@sisense/mcp-server 0.2.1 → 0.2.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (26) hide show
  1. package/dist/{ai-hspmgr2c.js → ai-qt2rw4p0.js} +999 -959
  2. package/dist/{index-29n08mw7.js → index-0rmh0qta.js} +5 -5
  3. package/dist/{index-er0yspcy.js → index-6vz3bc2n.js} +552 -385
  4. package/dist/{index-vx54d05h.js → index-7ztxzw1b.js} +9 -9
  5. package/dist/{index-tqba2rwh.js → index-86j7fyp7.js} +406 -245
  6. package/dist/{index-p1pxtmwn.js → index-bgbnagw5.js} +18 -20
  7. package/dist/{index-d6843g0v.js → index-jatbeegy.js} +9 -7
  8. package/dist/{index-dxfb3krz.js → index-jgdfekw7.js} +375 -539
  9. package/dist/{index-qdth51hx.js → index-k71wsmah.js} +8 -1
  10. package/dist/{index-atgbxy7h.js → index-mxkgxy04.js} +28981 -27209
  11. package/dist/{index-vrapm0b4.js → index-p5hr1cfd.js} +458 -331
  12. package/dist/{index-dcrjg3fk.js → index-z44fq2x1.js} +3 -2
  13. package/dist/sse-server-0d83pnkk.js +54 -0
  14. package/dist/{sse-server-brx9qtyd.js → sse-server-22mq7fhc.js} +880 -757
  15. package/dist/{sse-server-3e0efmg2.js → sse-server-d3yx2z0r.js} +1845 -1825
  16. package/dist/{sse-server-4jjec4fz.js → sse-server-gcjj2741.js} +2081 -1695
  17. package/dist/{sse-server-rr3dp62e.js → sse-server-kpkj0hbc.js} +22749 -22399
  18. package/dist/{sse-server-36t17nga.js → sse-server-qhqncg7f.js} +3555 -3657
  19. package/dist/{sse-server-txz5g5t0.js → sse-server-rrtgkg21.js} +414 -177
  20. package/dist/{sse-server-nwjjjz6x.js → sse-server-wb2h6nz7.js} +3 -52
  21. package/dist/{sse-server-qj4zxq0f.js → sse-server-zmcz2c17.js} +12 -24
  22. package/dist/sse-server.js +69 -35
  23. package/dist/view.html +609 -544
  24. package/dist/{widget-renderer-66ws3xtk.js → widget-renderer-wjrpnwpy.js} +12 -12
  25. package/package.json +4 -4
  26. package/dist/sse-server-4b60tg0c.js +0 -136
@@ -1,11 +1,8 @@
1
1
  import {
2
- require_package
3
- } from "./sse-server-4b60tg0c.js";
4
- import {
5
- require_dist_cjs as require_dist_cjs6,
2
+ require_dist_cjs as require_dist_cjs7,
6
3
  require_dist_cjs10 as require_dist_cjs16,
7
4
  require_dist_cjs11 as require_dist_cjs17,
8
- require_dist_cjs12 as require_dist_cjs19,
5
+ require_dist_cjs12 as require_dist_cjs18,
9
6
  require_dist_cjs13 as require_dist_cjs20,
10
7
  require_dist_cjs14 as require_dist_cjs21,
11
8
  require_dist_cjs15 as require_dist_cjs22,
@@ -13,34 +10,37 @@ import {
13
10
  require_dist_cjs17 as require_dist_cjs24,
14
11
  require_dist_cjs18 as require_dist_cjs25,
15
12
  require_dist_cjs19 as require_dist_cjs26,
16
- require_dist_cjs2 as require_dist_cjs8,
17
- require_dist_cjs3 as require_dist_cjs9,
18
- require_dist_cjs4 as require_dist_cjs10,
19
- require_dist_cjs5 as require_dist_cjs11,
20
- require_dist_cjs7 as require_dist_cjs12,
13
+ require_dist_cjs2 as require_dist_cjs9,
14
+ require_dist_cjs3 as require_dist_cjs10,
15
+ require_dist_cjs4 as require_dist_cjs11,
16
+ require_dist_cjs5 as require_dist_cjs12,
17
+ require_dist_cjs7 as require_dist_cjs13,
21
18
  require_dist_cjs8 as require_dist_cjs14,
22
19
  require_dist_cjs9 as require_dist_cjs15,
20
+ require_package,
23
21
  require_protocols
24
- } from "./sse-server-4jjec4fz.js";
22
+ } from "./sse-server-gcjj2741.js";
25
23
  import {
26
- require_dist_cjs as require_dist_cjs13,
27
- require_dist_cjs1 as require_dist_cjs18
28
- } from "./sse-server-nwjjjz6x.js";
29
- import"./sse-server-qj4zxq0f.js";
24
+ require_dist_cjs as require_dist_cjs19
25
+ } from "./sse-server-wb2h6nz7.js";
26
+ import"./sse-server-zmcz2c17.js";
30
27
  import {
31
28
  require_dist_cjs as require_dist_cjs2,
32
29
  require_dist_cjs1 as require_dist_cjs4,
33
30
  require_dist_cjs3 as require_dist_cjs5,
34
- require_dist_cjs7,
31
+ require_dist_cjs7 as require_dist_cjs8,
35
32
  require_schema,
36
33
  require_tslib
37
- } from "./sse-server-txz5g5t0.js";
34
+ } from "./sse-server-rrtgkg21.js";
38
35
  import {
39
36
  require_dist_cjs
40
37
  } from "./sse-server-epd916s3.js";
41
38
  import {
42
39
  require_dist_cjs2 as require_dist_cjs3
43
40
  } from "./sse-server-5tmgacdx.js";
41
+ import {
42
+ require_dist_cjs as require_dist_cjs6
43
+ } from "./sse-server-0d83pnkk.js";
44
44
  import"./sse-server-4g9za0qq.js";
45
45
  import"./sse-server-mkesh468.js";
46
46
  import"./sse-server-3343e7xh.js";
@@ -52,7 +52,7 @@ import {
52
52
  var require_httpAuthSchemeProvider = __commonJS((exports) => {
53
53
  Object.defineProperty(exports, "__esModule", { value: true });
54
54
  exports.resolveHttpAuthSchemeConfig = exports.defaultSSOOIDCHttpAuthSchemeProvider = exports.defaultSSOOIDCHttpAuthSchemeParametersProvider = undefined;
55
- var core_1 = require_dist_cjs8();
55
+ var core_1 = require_dist_cjs9();
56
56
  var util_middleware_1 = require_dist_cjs2();
57
57
  var defaultSSOOIDCHttpAuthSchemeParametersProvider = async (config, context, input) => {
58
58
  return {
@@ -134,7 +134,106 @@ var require_ruleset = __commonJS((exports) => {
134
134
  var r = [l];
135
135
  var s = [m];
136
136
  var t = [{ [x]: "Region" }];
137
- var _data = { version: "1.0", parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i }, rules: [{ conditions: [{ [v]: b, [w]: [k] }], rules: [{ conditions: r, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d }, { conditions: s, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d }, { endpoint: { url: k, properties: n, headers: n }, type: e }], type: f }, { conditions: [{ [v]: b, [w]: t }], rules: [{ conditions: [{ [v]: "aws.partition", [w]: t, assign: g }], rules: [{ conditions: [l, m], rules: [{ conditions: [{ [v]: c, [w]: [a, o] }, q], rules: [{ endpoint: { url: "https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d }], type: f }, { conditions: r, rules: [{ conditions: [{ [v]: c, [w]: [o, a] }], rules: [{ conditions: [{ [v]: "stringEquals", [w]: [{ [v]: h, [w]: [p, "name"] }, "aws-us-gov"] }], endpoint: { url: "https://oidc.{Region}.amazonaws.com", properties: n, headers: n }, type: e }, { endpoint: { url: "https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "FIPS is enabled but this partition does not support FIPS", type: d }], type: f }, { conditions: s, rules: [{ conditions: [q], rules: [{ endpoint: { url: "https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: n, headers: n }, type: e }], type: f }, { error: "DualStack is enabled but this partition does not support DualStack", type: d }], type: f }, { endpoint: { url: "https://oidc.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n }, type: e }], type: f }], type: f }, { error: "Invalid Configuration: Missing Region", type: d }] };
137
+ var _data = {
138
+ version: "1.0",
139
+ parameters: { Region: i, UseDualStack: j, UseFIPS: j, Endpoint: i },
140
+ rules: [
141
+ {
142
+ conditions: [{ [v]: b, [w]: [k] }],
143
+ rules: [
144
+ { conditions: r, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: d },
145
+ { conditions: s, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: d },
146
+ { endpoint: { url: k, properties: n, headers: n }, type: e }
147
+ ],
148
+ type: f
149
+ },
150
+ {
151
+ conditions: [{ [v]: b, [w]: t }],
152
+ rules: [
153
+ {
154
+ conditions: [{ [v]: "aws.partition", [w]: t, assign: g }],
155
+ rules: [
156
+ {
157
+ conditions: [l, m],
158
+ rules: [
159
+ {
160
+ conditions: [{ [v]: c, [w]: [a, o] }, q],
161
+ rules: [
162
+ {
163
+ endpoint: {
164
+ url: "https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",
165
+ properties: n,
166
+ headers: n
167
+ },
168
+ type: e
169
+ }
170
+ ],
171
+ type: f
172
+ },
173
+ { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: d }
174
+ ],
175
+ type: f
176
+ },
177
+ {
178
+ conditions: r,
179
+ rules: [
180
+ {
181
+ conditions: [{ [v]: c, [w]: [o, a] }],
182
+ rules: [
183
+ {
184
+ conditions: [{ [v]: "stringEquals", [w]: [{ [v]: h, [w]: [p, "name"] }, "aws-us-gov"] }],
185
+ endpoint: { url: "https://oidc.{Region}.amazonaws.com", properties: n, headers: n },
186
+ type: e
187
+ },
188
+ {
189
+ endpoint: {
190
+ url: "https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",
191
+ properties: n,
192
+ headers: n
193
+ },
194
+ type: e
195
+ }
196
+ ],
197
+ type: f
198
+ },
199
+ { error: "FIPS is enabled but this partition does not support FIPS", type: d }
200
+ ],
201
+ type: f
202
+ },
203
+ {
204
+ conditions: s,
205
+ rules: [
206
+ {
207
+ conditions: [q],
208
+ rules: [
209
+ {
210
+ endpoint: {
211
+ url: "https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",
212
+ properties: n,
213
+ headers: n
214
+ },
215
+ type: e
216
+ }
217
+ ],
218
+ type: f
219
+ },
220
+ { error: "DualStack is enabled but this partition does not support DualStack", type: d }
221
+ ],
222
+ type: f
223
+ },
224
+ {
225
+ endpoint: { url: "https://oidc.{Region}.{PartitionResult#dnsSuffix}", properties: n, headers: n },
226
+ type: e
227
+ }
228
+ ],
229
+ type: f
230
+ }
231
+ ],
232
+ type: f
233
+ },
234
+ { error: "Invalid Configuration: Missing Region", type: d }
235
+ ]
236
+ };
138
237
  exports.ruleSet = _data;
139
238
  });
140
239
 
@@ -143,7 +242,7 @@ var require_endpointResolver = __commonJS((exports) => {
143
242
  Object.defineProperty(exports, "__esModule", { value: true });
144
243
  exports.defaultEndpointResolver = undefined;
145
244
  var util_endpoints_1 = require_dist_cjs14();
146
- var util_endpoints_2 = require_dist_cjs12();
245
+ var util_endpoints_2 = require_dist_cjs13();
147
246
  var ruleset_1 = require_ruleset();
148
247
  var cache = new util_endpoints_2.EndpointCache({
149
248
  size: 50,
@@ -159,225 +258,31 @@ var require_endpointResolver = __commonJS((exports) => {
159
258
  util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunctions;
160
259
  });
161
260
 
162
- // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/runtimeConfig.shared.js
163
- var require_runtimeConfig_shared = __commonJS((exports) => {
261
+ // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/models/SSOOIDCServiceException.js
262
+ var require_SSOOIDCServiceException = __commonJS((exports) => {
164
263
  Object.defineProperty(exports, "__esModule", { value: true });
165
- exports.getRuntimeConfig = undefined;
166
- var core_1 = require_dist_cjs8();
167
- var protocols_1 = require_protocols();
168
- var core_2 = require_dist_cjs6();
169
- var smithy_client_1 = require_dist_cjs7();
170
- var url_parser_1 = require_dist_cjs13();
171
- var util_base64_1 = require_dist_cjs4();
172
- var util_utf8_1 = require_dist_cjs3();
173
- var httpAuthSchemeProvider_1 = require_httpAuthSchemeProvider();
174
- var endpointResolver_1 = require_endpointResolver();
175
- var getRuntimeConfig = (config) => {
176
- return {
177
- apiVersion: "2019-06-10",
178
- base64Decoder: config?.base64Decoder ?? util_base64_1.fromBase64,
179
- base64Encoder: config?.base64Encoder ?? util_base64_1.toBase64,
180
- disableHostPrefix: config?.disableHostPrefix ?? false,
181
- endpointProvider: config?.endpointProvider ?? endpointResolver_1.defaultEndpointResolver,
182
- extensions: config?.extensions ?? [],
183
- httpAuthSchemeProvider: config?.httpAuthSchemeProvider ?? httpAuthSchemeProvider_1.defaultSSOOIDCHttpAuthSchemeProvider,
184
- httpAuthSchemes: config?.httpAuthSchemes ?? [
185
- {
186
- schemeId: "aws.auth#sigv4",
187
- identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
188
- signer: new core_1.AwsSdkSigV4Signer
189
- },
190
- {
191
- schemeId: "smithy.api#noAuth",
192
- identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
193
- signer: new core_2.NoAuthSigner
194
- }
195
- ],
196
- logger: config?.logger ?? new smithy_client_1.NoOpLogger,
197
- protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
198
- protocolSettings: config?.protocolSettings ?? {
199
- defaultNamespace: "com.amazonaws.ssooidc",
200
- version: "2019-06-10",
201
- serviceTarget: "AWSSSOOIDCService"
202
- },
203
- serviceId: config?.serviceId ?? "SSO OIDC",
204
- urlParser: config?.urlParser ?? url_parser_1.parseUrl,
205
- utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
206
- utf8Encoder: config?.utf8Encoder ?? util_utf8_1.toUtf8
207
- };
208
- };
209
- exports.getRuntimeConfig = getRuntimeConfig;
210
- });
264
+ exports.SSOOIDCServiceException = exports.__ServiceException = undefined;
265
+ var smithy_client_1 = require_dist_cjs8();
266
+ Object.defineProperty(exports, "__ServiceException", { enumerable: true, get: function() {
267
+ return smithy_client_1.ServiceException;
268
+ } });
211
269
 
212
- // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/runtimeConfig.js
213
- var require_runtimeConfig = __commonJS((exports) => {
214
- Object.defineProperty(exports, "__esModule", { value: true });
215
- exports.getRuntimeConfig = undefined;
216
- var tslib_1 = require_tslib();
217
- var package_json_1 = tslib_1.__importDefault(require_package());
218
- var core_1 = require_dist_cjs8();
219
- var util_user_agent_node_1 = require_dist_cjs22();
220
- var config_resolver_1 = require_dist_cjs16();
221
- var hash_node_1 = require_dist_cjs23();
222
- var middleware_retry_1 = require_dist_cjs21();
223
- var node_config_provider_1 = require_dist_cjs18();
224
- var node_http_handler_1 = require_dist_cjs5();
225
- var smithy_client_1 = require_dist_cjs7();
226
- var util_body_length_node_1 = require_dist_cjs24();
227
- var util_defaults_mode_node_1 = require_dist_cjs25();
228
- var util_retry_1 = require_dist_cjs20();
229
- var runtimeConfig_shared_1 = require_runtimeConfig_shared();
230
- var getRuntimeConfig = (config) => {
231
- (0, smithy_client_1.emitWarningIfUnsupportedVersion)(process.version);
232
- const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
233
- const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
234
- const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
235
- (0, core_1.emitWarningIfUnsupportedVersion)(process.version);
236
- const loaderConfig = {
237
- profile: config?.profile,
238
- logger: clientSharedValues.logger
239
- };
240
- return {
241
- ...clientSharedValues,
242
- ...config,
243
- runtime: "node",
244
- defaultsMode,
245
- authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
246
- bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
247
- defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
248
- maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
249
- region: config?.region ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
250
- requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
251
- retryMode: config?.retryMode ?? (0, node_config_provider_1.loadConfig)({
252
- ...middleware_retry_1.NODE_RETRY_MODE_CONFIG_OPTIONS,
253
- default: async () => (await defaultConfigProvider()).retryMode || util_retry_1.DEFAULT_RETRY_MODE
254
- }, config),
255
- sha256: config?.sha256 ?? hash_node_1.Hash.bind(null, "sha256"),
256
- streamCollector: config?.streamCollector ?? node_http_handler_1.streamCollector,
257
- useDualstackEndpoint: config?.useDualstackEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
258
- useFipsEndpoint: config?.useFipsEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
259
- userAgentAppId: config?.userAgentAppId ?? (0, node_config_provider_1.loadConfig)(util_user_agent_node_1.NODE_APP_ID_CONFIG_OPTIONS, loaderConfig)
260
- };
261
- };
262
- exports.getRuntimeConfig = getRuntimeConfig;
263
- });
264
-
265
- // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/index.js
266
- var require_sso_oidc = __commonJS((exports) => {
267
- var middlewareHostHeader = require_dist_cjs9();
268
- var middlewareLogger = require_dist_cjs10();
269
- var middlewareRecursionDetection = require_dist_cjs11();
270
- var middlewareUserAgent = require_dist_cjs15();
271
- var configResolver = require_dist_cjs16();
272
- var core = require_dist_cjs6();
273
- var schema = require_schema();
274
- var middlewareContentLength = require_dist_cjs17();
275
- var middlewareEndpoint = require_dist_cjs19();
276
- var middlewareRetry = require_dist_cjs21();
277
- var smithyClient = require_dist_cjs7();
278
- var httpAuthSchemeProvider = require_httpAuthSchemeProvider();
279
- var runtimeConfig = require_runtimeConfig();
280
- var regionConfigResolver = require_dist_cjs26();
281
- var protocolHttp = require_dist_cjs();
282
- var resolveClientEndpointParameters = (options) => {
283
- return Object.assign(options, {
284
- useDualstackEndpoint: options.useDualstackEndpoint ?? false,
285
- useFipsEndpoint: options.useFipsEndpoint ?? false,
286
- defaultSigningName: "sso-oauth"
287
- });
288
- };
289
- var commonParams = {
290
- UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
291
- Endpoint: { type: "builtInParams", name: "endpoint" },
292
- Region: { type: "builtInParams", name: "region" },
293
- UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" }
294
- };
295
- var getHttpAuthExtensionConfiguration = (runtimeConfig2) => {
296
- const _httpAuthSchemes = runtimeConfig2.httpAuthSchemes;
297
- let _httpAuthSchemeProvider = runtimeConfig2.httpAuthSchemeProvider;
298
- let _credentials = runtimeConfig2.credentials;
299
- return {
300
- setHttpAuthScheme(httpAuthScheme) {
301
- const index = _httpAuthSchemes.findIndex((scheme) => scheme.schemeId === httpAuthScheme.schemeId);
302
- if (index === -1) {
303
- _httpAuthSchemes.push(httpAuthScheme);
304
- } else {
305
- _httpAuthSchemes.splice(index, 1, httpAuthScheme);
306
- }
307
- },
308
- httpAuthSchemes() {
309
- return _httpAuthSchemes;
310
- },
311
- setHttpAuthSchemeProvider(httpAuthSchemeProvider2) {
312
- _httpAuthSchemeProvider = httpAuthSchemeProvider2;
313
- },
314
- httpAuthSchemeProvider() {
315
- return _httpAuthSchemeProvider;
316
- },
317
- setCredentials(credentials) {
318
- _credentials = credentials;
319
- },
320
- credentials() {
321
- return _credentials;
322
- }
323
- };
324
- };
325
- var resolveHttpAuthRuntimeConfig = (config) => {
326
- return {
327
- httpAuthSchemes: config.httpAuthSchemes(),
328
- httpAuthSchemeProvider: config.httpAuthSchemeProvider(),
329
- credentials: config.credentials()
330
- };
331
- };
332
- var resolveRuntimeExtensions = (runtimeConfig2, extensions) => {
333
- const extensionConfiguration = Object.assign(regionConfigResolver.getAwsRegionExtensionConfiguration(runtimeConfig2), smithyClient.getDefaultExtensionConfiguration(runtimeConfig2), protocolHttp.getHttpHandlerExtensionConfiguration(runtimeConfig2), getHttpAuthExtensionConfiguration(runtimeConfig2));
334
- extensions.forEach((extension) => extension.configure(extensionConfiguration));
335
- return Object.assign(runtimeConfig2, regionConfigResolver.resolveAwsRegionExtensionConfiguration(extensionConfiguration), smithyClient.resolveDefaultRuntimeConfig(extensionConfiguration), protocolHttp.resolveHttpHandlerRuntimeConfig(extensionConfiguration), resolveHttpAuthRuntimeConfig(extensionConfiguration));
336
- };
337
-
338
- class SSOOIDCClient extends smithyClient.Client {
339
- config;
340
- constructor(...[configuration]) {
341
- const _config_0 = runtimeConfig.getRuntimeConfig(configuration || {});
342
- super(_config_0);
343
- this.initConfig = _config_0;
344
- const _config_1 = resolveClientEndpointParameters(_config_0);
345
- const _config_2 = middlewareUserAgent.resolveUserAgentConfig(_config_1);
346
- const _config_3 = middlewareRetry.resolveRetryConfig(_config_2);
347
- const _config_4 = configResolver.resolveRegionConfig(_config_3);
348
- const _config_5 = middlewareHostHeader.resolveHostHeaderConfig(_config_4);
349
- const _config_6 = middlewareEndpoint.resolveEndpointConfig(_config_5);
350
- const _config_7 = httpAuthSchemeProvider.resolveHttpAuthSchemeConfig(_config_6);
351
- const _config_8 = resolveRuntimeExtensions(_config_7, configuration?.extensions || []);
352
- this.config = _config_8;
353
- this.middlewareStack.use(schema.getSchemaSerdePlugin(this.config));
354
- this.middlewareStack.use(middlewareUserAgent.getUserAgentPlugin(this.config));
355
- this.middlewareStack.use(middlewareRetry.getRetryPlugin(this.config));
356
- this.middlewareStack.use(middlewareContentLength.getContentLengthPlugin(this.config));
357
- this.middlewareStack.use(middlewareHostHeader.getHostHeaderPlugin(this.config));
358
- this.middlewareStack.use(middlewareLogger.getLoggerPlugin(this.config));
359
- this.middlewareStack.use(middlewareRecursionDetection.getRecursionDetectionPlugin(this.config));
360
- this.middlewareStack.use(core.getHttpAuthSchemeEndpointRuleSetPlugin(this.config, {
361
- httpAuthSchemeParametersProvider: httpAuthSchemeProvider.defaultSSOOIDCHttpAuthSchemeParametersProvider,
362
- identityProviderConfigProvider: async (config) => new core.DefaultIdentityProviderConfig({
363
- "aws.auth#sigv4": config.credentials
364
- })
365
- }));
366
- this.middlewareStack.use(core.getHttpSigningPlugin(this.config));
367
- }
368
- destroy() {
369
- super.destroy();
370
- }
371
- }
372
-
373
- class SSOOIDCServiceException extends smithyClient.ServiceException {
270
+ class SSOOIDCServiceException extends smithy_client_1.ServiceException {
374
271
  constructor(options) {
375
272
  super(options);
376
273
  Object.setPrototypeOf(this, SSOOIDCServiceException.prototype);
377
274
  }
378
275
  }
276
+ exports.SSOOIDCServiceException = SSOOIDCServiceException;
277
+ });
278
+
279
+ // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/models/errors.js
280
+ var require_errors = __commonJS((exports) => {
281
+ Object.defineProperty(exports, "__esModule", { value: true });
282
+ exports.UnsupportedGrantTypeException = exports.UnauthorizedClientException = exports.SlowDownException = exports.InvalidScopeException = exports.InvalidRequestException = exports.InvalidGrantException = exports.InvalidClientException = exports.InternalServerException = exports.ExpiredTokenException = exports.AuthorizationPendingException = exports.AccessDeniedException = undefined;
283
+ var SSOOIDCServiceException_1 = require_SSOOIDCServiceException();
379
284
 
380
- class AccessDeniedException extends SSOOIDCServiceException {
285
+ class AccessDeniedException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
381
286
  name = "AccessDeniedException";
382
287
  $fault = "client";
383
288
  error;
@@ -395,8 +300,9 @@ var require_sso_oidc = __commonJS((exports) => {
395
300
  this.error_description = opts.error_description;
396
301
  }
397
302
  }
303
+ exports.AccessDeniedException = AccessDeniedException;
398
304
 
399
- class AuthorizationPendingException extends SSOOIDCServiceException {
305
+ class AuthorizationPendingException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
400
306
  name = "AuthorizationPendingException";
401
307
  $fault = "client";
402
308
  error;
@@ -412,8 +318,9 @@ var require_sso_oidc = __commonJS((exports) => {
412
318
  this.error_description = opts.error_description;
413
319
  }
414
320
  }
321
+ exports.AuthorizationPendingException = AuthorizationPendingException;
415
322
 
416
- class ExpiredTokenException extends SSOOIDCServiceException {
323
+ class ExpiredTokenException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
417
324
  name = "ExpiredTokenException";
418
325
  $fault = "client";
419
326
  error;
@@ -429,8 +336,9 @@ var require_sso_oidc = __commonJS((exports) => {
429
336
  this.error_description = opts.error_description;
430
337
  }
431
338
  }
339
+ exports.ExpiredTokenException = ExpiredTokenException;
432
340
 
433
- class InternalServerException extends SSOOIDCServiceException {
341
+ class InternalServerException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
434
342
  name = "InternalServerException";
435
343
  $fault = "server";
436
344
  error;
@@ -446,8 +354,9 @@ var require_sso_oidc = __commonJS((exports) => {
446
354
  this.error_description = opts.error_description;
447
355
  }
448
356
  }
357
+ exports.InternalServerException = InternalServerException;
449
358
 
450
- class InvalidClientException extends SSOOIDCServiceException {
359
+ class InvalidClientException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
451
360
  name = "InvalidClientException";
452
361
  $fault = "client";
453
362
  error;
@@ -463,8 +372,9 @@ var require_sso_oidc = __commonJS((exports) => {
463
372
  this.error_description = opts.error_description;
464
373
  }
465
374
  }
375
+ exports.InvalidClientException = InvalidClientException;
466
376
 
467
- class InvalidGrantException extends SSOOIDCServiceException {
377
+ class InvalidGrantException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
468
378
  name = "InvalidGrantException";
469
379
  $fault = "client";
470
380
  error;
@@ -480,8 +390,9 @@ var require_sso_oidc = __commonJS((exports) => {
480
390
  this.error_description = opts.error_description;
481
391
  }
482
392
  }
393
+ exports.InvalidGrantException = InvalidGrantException;
483
394
 
484
- class InvalidRequestException extends SSOOIDCServiceException {
395
+ class InvalidRequestException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
485
396
  name = "InvalidRequestException";
486
397
  $fault = "client";
487
398
  error;
@@ -499,8 +410,9 @@ var require_sso_oidc = __commonJS((exports) => {
499
410
  this.error_description = opts.error_description;
500
411
  }
501
412
  }
413
+ exports.InvalidRequestException = InvalidRequestException;
502
414
 
503
- class InvalidScopeException extends SSOOIDCServiceException {
415
+ class InvalidScopeException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
504
416
  name = "InvalidScopeException";
505
417
  $fault = "client";
506
418
  error;
@@ -516,8 +428,9 @@ var require_sso_oidc = __commonJS((exports) => {
516
428
  this.error_description = opts.error_description;
517
429
  }
518
430
  }
431
+ exports.InvalidScopeException = InvalidScopeException;
519
432
 
520
- class SlowDownException extends SSOOIDCServiceException {
433
+ class SlowDownException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
521
434
  name = "SlowDownException";
522
435
  $fault = "client";
523
436
  error;
@@ -533,8 +446,9 @@ var require_sso_oidc = __commonJS((exports) => {
533
446
  this.error_description = opts.error_description;
534
447
  }
535
448
  }
449
+ exports.SlowDownException = SlowDownException;
536
450
 
537
- class UnauthorizedClientException extends SSOOIDCServiceException {
451
+ class UnauthorizedClientException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
538
452
  name = "UnauthorizedClientException";
539
453
  $fault = "client";
540
454
  error;
@@ -550,8 +464,9 @@ var require_sso_oidc = __commonJS((exports) => {
550
464
  this.error_description = opts.error_description;
551
465
  }
552
466
  }
467
+ exports.UnauthorizedClientException = UnauthorizedClientException;
553
468
 
554
- class UnsupportedGrantTypeException extends SSOOIDCServiceException {
469
+ class UnsupportedGrantTypeException extends SSOOIDCServiceException_1.SSOOIDCServiceException {
555
470
  name = "UnsupportedGrantTypeException";
556
471
  $fault = "client";
557
472
  error;
@@ -567,6 +482,13 @@ var require_sso_oidc = __commonJS((exports) => {
567
482
  this.error_description = opts.error_description;
568
483
  }
569
484
  }
485
+ exports.UnsupportedGrantTypeException = UnsupportedGrantTypeException;
486
+ });
487
+
488
+ // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/schemas/schemas_0.js
489
+ var require_schemas_0 = __commonJS((exports) => {
490
+ Object.defineProperty(exports, "__esModule", { value: true });
491
+ exports.CreateToken$ = exports.CreateTokenResponse$ = exports.CreateTokenRequest$ = exports.errorTypeRegistries = exports.UnsupportedGrantTypeException$ = exports.UnauthorizedClientException$ = exports.SlowDownException$ = exports.InvalidScopeException$ = exports.InvalidRequestException$ = exports.InvalidGrantException$ = exports.InvalidClientException$ = exports.InternalServerException$ = exports.ExpiredTokenException$ = exports.AuthorizationPendingException$ = exports.AccessDeniedException$ = exports.SSOOIDCServiceException$ = undefined;
570
492
  var _ADE = "AccessDeniedException";
571
493
  var _APE = "AuthorizationPendingException";
572
494
  var _AT = "AccessToken";
@@ -603,17 +525,19 @@ var require_sso_oidc = __commonJS((exports) => {
603
525
  var _r = "reason";
604
526
  var _rT = "refreshToken";
605
527
  var _rU = "redirectUri";
606
- var _s = "scope";
528
+ var _s = "smithy.ts.sdk.synthetic.com.amazonaws.ssooidc";
529
+ var _sc = "scope";
607
530
  var _se = "server";
608
- var _sm = "smithy.ts.sdk.synthetic.com.amazonaws.ssooidc";
609
531
  var _tT = "tokenType";
610
532
  var n0 = "com.amazonaws.ssooidc";
611
- var AccessToken = [0, n0, _AT, 8, 0];
612
- var ClientSecret = [0, n0, _CS, 8, 0];
613
- var CodeVerifier = [0, n0, _CV, 8, 0];
614
- var IdToken = [0, n0, _IT, 8, 0];
615
- var RefreshToken = [0, n0, _RT, 8, 0];
616
- var AccessDeniedException$ = [
533
+ var schema_1 = require_schema();
534
+ var errors_1 = require_errors();
535
+ var SSOOIDCServiceException_1 = require_SSOOIDCServiceException();
536
+ var _s_registry = schema_1.TypeRegistry.for(_s);
537
+ exports.SSOOIDCServiceException$ = [-3, _s, "SSOOIDCServiceException", 0, [], []];
538
+ _s_registry.registerError(exports.SSOOIDCServiceException$, SSOOIDCServiceException_1.SSOOIDCServiceException);
539
+ var n0_registry = schema_1.TypeRegistry.for(n0);
540
+ exports.AccessDeniedException$ = [
617
541
  -3,
618
542
  n0,
619
543
  _ADE,
@@ -621,8 +545,8 @@ var require_sso_oidc = __commonJS((exports) => {
621
545
  [_e, _r, _ed],
622
546
  [0, 0, 0]
623
547
  ];
624
- schema.TypeRegistry.for(n0).registerError(AccessDeniedException$, AccessDeniedException);
625
- var AuthorizationPendingException$ = [
548
+ n0_registry.registerError(exports.AccessDeniedException$, errors_1.AccessDeniedException);
549
+ exports.AuthorizationPendingException$ = [
626
550
  -3,
627
551
  n0,
628
552
  _APE,
@@ -630,32 +554,16 @@ var require_sso_oidc = __commonJS((exports) => {
630
554
  [_e, _ed],
631
555
  [0, 0]
632
556
  ];
633
- schema.TypeRegistry.for(n0).registerError(AuthorizationPendingException$, AuthorizationPendingException);
634
- var CreateTokenRequest$ = [
635
- 3,
636
- n0,
637
- _CTR,
638
- 0,
639
- [_cI, _cS, _gT, _dC, _co, _rT, _s, _rU, _cV],
640
- [0, [() => ClientSecret, 0], 0, 0, 0, [() => RefreshToken, 0], 64 | 0, 0, [() => CodeVerifier, 0]]
641
- ];
642
- var CreateTokenResponse$ = [
643
- 3,
644
- n0,
645
- _CTRr,
646
- 0,
647
- [_aT, _tT, _eI, _rT, _iT],
648
- [[() => AccessToken, 0], 0, 1, [() => RefreshToken, 0], [() => IdToken, 0]]
649
- ];
650
- var ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
651
- schema.TypeRegistry.for(n0).registerError(ExpiredTokenException$, ExpiredTokenException);
652
- var InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _ed], [0, 0]];
653
- schema.TypeRegistry.for(n0).registerError(InternalServerException$, InternalServerException);
654
- var InvalidClientException$ = [-3, n0, _ICE, { [_e]: _c, [_hE]: 401 }, [_e, _ed], [0, 0]];
655
- schema.TypeRegistry.for(n0).registerError(InvalidClientException$, InvalidClientException);
656
- var InvalidGrantException$ = [-3, n0, _IGE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
657
- schema.TypeRegistry.for(n0).registerError(InvalidGrantException$, InvalidGrantException);
658
- var InvalidRequestException$ = [
557
+ n0_registry.registerError(exports.AuthorizationPendingException$, errors_1.AuthorizationPendingException);
558
+ exports.ExpiredTokenException$ = [-3, n0, _ETE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
559
+ n0_registry.registerError(exports.ExpiredTokenException$, errors_1.ExpiredTokenException);
560
+ exports.InternalServerException$ = [-3, n0, _ISE, { [_e]: _se, [_hE]: 500 }, [_e, _ed], [0, 0]];
561
+ n0_registry.registerError(exports.InternalServerException$, errors_1.InternalServerException);
562
+ exports.InvalidClientException$ = [-3, n0, _ICE, { [_e]: _c, [_hE]: 401 }, [_e, _ed], [0, 0]];
563
+ n0_registry.registerError(exports.InvalidClientException$, errors_1.InvalidClientException);
564
+ exports.InvalidGrantException$ = [-3, n0, _IGE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
565
+ n0_registry.registerError(exports.InvalidGrantException$, errors_1.InvalidGrantException);
566
+ exports.InvalidRequestException$ = [
659
567
  -3,
660
568
  n0,
661
569
  _IRE,
@@ -663,12 +571,12 @@ var require_sso_oidc = __commonJS((exports) => {
663
571
  [_e, _r, _ed],
664
572
  [0, 0, 0]
665
573
  ];
666
- schema.TypeRegistry.for(n0).registerError(InvalidRequestException$, InvalidRequestException);
667
- var InvalidScopeException$ = [-3, n0, _ISEn, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
668
- schema.TypeRegistry.for(n0).registerError(InvalidScopeException$, InvalidScopeException);
669
- var SlowDownException$ = [-3, n0, _SDE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
670
- schema.TypeRegistry.for(n0).registerError(SlowDownException$, SlowDownException);
671
- var UnauthorizedClientException$ = [
574
+ n0_registry.registerError(exports.InvalidRequestException$, errors_1.InvalidRequestException);
575
+ exports.InvalidScopeException$ = [-3, n0, _ISEn, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
576
+ n0_registry.registerError(exports.InvalidScopeException$, errors_1.InvalidScopeException);
577
+ exports.SlowDownException$ = [-3, n0, _SDE, { [_e]: _c, [_hE]: 400 }, [_e, _ed], [0, 0]];
578
+ n0_registry.registerError(exports.SlowDownException$, errors_1.SlowDownException);
579
+ exports.UnauthorizedClientException$ = [
672
580
  -3,
673
581
  n0,
674
582
  _UCE,
@@ -676,8 +584,8 @@ var require_sso_oidc = __commonJS((exports) => {
676
584
  [_e, _ed],
677
585
  [0, 0]
678
586
  ];
679
- schema.TypeRegistry.for(n0).registerError(UnauthorizedClientException$, UnauthorizedClientException);
680
- var UnsupportedGrantTypeException$ = [
587
+ n0_registry.registerError(exports.UnauthorizedClientException$, errors_1.UnauthorizedClientException);
588
+ exports.UnsupportedGrantTypeException$ = [
681
589
  -3,
682
590
  n0,
683
591
  _UGTE,
@@ -685,21 +593,260 @@ var require_sso_oidc = __commonJS((exports) => {
685
593
  [_e, _ed],
686
594
  [0, 0]
687
595
  ];
688
- schema.TypeRegistry.for(n0).registerError(UnsupportedGrantTypeException$, UnsupportedGrantTypeException);
689
- var SSOOIDCServiceException$ = [-3, _sm, "SSOOIDCServiceException", 0, [], []];
690
- schema.TypeRegistry.for(_sm).registerError(SSOOIDCServiceException$, SSOOIDCServiceException);
691
- var CreateToken$ = [
596
+ n0_registry.registerError(exports.UnsupportedGrantTypeException$, errors_1.UnsupportedGrantTypeException);
597
+ exports.errorTypeRegistries = [_s_registry, n0_registry];
598
+ var AccessToken = [0, n0, _AT, 8, 0];
599
+ var ClientSecret = [0, n0, _CS, 8, 0];
600
+ var CodeVerifier = [0, n0, _CV, 8, 0];
601
+ var IdToken = [0, n0, _IT, 8, 0];
602
+ var RefreshToken = [0, n0, _RT, 8, 0];
603
+ exports.CreateTokenRequest$ = [
604
+ 3,
605
+ n0,
606
+ _CTR,
607
+ 0,
608
+ [_cI, _cS, _gT, _dC, _co, _rT, _sc, _rU, _cV],
609
+ [0, [() => ClientSecret, 0], 0, 0, 0, [() => RefreshToken, 0], 64 | 0, 0, [() => CodeVerifier, 0]],
610
+ 3
611
+ ];
612
+ exports.CreateTokenResponse$ = [
613
+ 3,
614
+ n0,
615
+ _CTRr,
616
+ 0,
617
+ [_aT, _tT, _eI, _rT, _iT],
618
+ [[() => AccessToken, 0], 0, 1, [() => RefreshToken, 0], [() => IdToken, 0]]
619
+ ];
620
+ var Scopes = 64 | 0;
621
+ exports.CreateToken$ = [
692
622
  9,
693
623
  n0,
694
624
  _CT,
695
625
  { [_h]: ["POST", "/token", 200] },
696
- () => CreateTokenRequest$,
697
- () => CreateTokenResponse$
626
+ () => exports.CreateTokenRequest$,
627
+ () => exports.CreateTokenResponse$
698
628
  ];
629
+ });
630
+
631
+ // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/runtimeConfig.shared.js
632
+ var require_runtimeConfig_shared = __commonJS((exports) => {
633
+ Object.defineProperty(exports, "__esModule", { value: true });
634
+ exports.getRuntimeConfig = undefined;
635
+ var core_1 = require_dist_cjs9();
636
+ var protocols_1 = require_protocols();
637
+ var core_2 = require_dist_cjs7();
638
+ var smithy_client_1 = require_dist_cjs8();
639
+ var url_parser_1 = require_dist_cjs6();
640
+ var util_base64_1 = require_dist_cjs4();
641
+ var util_utf8_1 = require_dist_cjs3();
642
+ var httpAuthSchemeProvider_1 = require_httpAuthSchemeProvider();
643
+ var endpointResolver_1 = require_endpointResolver();
644
+ var schemas_0_1 = require_schemas_0();
645
+ var getRuntimeConfig = (config) => {
646
+ return {
647
+ apiVersion: "2019-06-10",
648
+ base64Decoder: config?.base64Decoder ?? util_base64_1.fromBase64,
649
+ base64Encoder: config?.base64Encoder ?? util_base64_1.toBase64,
650
+ disableHostPrefix: config?.disableHostPrefix ?? false,
651
+ endpointProvider: config?.endpointProvider ?? endpointResolver_1.defaultEndpointResolver,
652
+ extensions: config?.extensions ?? [],
653
+ httpAuthSchemeProvider: config?.httpAuthSchemeProvider ?? httpAuthSchemeProvider_1.defaultSSOOIDCHttpAuthSchemeProvider,
654
+ httpAuthSchemes: config?.httpAuthSchemes ?? [
655
+ {
656
+ schemeId: "aws.auth#sigv4",
657
+ identityProvider: (ipc) => ipc.getIdentityProvider("aws.auth#sigv4"),
658
+ signer: new core_1.AwsSdkSigV4Signer
659
+ },
660
+ {
661
+ schemeId: "smithy.api#noAuth",
662
+ identityProvider: (ipc) => ipc.getIdentityProvider("smithy.api#noAuth") || (async () => ({})),
663
+ signer: new core_2.NoAuthSigner
664
+ }
665
+ ],
666
+ logger: config?.logger ?? new smithy_client_1.NoOpLogger,
667
+ protocol: config?.protocol ?? protocols_1.AwsRestJsonProtocol,
668
+ protocolSettings: config?.protocolSettings ?? {
669
+ defaultNamespace: "com.amazonaws.ssooidc",
670
+ errorTypeRegistries: schemas_0_1.errorTypeRegistries,
671
+ version: "2019-06-10",
672
+ serviceTarget: "AWSSSOOIDCService"
673
+ },
674
+ serviceId: config?.serviceId ?? "SSO OIDC",
675
+ urlParser: config?.urlParser ?? url_parser_1.parseUrl,
676
+ utf8Decoder: config?.utf8Decoder ?? util_utf8_1.fromUtf8,
677
+ utf8Encoder: config?.utf8Encoder ?? util_utf8_1.toUtf8
678
+ };
679
+ };
680
+ exports.getRuntimeConfig = getRuntimeConfig;
681
+ });
682
+
683
+ // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/runtimeConfig.js
684
+ var require_runtimeConfig = __commonJS((exports) => {
685
+ Object.defineProperty(exports, "__esModule", { value: true });
686
+ exports.getRuntimeConfig = undefined;
687
+ var tslib_1 = require_tslib();
688
+ var package_json_1 = tslib_1.__importDefault(require_package());
689
+ var core_1 = require_dist_cjs9();
690
+ var util_user_agent_node_1 = require_dist_cjs22();
691
+ var config_resolver_1 = require_dist_cjs17();
692
+ var hash_node_1 = require_dist_cjs23();
693
+ var middleware_retry_1 = require_dist_cjs21();
694
+ var node_config_provider_1 = require_dist_cjs19();
695
+ var node_http_handler_1 = require_dist_cjs5();
696
+ var smithy_client_1 = require_dist_cjs8();
697
+ var util_body_length_node_1 = require_dist_cjs24();
698
+ var util_defaults_mode_node_1 = require_dist_cjs25();
699
+ var util_retry_1 = require_dist_cjs15();
700
+ var runtimeConfig_shared_1 = require_runtimeConfig_shared();
701
+ var getRuntimeConfig = (config) => {
702
+ (0, smithy_client_1.emitWarningIfUnsupportedVersion)(process.version);
703
+ const defaultsMode = (0, util_defaults_mode_node_1.resolveDefaultsModeConfig)(config);
704
+ const defaultConfigProvider = () => defaultsMode().then(smithy_client_1.loadConfigsForDefaultMode);
705
+ const clientSharedValues = (0, runtimeConfig_shared_1.getRuntimeConfig)(config);
706
+ (0, core_1.emitWarningIfUnsupportedVersion)(process.version);
707
+ const loaderConfig = {
708
+ profile: config?.profile,
709
+ logger: clientSharedValues.logger
710
+ };
711
+ return {
712
+ ...clientSharedValues,
713
+ ...config,
714
+ runtime: "node",
715
+ defaultsMode,
716
+ authSchemePreference: config?.authSchemePreference ?? (0, node_config_provider_1.loadConfig)(core_1.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS, loaderConfig),
717
+ bodyLengthChecker: config?.bodyLengthChecker ?? util_body_length_node_1.calculateBodyLength,
718
+ defaultUserAgentProvider: config?.defaultUserAgentProvider ?? (0, util_user_agent_node_1.createDefaultUserAgentProvider)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
719
+ maxAttempts: config?.maxAttempts ?? (0, node_config_provider_1.loadConfig)(middleware_retry_1.NODE_MAX_ATTEMPT_CONFIG_OPTIONS, config),
720
+ region: config?.region ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_REGION_CONFIG_OPTIONS, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, ...loaderConfig }),
721
+ requestHandler: node_http_handler_1.NodeHttpHandler.create(config?.requestHandler ?? defaultConfigProvider),
722
+ retryMode: config?.retryMode ?? (0, node_config_provider_1.loadConfig)({
723
+ ...middleware_retry_1.NODE_RETRY_MODE_CONFIG_OPTIONS,
724
+ default: async () => (await defaultConfigProvider()).retryMode || util_retry_1.DEFAULT_RETRY_MODE
725
+ }, config),
726
+ sha256: config?.sha256 ?? hash_node_1.Hash.bind(null, "sha256"),
727
+ streamCollector: config?.streamCollector ?? node_http_handler_1.streamCollector,
728
+ useDualstackEndpoint: config?.useDualstackEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
729
+ useFipsEndpoint: config?.useFipsEndpoint ?? (0, node_config_provider_1.loadConfig)(config_resolver_1.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, loaderConfig),
730
+ userAgentAppId: config?.userAgentAppId ?? (0, node_config_provider_1.loadConfig)(util_user_agent_node_1.NODE_APP_ID_CONFIG_OPTIONS, loaderConfig)
731
+ };
732
+ };
733
+ exports.getRuntimeConfig = getRuntimeConfig;
734
+ });
735
+
736
+ // node_modules/@aws-sdk/nested-clients/dist-cjs/submodules/sso-oidc/index.js
737
+ var require_sso_oidc = __commonJS((exports) => {
738
+ var middlewareHostHeader = require_dist_cjs10();
739
+ var middlewareLogger = require_dist_cjs11();
740
+ var middlewareRecursionDetection = require_dist_cjs12();
741
+ var middlewareUserAgent = require_dist_cjs16();
742
+ var configResolver = require_dist_cjs17();
743
+ var core = require_dist_cjs7();
744
+ var schema = require_schema();
745
+ var middlewareContentLength = require_dist_cjs18();
746
+ var middlewareEndpoint = require_dist_cjs20();
747
+ var middlewareRetry = require_dist_cjs21();
748
+ var smithyClient = require_dist_cjs8();
749
+ var httpAuthSchemeProvider = require_httpAuthSchemeProvider();
750
+ var runtimeConfig = require_runtimeConfig();
751
+ var regionConfigResolver = require_dist_cjs26();
752
+ var protocolHttp = require_dist_cjs();
753
+ var schemas_0 = require_schemas_0();
754
+ var errors = require_errors();
755
+ var SSOOIDCServiceException = require_SSOOIDCServiceException();
756
+ var resolveClientEndpointParameters = (options) => {
757
+ return Object.assign(options, {
758
+ useDualstackEndpoint: options.useDualstackEndpoint ?? false,
759
+ useFipsEndpoint: options.useFipsEndpoint ?? false,
760
+ defaultSigningName: "sso-oauth"
761
+ });
762
+ };
763
+ var commonParams = {
764
+ UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
765
+ Endpoint: { type: "builtInParams", name: "endpoint" },
766
+ Region: { type: "builtInParams", name: "region" },
767
+ UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" }
768
+ };
769
+ var getHttpAuthExtensionConfiguration = (runtimeConfig2) => {
770
+ const _httpAuthSchemes = runtimeConfig2.httpAuthSchemes;
771
+ let _httpAuthSchemeProvider = runtimeConfig2.httpAuthSchemeProvider;
772
+ let _credentials = runtimeConfig2.credentials;
773
+ return {
774
+ setHttpAuthScheme(httpAuthScheme) {
775
+ const index = _httpAuthSchemes.findIndex((scheme) => scheme.schemeId === httpAuthScheme.schemeId);
776
+ if (index === -1) {
777
+ _httpAuthSchemes.push(httpAuthScheme);
778
+ } else {
779
+ _httpAuthSchemes.splice(index, 1, httpAuthScheme);
780
+ }
781
+ },
782
+ httpAuthSchemes() {
783
+ return _httpAuthSchemes;
784
+ },
785
+ setHttpAuthSchemeProvider(httpAuthSchemeProvider2) {
786
+ _httpAuthSchemeProvider = httpAuthSchemeProvider2;
787
+ },
788
+ httpAuthSchemeProvider() {
789
+ return _httpAuthSchemeProvider;
790
+ },
791
+ setCredentials(credentials) {
792
+ _credentials = credentials;
793
+ },
794
+ credentials() {
795
+ return _credentials;
796
+ }
797
+ };
798
+ };
799
+ var resolveHttpAuthRuntimeConfig = (config) => {
800
+ return {
801
+ httpAuthSchemes: config.httpAuthSchemes(),
802
+ httpAuthSchemeProvider: config.httpAuthSchemeProvider(),
803
+ credentials: config.credentials()
804
+ };
805
+ };
806
+ var resolveRuntimeExtensions = (runtimeConfig2, extensions) => {
807
+ const extensionConfiguration = Object.assign(regionConfigResolver.getAwsRegionExtensionConfiguration(runtimeConfig2), smithyClient.getDefaultExtensionConfiguration(runtimeConfig2), protocolHttp.getHttpHandlerExtensionConfiguration(runtimeConfig2), getHttpAuthExtensionConfiguration(runtimeConfig2));
808
+ extensions.forEach((extension) => extension.configure(extensionConfiguration));
809
+ return Object.assign(runtimeConfig2, regionConfigResolver.resolveAwsRegionExtensionConfiguration(extensionConfiguration), smithyClient.resolveDefaultRuntimeConfig(extensionConfiguration), protocolHttp.resolveHttpHandlerRuntimeConfig(extensionConfiguration), resolveHttpAuthRuntimeConfig(extensionConfiguration));
810
+ };
811
+
812
+ class SSOOIDCClient extends smithyClient.Client {
813
+ config;
814
+ constructor(...[configuration]) {
815
+ const _config_0 = runtimeConfig.getRuntimeConfig(configuration || {});
816
+ super(_config_0);
817
+ this.initConfig = _config_0;
818
+ const _config_1 = resolveClientEndpointParameters(_config_0);
819
+ const _config_2 = middlewareUserAgent.resolveUserAgentConfig(_config_1);
820
+ const _config_3 = middlewareRetry.resolveRetryConfig(_config_2);
821
+ const _config_4 = configResolver.resolveRegionConfig(_config_3);
822
+ const _config_5 = middlewareHostHeader.resolveHostHeaderConfig(_config_4);
823
+ const _config_6 = middlewareEndpoint.resolveEndpointConfig(_config_5);
824
+ const _config_7 = httpAuthSchemeProvider.resolveHttpAuthSchemeConfig(_config_6);
825
+ const _config_8 = resolveRuntimeExtensions(_config_7, configuration?.extensions || []);
826
+ this.config = _config_8;
827
+ this.middlewareStack.use(schema.getSchemaSerdePlugin(this.config));
828
+ this.middlewareStack.use(middlewareUserAgent.getUserAgentPlugin(this.config));
829
+ this.middlewareStack.use(middlewareRetry.getRetryPlugin(this.config));
830
+ this.middlewareStack.use(middlewareContentLength.getContentLengthPlugin(this.config));
831
+ this.middlewareStack.use(middlewareHostHeader.getHostHeaderPlugin(this.config));
832
+ this.middlewareStack.use(middlewareLogger.getLoggerPlugin(this.config));
833
+ this.middlewareStack.use(middlewareRecursionDetection.getRecursionDetectionPlugin(this.config));
834
+ this.middlewareStack.use(core.getHttpAuthSchemeEndpointRuleSetPlugin(this.config, {
835
+ httpAuthSchemeParametersProvider: httpAuthSchemeProvider.defaultSSOOIDCHttpAuthSchemeParametersProvider,
836
+ identityProviderConfigProvider: async (config) => new core.DefaultIdentityProviderConfig({
837
+ "aws.auth#sigv4": config.credentials
838
+ })
839
+ }));
840
+ this.middlewareStack.use(core.getHttpSigningPlugin(this.config));
841
+ }
842
+ destroy() {
843
+ super.destroy();
844
+ }
845
+ }
699
846
 
700
847
  class CreateTokenCommand extends smithyClient.Command.classBuilder().ep(commonParams).m(function(Command, cs, config, o) {
701
848
  return [middlewareEndpoint.getEndpointPlugin(config, Command.getEndpointParameterInstructions())];
702
- }).s("AWSSSOOIDCService", "CreateToken", {}).n("SSOOIDCClient", "CreateTokenCommand").sc(CreateToken$).build() {
849
+ }).s("AWSSSOOIDCService", "CreateToken", {}).n("SSOOIDCClient", "CreateTokenCommand").sc(schemas_0.CreateToken$).build() {
703
850
  }
704
851
  var commands = {
705
852
  CreateTokenCommand
@@ -717,49 +864,29 @@ var require_sso_oidc = __commonJS((exports) => {
717
864
  KMS_INVALID_STATE: "KMS_InvalidStateException",
718
865
  KMS_KEY_NOT_FOUND: "KMS_NotFoundException"
719
866
  };
720
- Object.defineProperty(exports, "$Command", {
721
- enumerable: true,
722
- get: function() {
723
- return smithyClient.Command;
724
- }
725
- });
726
- Object.defineProperty(exports, "__Client", {
727
- enumerable: true,
728
- get: function() {
729
- return smithyClient.Client;
730
- }
731
- });
732
- exports.AccessDeniedException = AccessDeniedException;
733
- exports.AccessDeniedException$ = AccessDeniedException$;
867
+ exports.$Command = smithyClient.Command;
868
+ exports.__Client = smithyClient.Client;
869
+ exports.SSOOIDCServiceException = SSOOIDCServiceException.SSOOIDCServiceException;
734
870
  exports.AccessDeniedExceptionReason = AccessDeniedExceptionReason;
735
- exports.AuthorizationPendingException = AuthorizationPendingException;
736
- exports.AuthorizationPendingException$ = AuthorizationPendingException$;
737
- exports.CreateToken$ = CreateToken$;
738
871
  exports.CreateTokenCommand = CreateTokenCommand;
739
- exports.CreateTokenRequest$ = CreateTokenRequest$;
740
- exports.CreateTokenResponse$ = CreateTokenResponse$;
741
- exports.ExpiredTokenException = ExpiredTokenException;
742
- exports.ExpiredTokenException$ = ExpiredTokenException$;
743
- exports.InternalServerException = InternalServerException;
744
- exports.InternalServerException$ = InternalServerException$;
745
- exports.InvalidClientException = InvalidClientException;
746
- exports.InvalidClientException$ = InvalidClientException$;
747
- exports.InvalidGrantException = InvalidGrantException;
748
- exports.InvalidGrantException$ = InvalidGrantException$;
749
- exports.InvalidRequestException = InvalidRequestException;
750
- exports.InvalidRequestException$ = InvalidRequestException$;
751
872
  exports.InvalidRequestExceptionReason = InvalidRequestExceptionReason;
752
- exports.InvalidScopeException = InvalidScopeException;
753
- exports.InvalidScopeException$ = InvalidScopeException$;
754
873
  exports.SSOOIDC = SSOOIDC;
755
874
  exports.SSOOIDCClient = SSOOIDCClient;
756
- exports.SSOOIDCServiceException = SSOOIDCServiceException;
757
- exports.SSOOIDCServiceException$ = SSOOIDCServiceException$;
758
- exports.SlowDownException = SlowDownException;
759
- exports.SlowDownException$ = SlowDownException$;
760
- exports.UnauthorizedClientException = UnauthorizedClientException;
761
- exports.UnauthorizedClientException$ = UnauthorizedClientException$;
762
- exports.UnsupportedGrantTypeException = UnsupportedGrantTypeException;
763
- exports.UnsupportedGrantTypeException$ = UnsupportedGrantTypeException$;
875
+ Object.prototype.hasOwnProperty.call(schemas_0, "__proto__") && !Object.prototype.hasOwnProperty.call(exports, "__proto__") && Object.defineProperty(exports, "__proto__", {
876
+ enumerable: true,
877
+ value: schemas_0["__proto__"]
878
+ });
879
+ Object.keys(schemas_0).forEach(function(k) {
880
+ if (k !== "default" && !Object.prototype.hasOwnProperty.call(exports, k))
881
+ exports[k] = schemas_0[k];
882
+ });
883
+ Object.prototype.hasOwnProperty.call(errors, "__proto__") && !Object.prototype.hasOwnProperty.call(exports, "__proto__") && Object.defineProperty(exports, "__proto__", {
884
+ enumerable: true,
885
+ value: errors["__proto__"]
886
+ });
887
+ Object.keys(errors).forEach(function(k) {
888
+ if (k !== "default" && !Object.prototype.hasOwnProperty.call(exports, k))
889
+ exports[k] = errors[k];
890
+ });
764
891
  });
765
892
  export default require_sso_oidc();