@rharkor/caching-for-turbo 2.3.10 → 2.3.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/136.index.js +514 -328
- package/dist/cli/136.index.js.map +1 -1
- package/dist/cli/360.index.js +3 -3
- package/dist/cli/360.index.js.map +1 -1
- package/dist/cli/443.index.js +362 -227
- package/dist/cli/443.index.js.map +1 -1
- package/dist/cli/579.index.js +9 -1
- package/dist/cli/579.index.js.map +1 -1
- package/dist/cli/605.index.js +1 -1
- package/dist/cli/605.index.js.map +1 -1
- package/dist/cli/762.index.js +363 -187
- package/dist/cli/762.index.js.map +1 -1
- package/dist/cli/869.index.js +2 -2
- package/dist/cli/956.index.js +16 -896
- package/dist/cli/956.index.js.map +1 -1
- package/dist/cli/998.index.js +549 -865
- package/dist/cli/998.index.js.map +1 -1
- package/dist/cli/index.js +184357 -186911
- package/dist/cli/licenses.txt +0 -409
- package/dist/cli/worker.js +18 -13
- package/package.json +2 -2
package/dist/cli/762.index.js
CHANGED
|
@@ -8,7 +8,7 @@ export const modules = {
|
|
|
8
8
|
|
|
9
9
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
10
10
|
exports.resolveHttpAuthSchemeConfig = exports.defaultSigninHttpAuthSchemeProvider = exports.defaultSigninHttpAuthSchemeParametersProvider = void 0;
|
|
11
|
-
const
|
|
11
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
12
12
|
const util_middleware_1 = __webpack_require__(76324);
|
|
13
13
|
const defaultSigninHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
14
14
|
return {
|
|
@@ -55,7 +55,7 @@ const defaultSigninHttpAuthSchemeProvider = (authParameters) => {
|
|
|
55
55
|
};
|
|
56
56
|
exports.defaultSigninHttpAuthSchemeProvider = defaultSigninHttpAuthSchemeProvider;
|
|
57
57
|
const resolveHttpAuthSchemeConfig = (config) => {
|
|
58
|
-
const config_0 = (0,
|
|
58
|
+
const config_0 = (0, httpAuthSchemes_1.resolveAwsSdkSigV4Config)(config);
|
|
59
59
|
return Object.assign(config_0, {
|
|
60
60
|
authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
|
|
61
61
|
});
|
|
@@ -97,8 +97,134 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
|
|
|
97
97
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
98
98
|
exports.ruleSet = void 0;
|
|
99
99
|
const u = "required", v = "fn", w = "argv", x = "ref";
|
|
100
|
-
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "stringEquals", i = { [u]: true,
|
|
101
|
-
const _data = {
|
|
100
|
+
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "stringEquals", i = { [u]: true, default: false, type: "boolean" }, j = { [u]: false, type: "string" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: "getAttr", [w]: [{ [x]: g }, "name"] }, p = { [v]: c, [w]: [{ [x]: "UseFIPS" }, false] }, q = { [v]: c, [w]: [{ [x]: "UseDualStack" }, false] }, r = { [v]: "getAttr", [w]: [{ [x]: g }, "supportsFIPS"] }, s = { [v]: c, [w]: [true, { [v]: "getAttr", [w]: [{ [x]: g }, "supportsDualStack"] }] }, t = [{ [x]: "Region" }];
|
|
101
|
+
const _data = {
|
|
102
|
+
version: "1.0",
|
|
103
|
+
parameters: { UseDualStack: i, UseFIPS: i, Endpoint: j, Region: j },
|
|
104
|
+
rules: [
|
|
105
|
+
{
|
|
106
|
+
conditions: [{ [v]: b, [w]: [k] }],
|
|
107
|
+
rules: [
|
|
108
|
+
{ conditions: [l], error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d },
|
|
109
|
+
{
|
|
110
|
+
rules: [
|
|
111
|
+
{
|
|
112
|
+
conditions: [m],
|
|
113
|
+
error: "Invalid Configuration: Dualstack and custom endpoint are not supported",
|
|
114
|
+
type: d,
|
|
115
|
+
},
|
|
116
|
+
{ endpoint: { url: k, properties: n, headers: n }, type: e },
|
|
117
|
+
],
|
|
118
|
+
type: f,
|
|
119
|
+
},
|
|
120
|
+
],
|
|
121
|
+
type: f,
|
|
122
|
+
},
|
|
123
|
+
{
|
|
124
|
+
rules: [
|
|
125
|
+
{
|
|
126
|
+
conditions: [{ [v]: b, [w]: t }],
|
|
127
|
+
rules: [
|
|
128
|
+
{
|
|
129
|
+
conditions: [{ [v]: "aws.partition", [w]: t, assign: g }],
|
|
130
|
+
rules: [
|
|
131
|
+
{
|
|
132
|
+
conditions: [{ [v]: h, [w]: [o, "aws"] }, p, q],
|
|
133
|
+
endpoint: { url: "https://{Region}.signin.aws.amazon.com", properties: n, headers: n },
|
|
134
|
+
type: e,
|
|
135
|
+
},
|
|
136
|
+
{
|
|
137
|
+
conditions: [{ [v]: h, [w]: [o, "aws-cn"] }, p, q],
|
|
138
|
+
endpoint: { url: "https://{Region}.signin.amazonaws.cn", properties: n, headers: n },
|
|
139
|
+
type: e,
|
|
140
|
+
},
|
|
141
|
+
{
|
|
142
|
+
conditions: [{ [v]: h, [w]: [o, "aws-us-gov"] }, p, q],
|
|
143
|
+
endpoint: { url: "https://{Region}.signin.amazonaws-us-gov.com", properties: n, headers: n },
|
|
144
|
+
type: e,
|
|
145
|
+
},
|
|
146
|
+
{
|
|
147
|
+
conditions: [l, m],
|
|
148
|
+
rules: [
|
|
149
|
+
{
|
|
150
|
+
conditions: [{ [v]: c, [w]: [a, r] }, s],
|
|
151
|
+
rules: [
|
|
152
|
+
{
|
|
153
|
+
endpoint: {
|
|
154
|
+
url: "https://signin-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
155
|
+
properties: n,
|
|
156
|
+
headers: n,
|
|
157
|
+
},
|
|
158
|
+
type: e,
|
|
159
|
+
},
|
|
160
|
+
],
|
|
161
|
+
type: f,
|
|
162
|
+
},
|
|
163
|
+
{
|
|
164
|
+
error: "FIPS and DualStack are enabled, but this partition does not support one or both",
|
|
165
|
+
type: d,
|
|
166
|
+
},
|
|
167
|
+
],
|
|
168
|
+
type: f,
|
|
169
|
+
},
|
|
170
|
+
{
|
|
171
|
+
conditions: [l, q],
|
|
172
|
+
rules: [
|
|
173
|
+
{
|
|
174
|
+
conditions: [{ [v]: c, [w]: [r, a] }],
|
|
175
|
+
rules: [
|
|
176
|
+
{
|
|
177
|
+
endpoint: {
|
|
178
|
+
url: "https://signin-fips.{Region}.{PartitionResult#dnsSuffix}",
|
|
179
|
+
properties: n,
|
|
180
|
+
headers: n,
|
|
181
|
+
},
|
|
182
|
+
type: e,
|
|
183
|
+
},
|
|
184
|
+
],
|
|
185
|
+
type: f,
|
|
186
|
+
},
|
|
187
|
+
{ error: "FIPS is enabled but this partition does not support FIPS", type: d },
|
|
188
|
+
],
|
|
189
|
+
type: f,
|
|
190
|
+
},
|
|
191
|
+
{
|
|
192
|
+
conditions: [p, m],
|
|
193
|
+
rules: [
|
|
194
|
+
{
|
|
195
|
+
conditions: [s],
|
|
196
|
+
rules: [
|
|
197
|
+
{
|
|
198
|
+
endpoint: {
|
|
199
|
+
url: "https://signin.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
200
|
+
properties: n,
|
|
201
|
+
headers: n,
|
|
202
|
+
},
|
|
203
|
+
type: e,
|
|
204
|
+
},
|
|
205
|
+
],
|
|
206
|
+
type: f,
|
|
207
|
+
},
|
|
208
|
+
{ error: "DualStack is enabled but this partition does not support DualStack", type: d },
|
|
209
|
+
],
|
|
210
|
+
type: f,
|
|
211
|
+
},
|
|
212
|
+
{
|
|
213
|
+
endpoint: { url: "https://signin.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n },
|
|
214
|
+
type: e,
|
|
215
|
+
},
|
|
216
|
+
],
|
|
217
|
+
type: f,
|
|
218
|
+
},
|
|
219
|
+
],
|
|
220
|
+
type: f,
|
|
221
|
+
},
|
|
222
|
+
{ error: "Invalid Configuration: Missing Region", type: d },
|
|
223
|
+
],
|
|
224
|
+
type: f,
|
|
225
|
+
},
|
|
226
|
+
],
|
|
227
|
+
};
|
|
102
228
|
exports.ruleSet = _data;
|
|
103
229
|
|
|
104
230
|
|
|
@@ -107,7 +233,6 @@ exports.ruleSet = _data;
|
|
|
107
233
|
/***/ 99762:
|
|
108
234
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
109
235
|
|
|
110
|
-
var __webpack_unused_export__;
|
|
111
236
|
|
|
112
237
|
|
|
113
238
|
var middlewareHostHeader = __webpack_require__(52590);
|
|
@@ -125,6 +250,9 @@ var httpAuthSchemeProvider = __webpack_require__(77709);
|
|
|
125
250
|
var runtimeConfig = __webpack_require__(22836);
|
|
126
251
|
var regionConfigResolver = __webpack_require__(36463);
|
|
127
252
|
var protocolHttp = __webpack_require__(72356);
|
|
253
|
+
var schemas_0 = __webpack_require__(60890);
|
|
254
|
+
var errors = __webpack_require__(27214);
|
|
255
|
+
var SigninServiceException = __webpack_require__(42831);
|
|
128
256
|
|
|
129
257
|
const resolveClientEndpointParameters = (options) => {
|
|
130
258
|
return Object.assign(options, {
|
|
@@ -220,14 +348,92 @@ class SigninClient extends smithyClient.Client {
|
|
|
220
348
|
}
|
|
221
349
|
}
|
|
222
350
|
|
|
223
|
-
class
|
|
351
|
+
class CreateOAuth2TokenCommand extends smithyClient.Command
|
|
352
|
+
.classBuilder()
|
|
353
|
+
.ep(commonParams)
|
|
354
|
+
.m(function (Command, cs, config, o) {
|
|
355
|
+
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
356
|
+
})
|
|
357
|
+
.s("Signin", "CreateOAuth2Token", {})
|
|
358
|
+
.n("SigninClient", "CreateOAuth2TokenCommand")
|
|
359
|
+
.sc(schemas_0.CreateOAuth2Token$)
|
|
360
|
+
.build() {
|
|
361
|
+
}
|
|
362
|
+
|
|
363
|
+
const commands = {
|
|
364
|
+
CreateOAuth2TokenCommand,
|
|
365
|
+
};
|
|
366
|
+
class Signin extends SigninClient {
|
|
367
|
+
}
|
|
368
|
+
smithyClient.createAggregatedClient(commands, Signin);
|
|
369
|
+
|
|
370
|
+
const OAuth2ErrorCode = {
|
|
371
|
+
AUTHCODE_EXPIRED: "AUTHCODE_EXPIRED",
|
|
372
|
+
INSUFFICIENT_PERMISSIONS: "INSUFFICIENT_PERMISSIONS",
|
|
373
|
+
INVALID_REQUEST: "INVALID_REQUEST",
|
|
374
|
+
SERVER_ERROR: "server_error",
|
|
375
|
+
TOKEN_EXPIRED: "TOKEN_EXPIRED",
|
|
376
|
+
USER_CREDENTIALS_CHANGED: "USER_CREDENTIALS_CHANGED",
|
|
377
|
+
};
|
|
378
|
+
|
|
379
|
+
exports.$Command = smithyClient.Command;
|
|
380
|
+
exports.__Client = smithyClient.Client;
|
|
381
|
+
exports.SigninServiceException = SigninServiceException.SigninServiceException;
|
|
382
|
+
exports.CreateOAuth2TokenCommand = CreateOAuth2TokenCommand;
|
|
383
|
+
exports.OAuth2ErrorCode = OAuth2ErrorCode;
|
|
384
|
+
exports.Signin = Signin;
|
|
385
|
+
exports.SigninClient = SigninClient;
|
|
386
|
+
Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
|
|
387
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
388
|
+
Object.defineProperty(exports, '__proto__', {
|
|
389
|
+
enumerable: true,
|
|
390
|
+
value: schemas_0['__proto__']
|
|
391
|
+
});
|
|
392
|
+
|
|
393
|
+
Object.keys(schemas_0).forEach(function (k) {
|
|
394
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
|
|
395
|
+
});
|
|
396
|
+
Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
|
|
397
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
398
|
+
Object.defineProperty(exports, '__proto__', {
|
|
399
|
+
enumerable: true,
|
|
400
|
+
value: errors['__proto__']
|
|
401
|
+
});
|
|
402
|
+
|
|
403
|
+
Object.keys(errors).forEach(function (k) {
|
|
404
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
|
|
405
|
+
});
|
|
406
|
+
|
|
407
|
+
|
|
408
|
+
/***/ }),
|
|
409
|
+
|
|
410
|
+
/***/ 42831:
|
|
411
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
412
|
+
|
|
413
|
+
|
|
414
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
415
|
+
exports.SigninServiceException = exports.__ServiceException = void 0;
|
|
416
|
+
const smithy_client_1 = __webpack_require__(61411);
|
|
417
|
+
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
|
418
|
+
class SigninServiceException extends smithy_client_1.ServiceException {
|
|
224
419
|
constructor(options) {
|
|
225
420
|
super(options);
|
|
226
421
|
Object.setPrototypeOf(this, SigninServiceException.prototype);
|
|
227
422
|
}
|
|
228
423
|
}
|
|
424
|
+
exports.SigninServiceException = SigninServiceException;
|
|
425
|
+
|
|
426
|
+
|
|
427
|
+
/***/ }),
|
|
428
|
+
|
|
429
|
+
/***/ 27214:
|
|
430
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
431
|
+
|
|
229
432
|
|
|
230
|
-
|
|
433
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
434
|
+
exports.ValidationException = exports.TooManyRequestsError = exports.InternalServerException = exports.AccessDeniedException = void 0;
|
|
435
|
+
const SigninServiceException_1 = __webpack_require__(42831);
|
|
436
|
+
class AccessDeniedException extends SigninServiceException_1.SigninServiceException {
|
|
231
437
|
name = "AccessDeniedException";
|
|
232
438
|
$fault = "client";
|
|
233
439
|
error;
|
|
@@ -241,7 +447,8 @@ class AccessDeniedException extends SigninServiceException {
|
|
|
241
447
|
this.error = opts.error;
|
|
242
448
|
}
|
|
243
449
|
}
|
|
244
|
-
|
|
450
|
+
exports.AccessDeniedException = AccessDeniedException;
|
|
451
|
+
class InternalServerException extends SigninServiceException_1.SigninServiceException {
|
|
245
452
|
name = "InternalServerException";
|
|
246
453
|
$fault = "server";
|
|
247
454
|
error;
|
|
@@ -255,7 +462,8 @@ class InternalServerException extends SigninServiceException {
|
|
|
255
462
|
this.error = opts.error;
|
|
256
463
|
}
|
|
257
464
|
}
|
|
258
|
-
|
|
465
|
+
exports.InternalServerException = InternalServerException;
|
|
466
|
+
class TooManyRequestsError extends SigninServiceException_1.SigninServiceException {
|
|
259
467
|
name = "TooManyRequestsError";
|
|
260
468
|
$fault = "client";
|
|
261
469
|
error;
|
|
@@ -269,7 +477,8 @@ class TooManyRequestsError extends SigninServiceException {
|
|
|
269
477
|
this.error = opts.error;
|
|
270
478
|
}
|
|
271
479
|
}
|
|
272
|
-
|
|
480
|
+
exports.TooManyRequestsError = TooManyRequestsError;
|
|
481
|
+
class ValidationException extends SigninServiceException_1.SigninServiceException {
|
|
273
482
|
name = "ValidationException";
|
|
274
483
|
$fault = "client";
|
|
275
484
|
error;
|
|
@@ -283,175 +492,7 @@ class ValidationException extends SigninServiceException {
|
|
|
283
492
|
this.error = opts.error;
|
|
284
493
|
}
|
|
285
494
|
}
|
|
286
|
-
|
|
287
|
-
const _ADE = "AccessDeniedException";
|
|
288
|
-
const _AT = "AccessToken";
|
|
289
|
-
const _COAT = "CreateOAuth2Token";
|
|
290
|
-
const _COATR = "CreateOAuth2TokenRequest";
|
|
291
|
-
const _COATRB = "CreateOAuth2TokenRequestBody";
|
|
292
|
-
const _COATRBr = "CreateOAuth2TokenResponseBody";
|
|
293
|
-
const _COATRr = "CreateOAuth2TokenResponse";
|
|
294
|
-
const _ISE = "InternalServerException";
|
|
295
|
-
const _RT = "RefreshToken";
|
|
296
|
-
const _TMRE = "TooManyRequestsError";
|
|
297
|
-
const _VE = "ValidationException";
|
|
298
|
-
const _aKI = "accessKeyId";
|
|
299
|
-
const _aT = "accessToken";
|
|
300
|
-
const _c = "client";
|
|
301
|
-
const _cI = "clientId";
|
|
302
|
-
const _cV = "codeVerifier";
|
|
303
|
-
const _co = "code";
|
|
304
|
-
const _e = "error";
|
|
305
|
-
const _eI = "expiresIn";
|
|
306
|
-
const _gT = "grantType";
|
|
307
|
-
const _h = "http";
|
|
308
|
-
const _hE = "httpError";
|
|
309
|
-
const _iT = "idToken";
|
|
310
|
-
const _jN = "jsonName";
|
|
311
|
-
const _m = "message";
|
|
312
|
-
const _rT = "refreshToken";
|
|
313
|
-
const _rU = "redirectUri";
|
|
314
|
-
const _s = "server";
|
|
315
|
-
const _sAK = "secretAccessKey";
|
|
316
|
-
const _sT = "sessionToken";
|
|
317
|
-
const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.signin";
|
|
318
|
-
const _tI = "tokenInput";
|
|
319
|
-
const _tO = "tokenOutput";
|
|
320
|
-
const _tT = "tokenType";
|
|
321
|
-
const n0 = "com.amazonaws.signin";
|
|
322
|
-
var RefreshToken = [0, n0, _RT, 8, 0];
|
|
323
|
-
var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0]];
|
|
324
|
-
schema.TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
|
|
325
|
-
var AccessToken$ = [
|
|
326
|
-
3,
|
|
327
|
-
n0,
|
|
328
|
-
_AT,
|
|
329
|
-
8,
|
|
330
|
-
[_aKI, _sAK, _sT],
|
|
331
|
-
[
|
|
332
|
-
[0, { [_jN]: _aKI }],
|
|
333
|
-
[0, { [_jN]: _sAK }],
|
|
334
|
-
[0, { [_jN]: _sT }],
|
|
335
|
-
],
|
|
336
|
-
];
|
|
337
|
-
var CreateOAuth2TokenRequest$ = [
|
|
338
|
-
3,
|
|
339
|
-
n0,
|
|
340
|
-
_COATR,
|
|
341
|
-
0,
|
|
342
|
-
[_tI],
|
|
343
|
-
[[() => CreateOAuth2TokenRequestBody$, 16]],
|
|
344
|
-
];
|
|
345
|
-
var CreateOAuth2TokenRequestBody$ = [
|
|
346
|
-
3,
|
|
347
|
-
n0,
|
|
348
|
-
_COATRB,
|
|
349
|
-
0,
|
|
350
|
-
[_cI, _gT, _co, _rU, _cV, _rT],
|
|
351
|
-
[
|
|
352
|
-
[0, { [_jN]: _cI }],
|
|
353
|
-
[0, { [_jN]: _gT }],
|
|
354
|
-
0,
|
|
355
|
-
[0, { [_jN]: _rU }],
|
|
356
|
-
[0, { [_jN]: _cV }],
|
|
357
|
-
[() => RefreshToken, { [_jN]: _rT }],
|
|
358
|
-
],
|
|
359
|
-
];
|
|
360
|
-
var CreateOAuth2TokenResponse$ = [
|
|
361
|
-
3,
|
|
362
|
-
n0,
|
|
363
|
-
_COATRr,
|
|
364
|
-
0,
|
|
365
|
-
[_tO],
|
|
366
|
-
[[() => CreateOAuth2TokenResponseBody$, 16]],
|
|
367
|
-
];
|
|
368
|
-
var CreateOAuth2TokenResponseBody$ = [
|
|
369
|
-
3,
|
|
370
|
-
n0,
|
|
371
|
-
_COATRBr,
|
|
372
|
-
0,
|
|
373
|
-
[_aT, _tT, _eI, _rT, _iT],
|
|
374
|
-
[
|
|
375
|
-
[() => AccessToken$, { [_jN]: _aT }],
|
|
376
|
-
[0, { [_jN]: _tT }],
|
|
377
|
-
[1, { [_jN]: _eI }],
|
|
378
|
-
[() => RefreshToken, { [_jN]: _rT }],
|
|
379
|
-
[0, { [_jN]: _iT }],
|
|
380
|
-
],
|
|
381
|
-
];
|
|
382
|
-
var InternalServerException$ = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0]];
|
|
383
|
-
schema.TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
|
|
384
|
-
var TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0]];
|
|
385
|
-
schema.TypeRegistry.for(n0).registerError(TooManyRequestsError$, TooManyRequestsError);
|
|
386
|
-
var ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0]];
|
|
387
|
-
schema.TypeRegistry.for(n0).registerError(ValidationException$, ValidationException);
|
|
388
|
-
var SigninServiceException$ = [-3, _sm, "SigninServiceException", 0, [], []];
|
|
389
|
-
schema.TypeRegistry.for(_sm).registerError(SigninServiceException$, SigninServiceException);
|
|
390
|
-
var CreateOAuth2Token$ = [
|
|
391
|
-
9,
|
|
392
|
-
n0,
|
|
393
|
-
_COAT,
|
|
394
|
-
{ [_h]: ["POST", "/v1/token", 200] },
|
|
395
|
-
() => CreateOAuth2TokenRequest$,
|
|
396
|
-
() => CreateOAuth2TokenResponse$,
|
|
397
|
-
];
|
|
398
|
-
|
|
399
|
-
class CreateOAuth2TokenCommand extends smithyClient.Command
|
|
400
|
-
.classBuilder()
|
|
401
|
-
.ep(commonParams)
|
|
402
|
-
.m(function (Command, cs, config, o) {
|
|
403
|
-
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
404
|
-
})
|
|
405
|
-
.s("Signin", "CreateOAuth2Token", {})
|
|
406
|
-
.n("SigninClient", "CreateOAuth2TokenCommand")
|
|
407
|
-
.sc(CreateOAuth2Token$)
|
|
408
|
-
.build() {
|
|
409
|
-
}
|
|
410
|
-
|
|
411
|
-
const commands = {
|
|
412
|
-
CreateOAuth2TokenCommand,
|
|
413
|
-
};
|
|
414
|
-
class Signin extends SigninClient {
|
|
415
|
-
}
|
|
416
|
-
smithyClient.createAggregatedClient(commands, Signin);
|
|
417
|
-
|
|
418
|
-
const OAuth2ErrorCode = {
|
|
419
|
-
AUTHCODE_EXPIRED: "AUTHCODE_EXPIRED",
|
|
420
|
-
INSUFFICIENT_PERMISSIONS: "INSUFFICIENT_PERMISSIONS",
|
|
421
|
-
INVALID_REQUEST: "INVALID_REQUEST",
|
|
422
|
-
SERVER_ERROR: "server_error",
|
|
423
|
-
TOKEN_EXPIRED: "TOKEN_EXPIRED",
|
|
424
|
-
USER_CREDENTIALS_CHANGED: "USER_CREDENTIALS_CHANGED",
|
|
425
|
-
};
|
|
426
|
-
|
|
427
|
-
__webpack_unused_export__ = ({
|
|
428
|
-
enumerable: true,
|
|
429
|
-
get: function () { return smithyClient.Command; }
|
|
430
|
-
});
|
|
431
|
-
__webpack_unused_export__ = ({
|
|
432
|
-
enumerable: true,
|
|
433
|
-
get: function () { return smithyClient.Client; }
|
|
434
|
-
});
|
|
435
|
-
__webpack_unused_export__ = AccessDeniedException;
|
|
436
|
-
__webpack_unused_export__ = AccessDeniedException$;
|
|
437
|
-
__webpack_unused_export__ = AccessToken$;
|
|
438
|
-
__webpack_unused_export__ = CreateOAuth2Token$;
|
|
439
|
-
exports.CreateOAuth2TokenCommand = CreateOAuth2TokenCommand;
|
|
440
|
-
__webpack_unused_export__ = CreateOAuth2TokenRequest$;
|
|
441
|
-
__webpack_unused_export__ = CreateOAuth2TokenRequestBody$;
|
|
442
|
-
__webpack_unused_export__ = CreateOAuth2TokenResponse$;
|
|
443
|
-
__webpack_unused_export__ = CreateOAuth2TokenResponseBody$;
|
|
444
|
-
__webpack_unused_export__ = InternalServerException;
|
|
445
|
-
__webpack_unused_export__ = InternalServerException$;
|
|
446
|
-
__webpack_unused_export__ = OAuth2ErrorCode;
|
|
447
|
-
__webpack_unused_export__ = Signin;
|
|
448
|
-
exports.SigninClient = SigninClient;
|
|
449
|
-
__webpack_unused_export__ = SigninServiceException;
|
|
450
|
-
__webpack_unused_export__ = SigninServiceException$;
|
|
451
|
-
__webpack_unused_export__ = TooManyRequestsError;
|
|
452
|
-
__webpack_unused_export__ = TooManyRequestsError$;
|
|
453
|
-
__webpack_unused_export__ = ValidationException;
|
|
454
|
-
__webpack_unused_export__ = ValidationException$;
|
|
495
|
+
exports.ValidationException = ValidationException;
|
|
455
496
|
|
|
456
497
|
|
|
457
498
|
/***/ }),
|
|
@@ -464,7 +505,8 @@ Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
|
464
505
|
exports.getRuntimeConfig = void 0;
|
|
465
506
|
const tslib_1 = __webpack_require__(61860);
|
|
466
507
|
const package_json_1 = tslib_1.__importDefault(__webpack_require__(39955));
|
|
467
|
-
const
|
|
508
|
+
const client_1 = __webpack_require__(5152);
|
|
509
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
468
510
|
const util_user_agent_node_1 = __webpack_require__(51656);
|
|
469
511
|
const config_resolver_1 = __webpack_require__(39316);
|
|
470
512
|
const hash_node_1 = __webpack_require__(5092);
|
|
@@ -481,7 +523,7 @@ const getRuntimeConfig = (config) => {
|
|
|
481
523
|
const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
|
|
482
524
|
const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
|
|
483
525
|
const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
|
|
484
|
-
(0,
|
|
526
|
+
(0, client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
485
527
|
const loaderConfig = {
|
|
486
528
|
profile: config?.profile,
|
|
487
529
|
logger: clientSharedValues.logger,
|
|
@@ -491,7 +533,7 @@ const getRuntimeConfig = (config) => {
|
|
|
491
533
|
...config,
|
|
492
534
|
runtime: "node",
|
|
493
535
|
defaultsMode,
|
|
494
|
-
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(
|
|
536
|
+
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(httpAuthSchemes_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
495
537
|
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
|
|
496
538
|
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
497
539
|
(0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
@@ -522,15 +564,16 @@ exports.getRuntimeConfig = getRuntimeConfig;
|
|
|
522
564
|
|
|
523
565
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
524
566
|
exports.getRuntimeConfig = void 0;
|
|
525
|
-
const
|
|
567
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
526
568
|
const protocols_1 = __webpack_require__(37288);
|
|
527
|
-
const
|
|
569
|
+
const core_1 = __webpack_require__(90402);
|
|
528
570
|
const smithy_client_1 = __webpack_require__(61411);
|
|
529
571
|
const url_parser_1 = __webpack_require__(14494);
|
|
530
572
|
const util_base64_1 = __webpack_require__(68385);
|
|
531
573
|
const util_utf8_1 = __webpack_require__(71577);
|
|
532
574
|
const httpAuthSchemeProvider_1 = __webpack_require__(77709);
|
|
533
575
|
const endpointResolver_1 = __webpack_require__(12547);
|
|
576
|
+
const schemas_0_1 = __webpack_require__(60890);
|
|
534
577
|
const getRuntimeConfig = (config) => {
|
|
535
578
|
return {
|
|
536
579
|
apiVersion: "2023-01-01",
|
|
@@ -544,18 +587,19 @@ const getRuntimeConfig = (config) => {
|
|
|
544
587
|
{
|
|
545
588
|
schemeId: "aws.auth#sigv4",
|
|
546
589
|
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
|
|
547
|
-
signer: new
|
|
590
|
+
signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
|
|
548
591
|
},
|
|
549
592
|
{
|
|
550
593
|
schemeId: "smithy.api#noAuth",
|
|
551
594
|
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
552
|
-
signer: new
|
|
595
|
+
signer: new core_1.NoAuthSigner(),
|
|
553
596
|
},
|
|
554
597
|
],
|
|
555
598
|
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
556
599
|
protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
|
|
557
600
|
protocolSettings: config?.protocolSettings ?? {
|
|
558
601
|
defaultNamespace: "com.amazonaws.signin",
|
|
602
|
+
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
|
559
603
|
version: "2023-01-01",
|
|
560
604
|
serviceTarget: "Signin",
|
|
561
605
|
},
|
|
@@ -568,12 +612,144 @@ const getRuntimeConfig = (config) => {
|
|
|
568
612
|
exports.getRuntimeConfig = getRuntimeConfig;
|
|
569
613
|
|
|
570
614
|
|
|
615
|
+
/***/ }),
|
|
616
|
+
|
|
617
|
+
/***/ 60890:
|
|
618
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
619
|
+
|
|
620
|
+
|
|
621
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
622
|
+
exports.CreateOAuth2Token$ = exports.CreateOAuth2TokenResponseBody$ = exports.CreateOAuth2TokenResponse$ = exports.CreateOAuth2TokenRequestBody$ = exports.CreateOAuth2TokenRequest$ = exports.AccessToken$ = exports.errorTypeRegistries = exports.ValidationException$ = exports.TooManyRequestsError$ = exports.InternalServerException$ = exports.AccessDeniedException$ = exports.SigninServiceException$ = void 0;
|
|
623
|
+
const _ADE = "AccessDeniedException";
|
|
624
|
+
const _AT = "AccessToken";
|
|
625
|
+
const _COAT = "CreateOAuth2Token";
|
|
626
|
+
const _COATR = "CreateOAuth2TokenRequest";
|
|
627
|
+
const _COATRB = "CreateOAuth2TokenRequestBody";
|
|
628
|
+
const _COATRBr = "CreateOAuth2TokenResponseBody";
|
|
629
|
+
const _COATRr = "CreateOAuth2TokenResponse";
|
|
630
|
+
const _ISE = "InternalServerException";
|
|
631
|
+
const _RT = "RefreshToken";
|
|
632
|
+
const _TMRE = "TooManyRequestsError";
|
|
633
|
+
const _VE = "ValidationException";
|
|
634
|
+
const _aKI = "accessKeyId";
|
|
635
|
+
const _aT = "accessToken";
|
|
636
|
+
const _c = "client";
|
|
637
|
+
const _cI = "clientId";
|
|
638
|
+
const _cV = "codeVerifier";
|
|
639
|
+
const _co = "code";
|
|
640
|
+
const _e = "error";
|
|
641
|
+
const _eI = "expiresIn";
|
|
642
|
+
const _gT = "grantType";
|
|
643
|
+
const _h = "http";
|
|
644
|
+
const _hE = "httpError";
|
|
645
|
+
const _iT = "idToken";
|
|
646
|
+
const _jN = "jsonName";
|
|
647
|
+
const _m = "message";
|
|
648
|
+
const _rT = "refreshToken";
|
|
649
|
+
const _rU = "redirectUri";
|
|
650
|
+
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.signin";
|
|
651
|
+
const _sAK = "secretAccessKey";
|
|
652
|
+
const _sT = "sessionToken";
|
|
653
|
+
const _se = "server";
|
|
654
|
+
const _tI = "tokenInput";
|
|
655
|
+
const _tO = "tokenOutput";
|
|
656
|
+
const _tT = "tokenType";
|
|
657
|
+
const n0 = "com.amazonaws.signin";
|
|
658
|
+
const schema_1 = __webpack_require__(26890);
|
|
659
|
+
const errors_1 = __webpack_require__(27214);
|
|
660
|
+
const SigninServiceException_1 = __webpack_require__(42831);
|
|
661
|
+
const _s_registry = schema_1.TypeRegistry.for(_s);
|
|
662
|
+
exports.SigninServiceException$ = [-3, _s, "SigninServiceException", 0, [], []];
|
|
663
|
+
_s_registry.registerError(exports.SigninServiceException$, SigninServiceException_1.SigninServiceException);
|
|
664
|
+
const n0_registry = schema_1.TypeRegistry.for(n0);
|
|
665
|
+
exports.AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0], 2];
|
|
666
|
+
n0_registry.registerError(exports.AccessDeniedException$, errors_1.AccessDeniedException);
|
|
667
|
+
exports.InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _m], [0, 0], 2];
|
|
668
|
+
n0_registry.registerError(exports.InternalServerException$, errors_1.InternalServerException);
|
|
669
|
+
exports.TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0], 2];
|
|
670
|
+
n0_registry.registerError(exports.TooManyRequestsError$, errors_1.TooManyRequestsError);
|
|
671
|
+
exports.ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0], 2];
|
|
672
|
+
n0_registry.registerError(exports.ValidationException$, errors_1.ValidationException);
|
|
673
|
+
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
|
674
|
+
var RefreshToken = [0, n0, _RT, 8, 0];
|
|
675
|
+
exports.AccessToken$ = [
|
|
676
|
+
3,
|
|
677
|
+
n0,
|
|
678
|
+
_AT,
|
|
679
|
+
8,
|
|
680
|
+
[_aKI, _sAK, _sT],
|
|
681
|
+
[
|
|
682
|
+
[0, { [_jN]: _aKI }],
|
|
683
|
+
[0, { [_jN]: _sAK }],
|
|
684
|
+
[0, { [_jN]: _sT }],
|
|
685
|
+
],
|
|
686
|
+
3,
|
|
687
|
+
];
|
|
688
|
+
exports.CreateOAuth2TokenRequest$ = [
|
|
689
|
+
3,
|
|
690
|
+
n0,
|
|
691
|
+
_COATR,
|
|
692
|
+
0,
|
|
693
|
+
[_tI],
|
|
694
|
+
[[() => exports.CreateOAuth2TokenRequestBody$, 16]],
|
|
695
|
+
1,
|
|
696
|
+
];
|
|
697
|
+
exports.CreateOAuth2TokenRequestBody$ = [
|
|
698
|
+
3,
|
|
699
|
+
n0,
|
|
700
|
+
_COATRB,
|
|
701
|
+
0,
|
|
702
|
+
[_cI, _gT, _co, _rU, _cV, _rT],
|
|
703
|
+
[
|
|
704
|
+
[0, { [_jN]: _cI }],
|
|
705
|
+
[0, { [_jN]: _gT }],
|
|
706
|
+
0,
|
|
707
|
+
[0, { [_jN]: _rU }],
|
|
708
|
+
[0, { [_jN]: _cV }],
|
|
709
|
+
[() => RefreshToken, { [_jN]: _rT }],
|
|
710
|
+
],
|
|
711
|
+
2,
|
|
712
|
+
];
|
|
713
|
+
exports.CreateOAuth2TokenResponse$ = [
|
|
714
|
+
3,
|
|
715
|
+
n0,
|
|
716
|
+
_COATRr,
|
|
717
|
+
0,
|
|
718
|
+
[_tO],
|
|
719
|
+
[[() => exports.CreateOAuth2TokenResponseBody$, 16]],
|
|
720
|
+
1,
|
|
721
|
+
];
|
|
722
|
+
exports.CreateOAuth2TokenResponseBody$ = [
|
|
723
|
+
3,
|
|
724
|
+
n0,
|
|
725
|
+
_COATRBr,
|
|
726
|
+
0,
|
|
727
|
+
[_aT, _tT, _eI, _rT, _iT],
|
|
728
|
+
[
|
|
729
|
+
[() => exports.AccessToken$, { [_jN]: _aT }],
|
|
730
|
+
[0, { [_jN]: _tT }],
|
|
731
|
+
[1, { [_jN]: _eI }],
|
|
732
|
+
[() => RefreshToken, { [_jN]: _rT }],
|
|
733
|
+
[0, { [_jN]: _iT }],
|
|
734
|
+
],
|
|
735
|
+
4,
|
|
736
|
+
];
|
|
737
|
+
exports.CreateOAuth2Token$ = [
|
|
738
|
+
9,
|
|
739
|
+
n0,
|
|
740
|
+
_COAT,
|
|
741
|
+
{ [_h]: ["POST", "/v1/token", 200] },
|
|
742
|
+
() => exports.CreateOAuth2TokenRequest$,
|
|
743
|
+
() => exports.CreateOAuth2TokenResponse$,
|
|
744
|
+
];
|
|
745
|
+
|
|
746
|
+
|
|
571
747
|
/***/ }),
|
|
572
748
|
|
|
573
749
|
/***/ 39955:
|
|
574
750
|
/***/ ((module) => {
|
|
575
751
|
|
|
576
|
-
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.
|
|
752
|
+
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.19","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.27","@aws-sdk/middleware-host-header":"^3.972.9","@aws-sdk/middleware-logger":"^3.972.9","@aws-sdk/middleware-recursion-detection":"^3.972.10","@aws-sdk/middleware-user-agent":"^3.972.29","@aws-sdk/region-config-resolver":"^3.972.11","@aws-sdk/types":"^3.973.7","@aws-sdk/util-endpoints":"^3.996.6","@aws-sdk/util-user-agent-browser":"^3.972.9","@aws-sdk/util-user-agent-node":"^3.973.15","@smithy/config-resolver":"^4.4.14","@smithy/core":"^3.23.14","@smithy/fetch-http-handler":"^5.3.16","@smithy/hash-node":"^4.2.13","@smithy/invalid-dependency":"^4.2.13","@smithy/middleware-content-length":"^4.2.13","@smithy/middleware-endpoint":"^4.4.29","@smithy/middleware-retry":"^4.5.0","@smithy/middleware-serde":"^4.2.17","@smithy/middleware-stack":"^4.2.13","@smithy/node-config-provider":"^4.3.13","@smithy/node-http-handler":"^4.5.2","@smithy/protocol-http":"^5.3.13","@smithy/smithy-client":"^4.12.9","@smithy/types":"^4.14.0","@smithy/url-parser":"^4.2.13","@smithy/util-base64":"^4.3.2","@smithy/util-body-length-browser":"^4.2.2","@smithy/util-body-length-node":"^4.2.3","@smithy/util-defaults-mode-browser":"^4.3.45","@smithy/util-defaults-mode-node":"^4.2.49","@smithy/util-endpoints":"^3.3.4","@smithy/util-middleware":"^4.2.13","@smithy/util-retry":"^4.3.0","@smithy/util-utf8":"^4.2.2","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.5":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/cognito-identity/runtimeConfig":"./dist-es/submodules/cognito-identity/runtimeConfig.browser","./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sso/runtimeConfig":"./dist-es/submodules/sso/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
|
|
577
753
|
|
|
578
754
|
/***/ })
|
|
579
755
|
|