfig?.region
95
- }
96
- }, options.clientPlugins);
97
- }
98
- if (source_profile && source_profile in visitedProfiles) {
99
- throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${getProfileName(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "), {
100
- logger: options.logger
101
- });
102
- }
103
- options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);
104
- const sourceCredsProvider = source_profile ? resolveProfileData(source_profile, profiles, options, {
105
- ...visitedProfiles,
106
- [source_profile]: true
107
- }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {})) : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();
108
- if (isCredentialSourceWithoutRoleArn(profileData)) {
109
- return sourceCredsProvider.then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
110
- } else {
111
- const params = {
112
- RoleArn: profileData.role_arn,
113
- RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,
114
- ExternalId: profileData.external_id,
115
- DurationSeconds: parseInt(profileData.duration_seconds || "3600", 10)
116
- };
117
- const { mfa_serial } = profileData;
118
- if (mfa_serial) {
119
- if (!options.mfaCodeProvider) {
120
- throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, {
121
- logger: options.logger,
122
- tryNextLink: false
123
- });
124
- }
125
- params.SerialNumber = mfa_serial;
126
- params.TokenCode = await options.mfaCodeProvider(mfa_serial);
127
- }
128
- const sourceCreds = await sourceCredsProvider;
129
- return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
130
- }
131
- }, "resolveAssumeRoleCredentials");
132
- var isCredentialSourceWithoutRoleArn = /* @__PURE__ */ __name((section) => {
133
- return !section.role_arn && !!section.credential_source;
134
- }, "isCredentialSourceWithoutRoleArn");
135
-
136
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
137
- init_esm_shims();
138
- var isProcessProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
139
- var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile) => import('./XCUEIITH.js').then(({ fromProcess }) => fromProcess({
140
- ...options,
141
- profile
142
- })().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v"))), "resolveProcessCredentials");
143
-
144
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
145
- init_esm_shims();
146
- var resolveSsoCredentials = /* @__PURE__ */ __name(async (profile, profileData, options = {}) => {
147
- const { fromSSO } = await import('./JXS7ZGGU.js');
148
- return fromSSO({
149
- profile,
150
- logger: options.logger,
151
- parentClientConfig: options.parentClientConfig,
152
- clientConfig: options.clientConfig
153
- })().then((creds) => {
154
- if (profileData.sso_session) {
155
- return setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO", "r");
156
- } else {
157
- return setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO_LEGACY", "t");
158
- }
159
- });
160
- }, "resolveSsoCredentials");
161
- var isSsoProfile = /* @__PURE__ */ __name((arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string"), "isSsoProfile");
162
-
163
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
164
- init_esm_shims();
165
- var isStaticCredsProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && [
166
- "undefined",
167
- "string"
168
- ].indexOf(typeof arg.aws_session_token) > -1 && [
169
- "undefined",
170
- "string"
171
- ].indexOf(typeof arg.aws_account_id) > -1, "isStaticCredsProfile");
172
- var resolveStaticCredentials = /* @__PURE__ */ __name(async (profile, options) => {
173
- options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
174
- const credentials = {
175
- accessKeyId: profile.aws_access_key_id,
176
- secretAccessKey: profile.aws_secret_access_key,
177
- sessionToken: profile.aws_session_token,
178
- ...profile.aws_credential_scope && {
179
- credentialScope: profile.aws_credential_scope
180
- },
181
- ...profile.aws_account_id && {
182
- accountId: profile.aws_account_id
183
- }
184
- };
185
- return setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
186
- }, "resolveStaticCredentials");
187
-
188
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
189
- init_esm_shims();
190
- var isWebIdentityProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && [
191
- "undefined",
192
- "string"
193
- ].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
194
- var resolveWebIdentityCredentials = /* @__PURE__ */ __name(async (profile, options) => import('./HVR3WYCV.js').then(({ fromTokenFile }) => fromTokenFile({
195
- webIdentityTokenFile: profile.web_identity_token_file,
196
- roleArn: profile.role_arn,
197
- roleSessionName: profile.role_session_name,
198
- roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
199
- logger: options.logger,
200
- parentClientConfig: options.parentClientConfig
201
- })().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q"))), "resolveWebIdentityCredentials");
202
-
203
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
204
- var resolveProfileData = /* @__PURE__ */ __name(async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
205
- const data = profiles[profileName];
206
- if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
207
- return resolveStaticCredentials(data, options);
208
- }
209
- if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, {
210
- profile: profileName,
211
- logger: options.logger
212
- })) {
213
- return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);
214
- }
215
- if (isStaticCredsProfile(data)) {
216
- return resolveStaticCredentials(data, options);
217
- }
218
- if (isWebIdentityProfile(data)) {
219
- return resolveWebIdentityCredentials(data, options);
220
- }
221
- if (isProcessProfile(data)) {
222
- return resolveProcessCredentials(options, profileName);
223
- }
224
- if (isSsoProfile(data)) {
225
- return await resolveSsoCredentials(profileName, data, options);
226
- }
227
- throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, {
228
- logger: options.logger
229
- });
230
- }, "resolveProfileData");
231
-
232
- // ../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
233
- var fromIni = /* @__PURE__ */ __name((_init = {}) => async ({ callerClientConfig } = {}) => {
234
- const init = {
235
- ..._init,
236
- parentClientConfig: {
237
- ...callerClientConfig,
238
- ..._init.parentClientConfig
239
- }
240
- };
241
- init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
242
- const profiles = await parseKnownFiles(init);
243
- return resolveProfileData(getProfileName({
244
- profile: _init.profile ?? callerClientConfig?.profile
245
- }), profiles, init);
246
- }, "fromIni");
247
-
248
- export { fromIni };
249
- //# sourceMappingURL=Z7SRDY43.js.map
250
- //# sourceMappingURL=Z7SRDY43.js.map
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.pnpm/@aws-sdk+credential-provider-ini@3.879.0/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js"],"names":["resolveCredentialSource","credentialSource","profileName","logger","sourceProvidersMap","EcsContainer","options","fromHttp","fromContainerMetadata","debug","chain","then","setNamedProvider","Ec2InstanceMetadata","fromInstanceMetadata","Environment","fromEnv","CredentialsProviderError","creds","setCredentialFeature","isAssumeRoleProfile","arg","profile","Boolean","role_arn","indexOf","role_session_name","external_id","mfa_serial","isAssumeRoleWithSourceProfile","isCredentialSourceProfile","withSourceProfile","source_profile","credential_source","withProviderProfile","resolveAssumeRoleCredentials","profiles","visitedProfiles","profileData","region","roleAssumer","getDefaultRoleAssumer","clientConfig","credentialProviderLogger","parentClientConfig","clientPlugins","getProfileName","Object","keys","join","sourceCredsProvider","resolveProfileData","isCredentialSourceWithoutRoleArn","params","RoleArn","RoleSessionName","Date","now","ExternalId","DurationSeconds","parseInt","duration_seconds","mfaCodeProvider","tryNextLink","SerialNumber","TokenCode","sourceCreds","section","isProcessProfile","credential_process","resolveProcessCredentials","fromProcess","resolveSsoCredentials","fromSSO","sso_session","isSsoProfile","sso_start_url","sso_account_id","sso_region","sso_role_name","isStaticCredsProfile","aws_access_key_id","aws_secret_access_key","aws_session_token","aws_account_id","resolveStaticCredentials","credentials","accessKeyId","secretAccessKey","sessionToken","aws_credential_scope","credentialScope","accountId","isWebIdentityProfile","web_identity_token_file","resolveWebIdentityCredentials","fromTokenFile","webIdentityTokenFile","roleArn","roleSessionName","roleAssumerWithWebIdentity","isAssumeRoleRecursiveCall","data","length","fromIni","_init","callerClientConfig","init","parseKnownFiles"],"mappings":";;;;;;;AAAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;;;ACAA,cAAA,EAAA;AAEO,IAAMA,uBAAAA,mBAA0B,MAAA,CAAA,CAACC,gBAAAA,EAAkBC,WAAAA,EAAaC,MAAAA,KAAAA;AACnE,EAAA,MAAMC,kBAAAA,GAAqB;AACvBC,IAAAA,YAAAA,gCAAqBC,OAAAA,KAAAA;AACjB,MAAA,MAAM,EAAEC,QAAAA,EAAQ,GAAK,MAAM,OAAO,eAAA,CAAA;AAClC,MAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC/CL,MAAAA,MAAAA,EAAQM,MAAM,sEAAA,CAAA;AACd,MAAA,OAAO,YAAYC,KAAAA,CAAMH,QAAAA,CAASD,OAAAA,IAAW,EAAC,CAAA,EAAIE,qBAAAA,CAAsBF,OAAAA,CAAAA,CAAAA,EAAAA,CAAYK,KAAKC,gBAAAA,CAAAA;IAC7F,CAAA,EALc,cAAA,CAAA;AAMdC,IAAAA,mBAAAA,gCAA4BP,OAAAA,KAAAA;AACxBH,MAAAA,MAAAA,EAAQM,MAAM,6EAAA,CAAA;AACd,MAAA,MAAM,EAAEK,oBAAAA,EAAoB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC9C,MAAA,OAAO,YAAYA,oBAAAA,CAAqBR,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC5D,CAAA,EAJqB,qBAAA,CAAA;AAKrBG,IAAAA,WAAAA,gCAAoBT,OAAAA,KAAAA;AAChBH,MAAAA,MAAAA,EAAQM,MAAM,qEAAA,CAAA;AACd,MAAA,MAAM,EAAEO,OAAAA,EAAO,GAAK,MAAM,OAAO,eAAA,CAAA;AACjC,MAAA,OAAO,YAAYA,OAAAA,CAAQV,OAAAA,CAAAA,EAAAA,CAAWK,KAAKC,gBAAAA,CAAAA;IAC/C,CAAA,EAJa,aAAA;AAKjB,GAAA;AACA,EAAA,IAAIX,oBAAoBG,kBAAAA,EAAoB;AACxC,IAAA,OAAOA,mBAAmBH,gBAAAA,CAAAA;EAC9B,CAAA,MACK;AACD,IAAA,MAAM,IAAIgB,wBAAAA,CAAyB,CAAA,yCAAA,EAA4Cf,WAAAA,CAAAA,MAAAA,EAAoBD,gBAAAA,CAAAA,8DAAAA,CAAAA,EAC/B;AAAEE,MAAAA;KAAO,CAAA;AACjF,EAAA;AACJ,CAAA,EA1BuC,yBAAA,CAAA;AA2BvC,IAAMS,mCAAmB,MAAA,CAAA,CAACM,KAAAA,KAAUC,qBAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,EAA7E,kBAAA,CAAA;;;ADxBlB,IAAME,mBAAAA,2BAAuBC,GAAAA,EAAK,EAAEC,UAAU,SAAA,EAAWnB,MAAAA,EAAM,GAAK,EAAC,KAAC;AACzE,EAAA,OAAQoB,OAAAA,CAAQF,GAAAA,CAAAA,IACZ,OAAOA,QAAQ,QAAA,IACf,OAAOA,GAAAA,CAAIG,QAAAA,KAAa,QAAA,IACxB;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUC,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUD,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIM,WAAW,CAAA,GAAI,EAAA,IAC1D;AAAC,IAAA,WAAA;AAAa,IAAA;AAAUF,GAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIO,UAAU,CAAA,GAAI,EAAA,KACxDC,8BAA8BR,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,IAAM2B,0BAA0BT,GAAAA,EAAK;AAAEC,IAAAA,OAAAA;AAASnB,IAAAA;GAAO,CAAA,CAAA;AACrH,CAAA,EARmC,qBAAA,CAAA;AASnC,IAAM0B,gDAAgC,MAAA,CAAA,CAACR,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AAC3D,EAAA,MAAM4B,oBAAoB,OAAOV,GAAAA,CAAIW,mBAAmB,QAAA,IAAY,OAAOX,IAAIY,iBAAAA,KAAsB,WAAA;AACrG,EAAA,IAAIF,iBAAAA,EAAmB;AACnB5B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,8CAAAA,EAAwDD,GAAAA,CAAIW,cAAc,CAAA,CAAE,CAAA;AACvG,EAAA;AACA,EAAA,OAAOD,iBAAAA;AACX,CAAA,EANsC,+BAAA,CAAA;AAOtC,IAAMD,4CAA4B,MAAA,CAAA,CAACT,GAAAA,EAAK,EAAEC,OAAAA,EAASnB,QAAM,KAAE;AACvD,EAAA,MAAM+B,sBAAsB,OAAOb,GAAAA,CAAIY,sBAAsB,QAAA,IAAY,OAAOZ,IAAIW,cAAAA,KAAmB,WAAA;AACvG,EAAA,IAAIE,mBAAAA,EAAqB;AACrB/B,IAAAA,MAAAA,EAAQM,QAAQ,CAAA,IAAA,EAAOa,OAAAA,CAAAA,6CAAAA,EAAuDD,GAAAA,CAAIY,iBAAiB,CAAA,CAAE,CAAA;AACzG,EAAA;AACA,EAAA,OAAOC,mBAAAA;AACX,CAAA,EANkC,2BAAA,CAAA;AAO3B,IAAMC,+CAA+B,MAAA,CAAA,OAAOjC,WAAAA,EAAakC,UAAU9B,OAAAA,EAAS+B,eAAAA,GAAkB,EAAC,KAAC;AACnG/B,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,MAAM,uEAAA,CAAA;AACtB,EAAA,MAAM6B,WAAAA,GAAcF,SAASlC,WAAAA,CAAAA;AAC7B,EAAA,MAAM,EAAE8B,cAAAA,EAAgBO,MAAAA,EAAM,GAAKD,WAAAA;AACnC,EAAA,IAAI,CAAChC,QAAQkC,WAAAA,EAAa;AACtB,IAAA,MAAM,EAAEC,qBAAAA,EAAqB,GAAK,MAAM,OAAO,eAAA,CAAA;AAC/CnC,IAAAA,OAAAA,CAAQkC,cAAcC,qBAAAA,CAAsB;AACxC,MAAA,GAAGnC,OAAAA,CAAQoC,YAAAA;AACXC,MAAAA,wBAAAA,EAA0BrC,OAAAA,CAAQH,MAAAA;MAClCyC,kBAAAA,EAAoB;AAChB,QAAA,GAAGtC,OAAAA,EAASsC,kBAAAA;QACZL,MAAAA,EAAQA,MAAAA,IAAUjC,SAASsC,kBAAAA,EAAoBL;AACnD;AACJ,KAAA,EAAGjC,QAAQuC,aAAa,CAAA;AAC5B,EAAA;AACA,EAAA,IAAIb,cAAAA,IAAkBA,kBAAkBK,eAAAA,EAAiB;AACrD,IAAA,MAAM,IAAIpB,wBAAAA,CAAyB,CAAA,+DAAA,EAC3B6B,cAAAA,CAAexC,OAAAA,CAAAA,CAAAA,oBAAAA,CAAAA,GACnByC,MAAAA,CAAOC,IAAAA,CAAKX,eAAAA,CAAAA,CAAiBY,IAAAA,CAAK,IAAA,CAAA,EAAO;AAAE9C,MAAAA,MAAAA,EAAQG,OAAAA,CAAQH;KAAO,CAAA;AAC1E,EAAA;AACAG,EAAAA,OAAAA,CAAQH,MAAAA,EAAQM,KAAAA,CAAM,CAAA,qEAAA,EAAwEuB,cAAAA,GAAiB,CAAA,gBAAA,EAAmBA,cAAAA,CAAAA,CAAAA,CAAAA,GAAoB,CAAA,SAAA,EAAY9B,WAAAA,CAAAA,CAAAA,CAAc,CAAA,CAAE,CAAA;AAClL,EAAA,MAAMgD,mBAAAA,GAAsBlB,cAAAA,GACtBmB,kBAAAA,CAAmBnB,cAAAA,EAAgBI,UAAU9B,OAAAA,EAAS;IACpD,GAAG+B,eAAAA;AACH,IAAA,CAACL,cAAAA,GAAiB;AACtB,GAAA,EAAGoB,iCAAiChB,QAAAA,CAASJ,cAAAA,CAAAA,IAAmB,EAAC,CAAA,CAAA,GAAA,CAC9D,MAAMhC,uBAAAA,CAAwBsC,YAAYL,iBAAAA,EAAmB/B,WAAAA,EAAaI,QAAQH,MAAM,CAAA,CAAEG,OAAAA,CAAAA,GAAO;AACxG,EAAA,IAAI8C,gCAAAA,CAAiCd,WAAAA,CAAAA,EAAc;AAC/C,IAAA,OAAOY,mBAAAA,CAAoBvC,KAAK,CAACO,KAAAA,KAAUC,qBAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;EACjH,CAAA,MACK;AACD,IAAA,MAAMmC,MAAAA,GAAS;AACXC,MAAAA,OAAAA,EAAShB,WAAAA,CAAYd,QAAAA;AACrB+B,MAAAA,eAAAA,EAAiBjB,WAAAA,CAAYZ,iBAAAA,IAAqB,CAAA,WAAA,EAAc8B,IAAAA,CAAKC,KAAG,CAAA,CAAA;AACxEC,MAAAA,UAAAA,EAAYpB,WAAAA,CAAYX,WAAAA;AACxBgC,MAAAA,eAAAA,EAAiBC,QAAAA,CAAStB,WAAAA,CAAYuB,gBAAAA,IAAoB,MAAA,EAAQ,EAAA;AACtE,KAAA;AACA,IAAA,MAAM,EAAEjC,YAAU,GAAKU,WAAAA;AACvB,IAAA,IAAIV,UAAAA,EAAY;AACZ,MAAA,IAAI,CAACtB,QAAQwD,eAAAA,EAAiB;AAC1B,QAAA,MAAM,IAAI7C,wBAAAA,CAAyB,CAAA,QAAA,EAAWf,WAAAA,CAAAA,6EAAAA,CAAAA,EAA4F;AAAEC,UAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;UAAQ4D,WAAAA,EAAa;SAAM,CAAA;AAC3L,MAAA;AACAV,MAAAA,MAAAA,CAAOW,YAAAA,GAAepC,UAAAA;AACtByB,MAAAA,MAAAA,CAAOY,SAAAA,GAAY,MAAM3D,OAAAA,CAAQwD,eAAAA,CAAgBlC,UAAAA,CAAAA;AACrD,IAAA;AACA,IAAA,MAAMsC,cAAc,MAAMhB,mBAAAA;AAC1B,IAAA,OAAO5C,OAAAA,CAAQkC,WAAAA,CAAY0B,WAAAA,EAAab,MAAAA,CAAAA,CAAQ1C,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,oCAAA,EAAsC,GAAA,CAAA,CAAA;AACtI,EAAA;AACJ,CAAA,EAhD4C,8BAAA,CAAA;AAiD5C,IAAMkC,gCAAAA,2BAAoCe,OAAAA,KAAAA;AACtC,EAAA,OAAO,CAACA,OAAAA,CAAQ3C,QAAAA,IAAY,CAAC,CAAC2C,OAAAA,CAAQlC,iBAAAA;AAC1C,CAAA,EAFyC,kCAAA,CAAA;;;AE7EzC,cAAA,EAAA;AACO,IAAMmC,gBAAAA,mBAAmB,MAAA,CAAA,CAAC/C,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,CAAAA,IAAQ,OAAOA,GAAAA,KAAQ,QAAA,IAAY,OAAOA,GAAAA,CAAIgD,kBAAAA,KAAuB,QAAA,EAAtF,kBAAA,CAAA;AACzB,IAAMC,yBAAAA,mBAA4B,MAAA,CAAA,OAAOhE,OAAAA,EAASgB,OAAAA,KAAY,OAAO,eAAA,CAAA,CAAwCX,IAAAA,CAAK,CAAC,EAAE4D,WAAAA,EAAW,KAAOA,WAAAA,CAAY;EACtJ,GAAGjE,OAAAA;AACHgB,EAAAA;AACJ,CAAA,CAAA,EAAA,CAAKX,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,6BAAA,EAA+B,GAAA,CAAA,CAAA,CAAA,EAHvC,2BAAA,CAAA;;;ACFzC,cAAA,EAAA;AACO,IAAMsD,wCAAwB,MAAA,CAAA,OAAOlD,OAAAA,EAASgB,WAAAA,EAAahC,OAAAA,GAAU,EAAC,KAAC;AAC1E,EAAA,MAAM,EAAEmE,OAAAA,EAAO,GAAK,MAAM,OAAO,eAAA,CAAA;AACjC,EAAA,OAAOA,OAAAA,CAAQ;AACXnD,IAAAA,OAAAA;AACAnB,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,IAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC,kBAAAA;AAC5BF,IAAAA,YAAAA,EAAcpC,OAAAA,CAAQoC;AAC1B,GAAA,CAAA,EAAA,CAAK/B,IAAAA,CAAK,CAACO,KAAAA,KAAAA;AACP,IAAA,IAAIoB,YAAYoC,WAAAA,EAAa;AACzB,MAAA,OAAOvD,oBAAAA,CAAqBD,KAAAA,EAAO,yBAAA,EAA2B,GAAA,CAAA;IAClE,CAAA,MACK;AACD,MAAA,OAAOC,oBAAAA,CAAqBD,KAAAA,EAAO,gCAAA,EAAkC,GAAA,CAAA;AACzE,IAAA;EACJ,CAAA,CAAA;AACJ,CAAA,EAfqC,uBAAA,CAAA;AAgB9B,IAAMyD,YAAAA,2BAAgBtD,GAAAA,KAAQA,GAAAA,KAChC,OAAOA,GAAAA,CAAIuD,aAAAA,KAAkB,QAAA,IAC1B,OAAOvD,GAAAA,CAAIwD,cAAAA,KAAmB,YAC9B,OAAOxD,GAAAA,CAAIqD,WAAAA,KAAgB,QAAA,IAC3B,OAAOrD,GAAAA,CAAIyD,eAAe,QAAA,IAC1B,OAAOzD,GAAAA,CAAI0D,aAAAA,KAAkB,QAAA,CAAA,EALT,cAAA,CAAA;;;ACjB5B,cAAA,EAAA;AACO,IAAMC,uCAAuB,MAAA,CAAA,CAAC3D,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAI4D,iBAAAA,KAAsB,QAAA,IACjC,OAAO5D,GAAAA,CAAI6D,0BAA0B,QAAA,IACrC;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUzD,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI8D,iBAAiB,CAAA,GAAI,EAAA,IAChE;AAAC,EAAA,WAAA;AAAa,EAAA;AAAU1D,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAI+D,cAAc,CAAA,GAAI,EAAA,EAL7B,sBAAA,CAAA;AAM7B,IAAMC,wBAAAA,mBAA2B,MAAA,CAAA,OAAO/D,OAAAA,EAAShB,OAAAA,KAAAA;AACpDA,EAAAA,OAAAA,EAASH,MAAAA,EAAQM,MAAM,6DAAA,CAAA;AACvB,EAAA,MAAM6E,WAAAA,GAAc;AAChBC,IAAAA,WAAAA,EAAajE,OAAAA,CAAQ2D,iBAAAA;AACrBO,IAAAA,eAAAA,EAAiBlE,OAAAA,CAAQ4D,qBAAAA;AACzBO,IAAAA,YAAAA,EAAcnE,OAAAA,CAAQ6D,iBAAAA;AACtB,IAAA,GAAI7D,QAAQoE,oBAAAA,IAAwB;AAAEC,MAAAA,eAAAA,EAAiBrE,OAAAA,CAAQoE;AAAqB,KAAA;AACpF,IAAA,GAAIpE,QAAQ8D,cAAAA,IAAkB;AAAEQ,MAAAA,SAAAA,EAAWtE,OAAAA,CAAQ8D;AAAe;AACtE,GAAA;AACA,EAAA,OAAOjE,oBAAAA,CAAqBmE,WAAAA,EAAa,qBAAA,EAAuB,GAAA,CAAA;AACpE,CAAA,EAVwC,0BAAA,CAAA;;;ACPxC,cAAA,EAAA;AACO,IAAMO,uCAAuB,MAAA,CAAA,CAACxE,GAAAA,KAAQE,OAAAA,CAAQF,GAAAA,KACjD,OAAOA,GAAAA,KAAQ,QAAA,IACf,OAAOA,IAAIyE,uBAAAA,KAA4B,QAAA,IACvC,OAAOzE,GAAAA,CAAIG,aAAa,QAAA,IACxB;AAAC,EAAA,WAAA;AAAa,EAAA;AAAUC,CAAAA,CAAAA,OAAAA,CAAQ,OAAOJ,GAAAA,CAAIK,iBAAiB,CAAA,GAAI,EAAA,EAJhC,sBAAA,CAAA;AAK7B,IAAMqE,6BAAAA,mBAAgC,MAAA,CAAA,OAAOzE,OAAAA,EAAShB,OAAAA,KAAY,OAAO,eAAA,CAAA,CAA6CK,IAAAA,CAAK,CAAC,EAAEqF,aAAAA,EAAa,KAAOA,aAAAA,CAAc;AACnKC,EAAAA,oBAAAA,EAAsB3E,OAAAA,CAAQwE,uBAAAA;AAC9BI,EAAAA,OAAAA,EAAS5E,OAAAA,CAAQE,QAAAA;AACjB2E,EAAAA,eAAAA,EAAiB7E,OAAAA,CAAQI,iBAAAA;AACzB0E,EAAAA,0BAAAA,EAA4B9F,OAAAA,CAAQ8F,0BAAAA;AACpCjG,EAAAA,MAAAA,EAAQG,OAAAA,CAAQH,MAAAA;AAChByC,EAAAA,kBAAAA,EAAoBtC,OAAAA,CAAQsC;AAChC,CAAA,CAAA,EAAA,CAAKjC,IAAAA,CAAK,CAACO,KAAAA,KAAUC,oBAAAA,CAAqBD,KAAAA,EAAO,sCAAA,EAAwC,GAAA,CAAA,CAAA,CAAA,EAP5C,+BAAA,CAAA;;;ANAtC,IAAMiC,kBAAAA,iCAA4BjD,WAAAA,EAAakC,QAAAA,EAAU9B,SAAS+B,eAAAA,GAAkB,EAAC,EAAGgE,yBAAAA,GAA4B,KAAA,KAAK;AAC5H,EAAA,MAAMC,IAAAA,GAAOlE,SAASlC,WAAAA,CAAAA;AACtB,EAAA,IAAI6C,MAAAA,CAAOC,KAAKX,eAAAA,CAAAA,CAAiBkE,SAAS,CAAA,IAAKvB,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AACvE,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAI+F,yBAAAA,IAA6BjF,oBAAoBkF,IAAAA,EAAM;IAAEhF,OAAAA,EAASpB,WAAAA;AAAaC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;AAAO,GAAA,CAAA,EAAI;AAC1G,IAAA,OAAOgC,4BAAAA,CAA6BjC,WAAAA,EAAakC,QAAAA,EAAU9B,OAAAA,EAAS+B,eAAAA,CAAAA;AACxE,EAAA;AACA,EAAA,IAAI2C,oBAAAA,CAAqBsB,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOjB,wBAAAA,CAAyBiB,MAAMhG,OAAAA,CAAAA;AAC1C,EAAA;AACA,EAAA,IAAIuF,oBAAAA,CAAqBS,IAAAA,CAAAA,EAAO;AAC5B,IAAA,OAAOP,6BAAAA,CAA8BO,MAAMhG,OAAAA,CAAAA;AAC/C,EAAA;AACA,EAAA,IAAI8D,gBAAAA,CAAiBkC,IAAAA,CAAAA,EAAO;AACxB,IAAA,OAAOhC,yBAAAA,CAA0BhE,SAASJ,WAAAA,CAAAA;AAC9C,EAAA;AACA,EAAA,IAAIyE,YAAAA,CAAa2B,IAAAA,CAAAA,EAAO;AACpB,IAAA,OAAO,MAAM9B,qBAAAA,CAAsBtE,WAAAA,EAAaoG,IAAAA,EAAMhG,OAAAA,CAAAA;AAC1D,EAAA;AACA,EAAA,MAAM,IAAIW,wBAAAA,CAAyB,CAAA,8CAAA,EAAiDf,WAAAA,CAAAA,uCAAAA,CAAAA,EAAsD;AAAEC,IAAAA,MAAAA,EAAQG,OAAAA,CAAQH;GAAO,CAAA;AACvK,CAAA,EArBkC,oBAAA,CAAA;;;ADJ3B,IAAMqG,OAAAA,mBAAU,MAAA,CAAA,CAACC,KAAAA,GAAQ,EAAC,KAAM,OAAO,EAAEC,kBAAAA,EAAkB,GAAK,EAAC,KAAC;AACrE,EAAA,MAAMC,IAAAA,GAAO;IACT,GAAGF,KAAAA;IACH7D,kBAAAA,EAAoB;MAChB,GAAG8D,kBAAAA;AACH,MAAA,GAAGD,KAAAA,CAAM7D;AACb;AACJ,GAAA;AACA+D,EAAAA,IAAAA,CAAKxG,MAAAA,EAAQM,MAAM,4CAAA,CAAA;AACnB,EAAA,MAAM2B,QAAAA,GAAW,MAAMwE,eAAAA,CAAgBD,IAAAA,CAAAA;AACvC,EAAA,OAAOxD,mBAAmBL,cAAAA,CAAe;IACrCxB,OAAAA,EAASmF,KAAAA,CAAMnF,WAAWoF,kBAAAA,EAAoBpF;GAClD,CAAA,EAAIc,UAAUuE,IAAAA,CAAAA;AAClB,CAAA,EAbuB,SAAA","file":"Z7SRDY43.js","sourcesContent":["export * from \"./fromIni\";\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (_init = {}) => async ({ callerClientConfig } = {}) => {\n const init = {\n ..._init,\n parentClientConfig: {\n ...callerClientConfig,\n ..._init.parentClientConfig,\n },\n };\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: _init.profile ?? callerClientConfig?.profile,\n }), profiles, init);\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })().then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n"]}