@rharkor/caching-for-turbo 2.3.11 → 2.3.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2,20 +2,236 @@ export const id = 998;
2
2
  export const ids = [998];
3
3
  export const modules = {
4
4
 
5
- /***/ 62041:
5
+ /***/ 60998:
6
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
7
+
8
+ var __webpack_unused_export__;
9
+
10
+
11
+ var propertyProvider = __webpack_require__(71238);
12
+ var sharedIniFileLoader = __webpack_require__(94964);
13
+ var client = __webpack_require__(5152);
14
+ var tokenProviders = __webpack_require__(75433);
15
+
16
+ const isSsoProfile = (arg) => arg &&
17
+ (typeof arg.sso_start_url === "string" ||
18
+ typeof arg.sso_account_id === "string" ||
19
+ typeof arg.sso_session === "string" ||
20
+ typeof arg.sso_region === "string" ||
21
+ typeof arg.sso_role_name === "string");
22
+
23
+ const SHOULD_FAIL_CREDENTIAL_CHAIN = false;
24
+ const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger, }) => {
25
+ let token;
26
+ const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
27
+ if (ssoSession) {
28
+ try {
29
+ const _token = await tokenProviders.fromSso({
30
+ profile,
31
+ filepath,
32
+ configFilepath,
33
+ ignoreCache,
34
+ })();
35
+ token = {
36
+ accessToken: _token.token,
37
+ expiresAt: new Date(_token.expiration).toISOString(),
38
+ };
39
+ }
40
+ catch (e) {
41
+ throw new propertyProvider.CredentialsProviderError(e.message, {
42
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
43
+ logger,
44
+ });
45
+ }
46
+ }
47
+ else {
48
+ try {
49
+ token = await sharedIniFileLoader.getSSOTokenFromFile(ssoStartUrl);
50
+ }
51
+ catch (e) {
52
+ throw new propertyProvider.CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {
53
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
54
+ logger,
55
+ });
56
+ }
57
+ }
58
+ if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {
59
+ throw new propertyProvider.CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {
60
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
61
+ logger,
62
+ });
63
+ }
64
+ const { accessToken } = token;
65
+ const { SSOClient, GetRoleCredentialsCommand } = await Promise.resolve().then(function () { return __webpack_require__(91853); });
66
+ const sso = ssoClient ||
67
+ new SSOClient(Object.assign({}, clientConfig ?? {}, {
68
+ logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
69
+ region: clientConfig?.region ?? ssoRegion,
70
+ userAgentAppId: clientConfig?.userAgentAppId ?? callerClientConfig?.userAgentAppId ?? parentClientConfig?.userAgentAppId,
71
+ }));
72
+ let ssoResp;
73
+ try {
74
+ ssoResp = await sso.send(new GetRoleCredentialsCommand({
75
+ accountId: ssoAccountId,
76
+ roleName: ssoRoleName,
77
+ accessToken,
78
+ }));
79
+ }
80
+ catch (e) {
81
+ throw new propertyProvider.CredentialsProviderError(e, {
82
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
83
+ logger,
84
+ });
85
+ }
86
+ const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;
87
+ if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
88
+ throw new propertyProvider.CredentialsProviderError("SSO returns an invalid temporary credential.", {
89
+ tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
90
+ logger,
91
+ });
92
+ }
93
+ const credentials = {
94
+ accessKeyId,
95
+ secretAccessKey,
96
+ sessionToken,
97
+ expiration: new Date(expiration),
98
+ ...(credentialScope && { credentialScope }),
99
+ ...(accountId && { accountId }),
100
+ };
101
+ if (ssoSession) {
102
+ client.setCredentialFeature(credentials, "CREDENTIALS_SSO", "s");
103
+ }
104
+ else {
105
+ client.setCredentialFeature(credentials, "CREDENTIALS_SSO_LEGACY", "u");
106
+ }
107
+ return credentials;
108
+ };
109
+
110
+ const validateSsoProfile = (profile, logger) => {
111
+ const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
112
+ if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
113
+ throw new propertyProvider.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", ` +
114
+ `"sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });
115
+ }
116
+ return profile;
117
+ };
118
+
119
+ const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
120
+ init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
121
+ const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
122
+ const { ssoClient } = init;
123
+ const profileName = sharedIniFileLoader.getProfileName({
124
+ profile: init.profile ?? callerClientConfig?.profile,
125
+ });
126
+ if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
127
+ const profiles = await sharedIniFileLoader.parseKnownFiles(init);
128
+ const profile = profiles[profileName];
129
+ if (!profile) {
130
+ throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });
131
+ }
132
+ if (!isSsoProfile(profile)) {
133
+ throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {
134
+ logger: init.logger,
135
+ });
136
+ }
137
+ if (profile?.sso_session) {
138
+ const ssoSessions = await sharedIniFileLoader.loadSsoSessionData(init);
139
+ const session = ssoSessions[profile.sso_session];
140
+ const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;
141
+ if (ssoRegion && ssoRegion !== session.sso_region) {
142
+ throw new propertyProvider.CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {
143
+ tryNextLink: false,
144
+ logger: init.logger,
145
+ });
146
+ }
147
+ if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {
148
+ throw new propertyProvider.CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {
149
+ tryNextLink: false,
150
+ logger: init.logger,
151
+ });
152
+ }
153
+ profile.sso_region = session.sso_region;
154
+ profile.sso_start_url = session.sso_start_url;
155
+ }
156
+ const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);
157
+ return resolveSSOCredentials({
158
+ ssoStartUrl: sso_start_url,
159
+ ssoSession: sso_session,
160
+ ssoAccountId: sso_account_id,
161
+ ssoRegion: sso_region,
162
+ ssoRoleName: sso_role_name,
163
+ ssoClient: ssoClient,
164
+ clientConfig: init.clientConfig,
165
+ parentClientConfig: init.parentClientConfig,
166
+ callerClientConfig: init.callerClientConfig,
167
+ profile: profileName,
168
+ filepath: init.filepath,
169
+ configFilepath: init.configFilepath,
170
+ ignoreCache: init.ignoreCache,
171
+ logger: init.logger,
172
+ });
173
+ }
174
+ else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
175
+ throw new propertyProvider.CredentialsProviderError("Incomplete configuration. The fromSSO() argument hash must include " +
176
+ '"ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"', { tryNextLink: false, logger: init.logger });
177
+ }
178
+ else {
179
+ return resolveSSOCredentials({
180
+ ssoStartUrl,
181
+ ssoSession,
182
+ ssoAccountId,
183
+ ssoRegion,
184
+ ssoRoleName,
185
+ ssoClient,
186
+ clientConfig: init.clientConfig,
187
+ parentClientConfig: init.parentClientConfig,
188
+ callerClientConfig: init.callerClientConfig,
189
+ profile: profileName,
190
+ filepath: init.filepath,
191
+ configFilepath: init.configFilepath,
192
+ ignoreCache: init.ignoreCache,
193
+ logger: init.logger,
194
+ });
195
+ }
196
+ };
197
+
198
+ exports.fromSSO = fromSSO;
199
+ __webpack_unused_export__ = isSsoProfile;
200
+ __webpack_unused_export__ = validateSsoProfile;
201
+
202
+
203
+ /***/ }),
204
+
205
+ /***/ 91853:
206
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
207
+
208
+
209
+
210
+ var sso = __webpack_require__(32579);
211
+
212
+
213
+
214
+ exports.GetRoleCredentialsCommand = sso.GetRoleCredentialsCommand;
215
+ exports.SSOClient = sso.SSOClient;
216
+
217
+
218
+ /***/ }),
219
+
220
+ /***/ 97452:
6
221
  /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
7
222
 
8
223
 
9
224
  Object.defineProperty(exports, "__esModule", ({ value: true }));
10
225
  exports.resolveHttpAuthSchemeConfig = exports.defaultSSOHttpAuthSchemeProvider = exports.defaultSSOHttpAuthSchemeParametersProvider = void 0;
11
- const core_1 = __webpack_require__(8704);
226
+ const httpAuthSchemes_1 = __webpack_require__(97523);
12
227
  const util_middleware_1 = __webpack_require__(76324);
13
228
  const defaultSSOHttpAuthSchemeParametersProvider = async (config, context, input) => {
14
229
  return {
15
230
  operation: (0, util_middleware_1.getSmithyContext)(context).operation,
16
- region: await (0, util_middleware_1.normalizeProvider)(config.region)() || (() => {
17
- throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
18
- })(),
231
+ region: (await (0, util_middleware_1.normalizeProvider)(config.region)()) ||
232
+ (() => {
233
+ throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
234
+ })(),
19
235
  };
20
236
  };
21
237
  exports.defaultSSOHttpAuthSchemeParametersProvider = defaultSSOHttpAuthSchemeParametersProvider;
@@ -42,30 +258,10 @@ function createSmithyApiNoAuthHttpAuthOption(authParameters) {
42
258
  const defaultSSOHttpAuthSchemeProvider = (authParameters) => {
43
259
  const options = [];
44
260
  switch (authParameters.operation) {
45
- case "GetRoleCredentials":
46
- {
47
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
48
- break;
49
- }
50
- ;
51
- case "ListAccountRoles":
52
- {
53
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
54
- break;
55
- }
56
- ;
57
- case "ListAccounts":
58
- {
59
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
60
- break;
61
- }
62
- ;
63
- case "Logout":
64
- {
65
- options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
66
- break;
67
- }
68
- ;
261
+ case "GetRoleCredentials": {
262
+ options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
263
+ break;
264
+ }
69
265
  default: {
70
266
  options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
71
267
  }
@@ -74,7 +270,7 @@ const defaultSSOHttpAuthSchemeProvider = (authParameters) => {
74
270
  };
75
271
  exports.defaultSSOHttpAuthSchemeProvider = defaultSSOHttpAuthSchemeProvider;
76
272
  const resolveHttpAuthSchemeConfig = (config) => {
77
- const config_0 = (0, core_1.resolveAwsSdkSigV4Config)(config);
273
+ const config_0 = (0, httpAuthSchemes_1.resolveAwsSdkSigV4Config)(config);
78
274
  return Object.assign(config_0, {
79
275
  authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
80
276
  });
@@ -84,7 +280,7 @@ exports.resolveHttpAuthSchemeConfig = resolveHttpAuthSchemeConfig;
84
280
 
85
281
  /***/ }),
86
282
 
87
- /***/ 13903:
283
+ /***/ 85074:
88
284
  /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
89
285
 
90
286
 
@@ -92,7 +288,7 @@ Object.defineProperty(exports, "__esModule", ({ value: true }));
92
288
  exports.defaultEndpointResolver = void 0;
93
289
  const util_endpoints_1 = __webpack_require__(83068);
94
290
  const util_endpoints_2 = __webpack_require__(79674);
95
- const ruleset_1 = __webpack_require__(41308);
291
+ const ruleset_1 = __webpack_require__(50203);
96
292
  const cache = new util_endpoints_2.EndpointCache({
97
293
  size: 50,
98
294
  params: ["Endpoint", "Region", "UseDualStack", "UseFIPS"],
@@ -109,21 +305,120 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
109
305
 
110
306
  /***/ }),
111
307
 
112
- /***/ 41308:
308
+ /***/ 50203:
113
309
  /***/ ((__unused_webpack_module, exports) => {
114
310
 
115
311
 
116
312
  Object.defineProperty(exports, "__esModule", ({ value: true }));
117
313
  exports.ruleSet = void 0;
118
314
  const u = "required", v = "fn", w = "argv", x = "ref";
119
- const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "getAttr", i = { [u]: false, "type": "string" }, j = { [u]: true, "default": false, "type": "boolean" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: h, [w]: [{ [x]: g }, "supportsFIPS"] }, p = { [x]: g }, q = { [v]: c, [w]: [true, { [v]: h, [w]: [p, "supportsDualStack"] }] }, r = [l], s = [m], t = [{ [x]: "Region" }];
120
- const _data = { version: "1.0", parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i }, rules: [{ conditions: [{ [v]: b, [w]: [k] }], rules: [{ conditions: r, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d }, { conditions: s, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d }, { endpoint: { url: k, properties: n, headers: n }, type: e }], type: f }, { conditions: [{ [v]: b, [w]: t }], rules: [{ conditions: [{ [v]: "aws.partition", [w]: t, assign: g }], rules: [{ conditions: [l, m], rules: [{ conditions: [{ [v]: c, [w]: [a, o] }, q], rules: [{ endpoint: { url: "https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d }], type: f }, { conditions: r, rules: [{ conditions: [{ [v]: c, [w]: [o, a] }], rules: [{ conditions: [{ [v]: "stringEquals", [w]: [{ [v]: h, [w]: [p, "name"] }, "aws-us-gov"] }], endpoint: { url: "https://portal.sso.{Region}.amazonaws.com", properties: n, headers: n }, type: e }, { endpoint: { url: "https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "FIPS is enabled but this partition does not support FIPS", type: d }], type: f }, { conditions: s, rules: [{ conditions: [q], rules: [{ endpoint: { url: "https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "DualStack is enabled but this partition does not support DualStack", type: d }], type: f }, { endpoint: { url: "https://portal.sso.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n }, type: e }], type: f }], type: f }, { error: "Invalid Configuration: Missing Region", type: d }] };
315
+ const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "getAttr", i = { [u]: false, type: "string" }, j = { [u]: true, default: false, type: "boolean" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: h, [w]: [{ [x]: g }, "supportsFIPS"] }, p = { [x]: g }, q = { [v]: c, [w]: [true, { [v]: h, [w]: [p, "supportsDualStack"] }] }, r = [l], s = [m], t = [{ [x]: "Region" }];
316
+ const _data = {
317
+ version: "1.0",
318
+ parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i },
319
+ rules: [
320
+ {
321
+ conditions: [{ [v]: b, [w]: [k] }],
322
+ rules: [
323
+ { conditions: r, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d },
324
+ { conditions: s, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d },
325
+ { endpoint: { url: k, properties: n, headers: n }, type: e },
326
+ ],
327
+ type: f,
328
+ },
329
+ {
330
+ conditions: [{ [v]: b, [w]: t }],
331
+ rules: [
332
+ {
333
+ conditions: [{ [v]: "aws.partition", [w]: t, assign: g }],
334
+ rules: [
335
+ {
336
+ conditions: [l, m],
337
+ rules: [
338
+ {
339
+ conditions: [{ [v]: c, [w]: [a, o] }, q],
340
+ rules: [
341
+ {
342
+ endpoint: {
343
+ url: "https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
344
+ properties: n,
345
+ headers: n,
346
+ },
347
+ type: e,
348
+ },
349
+ ],
350
+ type: f,
351
+ },
352
+ { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d },
353
+ ],
354
+ type: f,
355
+ },
356
+ {
357
+ conditions: r,
358
+ rules: [
359
+ {
360
+ conditions: [{ [v]: c, [w]: [o, a] }],
361
+ rules: [
362
+ {
363
+ conditions: [{ [v]: "stringEquals", [w]: [{ [v]: h, [w]: [p, "name"] }, "aws-us-gov"] }],
364
+ endpoint: { url: "https://portal.sso.{Region}.amazonaws.com", properties: n, headers: n },
365
+ type: e,
366
+ },
367
+ {
368
+ endpoint: {
369
+ url: "https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",
370
+ properties: n,
371
+ headers: n,
372
+ },
373
+ type: e,
374
+ },
375
+ ],
376
+ type: f,
377
+ },
378
+ { error: "FIPS is enabled but this partition does not support FIPS", type: d },
379
+ ],
380
+ type: f,
381
+ },
382
+ {
383
+ conditions: s,
384
+ rules: [
385
+ {
386
+ conditions: [q],
387
+ rules: [
388
+ {
389
+ endpoint: {
390
+ url: "https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",
391
+ properties: n,
392
+ headers: n,
393
+ },
394
+ type: e,
395
+ },
396
+ ],
397
+ type: f,
398
+ },
399
+ { error: "DualStack is enabled but this partition does not support DualStack", type: d },
400
+ ],
401
+ type: f,
402
+ },
403
+ {
404
+ endpoint: { url: "https://portal.sso.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n },
405
+ type: e,
406
+ },
407
+ ],
408
+ type: f,
409
+ },
410
+ ],
411
+ type: f,
412
+ },
413
+ { error: "Invalid Configuration: Missing Region", type: d },
414
+ ],
415
+ };
121
416
  exports.ruleSet = _data;
122
417
 
123
418
 
124
419
  /***/ }),
125
420
 
126
- /***/ 62054:
421
+ /***/ 32579:
127
422
  /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
128
423
 
129
424
 
@@ -139,10 +434,13 @@ var middlewareContentLength = __webpack_require__(47212);
139
434
  var middlewareEndpoint = __webpack_require__(40099);
140
435
  var middlewareRetry = __webpack_require__(19618);
141
436
  var smithyClient = __webpack_require__(61411);
142
- var httpAuthSchemeProvider = __webpack_require__(62041);
143
- var runtimeConfig = __webpack_require__(82696);
437
+ var httpAuthSchemeProvider = __webpack_require__(97452);
438
+ var runtimeConfig = __webpack_require__(85541);
144
439
  var regionConfigResolver = __webpack_require__(36463);
145
440
  var protocolHttp = __webpack_require__(72356);
441
+ var schemas_0 = __webpack_require__(52167);
442
+ var errors = __webpack_require__(24483);
443
+ var SSOServiceException = __webpack_require__(69849);
146
444
 
147
445
  const resolveClientEndpointParameters = (options) => {
148
446
  return Object.assign(options, {
@@ -238,38 +536,108 @@ class SSOClient extends smithyClient.Client {
238
536
  }
239
537
  }
240
538
 
241
- class SSOServiceException extends smithyClient.ServiceException {
242
- constructor(options) {
243
- super(options);
244
- Object.setPrototypeOf(this, SSOServiceException.prototype);
245
- }
539
+ class GetRoleCredentialsCommand extends smithyClient.Command
540
+ .classBuilder()
541
+ .ep(commonParams)
542
+ .m(function (Command, cs, config, o) {
543
+ return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
544
+ })
545
+ .s("SWBPortalService", "GetRoleCredentials", {})
546
+ .n("SSOClient", "GetRoleCredentialsCommand")
547
+ .sc(schemas_0.GetRoleCredentials$)
548
+ .build() {
246
549
  }
247
550
 
248
- class InvalidRequestException extends SSOServiceException {
249
- name = "InvalidRequestException";
250
- $fault = "client";
251
- constructor(opts) {
252
- super({
253
- name: "InvalidRequestException",
254
- $fault: "client",
255
- ...opts,
256
- });
257
- Object.setPrototypeOf(this, InvalidRequestException.prototype);
258
- }
551
+ const commands = {
552
+ GetRoleCredentialsCommand,
553
+ };
554
+ class SSO extends SSOClient {
259
555
  }
260
- class ResourceNotFoundException extends SSOServiceException {
261
- name = "ResourceNotFoundException";
262
- $fault = "client";
263
- constructor(opts) {
264
- super({
265
- name: "ResourceNotFoundException",
266
- $fault: "client",
267
- ...opts,
556
+ smithyClient.createAggregatedClient(commands, SSO);
557
+
558
+ exports.$Command = smithyClient.Command;
559
+ exports.__Client = smithyClient.Client;
560
+ exports.SSOServiceException = SSOServiceException.SSOServiceException;
561
+ exports.GetRoleCredentialsCommand = GetRoleCredentialsCommand;
562
+ exports.SSO = SSO;
563
+ exports.SSOClient = SSOClient;
564
+ Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
565
+ !Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
566
+ Object.defineProperty(exports, '__proto__', {
567
+ enumerable: true,
568
+ value: schemas_0['__proto__']
569
+ });
570
+
571
+ Object.keys(schemas_0).forEach(function (k) {
572
+ if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
573
+ });
574
+ Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
575
+ !Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
576
+ Object.defineProperty(exports, '__proto__', {
577
+ enumerable: true,
578
+ value: errors['__proto__']
579
+ });
580
+
581
+ Object.keys(errors).forEach(function (k) {
582
+ if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
583
+ });
584
+
585
+
586
+ /***/ }),
587
+
588
+ /***/ 69849:
589
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
590
+
591
+
592
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
593
+ exports.SSOServiceException = exports.__ServiceException = void 0;
594
+ const smithy_client_1 = __webpack_require__(61411);
595
+ Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
596
+ class SSOServiceException extends smithy_client_1.ServiceException {
597
+ constructor(options) {
598
+ super(options);
599
+ Object.setPrototypeOf(this, SSOServiceException.prototype);
600
+ }
601
+ }
602
+ exports.SSOServiceException = SSOServiceException;
603
+
604
+
605
+ /***/ }),
606
+
607
+ /***/ 24483:
608
+ /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
609
+
610
+
611
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
612
+ exports.UnauthorizedException = exports.TooManyRequestsException = exports.ResourceNotFoundException = exports.InvalidRequestException = void 0;
613
+ const SSOServiceException_1 = __webpack_require__(69849);
614
+ class InvalidRequestException extends SSOServiceException_1.SSOServiceException {
615
+ name = "InvalidRequestException";
616
+ $fault = "client";
617
+ constructor(opts) {
618
+ super({
619
+ name: "InvalidRequestException",
620
+ $fault: "client",
621
+ ...opts,
622
+ });
623
+ Object.setPrototypeOf(this, InvalidRequestException.prototype);
624
+ }
625
+ }
626
+ exports.InvalidRequestException = InvalidRequestException;
627
+ class ResourceNotFoundException extends SSOServiceException_1.SSOServiceException {
628
+ name = "ResourceNotFoundException";
629
+ $fault = "client";
630
+ constructor(opts) {
631
+ super({
632
+ name: "ResourceNotFoundException",
633
+ $fault: "client",
634
+ ...opts,
268
635
  });
269
636
  Object.setPrototypeOf(this, ResourceNotFoundException.prototype);
270
637
  }
271
638
  }
272
- class TooManyRequestsException extends SSOServiceException {
639
+ exports.ResourceNotFoundException = ResourceNotFoundException;
640
+ class TooManyRequestsException extends SSOServiceException_1.SSOServiceException {
273
641
  name = "TooManyRequestsException";
274
642
  $fault = "client";
275
643
  constructor(opts) {
@@ -281,7 +649,8 @@ class TooManyRequestsException extends SSOServiceException {
281
649
  Object.setPrototypeOf(this, TooManyRequestsException.prototype);
282
650
  }
283
651
  }
284
- class UnauthorizedException extends SSOServiceException {
652
+ exports.TooManyRequestsException = TooManyRequestsException;
653
+ class UnauthorizedException extends SSOServiceException_1.SSOServiceException {
285
654
  name = "UnauthorizedException";
286
655
  $fault = "client";
287
656
  constructor(opts) {
@@ -293,272 +662,21 @@ class UnauthorizedException extends SSOServiceException {
293
662
  Object.setPrototypeOf(this, UnauthorizedException.prototype);
294
663
  }
295
664
  }
296
-
297
- const _AI = "AccountInfo";
298
- const _ALT = "AccountListType";
299
- const _ATT = "AccessTokenType";
300
- const _GRC = "GetRoleCredentials";
301
- const _GRCR = "GetRoleCredentialsRequest";
302
- const _GRCRe = "GetRoleCredentialsResponse";
303
- const _IRE = "InvalidRequestException";
304
- const _L = "Logout";
305
- const _LA = "ListAccounts";
306
- const _LAR = "ListAccountsRequest";
307
- const _LARR = "ListAccountRolesRequest";
308
- const _LARRi = "ListAccountRolesResponse";
309
- const _LARi = "ListAccountsResponse";
310
- const _LARis = "ListAccountRoles";
311
- const _LR = "LogoutRequest";
312
- const _RC = "RoleCredentials";
313
- const _RI = "RoleInfo";
314
- const _RLT = "RoleListType";
315
- const _RNFE = "ResourceNotFoundException";
316
- const _SAKT = "SecretAccessKeyType";
317
- const _STT = "SessionTokenType";
318
- const _TMRE = "TooManyRequestsException";
319
- const _UE = "UnauthorizedException";
320
- const _aI = "accountId";
321
- const _aKI = "accessKeyId";
322
- const _aL = "accountList";
323
- const _aN = "accountName";
324
- const _aT = "accessToken";
325
- const _ai = "account_id";
326
- const _c = "client";
327
- const _e = "error";
328
- const _eA = "emailAddress";
329
- const _ex = "expiration";
330
- const _h = "http";
331
- const _hE = "httpError";
332
- const _hH = "httpHeader";
333
- const _hQ = "httpQuery";
334
- const _m = "message";
335
- const _mR = "maxResults";
336
- const _mr = "max_result";
337
- const _nT = "nextToken";
338
- const _nt = "next_token";
339
- const _rC = "roleCredentials";
340
- const _rL = "roleList";
341
- const _rN = "roleName";
342
- const _rn = "role_name";
343
- const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sso";
344
- const _sAK = "secretAccessKey";
345
- const _sT = "sessionToken";
346
- const _xasbt = "x-amz-sso_bearer_token";
347
- const n0 = "com.amazonaws.sso";
348
- var AccessTokenType = [0, n0, _ATT, 8, 0];
349
- var SecretAccessKeyType = [0, n0, _SAKT, 8, 0];
350
- var SessionTokenType = [0, n0, _STT, 8, 0];
351
- var AccountInfo$ = [3, n0, _AI,
352
- 0,
353
- [_aI, _aN, _eA],
354
- [0, 0, 0]
355
- ];
356
- var GetRoleCredentialsRequest$ = [3, n0, _GRCR,
357
- 0,
358
- [_rN, _aI, _aT],
359
- [[0, { [_hQ]: _rn }], [0, { [_hQ]: _ai }], [() => AccessTokenType, { [_hH]: _xasbt }]], 3
360
- ];
361
- var GetRoleCredentialsResponse$ = [3, n0, _GRCRe,
362
- 0,
363
- [_rC],
364
- [[() => RoleCredentials$, 0]]
365
- ];
366
- var InvalidRequestException$ = [-3, n0, _IRE,
367
- { [_e]: _c, [_hE]: 400 },
368
- [_m],
369
- [0]
370
- ];
371
- schema.TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
372
- var ListAccountRolesRequest$ = [3, n0, _LARR,
373
- 0,
374
- [_aT, _aI, _nT, _mR],
375
- [[() => AccessTokenType, { [_hH]: _xasbt }], [0, { [_hQ]: _ai }], [0, { [_hQ]: _nt }], [1, { [_hQ]: _mr }]], 2
376
- ];
377
- var ListAccountRolesResponse$ = [3, n0, _LARRi,
378
- 0,
379
- [_nT, _rL],
380
- [0, () => RoleListType]
381
- ];
382
- var ListAccountsRequest$ = [3, n0, _LAR,
383
- 0,
384
- [_aT, _nT, _mR],
385
- [[() => AccessTokenType, { [_hH]: _xasbt }], [0, { [_hQ]: _nt }], [1, { [_hQ]: _mr }]], 1
386
- ];
387
- var ListAccountsResponse$ = [3, n0, _LARi,
388
- 0,
389
- [_nT, _aL],
390
- [0, () => AccountListType]
391
- ];
392
- var LogoutRequest$ = [3, n0, _LR,
393
- 0,
394
- [_aT],
395
- [[() => AccessTokenType, { [_hH]: _xasbt }]], 1
396
- ];
397
- var ResourceNotFoundException$ = [-3, n0, _RNFE,
398
- { [_e]: _c, [_hE]: 404 },
399
- [_m],
400
- [0]
401
- ];
402
- schema.TypeRegistry.for(n0).registerError(ResourceNotFoundException$, ResourceNotFoundException);
403
- var RoleCredentials$ = [3, n0, _RC,
404
- 0,
405
- [_aKI, _sAK, _sT, _ex],
406
- [0, [() => SecretAccessKeyType, 0], [() => SessionTokenType, 0], 1]
407
- ];
408
- var RoleInfo$ = [3, n0, _RI,
409
- 0,
410
- [_rN, _aI],
411
- [0, 0]
412
- ];
413
- var TooManyRequestsException$ = [-3, n0, _TMRE,
414
- { [_e]: _c, [_hE]: 429 },
415
- [_m],
416
- [0]
417
- ];
418
- schema.TypeRegistry.for(n0).registerError(TooManyRequestsException$, TooManyRequestsException);
419
- var UnauthorizedException$ = [-3, n0, _UE,
420
- { [_e]: _c, [_hE]: 401 },
421
- [_m],
422
- [0]
423
- ];
424
- schema.TypeRegistry.for(n0).registerError(UnauthorizedException$, UnauthorizedException);
425
- var __Unit = "unit";
426
- var SSOServiceException$ = [-3, _s, "SSOServiceException", 0, [], []];
427
- schema.TypeRegistry.for(_s).registerError(SSOServiceException$, SSOServiceException);
428
- var AccountListType = [1, n0, _ALT,
429
- 0, () => AccountInfo$
430
- ];
431
- var RoleListType = [1, n0, _RLT,
432
- 0, () => RoleInfo$
433
- ];
434
- var GetRoleCredentials$ = [9, n0, _GRC,
435
- { [_h]: ["GET", "/federation/credentials", 200] }, () => GetRoleCredentialsRequest$, () => GetRoleCredentialsResponse$
436
- ];
437
- var ListAccountRoles$ = [9, n0, _LARis,
438
- { [_h]: ["GET", "/assignment/roles", 200] }, () => ListAccountRolesRequest$, () => ListAccountRolesResponse$
439
- ];
440
- var ListAccounts$ = [9, n0, _LA,
441
- { [_h]: ["GET", "/assignment/accounts", 200] }, () => ListAccountsRequest$, () => ListAccountsResponse$
442
- ];
443
- var Logout$ = [9, n0, _L,
444
- { [_h]: ["POST", "/logout", 200] }, () => LogoutRequest$, () => __Unit
445
- ];
446
-
447
- class GetRoleCredentialsCommand extends smithyClient.Command
448
- .classBuilder()
449
- .ep(commonParams)
450
- .m(function (Command, cs, config, o) {
451
- return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
452
- })
453
- .s("SWBPortalService", "GetRoleCredentials", {})
454
- .n("SSOClient", "GetRoleCredentialsCommand")
455
- .sc(GetRoleCredentials$)
456
- .build() {
457
- }
458
-
459
- class ListAccountRolesCommand extends smithyClient.Command
460
- .classBuilder()
461
- .ep(commonParams)
462
- .m(function (Command, cs, config, o) {
463
- return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
464
- })
465
- .s("SWBPortalService", "ListAccountRoles", {})
466
- .n("SSOClient", "ListAccountRolesCommand")
467
- .sc(ListAccountRoles$)
468
- .build() {
469
- }
470
-
471
- class ListAccountsCommand extends smithyClient.Command
472
- .classBuilder()
473
- .ep(commonParams)
474
- .m(function (Command, cs, config, o) {
475
- return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
476
- })
477
- .s("SWBPortalService", "ListAccounts", {})
478
- .n("SSOClient", "ListAccountsCommand")
479
- .sc(ListAccounts$)
480
- .build() {
481
- }
482
-
483
- class LogoutCommand extends smithyClient.Command
484
- .classBuilder()
485
- .ep(commonParams)
486
- .m(function (Command, cs, config, o) {
487
- return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
488
- })
489
- .s("SWBPortalService", "Logout", {})
490
- .n("SSOClient", "LogoutCommand")
491
- .sc(Logout$)
492
- .build() {
493
- }
494
-
495
- const commands = {
496
- GetRoleCredentialsCommand,
497
- ListAccountRolesCommand,
498
- ListAccountsCommand,
499
- LogoutCommand,
500
- };
501
- class SSO extends SSOClient {
502
- }
503
- smithyClient.createAggregatedClient(commands, SSO);
504
-
505
- const paginateListAccountRoles = core.createPaginator(SSOClient, ListAccountRolesCommand, "nextToken", "nextToken", "maxResults");
506
-
507
- const paginateListAccounts = core.createPaginator(SSOClient, ListAccountsCommand, "nextToken", "nextToken", "maxResults");
508
-
509
- Object.defineProperty(exports, "$Command", ({
510
- enumerable: true,
511
- get: function () { return smithyClient.Command; }
512
- }));
513
- Object.defineProperty(exports, "__Client", ({
514
- enumerable: true,
515
- get: function () { return smithyClient.Client; }
516
- }));
517
- exports.AccountInfo$ = AccountInfo$;
518
- exports.GetRoleCredentials$ = GetRoleCredentials$;
519
- exports.GetRoleCredentialsCommand = GetRoleCredentialsCommand;
520
- exports.GetRoleCredentialsRequest$ = GetRoleCredentialsRequest$;
521
- exports.GetRoleCredentialsResponse$ = GetRoleCredentialsResponse$;
522
- exports.InvalidRequestException = InvalidRequestException;
523
- exports.InvalidRequestException$ = InvalidRequestException$;
524
- exports.ListAccountRoles$ = ListAccountRoles$;
525
- exports.ListAccountRolesCommand = ListAccountRolesCommand;
526
- exports.ListAccountRolesRequest$ = ListAccountRolesRequest$;
527
- exports.ListAccountRolesResponse$ = ListAccountRolesResponse$;
528
- exports.ListAccounts$ = ListAccounts$;
529
- exports.ListAccountsCommand = ListAccountsCommand;
530
- exports.ListAccountsRequest$ = ListAccountsRequest$;
531
- exports.ListAccountsResponse$ = ListAccountsResponse$;
532
- exports.Logout$ = Logout$;
533
- exports.LogoutCommand = LogoutCommand;
534
- exports.LogoutRequest$ = LogoutRequest$;
535
- exports.ResourceNotFoundException = ResourceNotFoundException;
536
- exports.ResourceNotFoundException$ = ResourceNotFoundException$;
537
- exports.RoleCredentials$ = RoleCredentials$;
538
- exports.RoleInfo$ = RoleInfo$;
539
- exports.SSO = SSO;
540
- exports.SSOClient = SSOClient;
541
- exports.SSOServiceException = SSOServiceException;
542
- exports.SSOServiceException$ = SSOServiceException$;
543
- exports.TooManyRequestsException = TooManyRequestsException;
544
- exports.TooManyRequestsException$ = TooManyRequestsException$;
545
665
  exports.UnauthorizedException = UnauthorizedException;
546
- exports.UnauthorizedException$ = UnauthorizedException$;
547
- exports.paginateListAccountRoles = paginateListAccountRoles;
548
- exports.paginateListAccounts = paginateListAccounts;
549
666
 
550
667
 
551
668
  /***/ }),
552
669
 
553
- /***/ 82696:
670
+ /***/ 85541:
554
671
  /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
555
672
 
556
673
 
557
674
  Object.defineProperty(exports, "__esModule", ({ value: true }));
558
675
  exports.getRuntimeConfig = void 0;
559
676
  const tslib_1 = __webpack_require__(61860);
560
- const package_json_1 = tslib_1.__importDefault(__webpack_require__(45188));
561
- const core_1 = __webpack_require__(8704);
677
+ const package_json_1 = tslib_1.__importDefault(__webpack_require__(39955));
678
+ const client_1 = __webpack_require__(5152);
679
+ const httpAuthSchemes_1 = __webpack_require__(97523);
562
680
  const util_user_agent_node_1 = __webpack_require__(51656);
563
681
  const config_resolver_1 = __webpack_require__(39316);
564
682
  const hash_node_1 = __webpack_require__(5092);
@@ -569,13 +687,13 @@ const smithy_client_1 = __webpack_require__(61411);
569
687
  const util_body_length_node_1 = __webpack_require__(13638);
570
688
  const util_defaults_mode_node_1 = __webpack_require__(15435);
571
689
  const util_retry_1 = __webpack_require__(15518);
572
- const runtimeConfig_shared_1 = __webpack_require__(8073);
690
+ const runtimeConfig_shared_1 = __webpack_require__(43082);
573
691
  const getRuntimeConfig = (config) => {
574
692
  (0, smithy_client_1.emitWarningIfUnsupportedVersion)(process.version);
575
693
  const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
576
694
  const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
577
695
  const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
578
- (0, core_1.emitWarningIfUnsupportedVersion)(process.version);
696
+ (0, client_1.emitWarningIfUnsupportedVersion)(process.version);
579
697
  const loaderConfig = {
580
698
  profile: config?.profile,
581
699
  logger: clientSharedValues.logger,
@@ -585,11 +703,13 @@ const getRuntimeConfig = (config) => {
585
703
  ...config,
586
704
  runtime: "node",
587
705
  defaultsMode,
588
- authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
706
+ authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(httpAuthSchemes_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
589
707
  bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
590
- defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
708
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ??
709
+ (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
591
710
  maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
592
- region: config?.region ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
711
+ region: config?.region ??
712
+ (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
593
713
  requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
594
714
  retryMode: config?.retryMode ??
595
715
  (0, node_config_provider_1.loadConfig)({
@@ -608,21 +728,22 @@ exports.getRuntimeConfig = getRuntimeConfig;
608
728
 
609
729
  /***/ }),
610
730
 
611
- /***/ 8073:
731
+ /***/ 43082:
612
732
  /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
613
733
 
614
734
 
615
735
  Object.defineProperty(exports, "__esModule", ({ value: true }));
616
736
  exports.getRuntimeConfig = void 0;
617
- const core_1 = __webpack_require__(8704);
737
+ const httpAuthSchemes_1 = __webpack_require__(97523);
618
738
  const protocols_1 = __webpack_require__(37288);
619
- const core_2 = __webpack_require__(90402);
739
+ const core_1 = __webpack_require__(90402);
620
740
  const smithy_client_1 = __webpack_require__(61411);
621
741
  const url_parser_1 = __webpack_require__(14494);
622
742
  const util_base64_1 = __webpack_require__(68385);
623
743
  const util_utf8_1 = __webpack_require__(71577);
624
- const httpAuthSchemeProvider_1 = __webpack_require__(62041);
625
- const endpointResolver_1 = __webpack_require__(13903);
744
+ const httpAuthSchemeProvider_1 = __webpack_require__(97452);
745
+ const endpointResolver_1 = __webpack_require__(85074);
746
+ const schemas_0_1 = __webpack_require__(52167);
626
747
  const getRuntimeConfig = (config) => {
627
748
  return {
628
749
  apiVersion: "2019-06-10",
@@ -636,18 +757,19 @@ const getRuntimeConfig = (config) => {
636
757
  {
637
758
  schemeId: "aws.auth#sigv4",
638
759
  identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
639
- signer: new core_1.AwsSdkSigV4Signer(),
760
+ signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
640
761
  },
641
762
  {
642
763
  schemeId: "smithy.api#noAuth",
643
764
  identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
644
- signer: new core_2.NoAuthSigner(),
765
+ signer: new core_1.NoAuthSigner(),
645
766
  },
646
767
  ],
647
768
  logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
648
769
  protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
649
770
  protocolSettings: config?.protocolSettings ?? {
650
771
  defaultNamespace: "com.amazonaws.sso",
772
+ errorTypeRegistries: schemas_0_1.errorTypeRegistries,
651
773
  version: "2019-06-10",
652
774
  serviceTarget: "SWBPortalService",
653
775
  },
@@ -662,537 +784,99 @@ exports.getRuntimeConfig = getRuntimeConfig;
662
784
 
663
785
  /***/ }),
664
786
 
665
- /***/ 97523:
787
+ /***/ 52167:
666
788
  /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
667
789
 
668
790
 
669
-
670
- var protocolHttp = __webpack_require__(72356);
671
- var core = __webpack_require__(90402);
672
- var propertyProvider = __webpack_require__(71238);
673
- var client = __webpack_require__(5152);
674
- var signatureV4 = __webpack_require__(75118);
675
-
676
- const getDateHeader = (response) => protocolHttp.HttpResponse.isInstance(response) ? response.headers?.date ?? response.headers?.Date : undefined;
677
-
678
- const getSkewCorrectedDate = (systemClockOffset) => new Date(Date.now() + systemClockOffset);
679
-
680
- const isClockSkewed = (clockTime, systemClockOffset) => Math.abs(getSkewCorrectedDate(systemClockOffset).getTime() - clockTime) >= 300000;
681
-
682
- const getUpdatedSystemClockOffset = (clockTime, currentSystemClockOffset) => {
683
- const clockTimeInMs = Date.parse(clockTime);
684
- if (isClockSkewed(clockTimeInMs, currentSystemClockOffset)) {
685
- return clockTimeInMs - Date.now();
686
- }
687
- return currentSystemClockOffset;
688
- };
689
-
690
- const throwSigningPropertyError = (name, property) => {
691
- if (!property) {
692
- throw new Error(`Property \`${name}\` is not resolved for AWS SDK SigV4Auth`);
693
- }
694
- return property;
695
- };
696
- const validateSigningProperties = async (signingProperties) => {
697
- const context = throwSigningPropertyError("context", signingProperties.context);
698
- const config = throwSigningPropertyError("config", signingProperties.config);
699
- const authScheme = context.endpointV2?.properties?.authSchemes?.[0];
700
- const signerFunction = throwSigningPropertyError("signer", config.signer);
701
- const signer = await signerFunction(authScheme);
702
- const signingRegion = signingProperties?.signingRegion;
703
- const signingRegionSet = signingProperties?.signingRegionSet;
704
- const signingName = signingProperties?.signingName;
705
- return {
706
- config,
707
- signer,
708
- signingRegion,
709
- signingRegionSet,
710
- signingName,
711
- };
712
- };
713
- class AwsSdkSigV4Signer {
714
- async sign(httpRequest, identity, signingProperties) {
715
- if (!protocolHttp.HttpRequest.isInstance(httpRequest)) {
716
- throw new Error("The request is not an instance of `HttpRequest` and cannot be signed");
717
- }
718
- const validatedProps = await validateSigningProperties(signingProperties);
719
- const { config, signer } = validatedProps;
720
- let { signingRegion, signingName } = validatedProps;
721
- const handlerExecutionContext = signingProperties.context;
722
- if (handlerExecutionContext?.authSchemes?.length ?? 0 > 1) {
723
- const [first, second] = handlerExecutionContext.authSchemes;
724
- if (first?.name === "sigv4a" && second?.name === "sigv4") {
725
- signingRegion = second?.signingRegion ?? signingRegion;
726
- signingName = second?.signingName ?? signingName;
727
- }
728
- }
729
- const signedRequest = await signer.sign(httpRequest, {
730
- signingDate: getSkewCorrectedDate(config.systemClockOffset),
731
- signingRegion: signingRegion,
732
- signingService: signingName,
733
- });
734
- return signedRequest;
735
- }
736
- errorHandler(signingProperties) {
737
- return (error) => {
738
- const serverTime = error.ServerTime ?? getDateHeader(error.$response);
739
- if (serverTime) {
740
- const config = throwSigningPropertyError("config", signingProperties.config);
741
- const initialSystemClockOffset = config.systemClockOffset;
742
- config.systemClockOffset = getUpdatedSystemClockOffset(serverTime, config.systemClockOffset);
743
- const clockSkewCorrected = config.systemClockOffset !== initialSystemClockOffset;
744
- if (clockSkewCorrected && error.$metadata) {
745
- error.$metadata.clockSkewCorrected = true;
746
- }
747
- }
748
- throw error;
749
- };
750
- }
751
- successHandler(httpResponse, signingProperties) {
752
- const dateHeader = getDateHeader(httpResponse);
753
- if (dateHeader) {
754
- const config = throwSigningPropertyError("config", signingProperties.config);
755
- config.systemClockOffset = getUpdatedSystemClockOffset(dateHeader, config.systemClockOffset);
756
- }
757
- }
758
- }
759
- const AWSSDKSigV4Signer = AwsSdkSigV4Signer;
760
-
761
- class AwsSdkSigV4ASigner extends AwsSdkSigV4Signer {
762
- async sign(httpRequest, identity, signingProperties) {
763
- if (!protocolHttp.HttpRequest.isInstance(httpRequest)) {
764
- throw new Error("The request is not an instance of `HttpRequest` and cannot be signed");
765
- }
766
- const { config, signer, signingRegion, signingRegionSet, signingName } = await validateSigningProperties(signingProperties);
767
- const configResolvedSigningRegionSet = await config.sigv4aSigningRegionSet?.();
768
- const multiRegionOverride = (configResolvedSigningRegionSet ??
769
- signingRegionSet ?? [signingRegion]).join(",");
770
- const signedRequest = await signer.sign(httpRequest, {
771
- signingDate: getSkewCorrectedDate(config.systemClockOffset),
772
- signingRegion: multiRegionOverride,
773
- signingService: signingName,
774
- });
775
- return signedRequest;
776
- }
777
- }
778
-
779
- const getArrayForCommaSeparatedString = (str) => typeof str === "string" && str.length > 0 ? str.split(",").map((item) => item.trim()) : [];
780
-
781
- const getBearerTokenEnvKey = (signingName) => `AWS_BEARER_TOKEN_${signingName.replace(/[\s-]/g, "_").toUpperCase()}`;
782
-
783
- const NODE_AUTH_SCHEME_PREFERENCE_ENV_KEY = "AWS_AUTH_SCHEME_PREFERENCE";
784
- const NODE_AUTH_SCHEME_PREFERENCE_CONFIG_KEY = "auth_scheme_preference";
785
- const NODE_AUTH_SCHEME_PREFERENCE_OPTIONS = {
786
- environmentVariableSelector: (env, options) => {
787
- if (options?.signingName) {
788
- const bearerTokenKey = getBearerTokenEnvKey(options.signingName);
789
- if (bearerTokenKey in env)
790
- return ["httpBearerAuth"];
791
- }
792
- if (!(NODE_AUTH_SCHEME_PREFERENCE_ENV_KEY in env))
793
- return undefined;
794
- return getArrayForCommaSeparatedString(env[NODE_AUTH_SCHEME_PREFERENCE_ENV_KEY]);
795
- },
796
- configFileSelector: (profile) => {
797
- if (!(NODE_AUTH_SCHEME_PREFERENCE_CONFIG_KEY in profile))
798
- return undefined;
799
- return getArrayForCommaSeparatedString(profile[NODE_AUTH_SCHEME_PREFERENCE_CONFIG_KEY]);
800
- },
801
- default: [],
802
- };
803
-
804
- const resolveAwsSdkSigV4AConfig = (config) => {
805
- config.sigv4aSigningRegionSet = core.normalizeProvider(config.sigv4aSigningRegionSet);
806
- return config;
807
- };
808
- const NODE_SIGV4A_CONFIG_OPTIONS = {
809
- environmentVariableSelector(env) {
810
- if (env.AWS_SIGV4A_SIGNING_REGION_SET) {
811
- return env.AWS_SIGV4A_SIGNING_REGION_SET.split(",").map((_) => _.trim());
812
- }
813
- throw new propertyProvider.ProviderError("AWS_SIGV4A_SIGNING_REGION_SET not set in env.", {
814
- tryNextLink: true,
815
- });
816
- },
817
- configFileSelector(profile) {
818
- if (profile.sigv4a_signing_region_set) {
819
- return (profile.sigv4a_signing_region_set ?? "").split(",").map((_) => _.trim());
820
- }
821
- throw new propertyProvider.ProviderError("sigv4a_signing_region_set not set in profile.", {
822
- tryNextLink: true,
823
- });
824
- },
825
- default: undefined,
826
- };
827
-
828
- const resolveAwsSdkSigV4Config = (config) => {
829
- let inputCredentials = config.credentials;
830
- let isUserSupplied = !!config.credentials;
831
- let resolvedCredentials = undefined;
832
- Object.defineProperty(config, "credentials", {
833
- set(credentials) {
834
- if (credentials && credentials !== inputCredentials && credentials !== resolvedCredentials) {
835
- isUserSupplied = true;
836
- }
837
- inputCredentials = credentials;
838
- const memoizedProvider = normalizeCredentialProvider(config, {
839
- credentials: inputCredentials,
840
- credentialDefaultProvider: config.credentialDefaultProvider,
841
- });
842
- const boundProvider = bindCallerConfig(config, memoizedProvider);
843
- if (isUserSupplied && !boundProvider.attributed) {
844
- const isCredentialObject = typeof inputCredentials === "object" && inputCredentials !== null;
845
- resolvedCredentials = async (options) => {
846
- const creds = await boundProvider(options);
847
- const attributedCreds = creds;
848
- if (isCredentialObject && (!attributedCreds.$source || Object.keys(attributedCreds.$source).length === 0)) {
849
- return client.setCredentialFeature(attributedCreds, "CREDENTIALS_CODE", "e");
850
- }
851
- return attributedCreds;
852
- };
853
- resolvedCredentials.memoized = boundProvider.memoized;
854
- resolvedCredentials.configBound = boundProvider.configBound;
855
- resolvedCredentials.attributed = true;
856
- }
857
- else {
858
- resolvedCredentials = boundProvider;
859
- }
860
- },
861
- get() {
862
- return resolvedCredentials;
863
- },
864
- enumerable: true,
865
- configurable: true,
866
- });
867
- config.credentials = inputCredentials;
868
- const { signingEscapePath = true, systemClockOffset = config.systemClockOffset || 0, sha256, } = config;
869
- let signer;
870
- if (config.signer) {
871
- signer = core.normalizeProvider(config.signer);
872
- }
873
- else if (config.regionInfoProvider) {
874
- signer = () => core.normalizeProvider(config.region)()
875
- .then(async (region) => [
876
- (await config.regionInfoProvider(region, {
877
- useFipsEndpoint: await config.useFipsEndpoint(),
878
- useDualstackEndpoint: await config.useDualstackEndpoint(),
879
- })) || {},
880
- region,
881
- ])
882
- .then(([regionInfo, region]) => {
883
- const { signingRegion, signingService } = regionInfo;
884
- config.signingRegion = config.signingRegion || signingRegion || region;
885
- config.signingName = config.signingName || signingService || config.serviceId;
886
- const params = {
887
- ...config,
888
- credentials: config.credentials,
889
- region: config.signingRegion,
890
- service: config.signingName,
891
- sha256,
892
- uriEscapePath: signingEscapePath,
893
- };
894
- const SignerCtor = config.signerConstructor || signatureV4.SignatureV4;
895
- return new SignerCtor(params);
896
- });
897
- }
898
- else {
899
- signer = async (authScheme) => {
900
- authScheme = Object.assign({}, {
901
- name: "sigv4",
902
- signingName: config.signingName || config.defaultSigningName,
903
- signingRegion: await core.normalizeProvider(config.region)(),
904
- properties: {},
905
- }, authScheme);
906
- const signingRegion = authScheme.signingRegion;
907
- const signingService = authScheme.signingName;
908
- config.signingRegion = config.signingRegion || signingRegion;
909
- config.signingName = config.signingName || signingService || config.serviceId;
910
- const params = {
911
- ...config,
912
- credentials: config.credentials,
913
- region: config.signingRegion,
914
- service: config.signingName,
915
- sha256,
916
- uriEscapePath: signingEscapePath,
917
- };
918
- const SignerCtor = config.signerConstructor || signatureV4.SignatureV4;
919
- return new SignerCtor(params);
920
- };
921
- }
922
- const resolvedConfig = Object.assign(config, {
923
- systemClockOffset,
924
- signingEscapePath,
925
- signer,
926
- });
927
- return resolvedConfig;
928
- };
929
- const resolveAWSSDKSigV4Config = resolveAwsSdkSigV4Config;
930
- function normalizeCredentialProvider(config, { credentials, credentialDefaultProvider, }) {
931
- let credentialsProvider;
932
- if (credentials) {
933
- if (!credentials?.memoized) {
934
- credentialsProvider = core.memoizeIdentityProvider(credentials, core.isIdentityExpired, core.doesIdentityRequireRefresh);
935
- }
936
- else {
937
- credentialsProvider = credentials;
938
- }
939
- }
940
- else {
941
- if (credentialDefaultProvider) {
942
- credentialsProvider = core.normalizeProvider(credentialDefaultProvider(Object.assign({}, config, {
943
- parentClientConfig: config,
944
- })));
945
- }
946
- else {
947
- credentialsProvider = async () => {
948
- throw new Error("@aws-sdk/core::resolveAwsSdkSigV4Config - `credentials` not provided and no credentialDefaultProvider was configured.");
949
- };
950
- }
951
- }
952
- credentialsProvider.memoized = true;
953
- return credentialsProvider;
954
- }
955
- function bindCallerConfig(config, credentialsProvider) {
956
- if (credentialsProvider.configBound) {
957
- return credentialsProvider;
958
- }
959
- const fn = async (options) => credentialsProvider({ ...options, callerClientConfig: config });
960
- fn.memoized = credentialsProvider.memoized;
961
- fn.configBound = true;
962
- return fn;
963
- }
964
-
965
- exports.AWSSDKSigV4Signer = AWSSDKSigV4Signer;
966
- exports.AwsSdkSigV4ASigner = AwsSdkSigV4ASigner;
967
- exports.AwsSdkSigV4Signer = AwsSdkSigV4Signer;
968
- exports.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS = NODE_AUTH_SCHEME_PREFERENCE_OPTIONS;
969
- exports.NODE_SIGV4A_CONFIG_OPTIONS = NODE_SIGV4A_CONFIG_OPTIONS;
970
- exports.getBearerTokenEnvKey = getBearerTokenEnvKey;
971
- exports.resolveAWSSDKSigV4Config = resolveAWSSDKSigV4Config;
972
- exports.resolveAwsSdkSigV4AConfig = resolveAwsSdkSigV4AConfig;
973
- exports.resolveAwsSdkSigV4Config = resolveAwsSdkSigV4Config;
974
- exports.validateSigningProperties = validateSigningProperties;
975
-
976
-
977
- /***/ }),
978
-
979
- /***/ 60998:
980
- /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
981
-
982
- var __webpack_unused_export__;
983
-
984
-
985
- var propertyProvider = __webpack_require__(71238);
986
- var sharedIniFileLoader = __webpack_require__(94964);
987
- var client = __webpack_require__(5152);
988
- var tokenProviders = __webpack_require__(75433);
989
-
990
- const isSsoProfile = (arg) => arg &&
991
- (typeof arg.sso_start_url === "string" ||
992
- typeof arg.sso_account_id === "string" ||
993
- typeof arg.sso_session === "string" ||
994
- typeof arg.sso_region === "string" ||
995
- typeof arg.sso_role_name === "string");
996
-
997
- const SHOULD_FAIL_CREDENTIAL_CHAIN = false;
998
- const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger, }) => {
999
- let token;
1000
- const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
1001
- if (ssoSession) {
1002
- try {
1003
- const _token = await tokenProviders.fromSso({
1004
- profile,
1005
- filepath,
1006
- configFilepath,
1007
- ignoreCache,
1008
- })();
1009
- token = {
1010
- accessToken: _token.token,
1011
- expiresAt: new Date(_token.expiration).toISOString(),
1012
- };
1013
- }
1014
- catch (e) {
1015
- throw new propertyProvider.CredentialsProviderError(e.message, {
1016
- tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
1017
- logger,
1018
- });
1019
- }
1020
- }
1021
- else {
1022
- try {
1023
- token = await sharedIniFileLoader.getSSOTokenFromFile(ssoStartUrl);
1024
- }
1025
- catch (e) {
1026
- throw new propertyProvider.CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {
1027
- tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
1028
- logger,
1029
- });
1030
- }
1031
- }
1032
- if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {
1033
- throw new propertyProvider.CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {
1034
- tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
1035
- logger,
1036
- });
1037
- }
1038
- const { accessToken } = token;
1039
- const { SSOClient, GetRoleCredentialsCommand } = await Promise.resolve().then(function () { return __webpack_require__(16553); });
1040
- const sso = ssoClient ||
1041
- new SSOClient(Object.assign({}, clientConfig ?? {}, {
1042
- logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
1043
- region: clientConfig?.region ?? ssoRegion,
1044
- userAgentAppId: clientConfig?.userAgentAppId ?? callerClientConfig?.userAgentAppId ?? parentClientConfig?.userAgentAppId,
1045
- }));
1046
- let ssoResp;
1047
- try {
1048
- ssoResp = await sso.send(new GetRoleCredentialsCommand({
1049
- accountId: ssoAccountId,
1050
- roleName: ssoRoleName,
1051
- accessToken,
1052
- }));
1053
- }
1054
- catch (e) {
1055
- throw new propertyProvider.CredentialsProviderError(e, {
1056
- tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
1057
- logger,
1058
- });
1059
- }
1060
- const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;
1061
- if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
1062
- throw new propertyProvider.CredentialsProviderError("SSO returns an invalid temporary credential.", {
1063
- tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
1064
- logger,
1065
- });
1066
- }
1067
- const credentials = {
1068
- accessKeyId,
1069
- secretAccessKey,
1070
- sessionToken,
1071
- expiration: new Date(expiration),
1072
- ...(credentialScope && { credentialScope }),
1073
- ...(accountId && { accountId }),
1074
- };
1075
- if (ssoSession) {
1076
- client.setCredentialFeature(credentials, "CREDENTIALS_SSO", "s");
1077
- }
1078
- else {
1079
- client.setCredentialFeature(credentials, "CREDENTIALS_SSO_LEGACY", "u");
1080
- }
1081
- return credentials;
1082
- };
1083
-
1084
- const validateSsoProfile = (profile, logger) => {
1085
- const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
1086
- if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
1087
- throw new propertyProvider.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", ` +
1088
- `"sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });
1089
- }
1090
- return profile;
1091
- };
1092
-
1093
- const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
1094
- init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
1095
- const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
1096
- const { ssoClient } = init;
1097
- const profileName = sharedIniFileLoader.getProfileName({
1098
- profile: init.profile ?? callerClientConfig?.profile,
1099
- });
1100
- if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
1101
- const profiles = await sharedIniFileLoader.parseKnownFiles(init);
1102
- const profile = profiles[profileName];
1103
- if (!profile) {
1104
- throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });
1105
- }
1106
- if (!isSsoProfile(profile)) {
1107
- throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {
1108
- logger: init.logger,
1109
- });
1110
- }
1111
- if (profile?.sso_session) {
1112
- const ssoSessions = await sharedIniFileLoader.loadSsoSessionData(init);
1113
- const session = ssoSessions[profile.sso_session];
1114
- const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;
1115
- if (ssoRegion && ssoRegion !== session.sso_region) {
1116
- throw new propertyProvider.CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {
1117
- tryNextLink: false,
1118
- logger: init.logger,
1119
- });
1120
- }
1121
- if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {
1122
- throw new propertyProvider.CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {
1123
- tryNextLink: false,
1124
- logger: init.logger,
1125
- });
1126
- }
1127
- profile.sso_region = session.sso_region;
1128
- profile.sso_start_url = session.sso_start_url;
1129
- }
1130
- const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);
1131
- return resolveSSOCredentials({
1132
- ssoStartUrl: sso_start_url,
1133
- ssoSession: sso_session,
1134
- ssoAccountId: sso_account_id,
1135
- ssoRegion: sso_region,
1136
- ssoRoleName: sso_role_name,
1137
- ssoClient: ssoClient,
1138
- clientConfig: init.clientConfig,
1139
- parentClientConfig: init.parentClientConfig,
1140
- callerClientConfig: init.callerClientConfig,
1141
- profile: profileName,
1142
- filepath: init.filepath,
1143
- configFilepath: init.configFilepath,
1144
- ignoreCache: init.ignoreCache,
1145
- logger: init.logger,
1146
- });
1147
- }
1148
- else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
1149
- throw new propertyProvider.CredentialsProviderError("Incomplete configuration. The fromSSO() argument hash must include " +
1150
- '"ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"', { tryNextLink: false, logger: init.logger });
1151
- }
1152
- else {
1153
- return resolveSSOCredentials({
1154
- ssoStartUrl,
1155
- ssoSession,
1156
- ssoAccountId,
1157
- ssoRegion,
1158
- ssoRoleName,
1159
- ssoClient,
1160
- clientConfig: init.clientConfig,
1161
- parentClientConfig: init.parentClientConfig,
1162
- callerClientConfig: init.callerClientConfig,
1163
- profile: profileName,
1164
- filepath: init.filepath,
1165
- configFilepath: init.configFilepath,
1166
- ignoreCache: init.ignoreCache,
1167
- logger: init.logger,
1168
- });
1169
- }
1170
- };
1171
-
1172
- exports.fromSSO = fromSSO;
1173
- __webpack_unused_export__ = isSsoProfile;
1174
- __webpack_unused_export__ = validateSsoProfile;
1175
-
1176
-
1177
- /***/ }),
1178
-
1179
- /***/ 16553:
1180
- /***/ ((__unused_webpack_module, exports, __webpack_require__) => {
1181
-
1182
-
1183
-
1184
- var clientSso = __webpack_require__(62054);
1185
-
1186
-
1187
-
1188
- Object.defineProperty(exports, "GetRoleCredentialsCommand", ({
1189
- enumerable: true,
1190
- get: function () { return clientSso.GetRoleCredentialsCommand; }
1191
- }));
1192
- Object.defineProperty(exports, "SSOClient", ({
1193
- enumerable: true,
1194
- get: function () { return clientSso.SSOClient; }
1195
- }));
791
+ Object.defineProperty(exports, "__esModule", ({ value: true }));
792
+ exports.GetRoleCredentials$ = exports.RoleCredentials$ = exports.GetRoleCredentialsResponse$ = exports.GetRoleCredentialsRequest$ = exports.errorTypeRegistries = exports.UnauthorizedException$ = exports.TooManyRequestsException$ = exports.ResourceNotFoundException$ = exports.InvalidRequestException$ = exports.SSOServiceException$ = void 0;
793
+ const _ATT = "AccessTokenType";
794
+ const _GRC = "GetRoleCredentials";
795
+ const _GRCR = "GetRoleCredentialsRequest";
796
+ const _GRCRe = "GetRoleCredentialsResponse";
797
+ const _IRE = "InvalidRequestException";
798
+ const _RC = "RoleCredentials";
799
+ const _RNFE = "ResourceNotFoundException";
800
+ const _SAKT = "SecretAccessKeyType";
801
+ const _STT = "SessionTokenType";
802
+ const _TMRE = "TooManyRequestsException";
803
+ const _UE = "UnauthorizedException";
804
+ const _aI = "accountId";
805
+ const _aKI = "accessKeyId";
806
+ const _aT = "accessToken";
807
+ const _ai = "account_id";
808
+ const _c = "client";
809
+ const _e = "error";
810
+ const _ex = "expiration";
811
+ const _h = "http";
812
+ const _hE = "httpError";
813
+ const _hH = "httpHeader";
814
+ const _hQ = "httpQuery";
815
+ const _m = "message";
816
+ const _rC = "roleCredentials";
817
+ const _rN = "roleName";
818
+ const _rn = "role_name";
819
+ const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sso";
820
+ const _sAK = "secretAccessKey";
821
+ const _sT = "sessionToken";
822
+ const _xasbt = "x-amz-sso_bearer_token";
823
+ const n0 = "com.amazonaws.sso";
824
+ const schema_1 = __webpack_require__(26890);
825
+ const errors_1 = __webpack_require__(24483);
826
+ const SSOServiceException_1 = __webpack_require__(69849);
827
+ const _s_registry = schema_1.TypeRegistry.for(_s);
828
+ exports.SSOServiceException$ = [-3, _s, "SSOServiceException", 0, [], []];
829
+ _s_registry.registerError(exports.SSOServiceException$, SSOServiceException_1.SSOServiceException);
830
+ const n0_registry = schema_1.TypeRegistry.for(n0);
831
+ exports.InvalidRequestException$ = [-3, n0, _IRE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
832
+ n0_registry.registerError(exports.InvalidRequestException$, errors_1.InvalidRequestException);
833
+ exports.ResourceNotFoundException$ = [-3, n0, _RNFE, { [_e]: _c, [_hE]: 404 }, [_m], [0]];
834
+ n0_registry.registerError(exports.ResourceNotFoundException$, errors_1.ResourceNotFoundException);
835
+ exports.TooManyRequestsException$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_m], [0]];
836
+ n0_registry.registerError(exports.TooManyRequestsException$, errors_1.TooManyRequestsException);
837
+ exports.UnauthorizedException$ = [-3, n0, _UE, { [_e]: _c, [_hE]: 401 }, [_m], [0]];
838
+ n0_registry.registerError(exports.UnauthorizedException$, errors_1.UnauthorizedException);
839
+ exports.errorTypeRegistries = [_s_registry, n0_registry];
840
+ var AccessTokenType = [0, n0, _ATT, 8, 0];
841
+ var SecretAccessKeyType = [0, n0, _SAKT, 8, 0];
842
+ var SessionTokenType = [0, n0, _STT, 8, 0];
843
+ exports.GetRoleCredentialsRequest$ = [
844
+ 3,
845
+ n0,
846
+ _GRCR,
847
+ 0,
848
+ [_rN, _aI, _aT],
849
+ [
850
+ [0, { [_hQ]: _rn }],
851
+ [0, { [_hQ]: _ai }],
852
+ [() => AccessTokenType, { [_hH]: _xasbt }],
853
+ ],
854
+ 3,
855
+ ];
856
+ exports.GetRoleCredentialsResponse$ = [
857
+ 3,
858
+ n0,
859
+ _GRCRe,
860
+ 0,
861
+ [_rC],
862
+ [[() => exports.RoleCredentials$, 0]],
863
+ ];
864
+ exports.RoleCredentials$ = [
865
+ 3,
866
+ n0,
867
+ _RC,
868
+ 0,
869
+ [_aKI, _sAK, _sT, _ex],
870
+ [0, [() => SecretAccessKeyType, 0], [() => SessionTokenType, 0], 1],
871
+ ];
872
+ exports.GetRoleCredentials$ = [
873
+ 9,
874
+ n0,
875
+ _GRC,
876
+ { [_h]: ["GET", "/federation/credentials", 200] },
877
+ () => exports.GetRoleCredentialsRequest$,
878
+ () => exports.GetRoleCredentialsResponse$,
879
+ ];
1196
880
 
1197
881
 
1198
882
  /***/ }),
@@ -1206,7 +890,7 @@ var client = __webpack_require__(5152);
1206
890
  var httpAuthSchemes = __webpack_require__(97523);
1207
891
  var propertyProvider = __webpack_require__(71238);
1208
892
  var sharedIniFileLoader = __webpack_require__(94964);
1209
- var fs = __webpack_require__(79896);
893
+ var node_fs = __webpack_require__(73024);
1210
894
 
1211
895
  const fromEnvSigningName = ({ logger, signingName } = {}) => async () => {
1212
896
  logger?.debug?.("@aws-sdk/token-providers - fromEnvSigningName");
@@ -1226,7 +910,7 @@ const EXPIRE_WINDOW_MS = 5 * 60 * 1000;
1226
910
  const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
1227
911
 
1228
912
  const getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
1229
- const { SSOOIDCClient } = await __webpack_require__.e(/* import() */ 443).then(__webpack_require__.t.bind(__webpack_require__, 89443, 19));
913
+ const { SSOOIDCClient } = await __webpack_require__.e(/* import() */ 443).then(__webpack_require__.t.bind(__webpack_require__, 89443, 23));
1230
914
  const coalesce = (prop) => init.clientConfig?.[prop] ?? init.parentClientConfig?.[prop] ?? callerClientConfig?.[prop];
1231
915
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
1232
916
  region: ssoRegion ?? init.clientConfig?.region,
@@ -1237,7 +921,7 @@ const getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
1237
921
  };
1238
922
 
1239
923
  const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConfig) => {
1240
- const { CreateTokenCommand } = await __webpack_require__.e(/* import() */ 443).then(__webpack_require__.t.bind(__webpack_require__, 89443, 19));
924
+ const { CreateTokenCommand } = await __webpack_require__.e(/* import() */ 443).then(__webpack_require__.t.bind(__webpack_require__, 89443, 23));
1241
925
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init, callerClientConfig);
1242
926
  return ssoOidcClient.send(new CreateTokenCommand({
1243
927
  clientId: ssoToken.clientId,
@@ -1259,7 +943,7 @@ const validateTokenKey = (key, value, forRefresh = false) => {
1259
943
  }
1260
944
  };
1261
945
 
1262
- const { writeFile } = fs.promises;
946
+ const { writeFile } = node_fs.promises;
1263
947
  const writeSSOTokenToFile = (id, ssoToken) => {
1264
948
  const tokenFilepath = sharedIniFileLoader.getSSOTokenFilepath(id);
1265
949
  const tokenString = JSON.stringify(ssoToken, null, 2);
@@ -1361,10 +1045,10 @@ exports.nodeProvider = nodeProvider;
1361
1045
 
1362
1046
  /***/ }),
1363
1047
 
1364
- /***/ 45188:
1048
+ /***/ 39955:
1365
1049
  /***/ ((module) => {
1366
1050
 
1367
- module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/client-sso","description":"AWS SDK for JavaScript Sso Client for Node.js, Browser and React Native","version":"3.971.0","scripts":{"build":"concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline client-sso","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sso","test:index":"tsc --noEmit ./test/index-types.ts && node ./test/index-objects.spec.mjs"},"main":"./dist-cjs/index.js","types":"./dist-types/index.d.ts","module":"./dist-es/index.js","sideEffects":false,"dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.970.0","@aws-sdk/middleware-host-header":"3.969.0","@aws-sdk/middleware-logger":"3.969.0","@aws-sdk/middleware-recursion-detection":"3.969.0","@aws-sdk/middleware-user-agent":"3.970.0","@aws-sdk/region-config-resolver":"3.969.0","@aws-sdk/types":"3.969.0","@aws-sdk/util-endpoints":"3.970.0","@aws-sdk/util-user-agent-browser":"3.969.0","@aws-sdk/util-user-agent-node":"3.971.0","@smithy/config-resolver":"^4.4.6","@smithy/core":"^3.20.6","@smithy/fetch-http-handler":"^5.3.9","@smithy/hash-node":"^4.2.8","@smithy/invalid-dependency":"^4.2.8","@smithy/middleware-content-length":"^4.2.8","@smithy/middleware-endpoint":"^4.4.7","@smithy/middleware-retry":"^4.4.23","@smithy/middleware-serde":"^4.2.9","@smithy/middleware-stack":"^4.2.8","@smithy/node-config-provider":"^4.3.8","@smithy/node-http-handler":"^4.4.8","@smithy/protocol-http":"^5.3.8","@smithy/smithy-client":"^4.10.8","@smithy/types":"^4.12.0","@smithy/url-parser":"^4.2.8","@smithy/util-base64":"^4.3.0","@smithy/util-body-length-browser":"^4.2.0","@smithy/util-body-length-node":"^4.2.1","@smithy/util-defaults-mode-browser":"^4.3.22","@smithy/util-defaults-mode-node":"^4.2.25","@smithy/util-endpoints":"^3.2.8","@smithy/util-middleware":"^4.2.8","@smithy/util-retry":"^4.2.8","@smithy/util-utf8":"^4.2.0","tslib":"^2.6.2"},"devDependencies":{"@tsconfig/node20":"20.1.8","@types/node":"^20.14.8","concurrently":"7.0.0","downlevel-dts":"0.10.1","rimraf":"5.0.10","typescript":"~5.8.3"},"engines":{"node":">=20.0.0"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["dist-*/**"],"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","browser":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sso","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"clients/client-sso"}}');
1051
+ module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.19","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.27","@aws-sdk/middleware-host-header":"^3.972.9","@aws-sdk/middleware-logger":"^3.972.9","@aws-sdk/middleware-recursion-detection":"^3.972.10","@aws-sdk/middleware-user-agent":"^3.972.29","@aws-sdk/region-config-resolver":"^3.972.11","@aws-sdk/types":"^3.973.7","@aws-sdk/util-endpoints":"^3.996.6","@aws-sdk/util-user-agent-browser":"^3.972.9","@aws-sdk/util-user-agent-node":"^3.973.15","@smithy/config-resolver":"^4.4.14","@smithy/core":"^3.23.14","@smithy/fetch-http-handler":"^5.3.16","@smithy/hash-node":"^4.2.13","@smithy/invalid-dependency":"^4.2.13","@smithy/middleware-content-length":"^4.2.13","@smithy/middleware-endpoint":"^4.4.29","@smithy/middleware-retry":"^4.5.0","@smithy/middleware-serde":"^4.2.17","@smithy/middleware-stack":"^4.2.13","@smithy/node-config-provider":"^4.3.13","@smithy/node-http-handler":"^4.5.2","@smithy/protocol-http":"^5.3.13","@smithy/smithy-client":"^4.12.9","@smithy/types":"^4.14.0","@smithy/url-parser":"^4.2.13","@smithy/util-base64":"^4.3.2","@smithy/util-body-length-browser":"^4.2.2","@smithy/util-body-length-node":"^4.2.3","@smithy/util-defaults-mode-browser":"^4.3.45","@smithy/util-defaults-mode-node":"^4.2.49","@smithy/util-endpoints":"^3.3.4","@smithy/util-middleware":"^4.2.13","@smithy/util-retry":"^4.3.0","@smithy/util-utf8":"^4.2.2","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.5":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/cognito-identity/runtimeConfig":"./dist-es/submodules/cognito-identity/runtimeConfig.browser","./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sso/runtimeConfig":"./dist-es/submodules/sso/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
1368
1052
 
1369
1053
  /***/ })
1370
1054