@rharkor/caching-for-turbo 2.3.11 → 2.3.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -3
- package/dist/cli/136.index.js +512 -329
- package/dist/cli/136.index.js.map +1 -1
- package/dist/cli/360.index.js +3 -3
- package/dist/cli/360.index.js.map +1 -1
- package/dist/cli/443.index.js +362 -228
- package/dist/cli/443.index.js.map +1 -1
- package/dist/cli/579.index.js +9 -1
- package/dist/cli/579.index.js.map +1 -1
- package/dist/cli/605.index.js +1 -1
- package/dist/cli/605.index.js.map +1 -1
- package/dist/cli/762.index.js +363 -192
- package/dist/cli/762.index.js.map +1 -1
- package/dist/cli/869.index.js +2 -2
- package/dist/cli/956.index.js +16 -899
- package/dist/cli/956.index.js.map +1 -1
- package/dist/cli/998.index.js +549 -865
- package/dist/cli/998.index.js.map +1 -1
- package/dist/cli/index.js +184416 -187137
- package/dist/cli/licenses.txt +0 -409
- package/dist/cli/worker.js +18 -13
- package/package.json +2 -2
package/dist/cli/762.index.js
CHANGED
|
@@ -8,7 +8,7 @@ export const modules = {
|
|
|
8
8
|
|
|
9
9
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
10
10
|
exports.resolveHttpAuthSchemeConfig = exports.defaultSigninHttpAuthSchemeProvider = exports.defaultSigninHttpAuthSchemeParametersProvider = void 0;
|
|
11
|
-
const
|
|
11
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
12
12
|
const util_middleware_1 = __webpack_require__(76324);
|
|
13
13
|
const defaultSigninHttpAuthSchemeParametersProvider = async (config, context, input) => {
|
|
14
14
|
return {
|
|
@@ -55,7 +55,7 @@ const defaultSigninHttpAuthSchemeProvider = (authParameters) => {
|
|
|
55
55
|
};
|
|
56
56
|
exports.defaultSigninHttpAuthSchemeProvider = defaultSigninHttpAuthSchemeProvider;
|
|
57
57
|
const resolveHttpAuthSchemeConfig = (config) => {
|
|
58
|
-
const config_0 = (0,
|
|
58
|
+
const config_0 = (0, httpAuthSchemes_1.resolveAwsSdkSigV4Config)(config);
|
|
59
59
|
return Object.assign(config_0, {
|
|
60
60
|
authSchemePreference: (0, util_middleware_1.normalizeProvider)(config.authSchemePreference ?? []),
|
|
61
61
|
});
|
|
@@ -97,8 +97,134 @@ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunct
|
|
|
97
97
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
98
98
|
exports.ruleSet = void 0;
|
|
99
99
|
const u = "required", v = "fn", w = "argv", x = "ref";
|
|
100
|
-
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "stringEquals", i = { [u]: true,
|
|
101
|
-
const _data = {
|
|
100
|
+
const a = true, b = "isSet", c = "booleanEquals", d = "error", e = "endpoint", f = "tree", g = "PartitionResult", h = "stringEquals", i = { [u]: true, default: false, type: "boolean" }, j = { [u]: false, type: "string" }, k = { [x]: "Endpoint" }, l = { [v]: c, [w]: [{ [x]: "UseFIPS" }, true] }, m = { [v]: c, [w]: [{ [x]: "UseDualStack" }, true] }, n = {}, o = { [v]: "getAttr", [w]: [{ [x]: g }, "name"] }, p = { [v]: c, [w]: [{ [x]: "UseFIPS" }, false] }, q = { [v]: c, [w]: [{ [x]: "UseDualStack" }, false] }, r = { [v]: "getAttr", [w]: [{ [x]: g }, "supportsFIPS"] }, s = { [v]: c, [w]: [true, { [v]: "getAttr", [w]: [{ [x]: g }, "supportsDualStack"] }] }, t = [{ [x]: "Region" }];
|
|
101
|
+
const _data = {
|
|
102
|
+
version: "1.0",
|
|
103
|
+
parameters: { UseDualStack: i, UseFIPS: i, Endpoint: j, Region: j },
|
|
104
|
+
rules: [
|
|
105
|
+
{
|
|
106
|
+
conditions: [{ [v]: b, [w]: [k] }],
|
|
107
|
+
rules: [
|
|
108
|
+
{ conditions: [l], error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d },
|
|
109
|
+
{
|
|
110
|
+
rules: [
|
|
111
|
+
{
|
|
112
|
+
conditions: [m],
|
|
113
|
+
error: "Invalid Configuration: Dualstack and custom endpoint are not supported",
|
|
114
|
+
type: d,
|
|
115
|
+
},
|
|
116
|
+
{ endpoint: { url: k, properties: n, headers: n }, type: e },
|
|
117
|
+
],
|
|
118
|
+
type: f,
|
|
119
|
+
},
|
|
120
|
+
],
|
|
121
|
+
type: f,
|
|
122
|
+
},
|
|
123
|
+
{
|
|
124
|
+
rules: [
|
|
125
|
+
{
|
|
126
|
+
conditions: [{ [v]: b, [w]: t }],
|
|
127
|
+
rules: [
|
|
128
|
+
{
|
|
129
|
+
conditions: [{ [v]: "aws.partition", [w]: t, assign: g }],
|
|
130
|
+
rules: [
|
|
131
|
+
{
|
|
132
|
+
conditions: [{ [v]: h, [w]: [o, "aws"] }, p, q],
|
|
133
|
+
endpoint: { url: "https://{Region}.signin.aws.amazon.com", properties: n, headers: n },
|
|
134
|
+
type: e,
|
|
135
|
+
},
|
|
136
|
+
{
|
|
137
|
+
conditions: [{ [v]: h, [w]: [o, "aws-cn"] }, p, q],
|
|
138
|
+
endpoint: { url: "https://{Region}.signin.amazonaws.cn", properties: n, headers: n },
|
|
139
|
+
type: e,
|
|
140
|
+
},
|
|
141
|
+
{
|
|
142
|
+
conditions: [{ [v]: h, [w]: [o, "aws-us-gov"] }, p, q],
|
|
143
|
+
endpoint: { url: "https://{Region}.signin.amazonaws-us-gov.com", properties: n, headers: n },
|
|
144
|
+
type: e,
|
|
145
|
+
},
|
|
146
|
+
{
|
|
147
|
+
conditions: [l, m],
|
|
148
|
+
rules: [
|
|
149
|
+
{
|
|
150
|
+
conditions: [{ [v]: c, [w]: [a, r] }, s],
|
|
151
|
+
rules: [
|
|
152
|
+
{
|
|
153
|
+
endpoint: {
|
|
154
|
+
url: "https://signin-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
155
|
+
properties: n,
|
|
156
|
+
headers: n,
|
|
157
|
+
},
|
|
158
|
+
type: e,
|
|
159
|
+
},
|
|
160
|
+
],
|
|
161
|
+
type: f,
|
|
162
|
+
},
|
|
163
|
+
{
|
|
164
|
+
error: "FIPS and DualStack are enabled, but this partition does not support one or both",
|
|
165
|
+
type: d,
|
|
166
|
+
},
|
|
167
|
+
],
|
|
168
|
+
type: f,
|
|
169
|
+
},
|
|
170
|
+
{
|
|
171
|
+
conditions: [l, q],
|
|
172
|
+
rules: [
|
|
173
|
+
{
|
|
174
|
+
conditions: [{ [v]: c, [w]: [r, a] }],
|
|
175
|
+
rules: [
|
|
176
|
+
{
|
|
177
|
+
endpoint: {
|
|
178
|
+
url: "https://signin-fips.{Region}.{PartitionResult#dnsSuffix}",
|
|
179
|
+
properties: n,
|
|
180
|
+
headers: n,
|
|
181
|
+
},
|
|
182
|
+
type: e,
|
|
183
|
+
},
|
|
184
|
+
],
|
|
185
|
+
type: f,
|
|
186
|
+
},
|
|
187
|
+
{ error: "FIPS is enabled but this partition does not support FIPS", type: d },
|
|
188
|
+
],
|
|
189
|
+
type: f,
|
|
190
|
+
},
|
|
191
|
+
{
|
|
192
|
+
conditions: [p, m],
|
|
193
|
+
rules: [
|
|
194
|
+
{
|
|
195
|
+
conditions: [s],
|
|
196
|
+
rules: [
|
|
197
|
+
{
|
|
198
|
+
endpoint: {
|
|
199
|
+
url: "https://signin.{Region}.{PartitionResult#dualStackDnsSuffix}",
|
|
200
|
+
properties: n,
|
|
201
|
+
headers: n,
|
|
202
|
+
},
|
|
203
|
+
type: e,
|
|
204
|
+
},
|
|
205
|
+
],
|
|
206
|
+
type: f,
|
|
207
|
+
},
|
|
208
|
+
{ error: "DualStack is enabled but this partition does not support DualStack", type: d },
|
|
209
|
+
],
|
|
210
|
+
type: f,
|
|
211
|
+
},
|
|
212
|
+
{
|
|
213
|
+
endpoint: { url: "https://signin.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n },
|
|
214
|
+
type: e,
|
|
215
|
+
},
|
|
216
|
+
],
|
|
217
|
+
type: f,
|
|
218
|
+
},
|
|
219
|
+
],
|
|
220
|
+
type: f,
|
|
221
|
+
},
|
|
222
|
+
{ error: "Invalid Configuration: Missing Region", type: d },
|
|
223
|
+
],
|
|
224
|
+
type: f,
|
|
225
|
+
},
|
|
226
|
+
],
|
|
227
|
+
};
|
|
102
228
|
exports.ruleSet = _data;
|
|
103
229
|
|
|
104
230
|
|
|
@@ -107,7 +233,6 @@ exports.ruleSet = _data;
|
|
|
107
233
|
/***/ 99762:
|
|
108
234
|
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
109
235
|
|
|
110
|
-
var __webpack_unused_export__;
|
|
111
236
|
|
|
112
237
|
|
|
113
238
|
var middlewareHostHeader = __webpack_require__(52590);
|
|
@@ -125,6 +250,9 @@ var httpAuthSchemeProvider = __webpack_require__(77709);
|
|
|
125
250
|
var runtimeConfig = __webpack_require__(22836);
|
|
126
251
|
var regionConfigResolver = __webpack_require__(36463);
|
|
127
252
|
var protocolHttp = __webpack_require__(72356);
|
|
253
|
+
var schemas_0 = __webpack_require__(60890);
|
|
254
|
+
var errors = __webpack_require__(27214);
|
|
255
|
+
var SigninServiceException = __webpack_require__(42831);
|
|
128
256
|
|
|
129
257
|
const resolveClientEndpointParameters = (options) => {
|
|
130
258
|
return Object.assign(options, {
|
|
@@ -220,14 +348,92 @@ class SigninClient extends smithyClient.Client {
|
|
|
220
348
|
}
|
|
221
349
|
}
|
|
222
350
|
|
|
223
|
-
class
|
|
351
|
+
class CreateOAuth2TokenCommand extends smithyClient.Command
|
|
352
|
+
.classBuilder()
|
|
353
|
+
.ep(commonParams)
|
|
354
|
+
.m(function (Command, cs, config, o) {
|
|
355
|
+
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
356
|
+
})
|
|
357
|
+
.s("Signin", "CreateOAuth2Token", {})
|
|
358
|
+
.n("SigninClient", "CreateOAuth2TokenCommand")
|
|
359
|
+
.sc(schemas_0.CreateOAuth2Token$)
|
|
360
|
+
.build() {
|
|
361
|
+
}
|
|
362
|
+
|
|
363
|
+
const commands = {
|
|
364
|
+
CreateOAuth2TokenCommand,
|
|
365
|
+
};
|
|
366
|
+
class Signin extends SigninClient {
|
|
367
|
+
}
|
|
368
|
+
smithyClient.createAggregatedClient(commands, Signin);
|
|
369
|
+
|
|
370
|
+
const OAuth2ErrorCode = {
|
|
371
|
+
AUTHCODE_EXPIRED: "AUTHCODE_EXPIRED",
|
|
372
|
+
INSUFFICIENT_PERMISSIONS: "INSUFFICIENT_PERMISSIONS",
|
|
373
|
+
INVALID_REQUEST: "INVALID_REQUEST",
|
|
374
|
+
SERVER_ERROR: "server_error",
|
|
375
|
+
TOKEN_EXPIRED: "TOKEN_EXPIRED",
|
|
376
|
+
USER_CREDENTIALS_CHANGED: "USER_CREDENTIALS_CHANGED",
|
|
377
|
+
};
|
|
378
|
+
|
|
379
|
+
exports.$Command = smithyClient.Command;
|
|
380
|
+
exports.__Client = smithyClient.Client;
|
|
381
|
+
exports.SigninServiceException = SigninServiceException.SigninServiceException;
|
|
382
|
+
exports.CreateOAuth2TokenCommand = CreateOAuth2TokenCommand;
|
|
383
|
+
exports.OAuth2ErrorCode = OAuth2ErrorCode;
|
|
384
|
+
exports.Signin = Signin;
|
|
385
|
+
exports.SigninClient = SigninClient;
|
|
386
|
+
Object.prototype.hasOwnProperty.call(schemas_0, '__proto__') &&
|
|
387
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
388
|
+
Object.defineProperty(exports, '__proto__', {
|
|
389
|
+
enumerable: true,
|
|
390
|
+
value: schemas_0['__proto__']
|
|
391
|
+
});
|
|
392
|
+
|
|
393
|
+
Object.keys(schemas_0).forEach(function (k) {
|
|
394
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = schemas_0[k];
|
|
395
|
+
});
|
|
396
|
+
Object.prototype.hasOwnProperty.call(errors, '__proto__') &&
|
|
397
|
+
!Object.prototype.hasOwnProperty.call(exports, '__proto__') &&
|
|
398
|
+
Object.defineProperty(exports, '__proto__', {
|
|
399
|
+
enumerable: true,
|
|
400
|
+
value: errors['__proto__']
|
|
401
|
+
});
|
|
402
|
+
|
|
403
|
+
Object.keys(errors).forEach(function (k) {
|
|
404
|
+
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) exports[k] = errors[k];
|
|
405
|
+
});
|
|
406
|
+
|
|
407
|
+
|
|
408
|
+
/***/ }),
|
|
409
|
+
|
|
410
|
+
/***/ 42831:
|
|
411
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
412
|
+
|
|
413
|
+
|
|
414
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
415
|
+
exports.SigninServiceException = exports.__ServiceException = void 0;
|
|
416
|
+
const smithy_client_1 = __webpack_require__(61411);
|
|
417
|
+
Object.defineProperty(exports, "__ServiceException", ({ enumerable: true, get: function () { return smithy_client_1.ServiceException; } }));
|
|
418
|
+
class SigninServiceException extends smithy_client_1.ServiceException {
|
|
224
419
|
constructor(options) {
|
|
225
420
|
super(options);
|
|
226
421
|
Object.setPrototypeOf(this, SigninServiceException.prototype);
|
|
227
422
|
}
|
|
228
423
|
}
|
|
424
|
+
exports.SigninServiceException = SigninServiceException;
|
|
425
|
+
|
|
426
|
+
|
|
427
|
+
/***/ }),
|
|
428
|
+
|
|
429
|
+
/***/ 27214:
|
|
430
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
431
|
+
|
|
229
432
|
|
|
230
|
-
|
|
433
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
434
|
+
exports.ValidationException = exports.TooManyRequestsError = exports.InternalServerException = exports.AccessDeniedException = void 0;
|
|
435
|
+
const SigninServiceException_1 = __webpack_require__(42831);
|
|
436
|
+
class AccessDeniedException extends SigninServiceException_1.SigninServiceException {
|
|
231
437
|
name = "AccessDeniedException";
|
|
232
438
|
$fault = "client";
|
|
233
439
|
error;
|
|
@@ -241,7 +447,8 @@ class AccessDeniedException extends SigninServiceException {
|
|
|
241
447
|
this.error = opts.error;
|
|
242
448
|
}
|
|
243
449
|
}
|
|
244
|
-
|
|
450
|
+
exports.AccessDeniedException = AccessDeniedException;
|
|
451
|
+
class InternalServerException extends SigninServiceException_1.SigninServiceException {
|
|
245
452
|
name = "InternalServerException";
|
|
246
453
|
$fault = "server";
|
|
247
454
|
error;
|
|
@@ -255,7 +462,8 @@ class InternalServerException extends SigninServiceException {
|
|
|
255
462
|
this.error = opts.error;
|
|
256
463
|
}
|
|
257
464
|
}
|
|
258
|
-
|
|
465
|
+
exports.InternalServerException = InternalServerException;
|
|
466
|
+
class TooManyRequestsError extends SigninServiceException_1.SigninServiceException {
|
|
259
467
|
name = "TooManyRequestsError";
|
|
260
468
|
$fault = "client";
|
|
261
469
|
error;
|
|
@@ -269,7 +477,8 @@ class TooManyRequestsError extends SigninServiceException {
|
|
|
269
477
|
this.error = opts.error;
|
|
270
478
|
}
|
|
271
479
|
}
|
|
272
|
-
|
|
480
|
+
exports.TooManyRequestsError = TooManyRequestsError;
|
|
481
|
+
class ValidationException extends SigninServiceException_1.SigninServiceException {
|
|
273
482
|
name = "ValidationException";
|
|
274
483
|
$fault = "client";
|
|
275
484
|
error;
|
|
@@ -283,180 +492,7 @@ class ValidationException extends SigninServiceException {
|
|
|
283
492
|
this.error = opts.error;
|
|
284
493
|
}
|
|
285
494
|
}
|
|
286
|
-
|
|
287
|
-
const _ADE = "AccessDeniedException";
|
|
288
|
-
const _AT = "AccessToken";
|
|
289
|
-
const _COAT = "CreateOAuth2Token";
|
|
290
|
-
const _COATR = "CreateOAuth2TokenRequest";
|
|
291
|
-
const _COATRB = "CreateOAuth2TokenRequestBody";
|
|
292
|
-
const _COATRBr = "CreateOAuth2TokenResponseBody";
|
|
293
|
-
const _COATRr = "CreateOAuth2TokenResponse";
|
|
294
|
-
const _ISE = "InternalServerException";
|
|
295
|
-
const _RT = "RefreshToken";
|
|
296
|
-
const _TMRE = "TooManyRequestsError";
|
|
297
|
-
const _VE = "ValidationException";
|
|
298
|
-
const _aKI = "accessKeyId";
|
|
299
|
-
const _aT = "accessToken";
|
|
300
|
-
const _c = "client";
|
|
301
|
-
const _cI = "clientId";
|
|
302
|
-
const _cV = "codeVerifier";
|
|
303
|
-
const _co = "code";
|
|
304
|
-
const _e = "error";
|
|
305
|
-
const _eI = "expiresIn";
|
|
306
|
-
const _gT = "grantType";
|
|
307
|
-
const _h = "http";
|
|
308
|
-
const _hE = "httpError";
|
|
309
|
-
const _iT = "idToken";
|
|
310
|
-
const _jN = "jsonName";
|
|
311
|
-
const _m = "message";
|
|
312
|
-
const _rT = "refreshToken";
|
|
313
|
-
const _rU = "redirectUri";
|
|
314
|
-
const _s = "server";
|
|
315
|
-
const _sAK = "secretAccessKey";
|
|
316
|
-
const _sT = "sessionToken";
|
|
317
|
-
const _sm = "smithy.ts.sdk.synthetic.com.amazonaws.signin";
|
|
318
|
-
const _tI = "tokenInput";
|
|
319
|
-
const _tO = "tokenOutput";
|
|
320
|
-
const _tT = "tokenType";
|
|
321
|
-
const n0 = "com.amazonaws.signin";
|
|
322
|
-
var RefreshToken = [0, n0, _RT, 8, 0];
|
|
323
|
-
var AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0], 2];
|
|
324
|
-
schema.TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
|
|
325
|
-
var AccessToken$ = [
|
|
326
|
-
3,
|
|
327
|
-
n0,
|
|
328
|
-
_AT,
|
|
329
|
-
8,
|
|
330
|
-
[_aKI, _sAK, _sT],
|
|
331
|
-
[
|
|
332
|
-
[0, { [_jN]: _aKI }],
|
|
333
|
-
[0, { [_jN]: _sAK }],
|
|
334
|
-
[0, { [_jN]: _sT }],
|
|
335
|
-
],
|
|
336
|
-
3,
|
|
337
|
-
];
|
|
338
|
-
var CreateOAuth2TokenRequest$ = [
|
|
339
|
-
3,
|
|
340
|
-
n0,
|
|
341
|
-
_COATR,
|
|
342
|
-
0,
|
|
343
|
-
[_tI],
|
|
344
|
-
[[() => CreateOAuth2TokenRequestBody$, 16]],
|
|
345
|
-
1,
|
|
346
|
-
];
|
|
347
|
-
var CreateOAuth2TokenRequestBody$ = [
|
|
348
|
-
3,
|
|
349
|
-
n0,
|
|
350
|
-
_COATRB,
|
|
351
|
-
0,
|
|
352
|
-
[_cI, _gT, _co, _rU, _cV, _rT],
|
|
353
|
-
[
|
|
354
|
-
[0, { [_jN]: _cI }],
|
|
355
|
-
[0, { [_jN]: _gT }],
|
|
356
|
-
0,
|
|
357
|
-
[0, { [_jN]: _rU }],
|
|
358
|
-
[0, { [_jN]: _cV }],
|
|
359
|
-
[() => RefreshToken, { [_jN]: _rT }],
|
|
360
|
-
],
|
|
361
|
-
2,
|
|
362
|
-
];
|
|
363
|
-
var CreateOAuth2TokenResponse$ = [
|
|
364
|
-
3,
|
|
365
|
-
n0,
|
|
366
|
-
_COATRr,
|
|
367
|
-
0,
|
|
368
|
-
[_tO],
|
|
369
|
-
[[() => CreateOAuth2TokenResponseBody$, 16]],
|
|
370
|
-
1,
|
|
371
|
-
];
|
|
372
|
-
var CreateOAuth2TokenResponseBody$ = [
|
|
373
|
-
3,
|
|
374
|
-
n0,
|
|
375
|
-
_COATRBr,
|
|
376
|
-
0,
|
|
377
|
-
[_aT, _tT, _eI, _rT, _iT],
|
|
378
|
-
[
|
|
379
|
-
[() => AccessToken$, { [_jN]: _aT }],
|
|
380
|
-
[0, { [_jN]: _tT }],
|
|
381
|
-
[1, { [_jN]: _eI }],
|
|
382
|
-
[() => RefreshToken, { [_jN]: _rT }],
|
|
383
|
-
[0, { [_jN]: _iT }],
|
|
384
|
-
],
|
|
385
|
-
4,
|
|
386
|
-
];
|
|
387
|
-
var InternalServerException$ = [-3, n0, _ISE, { [_e]: _s, [_hE]: 500 }, [_e, _m], [0, 0], 2];
|
|
388
|
-
schema.TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
|
|
389
|
-
var TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0], 2];
|
|
390
|
-
schema.TypeRegistry.for(n0).registerError(TooManyRequestsError$, TooManyRequestsError);
|
|
391
|
-
var ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0], 2];
|
|
392
|
-
schema.TypeRegistry.for(n0).registerError(ValidationException$, ValidationException);
|
|
393
|
-
var SigninServiceException$ = [-3, _sm, "SigninServiceException", 0, [], []];
|
|
394
|
-
schema.TypeRegistry.for(_sm).registerError(SigninServiceException$, SigninServiceException);
|
|
395
|
-
var CreateOAuth2Token$ = [
|
|
396
|
-
9,
|
|
397
|
-
n0,
|
|
398
|
-
_COAT,
|
|
399
|
-
{ [_h]: ["POST", "/v1/token", 200] },
|
|
400
|
-
() => CreateOAuth2TokenRequest$,
|
|
401
|
-
() => CreateOAuth2TokenResponse$,
|
|
402
|
-
];
|
|
403
|
-
|
|
404
|
-
class CreateOAuth2TokenCommand extends smithyClient.Command
|
|
405
|
-
.classBuilder()
|
|
406
|
-
.ep(commonParams)
|
|
407
|
-
.m(function (Command, cs, config, o) {
|
|
408
|
-
return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
|
|
409
|
-
})
|
|
410
|
-
.s("Signin", "CreateOAuth2Token", {})
|
|
411
|
-
.n("SigninClient", "CreateOAuth2TokenCommand")
|
|
412
|
-
.sc(CreateOAuth2Token$)
|
|
413
|
-
.build() {
|
|
414
|
-
}
|
|
415
|
-
|
|
416
|
-
const commands = {
|
|
417
|
-
CreateOAuth2TokenCommand,
|
|
418
|
-
};
|
|
419
|
-
class Signin extends SigninClient {
|
|
420
|
-
}
|
|
421
|
-
smithyClient.createAggregatedClient(commands, Signin);
|
|
422
|
-
|
|
423
|
-
const OAuth2ErrorCode = {
|
|
424
|
-
AUTHCODE_EXPIRED: "AUTHCODE_EXPIRED",
|
|
425
|
-
INSUFFICIENT_PERMISSIONS: "INSUFFICIENT_PERMISSIONS",
|
|
426
|
-
INVALID_REQUEST: "INVALID_REQUEST",
|
|
427
|
-
SERVER_ERROR: "server_error",
|
|
428
|
-
TOKEN_EXPIRED: "TOKEN_EXPIRED",
|
|
429
|
-
USER_CREDENTIALS_CHANGED: "USER_CREDENTIALS_CHANGED",
|
|
430
|
-
};
|
|
431
|
-
|
|
432
|
-
__webpack_unused_export__ = ({
|
|
433
|
-
enumerable: true,
|
|
434
|
-
get: function () { return smithyClient.Command; }
|
|
435
|
-
});
|
|
436
|
-
__webpack_unused_export__ = ({
|
|
437
|
-
enumerable: true,
|
|
438
|
-
get: function () { return smithyClient.Client; }
|
|
439
|
-
});
|
|
440
|
-
__webpack_unused_export__ = AccessDeniedException;
|
|
441
|
-
__webpack_unused_export__ = AccessDeniedException$;
|
|
442
|
-
__webpack_unused_export__ = AccessToken$;
|
|
443
|
-
__webpack_unused_export__ = CreateOAuth2Token$;
|
|
444
|
-
exports.CreateOAuth2TokenCommand = CreateOAuth2TokenCommand;
|
|
445
|
-
__webpack_unused_export__ = CreateOAuth2TokenRequest$;
|
|
446
|
-
__webpack_unused_export__ = CreateOAuth2TokenRequestBody$;
|
|
447
|
-
__webpack_unused_export__ = CreateOAuth2TokenResponse$;
|
|
448
|
-
__webpack_unused_export__ = CreateOAuth2TokenResponseBody$;
|
|
449
|
-
__webpack_unused_export__ = InternalServerException;
|
|
450
|
-
__webpack_unused_export__ = InternalServerException$;
|
|
451
|
-
__webpack_unused_export__ = OAuth2ErrorCode;
|
|
452
|
-
__webpack_unused_export__ = Signin;
|
|
453
|
-
exports.SigninClient = SigninClient;
|
|
454
|
-
__webpack_unused_export__ = SigninServiceException;
|
|
455
|
-
__webpack_unused_export__ = SigninServiceException$;
|
|
456
|
-
__webpack_unused_export__ = TooManyRequestsError;
|
|
457
|
-
__webpack_unused_export__ = TooManyRequestsError$;
|
|
458
|
-
__webpack_unused_export__ = ValidationException;
|
|
459
|
-
__webpack_unused_export__ = ValidationException$;
|
|
495
|
+
exports.ValidationException = ValidationException;
|
|
460
496
|
|
|
461
497
|
|
|
462
498
|
/***/ }),
|
|
@@ -469,7 +505,8 @@ Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
|
469
505
|
exports.getRuntimeConfig = void 0;
|
|
470
506
|
const tslib_1 = __webpack_require__(61860);
|
|
471
507
|
const package_json_1 = tslib_1.__importDefault(__webpack_require__(39955));
|
|
472
|
-
const
|
|
508
|
+
const client_1 = __webpack_require__(5152);
|
|
509
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
473
510
|
const util_user_agent_node_1 = __webpack_require__(51656);
|
|
474
511
|
const config_resolver_1 = __webpack_require__(39316);
|
|
475
512
|
const hash_node_1 = __webpack_require__(5092);
|
|
@@ -486,7 +523,7 @@ const getRuntimeConfig = (config) => {
|
|
|
486
523
|
const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
|
|
487
524
|
const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
|
|
488
525
|
const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
|
|
489
|
-
(0,
|
|
526
|
+
(0, client_1.emitWarningIfUnsupportedVersion)(process.version);
|
|
490
527
|
const loaderConfig = {
|
|
491
528
|
profile: config?.profile,
|
|
492
529
|
logger: clientSharedValues.logger,
|
|
@@ -496,7 +533,7 @@ const getRuntimeConfig = (config) => {
|
|
|
496
533
|
...config,
|
|
497
534
|
runtime: "node",
|
|
498
535
|
defaultsMode,
|
|
499
|
-
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(
|
|
536
|
+
authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(httpAuthSchemes_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
|
|
500
537
|
bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
|
|
501
538
|
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
502
539
|
(0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
@@ -527,15 +564,16 @@ exports.getRuntimeConfig = getRuntimeConfig;
|
|
|
527
564
|
|
|
528
565
|
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
529
566
|
exports.getRuntimeConfig = void 0;
|
|
530
|
-
const
|
|
567
|
+
const httpAuthSchemes_1 = __webpack_require__(97523);
|
|
531
568
|
const protocols_1 = __webpack_require__(37288);
|
|
532
|
-
const
|
|
569
|
+
const core_1 = __webpack_require__(90402);
|
|
533
570
|
const smithy_client_1 = __webpack_require__(61411);
|
|
534
571
|
const url_parser_1 = __webpack_require__(14494);
|
|
535
572
|
const util_base64_1 = __webpack_require__(68385);
|
|
536
573
|
const util_utf8_1 = __webpack_require__(71577);
|
|
537
574
|
const httpAuthSchemeProvider_1 = __webpack_require__(77709);
|
|
538
575
|
const endpointResolver_1 = __webpack_require__(12547);
|
|
576
|
+
const schemas_0_1 = __webpack_require__(60890);
|
|
539
577
|
const getRuntimeConfig = (config) => {
|
|
540
578
|
return {
|
|
541
579
|
apiVersion: "2023-01-01",
|
|
@@ -549,18 +587,19 @@ const getRuntimeConfig = (config) => {
|
|
|
549
587
|
{
|
|
550
588
|
schemeId: "aws.auth#sigv4",
|
|
551
589
|
identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
|
|
552
|
-
signer: new
|
|
590
|
+
signer: new httpAuthSchemes_1.AwsSdkSigV4Signer(),
|
|
553
591
|
},
|
|
554
592
|
{
|
|
555
593
|
schemeId: "smithy.api#noAuth",
|
|
556
594
|
identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
|
|
557
|
-
signer: new
|
|
595
|
+
signer: new core_1.NoAuthSigner(),
|
|
558
596
|
},
|
|
559
597
|
],
|
|
560
598
|
logger: config?.logger ?? new smithy_client_1.NoOpLogger(),
|
|
561
599
|
protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
|
|
562
600
|
protocolSettings: config?.protocolSettings ?? {
|
|
563
601
|
defaultNamespace: "com.amazonaws.signin",
|
|
602
|
+
errorTypeRegistries: schemas_0_1.errorTypeRegistries,
|
|
564
603
|
version: "2023-01-01",
|
|
565
604
|
serviceTarget: "Signin",
|
|
566
605
|
},
|
|
@@ -573,12 +612,144 @@ const getRuntimeConfig = (config) => {
|
|
|
573
612
|
exports.getRuntimeConfig = getRuntimeConfig;
|
|
574
613
|
|
|
575
614
|
|
|
615
|
+
/***/ }),
|
|
616
|
+
|
|
617
|
+
/***/ 60890:
|
|
618
|
+
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
|
619
|
+
|
|
620
|
+
|
|
621
|
+
Object.defineProperty(exports, "__esModule", ({ value: true }));
|
|
622
|
+
exports.CreateOAuth2Token$ = exports.CreateOAuth2TokenResponseBody$ = exports.CreateOAuth2TokenResponse$ = exports.CreateOAuth2TokenRequestBody$ = exports.CreateOAuth2TokenRequest$ = exports.AccessToken$ = exports.errorTypeRegistries = exports.ValidationException$ = exports.TooManyRequestsError$ = exports.InternalServerException$ = exports.AccessDeniedException$ = exports.SigninServiceException$ = void 0;
|
|
623
|
+
const _ADE = "AccessDeniedException";
|
|
624
|
+
const _AT = "AccessToken";
|
|
625
|
+
const _COAT = "CreateOAuth2Token";
|
|
626
|
+
const _COATR = "CreateOAuth2TokenRequest";
|
|
627
|
+
const _COATRB = "CreateOAuth2TokenRequestBody";
|
|
628
|
+
const _COATRBr = "CreateOAuth2TokenResponseBody";
|
|
629
|
+
const _COATRr = "CreateOAuth2TokenResponse";
|
|
630
|
+
const _ISE = "InternalServerException";
|
|
631
|
+
const _RT = "RefreshToken";
|
|
632
|
+
const _TMRE = "TooManyRequestsError";
|
|
633
|
+
const _VE = "ValidationException";
|
|
634
|
+
const _aKI = "accessKeyId";
|
|
635
|
+
const _aT = "accessToken";
|
|
636
|
+
const _c = "client";
|
|
637
|
+
const _cI = "clientId";
|
|
638
|
+
const _cV = "codeVerifier";
|
|
639
|
+
const _co = "code";
|
|
640
|
+
const _e = "error";
|
|
641
|
+
const _eI = "expiresIn";
|
|
642
|
+
const _gT = "grantType";
|
|
643
|
+
const _h = "http";
|
|
644
|
+
const _hE = "httpError";
|
|
645
|
+
const _iT = "idToken";
|
|
646
|
+
const _jN = "jsonName";
|
|
647
|
+
const _m = "message";
|
|
648
|
+
const _rT = "refreshToken";
|
|
649
|
+
const _rU = "redirectUri";
|
|
650
|
+
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.signin";
|
|
651
|
+
const _sAK = "secretAccessKey";
|
|
652
|
+
const _sT = "sessionToken";
|
|
653
|
+
const _se = "server";
|
|
654
|
+
const _tI = "tokenInput";
|
|
655
|
+
const _tO = "tokenOutput";
|
|
656
|
+
const _tT = "tokenType";
|
|
657
|
+
const n0 = "com.amazonaws.signin";
|
|
658
|
+
const schema_1 = __webpack_require__(26890);
|
|
659
|
+
const errors_1 = __webpack_require__(27214);
|
|
660
|
+
const SigninServiceException_1 = __webpack_require__(42831);
|
|
661
|
+
const _s_registry = schema_1.TypeRegistry.for(_s);
|
|
662
|
+
exports.SigninServiceException$ = [-3, _s, "SigninServiceException", 0, [], []];
|
|
663
|
+
_s_registry.registerError(exports.SigninServiceException$, SigninServiceException_1.SigninServiceException);
|
|
664
|
+
const n0_registry = schema_1.TypeRegistry.for(n0);
|
|
665
|
+
exports.AccessDeniedException$ = [-3, n0, _ADE, { [_e]: _c }, [_e, _m], [0, 0], 2];
|
|
666
|
+
n0_registry.registerError(exports.AccessDeniedException$, errors_1.AccessDeniedException);
|
|
667
|
+
exports.InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _m], [0, 0], 2];
|
|
668
|
+
n0_registry.registerError(exports.InternalServerException$, errors_1.InternalServerException);
|
|
669
|
+
exports.TooManyRequestsError$ = [-3, n0, _TMRE, { [_e]: _c, [_hE]: 429 }, [_e, _m], [0, 0], 2];
|
|
670
|
+
n0_registry.registerError(exports.TooManyRequestsError$, errors_1.TooManyRequestsError);
|
|
671
|
+
exports.ValidationException$ = [-3, n0, _VE, { [_e]: _c, [_hE]: 400 }, [_e, _m], [0, 0], 2];
|
|
672
|
+
n0_registry.registerError(exports.ValidationException$, errors_1.ValidationException);
|
|
673
|
+
exports.errorTypeRegistries = [_s_registry, n0_registry];
|
|
674
|
+
var RefreshToken = [0, n0, _RT, 8, 0];
|
|
675
|
+
exports.AccessToken$ = [
|
|
676
|
+
3,
|
|
677
|
+
n0,
|
|
678
|
+
_AT,
|
|
679
|
+
8,
|
|
680
|
+
[_aKI, _sAK, _sT],
|
|
681
|
+
[
|
|
682
|
+
[0, { [_jN]: _aKI }],
|
|
683
|
+
[0, { [_jN]: _sAK }],
|
|
684
|
+
[0, { [_jN]: _sT }],
|
|
685
|
+
],
|
|
686
|
+
3,
|
|
687
|
+
];
|
|
688
|
+
exports.CreateOAuth2TokenRequest$ = [
|
|
689
|
+
3,
|
|
690
|
+
n0,
|
|
691
|
+
_COATR,
|
|
692
|
+
0,
|
|
693
|
+
[_tI],
|
|
694
|
+
[[() => exports.CreateOAuth2TokenRequestBody$, 16]],
|
|
695
|
+
1,
|
|
696
|
+
];
|
|
697
|
+
exports.CreateOAuth2TokenRequestBody$ = [
|
|
698
|
+
3,
|
|
699
|
+
n0,
|
|
700
|
+
_COATRB,
|
|
701
|
+
0,
|
|
702
|
+
[_cI, _gT, _co, _rU, _cV, _rT],
|
|
703
|
+
[
|
|
704
|
+
[0, { [_jN]: _cI }],
|
|
705
|
+
[0, { [_jN]: _gT }],
|
|
706
|
+
0,
|
|
707
|
+
[0, { [_jN]: _rU }],
|
|
708
|
+
[0, { [_jN]: _cV }],
|
|
709
|
+
[() => RefreshToken, { [_jN]: _rT }],
|
|
710
|
+
],
|
|
711
|
+
2,
|
|
712
|
+
];
|
|
713
|
+
exports.CreateOAuth2TokenResponse$ = [
|
|
714
|
+
3,
|
|
715
|
+
n0,
|
|
716
|
+
_COATRr,
|
|
717
|
+
0,
|
|
718
|
+
[_tO],
|
|
719
|
+
[[() => exports.CreateOAuth2TokenResponseBody$, 16]],
|
|
720
|
+
1,
|
|
721
|
+
];
|
|
722
|
+
exports.CreateOAuth2TokenResponseBody$ = [
|
|
723
|
+
3,
|
|
724
|
+
n0,
|
|
725
|
+
_COATRBr,
|
|
726
|
+
0,
|
|
727
|
+
[_aT, _tT, _eI, _rT, _iT],
|
|
728
|
+
[
|
|
729
|
+
[() => exports.AccessToken$, { [_jN]: _aT }],
|
|
730
|
+
[0, { [_jN]: _tT }],
|
|
731
|
+
[1, { [_jN]: _eI }],
|
|
732
|
+
[() => RefreshToken, { [_jN]: _rT }],
|
|
733
|
+
[0, { [_jN]: _iT }],
|
|
734
|
+
],
|
|
735
|
+
4,
|
|
736
|
+
];
|
|
737
|
+
exports.CreateOAuth2Token$ = [
|
|
738
|
+
9,
|
|
739
|
+
n0,
|
|
740
|
+
_COAT,
|
|
741
|
+
{ [_h]: ["POST", "/v1/token", 200] },
|
|
742
|
+
() => exports.CreateOAuth2TokenRequest$,
|
|
743
|
+
() => exports.CreateOAuth2TokenResponse$,
|
|
744
|
+
];
|
|
745
|
+
|
|
746
|
+
|
|
576
747
|
/***/ }),
|
|
577
748
|
|
|
578
749
|
/***/ 39955:
|
|
579
750
|
/***/ ((module) => {
|
|
580
751
|
|
|
581
|
-
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.
|
|
752
|
+
module.exports = /*#__PURE__*/JSON.parse('{"name":"@aws-sdk/nested-clients","version":"3.996.19","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"yarn g:turbo run build -F=\\"$npm_package_name\\"","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4","clean":"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo","lint":"node ../../scripts/validation/submodules-linter.js --pkg nested-clients","test":"yarn g:vitest run","test:watch":"yarn g:vitest watch"},"engines":{"node":">=20.0.0"},"sideEffects":false,"author":{"name":"AWS SDK for JavaScript Team","url":"https://aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.27","@aws-sdk/middleware-host-header":"^3.972.9","@aws-sdk/middleware-logger":"^3.972.9","@aws-sdk/middleware-recursion-detection":"^3.972.10","@aws-sdk/middleware-user-agent":"^3.972.29","@aws-sdk/region-config-resolver":"^3.972.11","@aws-sdk/types":"^3.973.7","@aws-sdk/util-endpoints":"^3.996.6","@aws-sdk/util-user-agent-browser":"^3.972.9","@aws-sdk/util-user-agent-node":"^3.973.15","@smithy/config-resolver":"^4.4.14","@smithy/core":"^3.23.14","@smithy/fetch-http-handler":"^5.3.16","@smithy/hash-node":"^4.2.13","@smithy/invalid-dependency":"^4.2.13","@smithy/middleware-content-length":"^4.2.13","@smithy/middleware-endpoint":"^4.4.29","@smithy/middleware-retry":"^4.5.0","@smithy/middleware-serde":"^4.2.17","@smithy/middleware-stack":"^4.2.13","@smithy/node-config-provider":"^4.3.13","@smithy/node-http-handler":"^4.5.2","@smithy/protocol-http":"^5.3.13","@smithy/smithy-client":"^4.12.9","@smithy/types":"^4.14.0","@smithy/url-parser":"^4.2.13","@smithy/util-base64":"^4.3.2","@smithy/util-body-length-browser":"^4.2.2","@smithy/util-body-length-node":"^4.2.3","@smithy/util-defaults-mode-browser":"^4.3.45","@smithy/util-defaults-mode-node":"^4.2.49","@smithy/util-endpoints":"^3.3.4","@smithy/util-middleware":"^4.2.13","@smithy/util-retry":"^4.3.0","@smithy/util-utf8":"^4.2.2","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.5":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/cognito-identity/runtimeConfig":"./dist-es/submodules/cognito-identity/runtimeConfig.browser","./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sso/runtimeConfig":"./dist-es/submodules/sso/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submodules/signin/index.js","require":"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{"types":"./dist-types/submodules/cognito-identity/index.d.ts","module":"./dist-es/submodules/cognito-identity/index.js","node":"./dist-cjs/submodules/cognito-identity/index.js","import":"./dist-es/submodules/cognito-identity/index.js","require":"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{"types":"./dist-types/submodules/sso/index.d.ts","module":"./dist-es/submodules/sso/index.js","node":"./dist-cjs/submodules/sso/index.js","import":"./dist-es/submodules/sso/index.js","require":"./dist-cjs/submodules/sso/index.js"}}}');
|
|
582
753
|
|
|
583
754
|
/***/ })
|
|
584
755
|
|