@thunderclient/cli 1.23.0 → 1.24.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/114.index.js +1 -1
- package/dist/224.index.js +3 -0
- package/dist/330.index.js +1 -1
- package/dist/372.index.js +3 -0
- package/dist/522.index.js +1 -1
- package/dist/593.index.js +1 -1
- package/dist/733.index.js +1 -1
- package/dist/780.index.js +3 -0
- package/dist/782.index.js +3 -0
- package/dist/827.index.js +3 -0
- package/dist/876.index.js +3 -0
- package/dist/896.index.js +3 -0
- package/dist/960.index.js +1 -1
- package/dist/963.index.js +3 -0
- package/dist/974.index.js +1 -1
- package/dist/index.js +6 -12
- package/package.json +1 -1
- package/dist/364.index.js +0 -3
- package/dist/494.index.js +0 -3
- package/dist/616.index.js +0 -3
- package/dist/750.index.js +0 -3
- package/dist/770.index.js +0 -3
package/package.json
CHANGED
package/dist/364.index.js
DELETED
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
#!/usr/bin/env node
|
|
2
|
-
"use strict";exports.id=364,exports.ids=[364],exports.modules={913:(e,t,n)=>{n.d(t,{CreateTokenCommand:()=>ft,SSOOIDCClient:()=>Ce});var r=n(32),s=n(108),o=n(109),i=n(95),a=n(105),c=n(101),p=n(110),d=n(111),u=n(112),h=n(34),l=n(102),m=n(84),w=n(106),x=n(99),f=n(38),y=n(35),E=n(37);const S=async(e,t,n)=>({operation:(0,y.u)(t).operation,region:await(0,E.t)(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()});const v=e=>{const t=[];if("CreateToken"===e.operation)t.push({schemeId:"smithy.api#noAuth"});else t.push(function(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})}}(e));return t},g={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var b=n(914),I=n(78),P=n(79),O=n(82),$=n(94),k=n(76),C=n(90),j=n(93),D=n(47),T=n(63),A=n(88),_=n(89),z=n(80),R=n(85),U=n(57),q=n(912),F=n(59),G=n(48),H=n(55),V=n(56),M=n(43),N=n(60),B=n(49),J=n(53),L=n(54),W=n(52);const K="required",Q="fn",X="argv",Y="ref",Z=!0,ee="isSet",te="booleanEquals",ne="error",re="endpoint",se="tree",oe="PartitionResult",ie="getAttr",ae={[K]:!1,type:"string"},ce={[K]:!0,default:!1,type:"boolean"},pe={[Y]:"Endpoint"},de={[Q]:te,[X]:[{[Y]:"UseFIPS"},!0]},ue={[Q]:te,[X]:[{[Y]:"UseDualStack"},!0]},he={},le={[Q]:ie,[X]:[{[Y]:oe},"supportsFIPS"]},me={[Y]:oe},we={[Q]:te,[X]:[!0,{[Q]:ie,[X]:[me,"supportsDualStack"]}]},xe=[de],fe=[ue],ye=[{[Y]:"Region"}],Ee={version:"1.0",parameters:{Region:ae,UseDualStack:ce,UseFIPS:ce,Endpoint:ae},rules:[{conditions:[{[Q]:ee,[X]:[pe]}],rules:[{conditions:xe,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:ne},{conditions:fe,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:ne},{endpoint:{url:pe,properties:he,headers:he},type:re}],type:se},{conditions:[{[Q]:ee,[X]:ye}],rules:[{conditions:[{[Q]:"aws.partition",[X]:ye,assign:oe}],rules:[{conditions:[de,ue],rules:[{conditions:[{[Q]:te,[X]:[Z,le]},we],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:he,headers:he},type:re}],type:se},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:ne}],type:se},{conditions:xe,rules:[{conditions:[{[Q]:te,[X]:[le,Z]}],rules:[{conditions:[{[Q]:"stringEquals",[X]:[{[Q]:ie,[X]:[me,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:he,headers:he},type:re},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:he,headers:he},type:re}],type:se},{error:"FIPS is enabled but this partition does not support FIPS",type:ne}],type:se},{conditions:fe,rules:[{conditions:[we],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:he,headers:he},type:re}],type:se},{error:"DualStack is enabled but this partition does not support DualStack",type:ne}],type:se},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:he,headers:he},type:re}],type:se}],type:se},{error:"Invalid Configuration: Missing Region",type:ne}]},Se=new J.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ve=(e,t={})=>Se.get(e,(()=>(0,L.s)(Ee,{endpointParams:e,logger:t.logger})));W.m.aws=B.UF;var ge=n(77),be=n(62),Ie=n(61);const Pe=e=>{(0,Ie.I)(process.version);const t=(0,be.I)(e),n=()=>t().then(ge.l),r=(e=>({apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??H.E,base64Encoder:e?.base64Encoder??V.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??ve,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??v,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new U.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new q.m}],logger:e?.logger??new F.N,serviceId:e?.serviceId??"SSO OIDC",urlParser:e?.urlParser??G.D,utf8Decoder:e?.utf8Decoder??M.a,utf8Encoder:e?.utf8Encoder??N.P}))(e);(0,I.I)(process.version);const s={profile:e?.profile,logger:r.logger};return{...r,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,T.Z)(P.$,s),bodyLengthChecker:e?.bodyLengthChecker??z.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,O.pf)({serviceId:r.serviceId,clientVersion:b.rE}),maxAttempts:e?.maxAttempts??(0,T.Z)(m.qs,e),region:e?.region??(0,T.Z)(k.GG,{...k.zH,...s}),requestHandler:A.$.create(e?.requestHandler??n),retryMode:e?.retryMode??(0,T.Z)({...m.kN,default:async()=>(await n()).retryMode||R.L0},e),sha256:e?.sha256??D.V.bind(null,"sha256"),streamCollector:e?.streamCollector??_.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,T.Z)(C.e$,s),useFipsEndpoint:e?.useFipsEndpoint??(0,T.Z)(j.Ko,s),userAgentAppId:e?.userAgentAppId??(0,T.Z)($.hV,s)}};var Oe=n(96),$e=n(98),ke=n(97);class Ce extends x.K{config;constructor(...[e]){const t=Pe(e||{});super(t),this.initConfig=t;const n=(x=t,Object.assign(x,{useDualstackEndpoint:x.useDualstackEndpoint??!1,useFipsEndpoint:x.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"}));var x;const y=(0,i.D)(n),v=(0,m.$z)(y),g=(0,c.T)(v),b=(0,r.OV)(g),I=((e,t)=>{const n=Object.assign((0,Oe.R)(e),(0,ke.xA)(e),(0,$e.e)(e),(e=>{const t=e.httpAuthSchemes;let n=e.httpAuthSchemeProvider,r=e.credentials;return{setHttpAuthScheme(e){const n=t.findIndex((t=>t.schemeId===e.schemeId));-1===n?t.push(e):t.splice(n,1,e)},httpAuthSchemes:()=>t,setHttpAuthSchemeProvider(e){n=e},httpAuthSchemeProvider:()=>n,setCredentials(e){r=e},credentials:()=>r}})(e));return t.forEach((e=>e.configure(n))),Object.assign(e,(0,Oe.$)(n),(0,ke.uv)(n),(0,$e.j)(n),{httpAuthSchemes:(r=n).httpAuthSchemes(),httpAuthSchemeProvider:r.httpAuthSchemeProvider(),credentials:r.credentials()});var r})((e=>{const t=(0,f.h)(e);return Object.assign(t,{authSchemePreference:(0,E.t)(e.authSchemePreference??[])})})((0,l.C)(b)),e?.extensions||[]);this.config=I,this.middlewareStack.use((0,a.sM)(this.config)),this.middlewareStack.use((0,w.ey)(this.config)),this.middlewareStack.use((0,h.vK)(this.config)),this.middlewareStack.use((0,r.TC)(this.config)),this.middlewareStack.use((0,s.Y7)(this.config)),this.middlewareStack.use((0,o.n)(this.config)),this.middlewareStack.use((0,p.w)(this.config,{httpAuthSchemeParametersProvider:S,identityProviderConfigProvider:async e=>new d.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,u.l)(this.config))}destroy(){super.destroy()}}var je=n(125),De=n(124),Te=n(123),Ae=n(114),_e=n(113);class ze extends _e.T{constructor(e){super(e),Object.setPrototypeOf(this,ze.prototype)}}class Re extends ze{name="AccessDeniedException";$fault="client";error;reason;error_description;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,Re.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class Ue extends ze{name="AuthorizationPendingException";$fault="client";error;error_description;constructor(e){super({name:"AuthorizationPendingException",$fault:"client",...e}),Object.setPrototypeOf(this,Ue.prototype),this.error=e.error,this.error_description=e.error_description}}const qe=e=>({...e,...e.clientSecret&&{clientSecret:Ae.$},...e.refreshToken&&{refreshToken:Ae.$},...e.codeVerifier&&{codeVerifier:Ae.$}}),Fe=e=>({...e,...e.accessToken&&{accessToken:Ae.$},...e.refreshToken&&{refreshToken:Ae.$},...e.idToken&&{idToken:Ae.$}});class Ge extends ze{name="ExpiredTokenException";$fault="client";error;error_description;constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,Ge.prototype),this.error=e.error,this.error_description=e.error_description}}class He extends ze{name="InternalServerException";$fault="server";error;error_description;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,He.prototype),this.error=e.error,this.error_description=e.error_description}}class Ve extends ze{name="InvalidClientException";$fault="client";error;error_description;constructor(e){super({name:"InvalidClientException",$fault:"client",...e}),Object.setPrototypeOf(this,Ve.prototype),this.error=e.error,this.error_description=e.error_description}}class Me extends ze{name="InvalidGrantException";$fault="client";error;error_description;constructor(e){super({name:"InvalidGrantException",$fault:"client",...e}),Object.setPrototypeOf(this,Me.prototype),this.error=e.error,this.error_description=e.error_description}}class Ne extends ze{name="InvalidRequestException";$fault="client";error;reason;error_description;constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,Ne.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class Be extends ze{name="InvalidScopeException";$fault="client";error;error_description;constructor(e){super({name:"InvalidScopeException",$fault:"client",...e}),Object.setPrototypeOf(this,Be.prototype),this.error=e.error,this.error_description=e.error_description}}class Je extends ze{name="SlowDownException";$fault="client";error;error_description;constructor(e){super({name:"SlowDownException",$fault:"client",...e}),Object.setPrototypeOf(this,Je.prototype),this.error=e.error,this.error_description=e.error_description}}class Le extends ze{name="UnauthorizedClientException";$fault="client";error;error_description;constructor(e){super({name:"UnauthorizedClientException",$fault:"client",...e}),Object.setPrototypeOf(this,Le.prototype),this.error=e.error,this.error_description=e.error_description}}class We extends ze{name="UnsupportedGrantTypeException";$fault="client";error;error_description;constructor(e){super({name:"UnsupportedGrantTypeException",$fault:"client",...e}),Object.setPrototypeOf(this,We.prototype),this.error=e.error,this.error_description=e.error_description}}var Ke=n(116),Qe=n(910),Xe=n(119),Ye=n(115),Ze=n(120),et=n(122);const tt=async(e,t)=>{const n=(0,Qe.l)(e,t);let r;return n.bp("/token"),r=JSON.stringify((0,Xe.s)(e,{clientId:[],clientSecret:[],code:[],codeVerifier:[],deviceCode:[],grantType:[],redirectUri:[],refreshToken:[],scope:e=>(0,Ye.S)(e)})),n.m("POST").h({"content-type":"application/json"}).b(r),n.build()},nt=async(e,t)=>{if(200!==e.statusCode&&e.statusCode>=300)return rt(e,t);const n=(0,Xe.Tj)({$metadata:xt(e)}),r=(0,Ze.Y0)((0,Ze.Xk)(await(0,Ke.Y2)(e.body,t)),"body"),s=(0,Xe.s)(r,{accessToken:Ze.lK,expiresIn:Ze.ET,idToken:Ze.lK,refreshToken:Ze.lK,tokenType:Ze.lK});return Object.assign(n,s),n},rt=async(e,t)=>{const n={...e,body:await(0,Ke.CG)(e.body,t)},r=(0,Ke.cJ)(e,n.body);switch(r){case"AccessDeniedException":case"com.amazonaws.ssooidc#AccessDeniedException":throw await ot(n,t);case"AuthorizationPendingException":case"com.amazonaws.ssooidc#AuthorizationPendingException":throw await it(n,t);case"ExpiredTokenException":case"com.amazonaws.ssooidc#ExpiredTokenException":throw await at(n,t);case"InternalServerException":case"com.amazonaws.ssooidc#InternalServerException":throw await ct(n,t);case"InvalidClientException":case"com.amazonaws.ssooidc#InvalidClientException":throw await pt(n,t);case"InvalidGrantException":case"com.amazonaws.ssooidc#InvalidGrantException":throw await dt(n,t);case"InvalidRequestException":case"com.amazonaws.ssooidc#InvalidRequestException":throw await ut(n,t);case"InvalidScopeException":case"com.amazonaws.ssooidc#InvalidScopeException":throw await ht(n,t);case"SlowDownException":case"com.amazonaws.ssooidc#SlowDownException":throw await lt(n,t);case"UnauthorizedClientException":case"com.amazonaws.ssooidc#UnauthorizedClientException":throw await mt(n,t);case"UnsupportedGrantTypeException":case"com.amazonaws.ssooidc#UnsupportedGrantTypeException":throw await wt(n,t);default:const s=n.body;return st({output:e,parsedBody:s,errorCode:r})}},st=(0,et.j)(ze),ot=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK,reason:Ze.lK});Object.assign(n,s);const o=new Re({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},it=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new Ue({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},at=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new Ge({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},ct=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new He({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},pt=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new Ve({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},dt=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new Me({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},ut=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK,reason:Ze.lK});Object.assign(n,s);const o=new Ne({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},ht=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new Be({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},lt=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new Je({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},mt=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new Le({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},wt=async(e,t)=>{const n=(0,Xe.Tj)({}),r=e.body,s=(0,Xe.s)(r,{error:Ze.lK,error_description:Ze.lK});Object.assign(n,s);const o=new We({$metadata:xt(e),...n});return(0,_e.M)(o,e.body)},xt=e=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]});class ft extends(Te.u.classBuilder().ep(g).m((function(e,t,n,r){return[(0,De.TM)(n,this.serialize,this.deserialize),(0,je.r)(n,e.getEndpointParameterInstructions())]})).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").f(qe,Fe).ser(tt).de(nt).build()){}},911:(e,t,n)=>{function r(e){return encodeURIComponent(e).replace(/[!'()*]/g,(function(e){return"%"+e.charCodeAt(0).toString(16).toUpperCase()}))}n.d(t,{$:()=>r})},910:(e,t,n)=>{n.d(t,{l:()=>o});var r=n(33),s=n(911);function o(e,t){return new i(e,t)}class i{input;context;query={};method="";headers={};path="";body=null;hostname="";resolvePathStack=[];constructor(e,t){this.input=e,this.context=t}async build(){const{hostname:e,protocol:t="https",port:n,path:s}=await this.context.endpoint();this.path=s;for(const e of this.resolvePathStack)e(this.path);return new r.K({protocol:t,hostname:this.hostname||e,port:n,method:this.method,path:this.path,query:this.query,body:this.body,headers:this.headers})}hn(e){return this.hostname=e,this}bp(e){return this.resolvePathStack.push((t=>{this.path=`${t?.endsWith("/")?t.slice(0,-1):t||""}`+e})),this}p(e,t,n,r){return this.resolvePathStack.push((o=>{this.path=((e,t,n,r,o,i)=>{if(null==t||void 0===t[n])throw new Error("No value provided for input HTTP label: "+n+".");{const t=r();if(t.length<=0)throw new Error("Empty value provided for input HTTP label: "+n+".");e=e.replace(o,i?t.split("/").map((e=>(0,s.$)(e))).join("/"):(0,s.$)(t))}return e})(o,this.input,e,t,n,r)})),this}h(e){return this.headers=e,this}q(e){return this.query=e,this}b(e){return this.body=e,this}m(e){return this.method=e,this}}},912:(e,t,n)=>{n.d(t,{m:()=>r});class r{async sign(e,t,n){return e}}},914:e=>{e.exports={rE:"3.922.0"}}};
|
|
3
|
-
//# sourceMappingURL=364.index.js.map
|
package/dist/494.index.js
DELETED
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
#!/usr/bin/env node
|
|
2
|
-
"use strict";exports.id=494,exports.ids=[494],exports.modules={915:(t,e,n)=>{n.d(e,{getDefaultRoleAssumer:()=>Gi,getDefaultRoleAssumerWithWebIdentity:()=>Hi});var i=n(39),o=n(76),r=n(63);const s={silence:!1};var a=n(125),c=n(124),l=n(123);const u={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var d=n(114),f=n(113);class h extends f.T{constructor(t){super(t),Object.setPrototypeOf(this,h.prototype)}}const p=t=>({...t,...t.SecretAccessKey&&{SecretAccessKey:d.$}}),g=t=>({...t,...t.Credentials&&{Credentials:p(t.Credentials)}});class m extends h{name="ExpiredTokenException";$fault="client";constructor(t){super({name:"ExpiredTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,m.prototype)}}class w extends h{name="MalformedPolicyDocumentException";$fault="client";constructor(t){super({name:"MalformedPolicyDocumentException",$fault:"client",...t}),Object.setPrototypeOf(this,w.prototype)}}class v extends h{name="PackedPolicyTooLargeException";$fault="client";constructor(t){super({name:"PackedPolicyTooLargeException",$fault:"client",...t}),Object.setPrototypeOf(this,v.prototype)}}class x extends h{name="RegionDisabledException";$fault="client";constructor(t){super({name:"RegionDisabledException",$fault:"client",...t}),Object.setPrototypeOf(this,x.prototype)}}class E extends h{name="IDPRejectedClaimException";$fault="client";constructor(t){super({name:"IDPRejectedClaimException",$fault:"client",...t}),Object.setPrototypeOf(this,E.prototype)}}class y extends h{name="InvalidIdentityTokenException";$fault="client";constructor(t){super({name:"InvalidIdentityTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,y.prototype)}}const b=t=>({...t,...t.WebIdentityToken&&{WebIdentityToken:d.$}}),I=t=>({...t,...t.Credentials&&{Credentials:p(t.Credentials)}});class S extends h{name="IDPCommunicationErrorException";$fault="client";constructor(t){super({name:"IDPCommunicationErrorException",$fault:"client",...t}),Object.setPrototypeOf(this,S.prototype)}}const P={preserveOrder:!1,attributeNamePrefix:"@_",attributesGroupName:!1,textNodeName:"#text",ignoreAttributes:!0,removeNSPrefix:!1,allowBooleanAttributes:!1,parseTagValue:!0,parseAttributeValue:!1,trimValues:!0,cdataPropName:!1,numberParseOptions:{hex:!0,leadingZeros:!0,eNotation:!0},tagValueProcessor:function(t,e){return e},attributeValueProcessor:function(t,e){return e},stopNodes:[],alwaysCreateTextNode:!1,isArray:()=>!1,commentPropName:!1,unpairedTags:[],processEntities:!0,htmlEntities:!1,ignoreDeclaration:!1,ignorePiTags:!1,transformTagName:!1,transformAttributeName:!1,updateTag:function(t,e,n){return t},captureMetaData:!1},A=":A-Za-z_\\u00C0-\\u00D6\\u00D8-\\u00F6\\u00F8-\\u02FF\\u0370-\\u037D\\u037F-\\u1FFF\\u200C-\\u200D\\u2070-\\u218F\\u2C00-\\u2FEF\\u3001-\\uD7FF\\uF900-\\uFDCF\\uFDF0-\\uFFFD",T=new RegExp("^"+("["+A+"]["+(A+"\\-.\\d\\u00B7\\u0300-\\u036F\\u203F-\\u2040")+"]*")+"$");function D(t,e){const n=[];let i=e.exec(t);for(;i;){const o=[];o.startIndex=e.lastIndex-i[0].length;const r=i.length;for(let t=0;t<r;t++)o.push(i[t]);n.push(o),i=e.exec(t)}return n}const C=function(t){const e=T.exec(t);return!(null==e)};let R;R="function"!=typeof Symbol?"@@xmlMetadata":Symbol("XML Node Metadata");class ${constructor(t){this.tagname=t,this.child=[],this[":@"]={}}add(t,e){"__proto__"===t&&(t="#__proto__"),this.child.push({[t]:e})}addChild(t,e){"__proto__"===t.tagname&&(t.tagname="#__proto__"),t[":@"]&&Object.keys(t[":@"]).length>0?this.child.push({[t.tagname]:t.child,":@":t[":@"]}):this.child.push({[t.tagname]:t.child}),void 0!==e&&(this.child[this.child.length-1][R]={startIndex:e})}static getMetaDataSymbol(){return R}}function O(t,e){const n={};if("O"!==t[e+3]||"C"!==t[e+4]||"T"!==t[e+5]||"Y"!==t[e+6]||"P"!==t[e+7]||"E"!==t[e+8])throw new Error("Invalid Tag instead of DOCTYPE");{e+=9;let i=1,o=!1,r=!1,s="";for(;e<t.length;e++)if("<"!==t[e]||r)if(">"===t[e]){if(r?"-"===t[e-1]&&"-"===t[e-2]&&(r=!1,i--):i--,0===i)break}else"["===t[e]?o=!0:s+=t[e];else{if(o&&U(t,"!ENTITY",e)){let i,o;e+=7,[i,o,e]=N(t,e+1),-1===o.indexOf("&")&&(n[i]={regx:RegExp(`&${i};`,"g"),val:o})}else if(o&&U(t,"!ELEMENT",e)){e+=8;const{index:n}=_(t,e+1);e=n}else if(o&&U(t,"!ATTLIST",e))e+=8;else if(o&&U(t,"!NOTATION",e)){e+=9;const{index:n}=j(t,e+1);e=n}else{if(!U(t,"!--",e))throw new Error("Invalid DOCTYPE");r=!0}i++,s=""}if(0!==i)throw new Error("Unclosed DOCTYPE")}return{entities:n,i:e}}const k=(t,e)=>{for(;e<t.length&&/\s/.test(t[e]);)e++;return e};function N(t,e){e=k(t,e);let n="";for(;e<t.length&&!/\s/.test(t[e])&&'"'!==t[e]&&"'"!==t[e];)n+=t[e],e++;if(M(n),e=k(t,e),"SYSTEM"===t.substring(e,e+6).toUpperCase())throw new Error("External entities are not supported");if("%"===t[e])throw new Error("Parameter entities are not supported");let i="";return[e,i]=F(t,e,"entity"),[n,i,--e]}function j(t,e){e=k(t,e);let n="";for(;e<t.length&&!/\s/.test(t[e]);)n+=t[e],e++;M(n),e=k(t,e);const i=t.substring(e,e+6).toUpperCase();if("SYSTEM"!==i&&"PUBLIC"!==i)throw new Error(`Expected SYSTEM or PUBLIC, found "${i}"`);e+=i.length,e=k(t,e);let o=null,r=null;if("PUBLIC"===i)[e,o]=F(t,e,"publicIdentifier"),'"'!==t[e=k(t,e)]&&"'"!==t[e]||([e,r]=F(t,e,"systemIdentifier"));else if("SYSTEM"===i&&([e,r]=F(t,e,"systemIdentifier"),!r))throw new Error("Missing mandatory system identifier for SYSTEM notation");return{notationName:n,publicIdentifier:o,systemIdentifier:r,index:--e}}function F(t,e,n){let i="";const o=t[e];if('"'!==o&&"'"!==o)throw new Error(`Expected quoted string, found "${o}"`);for(e++;e<t.length&&t[e]!==o;)i+=t[e],e++;if(t[e]!==o)throw new Error(`Unterminated ${n} value`);return[++e,i]}function _(t,e){e=k(t,e);let n="";for(;e<t.length&&!/\s/.test(t[e]);)n+=t[e],e++;if(!M(n))throw new Error(`Invalid element name: "${n}"`);let i="";if("E"===t[e=k(t,e)]&&U(t,"MPTY",e))e+=4;else if("A"===t[e]&&U(t,"NY",e))e+=2;else{if("("!==t[e])throw new Error(`Invalid Element Expression, found "${t[e]}"`);for(e++;e<t.length&&")"!==t[e];)i+=t[e],e++;if(")"!==t[e])throw new Error("Unterminated content model")}return{elementName:n,contentModel:i.trim(),index:e}}function U(t,e,n){for(let i=0;i<e.length;i++)if(e[i]!==t[n+i+1])return!1;return!0}function M(t){if(C(t))return t;throw new Error(`Invalid entity name ${t}`)}const L=/^[-+]?0x[a-fA-F0-9]+$/,W=/^([\-\+])?(0*)([0-9]*(\.[0-9]*)?)$/,V={hex:!0,leadingZeros:!0,decimalPoint:".",eNotation:!0};function q(t,e={}){if(e=Object.assign({},V,e),!t||"string"!=typeof t)return t;let n=t.trim();if(void 0!==e.skipLike&&e.skipLike.test(n))return t;if("0"===t)return 0;if(e.hex&&L.test(n))return function(t,e){if(parseInt)return parseInt(t,e);if(Number.parseInt)return Number.parseInt(t,e);if(window&&window.parseInt)return window.parseInt(t,e);throw new Error("parseInt, Number.parseInt, window.parseInt are not supported")}(n,16);if(-1!==n.search(/.+[eE].+/))return function(t,e,n){if(!n.eNotation)return t;const i=e.match(Y);if(i){let o=i[1]||"";const r=-1===i[3].indexOf("e")?"E":"e",s=i[2],a=o?t[s.length+1]===r:t[s.length]===r;return s.length>1&&a?t:1!==s.length||!i[3].startsWith(`.${r}`)&&i[3][0]!==r?n.leadingZeros&&!a?(e=(i[1]||"")+i[3],Number(e)):t:Number(e)}return t}(t,n,e);{const i=W.exec(n);if(i){const o=i[1]||"",r=i[2];let s=function(t){if(t&&-1!==t.indexOf("."))return"."===(t=t.replace(/0+$/,""))?t="0":"."===t[0]?t="0"+t:"."===t[t.length-1]&&(t=t.substring(0,t.length-1)),t;return t}(i[3]);const a=o?"."===t[r.length+1]:"."===t[r.length];if(!e.leadingZeros&&(r.length>1||1===r.length&&!a))return t;{const i=Number(n),a=String(i);if(0===i)return i;if(-1!==a.search(/[eE]/))return e.eNotation?i:t;if(-1!==n.indexOf("."))return"0"===a||a===s||a===`${o}${s}`?i:t;let c=r?s:n;return r?c===a||o+c===a?i:t:c===a||c===o+a?i:t}}return t}}const Y=/^([-+])?(0*)(\d*(\.\d*)?[eE][-\+]?\d+)$/;class z{constructor(t){var e;this.options=t,this.currentNode=null,this.tagsNodeStack=[],this.docTypeEntities={},this.lastEntities={apos:{regex:/&(apos|#39|#x27);/g,val:"'"},gt:{regex:/&(gt|#62|#x3E);/g,val:">"},lt:{regex:/&(lt|#60|#x3C);/g,val:"<"},quot:{regex:/&(quot|#34|#x22);/g,val:'"'}},this.ampEntity={regex:/&(amp|#38|#x26);/g,val:"&"},this.htmlEntities={space:{regex:/&(nbsp|#160);/g,val:" "},cent:{regex:/&(cent|#162);/g,val:"¢"},pound:{regex:/&(pound|#163);/g,val:"£"},yen:{regex:/&(yen|#165);/g,val:"¥"},euro:{regex:/&(euro|#8364);/g,val:"€"},copyright:{regex:/&(copy|#169);/g,val:"©"},reg:{regex:/&(reg|#174);/g,val:"®"},inr:{regex:/&(inr|#8377);/g,val:"₹"},num_dec:{regex:/&#([0-9]{1,7});/g,val:(t,e)=>String.fromCodePoint(Number.parseInt(e,10))},num_hex:{regex:/&#x([0-9a-fA-F]{1,6});/g,val:(t,e)=>String.fromCodePoint(Number.parseInt(e,16))}},this.addExternalEntities=B,this.parseXml=Z,this.parseTextData=K,this.resolveNameSpace=G,this.buildAttributesMap=X,this.isItStopNode=et,this.replaceEntitiesValue=Q,this.readStopNodeData=ot,this.saveTextToParentTag=tt,this.addChild=J,this.ignoreAttributesFn="function"==typeof(e=this.options.ignoreAttributes)?e:Array.isArray(e)?t=>{for(const n of e){if("string"==typeof n&&t===n)return!0;if(n instanceof RegExp&&n.test(t))return!0}}:()=>!1}}function B(t){const e=Object.keys(t);for(let n=0;n<e.length;n++){const i=e[n];this.lastEntities[i]={regex:new RegExp("&"+i+";","g"),val:t[i]}}}function K(t,e,n,i,o,r,s){if(void 0!==t&&(this.options.trimValues&&!i&&(t=t.trim()),t.length>0)){s||(t=this.replaceEntitiesValue(t));const i=this.options.tagValueProcessor(e,t,n,o,r);if(null==i)return t;if(typeof i!=typeof t||i!==t)return i;if(this.options.trimValues)return rt(t,this.options.parseTagValue,this.options.numberParseOptions);return t.trim()===t?rt(t,this.options.parseTagValue,this.options.numberParseOptions):t}}function G(t){if(this.options.removeNSPrefix){const e=t.split(":"),n="/"===t.charAt(0)?"/":"";if("xmlns"===e[0])return"";2===e.length&&(t=n+e[1])}return t}const H=new RegExp("([^\\s=]+)\\s*(=\\s*(['\"])([\\s\\S]*?)\\3)?","gm");function X(t,e,n){if(!0!==this.options.ignoreAttributes&&"string"==typeof t){const n=D(t,H),i=n.length,o={};for(let t=0;t<i;t++){const i=this.resolveNameSpace(n[t][1]);if(this.ignoreAttributesFn(i,e))continue;let r=n[t][4],s=this.options.attributeNamePrefix+i;if(i.length)if(this.options.transformAttributeName&&(s=this.options.transformAttributeName(s)),"__proto__"===s&&(s="#__proto__"),void 0!==r){this.options.trimValues&&(r=r.trim()),r=this.replaceEntitiesValue(r);const t=this.options.attributeValueProcessor(i,r,e);o[s]=null==t?r:typeof t!=typeof r||t!==r?t:rt(r,this.options.parseAttributeValue,this.options.numberParseOptions)}else this.options.allowBooleanAttributes&&(o[s]=!0)}if(!Object.keys(o).length)return;if(this.options.attributesGroupName){const t={};return t[this.options.attributesGroupName]=o,t}return o}}const Z=function(t){t=t.replace(/\r\n?/g,"\n");const e=new $("!xml");let n=e,i="",o="";for(let r=0;r<t.length;r++){if("<"===t[r])if("/"===t[r+1]){const e=nt(t,">",r,"Closing Tag is not closed.");let s=t.substring(r+2,e).trim();if(this.options.removeNSPrefix){const t=s.indexOf(":");-1!==t&&(s=s.substr(t+1))}this.options.transformTagName&&(s=this.options.transformTagName(s)),n&&(i=this.saveTextToParentTag(i,n,o));const a=o.substring(o.lastIndexOf(".")+1);if(s&&-1!==this.options.unpairedTags.indexOf(s))throw new Error(`Unpaired tag can not be used as closing tag: </${s}>`);let c=0;a&&-1!==this.options.unpairedTags.indexOf(a)?(c=o.lastIndexOf(".",o.lastIndexOf(".")-1),this.tagsNodeStack.pop()):c=o.lastIndexOf("."),o=o.substring(0,c),n=this.tagsNodeStack.pop(),i="",r=e}else if("?"===t[r+1]){let e=it(t,r,!1,"?>");if(!e)throw new Error("Pi Tag is not closed.");if(i=this.saveTextToParentTag(i,n,o),this.options.ignoreDeclaration&&"?xml"===e.tagName||this.options.ignorePiTags);else{const t=new $(e.tagName);t.add(this.options.textNodeName,""),e.tagName!==e.tagExp&&e.attrExpPresent&&(t[":@"]=this.buildAttributesMap(e.tagExp,o,e.tagName)),this.addChild(n,t,o,r)}r=e.closeIndex+1}else if("!--"===t.substr(r+1,3)){const e=nt(t,"--\x3e",r+4,"Comment is not closed.");if(this.options.commentPropName){const s=t.substring(r+4,e-2);i=this.saveTextToParentTag(i,n,o),n.add(this.options.commentPropName,[{[this.options.textNodeName]:s}])}r=e}else if("!D"===t.substr(r+1,2)){const e=O(t,r);this.docTypeEntities=e.entities,r=e.i}else if("!["===t.substr(r+1,2)){const e=nt(t,"]]>",r,"CDATA is not closed.")-2,s=t.substring(r+9,e);i=this.saveTextToParentTag(i,n,o);let a=this.parseTextData(s,n.tagname,o,!0,!1,!0,!0);null==a&&(a=""),this.options.cdataPropName?n.add(this.options.cdataPropName,[{[this.options.textNodeName]:s}]):n.add(this.options.textNodeName,a),r=e+2}else{let s=it(t,r,this.options.removeNSPrefix),a=s.tagName;const c=s.rawTagName;let l=s.tagExp,u=s.attrExpPresent,d=s.closeIndex;this.options.transformTagName&&(a=this.options.transformTagName(a)),n&&i&&"!xml"!==n.tagname&&(i=this.saveTextToParentTag(i,n,o,!1));const f=n;f&&-1!==this.options.unpairedTags.indexOf(f.tagname)&&(n=this.tagsNodeStack.pop(),o=o.substring(0,o.lastIndexOf("."))),a!==e.tagname&&(o+=o?"."+a:a);const h=r;if(this.isItStopNode(this.options.stopNodes,o,a)){let e="";if(l.length>0&&l.lastIndexOf("/")===l.length-1)"/"===a[a.length-1]?(a=a.substr(0,a.length-1),o=o.substr(0,o.length-1),l=a):l=l.substr(0,l.length-1),r=s.closeIndex;else if(-1!==this.options.unpairedTags.indexOf(a))r=s.closeIndex;else{const n=this.readStopNodeData(t,c,d+1);if(!n)throw new Error(`Unexpected end of ${c}`);r=n.i,e=n.tagContent}const i=new $(a);a!==l&&u&&(i[":@"]=this.buildAttributesMap(l,o,a)),e&&(e=this.parseTextData(e,a,o,!0,u,!0,!0)),o=o.substr(0,o.lastIndexOf(".")),i.add(this.options.textNodeName,e),this.addChild(n,i,o,h)}else{if(l.length>0&&l.lastIndexOf("/")===l.length-1){"/"===a[a.length-1]?(a=a.substr(0,a.length-1),o=o.substr(0,o.length-1),l=a):l=l.substr(0,l.length-1),this.options.transformTagName&&(a=this.options.transformTagName(a));const t=new $(a);a!==l&&u&&(t[":@"]=this.buildAttributesMap(l,o,a)),this.addChild(n,t,o,h),o=o.substr(0,o.lastIndexOf("."))}else{const t=new $(a);this.tagsNodeStack.push(n),a!==l&&u&&(t[":@"]=this.buildAttributesMap(l,o,a)),this.addChild(n,t,o,h),n=t}i="",r=d}}else i+=t[r]}return e.child};function J(t,e,n,i){this.options.captureMetaData||(i=void 0);const o=this.options.updateTag(e.tagname,n,e[":@"]);!1===o||("string"==typeof o?(e.tagname=o,t.addChild(e,i)):t.addChild(e,i))}const Q=function(t){if(this.options.processEntities){for(let e in this.docTypeEntities){const n=this.docTypeEntities[e];t=t.replace(n.regx,n.val)}for(let e in this.lastEntities){const n=this.lastEntities[e];t=t.replace(n.regex,n.val)}if(this.options.htmlEntities)for(let e in this.htmlEntities){const n=this.htmlEntities[e];t=t.replace(n.regex,n.val)}t=t.replace(this.ampEntity.regex,this.ampEntity.val)}return t};function tt(t,e,n,i){return t&&(void 0===i&&(i=0===e.child.length),void 0!==(t=this.parseTextData(t,e.tagname,n,!1,!!e[":@"]&&0!==Object.keys(e[":@"]).length,i))&&""!==t&&e.add(this.options.textNodeName,t),t=""),t}function et(t,e,n){const i="*."+n;for(const n in t){const o=t[n];if(i===o||e===o)return!0}return!1}function nt(t,e,n,i){const o=t.indexOf(e,n);if(-1===o)throw new Error(i);return o+e.length-1}function it(t,e,n,i=">"){const o=function(t,e,n=">"){let i,o="";for(let r=e;r<t.length;r++){let e=t[r];if(i)e===i&&(i="");else if('"'===e||"'"===e)i=e;else if(e===n[0]){if(!n[1])return{data:o,index:r};if(t[r+1]===n[1])return{data:o,index:r}}else"\t"===e&&(e=" ");o+=e}}(t,e+1,i);if(!o)return;let r=o.data;const s=o.index,a=r.search(/\s/);let c=r,l=!0;-1!==a&&(c=r.substring(0,a),r=r.substring(a+1).trimStart());const u=c;if(n){const t=c.indexOf(":");-1!==t&&(c=c.substr(t+1),l=c!==o.data.substr(t+1))}return{tagName:c,tagExp:r,closeIndex:s,attrExpPresent:l,rawTagName:u}}function ot(t,e,n){const i=n;let o=1;for(;n<t.length;n++)if("<"===t[n])if("/"===t[n+1]){const r=nt(t,">",n,`${e} is not closed`);if(t.substring(n+2,r).trim()===e&&(o--,0===o))return{tagContent:t.substring(i,n),i:r};n=r}else if("?"===t[n+1]){n=nt(t,"?>",n+1,"StopNode is not closed.")}else if("!--"===t.substr(n+1,3)){n=nt(t,"--\x3e",n+3,"StopNode is not closed.")}else if("!["===t.substr(n+1,2)){n=nt(t,"]]>",n,"StopNode is not closed.")-2}else{const i=it(t,n,">");if(i){(i&&i.tagName)===e&&"/"!==i.tagExp[i.tagExp.length-1]&&o++,n=i.closeIndex}}}function rt(t,e,n){if(e&&"string"==typeof t){const e=t.trim();return"true"===e||"false"!==e&&q(t,n)}return function(t){return void 0!==t}(t)?t:""}const st=$.getMetaDataSymbol();function at(t,e){return ct(t,e)}function ct(t,e,n){let i;const o={};for(let r=0;r<t.length;r++){const s=t[r],a=lt(s);let c="";if(c=void 0===n?a:n+"."+a,a===e.textNodeName)void 0===i?i=s[a]:i+=""+s[a];else{if(void 0===a)continue;if(s[a]){let t=ct(s[a],e,c);const n=dt(t,e);void 0!==s[st]&&(t[st]=s[st]),s[":@"]?ut(t,s[":@"],c,e):1!==Object.keys(t).length||void 0===t[e.textNodeName]||e.alwaysCreateTextNode?0===Object.keys(t).length&&(e.alwaysCreateTextNode?t[e.textNodeName]="":t=""):t=t[e.textNodeName],void 0!==o[a]&&o.hasOwnProperty(a)?(Array.isArray(o[a])||(o[a]=[o[a]]),o[a].push(t)):e.isArray(a,c,n)?o[a]=[t]:o[a]=t}}}return"string"==typeof i?i.length>0&&(o[e.textNodeName]=i):void 0!==i&&(o[e.textNodeName]=i),o}function lt(t){const e=Object.keys(t);for(let t=0;t<e.length;t++){const n=e[t];if(":@"!==n)return n}}function ut(t,e,n,i){if(e){const o=Object.keys(e),r=o.length;for(let s=0;s<r;s++){const r=o[s];i.isArray(r,n+"."+r,!0,!0)?t[r]=[e[r]]:t[r]=e[r]}}}function dt(t,e){const{textNodeName:n}=e,i=Object.keys(t).length;return 0===i||!(1!==i||!t[n]&&"boolean"!=typeof t[n]&&0!==t[n])}const ft={allowBooleanAttributes:!1,unpairedTags:[]};function ht(t){return" "===t||"\t"===t||"\n"===t||"\r"===t}function pt(t,e){const n=e;for(;e<t.length;e++)if("?"!=t[e]&&" "!=t[e]);else{const i=t.substr(n,e-n);if(e>5&&"xml"===i)return bt("InvalidXml","XML declaration allowed only at the start of the document.",St(t,e));if("?"==t[e]&&">"==t[e+1]){e++;break}}return e}function gt(t,e){if(t.length>e+5&&"-"===t[e+1]&&"-"===t[e+2]){for(e+=3;e<t.length;e++)if("-"===t[e]&&"-"===t[e+1]&&">"===t[e+2]){e+=2;break}}else if(t.length>e+8&&"D"===t[e+1]&&"O"===t[e+2]&&"C"===t[e+3]&&"T"===t[e+4]&&"Y"===t[e+5]&&"P"===t[e+6]&&"E"===t[e+7]){let n=1;for(e+=8;e<t.length;e++)if("<"===t[e])n++;else if(">"===t[e]&&(n--,0===n))break}else if(t.length>e+9&&"["===t[e+1]&&"C"===t[e+2]&&"D"===t[e+3]&&"A"===t[e+4]&&"T"===t[e+5]&&"A"===t[e+6]&&"["===t[e+7])for(e+=8;e<t.length;e++)if("]"===t[e]&&"]"===t[e+1]&&">"===t[e+2]){e+=2;break}return e}const mt='"',wt="'";function vt(t,e){let n="",i="",o=!1;for(;e<t.length;e++){if(t[e]===mt||t[e]===wt)""===i?i=t[e]:i!==t[e]||(i="");else if(">"===t[e]&&""===i){o=!0;break}n+=t[e]}return""===i&&{value:n,index:e,tagClosed:o}}const xt=new RegExp("(\\s*)([^\\s=]+)(\\s*=)?(\\s*(['\"])(([\\s\\S])*?)\\5)?","g");function Et(t,e){const n=D(t,xt),i={};for(let t=0;t<n.length;t++){if(0===n[t][1].length)return bt("InvalidAttr","Attribute '"+n[t][2]+"' has no space in starting.",Pt(n[t]));if(void 0!==n[t][3]&&void 0===n[t][4])return bt("InvalidAttr","Attribute '"+n[t][2]+"' is without value.",Pt(n[t]));if(void 0===n[t][3]&&!e.allowBooleanAttributes)return bt("InvalidAttr","boolean attribute '"+n[t][2]+"' is not allowed.",Pt(n[t]));const o=n[t][2];if(!It(o))return bt("InvalidAttr","Attribute '"+o+"' is an invalid name.",Pt(n[t]));if(i.hasOwnProperty(o))return bt("InvalidAttr","Attribute '"+o+"' is repeated.",Pt(n[t]));i[o]=1}return!0}function yt(t,e){if(";"===t[++e])return-1;if("#"===t[e])return function(t,e){let n=/\d/;for("x"===t[e]&&(e++,n=/[\da-fA-F]/);e<t.length;e++){if(";"===t[e])return e;if(!t[e].match(n))break}return-1}(t,++e);let n=0;for(;e<t.length;e++,n++)if(!(t[e].match(/\w/)&&n<20)){if(";"===t[e])break;return-1}return e}function bt(t,e,n){return{err:{code:t,msg:e,line:n.line||n,col:n.col}}}function It(t){return C(t)}function St(t,e){const n=t.substring(0,e).split(/\r?\n/);return{line:n.length,col:n[n.length-1].length+1}}function Pt(t){return t.startIndex+t[1].length}const At=new class{constructor(t){this.externalEntities={},this.options=function(t){return Object.assign({},P,t)}(t)}parse(t,e){if("string"==typeof t);else{if(!t.toString)throw new Error("XML data is accepted in String or Bytes[] form.");t=t.toString()}if(e){!0===e&&(e={});const n=function(t,e){e=Object.assign({},ft,e);const n=[];let i=!1,o=!1;"\ufeff"===t[0]&&(t=t.substr(1));for(let r=0;r<t.length;r++)if("<"===t[r]&&"?"===t[r+1]){if(r+=2,r=pt(t,r),r.err)return r}else{if("<"!==t[r]){if(ht(t[r]))continue;return bt("InvalidChar","char '"+t[r]+"' is not expected.",St(t,r))}{let s=r;if(r++,"!"===t[r]){r=gt(t,r);continue}{let a=!1;"/"===t[r]&&(a=!0,r++);let c="";for(;r<t.length&&">"!==t[r]&&" "!==t[r]&&"\t"!==t[r]&&"\n"!==t[r]&&"\r"!==t[r];r++)c+=t[r];if(c=c.trim(),"/"===c[c.length-1]&&(c=c.substring(0,c.length-1),r--),!C(c)){let e;return e=0===c.trim().length?"Invalid space after '<'.":"Tag '"+c+"' is an invalid name.",bt("InvalidTag",e,St(t,r))}const l=vt(t,r);if(!1===l)return bt("InvalidAttr","Attributes for '"+c+"' have open quote.",St(t,r));let u=l.value;if(r=l.index,"/"===u[u.length-1]){const n=r-u.length;u=u.substring(0,u.length-1);const o=Et(u,e);if(!0!==o)return bt(o.err.code,o.err.msg,St(t,n+o.err.line));i=!0}else if(a){if(!l.tagClosed)return bt("InvalidTag","Closing tag '"+c+"' doesn't have proper closing.",St(t,r));if(u.trim().length>0)return bt("InvalidTag","Closing tag '"+c+"' can't have attributes or invalid starting.",St(t,s));if(0===n.length)return bt("InvalidTag","Closing tag '"+c+"' has not been opened.",St(t,s));{const e=n.pop();if(c!==e.tagName){let n=St(t,e.tagStartPos);return bt("InvalidTag","Expected closing tag '"+e.tagName+"' (opened in line "+n.line+", col "+n.col+") instead of closing tag '"+c+"'.",St(t,s))}0==n.length&&(o=!0)}}else{const a=Et(u,e);if(!0!==a)return bt(a.err.code,a.err.msg,St(t,r-u.length+a.err.line));if(!0===o)return bt("InvalidXml","Multiple possible root nodes found.",St(t,r));-1!==e.unpairedTags.indexOf(c)||n.push({tagName:c,tagStartPos:s}),i=!0}for(r++;r<t.length;r++)if("<"===t[r]){if("!"===t[r+1]){r++,r=gt(t,r);continue}if("?"!==t[r+1])break;if(r=pt(t,++r),r.err)return r}else if("&"===t[r]){const e=yt(t,r);if(-1==e)return bt("InvalidChar","char '&' is not expected.",St(t,r));r=e}else if(!0===o&&!ht(t[r]))return bt("InvalidXml","Extra text at the end",St(t,r));"<"===t[r]&&r--}}}return i?1==n.length?bt("InvalidTag","Unclosed tag '"+n[0].tagName+"'.",St(t,n[0].tagStartPos)):!(n.length>0)||bt("InvalidXml","Invalid '"+JSON.stringify(n.map((t=>t.tagName)),null,4).replace(/\r?\n/g,"")+"' found.",{line:1,col:1}):bt("InvalidXml","Start tag expected.",1)}(t,e);if(!0!==n)throw Error(`${n.err.msg}:${n.err.line}:${n.err.col}`)}const n=new z(this.options);n.addExternalEntities(this.externalEntities);const i=n.parseXml(t);return this.options.preserveOrder||void 0===i?i:at(i,this.options)}addEntity(t,e){if(-1!==e.indexOf("&"))throw new Error("Entity value can't have '&'");if(-1!==t.indexOf("&")||-1!==t.indexOf(";"))throw new Error("An entity must be set without '&' and ';'. Eg. use '#xD' for '
'");if("&"===e)throw new Error("An entity with value '&' is not permitted");this.externalEntities[t]=e}static getMetaDataSymbol(){return $.getMetaDataSymbol()}}({attributeNamePrefix:"",htmlEntities:!0,ignoreAttributes:!1,ignoreDeclaration:!0,parseTagValue:!1,trimValues:!1,tagValueProcessor:(t,e)=>""===e.trim()&&e.includes("\n")?"":void 0});At.addEntity("#xD","\r"),At.addEntity("#10","\n");const Tt=t=>{const e="#text";for(const n in t)t.hasOwnProperty(n)&&void 0!==t[n][e]?t[n]=t[n][e]:"object"==typeof t[n]&&null!==t[n]&&(t[n]=Tt(t[n]));return t};var Dt=n(117);const Ct=(t,e)=>(0,Dt.w)(t,e).then((t=>{if(t.length){let n;try{e=t,n=At.parse(e,!0)}catch(e){throw e&&"object"==typeof e&&Object.defineProperty(e,"$responseBodyText",{value:t}),e}const i="#text",o=Object.keys(n)[0],r=n[o];return r[i]&&(r[o]=r[i],delete r[i]),Tt(r)}var e;return{}})),Rt=async(t,e)=>{const n=await Ct(t,e);return n.Error&&(n.Error.message=n.Error.message??n.Error.Message),n};var $t=n(33),Ot=n(120),kt=n(121),Nt=n(122),jt=n(911);const Ft=async(t,e)=>{const n=we;let i;return i=en({...Gt(t,e),[xe]:ye,[Xe]:ve}),me(e,n,"/",void 0,i)},_t=async(t,e)=>{const n=we;let i;return i=en({...Ht(t,e),[xe]:Se,[Xe]:ve}),me(e,n,"/",void 0,i)},Ut=async(t,e)=>{if(t.statusCode>=300)return Lt(t,e);const n=await Ct(t.body,e);let i={};i=oe(n.AssumeRoleResult,e);return{$metadata:pe(t),...i}},Mt=async(t,e)=>{if(t.statusCode>=300)return Lt(t,e);const n=await Ct(t.body,e);let i={};i=re(n.AssumeRoleWithWebIdentityResult,e);return{$metadata:pe(t),...i}},Lt=async(t,e)=>{const n={...t,body:await Rt(t.body,e)},i=nn(t,n.body);switch(i){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await Wt(n,e);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await zt(n,e);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await Bt(n,e);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await Kt(n,e);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await Vt(n,e);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await qt(n,e);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await Yt(n,e);default:const o=n.body;return ge({output:t,parsedBody:o.Error,errorCode:i})}},Wt=async(t,e)=>{const n=t.body,i=ae(n.Error,e),o=new m({$metadata:pe(t),...i});return(0,f.M)(o,n)},Vt=async(t,e)=>{const n=t.body,i=ce(n.Error,e),o=new S({$metadata:pe(t),...i});return(0,f.M)(o,n)},qt=async(t,e)=>{const n=t.body,i=le(n.Error,e),o=new E({$metadata:pe(t),...i});return(0,f.M)(o,n)},Yt=async(t,e)=>{const n=t.body,i=ue(n.Error,e),o=new y({$metadata:pe(t),...i});return(0,f.M)(o,n)},zt=async(t,e)=>{const n=t.body,i=de(n.Error,e),o=new w({$metadata:pe(t),...i});return(0,f.M)(o,n)},Bt=async(t,e)=>{const n=t.body,i=fe(n.Error,e),o=new v({$metadata:pe(t),...i});return(0,f.M)(o,n)},Kt=async(t,e)=>{const n=t.body,i=he(n.Error,e),o=new x({$metadata:pe(t),...i});return(0,f.M)(o,n)},Gt=(t,e)=>{const n={};if(null!=t[Le]&&(n[Le]=t[Le]),null!=t[We]&&(n[We]=t[We]),null!=t[Ne]){const i=Xt(t[Ne],e);0===t[Ne]?.length&&(n.PolicyArns=[]),Object.entries(i).forEach((([t,e])=>{n[`PolicyArns.${t}`]=e}))}if(null!=t[ke]&&(n[ke]=t[ke]),null!=t[Ce]&&(n[Ce]=t[Ce]),null!=t[Ke]){const i=ne(t[Ke],e);0===t[Ke]?.length&&(n.Tags=[]),Object.entries(i).forEach((([t,e])=>{n[`Tags.${t}`]=e}))}if(null!=t[He]){const i=ee(t[He],e);0===t[He]?.length&&(n.TransitiveTagKeys=[]),Object.entries(i).forEach((([t,e])=>{n[`TransitiveTagKeys.${t}`]=e}))}if(null!=t[$e]&&(n[$e]=t[$e]),null!=t[ze]&&(n[ze]=t[ze]),null!=t[Ge]&&(n[Ge]=t[Ge]),null!=t[Ye]&&(n[Ye]=t[Ye]),null!=t[Fe]){const i=Qt(t[Fe],e);0===t[Fe]?.length&&(n.ProvidedContexts=[]),Object.entries(i).forEach((([t,e])=>{n[`ProvidedContexts.${t}`]=e}))}return n},Ht=(t,e)=>{const n={};if(null!=t[Le]&&(n[Le]=t[Le]),null!=t[We]&&(n[We]=t[We]),null!=t[Je]&&(n[Je]=t[Je]),null!=t[_e]&&(n[_e]=t[_e]),null!=t[Ne]){const i=Xt(t[Ne],e);0===t[Ne]?.length&&(n.PolicyArns=[]),Object.entries(i).forEach((([t,e])=>{n[`PolicyArns.${t}`]=e}))}return null!=t[ke]&&(n[ke]=t[ke]),null!=t[Ce]&&(n[Ce]=t[Ce]),n},Xt=(t,e)=>{const n={};let i=1;for(const o of t){if(null===o)continue;const t=Zt(o,e);Object.entries(t).forEach((([t,e])=>{n[`member.${i}.${t}`]=e})),i++}return n},Zt=(t,e)=>{const n={};return null!=t[Qe]&&(n[Qe]=t[Qe]),n},Jt=(t,e)=>{const n={};return null!=t[je]&&(n[je]=t[je]),null!=t[De]&&(n[De]=t[De]),n},Qt=(t,e)=>{const n={};let i=1;for(const e of t){if(null===e)continue;const t=Jt(e);Object.entries(t).forEach((([t,e])=>{n[`member.${i}.${t}`]=e})),i++}return n},te=(t,e)=>{const n={};return null!=t[Oe]&&(n[Oe]=t[Oe]),null!=t[Ze]&&(n[Ze]=t[Ze]),n},ee=(t,e)=>{const n={};let i=1;for(const e of t)null!==e&&(n[`member.${i}`]=e,i++);return n},ne=(t,e)=>{const n={};let i=1;for(const e of t){if(null===e)continue;const t=te(e);Object.entries(t).forEach((([t,e])=>{n[`member.${i}.${t}`]=e})),i++}return n},ie=(t,e)=>{const n={};return null!=t[be]&&(n[be]=(0,Ot.lK)(t[be])),null!=t[Pe]&&(n[Pe]=(0,Ot.lK)(t[Pe])),n},oe=(t,e)=>{const n={};return null!=t[Te]&&(n[Te]=se(t[Te],e)),null!=t[Ie]&&(n[Ie]=ie(t[Ie])),null!=t[Ue]&&(n[Ue]=(0,Ot.xW)(t[Ue])),null!=t[Ye]&&(n[Ye]=(0,Ot.lK)(t[Ye])),n},re=(t,e)=>{const n={};return null!=t[Te]&&(n[Te]=se(t[Te],e)),null!=t[qe]&&(n[qe]=(0,Ot.lK)(t[qe])),null!=t[Ie]&&(n[Ie]=ie(t[Ie])),null!=t[Ue]&&(n[Ue]=(0,Ot.xW)(t[Ue])),null!=t[Me]&&(n[Me]=(0,Ot.lK)(t[Me])),null!=t[Ae]&&(n[Ae]=(0,Ot.lK)(t[Ae])),null!=t[Ye]&&(n[Ye]=(0,Ot.lK)(t[Ye])),n},se=(t,e)=>{const n={};return null!=t[Ee]&&(n[Ee]=(0,Ot.lK)(t[Ee])),null!=t[Ve]&&(n[Ve]=(0,Ot.lK)(t[Ve])),null!=t[Be]&&(n[Be]=(0,Ot.lK)(t[Be])),null!=t[Re]&&(n[Re]=(0,Ot.Y0)((0,kt.t_)(t[Re]))),n},ae=(t,e)=>{const n={};return null!=t[tn]&&(n[tn]=(0,Ot.lK)(t[tn])),n},ce=(t,e)=>{const n={};return null!=t[tn]&&(n[tn]=(0,Ot.lK)(t[tn])),n},le=(t,e)=>{const n={};return null!=t[tn]&&(n[tn]=(0,Ot.lK)(t[tn])),n},ue=(t,e)=>{const n={};return null!=t[tn]&&(n[tn]=(0,Ot.lK)(t[tn])),n},de=(t,e)=>{const n={};return null!=t[tn]&&(n[tn]=(0,Ot.lK)(t[tn])),n},fe=(t,e)=>{const n={};return null!=t[tn]&&(n[tn]=(0,Ot.lK)(t[tn])),n},he=(t,e)=>{const n={};return null!=t[tn]&&(n[tn]=(0,Ot.lK)(t[tn])),n},pe=t=>({httpStatusCode:t.statusCode,requestId:t.headers["x-amzn-requestid"]??t.headers["x-amzn-request-id"]??t.headers["x-amz-request-id"],extendedRequestId:t.headers["x-amz-id-2"],cfId:t.headers["x-amz-cf-id"]}),ge=(0,Nt.j)(h),me=async(t,e,n,i,o)=>{const{hostname:r,protocol:s="https",port:a,path:c}=await t.endpoint(),l={protocol:s,hostname:r,port:a,method:"POST",path:c.endsWith("/")?c.slice(0,-1)+n:c+n,headers:e};return void 0!==i&&(l.hostname=i),void 0!==o&&(l.body=o),new $t.K(l)},we={"content-type":"application/x-www-form-urlencoded"},ve="2011-06-15",xe="Action",Ee="AccessKeyId",ye="AssumeRole",be="AssumedRoleId",Ie="AssumedRoleUser",Se="AssumeRoleWithWebIdentity",Pe="Arn",Ae="Audience",Te="Credentials",De="ContextAssertion",Ce="DurationSeconds",Re="Expiration",$e="ExternalId",Oe="Key",ke="Policy",Ne="PolicyArns",je="ProviderArn",Fe="ProvidedContexts",_e="ProviderId",Ue="PackedPolicySize",Me="Provider",Le="RoleArn",We="RoleSessionName",Ve="SecretAccessKey",qe="SubjectFromWebIdentityToken",Ye="SourceIdentity",ze="SerialNumber",Be="SessionToken",Ke="Tags",Ge="TokenCode",He="TransitiveTagKeys",Xe="Version",Ze="Value",Je="WebIdentityToken",Qe="arn",tn="message",en=t=>Object.entries(t).map((([t,e])=>(0,jt.$)(t)+"="+(0,jt.$)(e))).join("&"),nn=(t,e)=>void 0!==e.Error?.Code?e.Error.Code:404==t.statusCode?"NotFound":void 0;class on extends(l.u.classBuilder().ep(u).m((function(t,e,n,i){return[(0,c.TM)(n,this.serialize,this.deserialize),(0,a.r)(n,t.getEndpointParameterInstructions())]})).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,g).ser(Ft).de(Ut).build()){}class rn extends(l.u.classBuilder().ep(u).m((function(t,e,n,i){return[(0,c.TM)(n,this.serialize,this.deserialize),(0,a.r)(n,t.getEndpointParameterInstructions())]})).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(b,I).ser(_t).de(Mt).build()){}const sn=t=>{if("string"==typeof t?.Arn){const e=t.Arn.split(":");if(e.length>4&&""!==e[4])return e[4]}},an=async(t,e,n,i={})=>{const a="function"==typeof t?await t():t,c="function"==typeof e?await e():e,l=await function(t={}){return(0,r.Z)({...o.GG,default:async()=>(s.silence||console.warn("@aws-sdk - WARN - default STS region of us-east-1 used. See @aws-sdk/credential-providers README and set a region explicitly."),"us-east-1")},{...o.zH,...t})}(i)();return n?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${a} (credential provider clientConfig)`,`${c} (contextual client)`,`${l} (STS default: AWS_REGION, profile region, or us-east-1)`),a??c??l},cn=(t,e)=>{let n,o;return async(r,s)=>{if(o=r,!n){const{logger:i=t?.parentClientConfig?.logger,profile:r=t?.parentClientConfig?.profile,region:s,requestHandler:a=t?.parentClientConfig?.requestHandler,credentialProviderLogger:c,userAgentAppId:l=t?.parentClientConfig?.userAgentAppId}=t,u=await an(s,t?.parentClientConfig?.region,c,{logger:i,profile:r}),d=!un(a);n=new e({...t,userAgentAppId:l,profile:r,credentialDefaultProvider:()=>async()=>o,region:u,requestHandler:d?a:void 0,logger:i})}const{Credentials:a,AssumedRoleUser:c}=await n.send(new on(s));if(!a||!a.AccessKeyId||!a.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${s.RoleArn}`);const l=sn(c),u={accessKeyId:a.AccessKeyId,secretAccessKey:a.SecretAccessKey,sessionToken:a.SessionToken,expiration:a.Expiration,...a.CredentialScope&&{credentialScope:a.CredentialScope},...l&&{accountId:l}};return(0,i.g)(u,"CREDENTIALS_STS_ASSUME_ROLE","i"),u}},ln=(t,e)=>{let n;return async o=>{if(!n){const{logger:i=t?.parentClientConfig?.logger,profile:o=t?.parentClientConfig?.profile,region:r,requestHandler:s=t?.parentClientConfig?.requestHandler,credentialProviderLogger:a,userAgentAppId:c=t?.parentClientConfig?.userAgentAppId}=t,l=await an(r,t?.parentClientConfig?.region,a,{logger:i,profile:o}),u=!un(s);n=new e({...t,userAgentAppId:c,profile:o,region:l,requestHandler:u?s:void 0,logger:i})}const{Credentials:r,AssumedRoleUser:s}=await n.send(new rn(o));if(!r||!r.AccessKeyId||!r.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${o.RoleArn}`);const a=sn(s),c={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,sessionToken:r.SessionToken,expiration:r.Expiration,...r.CredentialScope&&{credentialScope:r.CredentialScope},...a&&{accountId:a}};return a&&(0,i.g)(c,"RESOLVED_ACCOUNT_ID","T"),(0,i.g)(c,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),c}},un=t=>"h2"===t?.metadata?.handlerProtocol;var dn=n(32),fn=n(108),hn=n(109),pn=n(95),gn=n(105),mn=n(101),wn=n(110),vn=n(111),xn=n(112),En=n(34),yn=n(102),bn=n(84),In=n(106),Sn=n(99),Pn=n(38),An=n(35),Tn=n(37);const Dn=async(t,e,n)=>({operation:(0,An.u)(e).operation,region:await(0,Tn.t)(t.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()});const Cn=t=>{const e=[];if("AssumeRoleWithWebIdentity"===t.operation)e.push({schemeId:"smithy.api#noAuth"});else e.push(function(t){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:t.region},propertiesExtractor:(t,e)=>({signingProperties:{config:t,context:e}})}}(t));return e},Rn=t=>{const e=(n=t,Object.assign(n,{stsClientCtor:Bi}));var n;const i=(0,Pn.h)(e);return Object.assign(i,{authSchemePreference:(0,Tn.t)(t.authSchemePreference??[])})};var $n=n(914),On=n(78),kn=n(79),Nn=n(57),jn=n(82),Fn=n(94),_n=n(90),Un=n(93),Mn=n(912),Ln=n(47),Wn=n(88),Vn=n(89),qn=n(80),Yn=n(85),zn=n(59),Bn=n(48),Kn=n(55),Gn=n(56),Hn=n(43),Xn=n(60),Zn=n(49),Jn=n(53),Qn=n(54),ti=n(52);const ei="required",ni="type",ii="fn",oi="argv",ri="ref",si=!1,ai=!0,ci="booleanEquals",li="stringEquals",ui="sigv4",di="us-east-1",fi="endpoint",hi="https://sts.{Region}.{PartitionResult#dnsSuffix}",pi="tree",gi="error",mi="getAttr",wi={[ei]:!1,[ni]:"string"},vi={[ei]:!0,default:!1,[ni]:"boolean"},xi={[ri]:"Endpoint"},Ei={[ii]:"isSet",[oi]:[{[ri]:"Region"}]},yi={[ri]:"Region"},bi={[ii]:"aws.partition",[oi]:[yi],assign:"PartitionResult"},Ii={[ri]:"UseFIPS"},Si={[ri]:"UseDualStack"},Pi={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:ui,signingName:"sts",signingRegion:di}]},headers:{}},Ai={},Ti={conditions:[{[ii]:li,[oi]:[yi,"aws-global"]}],[fi]:Pi,[ni]:fi},Di={[ii]:ci,[oi]:[Ii,!0]},Ci={[ii]:ci,[oi]:[Si,!0]},Ri={[ii]:mi,[oi]:[{[ri]:"PartitionResult"},"supportsFIPS"]},$i={[ri]:"PartitionResult"},Oi={[ii]:ci,[oi]:[!0,{[ii]:mi,[oi]:[$i,"supportsDualStack"]}]},ki=[{[ii]:"isSet",[oi]:[xi]}],Ni=[Di],ji=[Ci],Fi={version:"1.0",parameters:{Region:wi,UseDualStack:vi,UseFIPS:vi,Endpoint:wi,UseGlobalEndpoint:vi},rules:[{conditions:[{[ii]:ci,[oi]:[{[ri]:"UseGlobalEndpoint"},ai]},{[ii]:"not",[oi]:ki},Ei,bi,{[ii]:ci,[oi]:[Ii,si]},{[ii]:ci,[oi]:[Si,si]}],rules:[{conditions:[{[ii]:li,[oi]:[yi,"ap-northeast-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"ap-south-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"ap-southeast-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"ap-southeast-2"]}],endpoint:Pi,[ni]:fi},Ti,{conditions:[{[ii]:li,[oi]:[yi,"ca-central-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"eu-central-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"eu-north-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"eu-west-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"eu-west-2"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"eu-west-3"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"sa-east-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,di]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"us-east-2"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"us-west-1"]}],endpoint:Pi,[ni]:fi},{conditions:[{[ii]:li,[oi]:[yi,"us-west-2"]}],endpoint:Pi,[ni]:fi},{endpoint:{url:hi,properties:{authSchemes:[{name:ui,signingName:"sts",signingRegion:"{Region}"}]},headers:Ai},[ni]:fi}],[ni]:pi},{conditions:ki,rules:[{conditions:Ni,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[ni]:gi},{conditions:ji,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[ni]:gi},{endpoint:{url:xi,properties:Ai,headers:Ai},[ni]:fi}],[ni]:pi},{conditions:[Ei],rules:[{conditions:[bi],rules:[{conditions:[Di,Ci],rules:[{conditions:[{[ii]:ci,[oi]:[ai,Ri]},Oi],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Ai,headers:Ai},[ni]:fi}],[ni]:pi},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[ni]:gi}],[ni]:pi},{conditions:Ni,rules:[{conditions:[{[ii]:ci,[oi]:[Ri,ai]}],rules:[{conditions:[{[ii]:li,[oi]:[{[ii]:mi,[oi]:[$i,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:Ai,headers:Ai},[ni]:fi},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:Ai,headers:Ai},[ni]:fi}],[ni]:pi},{error:"FIPS is enabled but this partition does not support FIPS",[ni]:gi}],[ni]:pi},{conditions:ji,rules:[{conditions:[Oi],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Ai,headers:Ai},[ni]:fi}],[ni]:pi},{error:"DualStack is enabled but this partition does not support DualStack",[ni]:gi}],[ni]:pi},Ti,{endpoint:{url:hi,properties:Ai,headers:Ai},[ni]:fi}],[ni]:pi}],[ni]:pi},{error:"Invalid Configuration: Missing Region",[ni]:gi}]},_i=new Jn.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),Ui=(t,e={})=>_i.get(t,(()=>(0,Qn.s)(Fi,{endpointParams:t,logger:e.logger})));ti.m.aws=Zn.UF;var Mi=n(77),Li=n(62),Wi=n(61);const Vi=t=>{(0,Wi.I)(process.version);const e=(0,Li.I)(t),n=()=>e().then(Mi.l),i=(t=>({apiVersion:"2011-06-15",base64Decoder:t?.base64Decoder??Kn.E,base64Encoder:t?.base64Encoder??Gn.n,disableHostPrefix:t?.disableHostPrefix??!1,endpointProvider:t?.endpointProvider??Ui,extensions:t?.extensions??[],httpAuthSchemeProvider:t?.httpAuthSchemeProvider??Cn,httpAuthSchemes:t?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:t=>t.getIdentityProvider("aws.auth#sigv4"),signer:new Nn.f2},{schemeId:"smithy.api#noAuth",identityProvider:t=>t.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new Mn.m}],logger:t?.logger??new zn.N,serviceId:t?.serviceId??"STS",urlParser:t?.urlParser??Bn.D,utf8Decoder:t?.utf8Decoder??Hn.a,utf8Encoder:t?.utf8Encoder??Xn.P}))(t);(0,On.I)(process.version);const s={profile:t?.profile,logger:i.logger};return{...i,...t,runtime:"node",defaultsMode:e,authSchemePreference:t?.authSchemePreference??(0,r.Z)(kn.$,s),bodyLengthChecker:t?.bodyLengthChecker??qn.n,defaultUserAgentProvider:t?.defaultUserAgentProvider??(0,jn.pf)({serviceId:i.serviceId,clientVersion:$n.rE}),httpAuthSchemes:t?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4")||(async e=>await t.credentialDefaultProvider(e?.o||{})()),signer:new Nn.f2},{schemeId:"smithy.api#noAuth",identityProvider:t=>t.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new Mn.m}],maxAttempts:t?.maxAttempts??(0,r.Z)(bn.qs,t),region:t?.region??(0,r.Z)(o.GG,{...o.zH,...s}),requestHandler:Wn.$.create(t?.requestHandler??n),retryMode:t?.retryMode??(0,r.Z)({...bn.kN,default:async()=>(await n()).retryMode||Yn.L0},t),sha256:t?.sha256??Ln.V.bind(null,"sha256"),streamCollector:t?.streamCollector??Vn.k,useDualstackEndpoint:t?.useDualstackEndpoint??(0,r.Z)(_n.e$,s),useFipsEndpoint:t?.useFipsEndpoint??(0,r.Z)(Un.Ko,s),userAgentAppId:t?.userAgentAppId??(0,r.Z)(Fn.hV,s)}};var qi=n(96),Yi=n(98),zi=n(97);class Bi extends Sn.K{config;constructor(...[t]){const e=Vi(t||{});super(e),this.initConfig=e;const n=(i=e,Object.assign(i,{useDualstackEndpoint:i.useDualstackEndpoint??!1,useFipsEndpoint:i.useFipsEndpoint??!1,useGlobalEndpoint:i.useGlobalEndpoint??!1,defaultSigningName:"sts"}));var i;const o=(0,pn.D)(n),r=(0,bn.$z)(o),s=(0,mn.T)(r),a=(0,dn.OV)(s),c=(0,yn.C)(a),l=((t,e)=>{const n=Object.assign((0,qi.R)(t),(0,zi.xA)(t),(0,Yi.e)(t),(t=>{const e=t.httpAuthSchemes;let n=t.httpAuthSchemeProvider,i=t.credentials;return{setHttpAuthScheme(t){const n=e.findIndex((e=>e.schemeId===t.schemeId));-1===n?e.push(t):e.splice(n,1,t)},httpAuthSchemes:()=>e,setHttpAuthSchemeProvider(t){n=t},httpAuthSchemeProvider:()=>n,setCredentials(t){i=t},credentials:()=>i}})(t));return e.forEach((t=>t.configure(n))),Object.assign(t,(0,qi.$)(n),(0,zi.uv)(n),(0,Yi.j)(n),{httpAuthSchemes:(i=n).httpAuthSchemes(),httpAuthSchemeProvider:i.httpAuthSchemeProvider(),credentials:i.credentials()});var i})(Rn(c),t?.extensions||[]);this.config=l,this.middlewareStack.use((0,gn.sM)(this.config)),this.middlewareStack.use((0,In.ey)(this.config)),this.middlewareStack.use((0,En.vK)(this.config)),this.middlewareStack.use((0,dn.TC)(this.config)),this.middlewareStack.use((0,fn.Y7)(this.config)),this.middlewareStack.use((0,hn.n)(this.config)),this.middlewareStack.use((0,wn.w)(this.config,{httpAuthSchemeParametersProvider:Dn,identityProviderConfigProvider:async t=>new vn.h({"aws.auth#sigv4":t.credentials})})),this.middlewareStack.use((0,xn.l)(this.config))}destroy(){super.destroy()}}const Ki=(t,e)=>e?class extends t{constructor(t){super(t);for(const t of e)this.middlewareStack.use(t)}}:t,Gi=(t={},e)=>cn(t,Ki(Bi,e)),Hi=(t={},e)=>ln(t,Ki(Bi,e))},911:(t,e,n)=>{function i(t){return encodeURIComponent(t).replace(/[!'()*]/g,(function(t){return"%"+t.charCodeAt(0).toString(16).toUpperCase()}))}n.d(e,{$:()=>i})},912:(t,e,n)=>{n.d(e,{m:()=>i});class i{async sign(t,e,n){return t}}},914:t=>{t.exports={rE:"3.922.0"}}};
|
|
3
|
-
//# sourceMappingURL=494.index.js.map
|
package/dist/616.index.js
DELETED
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
#!/usr/bin/env node
|
|
2
|
-
"use strict";exports.id=616,exports.ids=[616],exports.modules={909:(t,e,s)=>{s.d(e,{GetRoleCredentialsCommand:()=>N,SSOClient:()=>de});var n=s(125),o=s(124),r=s(123);const i={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var a=s(114),c=s(113);class u extends c.T{constructor(t){super(t),Object.setPrototypeOf(this,u.prototype)}}class p extends u{name="InvalidRequestException";$fault="client";constructor(t){super({name:"InvalidRequestException",$fault:"client",...t}),Object.setPrototypeOf(this,p.prototype)}}class d extends u{name="ResourceNotFoundException";$fault="client";constructor(t){super({name:"ResourceNotFoundException",$fault:"client",...t}),Object.setPrototypeOf(this,d.prototype)}}class h extends u{name="TooManyRequestsException";$fault="client";constructor(t){super({name:"TooManyRequestsException",$fault:"client",...t}),Object.setPrototypeOf(this,h.prototype)}}class l extends u{name="UnauthorizedException";$fault="client";constructor(t){super({name:"UnauthorizedException",$fault:"client",...t}),Object.setPrototypeOf(this,l.prototype)}}const m=t=>({...t,...t.accessToken&&{accessToken:a.$}}),y=t=>({...t,...t.secretAccessKey&&{secretAccessKey:a.$},...t.sessionToken&&{sessionToken:a.$}}),g=t=>({...t,...t.roleCredentials&&{roleCredentials:y(t.roleCredentials)}});var f=s(116),v=s(910),w=s(119);const S=t=>null!=t;var b=s(120),P=s(115),x=s(122);const E=async(t,e)=>{const s=(0,v.l)(t,e),n=(0,w.Tj)({},S,{[z]:t[$]});s.bp("/federation/credentials");const o=(0,w.Tj)({[T]:[,(0,b.Y0)(t[U],"roleName")],[j]:[,(0,b.Y0)(t[F],"accountId")]});return s.m("GET").h(n).q(o).b(undefined),s.build()},R=async(t,e)=>{if(200!==t.statusCode&&t.statusCode>=300)return I(t,e);const s=(0,w.Tj)({$metadata:D(t)}),n=(0,b.Y0)((0,b.Xk)(await(0,f.Y2)(t.body,e)),"body"),o=(0,w.s)(n,{roleCredentials:P.S});return Object.assign(s,o),s},I=async(t,e)=>{const s={...t,body:await(0,f.CG)(t.body,e)},n=(0,f.cJ)(t,s.body);switch(n){case"InvalidRequestException":case"com.amazonaws.sso#InvalidRequestException":throw await A(s,e);case"ResourceNotFoundException":case"com.amazonaws.sso#ResourceNotFoundException":throw await C(s,e);case"TooManyRequestsException":case"com.amazonaws.sso#TooManyRequestsException":throw await q(s,e);case"UnauthorizedException":case"com.amazonaws.sso#UnauthorizedException":throw await O(s,e);default:const o=s.body;return k({output:t,parsedBody:o,errorCode:n})}},k=(0,x.j)(u),A=async(t,e)=>{const s=(0,w.Tj)({}),n=t.body,o=(0,w.s)(n,{message:b.lK});Object.assign(s,o);const r=new p({$metadata:D(t),...s});return(0,c.M)(r,t.body)},C=async(t,e)=>{const s=(0,w.Tj)({}),n=t.body,o=(0,w.s)(n,{message:b.lK});Object.assign(s,o);const r=new d({$metadata:D(t),...s});return(0,c.M)(r,t.body)},q=async(t,e)=>{const s=(0,w.Tj)({}),n=t.body,o=(0,w.s)(n,{message:b.lK});Object.assign(s,o);const r=new h({$metadata:D(t),...s});return(0,c.M)(r,t.body)},O=async(t,e)=>{const s=(0,w.Tj)({}),n=t.body,o=(0,w.s)(n,{message:b.lK});Object.assign(s,o);const r=new l({$metadata:D(t),...s});return(0,c.M)(r,t.body)},D=t=>({httpStatusCode:t.statusCode,requestId:t.headers["x-amzn-requestid"]??t.headers["x-amzn-request-id"]??t.headers["x-amz-request-id"],extendedRequestId:t.headers["x-amz-id-2"],cfId:t.headers["x-amz-cf-id"]}),F="accountId",$="accessToken",j="account_id",U="roleName",T="role_name",z="x-amz-sso_bearer_token";class N extends(r.u.classBuilder().ep(i).m((function(t,e,s,r){return[(0,o.TM)(s,this.serialize,this.deserialize),(0,n.r)(s,t.getEndpointParameterInstructions())]})).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").f(m,g).ser(E).de(R).build()){}var M=s(32),H=s(108),G=s(109),L=s(95),_=s(105),B=s(101),V=s(110),K=s(111),W=s(112),J=s(34),Q=s(102),X=s(84),Y=s(106),Z=s(99),tt=s(38),et=s(35),st=s(37);const nt=async(t,e,s)=>({operation:(0,et.u)(e).operation,region:await(0,st.t)(t.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()});const ot=t=>{const e=[];switch(t.operation){case"GetRoleCredentials":case"ListAccountRoles":case"ListAccounts":case"Logout":e.push({schemeId:"smithy.api#noAuth"});break;default:e.push(function(t){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:t.region},propertiesExtractor:(t,e)=>({signingProperties:{config:t,context:e}})}}(t))}return e},rt="3.922.0";var it=s(78),at=s(79),ct=s(82),ut=s(94),pt=s(76),dt=s(90),ht=s(93),lt=s(47),mt=s(63),yt=s(88),gt=s(89),ft=s(80),vt=s(85),wt=s(57),St=s(912),bt=s(59),Pt=s(48),xt=s(55),Et=s(56),Rt=s(43),It=s(60),kt=s(49),At=s(53),Ct=s(54),qt=s(52);const Ot="required",Dt="fn",Ft="argv",$t="ref",jt=!0,Ut="isSet",Tt="booleanEquals",zt="error",Nt="endpoint",Mt="tree",Ht="PartitionResult",Gt="getAttr",Lt={[Ot]:!1,type:"string"},_t={[Ot]:!0,default:!1,type:"boolean"},Bt={[$t]:"Endpoint"},Vt={[Dt]:Tt,[Ft]:[{[$t]:"UseFIPS"},!0]},Kt={[Dt]:Tt,[Ft]:[{[$t]:"UseDualStack"},!0]},Wt={},Jt={[Dt]:Gt,[Ft]:[{[$t]:Ht},"supportsFIPS"]},Qt={[$t]:Ht},Xt={[Dt]:Tt,[Ft]:[!0,{[Dt]:Gt,[Ft]:[Qt,"supportsDualStack"]}]},Yt=[Vt],Zt=[Kt],te=[{[$t]:"Region"}],ee={version:"1.0",parameters:{Region:Lt,UseDualStack:_t,UseFIPS:_t,Endpoint:Lt},rules:[{conditions:[{[Dt]:Ut,[Ft]:[Bt]}],rules:[{conditions:Yt,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:zt},{conditions:Zt,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:zt},{endpoint:{url:Bt,properties:Wt,headers:Wt},type:Nt}],type:Mt},{conditions:[{[Dt]:Ut,[Ft]:te}],rules:[{conditions:[{[Dt]:"aws.partition",[Ft]:te,assign:Ht}],rules:[{conditions:[Vt,Kt],rules:[{conditions:[{[Dt]:Tt,[Ft]:[jt,Jt]},Xt],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Wt,headers:Wt},type:Nt}],type:Mt},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:zt}],type:Mt},{conditions:Yt,rules:[{conditions:[{[Dt]:Tt,[Ft]:[Jt,jt]}],rules:[{conditions:[{[Dt]:"stringEquals",[Ft]:[{[Dt]:Gt,[Ft]:[Qt,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:Wt,headers:Wt},type:Nt},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:Wt,headers:Wt},type:Nt}],type:Mt},{error:"FIPS is enabled but this partition does not support FIPS",type:zt}],type:Mt},{conditions:Zt,rules:[{conditions:[Xt],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Wt,headers:Wt},type:Nt}],type:Mt},{error:"DualStack is enabled but this partition does not support DualStack",type:zt}],type:Mt},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:Wt,headers:Wt},type:Nt}],type:Mt}],type:Mt},{error:"Invalid Configuration: Missing Region",type:zt}]},se=new At.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ne=(t,e={})=>se.get(t,(()=>(0,Ct.s)(ee,{endpointParams:t,logger:e.logger})));qt.m.aws=kt.UF;var oe=s(77),re=s(62),ie=s(61);const ae=t=>{(0,ie.I)(process.version);const e=(0,re.I)(t),s=()=>e().then(oe.l),n=(t=>({apiVersion:"2019-06-10",base64Decoder:t?.base64Decoder??xt.E,base64Encoder:t?.base64Encoder??Et.n,disableHostPrefix:t?.disableHostPrefix??!1,endpointProvider:t?.endpointProvider??ne,extensions:t?.extensions??[],httpAuthSchemeProvider:t?.httpAuthSchemeProvider??ot,httpAuthSchemes:t?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:t=>t.getIdentityProvider("aws.auth#sigv4"),signer:new wt.f2},{schemeId:"smithy.api#noAuth",identityProvider:t=>t.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new St.m}],logger:t?.logger??new bt.N,serviceId:t?.serviceId??"SSO",urlParser:t?.urlParser??Pt.D,utf8Decoder:t?.utf8Decoder??Rt.a,utf8Encoder:t?.utf8Encoder??It.P}))(t);(0,it.I)(process.version);const o={profile:t?.profile,logger:n.logger};return{...n,...t,runtime:"node",defaultsMode:e,authSchemePreference:t?.authSchemePreference??(0,mt.Z)(at.$,o),bodyLengthChecker:t?.bodyLengthChecker??ft.n,defaultUserAgentProvider:t?.defaultUserAgentProvider??(0,ct.pf)({serviceId:n.serviceId,clientVersion:rt}),maxAttempts:t?.maxAttempts??(0,mt.Z)(X.qs,t),region:t?.region??(0,mt.Z)(pt.GG,{...pt.zH,...o}),requestHandler:yt.$.create(t?.requestHandler??s),retryMode:t?.retryMode??(0,mt.Z)({...X.kN,default:async()=>(await s()).retryMode||vt.L0},t),sha256:t?.sha256??lt.V.bind(null,"sha256"),streamCollector:t?.streamCollector??gt.k,useDualstackEndpoint:t?.useDualstackEndpoint??(0,mt.Z)(dt.e$,o),useFipsEndpoint:t?.useFipsEndpoint??(0,mt.Z)(ht.Ko,o),userAgentAppId:t?.userAgentAppId??(0,mt.Z)(ut.hV,o)}};var ce=s(96),ue=s(98),pe=s(97);class de extends Z.K{config;constructor(...[t]){const e=ae(t||{});super(e),this.initConfig=e;const s=(n=e,Object.assign(n,{useDualstackEndpoint:n.useDualstackEndpoint??!1,useFipsEndpoint:n.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}));var n;const o=(0,L.D)(s),r=(0,X.$z)(o),i=(0,B.T)(r),a=(0,M.OV)(i),c=((t,e)=>{const s=Object.assign((0,ce.R)(t),(0,pe.xA)(t),(0,ue.e)(t),(t=>{const e=t.httpAuthSchemes;let s=t.httpAuthSchemeProvider,n=t.credentials;return{setHttpAuthScheme(t){const s=e.findIndex((e=>e.schemeId===t.schemeId));-1===s?e.push(t):e.splice(s,1,t)},httpAuthSchemes:()=>e,setHttpAuthSchemeProvider(t){s=t},httpAuthSchemeProvider:()=>s,setCredentials(t){n=t},credentials:()=>n}})(t));return e.forEach((t=>t.configure(s))),Object.assign(t,(0,ce.$)(s),(0,pe.uv)(s),(0,ue.j)(s),{httpAuthSchemes:(n=s).httpAuthSchemes(),httpAuthSchemeProvider:n.httpAuthSchemeProvider(),credentials:n.credentials()});var n})((t=>{const e=(0,tt.h)(t);return Object.assign(e,{authSchemePreference:(0,st.t)(t.authSchemePreference??[])})})((0,Q.C)(a)),t?.extensions||[]);this.config=c,this.middlewareStack.use((0,_.sM)(this.config)),this.middlewareStack.use((0,Y.ey)(this.config)),this.middlewareStack.use((0,J.vK)(this.config)),this.middlewareStack.use((0,M.TC)(this.config)),this.middlewareStack.use((0,H.Y7)(this.config)),this.middlewareStack.use((0,G.n)(this.config)),this.middlewareStack.use((0,V.w)(this.config,{httpAuthSchemeParametersProvider:nt,identityProviderConfigProvider:async t=>new K.h({"aws.auth#sigv4":t.credentials})})),this.middlewareStack.use((0,W.l)(this.config))}destroy(){super.destroy()}}},911:(t,e,s)=>{function n(t){return encodeURIComponent(t).replace(/[!'()*]/g,(function(t){return"%"+t.charCodeAt(0).toString(16).toUpperCase()}))}s.d(e,{$:()=>n})},910:(t,e,s)=>{s.d(e,{l:()=>r});var n=s(33),o=s(911);function r(t,e){return new i(t,e)}class i{input;context;query={};method="";headers={};path="";body=null;hostname="";resolvePathStack=[];constructor(t,e){this.input=t,this.context=e}async build(){const{hostname:t,protocol:e="https",port:s,path:o}=await this.context.endpoint();this.path=o;for(const t of this.resolvePathStack)t(this.path);return new n.K({protocol:e,hostname:this.hostname||t,port:s,method:this.method,path:this.path,query:this.query,body:this.body,headers:this.headers})}hn(t){return this.hostname=t,this}bp(t){return this.resolvePathStack.push((e=>{this.path=`${e?.endsWith("/")?e.slice(0,-1):e||""}`+t})),this}p(t,e,s,n){return this.resolvePathStack.push((r=>{this.path=((t,e,s,n,r,i)=>{if(null==e||void 0===e[s])throw new Error("No value provided for input HTTP label: "+s+".");{const e=n();if(e.length<=0)throw new Error("Empty value provided for input HTTP label: "+s+".");t=t.replace(r,i?e.split("/").map((t=>(0,o.$)(t))).join("/"):(0,o.$)(e))}return t})(r,this.input,t,e,s,n)})),this}h(t){return this.headers=t,this}q(t){return this.query=t,this}b(t){return this.body=t,this}m(t){return this.method=t,this}}},912:(t,e,s)=>{s.d(e,{m:()=>n});class n{async sign(t,e,s){return t}}}};
|
|
3
|
-
//# sourceMappingURL=616.index.js.map
|
package/dist/750.index.js
DELETED
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
#!/usr/bin/env node
|
|
2
|
-
"use strict";exports.id=750,exports.ids=[750],exports.modules={908:(e,t,r)=>{r.d(t,{fromHttp:()=>R});var o=r(39),n=r(88),a=r(64),s=r(27),i=r.n(s);var c=r(33),f=r(121),l=r(89),w=r(44),u=r(8),d=r(55);const p=async e=>"function"==typeof Blob&&e instanceof Blob||"Blob"===e.constructor?.name?void 0!==Blob.prototype.arrayBuffer?new Uint8Array(await e.arrayBuffer()):async function(e){const t=await function(e){return new Promise(((t,r)=>{const o=new FileReader;o.onloadend=()=>{if(2!==o.readyState)return r(new Error("Reader aborted too early"));const e=o.result??"",n=e.indexOf(","),a=n>-1?n+1:e.length;t(e.substring(a))},o.onabort=()=>r(new Error("Read aborted")),o.onerror=()=>r(o.error),o.readAsDataURL(e)}))}(e),r=(0,d.E)(t);return new Uint8Array(r)}(e):async function(e){const t=[],r=e.getReader();let o=!1,n=0;for(;!o;){const{done:e,value:a}=await r.read();a&&(t.push(a),n+=a.length),o=e}const a=new Uint8Array(n);let s=0;for(const e of t)a.set(e,s),s+=e.length;return a}(e);var h=r(56),y=r(41),m=r(60);const b=e=>"function"==typeof ReadableStream&&(e?.constructor?.name===ReadableStream.name||e instanceof ReadableStream),T="The stream has already been transformed.",g=e=>{if(!E(e)&&!b(e)){throw new Error(`Unexpected stream implementation, expect Blob or ReadableStream, got ${e?.__proto__?.constructor?.name||e}`)}let t=!1;const r=async()=>{if(t)throw new Error(T);return t=!0,await p(e)};return Object.assign(e,{transformToByteArray:r,transformToString:async e=>{const t=await r();if("base64"===e)return(0,h.n)(t);if("hex"===e)return(0,y.n)(t);if(void 0===e||"utf8"===e||"utf-8"===e)return(0,m.P)(t);if("function"==typeof TextDecoder)return new TextDecoder(e).decode(t);throw new Error("TextDecoder is not available, please make sure polyfill is provided.")},transformToWebStream:()=>{if(t)throw new Error(T);if(t=!0,E(e))return(e=>{if("function"!=typeof e.stream)throw new Error("Cannot transform payload Blob to web stream. Please make sure the Blob.stream() is polyfilled.\nIf you are using React Native, this API is not yet supported, see: https://react-native.canny.io/feature-requests/p/fetch-streaming-body");return e.stream()})(e);if(b(e))return e;throw new Error(`Cannot transform payload to web stream, got ${e}`)}})},E=e=>"function"==typeof Blob&&e instanceof Blob,v="The stream has already been transformed.";async function S(e,t){const r=(e=>{if(!(e instanceof u.Readable))try{return g(e)}catch(t){throw new Error(`Unexpected stream implementation, expect Stream.Readable instance, got ${e?.__proto__?.constructor?.name||e}`)}let t=!1;const r=async()=>{if(t)throw new Error(v);return t=!0,await(0,l.k)(e)};return Object.assign(e,{transformToByteArray:r,transformToString:async e=>{const t=await r();return void 0===e||Buffer.isEncoding(e)?(0,w.Q)(t.buffer,t.byteOffset,t.byteLength).toString(e):new TextDecoder(e).decode(t)},transformToWebStream:()=>{if(t)throw new Error(v);if(null!==e.readableFlowing)throw new Error("The stream has been consumed by other callbacks.");if("function"!=typeof u.Readable.toWeb)throw new Error("Readable.toWeb() is not supported. Please ensure a polyfill is available.");return t=!0,u.Readable.toWeb(e)}})})(e.body),o=await r.transformToString();if(200===e.statusCode){const e=JSON.parse(o);if("string"!=typeof e.AccessKeyId||"string"!=typeof e.SecretAccessKey||"string"!=typeof e.Token||"string"!=typeof e.Expiration)throw new a.C("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:t});return{accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:(0,f.EI)(e.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let r={};try{r=JSON.parse(o)}catch(e){}throw Object.assign(new a.C(`Server responded with status: ${e.statusCode}`,{logger:t}),{Code:r.Code,Message:r.Message})}throw new a.C(`Server responded with status: ${e.statusCode}`,{logger:t})}const R=(e={})=>{let t;e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");const r=e.awsContainerCredentialsRelativeUri??process.env.AWS_CONTAINER_CREDENTIALS_RELATIVE_URI,s=e.awsContainerCredentialsFullUri??process.env.AWS_CONTAINER_CREDENTIALS_FULL_URI,f=e.awsContainerAuthorizationToken??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN,l=e.awsContainerAuthorizationTokenFile??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE,w="NoOpLogger"!==e.logger?.constructor?.name&&e.logger?.warn?e.logger.warn.bind(e.logger):console.warn;if(r&&s&&(w("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),w("awsContainerCredentialsFullUri will take precedence.")),f&&l&&(w("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),w("awsContainerAuthorizationToken will take precedence.")),s)t=s;else{if(!r)throw new a.C("No HTTP credential provider host provided.\nSet AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.",{logger:e.logger});t=`http://169.254.170.2${r}`}const u=new URL(t);((e,t)=>{if("https:"!==e.protocol&&"169.254.170.2"!==e.hostname&&"169.254.170.23"!==e.hostname&&"[fd00:ec2::23]"!==e.hostname){if(e.hostname.includes("[")){if("[::1]"===e.hostname||"[0000:0000:0000:0000:0000:0000:0000:0001]"===e.hostname)return}else{if("localhost"===e.hostname)return;const t=e.hostname.split("."),r=e=>{const t=parseInt(e,10);return 0<=t&&t<=255};if("127"===t[0]&&r(t[1])&&r(t[2])&&r(t[3])&&4===t.length)return}throw new a.C("URL not accepted. It must either be HTTPS or match one of the following:\n - loopback CIDR 127.0.0.0/8 or [::1/128]\n - ECS container host 169.254.170.2\n - EKS container host 169.254.170.23 or [fd00:ec2::23]",{logger:t})}})(u,e.logger);const d=n.$.create({requestTimeout:e.timeout??1e3,connectionTimeout:e.timeout??1e3});return p=async()=>{const t=function(e){return new c.K({protocol:e.protocol,hostname:e.hostname,port:Number(e.port),path:e.pathname,query:Array.from(e.searchParams.entries()).reduce(((e,[t,r])=>(e[t]=r,e)),{}),fragment:e.hash})}(u);f?t.headers.Authorization=f:l&&(t.headers.Authorization=(await i().readFile(l)).toString());try{return S((await d.handle(t)).response).then((e=>(0,o.g)(e,"CREDENTIALS_HTTP","z")))}catch(t){throw new a.C(String(t),{logger:e.logger})}},h=e.maxRetries??3,y=e.timeout??1e3,async()=>{for(let e=0;e<h;++e)try{return await p()}catch(e){await new Promise((e=>setTimeout(e,y)))}return await p()};var p,h,y}}};
|
|
3
|
-
//# sourceMappingURL=750.index.js.map
|
package/dist/770.index.js
DELETED
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
#!/usr/bin/env node
|
|
2
|
-
"use strict";exports.id=770,exports.ids=[770],exports.modules={904:(e,t,r)=>{r.d(t,{fromIni:()=>y});var n=r(902),o=r(66),i=r(64),s=r(39),a=r(75);const c=e=>(0,s.g)(e,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p"),l=(e,{profile:t,logger:r})=>{const n="string"==typeof e.source_profile&&void 0===e.credential_source;return n&&r?.debug?.(` ${t} isAssumeRoleWithSourceProfile source_profile=${e.source_profile}`),n},f=(e,{profile:t,logger:r})=>{const n="string"==typeof e.credential_source&&void 0===e.source_profile;return n&&r?.debug?.(` ${t} isCredentialSourceProfile credential_source=${e.credential_source}`),n},d=async(e,t,n,l={},f)=>{n.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");const d=t[e],{source_profile:g,region:u}=d;if(!n.roleAssumer){const{getDefaultRoleAssumer:e}=await r.e(494).then(r.bind(r,915));n.roleAssumer=e({...n.clientConfig,credentialProviderLogger:n.logger,parentClientConfig:{...n?.parentClientConfig,region:u??n?.parentClientConfig?.region}},n.clientPlugins)}if(g&&g in l)throw new i.C(`Detected a cycle attempting to resolve credentials for profile ${(0,o.Bz)(n)}. Profiles visited: `+Object.keys(l).join(", "),{logger:n.logger});n.logger?.debug("@aws-sdk/credential-provider-ini - finding credential resolver using "+(g?`source_profile=[${g}]`:`profile=[${e}]`));const E=g?f(g,t,n,{...l,[g]:!0},p(t[g]??{})):(await((e,t,n)=>{const o={EcsContainer:async e=>{const{fromHttp:t}=await r.e(750).then(r.bind(r,908)),{fromContainerMetadata:o}=await r.e(330).then(r.bind(r,899));return n?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>(0,a.c)(t(e??{}),o(e))().then(c)},Ec2InstanceMetadata:async e=>{n?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");const{fromInstanceMetadata:t}=await r.e(330).then(r.bind(r,899));return async()=>t(e)().then(c)},Environment:async e=>{n?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");const{fromEnv:t}=await r.e(960).then(r.bind(r,916));return async()=>t(e)().then(c)}};if(e in o)return o[e];throw new i.C(`Unsupported credential source in profile ${t}. Got ${e}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:n})})(d.credential_source,e,n.logger)(n))();if(p(d))return E.then((e=>(0,s.g)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o")));{const t={RoleArn:d.role_arn,RoleSessionName:d.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:d.external_id,DurationSeconds:parseInt(d.duration_seconds||"3600",10)},{mfa_serial:r}=d;if(r){if(!n.mfaCodeProvider)throw new i.C(`Profile ${e} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:n.logger,tryNextLink:!1});t.SerialNumber=r,t.TokenCode=await n.mfaCodeProvider(r)}const o=await E;return n.roleAssumer(o,t).then((e=>(0,s.g)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o")))}},p=e=>!e.role_arn&&!!e.credential_source,g=e=>Boolean(e)&&"object"==typeof e&&"string"==typeof e.aws_access_key_id&&"string"==typeof e.aws_secret_access_key&&["undefined","string"].indexOf(typeof e.aws_session_token)>-1&&["undefined","string"].indexOf(typeof e.aws_account_id)>-1,u=async(e,t)=>{t?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");const r={accessKeyId:e.aws_access_key_id,secretAccessKey:e.aws_secret_access_key,sessionToken:e.aws_session_token,...e.aws_credential_scope&&{credentialScope:e.aws_credential_scope},...e.aws_account_id&&{accountId:e.aws_account_id}};return(0,s.g)(r,"CREDENTIALS_PROFILE","n")},E=async(e,t,n,o={},a=!1)=>{const c=t[e];if(Object.keys(o).length>0&&g(c))return u(c,n);if(a||((e,{profile:t="default",logger:r}={})=>Boolean(e)&&"object"==typeof e&&"string"==typeof e.role_arn&&["undefined","string"].indexOf(typeof e.role_session_name)>-1&&["undefined","string"].indexOf(typeof e.external_id)>-1&&["undefined","string"].indexOf(typeof e.mfa_serial)>-1&&(l(e,{profile:t,logger:r})||f(e,{profile:t,logger:r})))(c,{profile:e,logger:n.logger}))return d(e,t,n,o,E);if(g(c))return u(c,n);if(p=c,Boolean(p)&&"object"==typeof p&&"string"==typeof p.web_identity_token_file&&"string"==typeof p.role_arn&&["undefined","string"].indexOf(typeof p.role_session_name)>-1)return(async(e,t)=>r.e(522).then(r.bind(r,907)).then((({fromTokenFile:r})=>r({webIdentityTokenFile:e.web_identity_token_file,roleArn:e.role_arn,roleSessionName:e.role_session_name,roleAssumerWithWebIdentity:t.roleAssumerWithWebIdentity,logger:t.logger,parentClientConfig:t.parentClientConfig})().then((e=>(0,s.g)(e,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q"))))))(c,n);var p;if((e=>Boolean(e)&&"object"==typeof e&&"string"==typeof e.credential_process)(c))return(async(e,t)=>r.e(733).then(r.bind(r,905)).then((({fromProcess:r})=>r({...e,profile:t})().then((e=>(0,s.g)(e,"CREDENTIALS_PROFILE_PROCESS","v"))))))(n,e);if((e=>e&&("string"==typeof e.sso_start_url||"string"==typeof e.sso_account_id||"string"==typeof e.sso_session||"string"==typeof e.sso_region||"string"==typeof e.sso_role_name))(c))return await(async(e,t,n={})=>{const{fromSSO:o}=await r.e(593).then(r.bind(r,900));return o({profile:e,logger:n.logger,parentClientConfig:n.parentClientConfig,clientConfig:n.clientConfig})().then((e=>t.sso_session?(0,s.g)(e,"CREDENTIALS_PROFILE_SSO","r"):(0,s.g)(e,"CREDENTIALS_PROFILE_SSO_LEGACY","t")))})(e,c,n);throw new i.C(`Could not resolve credentials using profile: [${e}] in configuration/credentials file(s).`,{logger:n.logger})},y=(e={})=>async({callerClientConfig:t}={})=>{const r={...e,parentClientConfig:{...t,...e.parentClientConfig}};r.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");const i=await(0,n.Y)(r);return E((0,o.Bz)({profile:e.profile??t?.profile}),i,r)}},902:(e,t,r)=>{r.d(t,{Y:()=>o});var n=r(67);const o=async e=>{const t=await(0,n.p)(e);return((...e)=>{const t={};for(const r of e)for(const[e,n]of Object.entries(r))void 0!==t[e]?Object.assign(t[e],n):t[e]=n;return t})(t.configFile,t.credentialsFile)}}};
|
|
3
|
-
//# sourceMappingURL=770.index.js.map
|