@slycode/slycode 0.2.10 → 0.2.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (70) hide show
  1. package/dist/web/.next/BUILD_ID +1 -1
  2. package/dist/web/.next/build-manifest.json +2 -2
  3. package/dist/web/.next/server/app/_global-error.html +2 -2
  4. package/dist/web/.next/server/app/_global-error.rsc +1 -1
  5. package/dist/web/.next/server/app/_global-error.segments/__PAGE__.segment.rsc +1 -1
  6. package/dist/web/.next/server/app/_global-error.segments/_full.segment.rsc +1 -1
  7. package/dist/web/.next/server/app/_global-error.segments/_head.segment.rsc +1 -1
  8. package/dist/web/.next/server/app/_global-error.segments/_index.segment.rsc +1 -1
  9. package/dist/web/.next/server/app/_global-error.segments/_tree.segment.rsc +1 -1
  10. package/dist/web/.next/server/app/_not-found/page_client-reference-manifest.js +1 -1
  11. package/dist/web/.next/server/app/_not-found.html +1 -1
  12. package/dist/web/.next/server/app/_not-found.rsc +2 -2
  13. package/dist/web/.next/server/app/_not-found.segments/_full.segment.rsc +2 -2
  14. package/dist/web/.next/server/app/_not-found.segments/_head.segment.rsc +1 -1
  15. package/dist/web/.next/server/app/_not-found.segments/_index.segment.rsc +2 -2
  16. package/dist/web/.next/server/app/_not-found.segments/_not-found/__PAGE__.segment.rsc +1 -1
  17. package/dist/web/.next/server/app/_not-found.segments/_not-found.segment.rsc +1 -1
  18. package/dist/web/.next/server/app/_not-found.segments/_tree.segment.rsc +2 -2
  19. package/dist/web/.next/server/app/api/cli-assets/assistant/route.js.nft.json +1 -1
  20. package/dist/web/.next/server/app/api/cli-assets/fix/route.js.nft.json +1 -1
  21. package/dist/web/.next/server/app/api/cli-assets/import/route.js.nft.json +1 -1
  22. package/dist/web/.next/server/app/api/cli-assets/route.js.nft.json +1 -1
  23. package/dist/web/.next/server/app/api/cli-assets/store/preview/route.js.nft.json +1 -1
  24. package/dist/web/.next/server/app/api/cli-assets/store/route.js.nft.json +1 -1
  25. package/dist/web/.next/server/app/api/cli-assets/sync/route.js.nft.json +1 -1
  26. package/dist/web/.next/server/app/api/cli-assets/updates/route.js.nft.json +1 -1
  27. package/dist/web/.next/server/app/api/dashboard/route.js.nft.json +1 -1
  28. package/dist/web/.next/server/app/api/file/route.js.nft.json +1 -1
  29. package/dist/web/.next/server/app/api/git-status/route.js.nft.json +1 -1
  30. package/dist/web/.next/server/app/api/kanban/route.js.nft.json +1 -1
  31. package/dist/web/.next/server/app/api/kanban/stream/route.js.nft.json +1 -1
  32. package/dist/web/.next/server/app/api/projects/[id]/route.js.nft.json +1 -1
  33. package/dist/web/.next/server/app/api/projects/reorder/route.js.nft.json +1 -1
  34. package/dist/web/.next/server/app/api/projects/route.js.nft.json +1 -1
  35. package/dist/web/.next/server/app/api/scheduler/route.js.nft.json +1 -1
  36. package/dist/web/.next/server/app/api/search/route.js.nft.json +1 -1
  37. package/dist/web/.next/server/app/api/sly-actions/invalidate/route.js.nft.json +1 -1
  38. package/dist/web/.next/server/app/api/sly-actions/route.js.nft.json +1 -1
  39. package/dist/web/.next/server/app/api/transcribe/route.js +3 -3
  40. package/dist/web/.next/server/app/api/transcribe/route.js.nft.json +1 -1
  41. package/dist/web/.next/server/app/api/version-check/route.js.nft.json +1 -1
  42. package/dist/web/.next/server/app/page.js.nft.json +1 -1
  43. package/dist/web/.next/server/app/page_client-reference-manifest.js +1 -1
  44. package/dist/web/.next/server/app/project/[id]/page.js.nft.json +1 -1
  45. package/dist/web/.next/server/app/project/[id]/page_client-reference-manifest.js +1 -1
  46. package/dist/web/.next/server/chunks/{[root-of-the-server]__934c9bb4._.js → [root-of-the-server]__0f9b71fd._.js} +1 -1
  47. package/dist/web/.next/server/chunks/[root-of-the-server]__1dec5018._.js +3 -0
  48. package/dist/web/.next/server/chunks/{[root-of-the-server]__e00fb85f._.js → [root-of-the-server]__2605d761._.js} +1 -1
  49. package/dist/web/.next/server/chunks/{[root-of-the-server]__41df0777._.js → [root-of-the-server]__53ef96b9._.js} +2 -2
  50. package/dist/web/.next/server/chunks/{[root-of-the-server]__1cdc76ef._.js → [root-of-the-server]__8ce673c9._.js} +2 -2
  51. package/dist/web/.next/server/chunks/[root-of-the-server]__a43db24d._.js +19 -0
  52. package/dist/web/.next/server/chunks/{[root-of-the-server]__104b2da3._.js → [root-of-the-server]__a4d171b5._.js} +3 -3
  53. package/dist/web/.next/server/chunks/{[root-of-the-server]__3dc5531f._.js → [root-of-the-server]__c7ac3578._.js} +1 -1
  54. package/dist/web/.next/server/pages/404.html +1 -1
  55. package/dist/web/.next/server/pages/500.html +2 -2
  56. package/dist/web/.next/static/chunks/3df3846316317676.css +1 -0
  57. package/dist/web/package-lock.json +37 -0
  58. package/dist/web/package.json +1 -0
  59. package/dist/web/src/app/api/transcribe/route.ts +7 -1
  60. package/dist/web/src/components/VoiceControlBar.tsx +1 -0
  61. package/dist/web/src/lib/webm-to-ogg-opus.ts +254 -0
  62. package/dist/web/tsconfig.tsbuildinfo +1 -1
  63. package/package.json +1 -1
  64. package/templates/kanban-seed.json +1 -1
  65. package/dist/web/.next/server/chunks/[root-of-the-server]__3998d59e._.js +0 -19
  66. package/dist/web/.next/server/chunks/[root-of-the-server]__403750fd._.js +0 -3
  67. package/dist/web/.next/static/chunks/f3d7065d54a0b9ac.css +0 -1
  68. /package/dist/web/.next/static/{_fCicMElBguqtWA_EpzdZ → eGpcv9LfmamGIm1II8SKL}/_buildManifest.js +0 -0
  69. /package/dist/web/.next/static/{_fCicMElBguqtWA_EpzdZ → eGpcv9LfmamGIm1II8SKL}/_clientMiddlewareManifest.json +0 -0
  70. /package/dist/web/.next/static/{_fCicMElBguqtWA_EpzdZ → eGpcv9LfmamGIm1II8SKL}/_ssgManifest.js +0 -0
@@ -1,2 +1,2 @@
1
1
  globalThis.__RSC_MANIFEST = globalThis.__RSC_MANIFEST || {};
2
- globalThis.__RSC_MANIFEST["/project/[id]/page"] = {"moduleLoading":{"prefix":"","crossOrigin":null},"clientModules":{"[project]/node_modules/next/dist/esm/client/components/layout-router.js <module evaluation>":{"id":39756,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/layout-router.js":{"id":39756,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/render-from-template-context.js <module evaluation>":{"id":37457,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/render-from-template-context.js":{"id":37457,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/client-page.js <module evaluation>":{"id":47257,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/client-page.js":{"id":47257,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/client-segment.js <module evaluation>":{"id":92825,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/client-segment.js":{"id":92825,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/http-access-fallback/error-boundary.js <module evaluation>":{"id":68017,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/http-access-fallback/error-boundary.js":{"id":68017,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/lib/metadata/generate/icon-mark.js <module evaluation>":{"id":27201,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/lib/metadata/generate/icon-mark.js":{"id":27201,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/lib/framework/boundary-components.js <module evaluation>":{"id":97367,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/lib/framework/boundary-components.js":{"id":97367,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/client/components/builtin/global-error.js <module evaluation>":{"id":68027,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/client/components/builtin/global-error.js":{"id":68027,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/src/contexts/VoiceContext.tsx <module evaluation>":{"id":1088,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js"],"async":false},"[project]/src/contexts/VoiceContext.tsx":{"id":1088,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js"],"async":false},"[project]/src/components/ProjectView.tsx <module evaluation>":{"id":72630,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js","/_next/static/chunks/24c966c8b9e12be5.js","/_next/static/chunks/0bab8c7c82cef548.js","/_next/static/chunks/345c46e638c28d26.js"],"async":false},"[project]/src/components/ProjectView.tsx":{"id":72630,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js","/_next/static/chunks/24c966c8b9e12be5.js","/_next/static/chunks/0bab8c7c82cef548.js","/_next/static/chunks/345c46e638c28d26.js"],"async":false},"[project]/src/components/ProjectPageClient.tsx <module evaluation>":{"id":27444,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js","/_next/static/chunks/24c966c8b9e12be5.js","/_next/static/chunks/0bab8c7c82cef548.js","/_next/static/chunks/345c46e638c28d26.js"],"async":false},"[project]/src/components/ProjectPageClient.tsx":{"id":27444,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js","/_next/static/chunks/24c966c8b9e12be5.js","/_next/static/chunks/0bab8c7c82cef548.js","/_next/static/chunks/345c46e638c28d26.js"],"async":false}},"ssrModuleMapping":{"39756":{"*":{"id":2420,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"37457":{"*":{"id":24017,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"47257":{"*":{"id":77682,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"92825":{"*":{"id":97296,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"68017":{"*":{"id":61660,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"27201":{"*":{"id":60704,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"97367":{"*":{"id":90574,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"68027":{"*":{"id":40622,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"1088":{"*":{"id":7491,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__72142a5d._.js","server/chunks/ssr/src_contexts_VoiceContext_tsx_cfba7292._.js"],"async":false}},"72630":{"*":{"id":15704,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__72142a5d._.js","server/chunks/ssr/src_contexts_VoiceContext_tsx_cfba7292._.js","server/chunks/ssr/[root-of-the-server]__2f64210a._.js","server/chunks/ssr/[root-of-the-server]__bcbe4bf2._.js","server/chunks/ssr/src_components_c4135402._.js"],"async":false}},"27444":{"*":{"id":77788,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__72142a5d._.js","server/chunks/ssr/src_contexts_VoiceContext_tsx_cfba7292._.js","server/chunks/ssr/[root-of-the-server]__2f64210a._.js","server/chunks/ssr/[root-of-the-server]__bcbe4bf2._.js","server/chunks/ssr/src_components_c4135402._.js"],"async":false}}},"edgeSSRModuleMapping":{},"rscModuleMapping":{"39756":{"*":{"id":26768,"name":"*","chunks":[],"async":false}},"37457":{"*":{"id":17910,"name":"*","chunks":[],"async":false}},"47257":{"*":{"id":92977,"name":"*","chunks":[],"async":false}},"92825":{"*":{"id":48552,"name":"*","chunks":[],"async":false}},"68017":{"*":{"id":83919,"name":"*","chunks":[],"async":false}},"27201":{"*":{"id":40771,"name":"*","chunks":[],"async":false}},"97367":{"*":{"id":24150,"name":"*","chunks":[],"async":false}},"68027":{"*":{"id":82509,"name":"*","chunks":[],"async":false}},"1088":{"*":{"id":21229,"name":"*","chunks":[],"async":false}},"72630":{"*":{"id":50165,"name":"*","chunks":[],"async":false}},"27444":{"*":{"id":76100,"name":"*","chunks":[],"async":false}}},"edgeRscModuleMapping":{},"entryCSSFiles":{"[project]/node_modules/next/dist/client/components/builtin/global-error":[],"[project]/src/app/layout":[{"path":"static/chunks/43bfca92afbacd38.css","inlined":false},{"path":"static/chunks/f3d7065d54a0b9ac.css","inlined":false}],"[project]/src/app/project/[id]/page":[{"path":"static/chunks/43bfca92afbacd38.css","inlined":false},{"path":"static/chunks/f3d7065d54a0b9ac.css","inlined":false}]},"entryJSFiles":{"[project]/node_modules/next/dist/client/components/builtin/global-error":["static/chunks/ff1a16fafef87110.js","static/chunks/e24d6768d85df882.js"],"[project]/src/app/layout":["static/chunks/b8e0c1aeea4a14bc.js"],"[project]/src/app/project/[id]/page":["static/chunks/b8e0c1aeea4a14bc.js","static/chunks/24c966c8b9e12be5.js","static/chunks/0bab8c7c82cef548.js","static/chunks/345c46e638c28d26.js"]}}
2
+ globalThis.__RSC_MANIFEST["/project/[id]/page"] = {"moduleLoading":{"prefix":"","crossOrigin":null},"clientModules":{"[project]/node_modules/next/dist/esm/client/components/layout-router.js <module evaluation>":{"id":39756,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/layout-router.js":{"id":39756,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/render-from-template-context.js <module evaluation>":{"id":37457,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/render-from-template-context.js":{"id":37457,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/client-page.js <module evaluation>":{"id":47257,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/client-page.js":{"id":47257,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/client-segment.js <module evaluation>":{"id":92825,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/client-segment.js":{"id":92825,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/http-access-fallback/error-boundary.js <module evaluation>":{"id":68017,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/client/components/http-access-fallback/error-boundary.js":{"id":68017,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/lib/metadata/generate/icon-mark.js <module evaluation>":{"id":27201,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/lib/metadata/generate/icon-mark.js":{"id":27201,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/lib/framework/boundary-components.js <module evaluation>":{"id":97367,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/esm/lib/framework/boundary-components.js":{"id":97367,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/client/components/builtin/global-error.js <module evaluation>":{"id":68027,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/node_modules/next/dist/client/components/builtin/global-error.js":{"id":68027,"name":"*","chunks":["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/e24d6768d85df882.js"],"async":false},"[project]/src/contexts/VoiceContext.tsx <module evaluation>":{"id":1088,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js"],"async":false},"[project]/src/contexts/VoiceContext.tsx":{"id":1088,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js"],"async":false},"[project]/src/components/ProjectView.tsx <module evaluation>":{"id":72630,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js","/_next/static/chunks/24c966c8b9e12be5.js","/_next/static/chunks/0bab8c7c82cef548.js","/_next/static/chunks/345c46e638c28d26.js"],"async":false},"[project]/src/components/ProjectView.tsx":{"id":72630,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js","/_next/static/chunks/24c966c8b9e12be5.js","/_next/static/chunks/0bab8c7c82cef548.js","/_next/static/chunks/345c46e638c28d26.js"],"async":false},"[project]/src/components/ProjectPageClient.tsx <module evaluation>":{"id":27444,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js","/_next/static/chunks/24c966c8b9e12be5.js","/_next/static/chunks/0bab8c7c82cef548.js","/_next/static/chunks/345c46e638c28d26.js"],"async":false},"[project]/src/components/ProjectPageClient.tsx":{"id":27444,"name":"*","chunks":["/_next/static/chunks/b8e0c1aeea4a14bc.js","/_next/static/chunks/24c966c8b9e12be5.js","/_next/static/chunks/0bab8c7c82cef548.js","/_next/static/chunks/345c46e638c28d26.js"],"async":false}},"ssrModuleMapping":{"39756":{"*":{"id":2420,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"37457":{"*":{"id":24017,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"47257":{"*":{"id":77682,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"92825":{"*":{"id":97296,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"68017":{"*":{"id":61660,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"27201":{"*":{"id":60704,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"97367":{"*":{"id":90574,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"68027":{"*":{"id":40622,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__b6871b66._.js","server/chunks/ssr/node_modules_next_dist_esm_eedfc1fd._.js"],"async":false}},"1088":{"*":{"id":7491,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__72142a5d._.js","server/chunks/ssr/src_contexts_VoiceContext_tsx_cfba7292._.js"],"async":false}},"72630":{"*":{"id":15704,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__72142a5d._.js","server/chunks/ssr/src_contexts_VoiceContext_tsx_cfba7292._.js","server/chunks/ssr/[root-of-the-server]__2f64210a._.js","server/chunks/ssr/[root-of-the-server]__bcbe4bf2._.js","server/chunks/ssr/src_components_c4135402._.js"],"async":false}},"27444":{"*":{"id":77788,"name":"*","chunks":["server/chunks/ssr/[root-of-the-server]__72142a5d._.js","server/chunks/ssr/src_contexts_VoiceContext_tsx_cfba7292._.js","server/chunks/ssr/[root-of-the-server]__2f64210a._.js","server/chunks/ssr/[root-of-the-server]__bcbe4bf2._.js","server/chunks/ssr/src_components_c4135402._.js"],"async":false}}},"edgeSSRModuleMapping":{},"rscModuleMapping":{"39756":{"*":{"id":26768,"name":"*","chunks":[],"async":false}},"37457":{"*":{"id":17910,"name":"*","chunks":[],"async":false}},"47257":{"*":{"id":92977,"name":"*","chunks":[],"async":false}},"92825":{"*":{"id":48552,"name":"*","chunks":[],"async":false}},"68017":{"*":{"id":83919,"name":"*","chunks":[],"async":false}},"27201":{"*":{"id":40771,"name":"*","chunks":[],"async":false}},"97367":{"*":{"id":24150,"name":"*","chunks":[],"async":false}},"68027":{"*":{"id":82509,"name":"*","chunks":[],"async":false}},"1088":{"*":{"id":21229,"name":"*","chunks":[],"async":false}},"72630":{"*":{"id":50165,"name":"*","chunks":[],"async":false}},"27444":{"*":{"id":76100,"name":"*","chunks":[],"async":false}}},"edgeRscModuleMapping":{},"entryCSSFiles":{"[project]/node_modules/next/dist/client/components/builtin/global-error":[],"[project]/src/app/layout":[{"path":"static/chunks/43bfca92afbacd38.css","inlined":false},{"path":"static/chunks/3df3846316317676.css","inlined":false}],"[project]/src/app/project/[id]/page":[{"path":"static/chunks/43bfca92afbacd38.css","inlined":false},{"path":"static/chunks/3df3846316317676.css","inlined":false}]},"entryJSFiles":{"[project]/node_modules/next/dist/client/components/builtin/global-error":["static/chunks/ff1a16fafef87110.js","static/chunks/e24d6768d85df882.js"],"[project]/src/app/layout":["static/chunks/b8e0c1aeea4a14bc.js"],"[project]/src/app/project/[id]/page":["static/chunks/b8e0c1aeea4a14bc.js","static/chunks/24c966c8b9e12be5.js","static/chunks/0bab8c7c82cef548.js","static/chunks/345c46e638c28d26.js"]}}
@@ -2,4 +2,4 @@ module.exports=[43698,(e,t,s)=>{t.exports=e.x("node:https",()=>require("node:htt
2
2
  See https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/node-configuring-maxsockets.html
3
3
  or increase socketAcquisitionWarningTimeout=(millis) in the NodeHttpHandler config.`),Date.now()}return t}constructor(e){this.configProvider=new Promise((t,s)=>{"function"==typeof e?e().then(e=>{t(this.resolveDefaultConfig(e))}).catch(s):t(this.resolveDefaultConfig(e))})}destroy(){this.config?.httpAgent?.destroy(),this.config?.httpsAgent?.destroy()}async handle(e,{abortSignal:g,requestTimeout:m}={}){this.config||(this.config=await this.configProvider);let h=this.config,f="https:"===e.protocol;return f||this.config.httpAgent||(this.config.httpAgent=await this.config.httpAgentProvider()),new Promise((y,v)=>{let b,E,S=[],w=async e=>{await b,S.forEach(u.timing.clearTimeout),y(e)},P=async e=>{await b,S.forEach(u.timing.clearTimeout),v(e)};if(g?.aborted)return void P((0,r.buildAbortError)(g));let k=e.headers??{},x=(k.Expect??k.expect)==="100-continue",A=f?h.httpsAgent:h.httpAgent;x&&!this.externalAgent&&(A=new(f?n.Agent:t)({keepAlive:!1,maxSockets:1/0})),S.push(u.timing.setTimeout(()=>{this.socketWarningTimestamp=p.checkSocketUsage(A,this.socketWarningTimestamp,h.logger)},h.socketAcquisitionWarningTimeout??(h.requestTimeout??2e3)+(h.connectionTimeout??1e3)));let C=(0,o.buildQueryString)(e.query||{});if(null!=e.username||null!=e.password){let t=e.username??"",s=e.password??"";E=`${t}:${s}`}let T=e.path;C&&(T+=`?${C}`),e.fragment&&(T+=`#${e.fragment}`);let j=e.hostname??"";j="["===j[0]&&j.endsWith("]")?e.hostname.slice(1,-1):e.hostname;let I={headers:e.headers,host:j,method:e.method,path:T,port:e.port,agent:A,auth:E},O=(f?n.request:s)(I,e=>{w({response:new i.HttpResponse({statusCode:e.statusCode||-1,reason:e.statusMessage,headers:(0,a.getTransformedHeaders)(e.headers),body:e})})});if(O.on("error",e=>{d.includes(e.code)?P(Object.assign(e,{name:"TimeoutError"})):P(e)}),g){let e=()=>{O.destroy(),P((0,r.buildAbortError)(g))};"function"==typeof g.addEventListener?(g.addEventListener("abort",e,{once:!0}),O.once("close",()=>g.removeEventListener("abort",e))):g.onabort=e}let R=m??h.requestTimeout;S.push(((e,t,s=0)=>{if(!s)return -1;let i=i=>{let o=u.timing.setTimeout(()=>{e.destroy(),t(Object.assign(Error(`@smithy/node-http-handler - the request socket did not establish a connection with the server within the configured timeout of ${s} ms.`),{name:"TimeoutError"}))},s-i),n=e=>{e?.connecting?e.on("connect",()=>{u.timing.clearTimeout(o)}):u.timing.clearTimeout(o)};e.socket?n(e.socket):e.on("socket",n)};return s<2e3?(i(0),0):u.timing.setTimeout(i.bind(null,1e3),1e3)})(O,P,h.connectionTimeout)),S.push(((e,t,s=0,i,o)=>s?u.timing.setTimeout(()=>{let n=`@smithy/node-http-handler - [${i?"ERROR":"WARN"}] a request has exceeded the configured ${s} ms requestTimeout.`;if(i){let s=Object.assign(Error(n),{name:"TimeoutError",code:"ETIMEDOUT"});e.destroy(s),t(s)}else n+=" Init client requestHandler with throwOnRequestTimeout=true to turn this into an error.",o?.warn?.(n)},s):-1)(O,P,R,h.throwOnRequestTimeout,h.logger??console)),S.push(((e,t,s=0)=>{let i=i=>{let o=s-i,n=()=>{e.destroy(),t(Object.assign(Error(`@smithy/node-http-handler - the request socket timed out after ${s} ms of inactivity (configured by client requestHandler).`),{name:"TimeoutError"}))};e.socket?(e.socket.setTimeout(o,n),e.on("close",()=>e.socket?.removeListener("timeout",n))):e.setTimeout(o,n)};return 0<s&&s<6e3?(i(0),0):u.timing.setTimeout(i.bind(null,3e3*(0!==s)),3e3)})(O,P,h.socketTimeout));let D=I.agent;"object"==typeof D&&"keepAlive"in D&&S.push(((e,{keepAlive:t,keepAliveMsecs:s},i=c)=>{if(!0!==t)return -1;let o=()=>{e.socket?e.socket.setKeepAlive(t,s||0):e.on("socket",e=>{e.setKeepAlive(t,s||0)})};return 0===i?(o(),0):u.timing.setTimeout(o,i)})(O,{keepAlive:D.keepAlive,keepAliveMsecs:D.keepAliveMsecs})),b=(0,l.writeRequestBody)(O,e,R,this.externalAgent).catch(e=>(S.forEach(u.timing.clearTimeout),v(e)))})}updateHttpClientConfig(e,t){this.config=void 0,this.configProvider=this.configProvider.then(s=>({...s,[e]:t}))}httpHandlerConfigs(){return this.config??{}}resolveDefaultConfig(i){let{requestTimeout:o,connectionTimeout:r,socketTimeout:d,socketAcquisitionWarningTimeout:a,httpAgent:u,httpsAgent:c,throwOnRequestTimeout:l,logger:p}=i||{};return{connectionTimeout:r,requestTimeout:o,socketTimeout:d,socketAcquisitionWarningTimeout:a,throwOnRequestTimeout:l,httpAgentProvider:async()=>{let{Agent:i,request:o}=await e.A(91956);return(s=o,u instanceof(t=i)||"function"==typeof u?.destroy)?(this.externalAgent=!0,u):new t({keepAlive:!0,maxSockets:50,...u})},httpsAgent:c instanceof n.Agent||"function"==typeof c?.destroy?(this.externalAgent=!0,c):new n.Agent({keepAlive:!0,maxSockets:50,...c}),logger:p}}}e.s(["NodeHttpHandler",()=>p],84912)},21706,e=>{e.v({name:"@aws-sdk/nested-clients",version:"3.996.11",description:"Nested clients for AWS SDK packages.",main:"./dist-cjs/index.js",module:"./dist-es/index.js",types:"./dist-types/index.d.ts",scripts:{build:"yarn lint && concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":'yarn g:turbo run build -F="$npm_package_name"',"build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"premove dist-cjs dist-es dist-types tsconfig.cjs.tsbuildinfo tsconfig.es.tsbuildinfo tsconfig.types.tsbuildinfo",lint:"node ../../scripts/validation/submodules-linter.js --pkg nested-clients",test:"yarn g:vitest run","test:watch":"yarn g:vitest watch"},engines:{node:">=20.0.0"},sideEffects:!1,author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.21","@aws-sdk/middleware-host-header":"^3.972.8","@aws-sdk/middleware-logger":"^3.972.8","@aws-sdk/middleware-recursion-detection":"^3.972.8","@aws-sdk/middleware-user-agent":"^3.972.22","@aws-sdk/region-config-resolver":"^3.972.8","@aws-sdk/types":"^3.973.6","@aws-sdk/util-endpoints":"^3.996.5","@aws-sdk/util-user-agent-browser":"^3.972.8","@aws-sdk/util-user-agent-node":"^3.973.8","@smithy/config-resolver":"^4.4.11","@smithy/core":"^3.23.12","@smithy/fetch-http-handler":"^5.3.15","@smithy/hash-node":"^4.2.12","@smithy/invalid-dependency":"^4.2.12","@smithy/middleware-content-length":"^4.2.12","@smithy/middleware-endpoint":"^4.4.26","@smithy/middleware-retry":"^4.4.43","@smithy/middleware-serde":"^4.2.15","@smithy/middleware-stack":"^4.2.12","@smithy/node-config-provider":"^4.3.12","@smithy/node-http-handler":"^4.5.0","@smithy/protocol-http":"^5.3.12","@smithy/smithy-client":"^4.12.6","@smithy/types":"^4.13.1","@smithy/url-parser":"^4.2.12","@smithy/util-base64":"^4.3.2","@smithy/util-body-length-browser":"^4.2.2","@smithy/util-body-length-node":"^4.2.3","@smithy/util-defaults-mode-browser":"^4.3.42","@smithy/util-defaults-mode-node":"^4.2.45","@smithy/util-endpoints":"^3.3.3","@smithy/util-middleware":"^4.2.12","@smithy/util-retry":"^4.2.12","@smithy/util-utf8":"^4.2.2",tslib:"^2.6.2"},devDependencies:{concurrently:"7.0.0","downlevel-dts":"0.10.1",premove:"4.0.0",typescript:"~5.8.3"},typesVersions:{"<4.5":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],browser:{"./dist-es/submodules/cognito-identity/runtimeConfig":"./dist-es/submodules/cognito-identity/runtimeConfig.browser","./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sso/runtimeConfig":"./dist-es/submodules/sso/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"packages/nested-clients"},exports:{"./package.json":"./package.json","./sso-oidc":{types:"./dist-types/submodules/sso-oidc/index.d.ts",module:"./dist-es/submodules/sso-oidc/index.js",node:"./dist-cjs/submodules/sso-oidc/index.js",import:"./dist-es/submodules/sso-oidc/index.js",require:"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{types:"./dist-types/submodules/sts/index.d.ts",module:"./dist-es/submodules/sts/index.js",node:"./dist-cjs/submodules/sts/index.js",import:"./dist-es/submodules/sts/index.js",require:"./dist-cjs/submodules/sts/index.js"},"./signin":{types:"./dist-types/submodules/signin/index.d.ts",module:"./dist-es/submodules/signin/index.js",node:"./dist-cjs/submodules/signin/index.js",import:"./dist-es/submodules/signin/index.js",require:"./dist-cjs/submodules/signin/index.js"},"./cognito-identity":{types:"./dist-types/submodules/cognito-identity/index.d.ts",module:"./dist-es/submodules/cognito-identity/index.js",node:"./dist-cjs/submodules/cognito-identity/index.js",import:"./dist-es/submodules/cognito-identity/index.js",require:"./dist-cjs/submodules/cognito-identity/index.js"},"./sso":{types:"./dist-types/submodules/sso/index.d.ts",module:"./dist-es/submodules/sso/index.js",node:"./dist-cjs/submodules/sso/index.js",import:"./dist-es/submodules/sso/index.js",require:"./dist-cjs/submodules/sso/index.js"}}})},75372,e=>{"use strict";class t{async sign(e,t,s){return e}}e.s(["NoAuthSigner",()=>t])},56690,e=>{"use strict";var t=e.i(55038),s=e.i(63413);let i={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var o=e.i(6973),n=e.i(19483);class r extends n.ServiceException{constructor(e){super(e),Object.setPrototypeOf(this,r.prototype)}}class d extends r{name="InvalidRequestException";$fault="client";constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,d.prototype)}}class a extends r{name="ResourceNotFoundException";$fault="client";constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,a.prototype)}}class u extends r{name="TooManyRequestsException";$fault="client";constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e}),Object.setPrototypeOf(this,u.prototype)}}class c extends r{name="UnauthorizedException";$fault="client";constructor(e){super({name:"UnauthorizedException",$fault:"client",...e}),Object.setPrototypeOf(this,c.prototype)}}let l="client",p="error",g="httpError",m="httpQuery",h="message",f="smithy.ts.sdk.synthetic.com.amazonaws.sso",y="com.amazonaws.sso",v=o.TypeRegistry.for(f);var b=[-3,f,"SSOServiceException",0,[],[]];v.registerError(b,r);let E=o.TypeRegistry.for(y);var S=[-3,y,"InvalidRequestException",{[p]:l,[g]:400},[h],[0]];E.registerError(S,d);var w=[-3,y,"ResourceNotFoundException",{[p]:l,[g]:404},[h],[0]];E.registerError(w,a);var P=[-3,y,"TooManyRequestsException",{[p]:l,[g]:429},[h],[0]];E.registerError(P,u);var k=[-3,y,"UnauthorizedException",{[p]:l,[g]:401},[h],[0]];E.registerError(k,c);let x=[v,E];var A=[0,y,"AccessTokenType",8,0],C=[0,y,"SecretAccessKeyType",8,0],T=[0,y,"SessionTokenType",8,0],j=[3,y,"GetRoleCredentialsRequest",0,["roleName","accountId","accessToken"],[[0,{[m]:"role_name"}],[0,{[m]:"account_id"}],[()=>A,{httpHeader:"x-amz-sso_bearer_token"}]],3],I=[3,y,"GetRoleCredentialsResponse",0,["roleCredentials"],[[()=>O,0]]],O=[3,y,"RoleCredentials",0,["accessKeyId","secretAccessKey","sessionToken","expiration"],[0,[()=>C,0],[()=>T,0],1]],R=[9,y,"GetRoleCredentials",{http:["GET","/federation/credentials",200]},()=>j,()=>I];class D extends s.Command.classBuilder().ep(i).m(function(e,s,i,o){return[(0,t.getEndpointPlugin)(i,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").sc(R).build(){}var N=e.i(96632),_=e.i(48505),q=e.i(56524),F=e.i(49852),H=e.i(9881),U=e.i(24642),M=e.i(81335),$=e.i(92457),G=e.i(37383),W=e.i(76105),z=e.i(64919),L=e.i(14722),K=e.i(68103),B=e.i(53525),V=e.i(29556),J=e.i(10455),Q=e.i(80768),Y=e.i(74016);let X=async(e,t,s)=>({operation:(0,Q.getSmithyContext)(t).operation,region:await (0,Y.normalizeProvider)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),Z=e=>{let t=[];if("GetRoleCredentials"===e.operation)t.push({schemeId:"smithy.api#noAuth"});else t.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})});return t};var ee=e.i(21706),et=e.i(32710),es=e.i(88832),ei=e.i(39587),eo=e.i(97773),en=e.i(10334),er=e.i(44010),ed=e.i(13401),ea=e.i(77524),eu=e.i(15189),ec=e.i(84912),el=e.i(56884),ep=e.i(68992),eg=e.i(15557),em=e.i(58570),eh=e.i(85512),ef=e.i(92898),ey=e.i(44426),ev=e.i(38604),eb=e.i(75372),eE=e.i(57759),eS=e.i(41175),ew=e.i(49151),eP=e.i(71225),ek=e.i(55103),ex=e.i(25145);e.i(79787);var eA=e.i(25923),eC=e.i(46717),eT=e.i(16116),ej=e.i(35525);let eI="required",eO="argv",eR="isSet",eD="booleanEquals",eN="error",e_="endpoint",eq="tree",eF="PartitionResult",eH="getAttr",eU={[eI]:!1,type:"string"},eM={[eI]:!0,default:!1,type:"boolean"},e$={ref:"Endpoint"},eG={fn:eD,[eO]:[{ref:"UseFIPS"},!0]},eW={fn:eD,[eO]:[{ref:"UseDualStack"},!0]},ez={},eL={fn:eH,[eO]:[{ref:eF},"supportsFIPS"]},eK={ref:eF},eB={fn:eD,[eO]:[!0,{fn:eH,[eO]:[eK,"supportsDualStack"]}]},eV=[eG],eJ=[eW],eQ=[{ref:"Region"}],eY={version:"1.0",parameters:{Region:eU,UseDualStack:eM,UseFIPS:eM,Endpoint:eU},rules:[{conditions:[{fn:eR,[eO]:[e$]}],rules:[{conditions:eV,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:eN},{conditions:eJ,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:eN},{endpoint:{url:e$,properties:ez,headers:ez},type:e_}],type:eq},{conditions:[{fn:eR,[eO]:eQ}],rules:[{conditions:[{fn:"aws.partition",[eO]:eQ,assign:eF}],rules:[{conditions:[eG,eW],rules:[{conditions:[{fn:eD,[eO]:[!0,eL]},eB],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:ez,headers:ez},type:e_}],type:eq},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:eN}],type:eq},{conditions:eV,rules:[{conditions:[{fn:eD,[eO]:[eL,!0]}],rules:[{conditions:[{fn:"stringEquals",[eO]:[{fn:eH,[eO]:[eK,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:ez,headers:ez},type:e_},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:ez,headers:ez},type:e_}],type:eq},{error:"FIPS is enabled but this partition does not support FIPS",type:eN}],type:eq},{conditions:eJ,rules:[{conditions:[eB],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:ez,headers:ez},type:e_}],type:eq},{error:"DualStack is enabled but this partition does not support DualStack",type:eN}],type:eq},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:ez,headers:ez},type:e_}],type:eq}],type:eq},{error:"Invalid Configuration: Missing Region",type:eN}]},eX=new eT.EndpointCache({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),eZ=(e,t={})=>eX.get(e,()=>(0,ej.resolveEndpoint)(eY,{endpointParams:e,logger:t.logger}));eC.customEndpointFunctions.aws=eA.awsEndpointFunctions;var e0=e.i(74376),e1=e.i(32519),e3=e.i(70917);class e2 extends V.Client{config;constructor(...[e]){const t=(e=>{(0,ep.emitWarningIfUnsupportedVersion)(process.version);let t=(0,eh.resolveDefaultsModeConfig)(e),s=()=>t().then(eg.loadConfigsForDefaultMode),i={apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??ew.fromBase64,base64Encoder:e?.base64Encoder??eP.toBase64,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??eZ,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??Z,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new ey.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new eb.NoAuthSigner}],logger:e?.logger??new eE.NoOpLogger,protocol:e?.protocol??ev.AwsRestJsonProtocol,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sso",errorTypeRegistries:x,version:"2019-06-10",serviceTarget:"SWBPortalService"},serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??eS.parseUrl,utf8Decoder:e?.utf8Decoder??ek.fromUtf8,utf8Encoder:e?.utf8Encoder??ex.toUtf8};(0,et.emitWarningIfUnsupportedVersion)(process.version);let o={profile:e?.profile,logger:i.logger};return{...i,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,eu.loadConfig)(es.NODE_AUTH_SCHEME_PREFERENCE_OPTIONS,o),bodyLengthChecker:e?.bodyLengthChecker??em.calculateBodyLength,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,ei.createDefaultUserAgentProvider)({serviceId:i.serviceId,clientVersion:ee.default.version}),maxAttempts:e?.maxAttempts??(0,eu.loadConfig)(B.NODE_MAX_ATTEMPT_CONFIG_OPTIONS,e),region:e?.region??(0,eu.loadConfig)(en.NODE_REGION_CONFIG_OPTIONS,{...en.NODE_REGION_CONFIG_FILE_OPTIONS,...o}),requestHandler:ec.NodeHttpHandler.create(e?.requestHandler??s),retryMode:e?.retryMode??(0,eu.loadConfig)({...B.NODE_RETRY_MODE_CONFIG_OPTIONS,default:async()=>(await s()).retryMode||ef.DEFAULT_RETRY_MODE},e),sha256:e?.sha256??ea.Hash.bind(null,"sha256"),streamCollector:e?.streamCollector??el.streamCollector,useDualstackEndpoint:e?.useDualstackEndpoint??(0,eu.loadConfig)(er.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS,o),useFipsEndpoint:e?.useFipsEndpoint??(0,eu.loadConfig)(ed.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS,o),userAgentAppId:e?.userAgentAppId??(0,eu.loadConfig)(eo.NODE_APP_ID_CONFIG_OPTIONS,o)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}))(t),i=(0,H.resolveUserAgentConfig)(s),o=(0,B.resolveRetryConfig)(i),n=(0,U.resolveRegionConfig)(o),r=(0,N.resolveHostHeaderConfig)(n),d=((e,t)=>{let s,i,o,n=Object.assign((0,e0.getAwsRegionExtensionConfiguration)(e),(0,e3.getDefaultExtensionConfiguration)(e),(0,e1.getHttpHandlerExtensionConfiguration)(e),(s=e.httpAuthSchemes,i=e.httpAuthSchemeProvider,o=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){i=e},httpAuthSchemeProvider:()=>i,setCredentials(e){o=e},credentials:()=>o}));return t.forEach(e=>e.configure(n)),Object.assign(e,(0,e0.resolveAwsRegionExtensionConfiguration)(n),(0,e3.resolveDefaultRuntimeConfig)(n),(0,e1.resolveHttpHandlerRuntimeConfig)(n),{httpAuthSchemes:n.httpAuthSchemes(),httpAuthSchemeProvider:n.httpAuthSchemeProvider(),credentials:n.credentials()})})((e=>Object.assign((0,J.resolveAwsSdkSigV4Config)(e),{authSchemePreference:(0,Y.normalizeProvider)(e.authSchemePreference??[])}))((0,L.resolveEndpointConfig)(r)),e?.extensions||[]);this.config=d,this.middlewareStack.use((0,W.getSchemaSerdePlugin)(this.config)),this.middlewareStack.use((0,F.getUserAgentPlugin)(this.config)),this.middlewareStack.use((0,K.getRetryPlugin)(this.config)),this.middlewareStack.use((0,z.getContentLengthPlugin)(this.config)),this.middlewareStack.use((0,N.getHostHeaderPlugin)(this.config)),this.middlewareStack.use((0,_.getLoggerPlugin)(this.config)),this.middlewareStack.use((0,q.getRecursionDetectionPlugin)(this.config)),this.middlewareStack.use((0,$.getHttpAuthSchemeEndpointRuleSetPlugin)(this.config,{httpAuthSchemeParametersProvider:X,identityProviderConfigProvider:async e=>new M.DefaultIdentityProviderConfig({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,G.getHttpSigningPlugin)(this.config))}destroy(){super.destroy()}}e.s([],99163),e.i(99163),e.s(["GetRoleCredentialsCommand",()=>D,"SSOClient",()=>e2],56690)},91956,e=>{e.v(t=>Promise.all(["server/chunks/[externals]_node:http_c3a9e25f._.js"].map(t=>e.l(t))).then(()=>t(47299)))}];
4
4
 
5
- //# sourceMappingURL=%5Broot-of-the-server%5D__934c9bb4._.js.map
5
+ //# sourceMappingURL=%5Broot-of-the-server%5D__0f9b71fd._.js.map
@@ -0,0 +1,3 @@
1
+ module.exports=[18622,(e,r,t)=>{r.exports=e.x("next/dist/compiled/next-server/app-page-turbo.runtime.prod.js",()=>require("next/dist/compiled/next-server/app-page-turbo.runtime.prod.js"))},56704,(e,r,t)=>{r.exports=e.x("next/dist/server/app-render/work-async-storage.external.js",()=>require("next/dist/server/app-render/work-async-storage.external.js"))},32319,(e,r,t)=>{r.exports=e.x("next/dist/server/app-render/work-unit-async-storage.external.js",()=>require("next/dist/server/app-render/work-unit-async-storage.external.js"))},24725,(e,r,t)=>{r.exports=e.x("next/dist/server/app-render/after-task-async-storage.external.js",()=>require("next/dist/server/app-render/after-task-async-storage.external.js"))},70406,(e,r,t)=>{r.exports=e.x("next/dist/compiled/@opentelemetry/api",()=>require("next/dist/compiled/@opentelemetry/api"))},93695,(e,r,t)=>{r.exports=e.x("next/dist/shared/lib/no-fallback-error.external.js",()=>require("next/dist/shared/lib/no-fallback-error.external.js"))},14747,(e,r,t)=>{r.exports=e.x("path",()=>require("path"))},22734,(e,r,t)=>{r.exports=e.x("fs",()=>require("fs"))},7367,e=>{"use strict";var r=e.i(14747),t=e.i(22734);function o(){if(process.env.SLYCODE_HOME)return process.env.SLYCODE_HOME;let e=process.cwd();return(console.warn("[paths] SLYCODE_HOME not set in production — falling back to cwd:",e),e.endsWith("/web")||e.endsWith("\\web"))?r.default.dirname(e):e}function s(){let e=o(),s=r.default.join(e,"node_modules","@slycode","slycode","dist");return t.default.existsSync(s)?s:e}function n(){return process.env.BRIDGE_URL?process.env.BRIDGE_URL:"http://127.0.0.1:3004"}e.s(["getBridgeUrl",()=>n,"getPackageDir",()=>s,"getSlycodeRoot",()=>o])},54799,(e,r,t)=>{r.exports=e.x("crypto",()=>require("crypto"))},33405,(e,r,t)=>{r.exports=e.x("child_process",()=>require("child_process"))},24361,(e,r,t)=>{r.exports=e.x("util",()=>require("util"))},45786,e=>{"use strict";var r=e.i(56884),t=e.i(47797),o=e.i(88947),s=e.i(49151);let n=async e=>"function"==typeof Blob&&e instanceof Blob||e.constructor?.name==="Blob"?void 0!==Blob.prototype.arrayBuffer?new Uint8Array(await e.arrayBuffer()):i(e):a(e);async function i(e){var r;let t=await (r=e,new Promise((e,t)=>{let o=new FileReader;o.onloadend=()=>{if(2!==o.readyState)return t(Error("Reader aborted too early"));let r=o.result??"",s=r.indexOf(","),n=s>-1?s+1:r.length;e(r.substring(n))},o.onabort=()=>t(Error("Read aborted")),o.onerror=()=>t(o.error),o.readAsDataURL(r)}));return new Uint8Array((0,s.fromBase64)(t))}async function a(e){let r=[],t=e.getReader(),o=!1,s=0;for(;!o;){let{done:e,value:n}=await t.read();n&&(r.push(n),s+=n.length),o=e}let n=new Uint8Array(s),i=0;for(let e of r)n.set(e,i),i+=e.length;return n}var l=e.i(71225),c=e.i(83784),d=e.i(25145);let u=e=>"function"==typeof ReadableStream&&(e?.constructor?.name===ReadableStream.name||e instanceof ReadableStream),p="The stream has already been transformed.",f=e=>"function"==typeof Blob&&e instanceof Blob,h="The stream has already been transformed.";e.s(["sdkStreamMixin",0,e=>{if(!(e instanceof o.Readable))try{if(!f(e)&&!u(e)){let r=e?.__proto__?.constructor?.name||e;throw Error(`Unexpected stream implementation, expect Blob or ReadableStream, got ${r}`)}let r=!1,t=async()=>{if(r)throw Error(p);return r=!0,await n(e)};return Object.assign(e,{transformToByteArray:t,transformToString:async e=>{let r=await t();if("base64"===e)return(0,l.toBase64)(r);if("hex"===e)return(0,c.toHex)(r);if(void 0===e||"utf8"===e||"utf-8"===e)return(0,d.toUtf8)(r);if("function"==typeof TextDecoder)return new TextDecoder(e).decode(r);throw Error("TextDecoder is not available, please make sure polyfill is provided.")},transformToWebStream:()=>{if(r)throw Error(p);if(r=!0,f(e)){if("function"!=typeof e.stream)throw Error("Cannot transform payload Blob to web stream. Please make sure the Blob.stream() is polyfilled.\nIf you are using React Native, this API is not yet supported, see: https://react-native.canny.io/feature-requests/p/fetch-streaming-body");return e.stream()}if(u(e))return e;throw Error(`Cannot transform payload to web stream, got ${e}`)}})}catch(t){let r=e?.__proto__?.constructor?.name||e;throw Error(`Unexpected stream implementation, expect Stream.Readable instance, got ${r}`)}let s=!1,i=async()=>{if(s)throw Error(h);return s=!0,await (0,r.streamCollector)(e)};return Object.assign(e,{transformToByteArray:i,transformToString:async e=>{let r=await i();return void 0===e||Buffer.isEncoding(e)?(0,t.fromArrayBuffer)(r.buffer,r.byteOffset,r.byteLength).toString(e):new TextDecoder(e).decode(r)},transformToWebStream:()=>{if(s)throw Error(h);if(null!==e.readableFlowing)throw Error("The stream has been consumed by other callbacks.");if("function"!=typeof o.Readable.toWeb)throw Error("Readable.toWeb() is not supported. Please ensure a polyfill is available.");return s=!0,o.Readable.toWeb(e)}})}],45786)},50227,(e,r,t)=>{r.exports=e.x("node:path",()=>require("node:path"))},59639,(e,r,t)=>{r.exports=e.x("node:process",()=>require("node:process"))},41175,e=>{"use strict";let r=e=>{let t;if("string"==typeof e)return r(new URL(e));let{hostname:o,pathname:s,port:n,protocol:i,search:a}=e;return a&&(t=function(e){let r={};if(e=e.replace(/^\?/,""))for(let t of e.split("&")){let[e,o=null]=t.split("=");e=decodeURIComponent(e),o&&(o=decodeURIComponent(o)),e in r?Array.isArray(r[e])?r[e].push(o):r[e]=[r[e],o]:r[e]=o}return r}(a)),{hostname:o,port:n?parseInt(n):void 0,protocol:i,path:s,query:t}};e.s(["parseUrl",0,r],41175)},15189,72783,e=>{"use strict";var r=e.i(39866);let t=(e,r,t)=>{let o,s,n,i=!1,a=async()=>{s||(s=e());try{o=await s,n=!0,i=!1}finally{s=void 0}return o};return void 0===r?async e=>((!n||e?.forceRefresh)&&(o=await a()),o):async e=>((!n||e?.forceRefresh)&&(o=await a()),i||(t&&!t(o)?i=!0:r(o)&&await a()),o)};e.s(["memoize",0,t],72783);var o=e.i(60400);function s(e){try{let r=new Set(Array.from(e.match(/([A-Z_]){3,}/g)??[]));return r.delete("CONFIG"),r.delete("CONFIG_PREFIX_SEPARATOR"),r.delete("ENV"),[...r].join(", ")}catch(r){return e}}var n=e.i(81355),i=e.i(46277);e.s(["loadConfig",0,({environmentVariableSelector:e,configFileSelector:a,default:l},c={})=>{let d,{signingName:u,logger:p}=c;return t((0,r.chain)((d={signingName:u,logger:p},async()=>{try{let r=e(process.env,d);if(void 0===r)throw Error();return r}catch(r){throw new o.CredentialsProviderError(r.message||`Not found in ENV: ${s(e.toString())}`,{logger:d?.logger})}}),((e,{preferredFile:r="config",...t}={})=>async()=>{let a=(0,n.getProfileName)(t),{configFile:l,credentialsFile:c}=await (0,i.loadSharedConfigFiles)(t),d=c[a]||{},u=l[a]||{},p="config"===r?{...d,...u}:{...u,...d};try{let t="config"===r?l:c,o=e(p,t);if(void 0===o)throw Error();return o}catch(r){throw new o.CredentialsProviderError(r.message||`Not found in config files w/ profile [${a}]: ${s(e.toString())}`,{logger:t.logger})}})(a,c),(e=>"function"==typeof e?async()=>await e():()=>Promise.resolve(e))(l)))}],15189)},39866,e=>{"use strict";var r=e.i(48979);e.s(["chain",0,(...e)=>async()=>{let t;if(0===e.length)throw new r.ProviderError("No providers in chain");for(let r of e)try{return await r()}catch(e){if(t=e,e?.tryNextLink)continue;throw e}throw t}])},89073,e=>{"use strict";class r{method;protocol;hostname;port;path;query;headers;username;password;fragment;body;constructor(e){this.method=e.method||"GET",this.hostname=e.hostname||"localhost",this.port=e.port,this.query=e.query||{},this.headers=e.headers||{},this.body=e.body,this.protocol=e.protocol?":"!==e.protocol.slice(-1)?`${e.protocol}:`:e.protocol:"https:",this.path=e.path?"/"!==e.path.charAt(0)?`/${e.path}`:e.path:"/",this.username=e.username,this.password=e.password,this.fragment=e.fragment}static clone(e){var t;let o=new r({...e,headers:{...e.headers}});return o.query&&(o.query=Object.keys(t=o.query).reduce((e,r)=>{let o=t[r];return{...e,[r]:Array.isArray(o)?[...o]:o}},{})),o}static isInstance(e){return!!e&&"method"in e&&"protocol"in e&&"hostname"in e&&"path"in e&&"object"==typeof e.query&&"object"==typeof e.headers}clone(){return r.clone(this)}}e.s(["HttpRequest",()=>r])},2157,(e,r,t)=>{r.exports=e.x("node:fs",()=>require("node:fs"))},46786,(e,r,t)=>{r.exports=e.x("os",()=>require("os"))},65790,49487,e=>{"use strict";var r=e.i(46786),t=e.i(14747);let o={};e.s(["getHomeDir",0,()=>{let{HOME:e,USERPROFILE:s,HOMEPATH:n,HOMEDRIVE:i=`C:${t.sep}`}=process.env;if(e)return e;if(s)return s;if(n)return`${i}${n}`;let a=process&&process.geteuid?`${process.geteuid()}`:"DEFAULT";return o[a]||(o[a]=(0,r.homedir)()),o[a]}],65790);var s=e.i(12714);let n={},i={};e.s(["fileIntercept",0,i,"readFile",0,(e,r)=>void 0!==i[e]?i[e]:((!n[e]||r?.ignoreCache)&&(n[e]=(0,s.readFile)(e,"utf8")),n[e])],49487)},9212,e=>{"use strict";function r(e,r,t){return e.$source||(e.$source={}),e.$source[r]=t,e}e.s(["setCredentialFeature",()=>r])},60400,48979,e=>{"use strict";class r extends Error{name="ProviderError";tryNextLink;constructor(e,t=!0){let o,s=!0;"boolean"==typeof t?(o=void 0,s=t):null!=t&&"object"==typeof t&&(o=t.logger,s=t.tryNextLink??!0),super(e),this.tryNextLink=s,Object.setPrototypeOf(this,r.prototype),o?.debug?.(`@smithy/property-provider ${s?"->":"(!)"} ${e}`)}static from(e,r=!0){return Object.assign(new this(e.message,r),e)}}e.s(["ProviderError",()=>r],48979);class t extends r{name="CredentialsProviderError";constructor(e,r=!0){super(e,r),Object.setPrototypeOf(this,t.prototype)}}e.s(["CredentialsProviderError",()=>t],60400)},12714,(e,r,t)=>{r.exports=e.x("node:fs/promises",()=>require("node:fs/promises"))},81355,e=>{"use strict";let r="AWS_PROFILE";e.s(["ENV_PROFILE",0,r,"getProfileName",0,e=>e.profile||process.env[r]||"default"])},96405,3289,e=>{"use strict";var r,t;(t=r||(r={})).PROFILE="profile",t.SSO_SESSION="sso-session",t.SERVICES="services",e.s(["IniSectionType",()=>r],96405),e.s(["CONFIG_PREFIX_SEPARATOR",0,"."],3289)},21334,e=>{"use strict";var r=e.i(96405),t=e.i(3289);e.s(["getConfigData",0,e=>Object.entries(e).filter(([e])=>{let o=e.indexOf(t.CONFIG_PREFIX_SEPARATOR);return -1!==o&&Object.values(r.IniSectionType).includes(e.substring(0,o))}).reduce((e,[o,s])=>{let n=o.indexOf(t.CONFIG_PREFIX_SEPARATOR);return e[o.substring(0,n)===r.IniSectionType.PROFILE?o.substring(n+1):o]=s,e},{...e.default&&{default:e.default}})])},92395,e=>{"use strict";var r=e.i(14747),t=e.i(65790);e.s(["getConfigFilepath",0,()=>process.env.AWS_CONFIG_FILE||(0,r.join)((0,t.getHomeDir)(),".aws","config")])},61487,e=>{"use strict";var r=e.i(14747),t=e.i(65790);e.s(["getCredentialsFilepath",0,()=>process.env.AWS_SHARED_CREDENTIALS_FILE||(0,r.join)((0,t.getHomeDir)(),".aws","credentials")])},7104,e=>{"use strict";var r=e.i(96405),t=e.i(3289);let o=/^([\w-]+)\s(["'])?([\w-@\+\.%:/]+)\2$/,s=["__proto__","profile __proto__"];e.s(["parseIni",0,e=>{let n,i,a={};for(let l of e.split(/\r?\n/)){let e=l.split(/(^|\s)[;#]/)[0].trim();if("["===e[0]&&"]"===e[e.length-1]){n=void 0,i=void 0;let a=e.substring(1,e.length-1),l=o.exec(a);if(l){let[,e,,o]=l;Object.values(r.IniSectionType).includes(e)&&(n=[e,o].join(t.CONFIG_PREFIX_SEPARATOR))}else n=a;if(s.includes(a))throw Error(`Found invalid profile name "${a}"`)}else if(n){let r=e.indexOf("=");if(![0,-1].includes(r)){let[o,s]=[e.substring(0,r).trim(),e.substring(r+1).trim()];if(""===s)i=o;else{i&&l.trimStart()===l&&(i=void 0),a[n]=a[n]||{};let e=i?[i,o].join(t.CONFIG_PREFIX_SEPARATOR):o;a[n][e]=s}}}}return a}])},46277,e=>{"use strict";var r=e.i(14747),t=e.i(21334),o=e.i(92395),s=e.i(61487),n=e.i(65790),i=e.i(7104),a=e.i(49487);let l=()=>({}),c=async(e={})=>{let{filepath:c=(0,s.getCredentialsFilepath)(),configFilepath:d=(0,o.getConfigFilepath)()}=e,u=(0,n.getHomeDir)(),p=c;c.startsWith("~/")&&(p=(0,r.join)(u,c.slice(2)));let f=d;d.startsWith("~/")&&(f=(0,r.join)(u,d.slice(2)));let h=await Promise.all([(0,a.readFile)(f,{ignoreCache:e.ignoreCache}).then(i.parseIni).then(t.getConfigData).catch(l),(0,a.readFile)(p,{ignoreCache:e.ignoreCache}).then(i.parseIni).catch(l)]);return{configFile:h[0],credentialsFile:h[1]}};e.s(["loadSharedConfigFiles",0,c])},60526,(e,r,t)=>{r.exports=e.x("node:os",()=>require("node:os"))},7335,e=>{"use strict";var r=e.i(9212),t=e.i(60400);let o="AWS_ACCESS_KEY_ID",s="AWS_SECRET_ACCESS_KEY",n="AWS_SESSION_TOKEN",i="AWS_CREDENTIAL_EXPIRATION",a="AWS_CREDENTIAL_SCOPE",l="AWS_ACCOUNT_ID";e.s(["ENV_ACCOUNT_ID",0,l,"ENV_CREDENTIAL_SCOPE",0,a,"ENV_EXPIRATION",0,i,"ENV_KEY",0,o,"ENV_SECRET",0,s,"ENV_SESSION",0,n,"fromEnv",0,e=>async()=>{e?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");let c=process.env[o],d=process.env[s],u=process.env[n],p=process.env[i],f=process.env[a],h=process.env[l];if(c&&d){let e={accessKeyId:c,secretAccessKey:d,...u&&{sessionToken:u},...p&&{expiration:new Date(p)},...f&&{credentialScope:f},...h&&{accountId:h}};return(0,r.setCredentialFeature)(e,"CREDENTIALS_ENV_VARS","g"),e}throw new t.CredentialsProviderError("Unable to find environment variable credentials.",{logger:e?.logger})}])},5389,e=>{e.v(r=>Promise.all(["server/chunks/[externals]_node:async_hooks_b485b2a4._.js"].map(r=>e.l(r))).then(()=>r(78500)))},14277,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__e4988941._.js"].map(r=>e.l(r))).then(()=>r(63152)))},93306,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__2605d761._.js"].map(r=>e.l(r))).then(()=>r(38788)))},14115,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__a4d171b5._.js"].map(r=>e.l(r))).then(()=>r(26709)))},9193,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__53ef96b9._.js"].map(r=>e.l(r))).then(()=>r(1346)))},85365,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__0234f869._.js"].map(r=>e.l(r))).then(()=>r(33073)))},52170,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__8ce673c9._.js"].map(r=>e.l(r))).then(()=>r(23492)))},36806,e=>{e.v(r=>Promise.all(["server/chunks/node_modules_@smithy_core_dist-es_submodules_event-streams_index_73e35402.js"].map(r=>e.l(r))).then(()=>r(30360)))}];
2
+
3
+ //# sourceMappingURL=%5Broot-of-the-server%5D__1dec5018._.js.map
@@ -6,4 +6,4 @@ Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI
6
6
  - ECS container host 169.254.170.2
7
7
  - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:t})}})(f,e.logger);let T=r.NodeHttpHandler.create({requestTimeout:e.timeout??1e3,connectionTimeout:e.timeout??1e3});return a=async()=>{let r=new i.HttpRequest({protocol:f.protocol,hostname:f.hostname,port:Number(f.port),path:f.pathname,query:Array.from(f.searchParams.entries()).reduce((e,[t,r])=>(e[t]=r,e),{}),fragment:f.hash});g?r.headers.Authorization=g:m&&(r.headers.Authorization=(await n.default.readFile(m)).toString());try{let e=await T.handle(r);return c(e.response).then(e=>(0,t.setCredentialFeature)(e,"CREDENTIALS_HTTP","z"))}catch(t){throw new o.CredentialsProviderError(String(t),{logger:e.logger})}},l=e.maxRetries??3,d=e.timeout??1e3,async()=>{for(let e=0;e<l;++e)try{return await a()}catch(e){await new Promise(e=>setTimeout(e,d))}return await a()}}],38788)},91956,e=>{e.v(t=>Promise.all(["server/chunks/[externals]_node:http_c3a9e25f._.js"].map(t=>e.l(t))).then(()=>t(47299)))}];
8
8
 
9
- //# sourceMappingURL=%5Broot-of-the-server%5D__e00fb85f._.js.map
9
+ //# sourceMappingURL=%5Broot-of-the-server%5D__2605d761._.js.map
@@ -1,3 +1,3 @@
1
- module.exports=[76535,e=>{"use strict";var r=e.i(46277);let t=async e=>{let t=await (0,r.loadSharedConfigFiles)(e);return((...e)=>{let r={};for(let t of e)for(let[e,i]of Object.entries(t))void 0!==r[e]?Object.assign(r[e],i):r[e]=i;return r})(t.configFile,t.credentialsFile)};e.s(["parseKnownFiles",0,t],76535)},66680,(e,r,t)=>{r.exports=e.x("node:crypto",()=>require("node:crypto"))},1346,e=>{"use strict";e.s([],58014),e.i(58014);var r=e.i(81355),t=e.i(76535),i=e.i(60400),n=e.i(9212),s=e.i(39866);let o=e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p"),a=async(t,a,c,d,g={},f)=>{c.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let u=a[t],{source_profile:_,region:p}=u;if(!c.roleAssumer){let{getDefaultRoleAssumer:r}=await e.A(43109);c.roleAssumer=r({...c.clientConfig,credentialProviderLogger:c.logger,parentClientConfig:{...d,...c?.parentClientConfig,region:p??c?.parentClientConfig?.region??d?.region}},c.clientPlugins)}if(_&&_ in g)throw new i.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${(0,r.getProfileName)(c)}. Profiles visited: `+Object.keys(g).join(", "),{logger:c.logger});c.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${_?`source_profile=[${_}]`:`profile=[${t}]`}`);let h=_?f(_,a,c,d,{...g,[_]:!0},l(a[_]??{})):(await ((r,t,n)=>{let a={EcsContainer:async r=>{let{fromHttp:t}=await e.A(93306),{fromContainerMetadata:i}=await e.A(14277);return n?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>(0,s.chain)(t(r??{}),i(r))().then(o)},Ec2InstanceMetadata:async r=>{n?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:t}=await e.A(14277);return async()=>t(r)().then(o)},Environment:async r=>{n?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:t}=await e.A(31605);return async()=>t(r)().then(o)}};if(r in a)return a[r];throw new i.CredentialsProviderError(`Unsupported credential source in profile ${t}. Got ${r}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:n})})(u.credential_source,t,c.logger)(c))();if(l(u))return h.then(e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"));{let e={RoleArn:u.role_arn,RoleSessionName:u.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:u.external_id,DurationSeconds:parseInt(u.duration_seconds||"3600",10)},{mfa_serial:r}=u;if(r){if(!c.mfaCodeProvider)throw new i.CredentialsProviderError(`Profile ${t} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:c.logger,tryNextLink:!1});e.SerialNumber=r,e.TokenCode=await c.mfaCodeProvider(r)}let s=await h;return c.roleAssumer(s,e).then(e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"))}},l=e=>!e.role_arn&&!!e.credential_source;var c=e.i(89073),d=e.i(49487),g=e.i(66680),f=e.i(2157),u=e.i(60526),_=e.i(50227);class p{profileData;init;callerClientConfig;static REFRESH_THRESHOLD=3e5;constructor(e,r,t){this.profileData=e,this.init=r,this.callerClientConfig=t}async loadCredentials(){let e=await this.loadToken();if(!e)throw new i.CredentialsProviderError(`Failed to load a token for session ${this.loginSession}, please re-authenticate using aws login`,{tryNextLink:!1,logger:this.logger});let r=e.accessToken,t=Date.now();return new Date(r.expiresAt).getTime()-t<=p.REFRESH_THRESHOLD?this.refresh(e):{accessKeyId:r.accessKeyId,secretAccessKey:r.secretAccessKey,sessionToken:r.sessionToken,accountId:r.accountId,expiration:new Date(r.expiresAt)}}get logger(){return this.init?.logger}get loginSession(){return this.profileData.login_session}async refresh(r){let t,{SigninClient:n,CreateOAuth2TokenCommand:s}=await e.A(54608),{logger:o,userAgentAppId:a}=this.callerClientConfig??{},l=(t=this.callerClientConfig?.requestHandler,t?.metadata?.handlerProtocol==="h2")?void 0:this.callerClientConfig?.requestHandler,c=new n({credentials:{accessKeyId:"",secretAccessKey:""},region:this.profileData.region??await this.callerClientConfig?.region?.()??process.env.AWS_REGION,requestHandler:l,logger:o,userAgentAppId:a,...this.init?.clientConfig});this.createDPoPInterceptor(c.middlewareStack);let d={tokenInput:{clientId:r.clientId,refreshToken:r.refreshToken,grantType:"refresh_token"}};try{let e=await c.send(new s(d)),{accessKeyId:t,secretAccessKey:n,sessionToken:o}=e.tokenOutput?.accessToken??{},{refreshToken:a,expiresIn:l}=e.tokenOutput??{};if(!t||!n||!o||!a)throw new i.CredentialsProviderError("Token refresh response missing required fields",{logger:this.logger,tryNextLink:!1});let g=new Date(Date.now()+(l??900)*1e3),f={...r,accessToken:{...r.accessToken,accessKeyId:t,secretAccessKey:n,sessionToken:o,expiresAt:g.toISOString()},refreshToken:a};await this.saveToken(f);let u=f.accessToken;return{accessKeyId:u.accessKeyId,secretAccessKey:u.secretAccessKey,sessionToken:u.sessionToken,accountId:u.accountId,expiration:g}}catch(e){if("AccessDeniedException"===e.name){let r;switch(e.error){case"TOKEN_EXPIRED":r="Your session has expired. Please reauthenticate.";break;case"USER_CREDENTIALS_CHANGED":r="Unable to refresh credentials because of a change in your password. Please reauthenticate with your new password.";break;case"INSUFFICIENT_PERMISSIONS":r="Unable to refresh credentials due to insufficient permissions. You may be missing permission for the 'CreateOAuth2Token' action.";break;default:r=`Failed to refresh token: ${String(e)}. Please re-authenticate using \`aws login\``}throw new i.CredentialsProviderError(r,{logger:this.logger,tryNextLink:!1})}throw new i.CredentialsProviderError(`Failed to refresh token: ${String(e)}. Please re-authenticate using aws login`,{logger:this.logger})}}async loadToken(){let e=this.getTokenFilePath();try{let r;try{r=await (0,d.readFile)(e,{ignoreCache:this.init?.ignoreCache})}catch{r=await f.promises.readFile(e,"utf8")}let t=JSON.parse(r),n=["accessToken","clientId","refreshToken","dpopKey"].filter(e=>!t[e]);if(t.accessToken?.accountId||n.push("accountId"),n.length>0)throw new i.CredentialsProviderError(`Token validation failed, missing fields: ${n.join(", ")}`,{logger:this.logger,tryNextLink:!1});return t}catch(r){throw new i.CredentialsProviderError(`Failed to load token from ${e}: ${String(r)}`,{logger:this.logger,tryNextLink:!1})}}async saveToken(e){let r=this.getTokenFilePath(),t=(0,_.dirname)(r);try{await f.promises.mkdir(t,{recursive:!0})}catch(e){}await f.promises.writeFile(r,JSON.stringify(e,null,2),"utf8")}getTokenFilePath(){let e=process.env.AWS_LOGIN_CACHE_DIRECTORY??(0,_.join)((0,u.homedir)(),".aws","login","cache"),r=Buffer.from(this.loginSession,"utf8"),t=(0,g.createHash)("sha256").update(r).digest("hex");return(0,_.join)(e,`${t}.json`)}derToRawSignature(e){let r=2;if(2!==e[2])throw Error("Invalid DER signature");r++;let t=e[r++],i=e.subarray(r,r+t);if(2!==e[r+=t])throw Error("Invalid DER signature");r++;let n=e[r++],s=e.subarray(r,r+n);i=0===i[0]?i.subarray(1):i,s=0===s[0]?s.subarray(1):s;let o=Buffer.concat([Buffer.alloc(32-i.length),i]),a=Buffer.concat([Buffer.alloc(32-s.length),s]);return Buffer.concat([o,a])}createDPoPInterceptor(e){e.add(e=>async r=>{if(c.HttpRequest.isInstance(r.request)){let e=r.request,t=`${e.protocol}//${e.hostname}${e.port?`:${e.port}`:""}${e.path}`,i=await this.generateDpop(e.method,t);e.headers={...e.headers,DPoP:i}}return e(r)},{step:"finalizeRequest",name:"dpopInterceptor",override:!0})}async generateDpop(e="POST",r){let t=await this.loadToken();try{let i=(0,g.createPrivateKey)({key:t.dpopKey,format:"pem",type:"sec1"}),n=(0,g.createPublicKey)(i).export({format:"der",type:"spki"}),s=-1;for(let e=0;e<n.length;e++)if(4===n[e]){s=e;break}let o=n.slice(s+1,s+33),a=n.slice(s+33,s+65),l={alg:"ES256",typ:"dpop+jwt",jwk:{kty:"EC",crv:"P-256",x:o.toString("base64url"),y:a.toString("base64url")}},c={jti:crypto.randomUUID(),htm:e,htu:r,iat:Math.floor(Date.now()/1e3)},d=Buffer.from(JSON.stringify(l)).toString("base64url"),f=Buffer.from(JSON.stringify(c)).toString("base64url"),u=`${d}.${f}`,_=(0,g.sign)("sha256",Buffer.from(u),i),p=this.derToRawSignature(_).toString("base64url");return`${u}.${p}`}catch(e){throw new i.CredentialsProviderError(`Failed to generate Dpop proof: ${e instanceof Error?e.message:String(e)}`,{logger:this.logger,tryNextLink:!1})}}}let h=async(e,s,o)=>{let a,l=await (a={...s,profile:e},async({callerClientConfig:e}={})=>{a?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");let s=await (0,t.parseKnownFiles)(a||{}),o=(0,r.getProfileName)({profile:a?.profile??e?.profile}),l=s[o];if(!l?.login_session)throw new i.CredentialsProviderError(`Profile ${o} does not contain login_session.`,{tryNextLink:!0,logger:a?.logger});let c=new p(l,a,e),d=await c.loadCredentials();return(0,n.setCredentialFeature)(d,"CREDENTIALS_LOGIN","AD")})({callerClientConfig:o});return(0,n.setCredentialFeature)(l,"CREDENTIALS_PROFILE_LOGIN","AC")},y=async(r,t)=>e.A(85365).then(({fromProcess:e})=>e({...r,profile:t})().then(e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_PROCESS","v"))),w=async(r,t,i={},s)=>{let{fromSSO:o}=await e.A(14115);return o({profile:r,logger:i.logger,parentClientConfig:i.parentClientConfig,clientConfig:i.clientConfig})({callerClientConfig:s}).then(e=>t.sso_session?(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_SSO","r"):(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_SSO_LEGACY","t"))},C=e=>!!e&&"object"==typeof e&&"string"==typeof e.aws_access_key_id&&"string"==typeof e.aws_secret_access_key&&["undefined","string"].indexOf(typeof e.aws_session_token)>-1&&["undefined","string"].indexOf(typeof e.aws_account_id)>-1,E=async(e,r)=>{r?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");let t={accessKeyId:e.aws_access_key_id,secretAccessKey:e.aws_secret_access_key,sessionToken:e.aws_session_token,...e.aws_credential_scope&&{credentialScope:e.aws_credential_scope},...e.aws_account_id&&{accountId:e.aws_account_id}};return(0,n.setCredentialFeature)(t,"CREDENTIALS_PROFILE","n")},k=async(r,t,i)=>e.A(52170).then(({fromTokenFile:e})=>e({webIdentityTokenFile:r.web_identity_token_file,roleArn:r.role_arn,roleSessionName:r.role_session_name,roleAssumerWithWebIdentity:t.roleAssumerWithWebIdentity,logger:t.logger,parentClientConfig:t.parentClientConfig})({callerClientConfig:i}).then(e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q"))),m=async(e,r,t,n,s={},o=!1)=>{let l=r[e];if(Object.keys(s).length>0&&C(l))return E(l,t);if(o||((e,{profile:r="default",logger:t}={})=>!!e&&"object"==typeof e&&"string"==typeof e.role_arn&&["undefined","string"].indexOf(typeof e.role_session_name)>-1&&["undefined","string"].indexOf(typeof e.external_id)>-1&&["undefined","string"].indexOf(typeof e.mfa_serial)>-1&&(((e,{profile:r,logger:t})=>{let i="string"==typeof e.source_profile&&void 0===e.credential_source;return i&&t?.debug?.(` ${r} isAssumeRoleWithSourceProfile source_profile=${e.source_profile}`),i})(e,{profile:r,logger:t})||((e,{profile:r,logger:t})=>{let i="string"==typeof e.credential_source&&void 0===e.source_profile;return i&&t?.debug?.(` ${r} isCredentialSourceProfile credential_source=${e.credential_source}`),i})(e,{profile:r,logger:t})))(l,{profile:e,logger:t.logger}))return a(e,r,t,n,s,m);if(C(l))return E(l,t);if(l&&"object"==typeof l&&"string"==typeof l.web_identity_token_file&&"string"==typeof l.role_arn&&["undefined","string"].indexOf(typeof l.role_session_name)>-1)return k(l,t,n);if(l&&"object"==typeof l&&"string"==typeof l.credential_process)return y(t,e);if(l&&("string"==typeof l.sso_start_url||"string"==typeof l.sso_account_id||"string"==typeof l.sso_session||"string"==typeof l.sso_region||"string"==typeof l.sso_role_name))return await w(e,l,t,n);if(l&&l.login_session)return h(e,t,n);throw new i.CredentialsProviderError(`Could not resolve credentials using profile: [${e}] in configuration/credentials file(s).`,{logger:t.logger})},I=(e={})=>async({callerClientConfig:i}={})=>{e.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let n=await (0,t.parseKnownFiles)(e);return m((0,r.getProfileName)({profile:e.profile??i?.profile}),n,e,i)};e.s(["fromIni",0,I],24518),e.i(24518),e.s(["fromIni",0,I],1346)},31605,e=>{e.v(r=>Promise.all(["server/chunks/node_modules_@aws-sdk_credential-provider-env_dist-es_index_55d96139.js"].map(r=>e.l(r))).then(()=>r(97301)))},43109,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__3dc5531f._.js","server/chunks/node_modules_@aws-sdk_nested-clients_dist-es_submodules_sts_index_c78619b3.js"].map(r=>e.l(r))).then(()=>r(90222)))},54608,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__3dc5531f._.js","server/chunks/node_modules_@aws-sdk_nested-clients_dist-es_submodules_signin_index_6712dec9.js"].map(r=>e.l(r))).then(()=>r(20083)))}];
1
+ module.exports=[76535,e=>{"use strict";var r=e.i(46277);let t=async e=>{let t=await (0,r.loadSharedConfigFiles)(e);return((...e)=>{let r={};for(let t of e)for(let[e,i]of Object.entries(t))void 0!==r[e]?Object.assign(r[e],i):r[e]=i;return r})(t.configFile,t.credentialsFile)};e.s(["parseKnownFiles",0,t],76535)},66680,(e,r,t)=>{r.exports=e.x("node:crypto",()=>require("node:crypto"))},1346,e=>{"use strict";e.s([],58014),e.i(58014);var r=e.i(81355),t=e.i(76535),i=e.i(60400),n=e.i(9212),s=e.i(39866);let o=e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p"),a=async(t,a,c,d,g={},f)=>{c.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let u=a[t],{source_profile:_,region:p}=u;if(!c.roleAssumer){let{getDefaultRoleAssumer:r}=await e.A(43109);c.roleAssumer=r({...c.clientConfig,credentialProviderLogger:c.logger,parentClientConfig:{...d,...c?.parentClientConfig,region:p??c?.parentClientConfig?.region??d?.region}},c.clientPlugins)}if(_&&_ in g)throw new i.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${(0,r.getProfileName)(c)}. Profiles visited: `+Object.keys(g).join(", "),{logger:c.logger});c.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${_?`source_profile=[${_}]`:`profile=[${t}]`}`);let h=_?f(_,a,c,d,{...g,[_]:!0},l(a[_]??{})):(await ((r,t,n)=>{let a={EcsContainer:async r=>{let{fromHttp:t}=await e.A(93306),{fromContainerMetadata:i}=await e.A(14277);return n?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>(0,s.chain)(t(r??{}),i(r))().then(o)},Ec2InstanceMetadata:async r=>{n?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:t}=await e.A(14277);return async()=>t(r)().then(o)},Environment:async r=>{n?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:t}=await e.A(31605);return async()=>t(r)().then(o)}};if(r in a)return a[r];throw new i.CredentialsProviderError(`Unsupported credential source in profile ${t}. Got ${r}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:n})})(u.credential_source,t,c.logger)(c))();if(l(u))return h.then(e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"));{let e={RoleArn:u.role_arn,RoleSessionName:u.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:u.external_id,DurationSeconds:parseInt(u.duration_seconds||"3600",10)},{mfa_serial:r}=u;if(r){if(!c.mfaCodeProvider)throw new i.CredentialsProviderError(`Profile ${t} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:c.logger,tryNextLink:!1});e.SerialNumber=r,e.TokenCode=await c.mfaCodeProvider(r)}let s=await h;return c.roleAssumer(s,e).then(e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"))}},l=e=>!e.role_arn&&!!e.credential_source;var c=e.i(89073),d=e.i(49487),g=e.i(66680),f=e.i(2157),u=e.i(60526),_=e.i(50227);class p{profileData;init;callerClientConfig;static REFRESH_THRESHOLD=3e5;constructor(e,r,t){this.profileData=e,this.init=r,this.callerClientConfig=t}async loadCredentials(){let e=await this.loadToken();if(!e)throw new i.CredentialsProviderError(`Failed to load a token for session ${this.loginSession}, please re-authenticate using aws login`,{tryNextLink:!1,logger:this.logger});let r=e.accessToken,t=Date.now();return new Date(r.expiresAt).getTime()-t<=p.REFRESH_THRESHOLD?this.refresh(e):{accessKeyId:r.accessKeyId,secretAccessKey:r.secretAccessKey,sessionToken:r.sessionToken,accountId:r.accountId,expiration:new Date(r.expiresAt)}}get logger(){return this.init?.logger}get loginSession(){return this.profileData.login_session}async refresh(r){let t,{SigninClient:n,CreateOAuth2TokenCommand:s}=await e.A(54608),{logger:o,userAgentAppId:a}=this.callerClientConfig??{},l=(t=this.callerClientConfig?.requestHandler,t?.metadata?.handlerProtocol==="h2")?void 0:this.callerClientConfig?.requestHandler,c=new n({credentials:{accessKeyId:"",secretAccessKey:""},region:this.profileData.region??await this.callerClientConfig?.region?.()??process.env.AWS_REGION,requestHandler:l,logger:o,userAgentAppId:a,...this.init?.clientConfig});this.createDPoPInterceptor(c.middlewareStack);let d={tokenInput:{clientId:r.clientId,refreshToken:r.refreshToken,grantType:"refresh_token"}};try{let e=await c.send(new s(d)),{accessKeyId:t,secretAccessKey:n,sessionToken:o}=e.tokenOutput?.accessToken??{},{refreshToken:a,expiresIn:l}=e.tokenOutput??{};if(!t||!n||!o||!a)throw new i.CredentialsProviderError("Token refresh response missing required fields",{logger:this.logger,tryNextLink:!1});let g=new Date(Date.now()+(l??900)*1e3),f={...r,accessToken:{...r.accessToken,accessKeyId:t,secretAccessKey:n,sessionToken:o,expiresAt:g.toISOString()},refreshToken:a};await this.saveToken(f);let u=f.accessToken;return{accessKeyId:u.accessKeyId,secretAccessKey:u.secretAccessKey,sessionToken:u.sessionToken,accountId:u.accountId,expiration:g}}catch(e){if("AccessDeniedException"===e.name){let r;switch(e.error){case"TOKEN_EXPIRED":r="Your session has expired. Please reauthenticate.";break;case"USER_CREDENTIALS_CHANGED":r="Unable to refresh credentials because of a change in your password. Please reauthenticate with your new password.";break;case"INSUFFICIENT_PERMISSIONS":r="Unable to refresh credentials due to insufficient permissions. You may be missing permission for the 'CreateOAuth2Token' action.";break;default:r=`Failed to refresh token: ${String(e)}. Please re-authenticate using \`aws login\``}throw new i.CredentialsProviderError(r,{logger:this.logger,tryNextLink:!1})}throw new i.CredentialsProviderError(`Failed to refresh token: ${String(e)}. Please re-authenticate using aws login`,{logger:this.logger})}}async loadToken(){let e=this.getTokenFilePath();try{let r;try{r=await (0,d.readFile)(e,{ignoreCache:this.init?.ignoreCache})}catch{r=await f.promises.readFile(e,"utf8")}let t=JSON.parse(r),n=["accessToken","clientId","refreshToken","dpopKey"].filter(e=>!t[e]);if(t.accessToken?.accountId||n.push("accountId"),n.length>0)throw new i.CredentialsProviderError(`Token validation failed, missing fields: ${n.join(", ")}`,{logger:this.logger,tryNextLink:!1});return t}catch(r){throw new i.CredentialsProviderError(`Failed to load token from ${e}: ${String(r)}`,{logger:this.logger,tryNextLink:!1})}}async saveToken(e){let r=this.getTokenFilePath(),t=(0,_.dirname)(r);try{await f.promises.mkdir(t,{recursive:!0})}catch(e){}await f.promises.writeFile(r,JSON.stringify(e,null,2),"utf8")}getTokenFilePath(){let e=process.env.AWS_LOGIN_CACHE_DIRECTORY??(0,_.join)((0,u.homedir)(),".aws","login","cache"),r=Buffer.from(this.loginSession,"utf8"),t=(0,g.createHash)("sha256").update(r).digest("hex");return(0,_.join)(e,`${t}.json`)}derToRawSignature(e){let r=2;if(2!==e[2])throw Error("Invalid DER signature");r++;let t=e[r++],i=e.subarray(r,r+t);if(2!==e[r+=t])throw Error("Invalid DER signature");r++;let n=e[r++],s=e.subarray(r,r+n);i=0===i[0]?i.subarray(1):i,s=0===s[0]?s.subarray(1):s;let o=Buffer.concat([Buffer.alloc(32-i.length),i]),a=Buffer.concat([Buffer.alloc(32-s.length),s]);return Buffer.concat([o,a])}createDPoPInterceptor(e){e.add(e=>async r=>{if(c.HttpRequest.isInstance(r.request)){let e=r.request,t=`${e.protocol}//${e.hostname}${e.port?`:${e.port}`:""}${e.path}`,i=await this.generateDpop(e.method,t);e.headers={...e.headers,DPoP:i}}return e(r)},{step:"finalizeRequest",name:"dpopInterceptor",override:!0})}async generateDpop(e="POST",r){let t=await this.loadToken();try{let i=(0,g.createPrivateKey)({key:t.dpopKey,format:"pem",type:"sec1"}),n=(0,g.createPublicKey)(i).export({format:"der",type:"spki"}),s=-1;for(let e=0;e<n.length;e++)if(4===n[e]){s=e;break}let o=n.slice(s+1,s+33),a=n.slice(s+33,s+65),l={alg:"ES256",typ:"dpop+jwt",jwk:{kty:"EC",crv:"P-256",x:o.toString("base64url"),y:a.toString("base64url")}},c={jti:crypto.randomUUID(),htm:e,htu:r,iat:Math.floor(Date.now()/1e3)},d=Buffer.from(JSON.stringify(l)).toString("base64url"),f=Buffer.from(JSON.stringify(c)).toString("base64url"),u=`${d}.${f}`,_=(0,g.sign)("sha256",Buffer.from(u),i),p=this.derToRawSignature(_).toString("base64url");return`${u}.${p}`}catch(e){throw new i.CredentialsProviderError(`Failed to generate Dpop proof: ${e instanceof Error?e.message:String(e)}`,{logger:this.logger,tryNextLink:!1})}}}let h=async(e,s,o)=>{let a,l=await (a={...s,profile:e},async({callerClientConfig:e}={})=>{a?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");let s=await (0,t.parseKnownFiles)(a||{}),o=(0,r.getProfileName)({profile:a?.profile??e?.profile}),l=s[o];if(!l?.login_session)throw new i.CredentialsProviderError(`Profile ${o} does not contain login_session.`,{tryNextLink:!0,logger:a?.logger});let c=new p(l,a,e),d=await c.loadCredentials();return(0,n.setCredentialFeature)(d,"CREDENTIALS_LOGIN","AD")})({callerClientConfig:o});return(0,n.setCredentialFeature)(l,"CREDENTIALS_PROFILE_LOGIN","AC")},y=async(r,t)=>e.A(85365).then(({fromProcess:e})=>e({...r,profile:t})().then(e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_PROCESS","v"))),w=async(r,t,i={},s)=>{let{fromSSO:o}=await e.A(14115);return o({profile:r,logger:i.logger,parentClientConfig:i.parentClientConfig,clientConfig:i.clientConfig})({callerClientConfig:s}).then(e=>t.sso_session?(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_SSO","r"):(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_SSO_LEGACY","t"))},C=e=>!!e&&"object"==typeof e&&"string"==typeof e.aws_access_key_id&&"string"==typeof e.aws_secret_access_key&&["undefined","string"].indexOf(typeof e.aws_session_token)>-1&&["undefined","string"].indexOf(typeof e.aws_account_id)>-1,E=async(e,r)=>{r?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");let t={accessKeyId:e.aws_access_key_id,secretAccessKey:e.aws_secret_access_key,sessionToken:e.aws_session_token,...e.aws_credential_scope&&{credentialScope:e.aws_credential_scope},...e.aws_account_id&&{accountId:e.aws_account_id}};return(0,n.setCredentialFeature)(t,"CREDENTIALS_PROFILE","n")},k=async(r,t,i)=>e.A(52170).then(({fromTokenFile:e})=>e({webIdentityTokenFile:r.web_identity_token_file,roleArn:r.role_arn,roleSessionName:r.role_session_name,roleAssumerWithWebIdentity:t.roleAssumerWithWebIdentity,logger:t.logger,parentClientConfig:t.parentClientConfig})({callerClientConfig:i}).then(e=>(0,n.setCredentialFeature)(e,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q"))),m=async(e,r,t,n,s={},o=!1)=>{let l=r[e];if(Object.keys(s).length>0&&C(l))return E(l,t);if(o||((e,{profile:r="default",logger:t}={})=>!!e&&"object"==typeof e&&"string"==typeof e.role_arn&&["undefined","string"].indexOf(typeof e.role_session_name)>-1&&["undefined","string"].indexOf(typeof e.external_id)>-1&&["undefined","string"].indexOf(typeof e.mfa_serial)>-1&&(((e,{profile:r,logger:t})=>{let i="string"==typeof e.source_profile&&void 0===e.credential_source;return i&&t?.debug?.(` ${r} isAssumeRoleWithSourceProfile source_profile=${e.source_profile}`),i})(e,{profile:r,logger:t})||((e,{profile:r,logger:t})=>{let i="string"==typeof e.credential_source&&void 0===e.source_profile;return i&&t?.debug?.(` ${r} isCredentialSourceProfile credential_source=${e.credential_source}`),i})(e,{profile:r,logger:t})))(l,{profile:e,logger:t.logger}))return a(e,r,t,n,s,m);if(C(l))return E(l,t);if(l&&"object"==typeof l&&"string"==typeof l.web_identity_token_file&&"string"==typeof l.role_arn&&["undefined","string"].indexOf(typeof l.role_session_name)>-1)return k(l,t,n);if(l&&"object"==typeof l&&"string"==typeof l.credential_process)return y(t,e);if(l&&("string"==typeof l.sso_start_url||"string"==typeof l.sso_account_id||"string"==typeof l.sso_session||"string"==typeof l.sso_region||"string"==typeof l.sso_role_name))return await w(e,l,t,n);if(l&&l.login_session)return h(e,t,n);throw new i.CredentialsProviderError(`Could not resolve credentials using profile: [${e}] in configuration/credentials file(s).`,{logger:t.logger})},I=(e={})=>async({callerClientConfig:i}={})=>{e.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let n=await (0,t.parseKnownFiles)(e);return m((0,r.getProfileName)({profile:e.profile??i?.profile}),n,e,i)};e.s(["fromIni",0,I],24518),e.i(24518),e.s(["fromIni",0,I],1346)},31605,e=>{e.v(r=>Promise.all(["server/chunks/node_modules_@aws-sdk_credential-provider-env_dist-es_index_55d96139.js"].map(r=>e.l(r))).then(()=>r(97301)))},43109,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__c7ac3578._.js","server/chunks/node_modules_@aws-sdk_nested-clients_dist-es_submodules_sts_index_c78619b3.js"].map(r=>e.l(r))).then(()=>r(90222)))},54608,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__c7ac3578._.js","server/chunks/node_modules_@aws-sdk_nested-clients_dist-es_submodules_signin_index_6712dec9.js"].map(r=>e.l(r))).then(()=>r(20083)))}];
2
2
 
3
- //# sourceMappingURL=%5Broot-of-the-server%5D__41df0777._.js.map
3
+ //# sourceMappingURL=%5Broot-of-the-server%5D__53ef96b9._.js.map
@@ -1,3 +1,3 @@
1
- module.exports=[24868,(e,r,t)=>{r.exports=e.x("fs/promises",()=>require("fs/promises"))},23897,32961,e=>{"use strict";var r=e.i(24868),t=e.i(54799),i=e.i(14747),n=e.i(65790);let o=e=>{let r=(0,t.createHash)("sha1").update(e).digest("hex");return(0,i.join)((0,n.getHomeDir)(),".aws","sso","cache",`${r}.json`)};e.s(["getSSOTokenFilepath",0,o],32961);let s={},l=async e=>{if(s[e])return s[e];let t=o(e);return JSON.parse(await (0,r.readFile)(t,"utf8"))};e.s(["getSSOTokenFromFile",0,l,"tokenIntercept",0,s],23897)},7729,e=>{"use strict";var r=e.i(23897),t=e.i(49487);e.s(["externalDataInterceptor",0,{getFileRecord:()=>t.fileIntercept,interceptFile(e,r){t.fileIntercept[e]=Promise.resolve(r)},getTokenRecord:()=>r.tokenIntercept,interceptToken(e,t){r.tokenIntercept[e]=t}}])},23492,e=>{"use strict";e.s([],25249),e.i(25249);var r=e.i(9212),t=e.i(60400),i=e.i(7729),n=e.i(2157);let o=r=>async t=>{r.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");let{roleArn:i,roleSessionName:n,webIdentityToken:o,providerId:s,policyArns:l,policy:a,durationSeconds:c}=r,{roleAssumerWithWebIdentity:d}=r;if(!d){let{getDefaultRoleAssumerWithWebIdentity:i}=await e.A(43109);d=i({...r.clientConfig,credentialProviderLogger:r.logger,parentClientConfig:{...t?.callerClientConfig,...r.parentClientConfig}},r.clientPlugins)}return d({RoleArn:i,RoleSessionName:n??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:o,ProviderId:s,PolicyArns:l,Policy:a,DurationSeconds:c})};e.s(["fromWebToken",0,o],93966);let s="AWS_WEB_IDENTITY_TOKEN_FILE",l=(e={})=>async l=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");let a=e?.webIdentityTokenFile??process.env[s],c=e?.roleArn??process.env.AWS_ROLE_ARN,d=e?.roleSessionName??process.env.AWS_ROLE_SESSION_NAME;if(!a||!c)throw new t.CredentialsProviderError("Web identity configuration not specified",{logger:e.logger});let g=await o({...e,webIdentityToken:i.externalDataInterceptor?.getTokenRecord?.()[a]??(0,n.readFileSync)(a,{encoding:"ascii"}),roleArn:c,roleSessionName:d})(l);return a===process.env[s]&&(0,r.setCredentialFeature)(g,"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN","h"),g};e.s(["fromTokenFile",0,l],93875),e.i(93875),e.i(93966),e.s(["fromTokenFile",0,l,"fromWebToken",0,o],23492)},43109,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__3dc5531f._.js","server/chunks/node_modules_@aws-sdk_nested-clients_dist-es_submodules_sts_index_c78619b3.js"].map(r=>e.l(r))).then(()=>r(90222)))}];
1
+ module.exports=[24868,(e,r,t)=>{r.exports=e.x("fs/promises",()=>require("fs/promises"))},23897,32961,e=>{"use strict";var r=e.i(24868),t=e.i(54799),i=e.i(14747),n=e.i(65790);let o=e=>{let r=(0,t.createHash)("sha1").update(e).digest("hex");return(0,i.join)((0,n.getHomeDir)(),".aws","sso","cache",`${r}.json`)};e.s(["getSSOTokenFilepath",0,o],32961);let s={},l=async e=>{if(s[e])return s[e];let t=o(e);return JSON.parse(await (0,r.readFile)(t,"utf8"))};e.s(["getSSOTokenFromFile",0,l,"tokenIntercept",0,s],23897)},7729,e=>{"use strict";var r=e.i(23897),t=e.i(49487);e.s(["externalDataInterceptor",0,{getFileRecord:()=>t.fileIntercept,interceptFile(e,r){t.fileIntercept[e]=Promise.resolve(r)},getTokenRecord:()=>r.tokenIntercept,interceptToken(e,t){r.tokenIntercept[e]=t}}])},23492,e=>{"use strict";e.s([],25249),e.i(25249);var r=e.i(9212),t=e.i(60400),i=e.i(7729),n=e.i(2157);let o=r=>async t=>{r.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");let{roleArn:i,roleSessionName:n,webIdentityToken:o,providerId:s,policyArns:l,policy:a,durationSeconds:c}=r,{roleAssumerWithWebIdentity:d}=r;if(!d){let{getDefaultRoleAssumerWithWebIdentity:i}=await e.A(43109);d=i({...r.clientConfig,credentialProviderLogger:r.logger,parentClientConfig:{...t?.callerClientConfig,...r.parentClientConfig}},r.clientPlugins)}return d({RoleArn:i,RoleSessionName:n??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:o,ProviderId:s,PolicyArns:l,Policy:a,DurationSeconds:c})};e.s(["fromWebToken",0,o],93966);let s="AWS_WEB_IDENTITY_TOKEN_FILE",l=(e={})=>async l=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");let a=e?.webIdentityTokenFile??process.env[s],c=e?.roleArn??process.env.AWS_ROLE_ARN,d=e?.roleSessionName??process.env.AWS_ROLE_SESSION_NAME;if(!a||!c)throw new t.CredentialsProviderError("Web identity configuration not specified",{logger:e.logger});let g=await o({...e,webIdentityToken:i.externalDataInterceptor?.getTokenRecord?.()[a]??(0,n.readFileSync)(a,{encoding:"ascii"}),roleArn:c,roleSessionName:d})(l);return a===process.env[s]&&(0,r.setCredentialFeature)(g,"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN","h"),g};e.s(["fromTokenFile",0,l],93875),e.i(93875),e.i(93966),e.s(["fromTokenFile",0,l,"fromWebToken",0,o],23492)},43109,e=>{e.v(r=>Promise.all(["server/chunks/[root-of-the-server]__c7ac3578._.js","server/chunks/node_modules_@aws-sdk_nested-clients_dist-es_submodules_sts_index_c78619b3.js"].map(r=>e.l(r))).then(()=>r(90222)))}];
2
2
 
3
- //# sourceMappingURL=%5Broot-of-the-server%5D__1cdc76ef._.js.map
3
+ //# sourceMappingURL=%5Broot-of-the-server%5D__8ce673c9._.js.map