appos 0.1.18-0 → 0.1.20-0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (113) hide show
  1. package/build/exports/adapter-factory-CLtf7vT5-djMsiEBl.mjs +88 -0
  2. package/build/exports/appos.d.ts +82 -0
  3. package/build/exports/bun-sqlite-dialect-DN7EKoIB-B0dpsiEy.mjs +1 -0
  4. package/build/exports/chunk-BYI67GdN.mjs +1 -0
  5. package/build/exports/chunk-DQj_Q5LL.mjs +1 -0
  6. package/build/exports/client-Cf0k1wnb.mjs +7 -0
  7. package/build/exports/client.d.ts +2093 -2082
  8. package/build/exports/client.js +22 -60
  9. package/build/exports/date.d.ts +1 -1
  10. package/build/exports/date.js +1 -1
  11. package/build/exports/db.d.mts +5195 -0
  12. package/build/exports/db.mjs +8 -0
  13. package/build/exports/dialect-BeMwdQoz-BUgv8nHa.mjs +1 -0
  14. package/build/exports/dist-cjs-6zIKAlZR.mjs +1 -0
  15. package/build/exports/dist-cjs-8ShtoC4L.mjs +1 -0
  16. package/build/exports/dist-cjs-8w9IfsHf.mjs +1 -0
  17. package/build/exports/dist-cjs-B5EVkyOL.mjs +1 -0
  18. package/build/exports/dist-cjs-BCXEF6CM.mjs +1 -0
  19. package/build/exports/dist-cjs-BEWqPJiY.mjs +1 -0
  20. package/build/exports/dist-cjs-BY2gcA7W.mjs +22 -0
  21. package/build/exports/dist-cjs-BilOG_GK.mjs +5 -0
  22. package/build/exports/dist-cjs-BurjEDDY.mjs +1 -0
  23. package/build/exports/dist-cjs-CkmP5Wcr.mjs +1 -0
  24. package/build/exports/dist-cjs-D9iFq61w.mjs +1 -0
  25. package/build/exports/dist-cjs-DBYzdOBR.mjs +10 -0
  26. package/build/exports/dist-cjs-DO06FS0-.mjs +1 -0
  27. package/build/exports/dist-cjs-Ddwe8ROf.mjs +1 -0
  28. package/build/exports/dist-cjs-DpVGmjIF.mjs +1 -0
  29. package/build/exports/esm-FzcFIiBQ.mjs +3 -0
  30. package/build/exports/event-streams-BOfsfbfw.mjs +1 -0
  31. package/build/exports/file-preview-dialog-BquzKbRO.mjs +59 -0
  32. package/build/exports/kysely-adapter-WhLCdqvu.mjs +1 -0
  33. package/build/exports/magic-string.es-jZcifc5m.mjs +14 -0
  34. package/build/exports/memory-adapter-CBfVsIEf.mjs +1 -0
  35. package/build/exports/node-ponyfill-PofhX7d2.mjs +1 -0
  36. package/build/exports/node-sqlite-dialect-BqISUSC3-DSS_lf2e.mjs +1 -0
  37. package/build/exports/package-DfozRyK6.mjs +1 -0
  38. package/build/exports/react-dom-DRJH8-Wa.mjs +42 -0
  39. package/build/exports/server.d.mts +71688 -0
  40. package/build/exports/server.mjs +325 -0
  41. package/build/exports/sso-oidc-DMxhsWZu.mjs +1 -0
  42. package/build/exports/sts-CqD3bswo.mjs +1 -0
  43. package/build/exports/sts-DJilo-ly.mjs +1 -0
  44. package/build/exports/test.d.mts +8922 -0
  45. package/build/exports/test.mjs +1255 -0
  46. package/build/exports/ui/index.d.ts +1595 -568
  47. package/build/exports/ui/index.js +112 -162
  48. package/build/exports/utils.d.ts +6 -4
  49. package/build/exports/utils.js +1 -1
  50. package/build/exports/zod.d.ts +2 -1
  51. package/build/exports/zod.js +13 -13
  52. package/package.json +9 -8
  53. package/build/exports/bun-sqlite-dialect-DN7EKoIB-U6HWGDKS.js +0 -1
  54. package/build/exports/chunk-2LU65C2X.js +0 -1
  55. package/build/exports/chunk-3RRIQKOV.js +0 -2
  56. package/build/exports/chunk-A2LPCJPF.js +0 -5
  57. package/build/exports/chunk-CWTDMDIJ.js +0 -2
  58. package/build/exports/chunk-FBFACBKZ.js +0 -20
  59. package/build/exports/chunk-FZ26Y4SI.js +0 -1
  60. package/build/exports/chunk-GQYUAAFT.js +0 -1
  61. package/build/exports/chunk-HZYRJBRQ.js +0 -1
  62. package/build/exports/chunk-IAPQO6XO.js +0 -1
  63. package/build/exports/chunk-JIMTVXLP.js +0 -5
  64. package/build/exports/chunk-KNTGSRCW.js +0 -20
  65. package/build/exports/chunk-KRQ2L5OP.js +0 -1
  66. package/build/exports/chunk-MQK6VFZR.js +0 -1
  67. package/build/exports/chunk-N756FM5W.js +0 -6
  68. package/build/exports/chunk-NJ2TZAVN.js +0 -169
  69. package/build/exports/chunk-NM7CITTT.js +0 -2
  70. package/build/exports/chunk-PECJ5CRS.js +0 -1
  71. package/build/exports/chunk-PYGCG54X.js +0 -94
  72. package/build/exports/chunk-QMFB7WUQ.js +0 -1
  73. package/build/exports/chunk-QWUKON2B.js +0 -4
  74. package/build/exports/chunk-S3F2U5VR.js +0 -1
  75. package/build/exports/chunk-S6CGHQRG.js +0 -2
  76. package/build/exports/chunk-TLDYRTHH.js +0 -1
  77. package/build/exports/chunk-TX6WXZHJ.js +0 -1
  78. package/build/exports/chunk-Y6DVQ7FD.js +0 -1
  79. package/build/exports/chunk-YBDDYGAW.js +0 -1
  80. package/build/exports/db.d.ts +0 -5194
  81. package/build/exports/db.js +0 -9
  82. package/build/exports/dist-es-442MVKMG.js +0 -1
  83. package/build/exports/dist-es-5NPX4IPA.js +0 -2
  84. package/build/exports/dist-es-AAGJZOKW.js +0 -1
  85. package/build/exports/dist-es-BA4XRQMD.js +0 -1
  86. package/build/exports/dist-es-CEXBPGKD.js +0 -1
  87. package/build/exports/dist-es-D7P74EQC.js +0 -2
  88. package/build/exports/dist-es-K23RHFIG.js +0 -2
  89. package/build/exports/dist-es-K6CZFUD7.js +0 -5
  90. package/build/exports/dist-es-PV5MXZPQ.js +0 -5
  91. package/build/exports/dist-es-PV6DSUWC.js +0 -1
  92. package/build/exports/dist-es-PYWXCUQO.js +0 -2
  93. package/build/exports/dist-es-QLJ2PEMO.js +0 -1
  94. package/build/exports/dist-es-TDQNJYF5.js +0 -1
  95. package/build/exports/dist-es-VXQY2642.js +0 -1
  96. package/build/exports/event-streams-JL44VPIA.js +0 -1
  97. package/build/exports/file-preview-dialog-XJMPJ764.js +0 -15
  98. package/build/exports/kysely-adapter-UB5EKM3L.js +0 -1
  99. package/build/exports/loadSso-ATQGBCEY.js +0 -1
  100. package/build/exports/loadSso-ILXKFPPV.js +0 -1
  101. package/build/exports/magic-string.es-TEACLLHX.js +0 -13
  102. package/build/exports/memory-adapter-LJJR2XXS.js +0 -1
  103. package/build/exports/node-ponyfill-6NJTIN4I.js +0 -1
  104. package/build/exports/node-sqlite-dialect-BqISUSC3-3545EWOZ.js +0 -1
  105. package/build/exports/plugin-56OEBMME.js +0 -4
  106. package/build/exports/server.d.ts +0 -71779
  107. package/build/exports/server.js +0 -435
  108. package/build/exports/sso-oidc-7POVDJYK.js +0 -1
  109. package/build/exports/sso-oidc-TUR3VC4Y.js +0 -1
  110. package/build/exports/sts-35P3OWOX.js +0 -6
  111. package/build/exports/sts-ZDKVF6HW.js +0 -1
  112. package/build/exports/test.d.ts +0 -8942
  113. package/build/exports/test.js +0 -1583
@@ -1 +0,0 @@
1
- import{a as X,b as c,c as fe}from"./chunk-CWTDMDIJ.js";import{a as ne,b as He}from"./chunk-MQK6VFZR.js";import{a as Z}from"./chunk-TX6WXZHJ.js";import"./chunk-QMFB7WUQ.js";import"./chunk-3RRIQKOV.js";import{$ as Te,A as ae,B as de,F as ue,H as le,J as me,M as he,O as xe,P as Ee,Q as _e,R as ge,S as Se,T as ve,U as Ie,V as Pe,W as Ce,X as Oe,Y as ye,Z as Ae,_ as De,aa as Re,ba as ke,c as M,ca as we,d as U,da as be,e as j,ea as Ne,f as z,fa as Ue,g as q,ga as Fe,ha as $e,ia as Ge,j as K,ja as Me,ka as je,la as ze,ma as qe,q as Q,r as ee,s as te,t as re,u as oe,v as ie,x as se,y as pe,z as ce}from"./chunk-FBFACBKZ.js";import{b as x,c as G}from"./chunk-HZYRJBRQ.js";import"./chunk-S3F2U5VR.js";import{e as V,f as B,g as Y,h as W,i as J}from"./chunk-A2LPCJPF.js";import"./chunk-PECJ5CRS.js";import{d as L}from"./chunk-YBDDYGAW.js";import"./chunk-2LU65C2X.js";import"./chunk-TLDYRTHH.js";import{a as r}from"./chunk-Y6DVQ7FD.js";var Ke=r(async(e,t,i)=>({operation:M(t).operation,region:await U(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),"defaultSSOOIDCHttpAuthSchemeParametersProvider");function Ot(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:r((t,i)=>({signingProperties:{config:t,context:i}}),"propertiesExtractor")}}r(Ot,"createAwsAuthSigv4HttpAuthOption");function yt(e){return{schemeId:"smithy.api#noAuth"}}r(yt,"createSmithyApiNoAuthHttpAuthOption");var Ve=r(e=>{let t=[];switch(e.operation){case"CreateToken":{t.push(yt(e));break}default:t.push(Ot(e))}return t},"defaultSSOOIDCHttpAuthSchemeProvider"),Le=r(e=>{let t=he(e);return Object.assign(t,{authSchemePreference:U(e.authSchemePreference??[])})},"resolveHttpAuthSchemeConfig");var Be=r(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"}),"resolveClientEndpointParameters"),Ye={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var nt="required";var u="argv";var We="isSet",g="booleanEquals",E="error",_="endpoint",f="tree",H="PartitionResult",F="getAttr",Je={[nt]:!1,type:"string"},Xe={[nt]:!0,default:!1,type:"boolean"},Qe={ref:"Endpoint"},it={fn:g,[u]:[{ref:"UseFIPS"},!0]},st={fn:g,[u]:[{ref:"UseDualStack"},!0]},d={},Ze={fn:F,[u]:[{ref:H},"supportsFIPS"]},pt={ref:H},et={fn:g,[u]:[!0,{fn:F,[u]:[pt,"supportsDualStack"]}]},tt=[it],rt=[st],ot=[{ref:"Region"}],At={version:"1.0",parameters:{Region:Je,UseDualStack:Xe,UseFIPS:Xe,Endpoint:Je},rules:[{conditions:[{fn:We,[u]:[Qe]}],rules:[{conditions:tt,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:E},{conditions:rt,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:E},{endpoint:{url:Qe,properties:d,headers:d},type:_}],type:f},{conditions:[{fn:We,[u]:ot}],rules:[{conditions:[{fn:"aws.partition",[u]:ot,assign:H}],rules:[{conditions:[it,st],rules:[{conditions:[{fn:g,[u]:[!0,Ze]},et],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:_}],type:f},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:E}],type:f},{conditions:tt,rules:[{conditions:[{fn:g,[u]:[Ze,!0]}],rules:[{conditions:[{fn:"stringEquals",[u]:[{fn:F,[u]:[pt,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:d,headers:d},type:_},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:_}],type:f},{error:"FIPS is enabled but this partition does not support FIPS",type:E}],type:f},{conditions:rt,rules:[{conditions:[et],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:_}],type:f},{error:"DualStack is enabled but this partition does not support DualStack",type:E}],type:f},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:_}],type:f}],type:f},{error:"Invalid Configuration: Missing Region",type:E}]},ct=At;var Dt=new Se({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),at=r((e,t={})=>Dt.get(e,()=>Ie(ct,{endpointParams:e,logger:t.logger})),"defaultEndpointResolver");ve.aws=Pe;var dt=r(e=>({apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??V,base64Encoder:e?.base64Encoder??Y,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??at,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??Ve,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:r(t=>t.getIdentityProvider("aws.auth#sigv4"),"identityProvider"),signer:new le},{schemeId:"smithy.api#noAuth",identityProvider:r(t=>t.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),"identityProvider"),signer:new Z}],logger:e?.logger??new de,protocol:e?.protocol??new fe({defaultNamespace:"com.amazonaws.ssooidc"}),serviceId:e?.serviceId??"SSO OIDC",urlParser:e?.urlParser??G,utf8Decoder:e?.utf8Decoder??L,utf8Encoder:e?.utf8Encoder??B}),"getRuntimeConfig");var ut=r(e=>{pe(process.version);let t=je(e),i=r(()=>t().then(se),"defaultConfigProvider"),a=dt(e);ue(process.version);let p={profile:e?.profile,logger:a.logger};return{...a,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??x(me,p),bodyLengthChecker:e?.bodyLengthChecker??Me,defaultUserAgentProvider:e?.defaultUserAgentProvider??Fe({serviceId:a.serviceId,clientVersion:He.version}),maxAttempts:e?.maxAttempts??x(we,e),region:e?.region??x(Ae,{...De,...p}),requestHandler:W.create(e?.requestHandler??i),retryMode:e?.retryMode??x({...Ne,default:r(async()=>(await i()).retryMode||ke,"default")},e),sha256:e?.sha256??Ge.bind(null,"sha256"),streamCollector:e?.streamCollector??J,useDualstackEndpoint:e?.useDualstackEndpoint??x(Oe,p),useFipsEndpoint:e?.useFipsEndpoint??x(ye,p),userAgentAppId:e?.userAgentAppId??x($e,p)}},"getRuntimeConfig");var lt=r(e=>{let t=e.httpAuthSchemes,i=e.httpAuthSchemeProvider,a=e.credentials;return{setHttpAuthScheme(p){let S=t.findIndex(N=>N.schemeId===p.schemeId);S===-1?t.push(p):t.splice(S,1,p)},httpAuthSchemes(){return t},setHttpAuthSchemeProvider(p){i=p},httpAuthSchemeProvider(){return i},setCredentials(p){a=p},credentials(){return a}}},"getHttpAuthExtensionConfiguration"),mt=r(e=>({httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}),"resolveHttpAuthRuntimeConfig");var ht=r((e,t)=>{let i=Object.assign(ze(e),ce(e),z(e),lt(e));return t.forEach(a=>a.configure(i)),Object.assign(e,qe(i),ae(i),q(i),mt(i))},"resolveRuntimeExtensions");var v=class extends re{static{r(this,"SSOOIDCClient")}config;constructor(...[t]){let i=ut(t||{});super(i),this.initConfig=i;let a=Be(i),p=ge(a),S=be(p),N=Te(S),St=N,vt=te(St),It=Le(vt),Pt=ht(It,t?.extensions||[]);this.config=Pt,this.middlewareStack.use(X(this.config)),this.middlewareStack.use(Ce(this.config)),this.middlewareStack.use(Ue(this.config)),this.middlewareStack.use(Re(this.config)),this.middlewareStack.use(xe(this.config)),this.middlewareStack.use(Ee(this.config)),this.middlewareStack.use(_e(this.config)),this.middlewareStack.use(j(this.config,{httpAuthSchemeParametersProvider:Ke,identityProviderConfigProvider:r(async Ct=>new Q({"aws.auth#sigv4":Ct.credentials}),"identityProviderConfigProvider")})),this.middlewareStack.use(K(this.config))}destroy(){super.destroy()}};var s=class e extends ie{static{r(this,"SSOOIDCServiceException")}constructor(t){super(t),Object.setPrototypeOf(this,e.prototype)}};var qo={KMS_ACCESS_DENIED:"KMS_AccessDeniedException"},I=class e extends s{static{r(this,"AccessDeniedException")}name="AccessDeniedException";$fault="client";error;reason;error_description;constructor(t){super({name:"AccessDeniedException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.reason=t.reason,this.error_description=t.error_description}},P=class e extends s{static{r(this,"AuthorizationPendingException")}name="AuthorizationPendingException";$fault="client";error;error_description;constructor(t){super({name:"AuthorizationPendingException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},C=class e extends s{static{r(this,"ExpiredTokenException")}name="ExpiredTokenException";$fault="client";error;error_description;constructor(t){super({name:"ExpiredTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},O=class e extends s{static{r(this,"InternalServerException")}name="InternalServerException";$fault="server";error;error_description;constructor(t){super({name:"InternalServerException",$fault:"server",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},y=class e extends s{static{r(this,"InvalidClientException")}name="InvalidClientException";$fault="client";error;error_description;constructor(t){super({name:"InvalidClientException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},A=class e extends s{static{r(this,"InvalidGrantException")}name="InvalidGrantException";$fault="client";error;error_description;constructor(t){super({name:"InvalidGrantException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},Ko={KMS_DISABLED_KEY:"KMS_DisabledException",KMS_INVALID_KEY_USAGE:"KMS_InvalidKeyUsageException",KMS_INVALID_STATE:"KMS_InvalidStateException",KMS_KEY_NOT_FOUND:"KMS_NotFoundException"},D=class e extends s{static{r(this,"InvalidRequestException")}name="InvalidRequestException";$fault="client";error;reason;error_description;constructor(t){super({name:"InvalidRequestException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.reason=t.reason,this.error_description=t.error_description}},T=class e extends s{static{r(this,"InvalidScopeException")}name="InvalidScopeException";$fault="client";error;error_description;constructor(t){super({name:"InvalidScopeException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},R=class e extends s{static{r(this,"SlowDownException")}name="SlowDownException";$fault="client";error;error_description;constructor(t){super({name:"SlowDownException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},k=class e extends s{static{r(this,"UnauthorizedClientException")}name="UnauthorizedClientException";$fault="client";error;error_description;constructor(t){super({name:"UnauthorizedClientException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},w=class e extends s{static{r(this,"UnsupportedGrantTypeException")}name="UnsupportedGrantTypeException";$fault="client";error;error_description;constructor(t){super({name:"UnsupportedGrantTypeException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}};var Tt="AccessDeniedException",Rt="AuthorizationPendingException",kt="AccessToken",wt="ClientSecret",bt="CreateToken",Nt="CreateTokenRequest",Ut="CreateTokenResponse",Ht="CodeVerifier",Ft="ExpiredTokenException",$t="InvalidClientException",Gt="InvalidGrantException",Mt="InvalidRequestException",jt="InternalServerException",zt="InvalidScopeException",qt="IdToken",Kt="RefreshToken",Vt="SlowDownException",Lt="UnauthorizedClientException",Bt="UnsupportedGrantTypeException",Yt="accessToken",h="client",Wt="clientId",Jt="clientSecret",Xt="codeVerifier",Qt="code",Zt="deviceCode",n="error",er="expiresIn",l="error_description",tr="grantType",rr="http",m="httpError",or="idToken",ft="reason",xt="refreshToken",nr="redirectUri",ir="scope",sr="server",Et="smithy.ts.sdk.synthetic.com.amazonaws.ssooidc",pr="tokenType",o="com.amazonaws.ssooidc",cr=[0,o,kt,8,0],ar=[0,o,wt,8,0],dr=[0,o,Ht,8,0],ur=[0,o,qt,8,0],_t=[0,o,Kt,8,0],lr=[-3,o,Tt,{[n]:h,[m]:400},[n,ft,l],[0,0,0]];c.for(o).registerError(lr,I);var mr=[-3,o,Rt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(mr,P);var hr=[3,o,Nt,0,[Wt,Jt,tr,Zt,Qt,xt,ir,nr,Xt],[0,[()=>ar,0],0,0,0,[()=>_t,0],64,0,[()=>dr,0]]],fr=[3,o,Ut,0,[Yt,pr,er,xt,or],[[()=>cr,0],0,1,[()=>_t,0],[()=>ur,0]]],xr=[-3,o,Ft,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(xr,C);var Er=[-3,o,jt,{[n]:sr,[m]:500},[n,l],[0,0]];c.for(o).registerError(Er,O);var _r=[-3,o,$t,{[n]:h,[m]:401},[n,l],[0,0]];c.for(o).registerError(_r,y);var gr=[-3,o,Gt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(gr,A);var Sr=[-3,o,Mt,{[n]:h,[m]:400},[n,ft,l],[0,0,0]];c.for(o).registerError(Sr,D);var vr=[-3,o,zt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(vr,T);var Ir=[-3,o,Vt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(Ir,R);var Pr=[-3,o,Lt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(Pr,k);var Cr=[-3,o,Bt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(Cr,w);var Or=[-3,Et,"SSOOIDCServiceException",0,[],[]];c.for(Et).registerError(Or,s);var gt=[9,o,bt,{[rr]:["POST","/token",200]},()=>hr,()=>fr];var b=class extends oe.classBuilder().ep(Ye).m(function(t,i,a,p){return[ee(a,t.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").sc(gt).build(){static{r(this,"CreateTokenCommand")}};var yr={CreateTokenCommand:b},$=class extends v{static{r(this,"SSOOIDC")}};ne(yr,$);export{oe as $Command,I as AccessDeniedException,qo as AccessDeniedExceptionReason,P as AuthorizationPendingException,b as CreateTokenCommand,C as ExpiredTokenException,O as InternalServerException,y as InvalidClientException,A as InvalidGrantException,D as InvalidRequestException,Ko as InvalidRequestExceptionReason,T as InvalidScopeException,$ as SSOOIDC,v as SSOOIDCClient,s as SSOOIDCServiceException,R as SlowDownException,k as UnauthorizedClientException,w as UnsupportedGrantTypeException,re as __Client};
@@ -1 +0,0 @@
1
- import{a as ne,b as He}from"./chunk-MQK6VFZR.js";import{a as X,b as c,c as fe}from"./chunk-S6CGHQRG.js";import{$ as Me,A as le,B as me,C as he,E as xe,F as Ee,G as _e,H as ge,I as Se,J as ve,K as Ie,L as Pe,M as Ce,N as Oe,O as ye,P as Ae,Q as De,R as Te,S as Re,T as ke,U as we,V as be,W as Ne,X as Ue,Y as Fe,Z as $e,_ as Ge,a as M,aa as je,b as U,ba as ze,c as j,ca as qe,d as z,e as q,g as K,m as Q,n as Z,o as ee,p as te,q as re,r as oe,s as ie,u as se,v as pe,w as ce,x as ae,y as de,z as ue}from"./chunk-KNTGSRCW.js";import{b as x,c as G}from"./chunk-FZ26Y4SI.js";import"./chunk-S3F2U5VR.js";import"./chunk-NM7CITTT.js";import{d as V,e as B,f as Y,g as W,h as J}from"./chunk-JIMTVXLP.js";import{d as L}from"./chunk-YBDDYGAW.js";import"./chunk-IAPQO6XO.js";import"./chunk-2LU65C2X.js";import"./chunk-TLDYRTHH.js";import{a as r}from"./chunk-Y6DVQ7FD.js";var Ke=r(async(e,t,i)=>({operation:M(t).operation,region:await U(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),"defaultSSOOIDCHttpAuthSchemeParametersProvider");function Ot(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:r((t,i)=>({signingProperties:{config:t,context:i}}),"propertiesExtractor")}}r(Ot,"createAwsAuthSigv4HttpAuthOption");function yt(e){return{schemeId:"smithy.api#noAuth"}}r(yt,"createSmithyApiNoAuthHttpAuthOption");var Ve=r(e=>{let t=[];switch(e.operation){case"CreateToken":{t.push(yt(e));break}default:t.push(Ot(e))}return t},"defaultSSOOIDCHttpAuthSchemeProvider"),Le=r(e=>{let t=he(e);return Object.assign(t,{authSchemePreference:U(e.authSchemePreference??[])})},"resolveHttpAuthSchemeConfig");var Be=r(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"}),"resolveClientEndpointParameters"),Ye={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var nt="required";var u="argv";var We="isSet",g="booleanEquals",E="error",_="endpoint",f="tree",H="PartitionResult",F="getAttr",Je={[nt]:!1,type:"string"},Xe={[nt]:!0,default:!1,type:"boolean"},Qe={ref:"Endpoint"},it={fn:g,[u]:[{ref:"UseFIPS"},!0]},st={fn:g,[u]:[{ref:"UseDualStack"},!0]},d={},Ze={fn:F,[u]:[{ref:H},"supportsFIPS"]},pt={ref:H},et={fn:g,[u]:[!0,{fn:F,[u]:[pt,"supportsDualStack"]}]},tt=[it],rt=[st],ot=[{ref:"Region"}],At={version:"1.0",parameters:{Region:Je,UseDualStack:Xe,UseFIPS:Xe,Endpoint:Je},rules:[{conditions:[{fn:We,[u]:[Qe]}],rules:[{conditions:tt,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:E},{conditions:rt,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:E},{endpoint:{url:Qe,properties:d,headers:d},type:_}],type:f},{conditions:[{fn:We,[u]:ot}],rules:[{conditions:[{fn:"aws.partition",[u]:ot,assign:H}],rules:[{conditions:[it,st],rules:[{conditions:[{fn:g,[u]:[!0,Ze]},et],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:_}],type:f},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:E}],type:f},{conditions:tt,rules:[{conditions:[{fn:g,[u]:[Ze,!0]}],rules:[{conditions:[{fn:"stringEquals",[u]:[{fn:F,[u]:[pt,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:d,headers:d},type:_},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:_}],type:f},{error:"FIPS is enabled but this partition does not support FIPS",type:E}],type:f},{conditions:rt,rules:[{conditions:[et],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:_}],type:f},{error:"DualStack is enabled but this partition does not support DualStack",type:E}],type:f},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:_}],type:f}],type:f},{error:"Invalid Configuration: Missing Region",type:E}]},ct=At;var Dt=new Se({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),at=r((e,t={})=>Dt.get(e,()=>Ie(ct,{endpointParams:e,logger:t.logger})),"defaultEndpointResolver");ve.aws=Pe;var dt=r(e=>({apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??V,base64Encoder:e?.base64Encoder??Y,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??at,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??Ve,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:r(t=>t.getIdentityProvider("aws.auth#sigv4"),"identityProvider"),signer:new le},{schemeId:"smithy.api#noAuth",identityProvider:r(t=>t.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),"identityProvider"),signer:new Z}],logger:e?.logger??new de,protocol:e?.protocol??new fe({defaultNamespace:"com.amazonaws.ssooidc"}),serviceId:e?.serviceId??"SSO OIDC",urlParser:e?.urlParser??G,utf8Decoder:e?.utf8Decoder??L,utf8Encoder:e?.utf8Encoder??B}),"getRuntimeConfig");var ut=r(e=>{pe(process.version);let t=je(e),i=r(()=>t().then(se),"defaultConfigProvider"),a=dt(e);ue(process.version);let p={profile:e?.profile,logger:a.logger};return{...a,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??x(me,p),bodyLengthChecker:e?.bodyLengthChecker??Me,defaultUserAgentProvider:e?.defaultUserAgentProvider??Fe({serviceId:a.serviceId,clientVersion:He.version}),maxAttempts:e?.maxAttempts??x(we,e),region:e?.region??x(Ae,{...De,...p}),requestHandler:W.create(e?.requestHandler??i),retryMode:e?.retryMode??x({...Ne,default:r(async()=>(await i()).retryMode||ke,"default")},e),sha256:e?.sha256??Ge.bind(null,"sha256"),streamCollector:e?.streamCollector??J,useDualstackEndpoint:e?.useDualstackEndpoint??x(Oe,p),useFipsEndpoint:e?.useFipsEndpoint??x(ye,p),userAgentAppId:e?.userAgentAppId??x($e,p)}},"getRuntimeConfig");var lt=r(e=>{let t=e.httpAuthSchemes,i=e.httpAuthSchemeProvider,a=e.credentials;return{setHttpAuthScheme(p){let S=t.findIndex(N=>N.schemeId===p.schemeId);S===-1?t.push(p):t.splice(S,1,p)},httpAuthSchemes(){return t},setHttpAuthSchemeProvider(p){i=p},httpAuthSchemeProvider(){return i},setCredentials(p){a=p},credentials(){return a}}},"getHttpAuthExtensionConfiguration"),mt=r(e=>({httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}),"resolveHttpAuthRuntimeConfig");var ht=r((e,t)=>{let i=Object.assign(ze(e),ce(e),z(e),lt(e));return t.forEach(a=>a.configure(i)),Object.assign(e,qe(i),ae(i),q(i),mt(i))},"resolveRuntimeExtensions");var v=class extends re{static{r(this,"SSOOIDCClient")}config;constructor(...[t]){let i=ut(t||{});super(i),this.initConfig=i;let a=Be(i),p=ge(a),S=be(p),N=Te(S),St=N,vt=te(St),It=Le(vt),Pt=ht(It,t?.extensions||[]);this.config=Pt,this.middlewareStack.use(X(this.config)),this.middlewareStack.use(Ce(this.config)),this.middlewareStack.use(Ue(this.config)),this.middlewareStack.use(Re(this.config)),this.middlewareStack.use(xe(this.config)),this.middlewareStack.use(Ee(this.config)),this.middlewareStack.use(_e(this.config)),this.middlewareStack.use(j(this.config,{httpAuthSchemeParametersProvider:Ke,identityProviderConfigProvider:r(async Ct=>new Q({"aws.auth#sigv4":Ct.credentials}),"identityProviderConfigProvider")})),this.middlewareStack.use(K(this.config))}destroy(){super.destroy()}};var s=class e extends ie{static{r(this,"SSOOIDCServiceException")}constructor(t){super(t),Object.setPrototypeOf(this,e.prototype)}};var qo={KMS_ACCESS_DENIED:"KMS_AccessDeniedException"},I=class e extends s{static{r(this,"AccessDeniedException")}name="AccessDeniedException";$fault="client";error;reason;error_description;constructor(t){super({name:"AccessDeniedException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.reason=t.reason,this.error_description=t.error_description}},P=class e extends s{static{r(this,"AuthorizationPendingException")}name="AuthorizationPendingException";$fault="client";error;error_description;constructor(t){super({name:"AuthorizationPendingException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},C=class e extends s{static{r(this,"ExpiredTokenException")}name="ExpiredTokenException";$fault="client";error;error_description;constructor(t){super({name:"ExpiredTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},O=class e extends s{static{r(this,"InternalServerException")}name="InternalServerException";$fault="server";error;error_description;constructor(t){super({name:"InternalServerException",$fault:"server",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},y=class e extends s{static{r(this,"InvalidClientException")}name="InvalidClientException";$fault="client";error;error_description;constructor(t){super({name:"InvalidClientException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},A=class e extends s{static{r(this,"InvalidGrantException")}name="InvalidGrantException";$fault="client";error;error_description;constructor(t){super({name:"InvalidGrantException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},Ko={KMS_DISABLED_KEY:"KMS_DisabledException",KMS_INVALID_KEY_USAGE:"KMS_InvalidKeyUsageException",KMS_INVALID_STATE:"KMS_InvalidStateException",KMS_KEY_NOT_FOUND:"KMS_NotFoundException"},D=class e extends s{static{r(this,"InvalidRequestException")}name="InvalidRequestException";$fault="client";error;reason;error_description;constructor(t){super({name:"InvalidRequestException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.reason=t.reason,this.error_description=t.error_description}},T=class e extends s{static{r(this,"InvalidScopeException")}name="InvalidScopeException";$fault="client";error;error_description;constructor(t){super({name:"InvalidScopeException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},R=class e extends s{static{r(this,"SlowDownException")}name="SlowDownException";$fault="client";error;error_description;constructor(t){super({name:"SlowDownException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},k=class e extends s{static{r(this,"UnauthorizedClientException")}name="UnauthorizedClientException";$fault="client";error;error_description;constructor(t){super({name:"UnauthorizedClientException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}},w=class e extends s{static{r(this,"UnsupportedGrantTypeException")}name="UnsupportedGrantTypeException";$fault="client";error;error_description;constructor(t){super({name:"UnsupportedGrantTypeException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype),this.error=t.error,this.error_description=t.error_description}};var Tt="AccessDeniedException",Rt="AuthorizationPendingException",kt="AccessToken",wt="ClientSecret",bt="CreateToken",Nt="CreateTokenRequest",Ut="CreateTokenResponse",Ht="CodeVerifier",Ft="ExpiredTokenException",$t="InvalidClientException",Gt="InvalidGrantException",Mt="InvalidRequestException",jt="InternalServerException",zt="InvalidScopeException",qt="IdToken",Kt="RefreshToken",Vt="SlowDownException",Lt="UnauthorizedClientException",Bt="UnsupportedGrantTypeException",Yt="accessToken",h="client",Wt="clientId",Jt="clientSecret",Xt="codeVerifier",Qt="code",Zt="deviceCode",n="error",er="expiresIn",l="error_description",tr="grantType",rr="http",m="httpError",or="idToken",ft="reason",xt="refreshToken",nr="redirectUri",ir="scope",sr="server",Et="smithy.ts.sdk.synthetic.com.amazonaws.ssooidc",pr="tokenType",o="com.amazonaws.ssooidc",cr=[0,o,kt,8,0],ar=[0,o,wt,8,0],dr=[0,o,Ht,8,0],ur=[0,o,qt,8,0],_t=[0,o,Kt,8,0],lr=[-3,o,Tt,{[n]:h,[m]:400},[n,ft,l],[0,0,0]];c.for(o).registerError(lr,I);var mr=[-3,o,Rt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(mr,P);var hr=[3,o,Nt,0,[Wt,Jt,tr,Zt,Qt,xt,ir,nr,Xt],[0,[()=>ar,0],0,0,0,[()=>_t,0],64,0,[()=>dr,0]]],fr=[3,o,Ut,0,[Yt,pr,er,xt,or],[[()=>cr,0],0,1,[()=>_t,0],[()=>ur,0]]],xr=[-3,o,Ft,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(xr,C);var Er=[-3,o,jt,{[n]:sr,[m]:500},[n,l],[0,0]];c.for(o).registerError(Er,O);var _r=[-3,o,$t,{[n]:h,[m]:401},[n,l],[0,0]];c.for(o).registerError(_r,y);var gr=[-3,o,Gt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(gr,A);var Sr=[-3,o,Mt,{[n]:h,[m]:400},[n,ft,l],[0,0,0]];c.for(o).registerError(Sr,D);var vr=[-3,o,zt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(vr,T);var Ir=[-3,o,Vt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(Ir,R);var Pr=[-3,o,Lt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(Pr,k);var Cr=[-3,o,Bt,{[n]:h,[m]:400},[n,l],[0,0]];c.for(o).registerError(Cr,w);var Or=[-3,Et,"SSOOIDCServiceException",0,[],[]];c.for(Et).registerError(Or,s);var gt=[9,o,bt,{[rr]:["POST","/token",200]},()=>hr,()=>fr];var b=class extends oe.classBuilder().ep(Ye).m(function(t,i,a,p){return[ee(a,t.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").sc(gt).build(){static{r(this,"CreateTokenCommand")}};var yr={CreateTokenCommand:b},$=class extends v{static{r(this,"SSOOIDC")}};ne(yr,$);export{oe as $Command,I as AccessDeniedException,qo as AccessDeniedExceptionReason,P as AuthorizationPendingException,b as CreateTokenCommand,C as ExpiredTokenException,O as InternalServerException,y as InvalidClientException,A as InvalidGrantException,D as InvalidRequestException,Ko as InvalidRequestExceptionReason,T as InvalidScopeException,$ as SSOOIDC,v as SSOOIDCClient,s as SSOOIDCServiceException,R as SlowDownException,k as UnauthorizedClientException,w as UnsupportedGrantTypeException,re as __Client};
@@ -1,6 +0,0 @@
1
- import{a as Nt,b as nn}from"./chunk-MQK6VFZR.js";import{$ as cn,A as ae,B as Ht,C as $t,D as Wt,E as Mt,F as Lt,G as Ut,H as Vt,I as jt,J as zt,K as Bt,L as qt,M as Gt,N as Kt,O as Xt,P as de,Q as fe,R as Yt,S as Jt,T as Zt,U as Qt,V as Dt,W as en,X as tn,Y as rn,Z as on,_ as sn,a as dt,aa as ln,b as Pe,ba as an,c as ft,ca as dn,d as ut,e as pt,f as re,g as ht,i as oe,m as Pt,n as se,o as ie,p as Tt,q as wt,r as ce,s as _t,t as x,u as xt,v as vt,w as Rt,x as Ot,y as kt,z as Ft}from"./chunk-KNTGSRCW.js";import{b as _,c as at}from"./chunk-FZ26Y4SI.js";import"./chunk-S3F2U5VR.js";import{b as gt,d as mt,e as yt,f as It,g as bt,h as St,k as At,l as y,m as Te,p as Ct}from"./chunk-JIMTVXLP.js";import{d as Et}from"./chunk-YBDDYGAW.js";import"./chunk-IAPQO6XO.js";import{a as le}from"./chunk-2LU65C2X.js";import"./chunk-TLDYRTHH.js";import{a as i}from"./chunk-Y6DVQ7FD.js";var we="***SensitiveInformation***";var Cr=i(({output:e,parsedBody:t,exceptionCtor:n,errorCode:r})=>{let o=Pr(e),s=o.httpStatusCode?o.httpStatusCode+"":void 0,l=new n({name:t?.code||t?.Code||r||s||"UnknownError",$fault:"client",$metadata:o});throw x(l,t)},"throwDefaultError"),fn=i(e=>({output:t,parsedBody:n,errorCode:r})=>{Cr({output:t,parsedBody:n,exceptionCtor:e,errorCode:r})},"withBaseException"),Pr=i(e=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]}),"deserializeMetadata");var Ne=i(e=>{let t="#text";for(let n in e)e.hasOwnProperty(n)&&e[n][t]!==void 0?e[n]=e[n][t]:typeof e[n]=="object"&&e[n]!==null&&(e[n]=Ne(e[n]));return e},"getValueFromTextNode");var un=":A-Za-z_\\u00C0-\\u00D6\\u00D8-\\u00F6\\u00F8-\\u02FF\\u0370-\\u037D\\u037F-\\u1FFF\\u200C-\\u200D\\u2070-\\u218F\\u2C00-\\u2FEF\\u3001-\\uD7FF\\uF900-\\uFDCF\\uFDF0-\\uFFFD",Tr=un+"\\-.\\d\\u00B7\\u0300-\\u036F\\u203F-\\u2040",wr="["+un+"]["+Tr+"]*",Nr=new RegExp("^"+wr+"$");function ue(e,t){let n=[],r=t.exec(e);for(;r;){let o=[];o.startIndex=t.lastIndex-r[0].length;let s=r.length;for(let l=0;l<s;l++)o.push(r[l]);n.push(o),r=t.exec(e)}return n}i(ue,"getAllMatches");var ee=i(function(e){let t=Nr.exec(e);return!(t===null||typeof t>"u")},"isName");function pn(e){return typeof e<"u"}i(pn,"isExist");var _r={allowBooleanAttributes:!1,unpairedTags:[]};function yn(e,t){t=Object.assign({},_r,t);let n=[],r=!1,o=!1;e[0]==="\uFEFF"&&(e=e.substr(1));for(let s=0;s<e.length;s++)if(e[s]==="<"&&e[s+1]==="?"){if(s+=2,s=hn(e,s),s.err)return s}else if(e[s]==="<"){let l=s;if(s++,e[s]==="!"){s=mn(e,s);continue}else{let a=!1;e[s]==="/"&&(a=!0,s++);let c="";for(;s<e.length&&e[s]!==">"&&e[s]!==" "&&e[s]!==" "&&e[s]!==`
2
- `&&e[s]!=="\r";s++)c+=e[s];if(c=c.trim(),c[c.length-1]==="/"&&(c=c.substring(0,c.length-1),s--),!$r(c)){let p;return c.trim().length===0?p="Invalid space after '<'.":p="Tag '"+c+"' is an invalid name.",m("InvalidTag",p,C(e,s))}let d=Rr(e,s);if(d===!1)return m("InvalidAttr","Attributes for '"+c+"' have open quote.",C(e,s));let f=d.value;if(s=d.index,f[f.length-1]==="/"){let p=s-f.length;f=f.substring(0,f.length-1);let P=En(f,t);if(P===!0)r=!0;else return m(P.err.code,P.err.msg,C(e,p+P.err.line))}else if(a)if(d.tagClosed){if(f.trim().length>0)return m("InvalidTag","Closing tag '"+c+"' can't have attributes or invalid starting.",C(e,l));if(n.length===0)return m("InvalidTag","Closing tag '"+c+"' has not been opened.",C(e,l));{let p=n.pop();if(c!==p.tagName){let P=C(e,p.tagStartPos);return m("InvalidTag","Expected closing tag '"+p.tagName+"' (opened in line "+P.line+", col "+P.col+") instead of closing tag '"+c+"'.",C(e,l))}n.length==0&&(o=!0)}}else return m("InvalidTag","Closing tag '"+c+"' doesn't have proper closing.",C(e,s));else{let p=En(f,t);if(p!==!0)return m(p.err.code,p.err.msg,C(e,s-f.length+p.err.line));if(o===!0)return m("InvalidXml","Multiple possible root nodes found.",C(e,s));t.unpairedTags.indexOf(c)!==-1||n.push({tagName:c,tagStartPos:l}),r=!0}for(s++;s<e.length;s++)if(e[s]==="<")if(e[s+1]==="!"){s++,s=mn(e,s);continue}else if(e[s+1]==="?"){if(s=hn(e,++s),s.err)return s}else break;else if(e[s]==="&"){let p=Fr(e,s);if(p==-1)return m("InvalidChar","char '&' is not expected.",C(e,s));s=p}else if(o===!0&&!gn(e[s]))return m("InvalidXml","Extra text at the end",C(e,s));e[s]==="<"&&s--}}else{if(gn(e[s]))continue;return m("InvalidChar","char '"+e[s]+"' is not expected.",C(e,s))}if(r){if(n.length==1)return m("InvalidTag","Unclosed tag '"+n[0].tagName+"'.",C(e,n[0].tagStartPos));if(n.length>0)return m("InvalidXml","Invalid '"+JSON.stringify(n.map(s=>s.tagName),null,4).replace(/\r?\n/g,"")+"' found.",{line:1,col:1})}else return m("InvalidXml","Start tag expected.",1);return!0}i(yn,"validate");function gn(e){return e===" "||e===" "||e===`
3
- `||e==="\r"}i(gn,"isWhiteSpace");function hn(e,t){let n=t;for(;t<e.length;t++)if(e[t]=="?"||e[t]==" "){let r=e.substr(n,t-n);if(t>5&&r==="xml")return m("InvalidXml","XML declaration allowed only at the start of the document.",C(e,t));if(e[t]=="?"&&e[t+1]==">"){t++;break}else continue}return t}i(hn,"readPI");function mn(e,t){if(e.length>t+5&&e[t+1]==="-"&&e[t+2]==="-"){for(t+=3;t<e.length;t++)if(e[t]==="-"&&e[t+1]==="-"&&e[t+2]===">"){t+=2;break}}else if(e.length>t+8&&e[t+1]==="D"&&e[t+2]==="O"&&e[t+3]==="C"&&e[t+4]==="T"&&e[t+5]==="Y"&&e[t+6]==="P"&&e[t+7]==="E"){let n=1;for(t+=8;t<e.length;t++)if(e[t]==="<")n++;else if(e[t]===">"&&(n--,n===0))break}else if(e.length>t+9&&e[t+1]==="["&&e[t+2]==="C"&&e[t+3]==="D"&&e[t+4]==="A"&&e[t+5]==="T"&&e[t+6]==="A"&&e[t+7]==="["){for(t+=8;t<e.length;t++)if(e[t]==="]"&&e[t+1]==="]"&&e[t+2]===">"){t+=2;break}}return t}i(mn,"readCommentAndCDATA");var xr='"',vr="'";function Rr(e,t){let n="",r="",o=!1;for(;t<e.length;t++){if(e[t]===xr||e[t]===vr)r===""?r=e[t]:r!==e[t]||(r="");else if(e[t]===">"&&r===""){o=!0;break}n+=e[t]}return r!==""?!1:{value:n,index:t,tagClosed:o}}i(Rr,"readAttributeStr");var Or=new RegExp(`(\\s*)([^\\s=]+)(\\s*=)?(\\s*(['"])(([\\s\\S])*?)\\5)?`,"g");function En(e,t){let n=ue(e,Or),r={};for(let o=0;o<n.length;o++){if(n[o][1].length===0)return m("InvalidAttr","Attribute '"+n[o][2]+"' has no space in starting.",te(n[o]));if(n[o][3]!==void 0&&n[o][4]===void 0)return m("InvalidAttr","Attribute '"+n[o][2]+"' is without value.",te(n[o]));if(n[o][3]===void 0&&!t.allowBooleanAttributes)return m("InvalidAttr","boolean attribute '"+n[o][2]+"' is not allowed.",te(n[o]));let s=n[o][2];if(!Hr(s))return m("InvalidAttr","Attribute '"+s+"' is an invalid name.",te(n[o]));if(!r.hasOwnProperty(s))r[s]=1;else return m("InvalidAttr","Attribute '"+s+"' is repeated.",te(n[o]))}return!0}i(En,"validateAttributeString");function kr(e,t){let n=/\d/;for(e[t]==="x"&&(t++,n=/[\da-fA-F]/);t<e.length;t++){if(e[t]===";")return t;if(!e[t].match(n))break}return-1}i(kr,"validateNumberAmpersand");function Fr(e,t){if(t++,e[t]===";")return-1;if(e[t]==="#")return t++,kr(e,t);let n=0;for(;t<e.length;t++,n++)if(!(e[t].match(/\w/)&&n<20)){if(e[t]===";")break;return-1}return t}i(Fr,"validateAmpersand");function m(e,t,n){return{err:{code:e,msg:t,line:n.line||n,col:n.col}}}i(m,"getErrorObject");function Hr(e){return ee(e)}i(Hr,"validateAttrName");function $r(e){return ee(e)}i($r,"validateTagName");function C(e,t){let n=e.substring(0,t).split(/\r?\n/);return{line:n.length,col:n[n.length-1].length+1}}i(C,"getLineNumberForPosition");function te(e){return e.startIndex+e[1].length}i(te,"getPositionFromMatch");var Wr={preserveOrder:!1,attributeNamePrefix:"@_",attributesGroupName:!1,textNodeName:"#text",ignoreAttributes:!0,removeNSPrefix:!1,allowBooleanAttributes:!1,parseTagValue:!0,parseAttributeValue:!1,trimValues:!0,cdataPropName:!1,numberParseOptions:{hex:!0,leadingZeros:!0,eNotation:!0},tagValueProcessor:i(function(e,t){return t},"tagValueProcessor"),attributeValueProcessor:i(function(e,t){return t},"attributeValueProcessor"),stopNodes:[],alwaysCreateTextNode:!1,isArray:i(()=>!1,"isArray"),commentPropName:!1,unpairedTags:[],processEntities:!0,htmlEntities:!1,ignoreDeclaration:!1,ignorePiTags:!1,transformTagName:!1,transformAttributeName:!1,updateTag:i(function(e,t,n){return e},"updateTag"),captureMetaData:!1},In=i(function(e){return Object.assign({},Wr,e)},"buildOptions");var pe;typeof Symbol!="function"?pe="@@xmlMetadata":pe=Symbol("XML Node Metadata");var T=class{static{i(this,"XmlNode")}constructor(t){this.tagname=t,this.child=[],this[":@"]={}}add(t,n){t==="__proto__"&&(t="#__proto__"),this.child.push({[t]:n})}addChild(t,n){t.tagname==="__proto__"&&(t.tagname="#__proto__"),t[":@"]&&Object.keys(t[":@"]).length>0?this.child.push({[t.tagname]:t.child,":@":t[":@"]}):this.child.push({[t.tagname]:t.child}),n!==void 0&&(this.child[this.child.length-1][pe]={startIndex:n})}static getMetaDataSymbol(){return pe}};function _e(e,t){let n={};if(e[t+3]==="O"&&e[t+4]==="C"&&e[t+5]==="T"&&e[t+6]==="Y"&&e[t+7]==="P"&&e[t+8]==="E"){t=t+9;let r=1,o=!1,s=!1,l="";for(;t<e.length;t++)if(e[t]==="<"&&!s){if(o&&M(e,"!ENTITY",t)){t+=7;let a,c;[a,c,t]=Mr(e,t+1),c.indexOf("&")===-1&&(n[a]={regx:RegExp(`&${a};`,"g"),val:c})}else if(o&&M(e,"!ELEMENT",t)){t+=8;let{index:a}=Ur(e,t+1);t=a}else if(o&&M(e,"!ATTLIST",t))t+=8;else if(o&&M(e,"!NOTATION",t)){t+=9;let{index:a}=Lr(e,t+1);t=a}else if(M(e,"!--",t))s=!0;else throw new Error("Invalid DOCTYPE");r++,l=""}else if(e[t]===">"){if(s?e[t-1]==="-"&&e[t-2]==="-"&&(s=!1,r--):r--,r===0)break}else e[t]==="["?o=!0:l+=e[t];if(r!==0)throw new Error("Unclosed DOCTYPE")}else throw new Error("Invalid Tag instead of DOCTYPE");return{entities:n,i:t}}i(_e,"readDocType");var F=i((e,t)=>{for(;t<e.length&&/\s/.test(e[t]);)t++;return t},"skipWhitespace");function Mr(e,t){t=F(e,t);let n="";for(;t<e.length&&!/\s/.test(e[t])&&e[t]!=='"'&&e[t]!=="'";)n+=e[t],t++;if(xe(n),t=F(e,t),e.substring(t,t+6).toUpperCase()==="SYSTEM")throw new Error("External entities are not supported");if(e[t]==="%")throw new Error("Parameter entities are not supported");let r="";return[t,r]=ge(e,t,"entity"),t--,[n,r,t]}i(Mr,"readEntityExp");function Lr(e,t){t=F(e,t);let n="";for(;t<e.length&&!/\s/.test(e[t]);)n+=e[t],t++;xe(n),t=F(e,t);let r=e.substring(t,t+6).toUpperCase();if(r!=="SYSTEM"&&r!=="PUBLIC")throw new Error(`Expected SYSTEM or PUBLIC, found "${r}"`);t+=r.length,t=F(e,t);let o=null,s=null;if(r==="PUBLIC")[t,o]=ge(e,t,"publicIdentifier"),t=F(e,t),(e[t]==='"'||e[t]==="'")&&([t,s]=ge(e,t,"systemIdentifier"));else if(r==="SYSTEM"&&([t,s]=ge(e,t,"systemIdentifier"),!s))throw new Error("Missing mandatory system identifier for SYSTEM notation");return{notationName:n,publicIdentifier:o,systemIdentifier:s,index:--t}}i(Lr,"readNotationExp");function ge(e,t,n){let r="",o=e[t];if(o!=='"'&&o!=="'")throw new Error(`Expected quoted string, found "${o}"`);for(t++;t<e.length&&e[t]!==o;)r+=e[t],t++;if(e[t]!==o)throw new Error(`Unterminated ${n} value`);return t++,[t,r]}i(ge,"readIdentifierVal");function Ur(e,t){t=F(e,t);let n="";for(;t<e.length&&!/\s/.test(e[t]);)n+=e[t],t++;if(!xe(n))throw new Error(`Invalid element name: "${n}"`);t=F(e,t);let r="";if(e[t]==="E"&&M(e,"MPTY",t))t+=4;else if(e[t]==="A"&&M(e,"NY",t))t+=2;else if(e[t]==="("){for(t++;t<e.length&&e[t]!==")";)r+=e[t],t++;if(e[t]!==")")throw new Error("Unterminated content model")}else throw new Error(`Invalid Element Expression, found "${e[t]}"`);return{elementName:n,contentModel:r.trim(),index:t}}i(Ur,"readElementExp");function M(e,t,n){for(let r=0;r<t.length;r++)if(t[r]!==e[n+r+1])return!1;return!0}i(M,"hasSeq");function xe(e){if(ee(e))return e;throw new Error(`Invalid entity name ${e}`)}i(xe,"validateEntityName");var Vr=/^[-+]?0x[a-fA-F0-9]+$/,jr=/^([\-\+])?(0*)([0-9]*(\.[0-9]*)?)$/,zr={hex:!0,leadingZeros:!0,decimalPoint:".",eNotation:!0};function ve(e,t={}){if(t=Object.assign({},zr,t),!e||typeof e!="string")return e;let n=e.trim();if(t.skipLike!==void 0&&t.skipLike.test(n))return e;if(e==="0")return 0;if(t.hex&&Vr.test(n))return Kr(n,16);if(n.search(/.+[eE].+/)!==-1)return qr(e,n,t);{let r=jr.exec(n);if(r){let o=r[1]||"",s=r[2],l=Gr(r[3]),a=o?e[s.length+1]===".":e[s.length]===".";if(!t.leadingZeros&&(s.length>1||s.length===1&&!a))return e;{let c=Number(n),d=String(c);if(c===0)return c;if(d.search(/[eE]/)!==-1)return t.eNotation?c:e;if(n.indexOf(".")!==-1)return d==="0"||d===l||d===`${o}${l}`?c:e;let f=s?l:n;return s?f===d||o+f===d?c:e:f===d||f===o+d?c:e}}else return e}}i(ve,"toNumber");var Br=/^([-+])?(0*)(\d*(\.\d*)?[eE][-\+]?\d+)$/;function qr(e,t,n){if(!n.eNotation)return e;let r=t.match(Br);if(r){let o=r[1]||"",s=r[3].indexOf("e")===-1?"E":"e",l=r[2],a=o?e[l.length+1]===s:e[l.length]===s;return l.length>1&&a?e:l.length===1&&(r[3].startsWith(`.${s}`)||r[3][0]===s)?Number(t):n.leadingZeros&&!a?(t=(r[1]||"")+r[3],Number(t)):e}else return e}i(qr,"resolveEnotation");function Gr(e){return e&&e.indexOf(".")!==-1&&(e=e.replace(/0+$/,""),e==="."?e="0":e[0]==="."?e="0"+e:e[e.length-1]==="."&&(e=e.substring(0,e.length-1))),e}i(Gr,"trimZeros");function Kr(e,t){if(parseInt)return parseInt(e,t);if(Number.parseInt)return Number.parseInt(e,t);if(window&&window.parseInt)return window.parseInt(e,t);throw new Error("parseInt, Number.parseInt, window.parseInt are not supported")}i(Kr,"parse_int");function Re(e){return typeof e=="function"?e:Array.isArray(e)?t=>{for(let n of e)if(typeof n=="string"&&t===n||n instanceof RegExp&&n.test(t))return!0}:()=>!1}i(Re,"getIgnoreAttributesFn");var ne=class{static{i(this,"OrderedObjParser")}constructor(t){this.options=t,this.currentNode=null,this.tagsNodeStack=[],this.docTypeEntities={},this.lastEntities={apos:{regex:/&(apos|#39|#x27);/g,val:"'"},gt:{regex:/&(gt|#62|#x3E);/g,val:">"},lt:{regex:/&(lt|#60|#x3C);/g,val:"<"},quot:{regex:/&(quot|#34|#x22);/g,val:'"'}},this.ampEntity={regex:/&(amp|#38|#x26);/g,val:"&"},this.htmlEntities={space:{regex:/&(nbsp|#160);/g,val:" "},cent:{regex:/&(cent|#162);/g,val:"\xA2"},pound:{regex:/&(pound|#163);/g,val:"\xA3"},yen:{regex:/&(yen|#165);/g,val:"\xA5"},euro:{regex:/&(euro|#8364);/g,val:"\u20AC"},copyright:{regex:/&(copy|#169);/g,val:"\xA9"},reg:{regex:/&(reg|#174);/g,val:"\xAE"},inr:{regex:/&(inr|#8377);/g,val:"\u20B9"},num_dec:{regex:/&#([0-9]{1,7});/g,val:i((n,r)=>String.fromCodePoint(Number.parseInt(r,10)),"val")},num_hex:{regex:/&#x([0-9a-fA-F]{1,6});/g,val:i((n,r)=>String.fromCodePoint(Number.parseInt(r,16)),"val")}},this.addExternalEntities=Xr,this.parseXml=Dr,this.parseTextData=Yr,this.resolveNameSpace=Jr,this.buildAttributesMap=Qr,this.isItStopNode=ro,this.replaceEntitiesValue=to,this.readStopNodeData=so,this.saveTextToParentTag=no,this.addChild=eo,this.ignoreAttributesFn=Re(this.options.ignoreAttributes)}};function Xr(e){let t=Object.keys(e);for(let n=0;n<t.length;n++){let r=t[n];this.lastEntities[r]={regex:new RegExp("&"+r+";","g"),val:e[r]}}}i(Xr,"addExternalEntities");function Yr(e,t,n,r,o,s,l){if(e!==void 0&&(this.options.trimValues&&!r&&(e=e.trim()),e.length>0)){l||(e=this.replaceEntitiesValue(e));let a=this.options.tagValueProcessor(t,e,n,o,s);return a==null?e:typeof a!=typeof e||a!==e?a:this.options.trimValues?ke(e,this.options.parseTagValue,this.options.numberParseOptions):e.trim()===e?ke(e,this.options.parseTagValue,this.options.numberParseOptions):e}}i(Yr,"parseTextData");function Jr(e){if(this.options.removeNSPrefix){let t=e.split(":"),n=e.charAt(0)==="/"?"/":"";if(t[0]==="xmlns")return"";t.length===2&&(e=n+t[1])}return e}i(Jr,"resolveNameSpace");var Zr=new RegExp(`([^\\s=]+)\\s*(=\\s*(['"])([\\s\\S]*?)\\3)?`,"gm");function Qr(e,t,n){if(this.options.ignoreAttributes!==!0&&typeof e=="string"){let r=ue(e,Zr),o=r.length,s={};for(let l=0;l<o;l++){let a=this.resolveNameSpace(r[l][1]);if(this.ignoreAttributesFn(a,t))continue;let c=r[l][4],d=this.options.attributeNamePrefix+a;if(a.length)if(this.options.transformAttributeName&&(d=this.options.transformAttributeName(d)),d==="__proto__"&&(d="#__proto__"),c!==void 0){this.options.trimValues&&(c=c.trim()),c=this.replaceEntitiesValue(c);let f=this.options.attributeValueProcessor(a,c,t);f==null?s[d]=c:typeof f!=typeof c||f!==c?s[d]=f:s[d]=ke(c,this.options.parseAttributeValue,this.options.numberParseOptions)}else this.options.allowBooleanAttributes&&(s[d]=!0)}if(!Object.keys(s).length)return;if(this.options.attributesGroupName){let l={};return l[this.options.attributesGroupName]=s,l}return s}}i(Qr,"buildAttributesMap");var Dr=i(function(e){e=e.replace(/\r\n?/g,`
4
- `);let t=new T("!xml"),n=t,r="",o="";for(let s=0;s<e.length;s++)if(e[s]==="<")if(e[s+1]==="/"){let a=L(e,">",s,"Closing Tag is not closed."),c=e.substring(s+2,a).trim();if(this.options.removeNSPrefix){let p=c.indexOf(":");p!==-1&&(c=c.substr(p+1))}this.options.transformTagName&&(c=this.options.transformTagName(c)),n&&(r=this.saveTextToParentTag(r,n,o));let d=o.substring(o.lastIndexOf(".")+1);if(c&&this.options.unpairedTags.indexOf(c)!==-1)throw new Error(`Unpaired tag can not be used as closing tag: </${c}>`);let f=0;d&&this.options.unpairedTags.indexOf(d)!==-1?(f=o.lastIndexOf(".",o.lastIndexOf(".")-1),this.tagsNodeStack.pop()):f=o.lastIndexOf("."),o=o.substring(0,f),n=this.tagsNodeStack.pop(),r="",s=a}else if(e[s+1]==="?"){let a=Oe(e,s,!1,"?>");if(!a)throw new Error("Pi Tag is not closed.");if(r=this.saveTextToParentTag(r,n,o),!(this.options.ignoreDeclaration&&a.tagName==="?xml"||this.options.ignorePiTags)){let c=new T(a.tagName);c.add(this.options.textNodeName,""),a.tagName!==a.tagExp&&a.attrExpPresent&&(c[":@"]=this.buildAttributesMap(a.tagExp,o,a.tagName)),this.addChild(n,c,o,s)}s=a.closeIndex+1}else if(e.substr(s+1,3)==="!--"){let a=L(e,"-->",s+4,"Comment is not closed.");if(this.options.commentPropName){let c=e.substring(s+4,a-2);r=this.saveTextToParentTag(r,n,o),n.add(this.options.commentPropName,[{[this.options.textNodeName]:c}])}s=a}else if(e.substr(s+1,2)==="!D"){let a=_e(e,s);this.docTypeEntities=a.entities,s=a.i}else if(e.substr(s+1,2)==="!["){let a=L(e,"]]>",s,"CDATA is not closed.")-2,c=e.substring(s+9,a);r=this.saveTextToParentTag(r,n,o);let d=this.parseTextData(c,n.tagname,o,!0,!1,!0,!0);d==null&&(d=""),this.options.cdataPropName?n.add(this.options.cdataPropName,[{[this.options.textNodeName]:c}]):n.add(this.options.textNodeName,d),s=a+2}else{let a=Oe(e,s,this.options.removeNSPrefix),c=a.tagName,d=a.rawTagName,f=a.tagExp,p=a.attrExpPresent,P=a.closeIndex;this.options.transformTagName&&(c=this.options.transformTagName(c)),n&&r&&n.tagname!=="!xml"&&(r=this.saveTextToParentTag(r,n,o,!1));let $=n;$&&this.options.unpairedTags.indexOf($.tagname)!==-1&&(n=this.tagsNodeStack.pop(),o=o.substring(0,o.lastIndexOf("."))),c!==t.tagname&&(o+=o?"."+c:c);let W=s;if(this.isItStopNode(this.options.stopNodes,o,c)){let S="";if(f.length>0&&f.lastIndexOf("/")===f.length-1)c[c.length-1]==="/"?(c=c.substr(0,c.length-1),o=o.substr(0,o.length-1),f=c):f=f.substr(0,f.length-1),s=a.closeIndex;else if(this.options.unpairedTags.indexOf(c)!==-1)s=a.closeIndex;else{let D=this.readStopNodeData(e,d,P+1);if(!D)throw new Error(`Unexpected end of ${d}`);s=D.i,S=D.tagContent}let Q=new T(c);c!==f&&p&&(Q[":@"]=this.buildAttributesMap(f,o,c)),S&&(S=this.parseTextData(S,c,o,!0,p,!0,!0)),o=o.substr(0,o.lastIndexOf(".")),Q.add(this.options.textNodeName,S),this.addChild(n,Q,o,W)}else{if(f.length>0&&f.lastIndexOf("/")===f.length-1){c[c.length-1]==="/"?(c=c.substr(0,c.length-1),o=o.substr(0,o.length-1),f=c):f=f.substr(0,f.length-1),this.options.transformTagName&&(c=this.options.transformTagName(c));let S=new T(c);c!==f&&p&&(S[":@"]=this.buildAttributesMap(f,o,c)),this.addChild(n,S,o,W),o=o.substr(0,o.lastIndexOf("."))}else{let S=new T(c);this.tagsNodeStack.push(n),c!==f&&p&&(S[":@"]=this.buildAttributesMap(f,o,c)),this.addChild(n,S,o,W),n=S}r="",s=P}}else r+=e[s];return t.child},"parseXml");function eo(e,t,n,r){this.options.captureMetaData||(r=void 0);let o=this.options.updateTag(t.tagname,n,t[":@"]);o===!1||(typeof o=="string"&&(t.tagname=o),e.addChild(t,r))}i(eo,"addChild");var to=i(function(e){if(this.options.processEntities){for(let t in this.docTypeEntities){let n=this.docTypeEntities[t];e=e.replace(n.regx,n.val)}for(let t in this.lastEntities){let n=this.lastEntities[t];e=e.replace(n.regex,n.val)}if(this.options.htmlEntities)for(let t in this.htmlEntities){let n=this.htmlEntities[t];e=e.replace(n.regex,n.val)}e=e.replace(this.ampEntity.regex,this.ampEntity.val)}return e},"replaceEntitiesValue");function no(e,t,n,r){return e&&(r===void 0&&(r=t.child.length===0),e=this.parseTextData(e,t.tagname,n,!1,t[":@"]?Object.keys(t[":@"]).length!==0:!1,r),e!==void 0&&e!==""&&t.add(this.options.textNodeName,e),e=""),e}i(no,"saveTextToParentTag");function ro(e,t,n){let r="*."+n;for(let o in e){let s=e[o];if(r===s||t===s)return!0}return!1}i(ro,"isItStopNode");function oo(e,t,n=">"){let r,o="";for(let s=t;s<e.length;s++){let l=e[s];if(r)l===r&&(r="");else if(l==='"'||l==="'")r=l;else if(l===n[0])if(n[1]){if(e[s+1]===n[1])return{data:o,index:s}}else return{data:o,index:s};else l===" "&&(l=" ");o+=l}}i(oo,"tagExpWithClosingIndex");function L(e,t,n,r){let o=e.indexOf(t,n);if(o===-1)throw new Error(r);return o+t.length-1}i(L,"findClosingIndex");function Oe(e,t,n,r=">"){let o=oo(e,t+1,r);if(!o)return;let s=o.data,l=o.index,a=s.search(/\s/),c=s,d=!0;a!==-1&&(c=s.substring(0,a),s=s.substring(a+1).trimStart());let f=c;if(n){let p=c.indexOf(":");p!==-1&&(c=c.substr(p+1),d=c!==o.data.substr(p+1))}return{tagName:c,tagExp:s,closeIndex:l,attrExpPresent:d,rawTagName:f}}i(Oe,"readTagExp");function so(e,t,n){let r=n,o=1;for(;n<e.length;n++)if(e[n]==="<")if(e[n+1]==="/"){let s=L(e,">",n,`${t} is not closed`);if(e.substring(n+2,s).trim()===t&&(o--,o===0))return{tagContent:e.substring(r,n),i:s};n=s}else if(e[n+1]==="?")n=L(e,"?>",n+1,"StopNode is not closed.");else if(e.substr(n+1,3)==="!--")n=L(e,"-->",n+3,"StopNode is not closed.");else if(e.substr(n+1,2)==="![")n=L(e,"]]>",n,"StopNode is not closed.")-2;else{let s=Oe(e,n,">");s&&((s&&s.tagName)===t&&s.tagExp[s.tagExp.length-1]!=="/"&&o++,n=s.closeIndex)}}i(so,"readStopNodeData");function ke(e,t,n){if(t&&typeof e=="string"){let r=e.trim();return r==="true"?!0:r==="false"?!1:ve(e,n)}else return pn(e)?e:""}i(ke,"parseValue");var Fe=T.getMetaDataSymbol();function He(e,t){return bn(e,t)}i(He,"prettify");function bn(e,t,n){let r,o={};for(let s=0;s<e.length;s++){let l=e[s],a=io(l),c="";if(n===void 0?c=a:c=n+"."+a,a===t.textNodeName)r===void 0?r=l[a]:r+=""+l[a];else{if(a===void 0)continue;if(l[a]){let d=bn(l[a],t,c),f=lo(d,t);l[Fe]!==void 0&&(d[Fe]=l[Fe]),l[":@"]?co(d,l[":@"],c,t):Object.keys(d).length===1&&d[t.textNodeName]!==void 0&&!t.alwaysCreateTextNode?d=d[t.textNodeName]:Object.keys(d).length===0&&(t.alwaysCreateTextNode?d[t.textNodeName]="":d=""),o[a]!==void 0&&o.hasOwnProperty(a)?(Array.isArray(o[a])||(o[a]=[o[a]]),o[a].push(d)):t.isArray(a,c,f)?o[a]=[d]:o[a]=d}}}return typeof r=="string"?r.length>0&&(o[t.textNodeName]=r):r!==void 0&&(o[t.textNodeName]=r),o}i(bn,"compress");function io(e){let t=Object.keys(e);for(let n=0;n<t.length;n++){let r=t[n];if(r!==":@")return r}}i(io,"propName");function co(e,t,n,r){if(t){let o=Object.keys(t),s=o.length;for(let l=0;l<s;l++){let a=o[l];r.isArray(a,n+"."+a,!0,!0)?e[a]=[t[a]]:e[a]=t[a]}}}i(co,"assignAttributes");function lo(e,t){let{textNodeName:n}=t,r=Object.keys(e).length;return!!(r===0||r===1&&(e[n]||typeof e[n]=="boolean"||e[n]===0))}i(lo,"isLeafTag");var U=class{static{i(this,"XMLParser")}constructor(t){this.externalEntities={},this.options=In(t)}parse(t,n){if(typeof t!="string")if(t.toString)t=t.toString();else throw new Error("XML data is accepted in String or Bytes[] form.");if(n){n===!0&&(n={});let s=yn(t,n);if(s!==!0)throw Error(`${s.err.msg}:${s.err.line}:${s.err.col}`)}let r=new ne(this.options);r.addExternalEntities(this.externalEntities);let o=r.parseXml(t);return this.options.preserveOrder||o===void 0?o:He(o,this.options)}addEntity(t,n){if(n.indexOf("&")!==-1)throw new Error("Entity value can't have '&'");if(t.indexOf("&")!==-1||t.indexOf(";")!==-1)throw new Error("An entity must be set without '&' and ';'. Eg. use '#xD' for '&#xD;'");if(n==="&")throw new Error("An entity with value '&' is not permitted");this.externalEntities[t]=n}static getMetaDataSymbol(){return T.getMetaDataSymbol()}};var $e=new U({attributeNamePrefix:"",htmlEntities:!0,ignoreAttributes:!1,ignoreDeclaration:!0,parseTagValue:!1,trimValues:!1,tagValueProcessor:i((e,t)=>t.trim()===""&&t.includes(`
5
- `)?"":void 0,"tagValueProcessor")});$e.addEntity("#xD","\r");$e.addEntity("#10",`
6
- `);function We(e){return $e.parse(e,!0)}i(We,"parseXML");var he=i((e,t)=>Wt(e,t).then(n=>{if(n.length){let r;try{r=We(n)}catch(a){throw a&&typeof a=="object"&&Object.defineProperty(a,"$responseBodyText",{value:n}),a}let o="#text",s=Object.keys(r)[0],l=r[s];return l[o]&&(l[s]=l[o],delete l[o]),Ne(l)}return{}}),"parseXmlBody"),Sn=i(async(e,t)=>{let n=await he(e,t);return n.Error&&(n.Error.message=n.Error.message??n.Error.Message),n},"parseXmlErrorBody");var An=i(async(e,t,n)=>({operation:dt(t).operation,region:await Pe(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),"defaultSTSHttpAuthSchemeParametersProvider");function ao(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:e.region},propertiesExtractor:i((t,n)=>({signingProperties:{config:t,context:n}}),"propertiesExtractor")}}i(ao,"createAwsAuthSigv4HttpAuthOption");function fo(e){return{schemeId:"smithy.api#noAuth"}}i(fo,"createSmithyApiNoAuthHttpAuthOption");var Cn=i(e=>{let t=[];switch(e.operation){case"AssumeRoleWithWebIdentity":{t.push(fo(e));break}default:t.push(ao(e))}return t},"defaultSTSHttpAuthSchemeProvider"),uo=i(e=>Object.assign(e,{stsClientCtor:R}),"resolveStsAuthConfig"),Pn=i(e=>{let t=uo(e),n=$t(t);return Object.assign(n,{authSchemePreference:Pe(e.authSchemePreference??[])})},"resolveHttpAuthSchemeConfig");var Tn=i(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,useGlobalEndpoint:e.useGlobalEndpoint??!1,defaultSigningName:"sts"}),"resolveClientEndpointParameters"),me={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var $n="required",u="type";var g="argv";var H="booleanEquals",I="stringEquals",Wn="sigv4";var Mn="us-east-1",h="endpoint",wn="https://sts.{Region}.{PartitionResult#dnsSuffix}",v="tree",V="error",Le="getAttr",Nn={[$n]:!1,[u]:"string"},Me={[$n]:!0,default:!1,[u]:"boolean"},Ln={ref:"Endpoint"},_n={fn:"isSet",[g]:[{ref:"Region"}]},b={ref:"Region"},xn={fn:"aws.partition",[g]:[b],assign:"PartitionResult"},Un={ref:"UseFIPS"},Vn={ref:"UseDualStack"},A={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:Wn,signingName:"sts",signingRegion:Mn}]},headers:{}},w={},vn={conditions:[{fn:I,[g]:[b,"aws-global"]}],[h]:A,[u]:h},jn={fn:H,[g]:[Un,!0]},zn={fn:H,[g]:[Vn,!0]},Rn={fn:Le,[g]:[{ref:"PartitionResult"},"supportsFIPS"]},Bn={ref:"PartitionResult"},On={fn:H,[g]:[!0,{fn:Le,[g]:[Bn,"supportsDualStack"]}]},kn=[{fn:"isSet",[g]:[Ln]}],Fn=[jn],Hn=[zn],po={version:"1.0",parameters:{Region:Nn,UseDualStack:Me,UseFIPS:Me,Endpoint:Nn,UseGlobalEndpoint:Me},rules:[{conditions:[{fn:H,[g]:[{ref:"UseGlobalEndpoint"},!0]},{fn:"not",[g]:kn},_n,xn,{fn:H,[g]:[Un,!1]},{fn:H,[g]:[Vn,!1]}],rules:[{conditions:[{fn:I,[g]:[b,"ap-northeast-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"ap-south-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"ap-southeast-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"ap-southeast-2"]}],endpoint:A,[u]:h},vn,{conditions:[{fn:I,[g]:[b,"ca-central-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"eu-central-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"eu-north-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"eu-west-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"eu-west-2"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"eu-west-3"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"sa-east-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,Mn]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"us-east-2"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"us-west-1"]}],endpoint:A,[u]:h},{conditions:[{fn:I,[g]:[b,"us-west-2"]}],endpoint:A,[u]:h},{endpoint:{url:wn,properties:{authSchemes:[{name:Wn,signingName:"sts",signingRegion:"{Region}"}]},headers:w},[u]:h}],[u]:v},{conditions:kn,rules:[{conditions:Fn,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[u]:V},{conditions:Hn,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[u]:V},{endpoint:{url:Ln,properties:w,headers:w},[u]:h}],[u]:v},{conditions:[_n],rules:[{conditions:[xn],rules:[{conditions:[jn,zn],rules:[{conditions:[{fn:H,[g]:[!0,Rn]},On],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:w,headers:w},[u]:h}],[u]:v},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[u]:V}],[u]:v},{conditions:Fn,rules:[{conditions:[{fn:H,[g]:[Rn,!0]}],rules:[{conditions:[{fn:I,[g]:[{fn:Le,[g]:[Bn,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:w,headers:w},[u]:h},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:w,headers:w},[u]:h}],[u]:v},{error:"FIPS is enabled but this partition does not support FIPS",[u]:V}],[u]:v},{conditions:Hn,rules:[{conditions:[On],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:w,headers:w},[u]:h}],[u]:v},{error:"DualStack is enabled but this partition does not support DualStack",[u]:V}],[u]:v},vn,{endpoint:{url:wn,properties:w,headers:w},[u]:h}],[u]:v}],[u]:v},{error:"Invalid Configuration: Missing Region",[u]:V}]},qn=po;var go=new jt({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),Gn=i((e,t={})=>go.get(e,()=>Bt(qn,{endpointParams:e,logger:t.logger})),"defaultEndpointResolver");zt.aws=qt;var Kn=i(e=>({apiVersion:"2011-06-15",base64Decoder:e?.base64Decoder??mt,base64Encoder:e?.base64Encoder??It,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??Gn,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??Cn,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:i(t=>t.getIdentityProvider("aws.auth#sigv4"),"identityProvider"),signer:new ae},{schemeId:"smithy.api#noAuth",identityProvider:i(t=>t.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),"identityProvider"),signer:new se}],logger:e?.logger??new kt,serviceId:e?.serviceId??"STS",urlParser:e?.urlParser??at,utf8Decoder:e?.utf8Decoder??Et,utf8Encoder:e?.utf8Encoder??yt}),"getRuntimeConfig");var Xn=i(e=>{vt(process.version);let t=ln(e),n=i(()=>t().then(xt),"defaultConfigProvider"),r=Kn(e);Ft(process.version);let o={profile:e?.profile,logger:r.logger};return{...r,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??_(Ht,o),bodyLengthChecker:e?.bodyLengthChecker??cn,defaultUserAgentProvider:e?.defaultUserAgentProvider??rn({serviceId:r.serviceId,clientVersion:nn.version}),httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:i(s=>s.getIdentityProvider("aws.auth#sigv4")||(async l=>await e.credentialDefaultProvider(l?.__config||{})()),"identityProvider"),signer:new ae},{schemeId:"smithy.api#noAuth",identityProvider:i(s=>s.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),"identityProvider"),signer:new se}],maxAttempts:e?.maxAttempts??_(Qt,e),region:e?.region??_(de,{...fe,...o}),requestHandler:bt.create(e?.requestHandler??n),retryMode:e?.retryMode??_({...en,default:i(async()=>(await n()).retryMode||Zt,"default")},e),sha256:e?.sha256??sn.bind(null,"sha256"),streamCollector:e?.streamCollector??St,useDualstackEndpoint:e?.useDualstackEndpoint??_(Kt,o),useFipsEndpoint:e?.useFipsEndpoint??_(Xt,o),userAgentAppId:e?.userAgentAppId??_(on,o)}},"getRuntimeConfig");function Yn(e={}){return _({...de,async default(){return ho.silence||console.warn("@aws-sdk - WARN - default STS region of us-east-1 used. See @aws-sdk/credential-providers README and set a region explicitly."),"us-east-1"}},{...fe,...e})}i(Yn,"stsRegionDefaultResolver");var ho={silence:!1};var Jn=i(e=>{let t=e.httpAuthSchemes,n=e.httpAuthSchemeProvider,r=e.credentials;return{setHttpAuthScheme(o){let s=t.findIndex(l=>l.schemeId===o.schemeId);s===-1?t.push(o):t.splice(s,1,o)},httpAuthSchemes(){return t},setHttpAuthSchemeProvider(o){n=o},httpAuthSchemeProvider(){return n},setCredentials(o){r=o},credentials(){return r}}},"getHttpAuthExtensionConfiguration"),Zn=i(e=>({httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}),"resolveHttpAuthRuntimeConfig");var Qn=i((e,t)=>{let n=Object.assign(an(e),Rt(e),ut(e),Jn(e));return t.forEach(r=>r.configure(n)),Object.assign(e,dn(n),Ot(n),pt(n),Zn(n))},"resolveRuntimeExtensions");var R=class extends wt{static{i(this,"STSClient")}config;constructor(...[t]){let n=Xn(t||{});super(n),this.initConfig=n;let r=Tn(n),o=Vt(r),s=Dt(o),l=Yt(s),a=l,c=Tt(a),d=Pn(c),f=Qn(d,t?.extensions||[]);this.config=f,this.middlewareStack.use(Gt(this.config)),this.middlewareStack.use(tn(this.config)),this.middlewareStack.use(Jt(this.config)),this.middlewareStack.use(Mt(this.config)),this.middlewareStack.use(Lt(this.config)),this.middlewareStack.use(Ut(this.config)),this.middlewareStack.use(ft(this.config,{httpAuthSchemeParametersProvider:An,identityProviderConfigProvider:i(async p=>new Pt({"aws.auth#sigv4":p.credentials}),"identityProviderConfigProvider")})),this.middlewareStack.use(ht(this.config))}destroy(){super.destroy()}};var N=class e extends _t{static{i(this,"STSServiceException")}constructor(t){super(t),Object.setPrototypeOf(this,e.prototype)}};var Dn=i(e=>({...e,...e.SecretAccessKey&&{SecretAccessKey:we}}),"CredentialsFilterSensitiveLog"),er=i(e=>({...e,...e.Credentials&&{Credentials:Dn(e.Credentials)}}),"AssumeRoleResponseFilterSensitiveLog"),Ee=class e extends N{static{i(this,"ExpiredTokenException")}name="ExpiredTokenException";$fault="client";constructor(t){super({name:"ExpiredTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype)}},ye=class e extends N{static{i(this,"MalformedPolicyDocumentException")}name="MalformedPolicyDocumentException";$fault="client";constructor(t){super({name:"MalformedPolicyDocumentException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype)}},Ie=class e extends N{static{i(this,"PackedPolicyTooLargeException")}name="PackedPolicyTooLargeException";$fault="client";constructor(t){super({name:"PackedPolicyTooLargeException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype)}},be=class e extends N{static{i(this,"RegionDisabledException")}name="RegionDisabledException";$fault="client";constructor(t){super({name:"RegionDisabledException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype)}},Se=class e extends N{static{i(this,"IDPRejectedClaimException")}name="IDPRejectedClaimException";$fault="client";constructor(t){super({name:"IDPRejectedClaimException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype)}},Ae=class e extends N{static{i(this,"InvalidIdentityTokenException")}name="InvalidIdentityTokenException";$fault="client";constructor(t){super({name:"InvalidIdentityTokenException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype)}},tr=i(e=>({...e,...e.WebIdentityToken&&{WebIdentityToken:we}}),"AssumeRoleWithWebIdentityRequestFilterSensitiveLog"),nr=i(e=>({...e,...e.Credentials&&{Credentials:Dn(e.Credentials)}}),"AssumeRoleWithWebIdentityResponseFilterSensitiveLog"),Ce=class e extends N{static{i(this,"IDPCommunicationErrorException")}name="IDPCommunicationErrorException";$fault="client";constructor(t){super({name:"IDPCommunicationErrorException",$fault:"client",...t}),Object.setPrototypeOf(this,e.prototype)}};var rr=i(async(e,t)=>{let n=ur,r;return r=mr({...Co(e,t),[gr]:Vo,[hr]:pr}),fr(t,n,"/",void 0,r)},"se_AssumeRoleCommand"),or=i(async(e,t)=>{let n=ur,r;return r=mr({...Po(e,t),[gr]:jo,[hr]:pr}),fr(t,n,"/",void 0,r)},"se_AssumeRoleWithWebIdentityCommand"),sr=i(async(e,t)=>{if(e.statusCode>=300)return cr(e,t);let n=await he(e.body,t),r={};return r=Ro(n.AssumeRoleResult,t),{$metadata:k(e),...r}},"de_AssumeRoleCommand"),ir=i(async(e,t)=>{if(e.statusCode>=300)return cr(e,t);let n=await he(e.body,t),r={};return r=Oo(n.AssumeRoleWithWebIdentityResult,t),{$metadata:k(e),...r}},"de_AssumeRoleWithWebIdentityCommand"),cr=i(async(e,t)=>{let n={...e,body:await Sn(e.body,t)},r=zo(e,n.body);switch(r){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await mo(n,t);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await bo(n,t);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await So(n,t);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await Ao(n,t);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await Eo(n,t);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await yo(n,t);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await Io(n,t);default:let o=n.body;return Uo({output:e,parsedBody:o.Error,errorCode:r})}},"de_CommandError"),mo=i(async(e,t)=>{let n=e.body,r=ko(n.Error,t),o=new Ee({$metadata:k(e),...r});return x(o,n)},"de_ExpiredTokenExceptionRes"),Eo=i(async(e,t)=>{let n=e.body,r=Fo(n.Error,t),o=new Ce({$metadata:k(e),...r});return x(o,n)},"de_IDPCommunicationErrorExceptionRes"),yo=i(async(e,t)=>{let n=e.body,r=Ho(n.Error,t),o=new Se({$metadata:k(e),...r});return x(o,n)},"de_IDPRejectedClaimExceptionRes"),Io=i(async(e,t)=>{let n=e.body,r=$o(n.Error,t),o=new Ae({$metadata:k(e),...r});return x(o,n)},"de_InvalidIdentityTokenExceptionRes"),bo=i(async(e,t)=>{let n=e.body,r=Wo(n.Error,t),o=new ye({$metadata:k(e),...r});return x(o,n)},"de_MalformedPolicyDocumentExceptionRes"),So=i(async(e,t)=>{let n=e.body,r=Mo(n.Error,t),o=new Ie({$metadata:k(e),...r});return x(o,n)},"de_PackedPolicyTooLargeExceptionRes"),Ao=i(async(e,t)=>{let n=e.body,r=Lo(n.Error,t),o=new be({$metadata:k(e),...r});return x(o,n)},"de_RegionDisabledExceptionRes"),Co=i((e,t)=>{let n={};if(e[X]!=null&&(n[X]=e[X]),e[Y]!=null&&(n[Y]=e[Y]),e[G]!=null){let r=lr(e[G],t);e[G]?.length===0&&(n.PolicyArns=[]),Object.entries(r).forEach(([o,s])=>{let l=`PolicyArns.${o}`;n[l]=s})}if(e[q]!=null&&(n[q]=e[q]),e[B]!=null&&(n[B]=e[B]),e[nt]!=null){let r=vo(e[nt],t);e[nt]?.length===0&&(n.Tags=[]),Object.entries(r).forEach(([o,s])=>{let l=`Tags.${o}`;n[l]=s})}if(e[ot]!=null){let r=xo(e[ot],t);e[ot]?.length===0&&(n.TransitiveTagKeys=[]),Object.entries(r).forEach(([o,s])=>{let l=`TransitiveTagKeys.${o}`;n[l]=s})}if(e[Ge]!=null&&(n[Ge]=e[Ge]),e[et]!=null&&(n[et]=e[et]),e[rt]!=null&&(n[rt]=e[rt]),e[O]!=null&&(n[O]=e[O]),e[Ye]!=null){let r=No(e[Ye],t);e[Ye]?.length===0&&(n.ProvidedContexts=[]),Object.entries(r).forEach(([o,s])=>{let l=`ProvidedContexts.${o}`;n[l]=s})}return n},"se_AssumeRoleRequest"),Po=i((e,t)=>{let n={};if(e[X]!=null&&(n[X]=e[X]),e[Y]!=null&&(n[Y]=e[Y]),e[it]!=null&&(n[it]=e[it]),e[Je]!=null&&(n[Je]=e[Je]),e[G]!=null){let r=lr(e[G],t);e[G]?.length===0&&(n.PolicyArns=[]),Object.entries(r).forEach(([o,s])=>{let l=`PolicyArns.${o}`;n[l]=s})}return e[q]!=null&&(n[q]=e[q]),e[B]!=null&&(n[B]=e[B]),n},"se_AssumeRoleWithWebIdentityRequest"),lr=i((e,t)=>{let n={},r=1;for(let o of e){if(o===null)continue;let s=To(o,t);Object.entries(s).forEach(([l,a])=>{n[`member.${r}.${l}`]=a}),r++}return n},"se_policyDescriptorListType"),To=i((e,t)=>{let n={};return e[ct]!=null&&(n[ct]=e[ct]),n},"se_PolicyDescriptorType"),wo=i((e,t)=>{let n={};return e[Xe]!=null&&(n[Xe]=e[Xe]),e[Be]!=null&&(n[Be]=e[Be]),n},"se_ProvidedContext"),No=i((e,t)=>{let n={},r=1;for(let o of e){if(o===null)continue;let s=wo(o,t);Object.entries(s).forEach(([l,a])=>{n[`member.${r}.${l}`]=a}),r++}return n},"se_ProvidedContextsListType"),_o=i((e,t)=>{let n={};return e[Ke]!=null&&(n[Ke]=e[Ke]),e[st]!=null&&(n[st]=e[st]),n},"se_Tag"),xo=i((e,t)=>{let n={},r=1;for(let o of e)o!==null&&(n[`member.${r}`]=o,r++);return n},"se_tagKeyListType"),vo=i((e,t)=>{let n={},r=1;for(let o of e){if(o===null)continue;let s=_o(o,t);Object.entries(s).forEach(([l,a])=>{n[`member.${r}.${l}`]=a}),r++}return n},"se_tagListType"),ar=i((e,t)=>{let n={};return e[Ve]!=null&&(n[Ve]=y(e[Ve])),e[je]!=null&&(n[je]=y(e[je])),n},"de_AssumedRoleUser"),Ro=i((e,t)=>{let n={};return e[z]!=null&&(n[z]=dr(e[z],t)),e[j]!=null&&(n[j]=ar(e[j],t)),e[K]!=null&&(n[K]=Te(e[K])),e[O]!=null&&(n[O]=y(e[O])),n},"de_AssumeRoleResponse"),Oo=i((e,t)=>{let n={};return e[z]!=null&&(n[z]=dr(e[z],t)),e[De]!=null&&(n[De]=y(e[De])),e[j]!=null&&(n[j]=ar(e[j],t)),e[K]!=null&&(n[K]=Te(e[K])),e[Ze]!=null&&(n[Ze]=y(e[Ze])),e[ze]!=null&&(n[ze]=y(e[ze])),e[O]!=null&&(n[O]=y(e[O])),n},"de_AssumeRoleWithWebIdentityResponse"),dr=i((e,t)=>{let n={};return e[Ue]!=null&&(n[Ue]=y(e[Ue])),e[Qe]!=null&&(n[Qe]=y(e[Qe])),e[tt]!=null&&(n[tt]=y(e[tt])),e[qe]!=null&&(n[qe]=At(Ct(e[qe]))),n},"de_Credentials"),ko=i((e,t)=>{let n={};return e[E]!=null&&(n[E]=y(e[E])),n},"de_ExpiredTokenException"),Fo=i((e,t)=>{let n={};return e[E]!=null&&(n[E]=y(e[E])),n},"de_IDPCommunicationErrorException"),Ho=i((e,t)=>{let n={};return e[E]!=null&&(n[E]=y(e[E])),n},"de_IDPRejectedClaimException"),$o=i((e,t)=>{let n={};return e[E]!=null&&(n[E]=y(e[E])),n},"de_InvalidIdentityTokenException"),Wo=i((e,t)=>{let n={};return e[E]!=null&&(n[E]=y(e[E])),n},"de_MalformedPolicyDocumentException"),Mo=i((e,t)=>{let n={};return e[E]!=null&&(n[E]=y(e[E])),n},"de_PackedPolicyTooLargeException"),Lo=i((e,t)=>{let n={};return e[E]!=null&&(n[E]=y(e[E])),n},"de_RegionDisabledException"),k=i(e=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]}),"deserializeMetadata");var Uo=fn(N),fr=i(async(e,t,n,r,o)=>{let{hostname:s,protocol:l="https",port:a,path:c}=await e.endpoint(),d={protocol:l,hostname:s,port:a,method:"POST",path:c.endsWith("/")?c.slice(0,-1)+n:c+n,headers:t};return r!==void 0&&(d.hostname=r),o!==void 0&&(d.body=o),new gt(d)},"buildHttpRpcRequest"),ur={"content-type":"application/x-www-form-urlencoded"},pr="2011-06-15",gr="Action",Ue="AccessKeyId",Vo="AssumeRole",Ve="AssumedRoleId",j="AssumedRoleUser",jo="AssumeRoleWithWebIdentity",je="Arn",ze="Audience",z="Credentials",Be="ContextAssertion",B="DurationSeconds",qe="Expiration",Ge="ExternalId",Ke="Key",q="Policy",G="PolicyArns",Xe="ProviderArn",Ye="ProvidedContexts",Je="ProviderId",K="PackedPolicySize",Ze="Provider",X="RoleArn",Y="RoleSessionName",Qe="SecretAccessKey",De="SubjectFromWebIdentityToken",O="SourceIdentity",et="SerialNumber",tt="SessionToken",nt="Tags",rt="TokenCode",ot="TransitiveTagKeys",hr="Version",st="Value",it="WebIdentityToken",ct="arn",E="message",mr=i(e=>Object.entries(e).map(([t,n])=>oe(t)+"="+oe(n)).join("&"),"buildFormUrlencodedString"),zo=i((e,t)=>{if(t.Error?.Code!==void 0)return t.Error.Code;if(e.statusCode==404)return"NotFound"},"loadQueryErrorCode");var J=class extends ce.classBuilder().ep(me).m(function(t,n,r,o){return[re(r,this.serialize,this.deserialize),ie(r,t.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,er).ser(rr).de(sr).build(){static{i(this,"AssumeRoleCommand")}};var Z=class extends ce.classBuilder().ep(me).m(function(t,n,r,o){return[re(r,this.serialize,this.deserialize),ie(r,t.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(tr,nr).ser(or).de(ir).build(){static{i(this,"AssumeRoleWithWebIdentityCommand")}};var Bo={AssumeRoleCommand:J,AssumeRoleWithWebIdentityCommand:Z},lt=class extends R{static{i(this,"STS")}};Nt(Bo,lt);var Er=i(e=>{if(typeof e?.Arn=="string"){let t=e.Arn.split(":");if(t.length>4&&t[4]!=="")return t[4]}},"getAccountIdFromAssumedRoleUser"),yr=i(async(e,t,n,r={})=>{let o=typeof e=="function"?await e():e,s=typeof t=="function"?await t():t,l=await Yn(r)();return n?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${o} (credential provider clientConfig)`,`${s} (contextual client)`,`${l} (STS default: AWS_REGION, profile region, or us-east-1)`),o??s??l},"resolveRegion"),Ir=i((e,t)=>{let n,r;return async(o,s)=>{if(r=o,!n){let{logger:f=e?.parentClientConfig?.logger,profile:p=e?.parentClientConfig?.profile,region:P,requestHandler:$=e?.parentClientConfig?.requestHandler,credentialProviderLogger:W,userAgentAppId:S=e?.parentClientConfig?.userAgentAppId}=e,Q=await yr(P,e?.parentClientConfig?.region,W,{logger:f,profile:p}),D=!Sr($);n=new t({...e,userAgentAppId:S,profile:p,credentialDefaultProvider:i(()=>async()=>r,"credentialDefaultProvider"),region:Q,requestHandler:D?$:void 0,logger:f})}let{Credentials:l,AssumedRoleUser:a}=await n.send(new J(s));if(!l||!l.AccessKeyId||!l.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${s.RoleArn}`);let c=Er(a),d={accessKeyId:l.AccessKeyId,secretAccessKey:l.SecretAccessKey,sessionToken:l.SessionToken,expiration:l.Expiration,...l.CredentialScope&&{credentialScope:l.CredentialScope},...c&&{accountId:c}};return le(d,"CREDENTIALS_STS_ASSUME_ROLE","i"),d}},"getDefaultRoleAssumer"),br=i((e,t)=>{let n;return async r=>{if(!n){let{logger:c=e?.parentClientConfig?.logger,profile:d=e?.parentClientConfig?.profile,region:f,requestHandler:p=e?.parentClientConfig?.requestHandler,credentialProviderLogger:P,userAgentAppId:$=e?.parentClientConfig?.userAgentAppId}=e,W=await yr(f,e?.parentClientConfig?.region,P,{logger:c,profile:d}),S=!Sr(p);n=new t({...e,userAgentAppId:$,profile:d,region:W,requestHandler:S?p:void 0,logger:c})}let{Credentials:o,AssumedRoleUser:s}=await n.send(new Z(r));if(!o||!o.AccessKeyId||!o.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${r.RoleArn}`);let l=Er(s),a={accessKeyId:o.AccessKeyId,secretAccessKey:o.SecretAccessKey,sessionToken:o.SessionToken,expiration:o.Expiration,...o.CredentialScope&&{credentialScope:o.CredentialScope},...l&&{accountId:l}};return l&&le(a,"RESOLVED_ACCOUNT_ID","T"),le(a,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),a}},"getDefaultRoleAssumerWithWebIdentity");var Sr=i(e=>e?.metadata?.handlerProtocol==="h2","isH2");var Ar=i((e,t)=>t?class extends e{static{i(this,"CustomizableSTSClient")}constructor(r){super(r);for(let o of t)this.middlewareStack.use(o)}}:e,"getCustomizableStsClientCtor"),qo=i((e={},t)=>Ir(e,Ar(R,t)),"getDefaultRoleAssumer"),Go=i((e={},t)=>br(e,Ar(R,t)),"getDefaultRoleAssumerWithWebIdentity"),tl=i(e=>t=>e({roleAssumer:qo(t),roleAssumerWithWebIdentity:Go(t),...t}),"decorateDefaultCredentialProvider");export{ce as $Command,J as AssumeRoleCommand,er as AssumeRoleResponseFilterSensitiveLog,Z as AssumeRoleWithWebIdentityCommand,tr as AssumeRoleWithWebIdentityRequestFilterSensitiveLog,nr as AssumeRoleWithWebIdentityResponseFilterSensitiveLog,Dn as CredentialsFilterSensitiveLog,Ee as ExpiredTokenException,Ce as IDPCommunicationErrorException,Se as IDPRejectedClaimException,Ae as InvalidIdentityTokenException,ye as MalformedPolicyDocumentException,Ie as PackedPolicyTooLargeException,be as RegionDisabledException,lt as STS,R as STSClient,N as STSServiceException,wt as __Client,tl as decorateDefaultCredentialProvider,qo as getDefaultRoleAssumer,Go as getDefaultRoleAssumerWithWebIdentity};
@@ -1 +0,0 @@
1
- import{a as tt,b as Tt}from"./chunk-MQK6VFZR.js";import{a as j}from"./chunk-TX6WXZHJ.js";import{b as de,c as nt,e as me,f as ut}from"./chunk-N756FM5W.js";import{$ as Rt,A as ct,B as at,F as lt,H as V,J as dt,M as mt,O as pt,P as ft,Q as gt,R as ht,S as St,T as Et,U as yt,V as At,W as Ct,X as Pt,Y as xt,Z as J,_ as X,aa as It,ba as _t,c as $e,ca as bt,d as ae,da as vt,e as Ue,ea as wt,f as Le,fa as Dt,g as ze,ga as Ht,h as q,ha as Ot,ia as kt,j as Ke,ja as Wt,ka as Nt,la as Ft,m as K,ma as $t,q as Qe,r as G,s as Ze,t as et,u as M,v as ot,w as _,x as rt,y as st,z as it}from"./chunk-FBFACBKZ.js";import{b as C,c as Fe}from"./chunk-HZYRJBRQ.js";import"./chunk-S3F2U5VR.js";import{c as qe,e as je,f as Me,g as Be,h as Ve,i as Je,m as Xe,o as u,q as le,t as Ye}from"./chunk-A2LPCJPF.js";import"./chunk-PECJ5CRS.js";import{d as Ge}from"./chunk-YBDDYGAW.js";import{a as B}from"./chunk-2LU65C2X.js";import"./chunk-TLDYRTHH.js";import{a as n}from"./chunk-Y6DVQ7FD.js";var Ut=n(async(e,o,t)=>({operation:$e(o).operation,region:await ae(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),"defaultSTSHttpAuthSchemeParametersProvider");function Ko(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:e.region},propertiesExtractor:n((o,t)=>({signingProperties:{config:o,context:t}}),"propertiesExtractor")}}n(Ko,"createAwsAuthSigv4HttpAuthOption");function jo(e){return{schemeId:"smithy.api#noAuth"}}n(jo,"createSmithyApiNoAuthHttpAuthOption");var Lt=n(e=>{let o=[];switch(e.operation){case"AssumeRoleWithWebIdentity":{o.push(jo(e));break}default:o.push(Ko(e))}return o},"defaultSTSHttpAuthSchemeProvider"),Go=n(e=>Object.assign(e,{stsClientCtor:x}),"resolveStsAuthConfig"),zt=n(e=>{let o=Go(e),t=mt(o);return Object.assign(t,{authSchemePreference:ae(e.authSchemePreference??[])})},"resolveHttpAuthSchemeConfig");var qt=n(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,useGlobalEndpoint:e.useGlobalEndpoint??!1,defaultSigningName:"sts"}),"resolveClientEndpointParameters"),Y={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var Zt="required",i="type";var l="argv";var b="booleanEquals",p="stringEquals",eo="sigv4";var to="us-east-1",d="endpoint",Kt="https://sts.{Region}.{PartitionResult#dnsSuffix}",P="tree",D="error",pe="getAttr",jt={[Zt]:!1,[i]:"string"},ue={[Zt]:!0,default:!1,[i]:"boolean"},oo={ref:"Endpoint"},Gt={fn:"isSet",[l]:[{ref:"Region"}]},f={ref:"Region"},Mt={fn:"aws.partition",[l]:[f],assign:"PartitionResult"},no={ref:"UseFIPS"},ro={ref:"UseDualStack"},g={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:eo,signingName:"sts",signingRegion:to}]},headers:{}},S={},Bt={conditions:[{fn:p,[l]:[f,"aws-global"]}],[d]:g,[i]:d},so={fn:b,[l]:[no,!0]},io={fn:b,[l]:[ro,!0]},Vt={fn:pe,[l]:[{ref:"PartitionResult"},"supportsFIPS"]},co={ref:"PartitionResult"},Jt={fn:b,[l]:[!0,{fn:pe,[l]:[co,"supportsDualStack"]}]},Xt=[{fn:"isSet",[l]:[oo]}],Yt=[so],Qt=[io],Mo={version:"1.0",parameters:{Region:jt,UseDualStack:ue,UseFIPS:ue,Endpoint:jt,UseGlobalEndpoint:ue},rules:[{conditions:[{fn:b,[l]:[{ref:"UseGlobalEndpoint"},!0]},{fn:"not",[l]:Xt},Gt,Mt,{fn:b,[l]:[no,!1]},{fn:b,[l]:[ro,!1]}],rules:[{conditions:[{fn:p,[l]:[f,"ap-northeast-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"ap-south-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"ap-southeast-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"ap-southeast-2"]}],endpoint:g,[i]:d},Bt,{conditions:[{fn:p,[l]:[f,"ca-central-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"eu-central-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"eu-north-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"eu-west-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"eu-west-2"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"eu-west-3"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"sa-east-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,to]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"us-east-2"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"us-west-1"]}],endpoint:g,[i]:d},{conditions:[{fn:p,[l]:[f,"us-west-2"]}],endpoint:g,[i]:d},{endpoint:{url:Kt,properties:{authSchemes:[{name:eo,signingName:"sts",signingRegion:"{Region}"}]},headers:S},[i]:d}],[i]:P},{conditions:Xt,rules:[{conditions:Yt,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[i]:D},{conditions:Qt,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[i]:D},{endpoint:{url:oo,properties:S,headers:S},[i]:d}],[i]:P},{conditions:[Gt],rules:[{conditions:[Mt],rules:[{conditions:[so,io],rules:[{conditions:[{fn:b,[l]:[!0,Vt]},Jt],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:S,headers:S},[i]:d}],[i]:P},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[i]:D}],[i]:P},{conditions:Yt,rules:[{conditions:[{fn:b,[l]:[Vt,!0]}],rules:[{conditions:[{fn:p,[l]:[{fn:pe,[l]:[co,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:S,headers:S},[i]:d},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:S,headers:S},[i]:d}],[i]:P},{error:"FIPS is enabled but this partition does not support FIPS",[i]:D}],[i]:P},{conditions:Qt,rules:[{conditions:[Jt],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:S,headers:S},[i]:d}],[i]:P},{error:"DualStack is enabled but this partition does not support DualStack",[i]:D}],[i]:P},Bt,{endpoint:{url:Kt,properties:S,headers:S},[i]:d}],[i]:P}],[i]:P},{error:"Invalid Configuration: Missing Region",[i]:D}]},ao=Mo;var Bo=new St({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),lo=n((e,o={})=>Bo.get(e,()=>yt(ao,{endpointParams:e,logger:o.logger})),"defaultEndpointResolver");Et.aws=At;var mo=n(e=>({apiVersion:"2011-06-15",base64Decoder:e?.base64Decoder??je,base64Encoder:e?.base64Encoder??Be,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??lo,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??Lt,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:n(o=>o.getIdentityProvider("aws.auth#sigv4"),"identityProvider"),signer:new V},{schemeId:"smithy.api#noAuth",identityProvider:n(o=>o.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),"identityProvider"),signer:new j}],logger:e?.logger??new at,serviceId:e?.serviceId??"STS",urlParser:e?.urlParser??Fe,utf8Decoder:e?.utf8Decoder??Ge,utf8Encoder:e?.utf8Encoder??Me}),"getRuntimeConfig");var uo=n(e=>{st(process.version);let o=Nt(e),t=n(()=>o().then(rt),"defaultConfigProvider"),r=mo(e);lt(process.version);let s={profile:e?.profile,logger:r.logger};return{...r,...e,runtime:"node",defaultsMode:o,authSchemePreference:e?.authSchemePreference??C(dt,s),bodyLengthChecker:e?.bodyLengthChecker??Wt,defaultUserAgentProvider:e?.defaultUserAgentProvider??Ht({serviceId:r.serviceId,clientVersion:Tt.version}),httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:n(a=>a.getIdentityProvider("aws.auth#sigv4")||(async c=>await e.credentialDefaultProvider(c?.__config||{})()),"identityProvider"),signer:new V},{schemeId:"smithy.api#noAuth",identityProvider:n(a=>a.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),"identityProvider"),signer:new j}],maxAttempts:e?.maxAttempts??C(bt,e),region:e?.region??C(J,{...X,...s}),requestHandler:Ve.create(e?.requestHandler??t),retryMode:e?.retryMode??C({...wt,default:n(async()=>(await t()).retryMode||_t,"default")},e),sha256:e?.sha256??kt.bind(null,"sha256"),streamCollector:e?.streamCollector??Je,useDualstackEndpoint:e?.useDualstackEndpoint??C(Pt,s),useFipsEndpoint:e?.useFipsEndpoint??C(xt,s),userAgentAppId:e?.userAgentAppId??C(Ot,s)}},"getRuntimeConfig");function po(e={}){return C({...J,async default(){return Vo.silence||console.warn("@aws-sdk - WARN - default STS region of us-east-1 used. See @aws-sdk/credential-providers README and set a region explicitly."),"us-east-1"}},{...X,...e})}n(po,"stsRegionDefaultResolver");var Vo={silence:!1};var fo=n(e=>{let o=e.httpAuthSchemes,t=e.httpAuthSchemeProvider,r=e.credentials;return{setHttpAuthScheme(s){let a=o.findIndex(c=>c.schemeId===s.schemeId);a===-1?o.push(s):o.splice(a,1,s)},httpAuthSchemes(){return o},setHttpAuthSchemeProvider(s){t=s},httpAuthSchemeProvider(){return t},setCredentials(s){r=s},credentials(){return r}}},"getHttpAuthExtensionConfiguration"),go=n(e=>({httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}),"resolveHttpAuthRuntimeConfig");var ho=n((e,o)=>{let t=Object.assign(Ft(e),it(e),Le(e),fo(e));return o.forEach(r=>r.configure(t)),Object.assign(e,$t(t),ct(t),ze(t),go(t))},"resolveRuntimeExtensions");var x=class extends et{static{n(this,"STSClient")}config;constructor(...[o]){let t=uo(o||{});super(t),this.initConfig=t;let r=qt(t),s=ht(r),a=vt(s),c=Rt(a),h=c,y=Ze(h),A=zt(y),w=ho(A,o?.extensions||[]);this.config=w,this.middlewareStack.use(Ct(this.config)),this.middlewareStack.use(Dt(this.config)),this.middlewareStack.use(It(this.config)),this.middlewareStack.use(pt(this.config)),this.middlewareStack.use(ft(this.config)),this.middlewareStack.use(gt(this.config)),this.middlewareStack.use(Ue(this.config,{httpAuthSchemeParametersProvider:Ut,identityProviderConfigProvider:n(async v=>new Qe({"aws.auth#sigv4":v.credentials}),"identityProviderConfigProvider")})),this.middlewareStack.use(Ke(this.config))}destroy(){super.destroy()}};var E=class e extends ot{static{n(this,"STSServiceException")}constructor(o){super(o),Object.setPrototypeOf(this,e.prototype)}};var So=n(e=>({...e,...e.SecretAccessKey&&{SecretAccessKey:de}}),"CredentialsFilterSensitiveLog"),Eo=n(e=>({...e,...e.Credentials&&{Credentials:So(e.Credentials)}}),"AssumeRoleResponseFilterSensitiveLog"),Q=class e extends E{static{n(this,"ExpiredTokenException")}name="ExpiredTokenException";$fault="client";constructor(o){super({name:"ExpiredTokenException",$fault:"client",...o}),Object.setPrototypeOf(this,e.prototype)}},Z=class e extends E{static{n(this,"MalformedPolicyDocumentException")}name="MalformedPolicyDocumentException";$fault="client";constructor(o){super({name:"MalformedPolicyDocumentException",$fault:"client",...o}),Object.setPrototypeOf(this,e.prototype)}},ee=class e extends E{static{n(this,"PackedPolicyTooLargeException")}name="PackedPolicyTooLargeException";$fault="client";constructor(o){super({name:"PackedPolicyTooLargeException",$fault:"client",...o}),Object.setPrototypeOf(this,e.prototype)}},te=class e extends E{static{n(this,"RegionDisabledException")}name="RegionDisabledException";$fault="client";constructor(o){super({name:"RegionDisabledException",$fault:"client",...o}),Object.setPrototypeOf(this,e.prototype)}},oe=class e extends E{static{n(this,"IDPRejectedClaimException")}name="IDPRejectedClaimException";$fault="client";constructor(o){super({name:"IDPRejectedClaimException",$fault:"client",...o}),Object.setPrototypeOf(this,e.prototype)}},ne=class e extends E{static{n(this,"InvalidIdentityTokenException")}name="InvalidIdentityTokenException";$fault="client";constructor(o){super({name:"InvalidIdentityTokenException",$fault:"client",...o}),Object.setPrototypeOf(this,e.prototype)}},yo=n(e=>({...e,...e.WebIdentityToken&&{WebIdentityToken:de}}),"AssumeRoleWithWebIdentityRequestFilterSensitiveLog"),Ao=n(e=>({...e,...e.Credentials&&{Credentials:So(e.Credentials)}}),"AssumeRoleWithWebIdentityResponseFilterSensitiveLog"),re=class e extends E{static{n(this,"IDPCommunicationErrorException")}name="IDPCommunicationErrorException";$fault="client";constructor(o){super({name:"IDPCommunicationErrorException",$fault:"client",...o}),Object.setPrototypeOf(this,e.prototype)}};var Co=n(async(e,o)=>{let t=Do,r;return r=ko({...on(e,o),[Ho]:Cn,[Oo]:To}),wo(o,t,"/",void 0,r)},"se_AssumeRoleCommand"),Po=n(async(e,o)=>{let t=Do,r;return r=ko({...nn(e,o),[Ho]:Pn,[Oo]:To}),wo(o,t,"/",void 0,r)},"se_AssumeRoleWithWebIdentityCommand"),xo=n(async(e,o)=>{if(e.statusCode>=300)return Io(e,o);let t=await me(e.body,o),r={};return r=mn(t.AssumeRoleResult,o),{$metadata:I(e),...r}},"de_AssumeRoleCommand"),Ro=n(async(e,o)=>{if(e.statusCode>=300)return Io(e,o);let t=await me(e.body,o),r={};return r=un(t.AssumeRoleWithWebIdentityResult,o),{$metadata:I(e),...r}},"de_AssumeRoleWithWebIdentityCommand"),Io=n(async(e,o)=>{let t={...e,body:await ut(e.body,o)},r=xn(e,t.body);switch(r){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await Jo(t,o);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await Zo(t,o);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await en(t,o);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await tn(t,o);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await Xo(t,o);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await Yo(t,o);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await Qo(t,o);default:let s=t.body;return An({output:e,parsedBody:s.Error,errorCode:r})}},"de_CommandError"),Jo=n(async(e,o)=>{let t=e.body,r=pn(t.Error,o),s=new Q({$metadata:I(e),...r});return _(s,t)},"de_ExpiredTokenExceptionRes"),Xo=n(async(e,o)=>{let t=e.body,r=fn(t.Error,o),s=new re({$metadata:I(e),...r});return _(s,t)},"de_IDPCommunicationErrorExceptionRes"),Yo=n(async(e,o)=>{let t=e.body,r=gn(t.Error,o),s=new oe({$metadata:I(e),...r});return _(s,t)},"de_IDPRejectedClaimExceptionRes"),Qo=n(async(e,o)=>{let t=e.body,r=hn(t.Error,o),s=new ne({$metadata:I(e),...r});return _(s,t)},"de_InvalidIdentityTokenExceptionRes"),Zo=n(async(e,o)=>{let t=e.body,r=Sn(t.Error,o),s=new Z({$metadata:I(e),...r});return _(s,t)},"de_MalformedPolicyDocumentExceptionRes"),en=n(async(e,o)=>{let t=e.body,r=En(t.Error,o),s=new ee({$metadata:I(e),...r});return _(s,t)},"de_PackedPolicyTooLargeExceptionRes"),tn=n(async(e,o)=>{let t=e.body,r=yn(t.Error,o),s=new te({$metadata:I(e),...r});return _(s,t)},"de_RegionDisabledExceptionRes"),on=n((e,o)=>{let t={};if(e[F]!=null&&(t[F]=e[F]),e[$]!=null&&(t[$]=e[$]),e[W]!=null){let r=_o(e[W],o);e[W]?.length===0&&(t.PolicyArns=[]),Object.entries(r).forEach(([s,a])=>{let c=`PolicyArns.${s}`;t[c]=a})}if(e[k]!=null&&(t[k]=e[k]),e[O]!=null&&(t[O]=e[O]),e[De]!=null){let r=dn(e[De],o);e[De]?.length===0&&(t.Tags=[]),Object.entries(r).forEach(([s,a])=>{let c=`Tags.${s}`;t[c]=a})}if(e[He]!=null){let r=ln(e[He],o);e[He]?.length===0&&(t.TransitiveTagKeys=[]),Object.entries(r).forEach(([s,a])=>{let c=`TransitiveTagKeys.${s}`;t[c]=a})}if(e[Ae]!=null&&(t[Ae]=e[Ae]),e[ve]!=null&&(t[ve]=e[ve]),e[Te]!=null&&(t[Te]=e[Te]),e[R]!=null&&(t[R]=e[R]),e[xe]!=null){let r=cn(e[xe],o);e[xe]?.length===0&&(t.ProvidedContexts=[]),Object.entries(r).forEach(([s,a])=>{let c=`ProvidedContexts.${s}`;t[c]=a})}return t},"se_AssumeRoleRequest"),nn=n((e,o)=>{let t={};if(e[F]!=null&&(t[F]=e[F]),e[$]!=null&&(t[$]=e[$]),e[ke]!=null&&(t[ke]=e[ke]),e[Re]!=null&&(t[Re]=e[Re]),e[W]!=null){let r=_o(e[W],o);e[W]?.length===0&&(t.PolicyArns=[]),Object.entries(r).forEach(([s,a])=>{let c=`PolicyArns.${s}`;t[c]=a})}return e[k]!=null&&(t[k]=e[k]),e[O]!=null&&(t[O]=e[O]),t},"se_AssumeRoleWithWebIdentityRequest"),_o=n((e,o)=>{let t={},r=1;for(let s of e){if(s===null)continue;let a=rn(s,o);Object.entries(a).forEach(([c,h])=>{t[`member.${r}.${c}`]=h}),r++}return t},"se_policyDescriptorListType"),rn=n((e,o)=>{let t={};return e[We]!=null&&(t[We]=e[We]),t},"se_PolicyDescriptorType"),sn=n((e,o)=>{let t={};return e[Pe]!=null&&(t[Pe]=e[Pe]),e[Ee]!=null&&(t[Ee]=e[Ee]),t},"se_ProvidedContext"),cn=n((e,o)=>{let t={},r=1;for(let s of e){if(s===null)continue;let a=sn(s,o);Object.entries(a).forEach(([c,h])=>{t[`member.${r}.${c}`]=h}),r++}return t},"se_ProvidedContextsListType"),an=n((e,o)=>{let t={};return e[Ce]!=null&&(t[Ce]=e[Ce]),e[Oe]!=null&&(t[Oe]=e[Oe]),t},"se_Tag"),ln=n((e,o)=>{let t={},r=1;for(let s of e)s!==null&&(t[`member.${r}`]=s,r++);return t},"se_tagKeyListType"),dn=n((e,o)=>{let t={},r=1;for(let s of e){if(s===null)continue;let a=an(s,o);Object.entries(a).forEach(([c,h])=>{t[`member.${r}.${c}`]=h}),r++}return t},"se_tagListType"),bo=n((e,o)=>{let t={};return e[ge]!=null&&(t[ge]=u(e[ge])),e[he]!=null&&(t[he]=u(e[he])),t},"de_AssumedRoleUser"),mn=n((e,o)=>{let t={};return e[H]!=null&&(t[H]=vo(e[H],o)),e[T]!=null&&(t[T]=bo(e[T],o)),e[N]!=null&&(t[N]=le(e[N])),e[R]!=null&&(t[R]=u(e[R])),t},"de_AssumeRoleResponse"),un=n((e,o)=>{let t={};return e[H]!=null&&(t[H]=vo(e[H],o)),e[be]!=null&&(t[be]=u(e[be])),e[T]!=null&&(t[T]=bo(e[T],o)),e[N]!=null&&(t[N]=le(e[N])),e[Ie]!=null&&(t[Ie]=u(e[Ie])),e[Se]!=null&&(t[Se]=u(e[Se])),e[R]!=null&&(t[R]=u(e[R])),t},"de_AssumeRoleWithWebIdentityResponse"),vo=n((e,o)=>{let t={};return e[fe]!=null&&(t[fe]=u(e[fe])),e[_e]!=null&&(t[_e]=u(e[_e])),e[we]!=null&&(t[we]=u(e[we])),e[ye]!=null&&(t[ye]=Xe(Ye(e[ye]))),t},"de_Credentials"),pn=n((e,o)=>{let t={};return e[m]!=null&&(t[m]=u(e[m])),t},"de_ExpiredTokenException"),fn=n((e,o)=>{let t={};return e[m]!=null&&(t[m]=u(e[m])),t},"de_IDPCommunicationErrorException"),gn=n((e,o)=>{let t={};return e[m]!=null&&(t[m]=u(e[m])),t},"de_IDPRejectedClaimException"),hn=n((e,o)=>{let t={};return e[m]!=null&&(t[m]=u(e[m])),t},"de_InvalidIdentityTokenException"),Sn=n((e,o)=>{let t={};return e[m]!=null&&(t[m]=u(e[m])),t},"de_MalformedPolicyDocumentException"),En=n((e,o)=>{let t={};return e[m]!=null&&(t[m]=u(e[m])),t},"de_PackedPolicyTooLargeException"),yn=n((e,o)=>{let t={};return e[m]!=null&&(t[m]=u(e[m])),t},"de_RegionDisabledException"),I=n(e=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]}),"deserializeMetadata");var An=nt(E),wo=n(async(e,o,t,r,s)=>{let{hostname:a,protocol:c="https",port:h,path:y}=await e.endpoint(),A={protocol:c,hostname:a,port:h,method:"POST",path:y.endsWith("/")?y.slice(0,-1)+t:y+t,headers:o};return r!==void 0&&(A.hostname=r),s!==void 0&&(A.body=s),new qe(A)},"buildHttpRpcRequest"),Do={"content-type":"application/x-www-form-urlencoded"},To="2011-06-15",Ho="Action",fe="AccessKeyId",Cn="AssumeRole",ge="AssumedRoleId",T="AssumedRoleUser",Pn="AssumeRoleWithWebIdentity",he="Arn",Se="Audience",H="Credentials",Ee="ContextAssertion",O="DurationSeconds",ye="Expiration",Ae="ExternalId",Ce="Key",k="Policy",W="PolicyArns",Pe="ProviderArn",xe="ProvidedContexts",Re="ProviderId",N="PackedPolicySize",Ie="Provider",F="RoleArn",$="RoleSessionName",_e="SecretAccessKey",be="SubjectFromWebIdentityToken",R="SourceIdentity",ve="SerialNumber",we="SessionToken",De="Tags",Te="TokenCode",He="TransitiveTagKeys",Oo="Version",Oe="Value",ke="WebIdentityToken",We="arn",m="message",ko=n(e=>Object.entries(e).map(([o,t])=>K(o)+"="+K(t)).join("&"),"buildFormUrlencodedString"),xn=n((e,o)=>{if(o.Error?.Code!==void 0)return o.Error.Code;if(e.statusCode==404)return"NotFound"},"loadQueryErrorCode");var U=class extends M.classBuilder().ep(Y).m(function(o,t,r,s){return[q(r,this.serialize,this.deserialize),G(r,o.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,Eo).ser(Co).de(xo).build(){static{n(this,"AssumeRoleCommand")}};var L=class extends M.classBuilder().ep(Y).m(function(o,t,r,s){return[q(r,this.serialize,this.deserialize),G(r,o.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(yo,Ao).ser(Po).de(Ro).build(){static{n(this,"AssumeRoleWithWebIdentityCommand")}};var Rn={AssumeRoleCommand:U,AssumeRoleWithWebIdentityCommand:L},Ne=class extends x{static{n(this,"STS")}};tt(Rn,Ne);var Wo=n(e=>{if(typeof e?.Arn=="string"){let o=e.Arn.split(":");if(o.length>4&&o[4]!=="")return o[4]}},"getAccountIdFromAssumedRoleUser"),No=n(async(e,o,t,r={})=>{let s=typeof e=="function"?await e():e,a=typeof o=="function"?await o():o,c=await po(r)();return t?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${s} (credential provider clientConfig)`,`${a} (contextual client)`,`${c} (STS default: AWS_REGION, profile region, or us-east-1)`),s??a??c},"resolveRegion"),Fo=n((e,o)=>{let t,r;return async(s,a)=>{if(r=s,!t){let{logger:w=e?.parentClientConfig?.logger,profile:v=e?.parentClientConfig?.profile,region:se,requestHandler:z=e?.parentClientConfig?.requestHandler,credentialProviderLogger:ie,userAgentAppId:ce=e?.parentClientConfig?.userAgentAppId}=e,zo=await No(se,e?.parentClientConfig?.region,ie,{logger:w,profile:v}),qo=!Uo(z);t=new o({...e,userAgentAppId:ce,profile:v,credentialDefaultProvider:n(()=>async()=>r,"credentialDefaultProvider"),region:zo,requestHandler:qo?z:void 0,logger:w})}let{Credentials:c,AssumedRoleUser:h}=await t.send(new U(a));if(!c||!c.AccessKeyId||!c.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${a.RoleArn}`);let y=Wo(h),A={accessKeyId:c.AccessKeyId,secretAccessKey:c.SecretAccessKey,sessionToken:c.SessionToken,expiration:c.Expiration,...c.CredentialScope&&{credentialScope:c.CredentialScope},...y&&{accountId:y}};return B(A,"CREDENTIALS_STS_ASSUME_ROLE","i"),A}},"getDefaultRoleAssumer"),$o=n((e,o)=>{let t;return async r=>{if(!t){let{logger:y=e?.parentClientConfig?.logger,profile:A=e?.parentClientConfig?.profile,region:w,requestHandler:v=e?.parentClientConfig?.requestHandler,credentialProviderLogger:se,userAgentAppId:z=e?.parentClientConfig?.userAgentAppId}=e,ie=await No(w,e?.parentClientConfig?.region,se,{logger:y,profile:A}),ce=!Uo(v);t=new o({...e,userAgentAppId:z,profile:A,region:ie,requestHandler:ce?v:void 0,logger:y})}let{Credentials:s,AssumedRoleUser:a}=await t.send(new L(r));if(!s||!s.AccessKeyId||!s.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${r.RoleArn}`);let c=Wo(a),h={accessKeyId:s.AccessKeyId,secretAccessKey:s.SecretAccessKey,sessionToken:s.SessionToken,expiration:s.Expiration,...s.CredentialScope&&{credentialScope:s.CredentialScope},...c&&{accountId:c}};return c&&B(h,"RESOLVED_ACCOUNT_ID","T"),B(h,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),h}},"getDefaultRoleAssumerWithWebIdentity");var Uo=n(e=>e?.metadata?.handlerProtocol==="h2","isH2");var Lo=n((e,o)=>o?class extends e{static{n(this,"CustomizableSTSClient")}constructor(r){super(r);for(let s of o)this.middlewareStack.use(s)}}:e,"getCustomizableStsClientCtor"),In=n((e={},o)=>Fo(e,Lo(x,o)),"getDefaultRoleAssumer"),_n=n((e={},o)=>$o(e,Lo(x,o)),"getDefaultRoleAssumerWithWebIdentity"),Ns=n(e=>o=>e({roleAssumer:In(o),roleAssumerWithWebIdentity:_n(o),...o}),"decorateDefaultCredentialProvider");export{M as $Command,U as AssumeRoleCommand,Eo as AssumeRoleResponseFilterSensitiveLog,L as AssumeRoleWithWebIdentityCommand,yo as AssumeRoleWithWebIdentityRequestFilterSensitiveLog,Ao as AssumeRoleWithWebIdentityResponseFilterSensitiveLog,So as CredentialsFilterSensitiveLog,Q as ExpiredTokenException,re as IDPCommunicationErrorException,oe as IDPRejectedClaimException,ne as InvalidIdentityTokenException,Z as MalformedPolicyDocumentException,ee as PackedPolicyTooLargeException,te as RegionDisabledException,Ne as STS,x as STSClient,E as STSServiceException,et as __Client,Ns as decorateDefaultCredentialProvider,In as getDefaultRoleAssumer,_n as getDefaultRoleAssumerWithWebIdentity};