@rharkor/caching-for-turbo 2.3.11 → 2.3.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli/136.index.js +512 -329
- package/dist/cli/136.index.js.map +1 -1
- package/dist/cli/360.index.js +3 -3
- package/dist/cli/360.index.js.map +1 -1
- package/dist/cli/443.index.js +362 -228
- package/dist/cli/443.index.js.map +1 -1
- package/dist/cli/579.index.js +9 -1
- package/dist/cli/579.index.js.map +1 -1
- package/dist/cli/605.index.js +1 -1
- package/dist/cli/605.index.js.map +1 -1
- package/dist/cli/762.index.js +363 -192
- package/dist/cli/762.index.js.map +1 -1
- package/dist/cli/869.index.js +2 -2
- package/dist/cli/956.index.js +16 -899
- package/dist/cli/956.index.js.map +1 -1
- package/dist/cli/998.index.js +549 -865
- package/dist/cli/998.index.js.map +1 -1
- package/dist/cli/index.js +184416 -187137
- package/dist/cli/licenses.txt +0 -409
- package/dist/cli/worker.js +18 -13
- package/package.json +2 -2
package/dist/cli/998.index.js
CHANGED
|
@@ -2,20 +2,236 @@ export const id = 998;
|
|
|
2
2
|
export const ids = [998];
|
|
3
3
|
export const modules = {
|
|
4
4
|
|
|
5
|
-
/***/
|
|
5
|
+
/***/ 60998:
|
|
6
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
7
|
+
|
|
8
|
+
var __webpack_unused_export__;
|
|
9
|
+
|
|
10
|
+
|
|
11
|
+
var propertyProvider = __webpack_require__(71238);
|
|
12
|
+
var sharedIniFileLoader = __webpack_require__(94964);
|
|
13
|
+
var client = __webpack_require__(5152);
|
|
14
|
+
var tokenProviders = __webpack_require__(75433);
|
|
15
|
+
|
|
16
|
+
const isSsoProfile = (arg) => arg &&
|
|
17
|
+
(typeof arg.sso_start_url === "string" ||
|
|
18
|
+
typeof arg.sso_account_id === "string" ||
|
|
19
|
+
typeof arg.sso_session === "string" ||
|
|
20
|
+
typeof arg.sso_region === "string" ||
|
|
21
|
+
typeof arg.sso_role_name === "string");
|
|
22
|
+
|
|
23
|
+
const SHOULD_FAIL_CREDENTIAL_CHAIN = false;
|
|
24
|
+
const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger, }) => {
|
|
25
|
+
let token;
|
|
26
|
+
const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
|
|
27
|
+
if (ssoSession) {
|
|
28
|
+
try {
|
|
29
|
+
const _token = await tokenProviders.fromSso({
|
|
30
|
+
profile,
|
|
31
|
+
filepath,
|
|
32
|
+
configFilepath,
|
|
33
|
+
ignoreCache,
|
|
34
|
+
})();
|
|
35
|
+
token = {
|
|
36
|
+
accessToken: _token.token,
|
|
37
|
+
expiresAt: new Date(_token.expiration).toISOString(),
|
|
38
|
+
};
|
|
39
|
+
}
|
|
40
|
+
catch (e) {
|
|
41
|
+
throw new propertyProvider.CredentialsProviderError(e.message, {
|
|
42
|
+
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
43
|
+
logger,
|
|
44
|
+
});
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
else {
|
|
48
|
+
try {
|
|
49
|
+
token = await sharedIniFileLoader.getSSOTokenFromFile(ssoStartUrl);
|
|
50
|
+
}
|
|
51
|
+
catch (e) {
|
|
52
|
+
throw new propertyProvider.CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {
|
|
53
|
+
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
54
|
+
logger,
|
|
55
|
+
});
|
|
56
|
+
}
|
|
57
|
+
}
|
|
58
|
+
if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {
|
|
59
|
+
throw new propertyProvider.CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {
|
|
60
|
+
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
61
|
+
logger,
|
|
62
|
+
});
|
|
63
|
+
}
|
|
64
|
+
const { accessToken } = token;
|
|
65
|
+
const { SSOClient, GetRoleCredentialsCommand } = await Promise.resolve().then(function () { return __webpack_require__(91853); });
|
|
66
|
+
const sso = ssoClient ||
|
|
67
|
+
new SSOClient(Object.assign({}, clientConfig ?? {}, {
|
|
68
|
+
logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
|
|
69
|
+
region: clientConfig?.region ?? ssoRegion,
|
|
70
|
+
userAgentAppId: clientConfig?.userAgentAppId ?? callerClientConfig?.userAgentAppId ?? parentClientConfig?.userAgentAppId,
|
|
71
|
+
}));
|
|
72
|
+
let ssoResp;
|
|
73
|
+
try {
|
|
74
|
+
ssoResp = await sso.send(new GetRoleCredentialsCommand({
|
|
75
|
+
accountId: ssoAccountId,
|
|
76
|
+
roleName: ssoRoleName,
|
|
77
|
+
accessToken,
|
|
78
|
+
}));
|
|
79
|
+
}
|
|
80
|
+
catch (e) {
|
|
81
|
+
throw new propertyProvider.CredentialsProviderError(e, {
|
|
82
|
+
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
83
|
+
logger,
|
|
84
|
+
});
|
|
85
|
+
}
|
|
86
|
+
const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;
|
|
87
|
+
if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
|
|
88
|
+
throw new propertyProvider.CredentialsProviderError("SSO returns an invalid temporary credential.", {
|
|
89
|
+
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
90
|
+
logger,
|
|
91
|
+
});
|
|
92
|
+
}
|
|
93
|
+
const credentials = {
|
|
94
|
+
accessKeyId,
|
|
95
|
+
secretAccessKey,
|
|
96
|
+
sessionToken,
|
|
97
|
+
expiration: new Date(expiration),
|
|
98
|
+
...(credentialScope && { credentialScope }),
|
|
99
|
+
...(accountId && { accountId }),
|
|
100
|
+
};
|
|
101
|
+
if (ssoSession) {
|
|
102
|
+
client.setCredentialFeature(credentials, "CREDENTIALS_SSO", "s");
|
|
103
|
+
}
|
|
104
|
+
else {
|
|
105
|
+
client.setCredentialFeature(credentials, "CREDENTIALS_SSO_LEGACY", "u");
|
|
106
|
+
}
|
|
107
|
+
return credentials;
|
|
108
|
+
};
|
|
109
|
+
|
|
110
|
+
const validateSsoProfile = (profile, logger) => {
|
|
111
|
+
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
|
|
112
|
+
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
|
|
113
|
+
throw new propertyProvider.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", ` +
|
|
114
|
+
`"sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });
|
|
115
|
+
}
|
|
116
|
+
return profile;
|
|
117
|
+
};
|
|
118
|
+
|
|
119
|
+
const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
120
|
+
init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
|
|
121
|
+
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
122
|
+
const { ssoClient } = init;
|
|
123
|
+
const profileName = sharedIniFileLoader.getProfileName({
|
|
124
|
+
profile: init.profile ?? callerClientConfig?.profile,
|
|
125
|
+
});
|
|
126
|
+
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
|
127
|
+
const profiles = await sharedIniFileLoader.parseKnownFiles(init);
|
|
128
|
+
const profile = profiles[profileName];
|
|
129
|
+
if (!profile) {
|
|
130
|
+
throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });
|
|
131
|
+
}
|
|
132
|
+
if (!isSsoProfile(profile)) {
|
|
133
|
+
throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {
|
|
134
|
+
logger: init.logger,
|
|
135
|
+
});
|
|
136
|
+
}
|
|
137
|
+
if (profile?.sso_session) {
|
|
138
|
+
const ssoSessions = await sharedIniFileLoader.loadSsoSessionData(init);
|
|
139
|
+
const session = ssoSessions[profile.sso_session];
|
|
140
|
+
const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;
|
|
141
|
+
if (ssoRegion && ssoRegion !== session.sso_region) {
|
|
142
|
+
throw new propertyProvider.CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {
|
|
143
|
+
tryNextLink: false,
|
|
144
|
+
logger: init.logger,
|
|
145
|
+
});
|
|
146
|
+
}
|
|
147
|
+
if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {
|
|
148
|
+
throw new propertyProvider.CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {
|
|
149
|
+
tryNextLink: false,
|
|
150
|
+
logger: init.logger,
|
|
151
|
+
});
|
|
152
|
+
}
|
|
153
|
+
profile.sso_region = session.sso_region;
|
|
154
|
+
profile.sso_start_url = session.sso_start_url;
|
|
155
|
+
}
|
|
156
|
+
const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);
|
|
157
|
+
return resolveSSOCredentials({
|
|
158
|
+
ssoStartUrl: sso_start_url,
|
|
159
|
+
ssoSession: sso_session,
|
|
160
|
+
ssoAccountId: sso_account_id,
|
|
161
|
+
ssoRegion: sso_region,
|
|
162
|
+
ssoRoleName: sso_role_name,
|
|
163
|
+
ssoClient: ssoClient,
|
|
164
|
+
clientConfig: init.clientConfig,
|
|
165
|
+
parentClientConfig: init.parentClientConfig,
|
|
166
|
+
callerClientConfig: init.callerClientConfig,
|
|
167
|
+
profile: profileName,
|
|
168
|
+
filepath: init.filepath,
|
|
169
|
+
configFilepath: init.configFilepath,
|
|
170
|
+
ignoreCache: init.ignoreCache,
|
|
171
|
+
logger: init.logger,
|
|
172
|
+
});
|
|
173
|
+
}
|
|
174
|
+
else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
|
|
175
|
+
throw new propertyProvider.CredentialsProviderError("Incomplete configuration. The fromSSO() argument hash must include " +
|
|
176
|
+
'"ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"', { tryNextLink: false, logger: init.logger });
|
|
177
|
+
}
|
|
178
|
+
else {
|
|
179
|
+
return resolveSSOCredentials({
|
|
180
|
+
ssoStartUrl,
|
|
181
|
+
ssoSession,
|
|
182
|
+
ssoAccountId,
|
|
183
|
+
ssoRegion,
|
|
184
|
+
ssoRoleName,
|
|
185
|
+
ssoClient,
|
|
186
|
+
clientConfig: init.clientConfig,
|
|
187
|
+
parentClientConfig: init.parentClientConfig,
|
|
188
|
+
callerClientConfig: init.callerClientConfig,
|
|
189
|
+
profile: profileName,
|
|
190
|
+
filepath: init.filepath,
|
|
191
|
+
configFilepath: init.configFilepath,
|
|
192
|
+
ignoreCache: init.ignoreCache,
|
|
193
|
+
logger: init.logger,
|
|
194
|
+
});
|
|
195
|
+
}
|
|
196
|
+
};
|
|
197
|
+
|
|
198
|
+
exports.fromSSO = fromSSO;
|
|
199
|
+
__webpack_unused_export__ = isSsoProfile;
|
|
200
|
+
__webpack_unused_export__ = validateSsoProfile;
|
|
201
|
+
|
|
202
|
+
|
|
203
|
+
/***/ }),
|
|
204
|
+
|
|
205
|
+
/***/ 91853:
|
|
206
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
207
|
+
|
|
208
|
+
|
|
209
|
+
|
|
210
|
+
var sso = __webpack_require__(32579);
|
|
211
|
+
|
|
212
|
+
|
|
213
|
+
|
|
214
|
+
exports.GetRoleCredentialsCommand = sso.GetRoleCredentialsCommand;
|
|
215
|
+
exports.SSOClient = sso.SSOClient;
|
|
216
|
+
|
|
217
|
+
|
|
218
|
+
/***/ }),
|
|
219
|
+
|
|
220
|
+
/***/ 97452:
|
|
6
221
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
7
222
|
|
|
8
223
|
|
|
9
224
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
10
225
|
exports.resolveHttpAuthSchemeConfig = exports.defaultSSOHttpAuthSchemeProvider = exports.defaultSSOHttpAuthSchemeParametersProvider = void 0;
|
|
11
|
-
const
|
|
226
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
12
227
|
const util_middleware_1 = __webpack_require__(76324);
|
|
13
228
|
const defaultSSOHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
14
229
|
return {
|
|
15
230
|
operation: (0, util_middleware_1.getSmithyContext)(context).operation,
|
|
16
|
-
region: await (0, util_middleware_1.normalizeProvider)(config.region)() ||
|
|
17
|
-
|
|
18
|
-
|
|
231
|
+
region: (await (0, util_middleware_1.normalizeProvider)(config.region)()) ||
|
|
232
|
+
(() => {
|
|
233
|
+
throw new Error("expected `region` to be configured for `aws.auth#sigv4`");
|
|
234
|
+
})(),
|
|
19
235
|
};
|
|
20
236
|
};
|
|
21
237
|
exports.defaultSSOHttpAuthSchemeParametersProvider = defaultSSOHttpAuthSchemeParametersProvider;
|
|
@@ -42,30 +258,10 @@ function createSmithyApiNoAuthHttpAuthOption(authParameters) {
|
|
|
42
258
|
const defaultSSOHttpAuthSchemeProvider = (authParameters) => {
|
|
43
259
|
const options = [];
|
|
44
260
|
switch (authParameters.operation) {
|
|
45
|
-
case "GetRoleCredentials":
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
}
|
|
50
|
-
;
|
|
51
|
-
case "ListAccountRoles":
|
|
52
|
-
{
|
|
53
|
-
options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
|
|
54
|
-
break;
|
|
55
|
-
}
|
|
56
|
-
;
|
|
57
|
-
case "ListAccounts":
|
|
58
|
-
{
|
|
59
|
-
options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
|
|
60
|
-
break;
|
|
61
|
-
}
|
|
62
|
-
;
|
|
63
|
-
case "Logout":
|
|
64
|
-
{
|
|
65
|
-
options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
|
|
66
|
-
break;
|
|
67
|
-
}
|
|
68
|
-
;
|
|
261
|
+
case "GetRoleCredentials": {
|
|
262
|
+
options.push(createSmithyApiNoAuthHttpAuthOption(authParameters));
|
|
263
|
+
break;
|
|
264
|
+
}
|
|
69
265
|
default: {
|
|
70
266
|
options.push(createAwsAuthSigv4HttpAuthOption(authParameters));
|
|
71
267
|
}
|
|
@@ -74,7 +270,7 @@ const defaultSSOHttpAuthSchemeProvider = (authParameters) => {
|
|
|
74
270
|
};
|
|
75
271
|
exports.defaultSSOHttpAuthSchemeProvider = defaultSSOHttpAuthSchemeProvider;
|
|
76
272
|
const resolveHttpAuthSchemeConfig = (config) => {
|
|
77
|
-
const config_0 = (0,
|
|
273
|
+
const config_0 = (0, httpAuthSchemes_1.resolveAwsSdkSigV4Config)(config);
|
|
78
274
|
return Object.assign(config_0, {
|
|
79
275
|
authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
|
|
80
276
|
});
|
|
@@ -84,7 +280,7 @@ exports.resolveHttpAuthSchemeConfig = resolveHttpAuthSchemeConfig;
|
|
|
84
280
|
|
|
85
281
|
/***/ }),
|
|
86
282
|
|
|
87
|
-
/***/
|
|
283
|
+
/***/ 85074:
|
|
88
284
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
89
285
|
|
|
90
286
|
|
|
@@ -92,7 +288,7 @@ Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
|
92
288
|
exports.defaultEndpointResolver = void 0;
|
|
93
289
|
const util_endpoints_1 = __webpack_require__(83068);
|
|
94
290
|
const util_endpoints_2 = __webpack_require__(79674);
|
|
95
|
-
const ruleset_1 = __webpack_require__(
|
|
291
|
+
const ruleset_1 = __webpack_require__(50203);
|
|
96
292
|
const cache = new util_endpoints_2.EndpointCache({
|
|
97
293
|
size: 50,
|
|
98
294
|
params: ["Endpoint", "Region", "UseDualStack", "UseFIPS"],
|
|
@@ -109,21 +305,120 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
|
|
|
109
305
|
|
|
110
306
|
/***/ }),
|
|
111
307
|
|
|
112
|
-
/***/
|
|
308
|
+
/***/ 50203:
|
|
113
309
|
/***/ ((__unused_webpack_module, exports) => {
|
|
114
310
|
|
|
115
311
|
|
|
116
312
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
117
313
|
exports.ruleSet = void 0;
|
|
118
314
|
const u = "required", v = "fn", w = "argv", x = "ref";
|
|
119
|
-
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "getAttr", i = { [u]: false,
|
|
120
|
-
const _data = {
|
|
315
|
+
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "getAttr", i = { [u]: false, type: "string" }, j = { [u]: true, default: false, type: "boolean" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: h, [w]: [{ [x]: g }, "supportsFIPS"] }, p = { [x]: g }, q = { [v]: c, [w]: [true, { [v]: h, [w]: [p, "supportsDualStack"] }] }, r = [l], s = [m], t = [{ [x]: "Region" }];
|
|
316
|
+
const _data = {
|
|
317
|
+
version: "1.0",
|
|
318
|
+
parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i },
|
|
319
|
+
rules: [
|
|
320
|
+
{
|
|
321
|
+
conditions: [{ [v]: b, [w]: [k] }],
|
|
322
|
+
rules: [
|
|
323
|
+
{ conditions: r, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d },
|
|
324
|
+
{ conditions: s, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d },
|
|
325
|
+
{ endpoint: { url: k, properties: n, headers: n }, type: e },
|
|
326
|
+
],
|
|
327
|
+
type: f,
|
|
328
|
+
},
|
|
329
|
+
{
|
|
330
|
+
conditions: [{ [v]: b, [w]: t }],
|
|
331
|
+
rules: [
|
|
332
|
+
{
|
|
333
|
+
conditions: [{ [v]: "aws.partition", [w]: t, assign: g }],
|
|
334
|
+
rules: [
|
|
335
|
+
{
|
|
336
|
+
conditions: [l, m],
|
|
337
|
+
rules: [
|
|
338
|
+
{
|
|
339
|
+
conditions: [{ [v]: c, [w]: [a, o] }, q],
|
|
340
|
+
rules: [
|
|
341
|
+
{
|
|
342
|
+
endpoint: {
|
|
343
|
+
url: "https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
344
|
+
properties: n,
|
|
345
|
+
headers: n,
|
|
346
|
+
},
|
|
347
|
+
type: e,
|
|
348
|
+
},
|
|
349
|
+
],
|
|
350
|
+
type: f,
|
|
351
|
+
},
|
|
352
|
+
{ error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d },
|
|
353
|
+
],
|
|
354
|
+
type: f,
|
|
355
|
+
},
|
|
356
|
+
{
|
|
357
|
+
conditions: r,
|
|
358
|
+
rules: [
|
|
359
|
+
{
|
|
360
|
+
conditions: [{ [v]: c, [w]: [o, a] }],
|
|
361
|
+
rules: [
|
|
362
|
+
{
|
|
363
|
+
conditions: [{ [v]: "stringEquals", [w]: [{ [v]: h, [w]: [p, "name"] }, "aws-us-gov"] }],
|
|
364
|
+
endpoint: { url: "https://portal.sso.{Region}.amazonaws.com", properties: n, headers: n },
|
|
365
|
+
type: e,
|
|
366
|
+
},
|
|
367
|
+
{
|
|
368
|
+
endpoint: {
|
|
369
|
+
url: "https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",
|
|
370
|
+
properties: n,
|
|
371
|
+
headers: n,
|
|
372
|
+
},
|
|
373
|
+
type: e,
|
|
374
|
+
},
|
|
375
|
+
],
|
|
376
|
+
type: f,
|
|
377
|
+
},
|
|
378
|
+
{ error: "FIPS is enabled but this partition does not support FIPS", type: d },
|
|
379
|
+
],
|
|
380
|
+
type: f,
|
|
381
|
+
},
|
|
382
|
+
{
|
|
383
|
+
conditions: s,
|
|
384
|
+
rules: [
|
|
385
|
+
{
|
|
386
|
+
conditions: [q],
|
|
387
|
+
rules: [
|
|
388
|
+
{
|
|
389
|
+
endpoint: {
|
|
390
|
+
url: "https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
391
|
+
properties: n,
|
|
392
|
+
headers: n,
|
|
393
|
+
},
|
|
394
|
+
type: e,
|
|
395
|
+
},
|
|
396
|
+
],
|
|
397
|
+
type: f,
|
|
398
|
+
},
|
|
399
|
+
{ error: "DualStack is enabled but this partition does not support DualStack", type: d },
|
|
400
|
+
],
|
|
401
|
+
type: f,
|
|
402
|
+
},
|
|
403
|
+
{
|
|
404
|
+
endpoint: { url: "https://portal.sso.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n },
|
|
405
|
+
type: e,
|
|
406
|
+
},
|
|
407
|
+
],
|
|
408
|
+
type: f,
|
|
409
|
+
},
|
|
410
|
+
],
|
|
411
|
+
type: f,
|
|
412
|
+
},
|
|
413
|
+
{ error: "Invalid Configuration: Missing Region", type: d },
|
|
414
|
+
],
|
|
415
|
+
};
|
|
121
416
|
exports.ruleSet = _data;
|
|
122
417
|
|
|
123
418
|
|
|
124
419
|
/***/ }),
|
|
125
420
|
|
|
126
|
-
/***/
|
|
421
|
+
/***/ 32579:
|
|
127
422
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
128
423
|
|
|
129
424
|
|
|
@@ -139,10 +434,13 @@ var middlewareContentLength = __webpack_require__(47212);
|
|
|
139
434
|
var middlewareEndpoint = __webpack_require__(40099);
|
|
140
435
|
var middlewareRetry = __webpack_require__(19618);
|
|
141
436
|
var smithyClient = __webpack_require__(61411);
|
|
142
|
-
var httpAuthSchemeProvider = __webpack_require__(
|
|
143
|
-
var runtimeConfig = __webpack_require__(
|
|
437
|
+
var httpAuthSchemeProvider = __webpack_require__(97452);
|
|
438
|
+
var runtimeConfig = __webpack_require__(85541);
|
|
144
439
|
var regionConfigResolver = __webpack_require__(36463);
|
|
145
440
|
var protocolHttp = __webpack_require__(72356);
|
|
441
|
+
var schemas_0 = __webpack_require__(52167);
|
|
442
|
+
var errors = __webpack_require__(24483);
|
|
443
|
+
var SSOServiceException = __webpack_require__(69849);
|
|
146
444
|
|
|
147
445
|
const resolveClientEndpointParameters = (options) => {
|
|
148
446
|
return Object.assign(options, {
|
|
@@ -238,38 +536,108 @@ class SSOClient extends smithyClient.Client {
|
|
|
238
536
|
}
|
|
239
537
|
}
|
|
240
538
|
|
|
241
|
-
class
|
|
242
|
-
|
|
243
|
-
|
|
244
|
-
|
|
245
|
-
|
|
539
|
+
class GetRoleCredentialsCommand extends smithyClient.Command
|
|
540
|
+
.classBuilder()
|
|
541
|
+
.ep(commonParams)
|
|
542
|
+
.m(function (Command, cs, config, o) {
|
|
543
|
+
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
544
|
+
})
|
|
545
|
+
.s("SWBPortalService", "GetRoleCredentials", {})
|
|
546
|
+
.n("SSOClient", "GetRoleCredentialsCommand")
|
|
547
|
+
.sc(schemas_0.GetRoleCredentials$)
|
|
548
|
+
.build() {
|
|
246
549
|
}
|
|
247
550
|
|
|
248
|
-
|
|
249
|
-
|
|
250
|
-
|
|
251
|
-
|
|
252
|
-
super({
|
|
253
|
-
name: "InvalidRequestException",
|
|
254
|
-
$fault: "client",
|
|
255
|
-
...opts,
|
|
256
|
-
});
|
|
257
|
-
Object.setPrototypeOf(this, InvalidRequestException.prototype);
|
|
258
|
-
}
|
|
551
|
+
const commands = {
|
|
552
|
+
GetRoleCredentialsCommand,
|
|
553
|
+
};
|
|
554
|
+
class SSO extends SSOClient {
|
|
259
555
|
}
|
|
260
|
-
|
|
261
|
-
|
|
262
|
-
|
|
263
|
-
|
|
264
|
-
|
|
265
|
-
|
|
266
|
-
|
|
267
|
-
|
|
556
|
+
smithyClient.createAggregatedClient(commands, SSO);
|
|
557
|
+
|
|
558
|
+
exports.$Command = smithyClient.Command;
|
|
559
|
+
exports.__Client = smithyClient.Client;
|
|
560
|
+
exports.SSOServiceException = SSOServiceException.SSOServiceException;
|
|
561
|
+
exports.GetRoleCredentialsCommand = GetRoleCredentialsCommand;
|
|
562
|
+
exports.SSO = SSO;
|
|
563
|
+
exports.SSOClient = SSOClient;
|
|
564
|
+
Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
|
|
565
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
566
|
+
Object.defineProperty(exports, '__proto__', {
|
|
567
|
+
enumerable: true,
|
|
568
|
+
value: schemas_0['__proto__']
|
|
569
|
+
});
|
|
570
|
+
|
|
571
|
+
Object.keys(schemas_0).forEach(function (k) {
|
|
572
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
|
|
573
|
+
});
|
|
574
|
+
Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
|
|
575
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
576
|
+
Object.defineProperty(exports, '__proto__', {
|
|
577
|
+
enumerable: true,
|
|
578
|
+
value: errors['__proto__']
|
|
579
|
+
});
|
|
580
|
+
|
|
581
|
+
Object.keys(errors).forEach(function (k) {
|
|
582
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
|
|
583
|
+
});
|
|
584
|
+
|
|
585
|
+
|
|
586
|
+
/***/ }),
|
|
587
|
+
|
|
588
|
+
/***/ 69849:
|
|
589
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
590
|
+
|
|
591
|
+
|
|
592
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
593
|
+
exports.SSOServiceException = exports.__ServiceException = void 0;
|
|
594
|
+
const smithy_client_1 = __webpack_require__(61411);
|
|
595
|
+
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
|
596
|
+
class SSOServiceException extends smithy_client_1.ServiceException {
|
|
597
|
+
constructor(options) {
|
|
598
|
+
super(options);
|
|
599
|
+
Object.setPrototypeOf(this, SSOServiceException.prototype);
|
|
600
|
+
}
|
|
601
|
+
}
|
|
602
|
+
exports.SSOServiceException = SSOServiceException;
|
|
603
|
+
|
|
604
|
+
|
|
605
|
+
/***/ }),
|
|
606
|
+
|
|
607
|
+
/***/ 24483:
|
|
608
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
609
|
+
|
|
610
|
+
|
|
611
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
612
|
+
exports.UnauthorizedException = exports.TooManyRequestsException = exports.ResourceNotFoundException = exports.InvalidRequestException = void 0;
|
|
613
|
+
const SSOServiceException_1 = __webpack_require__(69849);
|
|
614
|
+
class InvalidRequestException extends SSOServiceException_1.SSOServiceException {
|
|
615
|
+
name = "InvalidRequestException";
|
|
616
|
+
$fault = "client";
|
|
617
|
+
constructor(opts) {
|
|
618
|
+
super({
|
|
619
|
+
name: "InvalidRequestException",
|
|
620
|
+
$fault: "client",
|
|
621
|
+
...opts,
|
|
622
|
+
});
|
|
623
|
+
Object.setPrototypeOf(this, InvalidRequestException.prototype);
|
|
624
|
+
}
|
|
625
|
+
}
|
|
626
|
+
exports.InvalidRequestException = InvalidRequestException;
|
|
627
|
+
class ResourceNotFoundException extends SSOServiceException_1.SSOServiceException {
|
|
628
|
+
name = "ResourceNotFoundException";
|
|
629
|
+
$fault = "client";
|
|
630
|
+
constructor(opts) {
|
|
631
|
+
super({
|
|
632
|
+
name: "ResourceNotFoundException",
|
|
633
|
+
$fault: "client",
|
|
634
|
+
...opts,
|
|
268
635
|
});
|
|
269
636
|
Object.setPrototypeOf(this, ResourceNotFoundException.prototype);
|
|
270
637
|
}
|
|
271
638
|
}
|
|
272
|
-
|
|
639
|
+
exports.ResourceNotFoundException = ResourceNotFoundException;
|
|
640
|
+
class TooManyRequestsException extends SSOServiceException_1.SSOServiceException {
|
|
273
641
|
name = "TooManyRequestsException";
|
|
274
642
|
$fault = "client";
|
|
275
643
|
constructor(opts) {
|
|
@@ -281,7 +649,8 @@ class TooManyRequestsException extends SSOServiceException {
|
|
|
281
649
|
Object.setPrototypeOf(this, TooManyRequestsException.prototype);
|
|
282
650
|
}
|
|
283
651
|
}
|
|
284
|
-
|
|
652
|
+
exports.TooManyRequestsException = TooManyRequestsException;
|
|
653
|
+
class UnauthorizedException extends SSOServiceException_1.SSOServiceException {
|
|
285
654
|
name = "UnauthorizedException";
|
|
286
655
|
$fault = "client";
|
|
287
656
|
constructor(opts) {
|
|
@@ -293,272 +662,21 @@ class UnauthorizedException extends SSOServiceException {
|
|
|
293
662
|
Object.setPrototypeOf(this, UnauthorizedException.prototype);
|
|
294
663
|
}
|
|
295
664
|
}
|
|
296
|
-
|
|
297
|
-
const _AI = "AccountInfo";
|
|
298
|
-
const _ALT = "AccountListType";
|
|
299
|
-
const _ATT = "AccessTokenType";
|
|
300
|
-
const _GRC = "GetRoleCredentials";
|
|
301
|
-
const _GRCR = "GetRoleCredentialsRequest";
|
|
302
|
-
const _GRCRe = "GetRoleCredentialsResponse";
|
|
303
|
-
const _IRE = "InvalidRequestException";
|
|
304
|
-
const _L = "Logout";
|
|
305
|
-
const _LA = "ListAccounts";
|
|
306
|
-
const _LAR = "ListAccountsRequest";
|
|
307
|
-
const _LARR = "ListAccountRolesRequest";
|
|
308
|
-
const _LARRi = "ListAccountRolesResponse";
|
|
309
|
-
const _LARi = "ListAccountsResponse";
|
|
310
|
-
const _LARis = "ListAccountRoles";
|
|
311
|
-
const _LR = "LogoutRequest";
|
|
312
|
-
const _RC = "RoleCredentials";
|
|
313
|
-
const _RI = "RoleInfo";
|
|
314
|
-
const _RLT = "RoleListType";
|
|
315
|
-
const _RNFE = "ResourceNotFoundException";
|
|
316
|
-
const _SAKT = "SecretAccessKeyType";
|
|
317
|
-
const _STT = "SessionTokenType";
|
|
318
|
-
const _TMRE = "TooManyRequestsException";
|
|
319
|
-
const _UE = "UnauthorizedException";
|
|
320
|
-
const _aI = "accountId";
|
|
321
|
-
const _aKI = "accessKeyId";
|
|
322
|
-
const _aL = "accountList";
|
|
323
|
-
const _aN = "accountName";
|
|
324
|
-
const _aT = "accessToken";
|
|
325
|
-
const _ai = "account_id";
|
|
326
|
-
const _c = "client";
|
|
327
|
-
const _e = "error";
|
|
328
|
-
const _eA = "emailAddress";
|
|
329
|
-
const _ex = "expiration";
|
|
330
|
-
const _h = "http";
|
|
331
|
-
const _hE = "httpError";
|
|
332
|
-
const _hH = "httpHeader";
|
|
333
|
-
const _hQ = "httpQuery";
|
|
334
|
-
const _m = "message";
|
|
335
|
-
const _mR = "maxResults";
|
|
336
|
-
const _mr = "max_result";
|
|
337
|
-
const _nT = "nextToken";
|
|
338
|
-
const _nt = "next_token";
|
|
339
|
-
const _rC = "roleCredentials";
|
|
340
|
-
const _rL = "roleList";
|
|
341
|
-
const _rN = "roleName";
|
|
342
|
-
const _rn = "role_name";
|
|
343
|
-
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sso";
|
|
344
|
-
const _sAK = "secretAccessKey";
|
|
345
|
-
const _sT = "sessionToken";
|
|
346
|
-
const _xasbt = "x-amz-sso_bearer_token";
|
|
347
|
-
const n0 = "com.amazonaws.sso";
|
|
348
|
-
var AccessTokenType = [0, n0, _ATT, 8, 0];
|
|
349
|
-
var SecretAccessKeyType = [0, n0, _SAKT, 8, 0];
|
|
350
|
-
var SessionTokenType = [0, n0, _STT, 8, 0];
|
|
351
|
-
var AccountInfo$ = [3, n0, _AI,
|
|
352
|
-
0,
|
|
353
|
-
[_aI, _aN, _eA],
|
|
354
|
-
[0, 0, 0]
|
|
355
|
-
];
|
|
356
|
-
var GetRoleCredentialsRequest$ = [3, n0, _GRCR,
|
|
357
|
-
0,
|
|
358
|
-
[_rN, _aI, _aT],
|
|
359
|
-
[[0, { [_hQ]: _rn }], [0, { [_hQ]: _ai }], [() => AccessTokenType, { [_hH]: _xasbt }]], 3
|
|
360
|
-
];
|
|
361
|
-
var GetRoleCredentialsResponse$ = [3, n0, _GRCRe,
|
|
362
|
-
0,
|
|
363
|
-
[_rC],
|
|
364
|
-
[[() => RoleCredentials$, 0]]
|
|
365
|
-
];
|
|
366
|
-
var InvalidRequestException$ = [-3, n0, _IRE,
|
|
367
|
-
{ [_e]: _c, [_hE]: 400 },
|
|
368
|
-
[_m],
|
|
369
|
-
[0]
|
|
370
|
-
];
|
|
371
|
-
schema.TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
|
|
372
|
-
var ListAccountRolesRequest$ = [3, n0, _LARR,
|
|
373
|
-
0,
|
|
374
|
-
[_aT, _aI, _nT, _mR],
|
|
375
|
-
[[() => AccessTokenType, { [_hH]: _xasbt }], [0, { [_hQ]: _ai }], [0, { [_hQ]: _nt }], [1, { [_hQ]: _mr }]], 2
|
|
376
|
-
];
|
|
377
|
-
var ListAccountRolesResponse$ = [3, n0, _LARRi,
|
|
378
|
-
0,
|
|
379
|
-
[_nT, _rL],
|
|
380
|
-
[0, () => RoleListType]
|
|
381
|
-
];
|
|
382
|
-
var ListAccountsRequest$ = [3, n0, _LAR,
|
|
383
|
-
0,
|
|
384
|
-
[_aT, _nT, _mR],
|
|
385
|
-
[[() => AccessTokenType, { [_hH]: _xasbt }], [0, { [_hQ]: _nt }], [1, { [_hQ]: _mr }]], 1
|
|
386
|
-
];
|
|
387
|
-
var ListAccountsResponse$ = [3, n0, _LARi,
|
|
388
|
-
0,
|
|
389
|
-
[_nT, _aL],
|
|
390
|
-
[0, () => AccountListType]
|
|
391
|
-
];
|
|
392
|
-
var LogoutRequest$ = [3, n0, _LR,
|
|
393
|
-
0,
|
|
394
|
-
[_aT],
|
|
395
|
-
[[() => AccessTokenType, { [_hH]: _xasbt }]], 1
|
|
396
|
-
];
|
|
397
|
-
var ResourceNotFoundException$ = [-3, n0, _RNFE,
|
|
398
|
-
{ [_e]: _c, [_hE]: 404 },
|
|
399
|
-
[_m],
|
|
400
|
-
[0]
|
|
401
|
-
];
|
|
402
|
-
schema.TypeRegistry.for(n0).registerError(ResourceNotFoundException$, ResourceNotFoundException);
|
|
403
|
-
var RoleCredentials$ = [3, n0, _RC,
|
|
404
|
-
0,
|
|
405
|
-
[_aKI, _sAK, _sT, _ex],
|
|
406
|
-
[0, [() => SecretAccessKeyType, 0], [() => SessionTokenType, 0], 1]
|
|
407
|
-
];
|
|
408
|
-
var RoleInfo$ = [3, n0, _RI,
|
|
409
|
-
0,
|
|
410
|
-
[_rN, _aI],
|
|
411
|
-
[0, 0]
|
|
412
|
-
];
|
|
413
|
-
var TooManyRequestsException$ = [-3, n0, _TMRE,
|
|
414
|
-
{ [_e]: _c, [_hE]: 429 },
|
|
415
|
-
[_m],
|
|
416
|
-
[0]
|
|
417
|
-
];
|
|
418
|
-
schema.TypeRegistry.for(n0).registerError(TooManyRequestsException$, TooManyRequestsException);
|
|
419
|
-
var UnauthorizedException$ = [-3, n0, _UE,
|
|
420
|
-
{ [_e]: _c, [_hE]: 401 },
|
|
421
|
-
[_m],
|
|
422
|
-
[0]
|
|
423
|
-
];
|
|
424
|
-
schema.TypeRegistry.for(n0).registerError(UnauthorizedException$, UnauthorizedException);
|
|
425
|
-
var __Unit = "unit";
|
|
426
|
-
var SSOServiceException$ = [-3, _s, "SSOServiceException", 0, [], []];
|
|
427
|
-
schema.TypeRegistry.for(_s).registerError(SSOServiceException$, SSOServiceException);
|
|
428
|
-
var AccountListType = [1, n0, _ALT,
|
|
429
|
-
0, () => AccountInfo$
|
|
430
|
-
];
|
|
431
|
-
var RoleListType = [1, n0, _RLT,
|
|
432
|
-
0, () => RoleInfo$
|
|
433
|
-
];
|
|
434
|
-
var GetRoleCredentials$ = [9, n0, _GRC,
|
|
435
|
-
{ [_h]: ["GET", "/federation/credentials", 200] }, () => GetRoleCredentialsRequest$, () => GetRoleCredentialsResponse$
|
|
436
|
-
];
|
|
437
|
-
var ListAccountRoles$ = [9, n0, _LARis,
|
|
438
|
-
{ [_h]: ["GET", "/assignment/roles", 200] }, () => ListAccountRolesRequest$, () => ListAccountRolesResponse$
|
|
439
|
-
];
|
|
440
|
-
var ListAccounts$ = [9, n0, _LA,
|
|
441
|
-
{ [_h]: ["GET", "/assignment/accounts", 200] }, () => ListAccountsRequest$, () => ListAccountsResponse$
|
|
442
|
-
];
|
|
443
|
-
var Logout$ = [9, n0, _L,
|
|
444
|
-
{ [_h]: ["POST", "/logout", 200] }, () => LogoutRequest$, () => __Unit
|
|
445
|
-
];
|
|
446
|
-
|
|
447
|
-
class GetRoleCredentialsCommand extends smithyClient.Command
|
|
448
|
-
.classBuilder()
|
|
449
|
-
.ep(commonParams)
|
|
450
|
-
.m(function (Command, cs, config, o) {
|
|
451
|
-
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
452
|
-
})
|
|
453
|
-
.s("SWBPortalService", "GetRoleCredentials", {})
|
|
454
|
-
.n("SSOClient", "GetRoleCredentialsCommand")
|
|
455
|
-
.sc(GetRoleCredentials$)
|
|
456
|
-
.build() {
|
|
457
|
-
}
|
|
458
|
-
|
|
459
|
-
class ListAccountRolesCommand extends smithyClient.Command
|
|
460
|
-
.classBuilder()
|
|
461
|
-
.ep(commonParams)
|
|
462
|
-
.m(function (Command, cs, config, o) {
|
|
463
|
-
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
464
|
-
})
|
|
465
|
-
.s("SWBPortalService", "ListAccountRoles", {})
|
|
466
|
-
.n("SSOClient", "ListAccountRolesCommand")
|
|
467
|
-
.sc(ListAccountRoles$)
|
|
468
|
-
.build() {
|
|
469
|
-
}
|
|
470
|
-
|
|
471
|
-
class ListAccountsCommand extends smithyClient.Command
|
|
472
|
-
.classBuilder()
|
|
473
|
-
.ep(commonParams)
|
|
474
|
-
.m(function (Command, cs, config, o) {
|
|
475
|
-
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
476
|
-
})
|
|
477
|
-
.s("SWBPortalService", "ListAccounts", {})
|
|
478
|
-
.n("SSOClient", "ListAccountsCommand")
|
|
479
|
-
.sc(ListAccounts$)
|
|
480
|
-
.build() {
|
|
481
|
-
}
|
|
482
|
-
|
|
483
|
-
class LogoutCommand extends smithyClient.Command
|
|
484
|
-
.classBuilder()
|
|
485
|
-
.ep(commonParams)
|
|
486
|
-
.m(function (Command, cs, config, o) {
|
|
487
|
-
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
488
|
-
})
|
|
489
|
-
.s("SWBPortalService", "Logout", {})
|
|
490
|
-
.n("SSOClient", "LogoutCommand")
|
|
491
|
-
.sc(Logout$)
|
|
492
|
-
.build() {
|
|
493
|
-
}
|
|
494
|
-
|
|
495
|
-
const commands = {
|
|
496
|
-
GetRoleCredentialsCommand,
|
|
497
|
-
ListAccountRolesCommand,
|
|
498
|
-
ListAccountsCommand,
|
|
499
|
-
LogoutCommand,
|
|
500
|
-
};
|
|
501
|
-
class SSO extends SSOClient {
|
|
502
|
-
}
|
|
503
|
-
smithyClient.createAggregatedClient(commands, SSO);
|
|
504
|
-
|
|
505
|
-
const paginateListAccountRoles = core.createPaginator(SSOClient, ListAccountRolesCommand, "nextToken", "nextToken", "maxResults");
|
|
506
|
-
|
|
507
|
-
const paginateListAccounts = core.createPaginator(SSOClient, ListAccountsCommand, "nextToken", "nextToken", "maxResults");
|
|
508
|
-
|
|
509
|
-
Object.defineProperty(exports, "$Command", ({
|
|
510
|
-
enumerable: true,
|
|
511
|
-
get: function () { return smithyClient.Command; }
|
|
512
|
-
}));
|
|
513
|
-
Object.defineProperty(exports, "__Client", ({
|
|
514
|
-
enumerable: true,
|
|
515
|
-
get: function () { return smithyClient.Client; }
|
|
516
|
-
}));
|
|
517
|
-
exports.AccountInfo$ = AccountInfo$;
|
|
518
|
-
exports.GetRoleCredentials$ = GetRoleCredentials$;
|
|
519
|
-
exports.GetRoleCredentialsCommand = GetRoleCredentialsCommand;
|
|
520
|
-
exports.GetRoleCredentialsRequest$ = GetRoleCredentialsRequest$;
|
|
521
|
-
exports.GetRoleCredentialsResponse$ = GetRoleCredentialsResponse$;
|
|
522
|
-
exports.InvalidRequestException = InvalidRequestException;
|
|
523
|
-
exports.InvalidRequestException$ = InvalidRequestException$;
|
|
524
|
-
exports.ListAccountRoles$ = ListAccountRoles$;
|
|
525
|
-
exports.ListAccountRolesCommand = ListAccountRolesCommand;
|
|
526
|
-
exports.ListAccountRolesRequest$ = ListAccountRolesRequest$;
|
|
527
|
-
exports.ListAccountRolesResponse$ = ListAccountRolesResponse$;
|
|
528
|
-
exports.ListAccounts$ = ListAccounts$;
|
|
529
|
-
exports.ListAccountsCommand = ListAccountsCommand;
|
|
530
|
-
exports.ListAccountsRequest$ = ListAccountsRequest$;
|
|
531
|
-
exports.ListAccountsResponse$ = ListAccountsResponse$;
|
|
532
|
-
exports.Logout$ = Logout$;
|
|
533
|
-
exports.LogoutCommand = LogoutCommand;
|
|
534
|
-
exports.LogoutRequest$ = LogoutRequest$;
|
|
535
|
-
exports.ResourceNotFoundException = ResourceNotFoundException;
|
|
536
|
-
exports.ResourceNotFoundException$ = ResourceNotFoundException$;
|
|
537
|
-
exports.RoleCredentials$ = RoleCredentials$;
|
|
538
|
-
exports.RoleInfo$ = RoleInfo$;
|
|
539
|
-
exports.SSO = SSO;
|
|
540
|
-
exports.SSOClient = SSOClient;
|
|
541
|
-
exports.SSOServiceException = SSOServiceException;
|
|
542
|
-
exports.SSOServiceException$ = SSOServiceException$;
|
|
543
|
-
exports.TooManyRequestsException = TooManyRequestsException;
|
|
544
|
-
exports.TooManyRequestsException$ = TooManyRequestsException$;
|
|
545
665
|
exports.UnauthorizedException = UnauthorizedException;
|
|
546
|
-
exports.UnauthorizedException$ = UnauthorizedException$;
|
|
547
|
-
exports.paginateListAccountRoles = paginateListAccountRoles;
|
|
548
|
-
exports.paginateListAccounts = paginateListAccounts;
|
|
549
666
|
|
|
550
667
|
|
|
551
668
|
/***/ }),
|
|
552
669
|
|
|
553
|
-
/***/
|
|
670
|
+
/***/ 85541:
|
|
554
671
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
555
672
|
|
|
556
673
|
|
|
557
674
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
558
675
|
exports.getRuntimeConfig = void 0;
|
|
559
676
|
const tslib_1 = __webpack_require__(61860);
|
|
560
|
-
const package_json_1 = tslib_1.__importDefault(__webpack_require__(
|
|
561
|
-
const
|
|
677
|
+
const package_json_1 = tslib_1.__importDefault(__webpack_require__(39955));
|
|
678
|
+
const client_1 = __webpack_require__(5152);
|
|
679
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
562
680
|
const util_user_agent_node_1 = __webpack_require__(51656);
|
|
563
681
|
const config_resolver_1 = __webpack_require__(39316);
|
|
564
682
|
const hash_node_1 = __webpack_require__(5092);
|
|
@@ -569,13 +687,13 @@ const smithy_client_1 = __webpack_require__(61411);
|
|
|
569
687
|
const util_body_length_node_1 = __webpack_require__(13638);
|
|
570
688
|
const util_defaults_mode_node_1 = __webpack_require__(15435);
|
|
571
689
|
const util_retry_1 = __webpack_require__(15518);
|
|
572
|
-
const runtimeConfig_shared_1 = __webpack_require__(
|
|
690
|
+
const runtimeConfig_shared_1 = __webpack_require__(43082);
|
|
573
691
|
const getRuntimeConfig = (config) => {
|
|
574
692
|
(0, smithy_client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
575
693
|
const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
|
|
576
694
|
const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
|
|
577
695
|
const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
|
|
578
|
-
(0,
|
|
696
|
+
(0, client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
579
697
|
const loaderConfig = {
|
|
580
698
|
profile: config?.profile,
|
|
581
699
|
logger: clientSharedValues.logger,
|
|
@@ -585,11 +703,13 @@ const getRuntimeConfig = (config) => {
|
|
|
585
703
|
...config,
|
|
586
704
|
runtime: "node",
|
|
587
705
|
defaultsMode,
|
|
588
|
-
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(
|
|
706
|
+
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(httpAuthSchemes_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
589
707
|
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
|
|
590
|
-
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
708
|
+
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
709
|
+
(0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
591
710
|
maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
|
|
592
|
-
region: config?.region ??
|
|
711
|
+
region: config?.region ??
|
|
712
|
+
(0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
|
|
593
713
|
requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
|
|
594
714
|
retryMode: config?.retryMode ??
|
|
595
715
|
(0, node_config_provider_1.loadConfig)({
|
|
@@ -608,21 +728,22 @@ exports.getRuntimeConfig = getRuntimeConfig;
|
|
|
608
728
|
|
|
609
729
|
/***/ }),
|
|
610
730
|
|
|
611
|
-
/***/
|
|
731
|
+
/***/ 43082:
|
|
612
732
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
613
733
|
|
|
614
734
|
|
|
615
735
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
616
736
|
exports.getRuntimeConfig = void 0;
|
|
617
|
-
const
|
|
737
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
618
738
|
const protocols_1 = __webpack_require__(37288);
|
|
619
|
-
const
|
|
739
|
+
const core_1 = __webpack_require__(90402);
|
|
620
740
|
const smithy_client_1 = __webpack_require__(61411);
|
|
621
741
|
const url_parser_1 = __webpack_require__(14494);
|
|
622
742
|
const util_base64_1 = __webpack_require__(68385);
|
|
623
743
|
const util_utf8_1 = __webpack_require__(71577);
|
|
624
|
-
const httpAuthSchemeProvider_1 = __webpack_require__(
|
|
625
|
-
const endpointResolver_1 = __webpack_require__(
|
|
744
|
+
const httpAuthSchemeProvider_1 = __webpack_require__(97452);
|
|
745
|
+
const endpointResolver_1 = __webpack_require__(85074);
|
|
746
|
+
const schemas_0_1 = __webpack_require__(52167);
|
|
626
747
|
const getRuntimeConfig = (config) => {
|
|
627
748
|
return {
|
|
628
749
|
apiVersion: "2019-06-10",
|
|
@@ -636,18 +757,19 @@ const getRuntimeConfig = (config) => {
|
|
|
636
757
|
{
|
|
637
758
|
schemeId: "aws.auth#sigv4",
|
|
638
759
|
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
|
|
639
|
-
signer: new
|
|
760
|
+
signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
|
|
640
761
|
},
|
|
641
762
|
{
|
|
642
763
|
schemeId: "smithy.api#noAuth",
|
|
643
764
|
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
644
|
-
signer: new
|
|
765
|
+
signer: new core_1.NoAuthSigner(),
|
|
645
766
|
},
|
|
646
767
|
],
|
|
647
768
|
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
648
769
|
protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
|
|
649
770
|
protocolSettings: config?.protocolSettings ?? {
|
|
650
771
|
defaultNamespace: "com.amazonaws.sso",
|
|
772
|
+
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
|
651
773
|
version: "2019-06-10",
|
|
652
774
|
serviceTarget: "SWBPortalService",
|
|
653
775
|
},
|
|
@@ -662,537 +784,99 @@ exports.getRuntimeConfig = getRuntimeConfig;
|
|
|
662
784
|
|
|
663
785
|
/***/ }),
|
|
664
786
|
|
|
665
|
-
/***/
|
|
787
|
+
/***/ 52167:
|
|
666
788
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
667
789
|
|
|
668
790
|
|
|
669
|
-
|
|
670
|
-
|
|
671
|
-
|
|
672
|
-
|
|
673
|
-
|
|
674
|
-
|
|
675
|
-
|
|
676
|
-
const
|
|
677
|
-
|
|
678
|
-
const
|
|
679
|
-
|
|
680
|
-
const
|
|
681
|
-
|
|
682
|
-
const
|
|
683
|
-
|
|
684
|
-
|
|
685
|
-
|
|
686
|
-
|
|
687
|
-
|
|
688
|
-
|
|
689
|
-
|
|
690
|
-
const
|
|
691
|
-
|
|
692
|
-
|
|
693
|
-
|
|
694
|
-
|
|
695
|
-
|
|
696
|
-
const
|
|
697
|
-
|
|
698
|
-
|
|
699
|
-
|
|
700
|
-
|
|
701
|
-
|
|
702
|
-
|
|
703
|
-
|
|
704
|
-
|
|
705
|
-
|
|
706
|
-
|
|
707
|
-
|
|
708
|
-
|
|
709
|
-
|
|
710
|
-
|
|
711
|
-
|
|
712
|
-
|
|
713
|
-
|
|
714
|
-
|
|
715
|
-
|
|
716
|
-
|
|
717
|
-
|
|
718
|
-
|
|
719
|
-
|
|
720
|
-
|
|
721
|
-
|
|
722
|
-
|
|
723
|
-
|
|
724
|
-
|
|
725
|
-
|
|
726
|
-
|
|
727
|
-
|
|
728
|
-
}
|
|
729
|
-
|
|
730
|
-
|
|
731
|
-
|
|
732
|
-
|
|
733
|
-
|
|
734
|
-
|
|
735
|
-
|
|
736
|
-
|
|
737
|
-
|
|
738
|
-
|
|
739
|
-
|
|
740
|
-
|
|
741
|
-
|
|
742
|
-
|
|
743
|
-
|
|
744
|
-
|
|
745
|
-
|
|
746
|
-
|
|
747
|
-
|
|
748
|
-
|
|
749
|
-
|
|
750
|
-
|
|
751
|
-
|
|
752
|
-
|
|
753
|
-
|
|
754
|
-
|
|
755
|
-
|
|
756
|
-
|
|
757
|
-
|
|
758
|
-
}
|
|
759
|
-
const AWSSDKSigV4Signer = AwsSdkSigV4Signer;
|
|
760
|
-
|
|
761
|
-
class AwsSdkSigV4ASigner extends AwsSdkSigV4Signer {
|
|
762
|
-
async sign(httpRequest, identity, signingProperties) {
|
|
763
|
-
if (!protocolHttp.HttpRequest.isInstance(httpRequest)) {
|
|
764
|
-
throw new Error("The request is not an instance of `HttpRequest` and cannot be signed");
|
|
765
|
-
}
|
|
766
|
-
const { config, signer, signingRegion, signingRegionSet, signingName } = await validateSigningProperties(signingProperties);
|
|
767
|
-
const configResolvedSigningRegionSet = await config.sigv4aSigningRegionSet?.();
|
|
768
|
-
const multiRegionOverride = (configResolvedSigningRegionSet ??
|
|
769
|
-
signingRegionSet ?? [signingRegion]).join(",");
|
|
770
|
-
const signedRequest = await signer.sign(httpRequest, {
|
|
771
|
-
signingDate: getSkewCorrectedDate(config.systemClockOffset),
|
|
772
|
-
signingRegion: multiRegionOverride,
|
|
773
|
-
signingService: signingName,
|
|
774
|
-
});
|
|
775
|
-
return signedRequest;
|
|
776
|
-
}
|
|
777
|
-
}
|
|
778
|
-
|
|
779
|
-
const getArrayForCommaSeparatedString = (str) => typeof str === "string" && str.length > 0 ? str.split(",").map((item) => item.trim()) : [];
|
|
780
|
-
|
|
781
|
-
const getBearerTokenEnvKey = (signingName) => `AWS_BEARER_TOKEN_${signingName.replace(/[\s-]/g, "_").toUpperCase()}`;
|
|
782
|
-
|
|
783
|
-
const NODE_AUTH_SCHEME_PREFERENCE_ENV_KEY = "AWS_AUTH_SCHEME_PREFERENCE";
|
|
784
|
-
const NODE_AUTH_SCHEME_PREFERENCE_CONFIG_KEY = "auth_scheme_preference";
|
|
785
|
-
const NODE_AUTH_SCHEME_PREFERENCE_OPTIONS = {
|
|
786
|
-
environmentVariableSelector: (env, options) => {
|
|
787
|
-
if (options?.signingName) {
|
|
788
|
-
const bearerTokenKey = getBearerTokenEnvKey(options.signingName);
|
|
789
|
-
if (bearerTokenKey in env)
|
|
790
|
-
return ["httpBearerAuth"];
|
|
791
|
-
}
|
|
792
|
-
if (!(NODE_AUTH_SCHEME_PREFERENCE_ENV_KEY in env))
|
|
793
|
-
return undefined;
|
|
794
|
-
return getArrayForCommaSeparatedString(env[NODE_AUTH_SCHEME_PREFERENCE_ENV_KEY]);
|
|
795
|
-
},
|
|
796
|
-
configFileSelector: (profile) => {
|
|
797
|
-
if (!(NODE_AUTH_SCHEME_PREFERENCE_CONFIG_KEY in profile))
|
|
798
|
-
return undefined;
|
|
799
|
-
return getArrayForCommaSeparatedString(profile[NODE_AUTH_SCHEME_PREFERENCE_CONFIG_KEY]);
|
|
800
|
-
},
|
|
801
|
-
default: [],
|
|
802
|
-
};
|
|
803
|
-
|
|
804
|
-
const resolveAwsSdkSigV4AConfig = (config) => {
|
|
805
|
-
config.sigv4aSigningRegionSet = core.normalizeProvider(config.sigv4aSigningRegionSet);
|
|
806
|
-
return config;
|
|
807
|
-
};
|
|
808
|
-
const NODE_SIGV4A_CONFIG_OPTIONS = {
|
|
809
|
-
environmentVariableSelector(env) {
|
|
810
|
-
if (env.AWS_SIGV4A_SIGNING_REGION_SET) {
|
|
811
|
-
return env.AWS_SIGV4A_SIGNING_REGION_SET.split(",").map((_) => _.trim());
|
|
812
|
-
}
|
|
813
|
-
throw new propertyProvider.ProviderError("AWS_SIGV4A_SIGNING_REGION_SET not set in env.", {
|
|
814
|
-
tryNextLink: true,
|
|
815
|
-
});
|
|
816
|
-
},
|
|
817
|
-
configFileSelector(profile) {
|
|
818
|
-
if (profile.sigv4a_signing_region_set) {
|
|
819
|
-
return (profile.sigv4a_signing_region_set ?? "").split(",").map((_) => _.trim());
|
|
820
|
-
}
|
|
821
|
-
throw new propertyProvider.ProviderError("sigv4a_signing_region_set not set in profile.", {
|
|
822
|
-
tryNextLink: true,
|
|
823
|
-
});
|
|
824
|
-
},
|
|
825
|
-
default: undefined,
|
|
826
|
-
};
|
|
827
|
-
|
|
828
|
-
const resolveAwsSdkSigV4Config = (config) => {
|
|
829
|
-
let inputCredentials = config.credentials;
|
|
830
|
-
let isUserSupplied = !!config.credentials;
|
|
831
|
-
let resolvedCredentials = undefined;
|
|
832
|
-
Object.defineProperty(config, "credentials", {
|
|
833
|
-
set(credentials) {
|
|
834
|
-
if (credentials && credentials !== inputCredentials && credentials !== resolvedCredentials) {
|
|
835
|
-
isUserSupplied = true;
|
|
836
|
-
}
|
|
837
|
-
inputCredentials = credentials;
|
|
838
|
-
const memoizedProvider = normalizeCredentialProvider(config, {
|
|
839
|
-
credentials: inputCredentials,
|
|
840
|
-
credentialDefaultProvider: config.credentialDefaultProvider,
|
|
841
|
-
});
|
|
842
|
-
const boundProvider = bindCallerConfig(config, memoizedProvider);
|
|
843
|
-
if (isUserSupplied && !boundProvider.attributed) {
|
|
844
|
-
const isCredentialObject = typeof inputCredentials === "object" && inputCredentials !== null;
|
|
845
|
-
resolvedCredentials = async (options) => {
|
|
846
|
-
const creds = await boundProvider(options);
|
|
847
|
-
const attributedCreds = creds;
|
|
848
|
-
if (isCredentialObject && (!attributedCreds.$source || Object.keys(attributedCreds.$source).length === 0)) {
|
|
849
|
-
return client.setCredentialFeature(attributedCreds, "CREDENTIALS_CODE", "e");
|
|
850
|
-
}
|
|
851
|
-
return attributedCreds;
|
|
852
|
-
};
|
|
853
|
-
resolvedCredentials.memoized = boundProvider.memoized;
|
|
854
|
-
resolvedCredentials.configBound = boundProvider.configBound;
|
|
855
|
-
resolvedCredentials.attributed = true;
|
|
856
|
-
}
|
|
857
|
-
else {
|
|
858
|
-
resolvedCredentials = boundProvider;
|
|
859
|
-
}
|
|
860
|
-
},
|
|
861
|
-
get() {
|
|
862
|
-
return resolvedCredentials;
|
|
863
|
-
},
|
|
864
|
-
enumerable: true,
|
|
865
|
-
configurable: true,
|
|
866
|
-
});
|
|
867
|
-
config.credentials = inputCredentials;
|
|
868
|
-
const { signingEscapePath = true, systemClockOffset = config.systemClockOffset || 0, sha256, } = config;
|
|
869
|
-
let signer;
|
|
870
|
-
if (config.signer) {
|
|
871
|
-
signer = core.normalizeProvider(config.signer);
|
|
872
|
-
}
|
|
873
|
-
else if (config.regionInfoProvider) {
|
|
874
|
-
signer = () => core.normalizeProvider(config.region)()
|
|
875
|
-
.then(async (region) => [
|
|
876
|
-
(await config.regionInfoProvider(region, {
|
|
877
|
-
useFipsEndpoint: await config.useFipsEndpoint(),
|
|
878
|
-
useDualstackEndpoint: await config.useDualstackEndpoint(),
|
|
879
|
-
})) || {},
|
|
880
|
-
region,
|
|
881
|
-
])
|
|
882
|
-
.then(([regionInfo, region]) => {
|
|
883
|
-
const { signingRegion, signingService } = regionInfo;
|
|
884
|
-
config.signingRegion = config.signingRegion || signingRegion || region;
|
|
885
|
-
config.signingName = config.signingName || signingService || config.serviceId;
|
|
886
|
-
const params = {
|
|
887
|
-
...config,
|
|
888
|
-
credentials: config.credentials,
|
|
889
|
-
region: config.signingRegion,
|
|
890
|
-
service: config.signingName,
|
|
891
|
-
sha256,
|
|
892
|
-
uriEscapePath: signingEscapePath,
|
|
893
|
-
};
|
|
894
|
-
const SignerCtor = config.signerConstructor || signatureV4.SignatureV4;
|
|
895
|
-
return new SignerCtor(params);
|
|
896
|
-
});
|
|
897
|
-
}
|
|
898
|
-
else {
|
|
899
|
-
signer = async (authScheme) => {
|
|
900
|
-
authScheme = Object.assign({}, {
|
|
901
|
-
name: "sigv4",
|
|
902
|
-
signingName: config.signingName || config.defaultSigningName,
|
|
903
|
-
signingRegion: await core.normalizeProvider(config.region)(),
|
|
904
|
-
properties: {},
|
|
905
|
-
}, authScheme);
|
|
906
|
-
const signingRegion = authScheme.signingRegion;
|
|
907
|
-
const signingService = authScheme.signingName;
|
|
908
|
-
config.signingRegion = config.signingRegion || signingRegion;
|
|
909
|
-
config.signingName = config.signingName || signingService || config.serviceId;
|
|
910
|
-
const params = {
|
|
911
|
-
...config,
|
|
912
|
-
credentials: config.credentials,
|
|
913
|
-
region: config.signingRegion,
|
|
914
|
-
service: config.signingName,
|
|
915
|
-
sha256,
|
|
916
|
-
uriEscapePath: signingEscapePath,
|
|
917
|
-
};
|
|
918
|
-
const SignerCtor = config.signerConstructor || signatureV4.SignatureV4;
|
|
919
|
-
return new SignerCtor(params);
|
|
920
|
-
};
|
|
921
|
-
}
|
|
922
|
-
const resolvedConfig = Object.assign(config, {
|
|
923
|
-
systemClockOffset,
|
|
924
|
-
signingEscapePath,
|
|
925
|
-
signer,
|
|
926
|
-
});
|
|
927
|
-
return resolvedConfig;
|
|
928
|
-
};
|
|
929
|
-
const resolveAWSSDKSigV4Config = resolveAwsSdkSigV4Config;
|
|
930
|
-
function normalizeCredentialProvider(config, { credentials, credentialDefaultProvider, }) {
|
|
931
|
-
let credentialsProvider;
|
|
932
|
-
if (credentials) {
|
|
933
|
-
if (!credentials?.memoized) {
|
|
934
|
-
credentialsProvider = core.memoizeIdentityProvider(credentials, core.isIdentityExpired, core.doesIdentityRequireRefresh);
|
|
935
|
-
}
|
|
936
|
-
else {
|
|
937
|
-
credentialsProvider = credentials;
|
|
938
|
-
}
|
|
939
|
-
}
|
|
940
|
-
else {
|
|
941
|
-
if (credentialDefaultProvider) {
|
|
942
|
-
credentialsProvider = core.normalizeProvider(credentialDefaultProvider(Object.assign({}, config, {
|
|
943
|
-
parentClientConfig: config,
|
|
944
|
-
})));
|
|
945
|
-
}
|
|
946
|
-
else {
|
|
947
|
-
credentialsProvider = async () => {
|
|
948
|
-
throw new Error("@aws-sdk/core::resolveAwsSdkSigV4Config - `credentials` not provided and no credentialDefaultProvider was configured.");
|
|
949
|
-
};
|
|
950
|
-
}
|
|
951
|
-
}
|
|
952
|
-
credentialsProvider.memoized = true;
|
|
953
|
-
return credentialsProvider;
|
|
954
|
-
}
|
|
955
|
-
function bindCallerConfig(config, credentialsProvider) {
|
|
956
|
-
if (credentialsProvider.configBound) {
|
|
957
|
-
return credentialsProvider;
|
|
958
|
-
}
|
|
959
|
-
const fn = async (options) => credentialsProvider({ ...options, callerClientConfig: config });
|
|
960
|
-
fn.memoized = credentialsProvider.memoized;
|
|
961
|
-
fn.configBound = true;
|
|
962
|
-
return fn;
|
|
963
|
-
}
|
|
964
|
-
|
|
965
|
-
exports.AWSSDKSigV4Signer = AWSSDKSigV4Signer;
|
|
966
|
-
exports.AwsSdkSigV4ASigner = AwsSdkSigV4ASigner;
|
|
967
|
-
exports.AwsSdkSigV4Signer = AwsSdkSigV4Signer;
|
|
968
|
-
exports.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS = NODE_AUTH_SCHEME_PREFERENCE_OPTIONS;
|
|
969
|
-
exports.NODE_SIGV4A_CONFIG_OPTIONS = NODE_SIGV4A_CONFIG_OPTIONS;
|
|
970
|
-
exports.getBearerTokenEnvKey = getBearerTokenEnvKey;
|
|
971
|
-
exports.resolveAWSSDKSigV4Config = resolveAWSSDKSigV4Config;
|
|
972
|
-
exports.resolveAwsSdkSigV4AConfig = resolveAwsSdkSigV4AConfig;
|
|
973
|
-
exports.resolveAwsSdkSigV4Config = resolveAwsSdkSigV4Config;
|
|
974
|
-
exports.validateSigningProperties = validateSigningProperties;
|
|
975
|
-
|
|
976
|
-
|
|
977
|
-
/***/ }),
|
|
978
|
-
|
|
979
|
-
/***/ 60998:
|
|
980
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
981
|
-
|
|
982
|
-
var __webpack_unused_export__;
|
|
983
|
-
|
|
984
|
-
|
|
985
|
-
var propertyProvider = __webpack_require__(71238);
|
|
986
|
-
var sharedIniFileLoader = __webpack_require__(94964);
|
|
987
|
-
var client = __webpack_require__(5152);
|
|
988
|
-
var tokenProviders = __webpack_require__(75433);
|
|
989
|
-
|
|
990
|
-
const isSsoProfile = (arg) => arg &&
|
|
991
|
-
(typeof arg.sso_start_url === "string" ||
|
|
992
|
-
typeof arg.sso_account_id === "string" ||
|
|
993
|
-
typeof arg.sso_session === "string" ||
|
|
994
|
-
typeof arg.sso_region === "string" ||
|
|
995
|
-
typeof arg.sso_role_name === "string");
|
|
996
|
-
|
|
997
|
-
const SHOULD_FAIL_CREDENTIAL_CHAIN = false;
|
|
998
|
-
const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger, }) => {
|
|
999
|
-
let token;
|
|
1000
|
-
const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
|
|
1001
|
-
if (ssoSession) {
|
|
1002
|
-
try {
|
|
1003
|
-
const _token = await tokenProviders.fromSso({
|
|
1004
|
-
profile,
|
|
1005
|
-
filepath,
|
|
1006
|
-
configFilepath,
|
|
1007
|
-
ignoreCache,
|
|
1008
|
-
})();
|
|
1009
|
-
token = {
|
|
1010
|
-
accessToken: _token.token,
|
|
1011
|
-
expiresAt: new Date(_token.expiration).toISOString(),
|
|
1012
|
-
};
|
|
1013
|
-
}
|
|
1014
|
-
catch (e) {
|
|
1015
|
-
throw new propertyProvider.CredentialsProviderError(e.message, {
|
|
1016
|
-
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
1017
|
-
logger,
|
|
1018
|
-
});
|
|
1019
|
-
}
|
|
1020
|
-
}
|
|
1021
|
-
else {
|
|
1022
|
-
try {
|
|
1023
|
-
token = await sharedIniFileLoader.getSSOTokenFromFile(ssoStartUrl);
|
|
1024
|
-
}
|
|
1025
|
-
catch (e) {
|
|
1026
|
-
throw new propertyProvider.CredentialsProviderError(`The SSO session associated with this profile is invalid. ${refreshMessage}`, {
|
|
1027
|
-
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
1028
|
-
logger,
|
|
1029
|
-
});
|
|
1030
|
-
}
|
|
1031
|
-
}
|
|
1032
|
-
if (new Date(token.expiresAt).getTime() - Date.now() <= 0) {
|
|
1033
|
-
throw new propertyProvider.CredentialsProviderError(`The SSO session associated with this profile has expired. ${refreshMessage}`, {
|
|
1034
|
-
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
1035
|
-
logger,
|
|
1036
|
-
});
|
|
1037
|
-
}
|
|
1038
|
-
const { accessToken } = token;
|
|
1039
|
-
const { SSOClient, GetRoleCredentialsCommand } = await Promise.resolve().then(function () { return __webpack_require__(16553); });
|
|
1040
|
-
const sso = ssoClient ||
|
|
1041
|
-
new SSOClient(Object.assign({}, clientConfig ?? {}, {
|
|
1042
|
-
logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
|
|
1043
|
-
region: clientConfig?.region ?? ssoRegion,
|
|
1044
|
-
userAgentAppId: clientConfig?.userAgentAppId ?? callerClientConfig?.userAgentAppId ?? parentClientConfig?.userAgentAppId,
|
|
1045
|
-
}));
|
|
1046
|
-
let ssoResp;
|
|
1047
|
-
try {
|
|
1048
|
-
ssoResp = await sso.send(new GetRoleCredentialsCommand({
|
|
1049
|
-
accountId: ssoAccountId,
|
|
1050
|
-
roleName: ssoRoleName,
|
|
1051
|
-
accessToken,
|
|
1052
|
-
}));
|
|
1053
|
-
}
|
|
1054
|
-
catch (e) {
|
|
1055
|
-
throw new propertyProvider.CredentialsProviderError(e, {
|
|
1056
|
-
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
1057
|
-
logger,
|
|
1058
|
-
});
|
|
1059
|
-
}
|
|
1060
|
-
const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration, credentialScope, accountId } = {}, } = ssoResp;
|
|
1061
|
-
if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
|
|
1062
|
-
throw new propertyProvider.CredentialsProviderError("SSO returns an invalid temporary credential.", {
|
|
1063
|
-
tryNextLink: SHOULD_FAIL_CREDENTIAL_CHAIN,
|
|
1064
|
-
logger,
|
|
1065
|
-
});
|
|
1066
|
-
}
|
|
1067
|
-
const credentials = {
|
|
1068
|
-
accessKeyId,
|
|
1069
|
-
secretAccessKey,
|
|
1070
|
-
sessionToken,
|
|
1071
|
-
expiration: new Date(expiration),
|
|
1072
|
-
...(credentialScope && { credentialScope }),
|
|
1073
|
-
...(accountId && { accountId }),
|
|
1074
|
-
};
|
|
1075
|
-
if (ssoSession) {
|
|
1076
|
-
client.setCredentialFeature(credentials, "CREDENTIALS_SSO", "s");
|
|
1077
|
-
}
|
|
1078
|
-
else {
|
|
1079
|
-
client.setCredentialFeature(credentials, "CREDENTIALS_SSO_LEGACY", "u");
|
|
1080
|
-
}
|
|
1081
|
-
return credentials;
|
|
1082
|
-
};
|
|
1083
|
-
|
|
1084
|
-
const validateSsoProfile = (profile, logger) => {
|
|
1085
|
-
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
|
|
1086
|
-
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
|
|
1087
|
-
throw new propertyProvider.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", ` +
|
|
1088
|
-
`"sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });
|
|
1089
|
-
}
|
|
1090
|
-
return profile;
|
|
1091
|
-
};
|
|
1092
|
-
|
|
1093
|
-
const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
1094
|
-
init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
|
|
1095
|
-
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
1096
|
-
const { ssoClient } = init;
|
|
1097
|
-
const profileName = sharedIniFileLoader.getProfileName({
|
|
1098
|
-
profile: init.profile ?? callerClientConfig?.profile,
|
|
1099
|
-
});
|
|
1100
|
-
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
|
1101
|
-
const profiles = await sharedIniFileLoader.parseKnownFiles(init);
|
|
1102
|
-
const profile = profiles[profileName];
|
|
1103
|
-
if (!profile) {
|
|
1104
|
-
throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });
|
|
1105
|
-
}
|
|
1106
|
-
if (!isSsoProfile(profile)) {
|
|
1107
|
-
throw new propertyProvider.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {
|
|
1108
|
-
logger: init.logger,
|
|
1109
|
-
});
|
|
1110
|
-
}
|
|
1111
|
-
if (profile?.sso_session) {
|
|
1112
|
-
const ssoSessions = await sharedIniFileLoader.loadSsoSessionData(init);
|
|
1113
|
-
const session = ssoSessions[profile.sso_session];
|
|
1114
|
-
const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;
|
|
1115
|
-
if (ssoRegion && ssoRegion !== session.sso_region) {
|
|
1116
|
-
throw new propertyProvider.CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {
|
|
1117
|
-
tryNextLink: false,
|
|
1118
|
-
logger: init.logger,
|
|
1119
|
-
});
|
|
1120
|
-
}
|
|
1121
|
-
if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {
|
|
1122
|
-
throw new propertyProvider.CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {
|
|
1123
|
-
tryNextLink: false,
|
|
1124
|
-
logger: init.logger,
|
|
1125
|
-
});
|
|
1126
|
-
}
|
|
1127
|
-
profile.sso_region = session.sso_region;
|
|
1128
|
-
profile.sso_start_url = session.sso_start_url;
|
|
1129
|
-
}
|
|
1130
|
-
const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);
|
|
1131
|
-
return resolveSSOCredentials({
|
|
1132
|
-
ssoStartUrl: sso_start_url,
|
|
1133
|
-
ssoSession: sso_session,
|
|
1134
|
-
ssoAccountId: sso_account_id,
|
|
1135
|
-
ssoRegion: sso_region,
|
|
1136
|
-
ssoRoleName: sso_role_name,
|
|
1137
|
-
ssoClient: ssoClient,
|
|
1138
|
-
clientConfig: init.clientConfig,
|
|
1139
|
-
parentClientConfig: init.parentClientConfig,
|
|
1140
|
-
callerClientConfig: init.callerClientConfig,
|
|
1141
|
-
profile: profileName,
|
|
1142
|
-
filepath: init.filepath,
|
|
1143
|
-
configFilepath: init.configFilepath,
|
|
1144
|
-
ignoreCache: init.ignoreCache,
|
|
1145
|
-
logger: init.logger,
|
|
1146
|
-
});
|
|
1147
|
-
}
|
|
1148
|
-
else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
|
|
1149
|
-
throw new propertyProvider.CredentialsProviderError("Incomplete configuration. The fromSSO() argument hash must include " +
|
|
1150
|
-
'"ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"', { tryNextLink: false, logger: init.logger });
|
|
1151
|
-
}
|
|
1152
|
-
else {
|
|
1153
|
-
return resolveSSOCredentials({
|
|
1154
|
-
ssoStartUrl,
|
|
1155
|
-
ssoSession,
|
|
1156
|
-
ssoAccountId,
|
|
1157
|
-
ssoRegion,
|
|
1158
|
-
ssoRoleName,
|
|
1159
|
-
ssoClient,
|
|
1160
|
-
clientConfig: init.clientConfig,
|
|
1161
|
-
parentClientConfig: init.parentClientConfig,
|
|
1162
|
-
callerClientConfig: init.callerClientConfig,
|
|
1163
|
-
profile: profileName,
|
|
1164
|
-
filepath: init.filepath,
|
|
1165
|
-
configFilepath: init.configFilepath,
|
|
1166
|
-
ignoreCache: init.ignoreCache,
|
|
1167
|
-
logger: init.logger,
|
|
1168
|
-
});
|
|
1169
|
-
}
|
|
1170
|
-
};
|
|
1171
|
-
|
|
1172
|
-
exports.fromSSO = fromSSO;
|
|
1173
|
-
__webpack_unused_export__ = isSsoProfile;
|
|
1174
|
-
__webpack_unused_export__ = validateSsoProfile;
|
|
1175
|
-
|
|
1176
|
-
|
|
1177
|
-
/***/ }),
|
|
1178
|
-
|
|
1179
|
-
/***/ 16553:
|
|
1180
|
-
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
1181
|
-
|
|
1182
|
-
|
|
1183
|
-
|
|
1184
|
-
var clientSso = __webpack_require__(62054);
|
|
1185
|
-
|
|
1186
|
-
|
|
1187
|
-
|
|
1188
|
-
Object.defineProperty(exports, "GetRoleCredentialsCommand", ({
|
|
1189
|
-
enumerable: true,
|
|
1190
|
-
get: function () { return clientSso.GetRoleCredentialsCommand; }
|
|
1191
|
-
}));
|
|
1192
|
-
Object.defineProperty(exports, "SSOClient", ({
|
|
1193
|
-
enumerable: true,
|
|
1194
|
-
get: function () { return clientSso.SSOClient; }
|
|
1195
|
-
}));
|
|
791
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
792
|
+
exports.GetRoleCredentials$ = exports.RoleCredentials$ = exports.GetRoleCredentialsResponse$ = exports.GetRoleCredentialsRequest$ = exports.errorTypeRegistries = exports.UnauthorizedException$ = exports.TooManyRequestsException$ = exports.ResourceNotFoundException$ = exports.InvalidRequestException$ = exports.SSOServiceException$ = void 0;
|
|
793
|
+
const _ATT = "AccessTokenType";
|
|
794
|
+
const _GRC = "GetRoleCredentials";
|
|
795
|
+
const _GRCR = "GetRoleCredentialsRequest";
|
|
796
|
+
const _GRCRe = "GetRoleCredentialsResponse";
|
|
797
|
+
const _IRE = "InvalidRequestException";
|
|
798
|
+
const _RC = "RoleCredentials";
|
|
799
|
+
const _RNFE = "ResourceNotFoundException";
|
|
800
|
+
const _SAKT = "SecretAccessKeyType";
|
|
801
|
+
const _STT = "SessionTokenType";
|
|
802
|
+
const _TMRE = "TooManyRequestsException";
|
|
803
|
+
const _UE = "UnauthorizedException";
|
|
804
|
+
const _aI = "accountId";
|
|
805
|
+
const _aKI = "accessKeyId";
|
|
806
|
+
const _aT = "accessToken";
|
|
807
|
+
const _ai = "account_id";
|
|
808
|
+
const _c = "client";
|
|
809
|
+
const _e = "error";
|
|
810
|
+
const _ex = "expiration";
|
|
811
|
+
const _h = "http";
|
|
812
|
+
const _hE = "httpError";
|
|
813
|
+
const _hH = "httpHeader";
|
|
814
|
+
const _hQ = "httpQuery";
|
|
815
|
+
const _m = "message";
|
|
816
|
+
const _rC = "roleCredentials";
|
|
817
|
+
const _rN = "roleName";
|
|
818
|
+
const _rn = "role_name";
|
|
819
|
+
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sso";
|
|
820
|
+
const _sAK = "secretAccessKey";
|
|
821
|
+
const _sT = "sessionToken";
|
|
822
|
+
const _xasbt = "x-amz-sso_bearer_token";
|
|
823
|
+
const n0 = "com.amazonaws.sso";
|
|
824
|
+
const schema_1 = __webpack_require__(26890);
|
|
825
|
+
const errors_1 = __webpack_require__(24483);
|
|
826
|
+
const SSOServiceException_1 = __webpack_require__(69849);
|
|
827
|
+
const _s_registry = schema_1.TypeRegistry.for(_s);
|
|
828
|
+
exports.SSOServiceException$ = [-3, _s, "SSOServiceException", 0, [], []];
|
|
829
|
+
_s_registry.registerError(exports.SSOServiceException$, SSOServiceException_1.SSOServiceException);
|
|
830
|
+
const n0_registry = schema_1.TypeRegistry.for(n0);
|
|
831
|
+
exports.InvalidRequestException$ = [-3, n0, _IRE, { [_e]: _c, [_hE]: 400 }, [_m], [0]];
|
|
832
|
+
n0_registry.registerError(exports.InvalidRequestException$, errors_1.InvalidRequestException);
|
|
833
|
+
exports.ResourceNotFoundException$ = [-3, n0, _RNFE, { [_e]: _c, [_hE]: 404 }, [_m], [0]];
|
|
834
|
+
n0_registry.registerError(exports.ResourceNotFoundException$, errors_1.ResourceNotFoundException);
|
|
835
|
+
exports.TooManyRequestsException$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_m], [0]];
|
|
836
|
+
n0_registry.registerError(exports.TooManyRequestsException$, errors_1.TooManyRequestsException);
|
|
837
|
+
exports.UnauthorizedException$ = [-3, n0, _UE, { [_e]: _c, [_hE]: 401 }, [_m], [0]];
|
|
838
|
+
n0_registry.registerError(exports.UnauthorizedException$, errors_1.UnauthorizedException);
|
|
839
|
+
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
|
840
|
+
var AccessTokenType = [0, n0, _ATT, 8, 0];
|
|
841
|
+
var SecretAccessKeyType = [0, n0, _SAKT, 8, 0];
|
|
842
|
+
var SessionTokenType = [0, n0, _STT, 8, 0];
|
|
843
|
+
exports.GetRoleCredentialsRequest$ = [
|
|
844
|
+
3,
|
|
845
|
+
n0,
|
|
846
|
+
_GRCR,
|
|
847
|
+
0,
|
|
848
|
+
[_rN, _aI, _aT],
|
|
849
|
+
[
|
|
850
|
+
[0, { [_hQ]: _rn }],
|
|
851
|
+
[0, { [_hQ]: _ai }],
|
|
852
|
+
[() => AccessTokenType, { [_hH]: _xasbt }],
|
|
853
|
+
],
|
|
854
|
+
3,
|
|
855
|
+
];
|
|
856
|
+
exports.GetRoleCredentialsResponse$ = [
|
|
857
|
+
3,
|
|
858
|
+
n0,
|
|
859
|
+
_GRCRe,
|
|
860
|
+
0,
|
|
861
|
+
[_rC],
|
|
862
|
+
[[() => exports.RoleCredentials$, 0]],
|
|
863
|
+
];
|
|
864
|
+
exports.RoleCredentials$ = [
|
|
865
|
+
3,
|
|
866
|
+
n0,
|
|
867
|
+
_RC,
|
|
868
|
+
0,
|
|
869
|
+
[_aKI, _sAK, _sT, _ex],
|
|
870
|
+
[0, [() => SecretAccessKeyType, 0], [() => SessionTokenType, 0], 1],
|
|
871
|
+
];
|
|
872
|
+
exports.GetRoleCredentials$ = [
|
|
873
|
+
9,
|
|
874
|
+
n0,
|
|
875
|
+
_GRC,
|
|
876
|
+
{ [_h]: ["GET", "/federation/credentials", 200] },
|
|
877
|
+
() => exports.GetRoleCredentialsRequest$,
|
|
878
|
+
() => exports.GetRoleCredentialsResponse$,
|
|
879
|
+
];
|
|
1196
880
|
|
|
1197
881
|
|
|
1198
882
|
/***/ }),
|
|
@@ -1206,7 +890,7 @@ var client = __webpack_require__(5152);
|
|
|
1206
890
|
var httpAuthSchemes = __webpack_require__(97523);
|
|
1207
891
|
var propertyProvider = __webpack_require__(71238);
|
|
1208
892
|
var sharedIniFileLoader = __webpack_require__(94964);
|
|
1209
|
-
var
|
|
893
|
+
var node_fs = __webpack_require__(73024);
|
|
1210
894
|
|
|
1211
895
|
const fromEnvSigningName = ({ logger, signingName } = {}) => async () => {
|
|
1212
896
|
logger?.debug?.("@aws-sdk/token-providers - fromEnvSigningName");
|
|
@@ -1226,7 +910,7 @@ const EXPIRE_WINDOW_MS = 5 * 60 * 1000;
|
|
|
1226
910
|
const REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
|
|
1227
911
|
|
|
1228
912
|
const getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
|
|
1229
|
-
const { SSOOIDCClient } = await __webpack_require__.e(/* import() */ 443).then(__webpack_require__.t.bind(__webpack_require__, 89443,
|
|
913
|
+
const { SSOOIDCClient } = await __webpack_require__.e(/* import() */ 443).then(__webpack_require__.t.bind(__webpack_require__, 89443, 23));
|
|
1230
914
|
const coalesce = (prop) => init.clientConfig?.[prop] ?? init.parentClientConfig?.[prop] ?? callerClientConfig?.[prop];
|
|
1231
915
|
const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
|
|
1232
916
|
region: ssoRegion ?? init.clientConfig?.region,
|
|
@@ -1237,7 +921,7 @@ const getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
|
|
|
1237
921
|
};
|
|
1238
922
|
|
|
1239
923
|
const getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConfig) => {
|
|
1240
|
-
const { CreateTokenCommand } = await __webpack_require__.e(/* import() */ 443).then(__webpack_require__.t.bind(__webpack_require__, 89443,
|
|
924
|
+
const { CreateTokenCommand } = await __webpack_require__.e(/* import() */ 443).then(__webpack_require__.t.bind(__webpack_require__, 89443, 23));
|
|
1241
925
|
const ssoOidcClient = await getSsoOidcClient(ssoRegion, init, callerClientConfig);
|
|
1242
926
|
return ssoOidcClient.send(new CreateTokenCommand({
|
|
1243
927
|
clientId: ssoToken.clientId,
|
|
@@ -1259,7 +943,7 @@ const validateTokenKey = (key, value, forRefresh = false) => {
|
|
|
1259
943
|
}
|
|
1260
944
|
};
|
|
1261
945
|
|
|
1262
|
-
const { writeFile } =
|
|
946
|
+
const { writeFile } = node_fs.promises;
|
|
1263
947
|
const writeSSOTokenToFile = (id, ssoToken) => {
|
|
1264
948
|
const tokenFilepath = sharedIniFileLoader.getSSOTokenFilepath(id);
|
|
1265
949
|
const tokenString = JSON.stringify(ssoToken, null, 2);
|
|
@@ -1361,10 +1045,10 @@ exports.nodeProvider = nodeProvider;
|
|
|
1361
1045
|
|
|
1362
1046
|
/***/ }),
|
|
1363
1047
|
|
|
1364
|
-
/***/
|
|
1048
|
+
/***/ 39955:
|
|
1365
1049
|
/***/ ((module) => {
|
|
1366
1050
|
|
|
1367
|
-
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/
|
|
1051
|
+
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.19","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.27","@aws-sdk/middleware-host-header":"^3.972.9","@aws-sdk/middleware-logger":"^3.972.9","@aws-sdk/middleware-recursion-detection":"^3.972.10","@aws-sdk/middleware-user-agent":"^3.972.29","@aws-sdk/region-config-resolver":"^3.972.11","@aws-sdk/types":"^3.973.7","@aws-sdk/util-endpoints":"^3.996.6","@aws-sdk/util-user-agent-browser":"^3.972.9","@aws-sdk/util-user-agent-node":"^3.973.15","@smithy/config-resolver":"^4.4.14","@smithy/core":"^3.23.14","@smithy/fetch-http-handler":"^5.3.16","@smithy/hash-node":"^4.2.13","@smithy/invalid-dependency":"^4.2.13","@smithy/middleware-content-length":"^4.2.13","@smithy/middleware-endpoint":"^4.4.29","@smithy/middleware-retry":"^4.5.0","@smithy/middleware-serde":"^4.2.17","@smithy/middleware-stack":"^4.2.13","@smithy/node-config-provider":"^4.3.13","@smithy/node-http-handler":"^4.5.2","@smithy/protocol-http":"^5.3.13","@smithy/smithy-client":"^4.12.9","@smithy/types":"^4.14.0","@smithy/url-parser":"^4.2.13","@smithy/util-base64":"^4.3.2","@smithy/util-body-length-browser":"^4.2.2","@smithy/util-body-length-node":"^4.2.3","@smithy/util-defaults-mode-browser":"^4.3.45","@smithy/util-defaults-mode-node":"^4.2.49","@smithy/util-endpoints":"^3.3.4","@smithy/util-middleware":"^4.2.13","@smithy/util-retry":"^4.3.0","@smithy/util-utf8":"^4.2.2","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.5":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/cognito-identity/runtimeConfig":"./dist-es/submodules/cognito-identity/runtimeConfig.browser","./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sso/runtimeConfig":"./dist-es/submodules/sso/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
|
|
1368
1052
|
|
|
1369
1053
|
/***/ })
|
|
1370
1054
|
|