agentv 3.10.3 → 3.11.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (122) hide show
  1. package/dist/{agentv-provider-NFFLXG5M-TJAWCWCX.js → agentv-provider-MIDKLYIH-6LIYKQRP.js} +2 -1
  2. package/dist/chunk-2QFWRIYL.js +186 -0
  3. package/dist/chunk-2QFWRIYL.js.map +1 -0
  4. package/dist/chunk-2RMPO6LY.js +747 -0
  5. package/dist/chunk-2RMPO6LY.js.map +1 -0
  6. package/dist/chunk-3Q7WIXT4.js +4846 -0
  7. package/dist/chunk-3Q7WIXT4.js.map +1 -0
  8. package/dist/chunk-73O2DCJP.js +1274 -0
  9. package/dist/chunk-73O2DCJP.js.map +1 -0
  10. package/dist/chunk-AUKF3Y3W.js +212 -0
  11. package/dist/chunk-AUKF3Y3W.js.map +1 -0
  12. package/dist/{chunk-XOSNETAV.js → chunk-BAUNAXHT.js} +1 -1
  13. package/dist/chunk-BRH7SIDP.js +133 -0
  14. package/dist/chunk-BRH7SIDP.js.map +1 -0
  15. package/dist/chunk-BXM4I3BM.js +526 -0
  16. package/dist/chunk-BXM4I3BM.js.map +1 -0
  17. package/dist/{chunk-U556GRI3.js → chunk-CKMAM2GD.js} +76 -34
  18. package/dist/chunk-CKMAM2GD.js.map +1 -0
  19. package/dist/chunk-FHTURHTY.js +546 -0
  20. package/dist/chunk-FHTURHTY.js.map +1 -0
  21. package/dist/chunk-GJFXQQWG.js +21 -0
  22. package/dist/chunk-GJFXQQWG.js.map +1 -0
  23. package/dist/chunk-HKMLG4KF.js +38 -0
  24. package/dist/chunk-HKMLG4KF.js.map +1 -0
  25. package/dist/chunk-JGU3PVA4.js +133 -0
  26. package/dist/chunk-JGU3PVA4.js.map +1 -0
  27. package/dist/chunk-LHU5FGVZ.js +4804 -0
  28. package/dist/chunk-LHU5FGVZ.js.map +1 -0
  29. package/dist/chunk-OL2WGI6E.js +149 -0
  30. package/dist/chunk-OL2WGI6E.js.map +1 -0
  31. package/dist/chunk-ONETZL6N.js +15 -0
  32. package/dist/chunk-ONETZL6N.js.map +1 -0
  33. package/dist/{chunk-JUQCB3ZW.js → chunk-OYD2NB55.js} +1292 -896
  34. package/dist/chunk-OYD2NB55.js.map +1 -0
  35. package/dist/chunk-QV4UGEN6.js +320 -0
  36. package/dist/chunk-QV4UGEN6.js.map +1 -0
  37. package/dist/chunk-QXLDKGF3.js +46 -0
  38. package/dist/chunk-QXLDKGF3.js.map +1 -0
  39. package/dist/chunk-U6VEM66A.js +63 -0
  40. package/dist/chunk-U6VEM66A.js.map +1 -0
  41. package/dist/chunk-UALXHIMX.js +48 -0
  42. package/dist/chunk-UALXHIMX.js.map +1 -0
  43. package/dist/chunk-UGXG73VF.js +55 -0
  44. package/dist/chunk-UGXG73VF.js.map +1 -0
  45. package/dist/chunk-UHP5KEDL.js +38 -0
  46. package/dist/chunk-UHP5KEDL.js.map +1 -0
  47. package/dist/{chunk-7LC3VNOC.js → chunk-V2S5CZU3.js} +1141 -60
  48. package/dist/chunk-V2S5CZU3.js.map +1 -0
  49. package/dist/chunk-WVSXFZWP.js +204 -0
  50. package/dist/chunk-WVSXFZWP.js.map +1 -0
  51. package/dist/chunk-XSUMCWKO.js +30 -0
  52. package/dist/chunk-XSUMCWKO.js.map +1 -0
  53. package/dist/chunk-XUO7ZEHU.js +181 -0
  54. package/dist/chunk-XUO7ZEHU.js.map +1 -0
  55. package/dist/chunk-YSGUX5JT.js +1002 -0
  56. package/dist/chunk-YSGUX5JT.js.map +1 -0
  57. package/dist/cli.js +5 -4
  58. package/dist/cli.js.map +1 -1
  59. package/dist/dist-3PCP5TNF-RYMVLILE.js +25785 -0
  60. package/dist/dist-3PCP5TNF-RYMVLILE.js.map +1 -0
  61. package/dist/dist-BOIN5LC5-T5UWUK43.js +76113 -0
  62. package/dist/dist-BOIN5LC5-T5UWUK43.js.map +1 -0
  63. package/dist/dist-LXPDQOBI-4V5J2WDS.js +13 -0
  64. package/dist/dist-LXPDQOBI-4V5J2WDS.js.map +1 -0
  65. package/dist/{dist-2X7A3TTC.js → dist-VUPMLHIV.js} +4 -3
  66. package/dist/dist-es-4WSJUIYR-XKIX65IH.js +69 -0
  67. package/dist/dist-es-4WSJUIYR-XKIX65IH.js.map +1 -0
  68. package/dist/dist-es-7K7MKRME-CCMAZOQC.js +355 -0
  69. package/dist/dist-es-7K7MKRME-CCMAZOQC.js.map +1 -0
  70. package/dist/dist-es-B2RTOKRI-VWZHK5RE.js +191 -0
  71. package/dist/dist-es-B2RTOKRI-VWZHK5RE.js.map +1 -0
  72. package/dist/dist-es-HHZ4FAXA-CRERHWKB.js +164 -0
  73. package/dist/dist-es-HHZ4FAXA-CRERHWKB.js.map +1 -0
  74. package/dist/dist-es-HVS3RPMX-AYJ3DW4L.js +355 -0
  75. package/dist/dist-es-HVS3RPMX-AYJ3DW4L.js.map +1 -0
  76. package/dist/dist-es-L6R4FPI5-IKIRYN45.js +472 -0
  77. package/dist/dist-es-L6R4FPI5-IKIRYN45.js.map +1 -0
  78. package/dist/dist-es-SRVEB5QV-Q4CTC2HX.js +24 -0
  79. package/dist/dist-es-TRIVUKV4-2J47CDXR.js +85 -0
  80. package/dist/dist-es-TRIVUKV4-2J47CDXR.js.map +1 -0
  81. package/dist/dist-es-UEEUAV34-IZQDTAMW.js +16 -0
  82. package/dist/{esm-5Q4BZALM-5REQWAUV.js → esm-OJ2BXJK4-YKEI3Z7E.js} +3 -2
  83. package/dist/{esm-5Q4BZALM-5REQWAUV.js.map → esm-OJ2BXJK4-YKEI3Z7E.js.map} +1 -1
  84. package/dist/{esm-CZAWIY6F.js → esm-UYZ3HJBU.js} +2 -2
  85. package/dist/event-streams-NZADSH5J-6MOSNEV3.js +247 -0
  86. package/dist/event-streams-NZADSH5J-6MOSNEV3.js.map +1 -0
  87. package/dist/index.js +5 -4
  88. package/dist/{interactive-CSA4KIND.js → interactive-FZJANO4A.js} +5 -4
  89. package/dist/{interactive-CSA4KIND.js.map → interactive-FZJANO4A.js.map} +1 -1
  90. package/dist/loadSso-IQZ5NB6C-DZJTORO3.js +738 -0
  91. package/dist/loadSso-IQZ5NB6C-DZJTORO3.js.map +1 -0
  92. package/dist/multipart-parser-IPYBIGNL-LFMNMM6D.js +387 -0
  93. package/dist/multipart-parser-IPYBIGNL-LFMNMM6D.js.map +1 -0
  94. package/dist/{otlp-json-file-exporter-77FDBRSY-EZAPHWP6.js → otlp-json-file-exporter-VN67MK3S-RQIM6EHY.js} +2 -1
  95. package/dist/otlp-json-file-exporter-VN67MK3S-RQIM6EHY.js.map +1 -0
  96. package/dist/signin-2ANR4DVS-K5VGBEJF.js +556 -0
  97. package/dist/signin-2ANR4DVS-K5VGBEJF.js.map +1 -0
  98. package/dist/{simple-trace-file-exporter-S76DMABU-5FCJESD2.js → simple-trace-file-exporter-XWZTIZR2-4JKATE5G.js} +2 -1
  99. package/dist/simple-trace-file-exporter-XWZTIZR2-4JKATE5G.js.map +1 -0
  100. package/dist/{src-ML4D2MC2.js → src-PXDA7QIS.js} +2 -2
  101. package/dist/src-SLOMUG7K-CV5JG263.js +1408 -0
  102. package/dist/src-SLOMUG7K-CV5JG263.js.map +1 -0
  103. package/dist/sso-oidc-HVCDATR2-CYP3BM5O.js +708 -0
  104. package/dist/sso-oidc-HVCDATR2-CYP3BM5O.js.map +1 -0
  105. package/dist/sts-X7JGSP4H-PDAAYDDH.js +2917 -0
  106. package/dist/sts-X7JGSP4H-PDAAYDDH.js.map +1 -0
  107. package/dist/templates/.agentv/config.yaml +4 -13
  108. package/dist/templates/.agentv/targets.yaml +0 -16
  109. package/dist/undici-VAR2VUJI-6PAOUXZC.js +23388 -0
  110. package/dist/undici-VAR2VUJI-6PAOUXZC.js.map +1 -0
  111. package/package.json +11 -3
  112. package/dist/chunk-7LC3VNOC.js.map +0 -1
  113. package/dist/chunk-JUQCB3ZW.js.map +0 -1
  114. package/dist/chunk-U556GRI3.js.map +0 -1
  115. package/dist/templates/.agentv/.env.example +0 -23
  116. /package/dist/{agentv-provider-NFFLXG5M-TJAWCWCX.js.map → agentv-provider-MIDKLYIH-6LIYKQRP.js.map} +0 -0
  117. /package/dist/{chunk-XOSNETAV.js.map → chunk-BAUNAXHT.js.map} +0 -0
  118. /package/dist/{dist-2X7A3TTC.js.map → dist-VUPMLHIV.js.map} +0 -0
  119. /package/dist/{esm-CZAWIY6F.js.map → dist-es-SRVEB5QV-Q4CTC2HX.js.map} +0 -0
  120. /package/dist/{otlp-json-file-exporter-77FDBRSY-EZAPHWP6.js.map → dist-es-UEEUAV34-IZQDTAMW.js.map} +0 -0
  121. /package/dist/{simple-trace-file-exporter-S76DMABU-5FCJESD2.js.map → esm-UYZ3HJBU.js.map} +0 -0
  122. /package/dist/{src-ML4D2MC2.js.map → src-PXDA7QIS.js.map} +0 -0
@@ -0,0 +1,472 @@
1
+ import { createRequire } from 'node:module'; const require = createRequire(import.meta.url);
2
+ import {
3
+ HttpRequest
4
+ } from "./chunk-U6VEM66A.js";
5
+ import {
6
+ setCredentialFeature
7
+ } from "./chunk-ONETZL6N.js";
8
+ import {
9
+ chain
10
+ } from "./chunk-XSUMCWKO.js";
11
+ import {
12
+ getProfileName,
13
+ parseKnownFiles,
14
+ readFile
15
+ } from "./chunk-WVSXFZWP.js";
16
+ import {
17
+ CredentialsProviderError
18
+ } from "./chunk-UHP5KEDL.js";
19
+ import "./chunk-UGXG73VF.js";
20
+ import "./chunk-5H446C7X.js";
21
+
22
+ // ../../packages/core/dist/dist-es-L6R4FPI5.js
23
+ import { createHash, createPrivateKey, createPublicKey, sign } from "node:crypto";
24
+ import { promises as fs } from "node:fs";
25
+ import { homedir } from "node:os";
26
+ import { dirname, join } from "node:path";
27
+ var resolveCredentialSource = (credentialSource, profileName, logger) => {
28
+ const sourceProvidersMap = {
29
+ EcsContainer: async (options) => {
30
+ const { fromHttp } = await import("./dist-es-HHZ4FAXA-CRERHWKB.js");
31
+ const { fromContainerMetadata } = await import("./dist-es-7K7MKRME-CCMAZOQC.js");
32
+ logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
33
+ return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
34
+ },
35
+ Ec2InstanceMetadata: async (options) => {
36
+ logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
37
+ const { fromInstanceMetadata } = await import("./dist-es-7K7MKRME-CCMAZOQC.js");
38
+ return async () => fromInstanceMetadata(options)().then(setNamedProvider);
39
+ },
40
+ Environment: async (options) => {
41
+ logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
42
+ const { fromEnv } = await import("./dist-es-SRVEB5QV-Q4CTC2HX.js");
43
+ return async () => fromEnv(options)().then(setNamedProvider);
44
+ }
45
+ };
46
+ if (credentialSource in sourceProvidersMap) {
47
+ return sourceProvidersMap[credentialSource];
48
+ } else {
49
+ throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });
50
+ }
51
+ };
52
+ var setNamedProvider = (creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p");
53
+ var isAssumeRoleProfile = (arg, { profile = "default", logger } = {}) => {
54
+ return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger }));
55
+ };
56
+ var isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {
57
+ const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
58
+ if (withSourceProfile) {
59
+ logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
60
+ }
61
+ return withSourceProfile;
62
+ };
63
+ var isCredentialSourceProfile = (arg, { profile, logger }) => {
64
+ const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
65
+ if (withProviderProfile) {
66
+ logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
67
+ }
68
+ return withProviderProfile;
69
+ };
70
+ var resolveAssumeRoleCredentials = async (profileName, profiles, options, callerClientConfig, visitedProfiles = {}, resolveProfileData2) => {
71
+ options.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");
72
+ const profileData = profiles[profileName];
73
+ const { source_profile, region } = profileData;
74
+ if (!options.roleAssumer) {
75
+ const { getDefaultRoleAssumer } = await import("./sts-X7JGSP4H-PDAAYDDH.js");
76
+ options.roleAssumer = getDefaultRoleAssumer({
77
+ ...options.clientConfig,
78
+ credentialProviderLogger: options.logger,
79
+ parentClientConfig: {
80
+ ...callerClientConfig,
81
+ ...options?.parentClientConfig,
82
+ region: region ?? options?.parentClientConfig?.region ?? callerClientConfig?.region
83
+ }
84
+ }, options.clientPlugins);
85
+ }
86
+ if (source_profile && source_profile in visitedProfiles) {
87
+ throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${getProfileName(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "), { logger: options.logger });
88
+ }
89
+ options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);
90
+ const sourceCredsProvider = source_profile ? resolveProfileData2(source_profile, profiles, options, callerClientConfig, {
91
+ ...visitedProfiles,
92
+ [source_profile]: true
93
+ }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {})) : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();
94
+ if (isCredentialSourceWithoutRoleArn(profileData)) {
95
+ return sourceCredsProvider.then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
96
+ } else {
97
+ const params = {
98
+ RoleArn: profileData.role_arn,
99
+ RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,
100
+ ExternalId: profileData.external_id,
101
+ DurationSeconds: parseInt(profileData.duration_seconds || "3600", 10)
102
+ };
103
+ const { mfa_serial } = profileData;
104
+ if (mfa_serial) {
105
+ if (!options.mfaCodeProvider) {
106
+ throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });
107
+ }
108
+ params.SerialNumber = mfa_serial;
109
+ params.TokenCode = await options.mfaCodeProvider(mfa_serial);
110
+ }
111
+ const sourceCreds = await sourceCredsProvider;
112
+ return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_SOURCE_PROFILE", "o"));
113
+ }
114
+ };
115
+ var isCredentialSourceWithoutRoleArn = (section) => {
116
+ return !section.role_arn && !!section.credential_source;
117
+ };
118
+ var LoginCredentialsFetcher = class _LoginCredentialsFetcher {
119
+ profileData;
120
+ init;
121
+ callerClientConfig;
122
+ static REFRESH_THRESHOLD = 5 * 60 * 1e3;
123
+ constructor(profileData, init, callerClientConfig) {
124
+ this.profileData = profileData;
125
+ this.init = init;
126
+ this.callerClientConfig = callerClientConfig;
127
+ }
128
+ async loadCredentials() {
129
+ const token = await this.loadToken();
130
+ if (!token) {
131
+ throw new CredentialsProviderError(`Failed to load a token for session ${this.loginSession}, please re-authenticate using aws login`, { tryNextLink: false, logger: this.logger });
132
+ }
133
+ const accessToken = token.accessToken;
134
+ const now = Date.now();
135
+ const expiryTime = new Date(accessToken.expiresAt).getTime();
136
+ const timeUntilExpiry = expiryTime - now;
137
+ if (timeUntilExpiry <= _LoginCredentialsFetcher.REFRESH_THRESHOLD) {
138
+ return this.refresh(token);
139
+ }
140
+ return {
141
+ accessKeyId: accessToken.accessKeyId,
142
+ secretAccessKey: accessToken.secretAccessKey,
143
+ sessionToken: accessToken.sessionToken,
144
+ accountId: accessToken.accountId,
145
+ expiration: new Date(accessToken.expiresAt)
146
+ };
147
+ }
148
+ get logger() {
149
+ return this.init?.logger;
150
+ }
151
+ get loginSession() {
152
+ return this.profileData.login_session;
153
+ }
154
+ async refresh(token) {
155
+ const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-2ANR4DVS-K5VGBEJF.js");
156
+ const { logger, userAgentAppId } = this.callerClientConfig ?? {};
157
+ const isH2 = (requestHandler2) => {
158
+ return requestHandler2?.metadata?.handlerProtocol === "h2";
159
+ };
160
+ const requestHandler = isH2(this.callerClientConfig?.requestHandler) ? void 0 : this.callerClientConfig?.requestHandler;
161
+ const region = this.profileData.region ?? await this.callerClientConfig?.region?.() ?? process.env.AWS_REGION;
162
+ const client = new SigninClient({
163
+ credentials: {
164
+ accessKeyId: "",
165
+ secretAccessKey: ""
166
+ },
167
+ region,
168
+ requestHandler,
169
+ logger,
170
+ userAgentAppId,
171
+ ...this.init?.clientConfig
172
+ });
173
+ this.createDPoPInterceptor(client.middlewareStack);
174
+ const commandInput = {
175
+ tokenInput: {
176
+ clientId: token.clientId,
177
+ refreshToken: token.refreshToken,
178
+ grantType: "refresh_token"
179
+ }
180
+ };
181
+ try {
182
+ const response = await client.send(new CreateOAuth2TokenCommand(commandInput));
183
+ const { accessKeyId, secretAccessKey, sessionToken } = response.tokenOutput?.accessToken ?? {};
184
+ const { refreshToken, expiresIn } = response.tokenOutput ?? {};
185
+ if (!accessKeyId || !secretAccessKey || !sessionToken || !refreshToken) {
186
+ throw new CredentialsProviderError("Token refresh response missing required fields", {
187
+ logger: this.logger,
188
+ tryNextLink: false
189
+ });
190
+ }
191
+ const expiresInMs = (expiresIn ?? 900) * 1e3;
192
+ const expiration = new Date(Date.now() + expiresInMs);
193
+ const updatedToken = {
194
+ ...token,
195
+ accessToken: {
196
+ ...token.accessToken,
197
+ accessKeyId,
198
+ secretAccessKey,
199
+ sessionToken,
200
+ expiresAt: expiration.toISOString()
201
+ },
202
+ refreshToken
203
+ };
204
+ await this.saveToken(updatedToken);
205
+ const newAccessToken = updatedToken.accessToken;
206
+ return {
207
+ accessKeyId: newAccessToken.accessKeyId,
208
+ secretAccessKey: newAccessToken.secretAccessKey,
209
+ sessionToken: newAccessToken.sessionToken,
210
+ accountId: newAccessToken.accountId,
211
+ expiration
212
+ };
213
+ } catch (error) {
214
+ if (error.name === "AccessDeniedException") {
215
+ const errorType = error.error;
216
+ let message;
217
+ switch (errorType) {
218
+ case "TOKEN_EXPIRED":
219
+ message = "Your session has expired. Please reauthenticate.";
220
+ break;
221
+ case "USER_CREDENTIALS_CHANGED":
222
+ message = "Unable to refresh credentials because of a change in your password. Please reauthenticate with your new password.";
223
+ break;
224
+ case "INSUFFICIENT_PERMISSIONS":
225
+ message = "Unable to refresh credentials due to insufficient permissions. You may be missing permission for the 'CreateOAuth2Token' action.";
226
+ break;
227
+ default:
228
+ message = `Failed to refresh token: ${String(error)}. Please re-authenticate using \`aws login\``;
229
+ }
230
+ throw new CredentialsProviderError(message, { logger: this.logger, tryNextLink: false });
231
+ }
232
+ throw new CredentialsProviderError(`Failed to refresh token: ${String(error)}. Please re-authenticate using aws login`, { logger: this.logger });
233
+ }
234
+ }
235
+ async loadToken() {
236
+ const tokenFilePath = this.getTokenFilePath();
237
+ try {
238
+ let tokenData;
239
+ try {
240
+ tokenData = await readFile(tokenFilePath, { ignoreCache: this.init?.ignoreCache });
241
+ } catch {
242
+ tokenData = await fs.readFile(tokenFilePath, "utf8");
243
+ }
244
+ const token = JSON.parse(tokenData);
245
+ const missingFields = ["accessToken", "clientId", "refreshToken", "dpopKey"].filter((k) => !token[k]);
246
+ if (!token.accessToken?.accountId) {
247
+ missingFields.push("accountId");
248
+ }
249
+ if (missingFields.length > 0) {
250
+ throw new CredentialsProviderError(`Token validation failed, missing fields: ${missingFields.join(", ")}`, {
251
+ logger: this.logger,
252
+ tryNextLink: false
253
+ });
254
+ }
255
+ return token;
256
+ } catch (error) {
257
+ throw new CredentialsProviderError(`Failed to load token from ${tokenFilePath}: ${String(error)}`, {
258
+ logger: this.logger,
259
+ tryNextLink: false
260
+ });
261
+ }
262
+ }
263
+ async saveToken(token) {
264
+ const tokenFilePath = this.getTokenFilePath();
265
+ const directory = dirname(tokenFilePath);
266
+ try {
267
+ await fs.mkdir(directory, { recursive: true });
268
+ } catch (error) {
269
+ }
270
+ await fs.writeFile(tokenFilePath, JSON.stringify(token, null, 2), "utf8");
271
+ }
272
+ getTokenFilePath() {
273
+ const directory = process.env.AWS_LOGIN_CACHE_DIRECTORY ?? join(homedir(), ".aws", "login", "cache");
274
+ const loginSessionBytes = Buffer.from(this.loginSession, "utf8");
275
+ const loginSessionSha256 = createHash("sha256").update(loginSessionBytes).digest("hex");
276
+ return join(directory, `${loginSessionSha256}.json`);
277
+ }
278
+ derToRawSignature(derSignature) {
279
+ let offset = 2;
280
+ if (derSignature[offset] !== 2) {
281
+ throw new Error("Invalid DER signature");
282
+ }
283
+ offset++;
284
+ const rLength = derSignature[offset++];
285
+ let r = derSignature.subarray(offset, offset + rLength);
286
+ offset += rLength;
287
+ if (derSignature[offset] !== 2) {
288
+ throw new Error("Invalid DER signature");
289
+ }
290
+ offset++;
291
+ const sLength = derSignature[offset++];
292
+ let s = derSignature.subarray(offset, offset + sLength);
293
+ r = r[0] === 0 ? r.subarray(1) : r;
294
+ s = s[0] === 0 ? s.subarray(1) : s;
295
+ const rPadded = Buffer.concat([Buffer.alloc(32 - r.length), r]);
296
+ const sPadded = Buffer.concat([Buffer.alloc(32 - s.length), s]);
297
+ return Buffer.concat([rPadded, sPadded]);
298
+ }
299
+ createDPoPInterceptor(middlewareStack) {
300
+ middlewareStack.add((next) => async (args) => {
301
+ if (HttpRequest.isInstance(args.request)) {
302
+ const request = args.request;
303
+ const actualEndpoint = `${request.protocol}//${request.hostname}${request.port ? `:${request.port}` : ""}${request.path}`;
304
+ const dpop = await this.generateDpop(request.method, actualEndpoint);
305
+ request.headers = {
306
+ ...request.headers,
307
+ DPoP: dpop
308
+ };
309
+ }
310
+ return next(args);
311
+ }, {
312
+ step: "finalizeRequest",
313
+ name: "dpopInterceptor",
314
+ override: true
315
+ });
316
+ }
317
+ async generateDpop(method = "POST", endpoint) {
318
+ const token = await this.loadToken();
319
+ try {
320
+ const privateKey = createPrivateKey({
321
+ key: token.dpopKey,
322
+ format: "pem",
323
+ type: "sec1"
324
+ });
325
+ const publicKey = createPublicKey(privateKey);
326
+ const publicDer = publicKey.export({ format: "der", type: "spki" });
327
+ let pointStart = -1;
328
+ for (let i = 0; i < publicDer.length; i++) {
329
+ if (publicDer[i] === 4) {
330
+ pointStart = i;
331
+ break;
332
+ }
333
+ }
334
+ const x = publicDer.slice(pointStart + 1, pointStart + 33);
335
+ const y = publicDer.slice(pointStart + 33, pointStart + 65);
336
+ const header = {
337
+ alg: "ES256",
338
+ typ: "dpop+jwt",
339
+ jwk: {
340
+ kty: "EC",
341
+ crv: "P-256",
342
+ x: x.toString("base64url"),
343
+ y: y.toString("base64url")
344
+ }
345
+ };
346
+ const payload = {
347
+ jti: crypto.randomUUID(),
348
+ htm: method,
349
+ htu: endpoint,
350
+ iat: Math.floor(Date.now() / 1e3)
351
+ };
352
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString("base64url");
353
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString("base64url");
354
+ const message = `${headerB64}.${payloadB64}`;
355
+ const asn1Signature = sign("sha256", Buffer.from(message), privateKey);
356
+ const rawSignature = this.derToRawSignature(asn1Signature);
357
+ const signatureB64 = rawSignature.toString("base64url");
358
+ return `${message}.${signatureB64}`;
359
+ } catch (error) {
360
+ throw new CredentialsProviderError(`Failed to generate Dpop proof: ${error instanceof Error ? error.message : String(error)}`, { logger: this.logger, tryNextLink: false });
361
+ }
362
+ }
363
+ };
364
+ var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
365
+ init?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");
366
+ const profiles = await parseKnownFiles(init || {});
367
+ const profileName = getProfileName({
368
+ profile: init?.profile ?? callerClientConfig?.profile
369
+ });
370
+ const profile = profiles[profileName];
371
+ if (!profile?.login_session) {
372
+ throw new CredentialsProviderError(`Profile ${profileName} does not contain login_session.`, {
373
+ tryNextLink: true,
374
+ logger: init?.logger
375
+ });
376
+ }
377
+ const fetcher = new LoginCredentialsFetcher(profile, init, callerClientConfig);
378
+ const credentials = await fetcher.loadCredentials();
379
+ return setCredentialFeature(credentials, "CREDENTIALS_LOGIN", "AD");
380
+ };
381
+ var isLoginProfile = (data) => {
382
+ return Boolean(data && data.login_session);
383
+ };
384
+ var resolveLoginCredentials = async (profileName, options, callerClientConfig) => {
385
+ const credentials = await fromLoginCredentials({
386
+ ...options,
387
+ profile: profileName
388
+ })({ callerClientConfig });
389
+ return setCredentialFeature(credentials, "CREDENTIALS_PROFILE_LOGIN", "AC");
390
+ };
391
+ var isProcessProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string";
392
+ var resolveProcessCredentials = async (options, profile) => import("./dist-es-TRIVUKV4-2J47CDXR.js").then(({ fromProcess }) => fromProcess({
393
+ ...options,
394
+ profile
395
+ })().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v")));
396
+ var resolveSsoCredentials = async (profile, profileData, options = {}, callerClientConfig) => {
397
+ const { fromSSO } = await import("./dist-es-B2RTOKRI-VWZHK5RE.js");
398
+ return fromSSO({
399
+ profile,
400
+ logger: options.logger,
401
+ parentClientConfig: options.parentClientConfig,
402
+ clientConfig: options.clientConfig
403
+ })({
404
+ callerClientConfig
405
+ }).then((creds) => {
406
+ if (profileData.sso_session) {
407
+ return setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO", "r");
408
+ } else {
409
+ return setCredentialFeature(creds, "CREDENTIALS_PROFILE_SSO_LEGACY", "t");
410
+ }
411
+ });
412
+ };
413
+ var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
414
+ var isStaticCredsProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1 && ["undefined", "string"].indexOf(typeof arg.aws_account_id) > -1;
415
+ var resolveStaticCredentials = async (profile, options) => {
416
+ options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
417
+ const credentials = {
418
+ accessKeyId: profile.aws_access_key_id,
419
+ secretAccessKey: profile.aws_secret_access_key,
420
+ sessionToken: profile.aws_session_token,
421
+ ...profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope },
422
+ ...profile.aws_account_id && { accountId: profile.aws_account_id }
423
+ };
424
+ return setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
425
+ };
426
+ var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
427
+ var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-4WSJUIYR-XKIX65IH.js").then(({ fromTokenFile }) => fromTokenFile({
428
+ webIdentityTokenFile: profile.web_identity_token_file,
429
+ roleArn: profile.role_arn,
430
+ roleSessionName: profile.role_session_name,
431
+ roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
432
+ logger: options.logger,
433
+ parentClientConfig: options.parentClientConfig
434
+ })({
435
+ callerClientConfig
436
+ }).then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q")));
437
+ var resolveProfileData = async (profileName, profiles, options, callerClientConfig, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
438
+ const data = profiles[profileName];
439
+ if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
440
+ return resolveStaticCredentials(data, options);
441
+ }
442
+ if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {
443
+ return resolveAssumeRoleCredentials(profileName, profiles, options, callerClientConfig, visitedProfiles, resolveProfileData);
444
+ }
445
+ if (isStaticCredsProfile(data)) {
446
+ return resolveStaticCredentials(data, options);
447
+ }
448
+ if (isWebIdentityProfile(data)) {
449
+ return resolveWebIdentityCredentials(data, options, callerClientConfig);
450
+ }
451
+ if (isProcessProfile(data)) {
452
+ return resolveProcessCredentials(options, profileName);
453
+ }
454
+ if (isSsoProfile(data)) {
455
+ return await resolveSsoCredentials(profileName, data, options, callerClientConfig);
456
+ }
457
+ if (isLoginProfile(data)) {
458
+ return resolveLoginCredentials(profileName, options, callerClientConfig);
459
+ }
460
+ throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });
461
+ };
462
+ var fromIni = (init = {}) => async ({ callerClientConfig } = {}) => {
463
+ init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
464
+ const profiles = await parseKnownFiles(init);
465
+ return resolveProfileData(getProfileName({
466
+ profile: init.profile ?? callerClientConfig?.profile
467
+ }), profiles, init, callerClientConfig);
468
+ };
469
+ export {
470
+ fromIni
471
+ };
472
+ //# sourceMappingURL=dist-es-L6R4FPI5-IKIRYN45.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js","../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js","../../../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.10/node_modules/@aws-sdk/credential-provider-login/dist-es/LoginCredentialsFetcher.js","../../../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.10/node_modules/@aws-sdk/credential-provider-login/dist-es/fromLoginCredentials.js","../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveLoginCredentials.js","../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js","../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js","../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js","../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js","../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js","../../../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.10/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js"],"sourcesContent":["import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return async () => fromInstanceMetadata(options)().then(setNamedProvider);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return async () => fromEnv(options)().then(setNamedProvider);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\nconst setNamedProvider = (creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_NAMED_PROVIDER\", \"p\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, callerClientConfig, visitedProfiles = {}, resolveProfileData) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const profileData = profiles[profileName];\n const { source_profile, region } = profileData;\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/nested-clients/sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: {\n ...callerClientConfig,\n ...options?.parentClientConfig,\n region: region ?? options?.parentClientConfig?.region ?? callerClientConfig?.region,\n },\n }, options.clientPlugins);\n }\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, callerClientConfig, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(profileData.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(profileData)) {\n return sourceCredsProvider.then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n else {\n const params = {\n RoleArn: profileData.role_arn,\n RoleSessionName: profileData.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: profileData.external_id,\n DurationSeconds: parseInt(profileData.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = profileData;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SOURCE_PROFILE\", \"o\"));\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { HttpRequest } from \"@smithy/protocol-http\";\nimport { readFile } from \"@smithy/shared-ini-file-loader\";\nimport { createHash, createPrivateKey, createPublicKey, sign } from \"node:crypto\";\nimport { promises as fs } from \"node:fs\";\nimport { homedir } from \"node:os\";\nimport { dirname, join } from \"node:path\";\nexport class LoginCredentialsFetcher {\n profileData;\n init;\n callerClientConfig;\n static REFRESH_THRESHOLD = 5 * 60 * 1000;\n constructor(profileData, init, callerClientConfig) {\n this.profileData = profileData;\n this.init = init;\n this.callerClientConfig = callerClientConfig;\n }\n async loadCredentials() {\n const token = await this.loadToken();\n if (!token) {\n throw new CredentialsProviderError(`Failed to load a token for session ${this.loginSession}, please re-authenticate using aws login`, { tryNextLink: false, logger: this.logger });\n }\n const accessToken = token.accessToken;\n const now = Date.now();\n const expiryTime = new Date(accessToken.expiresAt).getTime();\n const timeUntilExpiry = expiryTime - now;\n if (timeUntilExpiry <= LoginCredentialsFetcher.REFRESH_THRESHOLD) {\n return this.refresh(token);\n }\n return {\n accessKeyId: accessToken.accessKeyId,\n secretAccessKey: accessToken.secretAccessKey,\n sessionToken: accessToken.sessionToken,\n accountId: accessToken.accountId,\n expiration: new Date(accessToken.expiresAt),\n };\n }\n get logger() {\n return this.init?.logger;\n }\n get loginSession() {\n return this.profileData.login_session;\n }\n async refresh(token) {\n const { SigninClient, CreateOAuth2TokenCommand } = await import(\"@aws-sdk/nested-clients/signin\");\n const { logger, userAgentAppId } = this.callerClientConfig ?? {};\n const isH2 = (requestHandler) => {\n return requestHandler?.metadata?.handlerProtocol === \"h2\";\n };\n const requestHandler = isH2(this.callerClientConfig?.requestHandler)\n ? undefined\n : this.callerClientConfig?.requestHandler;\n const region = this.profileData.region ?? (await this.callerClientConfig?.region?.()) ?? process.env.AWS_REGION;\n const client = new SigninClient({\n credentials: {\n accessKeyId: \"\",\n secretAccessKey: \"\",\n },\n region,\n requestHandler,\n logger,\n userAgentAppId,\n ...this.init?.clientConfig,\n });\n this.createDPoPInterceptor(client.middlewareStack);\n const commandInput = {\n tokenInput: {\n clientId: token.clientId,\n refreshToken: token.refreshToken,\n grantType: \"refresh_token\",\n },\n };\n try {\n const response = await client.send(new CreateOAuth2TokenCommand(commandInput));\n const { accessKeyId, secretAccessKey, sessionToken } = response.tokenOutput?.accessToken ?? {};\n const { refreshToken, expiresIn } = response.tokenOutput ?? {};\n if (!accessKeyId || !secretAccessKey || !sessionToken || !refreshToken) {\n throw new CredentialsProviderError(\"Token refresh response missing required fields\", {\n logger: this.logger,\n tryNextLink: false,\n });\n }\n const expiresInMs = (expiresIn ?? 900) * 1000;\n const expiration = new Date(Date.now() + expiresInMs);\n const updatedToken = {\n ...token,\n accessToken: {\n ...token.accessToken,\n accessKeyId: accessKeyId,\n secretAccessKey: secretAccessKey,\n sessionToken: sessionToken,\n expiresAt: expiration.toISOString(),\n },\n refreshToken: refreshToken,\n };\n await this.saveToken(updatedToken);\n const newAccessToken = updatedToken.accessToken;\n return {\n accessKeyId: newAccessToken.accessKeyId,\n secretAccessKey: newAccessToken.secretAccessKey,\n sessionToken: newAccessToken.sessionToken,\n accountId: newAccessToken.accountId,\n expiration,\n };\n }\n catch (error) {\n if (error.name === \"AccessDeniedException\") {\n const errorType = error.error;\n let message;\n switch (errorType) {\n case \"TOKEN_EXPIRED\":\n message = \"Your session has expired. Please reauthenticate.\";\n break;\n case \"USER_CREDENTIALS_CHANGED\":\n message =\n \"Unable to refresh credentials because of a change in your password. Please reauthenticate with your new password.\";\n break;\n case \"INSUFFICIENT_PERMISSIONS\":\n message =\n \"Unable to refresh credentials due to insufficient permissions. You may be missing permission for the 'CreateOAuth2Token' action.\";\n break;\n default:\n message = `Failed to refresh token: ${String(error)}. Please re-authenticate using \\`aws login\\``;\n }\n throw new CredentialsProviderError(message, { logger: this.logger, tryNextLink: false });\n }\n throw new CredentialsProviderError(`Failed to refresh token: ${String(error)}. Please re-authenticate using aws login`, { logger: this.logger });\n }\n }\n async loadToken() {\n const tokenFilePath = this.getTokenFilePath();\n try {\n let tokenData;\n try {\n tokenData = await readFile(tokenFilePath, { ignoreCache: this.init?.ignoreCache });\n }\n catch {\n tokenData = await fs.readFile(tokenFilePath, \"utf8\");\n }\n const token = JSON.parse(tokenData);\n const missingFields = [\"accessToken\", \"clientId\", \"refreshToken\", \"dpopKey\"].filter((k) => !token[k]);\n if (!token.accessToken?.accountId) {\n missingFields.push(\"accountId\");\n }\n if (missingFields.length > 0) {\n throw new CredentialsProviderError(`Token validation failed, missing fields: ${missingFields.join(\", \")}`, {\n logger: this.logger,\n tryNextLink: false,\n });\n }\n return token;\n }\n catch (error) {\n throw new CredentialsProviderError(`Failed to load token from ${tokenFilePath}: ${String(error)}`, {\n logger: this.logger,\n tryNextLink: false,\n });\n }\n }\n async saveToken(token) {\n const tokenFilePath = this.getTokenFilePath();\n const directory = dirname(tokenFilePath);\n try {\n await fs.mkdir(directory, { recursive: true });\n }\n catch (error) {\n }\n await fs.writeFile(tokenFilePath, JSON.stringify(token, null, 2), \"utf8\");\n }\n getTokenFilePath() {\n const directory = process.env.AWS_LOGIN_CACHE_DIRECTORY ?? join(homedir(), \".aws\", \"login\", \"cache\");\n const loginSessionBytes = Buffer.from(this.loginSession, \"utf8\");\n const loginSessionSha256 = createHash(\"sha256\").update(loginSessionBytes).digest(\"hex\");\n return join(directory, `${loginSessionSha256}.json`);\n }\n derToRawSignature(derSignature) {\n let offset = 2;\n if (derSignature[offset] !== 0x02) {\n throw new Error(\"Invalid DER signature\");\n }\n offset++;\n const rLength = derSignature[offset++];\n let r = derSignature.subarray(offset, offset + rLength);\n offset += rLength;\n if (derSignature[offset] !== 0x02) {\n throw new Error(\"Invalid DER signature\");\n }\n offset++;\n const sLength = derSignature[offset++];\n let s = derSignature.subarray(offset, offset + sLength);\n r = r[0] === 0x00 ? r.subarray(1) : r;\n s = s[0] === 0x00 ? s.subarray(1) : s;\n const rPadded = Buffer.concat([Buffer.alloc(32 - r.length), r]);\n const sPadded = Buffer.concat([Buffer.alloc(32 - s.length), s]);\n return Buffer.concat([rPadded, sPadded]);\n }\n createDPoPInterceptor(middlewareStack) {\n middlewareStack.add((next) => async (args) => {\n if (HttpRequest.isInstance(args.request)) {\n const request = args.request;\n const actualEndpoint = `${request.protocol}//${request.hostname}${request.port ? `:${request.port}` : \"\"}${request.path}`;\n const dpop = await this.generateDpop(request.method, actualEndpoint);\n request.headers = {\n ...request.headers,\n DPoP: dpop,\n };\n }\n return next(args);\n }, {\n step: \"finalizeRequest\",\n name: \"dpopInterceptor\",\n override: true,\n });\n }\n async generateDpop(method = \"POST\", endpoint) {\n const token = await this.loadToken();\n try {\n const privateKey = createPrivateKey({\n key: token.dpopKey,\n format: \"pem\",\n type: \"sec1\",\n });\n const publicKey = createPublicKey(privateKey);\n const publicDer = publicKey.export({ format: \"der\", type: \"spki\" });\n let pointStart = -1;\n for (let i = 0; i < publicDer.length; i++) {\n if (publicDer[i] === 0x04) {\n pointStart = i;\n break;\n }\n }\n const x = publicDer.slice(pointStart + 1, pointStart + 33);\n const y = publicDer.slice(pointStart + 33, pointStart + 65);\n const header = {\n alg: \"ES256\",\n typ: \"dpop+jwt\",\n jwk: {\n kty: \"EC\",\n crv: \"P-256\",\n x: x.toString(\"base64url\"),\n y: y.toString(\"base64url\"),\n },\n };\n const payload = {\n jti: crypto.randomUUID(),\n htm: method,\n htu: endpoint,\n iat: Math.floor(Date.now() / 1000),\n };\n const headerB64 = Buffer.from(JSON.stringify(header)).toString(\"base64url\");\n const payloadB64 = Buffer.from(JSON.stringify(payload)).toString(\"base64url\");\n const message = `${headerB64}.${payloadB64}`;\n const asn1Signature = sign(\"sha256\", Buffer.from(message), privateKey);\n const rawSignature = this.derToRawSignature(asn1Signature);\n const signatureB64 = rawSignature.toString(\"base64url\");\n return `${message}.${signatureB64}`;\n }\n catch (error) {\n throw new CredentialsProviderError(`Failed to generate Dpop proof: ${error instanceof Error ? error.message : String(error)}`, { logger: this.logger, tryNextLink: false });\n }\n }\n}\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { LoginCredentialsFetcher } from \"./LoginCredentialsFetcher\";\nexport const fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {\n init?.logger?.debug?.(\"@aws-sdk/credential-providers - fromLoginCredentials\");\n const profiles = await parseKnownFiles(init || {});\n const profileName = getProfileName({\n profile: init?.profile ?? callerClientConfig?.profile,\n });\n const profile = profiles[profileName];\n if (!profile?.login_session) {\n throw new CredentialsProviderError(`Profile ${profileName} does not contain login_session.`, {\n tryNextLink: true,\n logger: init?.logger,\n });\n }\n const fetcher = new LoginCredentialsFetcher(profile, init, callerClientConfig);\n const credentials = await fetcher.loadCredentials();\n return setCredentialFeature(credentials, \"CREDENTIALS_LOGIN\", \"AD\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nimport { fromLoginCredentials } from \"@aws-sdk/credential-provider-login\";\nexport const isLoginProfile = (data) => {\n return Boolean(data && data.login_session);\n};\nexport const resolveLoginCredentials = async (profileName, options, callerClientConfig) => {\n const credentials = await fromLoginCredentials({\n ...options,\n profile: profileName,\n })({ callerClientConfig });\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE_LOGIN\", \"AC\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})().then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_PROCESS\", \"v\")));\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const resolveSsoCredentials = async (profile, profileData, options = {}, callerClientConfig) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n clientConfig: options.clientConfig,\n })({\n callerClientConfig,\n }).then((creds) => {\n if (profileData.sso_session) {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO\", \"r\");\n }\n else {\n return setCredentialFeature(creds, \"CREDENTIALS_PROFILE_SSO_LEGACY\", \"t\");\n }\n });\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = async (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n const credentials = {\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n };\n return setCredentialFeature(credentials, \"CREDENTIALS_PROFILE\", \"n\");\n};\n","import { setCredentialFeature } from \"@aws-sdk/core/client\";\nexport const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})({\n callerClientConfig,\n}).then((creds) => setCredentialFeature(creds, \"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN\", \"q\")));\n","import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isLoginProfile, resolveLoginCredentials } from \"./resolveLoginCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, callerClientConfig, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, callerClientConfig, visitedProfiles, resolveProfileData);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options, callerClientConfig);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, data, options, callerClientConfig);\n }\n if (isLoginProfile(data)) {\n return resolveLoginCredentials(profileName, options, callerClientConfig);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n","import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (init = {}) => async ({ callerClientConfig } = {}) => {\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName({\n profile: init.profile ?? callerClientConfig?.profile,\n }), profiles, init, callerClientConfig);\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;AEGA,SAAS,YAAY,kBAAkB,iBAAiB,YAAY;AACpE,SAAS,YAAY,UAAU;AAC/B,SAAS,eAAe;AACxB,SAAS,SAAS,YAAY;AFJvB,IAAM,0BAA0B,CAAC,kBAAkB,aAAa,WAAW;AAC9E,QAAM,qBAAqB;IACvB,cAAc,OAAO,YAAY;AAC7B,YAAM,EAAE,SAAS,IAAI,MAAM,OAAO,gCAAmC;AACrE,YAAM,EAAE,sBAAsB,IAAI,MAAM,OAAO,gCAAkC;AACjF,cAAQ,MAAM,sEAAsE;AACpF,aAAO,YAAY,MAAM,SAAS,WAAW,CAAC,CAAC,GAAG,sBAAsB,OAAO,CAAC,EAAE,EAAE,KAAK,gBAAgB;IAC7G;IACA,qBAAqB,OAAO,YAAY;AACpC,cAAQ,MAAM,6EAA6E;AAC3F,YAAM,EAAE,qBAAqB,IAAI,MAAM,OAAO,gCAAkC;AAChF,aAAO,YAAY,qBAAqB,OAAO,EAAE,EAAE,KAAK,gBAAgB;IAC5E;IACA,aAAa,OAAO,YAAY;AAC5B,cAAQ,MAAM,qEAAqE;AACnF,YAAM,EAAE,QAAQ,IAAI,MAAM,OAAO,gCAAkC;AACnE,aAAO,YAAY,QAAQ,OAAO,EAAE,EAAE,KAAK,gBAAgB;IAC/D;EACJ;AACA,MAAI,oBAAoB,oBAAoB;AACxC,WAAO,mBAAmB,gBAAgB;EAC9C,OACK;AACD,UAAM,IAAI,yBAAyB,4CAA4C,WAAW,SAAS,gBAAgB,kEAC/C,EAAE,OAAO,CAAC;EAClF;AACJ;AACA,IAAM,mBAAmB,CAAC,UAAU,qBAAqB,OAAO,sCAAsC,GAAG;ACzBlG,IAAM,sBAAsB,CAAC,KAAK,EAAE,UAAU,WAAW,OAAO,IAAI,CAAC,MAAM;AAC9E,SAAQ,QAAQ,GAAG,KACf,OAAO,QAAQ,YACf,OAAO,IAAI,aAAa,YACxB,CAAC,aAAa,QAAQ,EAAE,QAAQ,OAAO,IAAI,iBAAiB,IAAI,MAChE,CAAC,aAAa,QAAQ,EAAE,QAAQ,OAAO,IAAI,WAAW,IAAI,MAC1D,CAAC,aAAa,QAAQ,EAAE,QAAQ,OAAO,IAAI,UAAU,IAAI,OACxD,8BAA8B,KAAK,EAAE,SAAS,OAAO,CAAC,KAAK,0BAA0B,KAAK,EAAE,SAAS,OAAO,CAAC;AACtH;AACA,IAAM,gCAAgC,CAAC,KAAK,EAAE,SAAS,OAAO,MAAM;AAChE,QAAM,oBAAoB,OAAO,IAAI,mBAAmB,YAAY,OAAO,IAAI,sBAAsB;AACrG,MAAI,mBAAmB;AACnB,YAAQ,QAAQ,OAAO,OAAO,iDAAiD,IAAI,cAAc,EAAE;EACvG;AACA,SAAO;AACX;AACA,IAAM,4BAA4B,CAAC,KAAK,EAAE,SAAS,OAAO,MAAM;AAC5D,QAAM,sBAAsB,OAAO,IAAI,sBAAsB,YAAY,OAAO,IAAI,mBAAmB;AACvG,MAAI,qBAAqB;AACrB,YAAQ,QAAQ,OAAO,OAAO,gDAAgD,IAAI,iBAAiB,EAAE;EACzG;AACA,SAAO;AACX;AACO,IAAM,+BAA+B,OAAO,aAAa,UAAU,SAAS,oBAAoB,kBAAkB,CAAC,GAAGA,wBAAuB;AAChJ,UAAQ,QAAQ,MAAM,uEAAuE;AAC7F,QAAM,cAAc,SAAS,WAAW;AACxC,QAAM,EAAE,gBAAgB,OAAO,IAAI;AACnC,MAAI,CAAC,QAAQ,aAAa;AACtB,UAAM,EAAE,sBAAsB,IAAI,MAAM,OAAO,4BAA6B;AAC5E,YAAQ,cAAc,sBAAsB;MACxC,GAAG,QAAQ;MACX,0BAA0B,QAAQ;MAClC,oBAAoB;QAChB,GAAG;QACH,GAAG,SAAS;QACZ,QAAQ,UAAU,SAAS,oBAAoB,UAAU,oBAAoB;MACjF;IACJ,GAAG,QAAQ,aAAa;EAC5B;AACA,MAAI,kBAAkB,kBAAkB,iBAAiB;AACrD,UAAM,IAAI,yBAAyB,kEAC3B,eAAe,OAAO,CAAC,yBAC3B,OAAO,KAAK,eAAe,EAAE,KAAK,IAAI,GAAG,EAAE,QAAQ,QAAQ,OAAO,CAAC;EAC3E;AACA,UAAQ,QAAQ,MAAM,wEAAwE,iBAAiB,mBAAmB,cAAc,MAAM,YAAY,WAAW,GAAG,EAAE;AAClL,QAAM,sBAAsB,iBACtBA,oBAAmB,gBAAgB,UAAU,SAAS,oBAAoB;IACxE,GAAG;IACH,CAAC,cAAc,GAAG;EACtB,GAAG,iCAAiC,SAAS,cAAc,KAAK,CAAC,CAAC,CAAC,KAChE,MAAM,wBAAwB,YAAY,mBAAmB,aAAa,QAAQ,MAAM,EAAE,OAAO,GAAG;AAC3G,MAAI,iCAAiC,WAAW,GAAG;AAC/C,WAAO,oBAAoB,KAAK,CAAC,UAAU,qBAAqB,OAAO,sCAAsC,GAAG,CAAC;EACrH,OACK;AACD,UAAM,SAAS;MACX,SAAS,YAAY;MACrB,iBAAiB,YAAY,qBAAqB,cAAc,KAAK,IAAI,CAAC;MAC1E,YAAY,YAAY;MACxB,iBAAiB,SAAS,YAAY,oBAAoB,QAAQ,EAAE;IACxE;AACA,UAAM,EAAE,WAAW,IAAI;AACvB,QAAI,YAAY;AACZ,UAAI,CAAC,QAAQ,iBAAiB;AAC1B,cAAM,IAAI,yBAAyB,WAAW,WAAW,iFAAiF,EAAE,QAAQ,QAAQ,QAAQ,aAAa,MAAM,CAAC;MAC5L;AACA,aAAO,eAAe;AACtB,aAAO,YAAY,MAAM,QAAQ,gBAAgB,UAAU;IAC/D;AACA,UAAM,cAAc,MAAM;AAC1B,WAAO,QAAQ,YAAY,aAAa,MAAM,EAAE,KAAK,CAAC,UAAU,qBAAqB,OAAO,sCAAsC,GAAG,CAAC;EAC1I;AACJ;AACA,IAAM,mCAAmC,CAAC,YAAY;AAClD,SAAO,CAAC,QAAQ,YAAY,CAAC,CAAC,QAAQ;AAC1C;ACxEO,IAAM,0BAAN,MAAM,yBAAwB;EACjC;EACA;EACA;EACA,OAAO,oBAAoB,IAAI,KAAK;EACpC,YAAY,aAAa,MAAM,oBAAoB;AAC/C,SAAK,cAAc;AACnB,SAAK,OAAO;AACZ,SAAK,qBAAqB;EAC9B;EACA,MAAM,kBAAkB;AACpB,UAAM,QAAQ,MAAM,KAAK,UAAU;AACnC,QAAI,CAAC,OAAO;AACR,YAAM,IAAI,yBAAyB,sCAAsC,KAAK,YAAY,4CAA4C,EAAE,aAAa,OAAO,QAAQ,KAAK,OAAO,CAAC;IACrL;AACA,UAAM,cAAc,MAAM;AAC1B,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,aAAa,IAAI,KAAK,YAAY,SAAS,EAAE,QAAQ;AAC3D,UAAM,kBAAkB,aAAa;AACrC,QAAI,mBAAmB,yBAAwB,mBAAmB;AAC9D,aAAO,KAAK,QAAQ,KAAK;IAC7B;AACA,WAAO;MACH,aAAa,YAAY;MACzB,iBAAiB,YAAY;MAC7B,cAAc,YAAY;MAC1B,WAAW,YAAY;MACvB,YAAY,IAAI,KAAK,YAAY,SAAS;IAC9C;EACJ;EACA,IAAI,SAAS;AACT,WAAO,KAAK,MAAM;EACtB;EACA,IAAI,eAAe;AACf,WAAO,KAAK,YAAY;EAC5B;EACA,MAAM,QAAQ,OAAO;AACjB,UAAM,EAAE,cAAc,yBAAyB,IAAI,MAAM,OAAO,+BAAgC;AAChG,UAAM,EAAE,QAAQ,eAAe,IAAI,KAAK,sBAAsB,CAAC;AAC/D,UAAM,OAAO,CAACC,oBAAmB;AAC7B,aAAOA,iBAAgB,UAAU,oBAAoB;IACzD;AACA,UAAM,iBAAiB,KAAK,KAAK,oBAAoB,cAAc,IAC7D,SACA,KAAK,oBAAoB;AAC/B,UAAM,SAAS,KAAK,YAAY,UAAW,MAAM,KAAK,oBAAoB,SAAS,KAAM,QAAQ,IAAI;AACrG,UAAM,SAAS,IAAI,aAAa;MAC5B,aAAa;QACT,aAAa;QACb,iBAAiB;MACrB;MACA;MACA;MACA;MACA;MACA,GAAG,KAAK,MAAM;IAClB,CAAC;AACD,SAAK,sBAAsB,OAAO,eAAe;AACjD,UAAM,eAAe;MACjB,YAAY;QACR,UAAU,MAAM;QAChB,cAAc,MAAM;QACpB,WAAW;MACf;IACJ;AACA,QAAI;AACA,YAAM,WAAW,MAAM,OAAO,KAAK,IAAI,yBAAyB,YAAY,CAAC;AAC7E,YAAM,EAAE,aAAa,iBAAiB,aAAa,IAAI,SAAS,aAAa,eAAe,CAAC;AAC7F,YAAM,EAAE,cAAc,UAAU,IAAI,SAAS,eAAe,CAAC;AAC7D,UAAI,CAAC,eAAe,CAAC,mBAAmB,CAAC,gBAAgB,CAAC,cAAc;AACpE,cAAM,IAAI,yBAAyB,kDAAkD;UACjF,QAAQ,KAAK;UACb,aAAa;QACjB,CAAC;MACL;AACA,YAAM,eAAe,aAAa,OAAO;AACzC,YAAM,aAAa,IAAI,KAAK,KAAK,IAAI,IAAI,WAAW;AACpD,YAAM,eAAe;QACjB,GAAG;QACH,aAAa;UACT,GAAG,MAAM;UACT;UACA;UACA;UACA,WAAW,WAAW,YAAY;QACtC;QACA;MACJ;AACA,YAAM,KAAK,UAAU,YAAY;AACjC,YAAM,iBAAiB,aAAa;AACpC,aAAO;QACH,aAAa,eAAe;QAC5B,iBAAiB,eAAe;QAChC,cAAc,eAAe;QAC7B,WAAW,eAAe;QAC1B;MACJ;IACJ,SACO,OAAO;AACV,UAAI,MAAM,SAAS,yBAAyB;AACxC,cAAM,YAAY,MAAM;AACxB,YAAI;AACJ,gBAAQ,WAAW;UACf,KAAK;AACD,sBAAU;AACV;UACJ,KAAK;AACD,sBACI;AACJ;UACJ,KAAK;AACD,sBACI;AACJ;UACJ;AACI,sBAAU,4BAA4B,OAAO,KAAK,CAAC;QAC3D;AACA,cAAM,IAAI,yBAAyB,SAAS,EAAE,QAAQ,KAAK,QAAQ,aAAa,MAAM,CAAC;MAC3F;AACA,YAAM,IAAI,yBAAyB,4BAA4B,OAAO,KAAK,CAAC,4CAA4C,EAAE,QAAQ,KAAK,OAAO,CAAC;IACnJ;EACJ;EACA,MAAM,YAAY;AACd,UAAM,gBAAgB,KAAK,iBAAiB;AAC5C,QAAI;AACA,UAAI;AACJ,UAAI;AACA,oBAAY,MAAM,SAAS,eAAe,EAAE,aAAa,KAAK,MAAM,YAAY,CAAC;MACrF,QACM;AACF,oBAAY,MAAM,GAAG,SAAS,eAAe,MAAM;MACvD;AACA,YAAM,QAAQ,KAAK,MAAM,SAAS;AAClC,YAAM,gBAAgB,CAAC,eAAe,YAAY,gBAAgB,SAAS,EAAE,OAAO,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;AACpG,UAAI,CAAC,MAAM,aAAa,WAAW;AAC/B,sBAAc,KAAK,WAAW;MAClC;AACA,UAAI,cAAc,SAAS,GAAG;AAC1B,cAAM,IAAI,yBAAyB,4CAA4C,cAAc,KAAK,IAAI,CAAC,IAAI;UACvG,QAAQ,KAAK;UACb,aAAa;QACjB,CAAC;MACL;AACA,aAAO;IACX,SACO,OAAO;AACV,YAAM,IAAI,yBAAyB,6BAA6B,aAAa,KAAK,OAAO,KAAK,CAAC,IAAI;QAC/F,QAAQ,KAAK;QACb,aAAa;MACjB,CAAC;IACL;EACJ;EACA,MAAM,UAAU,OAAO;AACnB,UAAM,gBAAgB,KAAK,iBAAiB;AAC5C,UAAM,YAAY,QAAQ,aAAa;AACvC,QAAI;AACA,YAAM,GAAG,MAAM,WAAW,EAAE,WAAW,KAAK,CAAC;IACjD,SACO,OAAO;IACd;AACA,UAAM,GAAG,UAAU,eAAe,KAAK,UAAU,OAAO,MAAM,CAAC,GAAG,MAAM;EAC5E;EACA,mBAAmB;AACf,UAAM,YAAY,QAAQ,IAAI,6BAA6B,KAAK,QAAQ,GAAG,QAAQ,SAAS,OAAO;AACnG,UAAM,oBAAoB,OAAO,KAAK,KAAK,cAAc,MAAM;AAC/D,UAAM,qBAAqB,WAAW,QAAQ,EAAE,OAAO,iBAAiB,EAAE,OAAO,KAAK;AACtF,WAAO,KAAK,WAAW,GAAG,kBAAkB,OAAO;EACvD;EACA,kBAAkB,cAAc;AAC5B,QAAI,SAAS;AACb,QAAI,aAAa,MAAM,MAAM,GAAM;AAC/B,YAAM,IAAI,MAAM,uBAAuB;IAC3C;AACA;AACA,UAAM,UAAU,aAAa,QAAQ;AACrC,QAAI,IAAI,aAAa,SAAS,QAAQ,SAAS,OAAO;AACtD,cAAU;AACV,QAAI,aAAa,MAAM,MAAM,GAAM;AAC/B,YAAM,IAAI,MAAM,uBAAuB;IAC3C;AACA;AACA,UAAM,UAAU,aAAa,QAAQ;AACrC,QAAI,IAAI,aAAa,SAAS,QAAQ,SAAS,OAAO;AACtD,QAAI,EAAE,CAAC,MAAM,IAAO,EAAE,SAAS,CAAC,IAAI;AACpC,QAAI,EAAE,CAAC,MAAM,IAAO,EAAE,SAAS,CAAC,IAAI;AACpC,UAAM,UAAU,OAAO,OAAO,CAAC,OAAO,MAAM,KAAK,EAAE,MAAM,GAAG,CAAC,CAAC;AAC9D,UAAM,UAAU,OAAO,OAAO,CAAC,OAAO,MAAM,KAAK,EAAE,MAAM,GAAG,CAAC,CAAC;AAC9D,WAAO,OAAO,OAAO,CAAC,SAAS,OAAO,CAAC;EAC3C;EACA,sBAAsB,iBAAiB;AACnC,oBAAgB,IAAI,CAAC,SAAS,OAAO,SAAS;AAC1C,UAAI,YAAY,WAAW,KAAK,OAAO,GAAG;AACtC,cAAM,UAAU,KAAK;AACrB,cAAM,iBAAiB,GAAG,QAAQ,QAAQ,KAAK,QAAQ,QAAQ,GAAG,QAAQ,OAAO,IAAI,QAAQ,IAAI,KAAK,EAAE,GAAG,QAAQ,IAAI;AACvH,cAAM,OAAO,MAAM,KAAK,aAAa,QAAQ,QAAQ,cAAc;AACnE,gBAAQ,UAAU;UACd,GAAG,QAAQ;UACX,MAAM;QACV;MACJ;AACA,aAAO,KAAK,IAAI;IACpB,GAAG;MACC,MAAM;MACN,MAAM;MACN,UAAU;IACd,CAAC;EACL;EACA,MAAM,aAAa,SAAS,QAAQ,UAAU;AAC1C,UAAM,QAAQ,MAAM,KAAK,UAAU;AACnC,QAAI;AACA,YAAM,aAAa,iBAAiB;QAChC,KAAK,MAAM;QACX,QAAQ;QACR,MAAM;MACV,CAAC;AACD,YAAM,YAAY,gBAAgB,UAAU;AAC5C,YAAM,YAAY,UAAU,OAAO,EAAE,QAAQ,OAAO,MAAM,OAAO,CAAC;AAClE,UAAI,aAAa;AACjB,eAAS,IAAI,GAAG,IAAI,UAAU,QAAQ,KAAK;AACvC,YAAI,UAAU,CAAC,MAAM,GAAM;AACvB,uBAAa;AACb;QACJ;MACJ;AACA,YAAM,IAAI,UAAU,MAAM,aAAa,GAAG,aAAa,EAAE;AACzD,YAAM,IAAI,UAAU,MAAM,aAAa,IAAI,aAAa,EAAE;AAC1D,YAAM,SAAS;QACX,KAAK;QACL,KAAK;QACL,KAAK;UACD,KAAK;UACL,KAAK;UACL,GAAG,EAAE,SAAS,WAAW;UACzB,GAAG,EAAE,SAAS,WAAW;QAC7B;MACJ;AACA,YAAM,UAAU;QACZ,KAAK,OAAO,WAAW;QACvB,KAAK;QACL,KAAK;QACL,KAAK,KAAK,MAAM,KAAK,IAAI,IAAI,GAAI;MACrC;AACA,YAAM,YAAY,OAAO,KAAK,KAAK,UAAU,MAAM,CAAC,EAAE,SAAS,WAAW;AAC1E,YAAM,aAAa,OAAO,KAAK,KAAK,UAAU,OAAO,CAAC,EAAE,SAAS,WAAW;AAC5E,YAAM,UAAU,GAAG,SAAS,IAAI,UAAU;AAC1C,YAAM,gBAAgB,KAAK,UAAU,OAAO,KAAK,OAAO,GAAG,UAAU;AACrE,YAAM,eAAe,KAAK,kBAAkB,aAAa;AACzD,YAAM,eAAe,aAAa,SAAS,WAAW;AACtD,aAAO,GAAG,OAAO,IAAI,YAAY;IACrC,SACO,OAAO;AACV,YAAM,IAAI,yBAAyB,kCAAkC,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK,CAAC,IAAI,EAAE,QAAQ,KAAK,QAAQ,aAAa,MAAM,CAAC;IAC9K;EACJ;AACJ;ACjQO,IAAM,uBAAuB,CAAC,SAAS,OAAO,EAAE,mBAAmB,IAAI,CAAC,MAAM;AACjF,QAAM,QAAQ,QAAQ,sDAAsD;AAC5E,QAAM,WAAW,MAAM,gBAAgB,QAAQ,CAAC,CAAC;AACjD,QAAM,cAAc,eAAe;IAC/B,SAAS,MAAM,WAAW,oBAAoB;EAClD,CAAC;AACD,QAAM,UAAU,SAAS,WAAW;AACpC,MAAI,CAAC,SAAS,eAAe;AACzB,UAAM,IAAI,yBAAyB,WAAW,WAAW,oCAAoC;MACzF,aAAa;MACb,QAAQ,MAAM;IAClB,CAAC;EACL;AACA,QAAM,UAAU,IAAI,wBAAwB,SAAS,MAAM,kBAAkB;AAC7E,QAAM,cAAc,MAAM,QAAQ,gBAAgB;AAClD,SAAO,qBAAqB,aAAa,qBAAqB,IAAI;AACtE;AClBO,IAAM,iBAAiB,CAAC,SAAS;AACpC,SAAO,QAAQ,QAAQ,KAAK,aAAa;AAC7C;AACO,IAAM,0BAA0B,OAAO,aAAa,SAAS,uBAAuB;AACvF,QAAM,cAAc,MAAM,qBAAqB;IAC3C,GAAG;IACH,SAAS;EACb,CAAC,EAAE,EAAE,mBAAmB,CAAC;AACzB,SAAO,qBAAqB,aAAa,6BAA6B,IAAI;AAC9E;ACVO,IAAM,mBAAmB,CAAC,QAAQ,QAAQ,GAAG,KAAK,OAAO,QAAQ,YAAY,OAAO,IAAI,uBAAuB;AAC/G,IAAM,4BAA4B,OAAO,SAAS,YAAY,OAAO,gCAAsC,EAAE,KAAK,CAAC,EAAE,YAAY,MAAM,YAAY;EACtJ,GAAG;EACH;AACJ,CAAC,EAAE,EAAE,KAAK,CAAC,UAAU,qBAAqB,OAAO,+BAA+B,GAAG,CAAC,CAAC;ACJ9E,IAAM,wBAAwB,OAAO,SAAS,aAAa,UAAU,CAAC,GAAG,uBAAuB;AACnG,QAAM,EAAE,QAAQ,IAAI,MAAM,OAAO,gCAAkC;AACnE,SAAO,QAAQ;IACX;IACA,QAAQ,QAAQ;IAChB,oBAAoB,QAAQ;IAC5B,cAAc,QAAQ;EAC1B,CAAC,EAAE;IACC;EACJ,CAAC,EAAE,KAAK,CAAC,UAAU;AACf,QAAI,YAAY,aAAa;AACzB,aAAO,qBAAqB,OAAO,2BAA2B,GAAG;IACrE,OACK;AACD,aAAO,qBAAqB,OAAO,kCAAkC,GAAG;IAC5E;EACJ,CAAC;AACL;AACO,IAAM,eAAe,CAAC,QAAQ,QAChC,OAAO,IAAI,kBAAkB,YAC1B,OAAO,IAAI,mBAAmB,YAC9B,OAAO,IAAI,gBAAgB,YAC3B,OAAO,IAAI,eAAe,YAC1B,OAAO,IAAI,kBAAkB;ACvB9B,IAAM,uBAAuB,CAAC,QAAQ,QAAQ,GAAG,KACpD,OAAO,QAAQ,YACf,OAAO,IAAI,sBAAsB,YACjC,OAAO,IAAI,0BAA0B,YACrC,CAAC,aAAa,QAAQ,EAAE,QAAQ,OAAO,IAAI,iBAAiB,IAAI,MAChE,CAAC,aAAa,QAAQ,EAAE,QAAQ,OAAO,IAAI,cAAc,IAAI;AAC1D,IAAM,2BAA2B,OAAO,SAAS,YAAY;AAChE,WAAS,QAAQ,MAAM,6DAA6D;AACpF,QAAM,cAAc;IAChB,aAAa,QAAQ;IACrB,iBAAiB,QAAQ;IACzB,cAAc,QAAQ;IACtB,GAAI,QAAQ,wBAAwB,EAAE,iBAAiB,QAAQ,qBAAqB;IACpF,GAAI,QAAQ,kBAAkB,EAAE,WAAW,QAAQ,eAAe;EACtE;AACA,SAAO,qBAAqB,aAAa,uBAAuB,GAAG;AACvE;AChBO,IAAM,uBAAuB,CAAC,QAAQ,QAAQ,GAAG,KACpD,OAAO,QAAQ,YACf,OAAO,IAAI,4BAA4B,YACvC,OAAO,IAAI,aAAa,YACxB,CAAC,aAAa,QAAQ,EAAE,QAAQ,OAAO,IAAI,iBAAiB,IAAI;AAC7D,IAAM,gCAAgC,OAAO,SAAS,SAAS,uBAAuB,OAAO,gCAA2C,EAAE,KAAK,CAAC,EAAE,cAAc,MAAM,cAAc;EACvL,sBAAsB,QAAQ;EAC9B,SAAS,QAAQ;EACjB,iBAAiB,QAAQ;EACzB,4BAA4B,QAAQ;EACpC,QAAQ,QAAQ;EAChB,oBAAoB,QAAQ;AAChC,CAAC,EAAE;EACC;AACJ,CAAC,EAAE,KAAK,CAAC,UAAU,qBAAqB,OAAO,wCAAwC,GAAG,CAAC,CAAC;ACRrF,IAAM,qBAAqB,OAAO,aAAa,UAAU,SAAS,oBAAoB,kBAAkB,CAAC,GAAG,4BAA4B,UAAU;AACrJ,QAAM,OAAO,SAAS,WAAW;AACjC,MAAI,OAAO,KAAK,eAAe,EAAE,SAAS,KAAK,qBAAqB,IAAI,GAAG;AACvE,WAAO,yBAAyB,MAAM,OAAO;EACjD;AACA,MAAI,6BAA6B,oBAAoB,MAAM,EAAE,SAAS,aAAa,QAAQ,QAAQ,OAAO,CAAC,GAAG;AAC1G,WAAO,6BAA6B,aAAa,UAAU,SAAS,oBAAoB,iBAAiB,kBAAkB;EAC/H;AACA,MAAI,qBAAqB,IAAI,GAAG;AAC5B,WAAO,yBAAyB,MAAM,OAAO;EACjD;AACA,MAAI,qBAAqB,IAAI,GAAG;AAC5B,WAAO,8BAA8B,MAAM,SAAS,kBAAkB;EAC1E;AACA,MAAI,iBAAiB,IAAI,GAAG;AACxB,WAAO,0BAA0B,SAAS,WAAW;EACzD;AACA,MAAI,aAAa,IAAI,GAAG;AACpB,WAAO,MAAM,sBAAsB,aAAa,MAAM,SAAS,kBAAkB;EACrF;AACA,MAAI,eAAe,IAAI,GAAG;AACtB,WAAO,wBAAwB,aAAa,SAAS,kBAAkB;EAC3E;AACA,QAAM,IAAI,yBAAyB,iDAAiD,WAAW,2CAA2C,EAAE,QAAQ,QAAQ,OAAO,CAAC;AACxK;AC7BO,IAAM,UAAU,CAAC,OAAO,CAAC,MAAM,OAAO,EAAE,mBAAmB,IAAI,CAAC,MAAM;AACzE,OAAK,QAAQ,MAAM,4CAA4C;AAC/D,QAAM,WAAW,MAAM,gBAAgB,IAAI;AAC3C,SAAO,mBAAmB,eAAe;IACrC,SAAS,KAAK,WAAW,oBAAoB;EACjD,CAAC,GAAG,UAAU,MAAM,kBAAkB;AAC1C;","names":["resolveProfileData","requestHandler"]}
@@ -0,0 +1,24 @@
1
+ import { createRequire } from 'node:module'; const require = createRequire(import.meta.url);
2
+ import {
3
+ ENV_ACCOUNT_ID,
4
+ ENV_CREDENTIAL_SCOPE,
5
+ ENV_EXPIRATION,
6
+ ENV_KEY,
7
+ ENV_SECRET,
8
+ ENV_SESSION,
9
+ fromEnv
10
+ } from "./chunk-UALXHIMX.js";
11
+ import "./chunk-ONETZL6N.js";
12
+ import "./chunk-UHP5KEDL.js";
13
+ import "./chunk-UGXG73VF.js";
14
+ import "./chunk-5H446C7X.js";
15
+ export {
16
+ ENV_ACCOUNT_ID,
17
+ ENV_CREDENTIAL_SCOPE,
18
+ ENV_EXPIRATION,
19
+ ENV_KEY,
20
+ ENV_SECRET,
21
+ ENV_SESSION,
22
+ fromEnv
23
+ };
24
+ //# sourceMappingURL=dist-es-SRVEB5QV-Q4CTC2HX.js.map