coze-coding-dev-sdk 0.7.18 → 0.7.19-beta.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/dist/cjs/0~195.js +1 -1
  2. package/dist/cjs/0~216.js +1 -1
  3. package/dist/cjs/0~292.js +1 -1
  4. package/dist/cjs/0~329.js +2 -2
  5. package/dist/cjs/0~53.js +1 -1
  6. package/dist/cjs/0~560.js +2 -2
  7. package/dist/cjs/0~634.js +3 -3
  8. package/dist/cjs/0~710.js +2 -2
  9. package/dist/cjs/0~730.js +1 -1
  10. package/dist/cjs/0~769.js +1 -1
  11. package/dist/cjs/0~864.js +1 -1
  12. package/dist/cjs/0~911.js +1 -1
  13. package/dist/cjs/0~965.js +1 -1
  14. package/dist/cjs/cli/index.js +85 -40
  15. package/dist/cjs/index.js +47 -35
  16. package/dist/esm/131.mjs +38 -26
  17. package/dist/esm/1~113.mjs +1 -1
  18. package/dist/esm/1~23.mjs +1 -1
  19. package/dist/esm/1~300.mjs +1 -1
  20. package/dist/esm/1~35.mjs +3 -3
  21. package/dist/esm/1~390.mjs +2 -2
  22. package/dist/esm/1~398.mjs +2 -2
  23. package/dist/esm/1~410.mjs +1 -1
  24. package/dist/esm/1~45.mjs +1 -1
  25. package/dist/esm/1~462.mjs +1 -1
  26. package/dist/esm/1~518.mjs +1 -1
  27. package/dist/esm/1~622.mjs +1 -1
  28. package/dist/esm/1~844.mjs +1 -1
  29. package/dist/esm/1~967.mjs +1 -1
  30. package/dist/esm/687.mjs +1 -0
  31. package/dist/esm/cli/index.mjs +28 -24
  32. package/dist/esm/index.mjs +1 -1
  33. package/dist/esm/rslib-runtime.mjs +1 -1
  34. package/dist/types/cli/commands/storage.d.ts +6 -0
  35. package/dist/types/cli/commands/storage.d.ts.map +1 -0
  36. package/dist/types/image/client.d.ts +0 -1
  37. package/dist/types/image/client.d.ts.map +1 -1
  38. package/dist/types/image/models.d.ts +2 -1
  39. package/dist/types/image/models.d.ts.map +1 -1
  40. package/dist/types/index.d.ts +1 -0
  41. package/dist/types/index.d.ts.map +1 -1
  42. package/dist/types/report/buffer.d.ts +19 -0
  43. package/dist/types/report/buffer.d.ts.map +1 -0
  44. package/dist/types/report/client.d.ts +9 -0
  45. package/dist/types/report/client.d.ts.map +1 -0
  46. package/dist/types/report/index.d.ts +8 -0
  47. package/dist/types/report/index.d.ts.map +1 -0
  48. package/dist/types/report/interceptors/fetch-wrapper.d.ts +3 -0
  49. package/dist/types/report/interceptors/fetch-wrapper.d.ts.map +1 -0
  50. package/dist/types/report/interceptors/s3-middleware.d.ts +10 -0
  51. package/dist/types/report/interceptors/s3-middleware.d.ts.map +1 -0
  52. package/dist/types/report/models.d.ts +15 -0
  53. package/dist/types/report/models.d.ts.map +1 -0
  54. package/dist/types/report/singleton.d.ts +3 -0
  55. package/dist/types/report/singleton.d.ts.map +1 -0
  56. package/dist/types/report/utils.d.ts +3 -0
  57. package/dist/types/report/utils.d.ts.map +1 -0
  58. package/dist/types/s3/client.d.ts +1 -0
  59. package/dist/types/s3/client.d.ts.map +1 -1
  60. package/package.json +4 -2
package/dist/cjs/0~730.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["730"],exports.modules={"./node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js"(e,s,i){i.d(s,{fromTokenFile:()=>l});var t=i("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),r=i("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=i("fs");let d="AWS_WEB_IDENTITY_TOKEN_FILE",l=(e={})=>async s=>{let l;e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");let a=e?.webIdentityTokenFile??process.env[d],c=e?.roleArn??process.env.AWS_ROLE_ARN,m=e?.roleSessionName??process.env.AWS_ROLE_SESSION_NAME;if(!a||!c)throw new r.C("Web identity configuration not specified",{logger:e.logger});let u=await (l={...e,webIdentityToken:o.Z?.getTokenRecord?.()[a]??(0,n.readFileSync)(a,{encoding:"ascii"}),roleArn:c,roleSessionName:m},async e=>{l.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");let{roleArn:s,roleSessionName:t,webIdentityToken:r,providerId:o,policyArns:n,policy:d,durationSeconds:a}=l,{roleAssumerWithWebIdentity:c}=l;if(!c){let{getDefaultRoleAssumerWithWebIdentity:s}=await i.e("216").then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"));c=s({...l.clientConfig,credentialProviderLogger:l.logger,parentClientConfig:{...e?.callerClientConfig,...l.parentClientConfig}},l.clientPlugins)}return c({RoleArn:s,RoleSessionName:t??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:r,ProviderId:o,PolicyArns:n,Policy:d,DurationSeconds:a})})(s);return a===process.env[d]&&(0,t.g)(u,"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN","h"),u}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,s,i){i.d(s,{Z:()=>o});var t=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let o={getFileRecord:()=>r.Jj,interceptFile(e,s){r.Jj[e]=Promise.resolve(s)},getTokenRecord:()=>t.a,interceptToken(e,s){t.a[e]=s}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,s,i){i.d(s,{C:()=>n});var t=i("crypto"),r=i("path"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let n=e=>{let s=(0,t.createHash)("sha1").update(e).digest("hex");return(0,r.join)((0,o.R)(),".aws","sso","cache",`${s}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,s,i){i.d(s,{a:()=>o,v:()=>n});var t=i("fs/promises"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let o={},n=async e=>{if(o[e])return o[e];let s=(0,r.C)(e);return JSON.parse(await (0,t.readFile)(s,"utf8"))}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["730"],exports.modules={"./node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js"(e,i,s){s.d(i,{fromTokenFile:()=>fromTokenFile});var t=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),r=s("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=s("fs");let d="AWS_WEB_IDENTITY_TOKEN_FILE",fromTokenFile=(e={})=>async i=>{let l;e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");let a=e?.webIdentityTokenFile??process.env[d],c=e?.roleArn??process.env.AWS_ROLE_ARN,m=e?.roleSessionName??process.env.AWS_ROLE_SESSION_NAME;if(!a||!c)throw new r.C("Web identity configuration not specified",{logger:e.logger});let u=await (l={...e,webIdentityToken:o.Z?.getTokenRecord?.()[a]??(0,n.readFileSync)(a,{encoding:"ascii"}),roleArn:c,roleSessionName:m},async e=>{l.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");let{roleArn:i,roleSessionName:t,webIdentityToken:r,providerId:o,policyArns:n,policy:d,durationSeconds:a}=l,{roleAssumerWithWebIdentity:c}=l;if(!c){let{getDefaultRoleAssumerWithWebIdentity:i}=await s.e("216").then(s.bind(s,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"));c=i({...l.clientConfig,credentialProviderLogger:l.logger,parentClientConfig:{...e?.callerClientConfig,...l.parentClientConfig}},l.clientPlugins)}return c({RoleArn:i,RoleSessionName:t??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:r,ProviderId:o,PolicyArns:n,Policy:d,DurationSeconds:a})})(i);return a===process.env[d]&&(0,t.g)(u,"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN","h"),u}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,i,s){s.d(i,{Z:()=>o});var t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),r=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let o={getFileRecord:()=>r.Jj,interceptFile(e,i){r.Jj[e]=Promise.resolve(i)},getTokenRecord:()=>t.a,interceptToken(e,i){t.a[e]=i}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,i,s){s.d(i,{C:()=>getSSOTokenFilepath});var t=s("crypto"),r=s("path"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let getSSOTokenFilepath=e=>{let i=(0,t.createHash)("sha1").update(e).digest("hex");return(0,r.join)((0,o.R)(),".aws","sso","cache",`${i}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,i,s){s.d(i,{a:()=>o,v:()=>getSSOTokenFromFile});var t=s("fs/promises"),r=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let o={},getSSOTokenFromFile=async e=>{if(o[e])return o[e];let i=(0,r.C)(e);return JSON.parse(await (0,t.readFile)(i,"utf8"))}}};
package/dist/cjs/0~769.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["769"],exports.modules={"./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"(e,t,s){s.d(t,{Y:()=>C});var r=s("./node_modules/@smithy/core/dist-es/submodules/protocols/HttpBindingProtocol.js"),i=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/HttpInterceptingShapeSerializer.js"),o=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/HttpInterceptingShapeDeserializer.js"),n=s("./node_modules/@smithy/core/dist-es/submodules/schema/schemas/NormalizedSchema.js"),a=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),c=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ProtocolLib.js"),u=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ConfigurableSerdeContext.js"),l=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/determineTimestampFormat.js"),d=s("./node_modules/@smithy/core/dist-es/submodules/serde/lazy-json.js"),h=s("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),m=s("./node_modules/@smithy/core/dist-es/submodules/serde/value/NumericValue.js"),f=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),p=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/structIterator.js"),g=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/UnionSerde.js");function y(e,t,s){if(s?.source){let e=s.source;if("number"==typeof t&&(t>Number.MAX_SAFE_INTEGER||t<Number.MIN_SAFE_INTEGER||e!==String(t)))return e.includes(".")?new m.D(e,"bigDecimal"):BigInt(e)}return t}var S=s("./node_modules/@smithy/core/dist-es/submodules/protocols/collect-stream-body.js"),b=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js");class w extends u.B{settings;constructor(e){super(),this.settings=e}async read(e,t){var s;return this._read(e,"string"==typeof t?JSON.parse(t,y):await (s=this.serdeContext,(0,S.P)(t,s).then(e=>(s?.utf8Encoder??b.P)(e))).then(e=>{if(e.length)try{return JSON.parse(e)}catch(t){throw t?.name==="SyntaxError"&&Object.defineProperty(t,"$responseBodyText",{value:e}),t}return{}}))}readObject(e,t){return this._read(e,t)}_read(e,t){let s=null!==t&&"object"==typeof t,r=n.l.of(e);if(s){if(r.isStructSchema()){let e,s=r.isUnionSchema(),i={};for(let[o,n]of(s&&(e=new g.F(t,i)),(0,p.G)(r,t,!!this.settings.jsonName&&"jsonName"))){let r=this.settings.jsonName?n.getMergedTraits().jsonName??o:o;s&&e.mark(r),null!=t[r]&&(i[o]=this._read(n,t[r]))}return s&&e.writeUnknown(),i}if(Array.isArray(t)&&r.isListSchema()){let e=r.getValueSchema(),s=[],i=!!r.getMergedTraits().sparse;for(let r of t)(i||null!=r)&&s.push(this._read(e,r));return s}if(r.isMapSchema()){let e=r.getValueSchema(),s={},i=!!r.getMergedTraits().sparse;for(let[r,o]of Object.entries(t))(i||null!=o)&&(s[r]=this._read(e,o));return s}}if(r.isBlobSchema()&&"string"==typeof t)return(0,f.E)(t);let i=r.getMergedTraits().mediaType;if(r.isStringSchema()&&"string"==typeof t&&i)return"application/json"===i||i.endsWith("+json")?d.A.from(t):t;if(r.isTimestampSchema()&&null!=t)switch((0,l.V)(r,this.settings)){case 5:return(0,h.t_)(t);case 6:return(0,h.xE)(t);case 7:return(0,h.l3)(t);default:return console.warn("Missing timestamp format, parsing value with Date constructor:",t),new Date(t)}if(r.isBigIntegerSchema()&&("number"==typeof t||"string"==typeof t))return BigInt(t);if(r.isBigDecimalSchema()&&void 0!=t)return t instanceof m.D?t:"bigDecimal"===t.type&&"string"in t?new m.D(t.string,t.type):new m.D(String(t),"bigDecimal");if(r.isNumericSchema()&&"string"==typeof t){switch(t){case"Infinity":return 1/0;case"-Infinity":return-1/0;case"NaN":return NaN}return t}if(r.isDocumentSchema())if(!s)return structuredClone(t);else{let e=Array.isArray(t)?[]:{};for(let[s,i]of Object.entries(t))i instanceof m.D?e[s]=i:e[s]=this._read(r,i);return e}return t}}var _=s("./node_modules/@smithy/uuid/dist-es/v4.js"),j=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js");let x=String.fromCharCode(925);class D{values=new Map;counter=0;stage=0;createReplacer(){if(1===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer already created.");if(2===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer exhausted.");return this.stage=1,(e,t)=>{if(t instanceof m.D){let e=`${x+"nv"+this.counter++}_`+t.string;return this.values.set(`"${e}"`,t.string),e}if("bigint"==typeof t){let e=t.toString(),s=`${x+"b"+this.counter++}_`+e;return this.values.set(`"${s}"`,e),s}return t}}replaceInJson(e){if(0===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer not created yet.");if(2===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer exhausted.");if(this.stage=2,0===this.counter)return e;for(let[t,s]of this.values)e=e.replace(t,s);return e}}class N extends u.B{settings;buffer;useReplacer=!1;rootSchema;constructor(e){super(),this.settings=e}write(e,t){this.rootSchema=n.l.of(e),this.buffer=this._write(this.rootSchema,t)}writeDiscriminatedDocument(e,t){this.write(e,t),"object"==typeof this.buffer&&(this.buffer.__type=n.l.of(e).getName(!0))}flush(){let{rootSchema:e,useReplacer:t}=this;if(this.rootSchema=void 0,this.useReplacer=!1,e?.isStructSchema()||e?.isDocumentSchema()){if(!t)return JSON.stringify(this.buffer);let e=new D;return e.replaceInJson(JSON.stringify(this.buffer,e.createReplacer(),0))}return this.buffer}_write(e,t,s){let r=null!==t&&"object"==typeof t,i=n.l.of(e);if(r){if(i.isStructSchema()){let e={};for(let[s,r]of(0,p.R)(i,t)){let o=this._write(r,t[s],i);if(void 0!==o){let t=r.getMergedTraits().jsonName;e[this.settings.jsonName?t??s:s]=o}}if(i.isUnionSchema()&&0===Object.keys(e).length){let{$unknown:s}=t;if(Array.isArray(s)){let[t,r]=s;e[t]=this._write(15,r)}}return e}if(Array.isArray(t)&&i.isListSchema()){let e=i.getValueSchema(),s=[],r=!!i.getMergedTraits().sparse;for(let i of t)(r||null!=i)&&s.push(this._write(e,i));return s}if(i.isMapSchema()){let e=i.getValueSchema(),s={},r=!!i.getMergedTraits().sparse;for(let[i,o]of Object.entries(t))(r||null!=o)&&(s[i]=this._write(e,o));return s}if(t instanceof Uint8Array&&(i.isBlobSchema()||i.isDocumentSchema()))return i===this.rootSchema?t:(this.serdeContext?.base64Encoder??j.n)(t);if(t instanceof Date&&(i.isTimestampSchema()||i.isDocumentSchema()))switch((0,l.V)(i,this.settings)){case 5:return t.toISOString().replace(".000Z","Z");case 6:return(0,h.JV)(t);case 7:return t.getTime()/1e3;default:return console.warn("Missing timestamp format, using epoch seconds",t),t.getTime()/1e3}t instanceof m.D&&(this.useReplacer=!0)}if(!(null===t&&s?.isStructSchema())){if(i.isStringSchema()){if(void 0===t&&i.isIdempotencyToken())return(0,_.v4)();let e=i.getMergedTraits().mediaType;return null!=t&&e&&("application/json"===e||e.endsWith("+json"))?d.A.from(t):t}if("number"==typeof t&&i.isNumericSchema())return Math.abs(t)===1/0||isNaN(t)?String(t):t;if("string"==typeof t&&i.isBlobSchema())return i===this.rootSchema?t:(this.serdeContext?.base64Encoder??j.n)(t);if("bigint"==typeof t&&(this.useReplacer=!0),i.isDocumentSchema())if(!r)return structuredClone(t);else{let e=Array.isArray(t)?[]:{};for(let[s,r]of Object.entries(t))r instanceof m.D?(this.useReplacer=!0,e[s]=r):e[s]=this._write(i,r);return e}return t}}}class T extends u.B{settings;constructor(e){super(),this.settings=e}createSerializer(){let e=new N(this.settings);return e.setSerdeContext(this.serdeContext),e}createDeserializer(){let e=new w(this.settings);return e.setSerdeContext(this.serdeContext),e}}class C extends r.s{serializer;deserializer;codec;mixin=new c.U;constructor({defaultNamespace:e}){super({defaultNamespace:e});const t={timestampFormat:{useTrait:!0,default:7},httpBindings:!0,jsonName:!0};this.codec=new T(t),this.serializer=new i._(this.codec.createSerializer(),t),this.deserializer=new o.z(this.codec.createDeserializer(),t)}getShapeId(){return"aws.protocols#restJson1"}getPayloadCodec(){return this.codec}setSerdeContext(e){this.codec.setSerdeContext(e),super.setSerdeContext(e)}async serializeRequest(e,t,s){let r=await super.serializeRequest(e,t,s),i=n.l.of(e.input);if(!r.headers["content-type"]){let e=this.mixin.resolveRestContentType(this.getDefaultContentType(),i);e&&(r.headers["content-type"]=e)}return null==r.body&&r.headers["content-type"]===this.getDefaultContentType()&&(r.body="{}"),r}async deserializeResponse(e,t,s){let r=await super.deserializeResponse(e,t,s);for(let[t,s]of n.l.of(e.output).structIterator())!s.getMemberTraits().httpPayload||t in r||(r[t]=null);return r}async handleError(e,t,s,r,i){let o=((e,t)=>{let s=(e,t)=>Object.keys(e).find(e=>e.toLowerCase()===t.toLowerCase()),r=e=>{let t=e;return"number"==typeof t&&(t=t.toString()),t.indexOf(",")>=0&&(t=t.split(",")[0]),t.indexOf(":")>=0&&(t=t.split(":")[0]),t.indexOf("#")>=0&&(t=t.split("#")[1]),t},i=s(e.headers,"x-amzn-errortype");if(void 0!==i)return r(e.headers[i]);if(t&&"object"==typeof t){let e=s(t,"code");if(e&&void 0!==t[e])return r(t[e]);if(void 0!==t.__type)return r(t.__type)}})(s,r)??"Unknown",{errorSchema:c,errorMetadata:u}=await this.mixin.getErrorSchemaOrThrowBaseException(o,this.options.defaultNamespace,s,r,i),l=n.l.of(c),d=r.message??r.Message??"Unknown",h=new(a.O.for(c[1]).getErrorCtor(c)??Error)(d);await this.deserializeHttpMessage(c,t,s,r);let m={};for(let[e,t]of l.structIterator()){let s=t.getMergedTraits().jsonName??e;m[e]=this.codec.createDeserializer().readObject(t,r[s])}throw this.mixin.decorateServiceException(Object.assign(h,u,{$fault:l.getMergedTraits().error,message:d},m),r)}getDefaultContentType(){return"application/json"}}},"./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"(e,t,s){s.d(t,{m:()=>r});class r{async sign(e,t,s){return e}}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["769"],exports.modules={"./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"(e,t,s){s.d(t,{Y:()=>T});var r=s("./node_modules/@smithy/core/dist-es/submodules/protocols/HttpBindingProtocol.js"),i=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/HttpInterceptingShapeSerializer.js"),o=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/HttpInterceptingShapeDeserializer.js"),n=s("./node_modules/@smithy/core/dist-es/submodules/schema/schemas/NormalizedSchema.js"),a=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),c=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ProtocolLib.js"),u=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ConfigurableSerdeContext.js"),l=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/determineTimestampFormat.js"),d=s("./node_modules/@smithy/core/dist-es/submodules/serde/lazy-json.js"),h=s("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),m=s("./node_modules/@smithy/core/dist-es/submodules/serde/value/NumericValue.js"),f=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),p=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/structIterator.js"),g=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/UnionSerde.js");function jsonReviver(e,t,s){if(s?.source){let e=s.source;if("number"==typeof t&&(t>Number.MAX_SAFE_INTEGER||t<Number.MIN_SAFE_INTEGER||e!==String(t)))return e.includes(".")?new m.D(e,"bigDecimal"):BigInt(e)}return t}var y=s("./node_modules/@smithy/core/dist-es/submodules/protocols/collect-stream-body.js"),S=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js");class b extends u.B{settings;constructor(e){super(),this.settings=e}async read(e,t){var s;return this._read(e,"string"==typeof t?JSON.parse(t,jsonReviver):await (s=this.serdeContext,(0,y.P)(t,s).then(e=>(s?.utf8Encoder??S.P)(e))).then(e=>{if(e.length)try{return JSON.parse(e)}catch(t){throw t?.name==="SyntaxError"&&Object.defineProperty(t,"$responseBodyText",{value:e}),t}return{}}))}readObject(e,t){return this._read(e,t)}_read(e,t){let s=null!==t&&"object"==typeof t,r=n.l.of(e);if(s){if(r.isStructSchema()){let e,s=r.isUnionSchema(),i={};for(let[o,n]of(s&&(e=new g.F(t,i)),(0,p.G)(r,t,!!this.settings.jsonName&&"jsonName"))){let r=this.settings.jsonName?n.getMergedTraits().jsonName??o:o;s&&e.mark(r),null!=t[r]&&(i[o]=this._read(n,t[r]))}return s&&e.writeUnknown(),i}if(Array.isArray(t)&&r.isListSchema()){let e=r.getValueSchema(),s=[],i=!!r.getMergedTraits().sparse;for(let r of t)(i||null!=r)&&s.push(this._read(e,r));return s}if(r.isMapSchema()){let e=r.getValueSchema(),s={},i=!!r.getMergedTraits().sparse;for(let[r,o]of Object.entries(t))(i||null!=o)&&(s[r]=this._read(e,o));return s}}if(r.isBlobSchema()&&"string"==typeof t)return(0,f.E)(t);let i=r.getMergedTraits().mediaType;if(r.isStringSchema()&&"string"==typeof t&&i)return"application/json"===i||i.endsWith("+json")?d.A.from(t):t;if(r.isTimestampSchema()&&null!=t)switch((0,l.V)(r,this.settings)){case 5:return(0,h.t_)(t);case 6:return(0,h.xE)(t);case 7:return(0,h.l3)(t);default:return console.warn("Missing timestamp format, parsing value with Date constructor:",t),new Date(t)}if(r.isBigIntegerSchema()&&("number"==typeof t||"string"==typeof t))return BigInt(t);if(r.isBigDecimalSchema()&&void 0!=t)return t instanceof m.D?t:"bigDecimal"===t.type&&"string"in t?new m.D(t.string,t.type):new m.D(String(t),"bigDecimal");if(r.isNumericSchema()&&"string"==typeof t){switch(t){case"Infinity":return 1/0;case"-Infinity":return-1/0;case"NaN":return NaN}return t}if(r.isDocumentSchema())if(!s)return structuredClone(t);else{let e=Array.isArray(t)?[]:{};for(let[s,i]of Object.entries(t))i instanceof m.D?e[s]=i:e[s]=this._read(r,i);return e}return t}}var w=s("./node_modules/@smithy/uuid/dist-es/v4.js"),_=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js");let j=String.fromCharCode(925);class x{values=new Map;counter=0;stage=0;createReplacer(){if(1===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer already created.");if(2===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer exhausted.");return this.stage=1,(e,t)=>{if(t instanceof m.D){let e=`${j+"nv"+this.counter++}_`+t.string;return this.values.set(`"${e}"`,t.string),e}if("bigint"==typeof t){let e=t.toString(),s=`${j+"b"+this.counter++}_`+e;return this.values.set(`"${s}"`,e),s}return t}}replaceInJson(e){if(0===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer not created yet.");if(2===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer exhausted.");if(this.stage=2,0===this.counter)return e;for(let[t,s]of this.values)e=e.replace(t,s);return e}}class D extends u.B{settings;buffer;useReplacer=!1;rootSchema;constructor(e){super(),this.settings=e}write(e,t){this.rootSchema=n.l.of(e),this.buffer=this._write(this.rootSchema,t)}writeDiscriminatedDocument(e,t){this.write(e,t),"object"==typeof this.buffer&&(this.buffer.__type=n.l.of(e).getName(!0))}flush(){let{rootSchema:e,useReplacer:t}=this;if(this.rootSchema=void 0,this.useReplacer=!1,e?.isStructSchema()||e?.isDocumentSchema()){if(!t)return JSON.stringify(this.buffer);let e=new x;return e.replaceInJson(JSON.stringify(this.buffer,e.createReplacer(),0))}return this.buffer}_write(e,t,s){let r=null!==t&&"object"==typeof t,i=n.l.of(e);if(r){if(i.isStructSchema()){let e={};for(let[s,r]of(0,p.R)(i,t)){let o=this._write(r,t[s],i);if(void 0!==o){let t=r.getMergedTraits().jsonName;e[this.settings.jsonName?t??s:s]=o}}if(i.isUnionSchema()&&0===Object.keys(e).length){let{$unknown:s}=t;if(Array.isArray(s)){let[t,r]=s;e[t]=this._write(15,r)}}return e}if(Array.isArray(t)&&i.isListSchema()){let e=i.getValueSchema(),s=[],r=!!i.getMergedTraits().sparse;for(let i of t)(r||null!=i)&&s.push(this._write(e,i));return s}if(i.isMapSchema()){let e=i.getValueSchema(),s={},r=!!i.getMergedTraits().sparse;for(let[i,o]of Object.entries(t))(r||null!=o)&&(s[i]=this._write(e,o));return s}if(t instanceof Uint8Array&&(i.isBlobSchema()||i.isDocumentSchema()))return i===this.rootSchema?t:(this.serdeContext?.base64Encoder??_.n)(t);if(t instanceof Date&&(i.isTimestampSchema()||i.isDocumentSchema()))switch((0,l.V)(i,this.settings)){case 5:return t.toISOString().replace(".000Z","Z");case 6:return(0,h.JV)(t);case 7:return t.getTime()/1e3;default:return console.warn("Missing timestamp format, using epoch seconds",t),t.getTime()/1e3}t instanceof m.D&&(this.useReplacer=!0)}if(!(null===t&&s?.isStructSchema())){if(i.isStringSchema()){if(void 0===t&&i.isIdempotencyToken())return(0,w.v4)();let e=i.getMergedTraits().mediaType;return null!=t&&e&&("application/json"===e||e.endsWith("+json"))?d.A.from(t):t}if("number"==typeof t&&i.isNumericSchema())return Math.abs(t)===1/0||isNaN(t)?String(t):t;if("string"==typeof t&&i.isBlobSchema())return i===this.rootSchema?t:(this.serdeContext?.base64Encoder??_.n)(t);if("bigint"==typeof t&&(this.useReplacer=!0),i.isDocumentSchema())if(!r)return structuredClone(t);else{let e=Array.isArray(t)?[]:{};for(let[s,r]of Object.entries(t))r instanceof m.D?(this.useReplacer=!0,e[s]=r):e[s]=this._write(i,r);return e}return t}}}class N extends u.B{settings;constructor(e){super(),this.settings=e}createSerializer(){let e=new D(this.settings);return e.setSerdeContext(this.serdeContext),e}createDeserializer(){let e=new b(this.settings);return e.setSerdeContext(this.serdeContext),e}}class T extends r.s{serializer;deserializer;codec;mixin=new c.U;constructor({defaultNamespace:e}){super({defaultNamespace:e});const t={timestampFormat:{useTrait:!0,default:7},httpBindings:!0,jsonName:!0};this.codec=new N(t),this.serializer=new i._(this.codec.createSerializer(),t),this.deserializer=new o.z(this.codec.createDeserializer(),t)}getShapeId(){return"aws.protocols#restJson1"}getPayloadCodec(){return this.codec}setSerdeContext(e){this.codec.setSerdeContext(e),super.setSerdeContext(e)}async serializeRequest(e,t,s){let r=await super.serializeRequest(e,t,s),i=n.l.of(e.input);if(!r.headers["content-type"]){let e=this.mixin.resolveRestContentType(this.getDefaultContentType(),i);e&&(r.headers["content-type"]=e)}return null==r.body&&r.headers["content-type"]===this.getDefaultContentType()&&(r.body="{}"),r}async deserializeResponse(e,t,s){let r=await super.deserializeResponse(e,t,s);for(let[t,s]of n.l.of(e.output).structIterator())!s.getMemberTraits().httpPayload||t in r||(r[t]=null);return r}async handleError(e,t,s,r,i){let o=((e,t)=>{let findKey=(e,t)=>Object.keys(e).find(e=>e.toLowerCase()===t.toLowerCase()),sanitizeErrorCode=e=>{let t=e;return"number"==typeof t&&(t=t.toString()),t.indexOf(",")>=0&&(t=t.split(",")[0]),t.indexOf(":")>=0&&(t=t.split(":")[0]),t.indexOf("#")>=0&&(t=t.split("#")[1]),t},s=findKey(e.headers,"x-amzn-errortype");if(void 0!==s)return sanitizeErrorCode(e.headers[s]);if(t&&"object"==typeof t){let e=findKey(t,"code");if(e&&void 0!==t[e])return sanitizeErrorCode(t[e]);if(void 0!==t.__type)return sanitizeErrorCode(t.__type)}})(s,r)??"Unknown",{errorSchema:c,errorMetadata:u}=await this.mixin.getErrorSchemaOrThrowBaseException(o,this.options.defaultNamespace,s,r,i),l=n.l.of(c),d=r.message??r.Message??"Unknown",h=new(a.O.for(c[1]).getErrorCtor(c)??Error)(d);await this.deserializeHttpMessage(c,t,s,r);let m={};for(let[e,t]of l.structIterator()){let s=t.getMergedTraits().jsonName??e;m[e]=this.codec.createDeserializer().readObject(t,r[s])}throw this.mixin.decorateServiceException(Object.assign(h,u,{$fault:l.getMergedTraits().error,message:d},m),r)}getDefaultContentType(){return"application/json"}}},"./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"(e,t,s){s.d(t,{m:()=>r});class r{async sign(e,t,s){return e}}}};
package/dist/cjs/0~864.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["864"],exports.modules={"./node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js"(e,t,r){r.d(t,{fromIni:()=>b});var s=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),i=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),n=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=r("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),a=r("./node_modules/@smithy/property-provider/dist-es/chain.js");let l=e=>(0,o.g)(e,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p"),d=async(e,t,s,d,g={},u)=>{s.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let f=t[e],{source_profile:p,region:h}=f;if(!s.roleAssumer){let{getDefaultRoleAssumer:e}=await r.e("216").then(r.bind(r,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"));s.roleAssumer=e({...s.clientConfig,credentialProviderLogger:s.logger,parentClientConfig:{...d,...s?.parentClientConfig,region:h??s?.parentClientConfig?.region??d?.region}},s.clientPlugins)}if(p&&p in g)throw new n.C(`Detected a cycle attempting to resolve credentials for profile ${(0,i.Bz)(s)}. Profiles visited: `+Object.keys(g).join(", "),{logger:s.logger});s.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${p?`source_profile=[${p}]`:`profile=[${e}]`}`);let _=p?u(p,t,s,d,{...g,[p]:!0},c(t[p]??{})):(await ((e,t,s)=>{let i={EcsContainer:async e=>{let{fromHttp:t}=await r.e("634").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-http/dist-es/index.js")),{fromContainerMetadata:i}=await r.e("560").then(r.bind(r,"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"));return s?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>(0,a.c)(t(e??{}),i(e))().then(l)},Ec2InstanceMetadata:async e=>{s?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:t}=await r.e("560").then(r.bind(r,"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"));return async()=>t(e)().then(l)},Environment:async e=>{s?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:t}=await r.e("134").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-env/dist-es/index.js"));return async()=>t(e)().then(l)}};if(e in i)return i[e];throw new n.C(`Unsupported credential source in profile ${t}. Got ${e}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:s})})(f.credential_source,e,s.logger)(s))();if(c(f))return _.then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"));{let t={RoleArn:f.role_arn,RoleSessionName:f.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:f.external_id,DurationSeconds:parseInt(f.duration_seconds||"3600",10)},{mfa_serial:r}=f;if(r){if(!s.mfaCodeProvider)throw new n.C(`Profile ${e} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:s.logger,tryNextLink:!1});t.SerialNumber=r,t.TokenCode=await s.mfaCodeProvider(r)}let i=await _;return s.roleAssumer(i,t).then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"))}},c=e=>!e.role_arn&&!!e.credential_source;var g=r("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),u=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js"),f=r("node:crypto"),p=r("node:fs"),h=r("node:os"),_=r("node:path");class y{profileData;init;callerClientConfig;static REFRESH_THRESHOLD=3e5;constructor(e,t,r){this.profileData=e,this.init=t,this.callerClientConfig=r}async loadCredentials(){let e=await this.loadToken();if(!e)throw new n.C(`Failed to load a token for session ${this.loginSession}, please re-authenticate using aws login`,{tryNextLink:!1,logger:this.logger});let t=e.accessToken,r=Date.now();return new Date(t.expiresAt).getTime()-r<=y.REFRESH_THRESHOLD?this.refresh(e):{accessKeyId:t.accessKeyId,secretAccessKey:t.secretAccessKey,sessionToken:t.sessionToken,accountId:t.accountId,expiration:new Date(t.expiresAt)}}get logger(){return this.init?.logger}get loginSession(){return this.profileData.login_session}async refresh(e){let t,{SigninClient:s,CreateOAuth2TokenCommand:i}=await Promise.all([r.e("769"),r.e("195")]).then(r.bind(r,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/signin/index.js")),{logger:o,userAgentAppId:a}=this.callerClientConfig??{},l=(t=this.callerClientConfig?.requestHandler,t?.metadata?.handlerProtocol==="h2")?void 0:this.callerClientConfig?.requestHandler,d=new s({credentials:{accessKeyId:"",secretAccessKey:""},region:this.profileData.region??await this.callerClientConfig?.region?.()??process.env.AWS_REGION,requestHandler:l,logger:o,userAgentAppId:a,...this.init?.clientConfig});this.createDPoPInterceptor(d.middlewareStack);let c={tokenInput:{clientId:e.clientId,refreshToken:e.refreshToken,grantType:"refresh_token"}};try{let t=await d.send(new i(c)),{accessKeyId:r,secretAccessKey:s,sessionToken:o}=t.tokenOutput?.accessToken??{},{refreshToken:a,expiresIn:l}=t.tokenOutput??{};if(!r||!s||!o||!a)throw new n.C("Token refresh response missing required fields",{logger:this.logger,tryNextLink:!1});let g=new Date(Date.now()+(l??900)*1e3),u={...e,accessToken:{...e.accessToken,accessKeyId:r,secretAccessKey:s,sessionToken:o,expiresAt:g.toISOString()},refreshToken:a};await this.saveToken(u);let f=u.accessToken;return{accessKeyId:f.accessKeyId,secretAccessKey:f.secretAccessKey,sessionToken:f.sessionToken,accountId:f.accountId,expiration:g}}catch(e){if("AccessDeniedException"===e.name){let t;switch(e.error){case"TOKEN_EXPIRED":t="Your session has expired. Please reauthenticate.";break;case"USER_CREDENTIALS_CHANGED":t="Unable to refresh credentials because of a change in your password. Please reauthenticate with your new password.";break;case"INSUFFICIENT_PERMISSIONS":t="Unable to refresh credentials due to insufficient permissions. You may be missing permission for the 'CreateOAuth2Token' action.";break;default:t=`Failed to refresh token: ${String(e)}. Please re-authenticate using \`aws login\``}throw new n.C(t,{logger:this.logger,tryNextLink:!1})}throw new n.C(`Failed to refresh token: ${String(e)}. Please re-authenticate using aws login`,{logger:this.logger})}}async loadToken(){let e=this.getTokenFilePath();try{let t;try{t=await (0,u.TA)(e,{ignoreCache:this.init?.ignoreCache})}catch{t=await p.promises.readFile(e,"utf8")}let r=JSON.parse(t),s=["accessToken","clientId","refreshToken","dpopKey"].filter(e=>!r[e]);if(r.accessToken?.accountId||s.push("accountId"),s.length>0)throw new n.C(`Token validation failed, missing fields: ${s.join(", ")}`,{logger:this.logger,tryNextLink:!1});return r}catch(t){throw new n.C(`Failed to load token from ${e}: ${String(t)}`,{logger:this.logger,tryNextLink:!1})}}async saveToken(e){let t=this.getTokenFilePath(),r=(0,_.dirname)(t);try{await p.promises.mkdir(r,{recursive:!0})}catch(e){}await p.promises.writeFile(t,JSON.stringify(e,null,2),"utf8")}getTokenFilePath(){let e=process.env.AWS_LOGIN_CACHE_DIRECTORY??(0,_.join)((0,h.homedir)(),".aws","login","cache"),t=Buffer.from(this.loginSession,"utf8"),r=(0,f.createHash)("sha256").update(t).digest("hex");return(0,_.join)(e,`${r}.json`)}derToRawSignature(e){let t=2;if(2!==e[2])throw Error("Invalid DER signature");t++;let r=e[t++],s=e.subarray(t,t+r);if(2!==e[t+=r])throw Error("Invalid DER signature");t++;let i=e[t++],n=e.subarray(t,t+i);s=0===s[0]?s.subarray(1):s,n=0===n[0]?n.subarray(1):n;let o=Buffer.concat([Buffer.alloc(32-s.length),s]),a=Buffer.concat([Buffer.alloc(32-n.length),n]);return Buffer.concat([o,a])}createDPoPInterceptor(e){e.add(e=>async t=>{if(g.K.isInstance(t.request)){let e=t.request,r=`${e.protocol}//${e.hostname}${e.port?`:${e.port}`:""}${e.path}`,s=await this.generateDpop(e.method,r);e.headers={...e.headers,DPoP:s}}return e(t)},{step:"finalizeRequest",name:"dpopInterceptor",override:!0})}async generateDpop(e="POST",t){let r=await this.loadToken();try{let s=(0,f.createPrivateKey)({key:r.dpopKey,format:"pem",type:"sec1"}),i=(0,f.createPublicKey)(s).export({format:"der",type:"spki"}),n=-1;for(let e=0;e<i.length;e++)if(4===i[e]){n=e;break}let o=i.slice(n+1,n+33),a=i.slice(n+33,n+65),l={alg:"ES256",typ:"dpop+jwt",jwk:{kty:"EC",crv:"P-256",x:o.toString("base64url"),y:a.toString("base64url")}},d={jti:crypto.randomUUID(),htm:e,htu:t,iat:Math.floor(Date.now()/1e3)},c=Buffer.from(JSON.stringify(l)).toString("base64url"),g=Buffer.from(JSON.stringify(d)).toString("base64url"),u=`${c}.${g}`,p=(0,f.sign)("sha256",Buffer.from(u),s),h=this.derToRawSignature(p).toString("base64url");return`${u}.${h}`}catch(e){throw new n.C(`Failed to generate Dpop proof: ${e instanceof Error?e.message:String(e)}`,{logger:this.logger,tryNextLink:!1})}}}let w=async(e,t,r)=>{let a,l=await (a={...t,profile:e},async({callerClientConfig:e}={})=>{a?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");let t=await (0,s.Y)(a||{}),r=(0,i.Bz)({profile:a?.profile??e?.profile}),l=t[r];if(!l?.login_session)throw new n.C(`Profile ${r} does not contain login_session.`,{tryNextLink:!0,logger:a?.logger});let d=new y(l,a,e),c=await d.loadCredentials();return(0,o.g)(c,"CREDENTIALS_LOGIN","AD")})({callerClientConfig:r});return(0,o.g)(l,"CREDENTIALS_PROFILE_LOGIN","AC")},m=async(e,t)=>r.e("911").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js")).then(({fromProcess:r})=>r({...e,profile:t})().then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_PROCESS","v"))),k=async(e,t,s={},i)=>{let{fromSSO:n}=await r.e("710").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"));return n({profile:e,logger:s.logger,parentClientConfig:s.parentClientConfig,clientConfig:s.clientConfig})({callerClientConfig:i}).then(e=>t.sso_session?(0,o.g)(e,"CREDENTIALS_PROFILE_SSO","r"):(0,o.g)(e,"CREDENTIALS_PROFILE_SSO_LEGACY","t"))},C=e=>!!e&&"object"==typeof e&&"string"==typeof e.aws_access_key_id&&"string"==typeof e.aws_secret_access_key&&["undefined","string"].indexOf(typeof e.aws_session_token)>-1&&["undefined","string"].indexOf(typeof e.aws_account_id)>-1,E=async(e,t)=>{t?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");let r={accessKeyId:e.aws_access_key_id,secretAccessKey:e.aws_secret_access_key,sessionToken:e.aws_session_token,...e.aws_credential_scope&&{credentialScope:e.aws_credential_scope},...e.aws_account_id&&{accountId:e.aws_account_id}};return(0,o.g)(r,"CREDENTIALS_PROFILE","n")},I=async(e,t,s)=>r.e("730").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js")).then(({fromTokenFile:r})=>r({webIdentityTokenFile:e.web_identity_token_file,roleArn:e.role_arn,roleSessionName:e.role_session_name,roleAssumerWithWebIdentity:t.roleAssumerWithWebIdentity,logger:t.logger,parentClientConfig:t.parentClientConfig})({callerClientConfig:s}).then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q"))),S=async(e,t,r,s,i={},o=!1)=>{let a=t[e];if(Object.keys(i).length>0&&C(a))return E(a,r);if(o||((e,{profile:t="default",logger:r}={})=>!!e&&"object"==typeof e&&"string"==typeof e.role_arn&&["undefined","string"].indexOf(typeof e.role_session_name)>-1&&["undefined","string"].indexOf(typeof e.external_id)>-1&&["undefined","string"].indexOf(typeof e.mfa_serial)>-1&&(((e,{profile:t,logger:r})=>{let s="string"==typeof e.source_profile&&void 0===e.credential_source;return s&&r?.debug?.(` ${t} isAssumeRoleWithSourceProfile source_profile=${e.source_profile}`),s})(e,{profile:t,logger:r})||((e,{profile:t,logger:r})=>{let s="string"==typeof e.credential_source&&void 0===e.source_profile;return s&&r?.debug?.(` ${t} isCredentialSourceProfile credential_source=${e.credential_source}`),s})(e,{profile:t,logger:r})))(a,{profile:e,logger:r.logger}))return d(e,t,r,s,i,S);if(C(a))return E(a,r);if(a&&"object"==typeof a&&"string"==typeof a.web_identity_token_file&&"string"==typeof a.role_arn&&["undefined","string"].indexOf(typeof a.role_session_name)>-1)return I(a,r,s);if(a&&"object"==typeof a&&"string"==typeof a.credential_process)return m(r,e);if(a&&("string"==typeof a.sso_start_url||"string"==typeof a.sso_account_id||"string"==typeof a.sso_session||"string"==typeof a.sso_region||"string"==typeof a.sso_role_name))return await k(e,a,r,s);if(a&&a.login_session)return w(e,r,s);throw new n.C(`Could not resolve credentials using profile: [${e}] in configuration/credentials file(s).`,{logger:r.logger})},b=(e={})=>async({callerClientConfig:t}={})=>{e.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let r=await (0,s.Y)(e);return S((0,i.Bz)({profile:e.profile??t?.profile}),r,e,t)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,t,r){r.d(t,{Y:()=>i});var s=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let i=async e=>{let t=await (0,s.p)(e);return((...e)=>{let t={};for(let r of e)for(let[e,s]of Object.entries(r))void 0!==t[e]?Object.assign(t[e],s):t[e]=s;return t})(t.configFile,t.credentialsFile)}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["864"],exports.modules={"./node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js"(e,t,r){r.d(t,{fromIni:()=>fromIni});var s=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),i=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),n=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=r("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),a=r("./node_modules/@smithy/property-provider/dist-es/chain.js");let setNamedProvider=e=>(0,o.g)(e,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p"),resolveAssumeRoleCredentials=async(e,t,s,l,d={},c)=>{s.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let g=t[e],{source_profile:u,region:f}=g;if(!s.roleAssumer){let{getDefaultRoleAssumer:e}=await r.e("216").then(r.bind(r,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"));s.roleAssumer=e({...s.clientConfig,credentialProviderLogger:s.logger,parentClientConfig:{...l,...s?.parentClientConfig,region:f??s?.parentClientConfig?.region??l?.region}},s.clientPlugins)}if(u&&u in d)throw new n.C(`Detected a cycle attempting to resolve credentials for profile ${(0,i.Bz)(s)}. Profiles visited: `+Object.keys(d).join(", "),{logger:s.logger});s.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${u?`source_profile=[${u}]`:`profile=[${e}]`}`);let p=u?c(u,t,s,l,{...d,[u]:!0},isCredentialSourceWithoutRoleArn(t[u]??{})):(await ((e,t,s)=>{let i={EcsContainer:async e=>{let{fromHttp:t}=await r.e("634").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-http/dist-es/index.js")),{fromContainerMetadata:i}=await r.e("560").then(r.bind(r,"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"));return s?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>(0,a.c)(t(e??{}),i(e))().then(setNamedProvider)},Ec2InstanceMetadata:async e=>{s?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:t}=await r.e("560").then(r.bind(r,"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"));return async()=>t(e)().then(setNamedProvider)},Environment:async e=>{s?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:t}=await r.e("134").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-env/dist-es/index.js"));return async()=>t(e)().then(setNamedProvider)}};if(e in i)return i[e];throw new n.C(`Unsupported credential source in profile ${t}. Got ${e}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:s})})(g.credential_source,e,s.logger)(s))();if(isCredentialSourceWithoutRoleArn(g))return p.then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"));{let t={RoleArn:g.role_arn,RoleSessionName:g.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:g.external_id,DurationSeconds:parseInt(g.duration_seconds||"3600",10)},{mfa_serial:r}=g;if(r){if(!s.mfaCodeProvider)throw new n.C(`Profile ${e} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:s.logger,tryNextLink:!1});t.SerialNumber=r,t.TokenCode=await s.mfaCodeProvider(r)}let i=await p;return s.roleAssumer(i,t).then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"))}},isCredentialSourceWithoutRoleArn=e=>!e.role_arn&&!!e.credential_source;var l=r("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),d=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js"),c=r("node:crypto"),g=r("node:fs"),u=r("node:os"),f=r("node:path");class p{profileData;init;callerClientConfig;static REFRESH_THRESHOLD=3e5;constructor(e,t,r){this.profileData=e,this.init=t,this.callerClientConfig=r}async loadCredentials(){let e=await this.loadToken();if(!e)throw new n.C(`Failed to load a token for session ${this.loginSession}, please re-authenticate using aws login`,{tryNextLink:!1,logger:this.logger});let t=e.accessToken,r=Date.now();return new Date(t.expiresAt).getTime()-r<=p.REFRESH_THRESHOLD?this.refresh(e):{accessKeyId:t.accessKeyId,secretAccessKey:t.secretAccessKey,sessionToken:t.sessionToken,accountId:t.accountId,expiration:new Date(t.expiresAt)}}get logger(){return this.init?.logger}get loginSession(){return this.profileData.login_session}async refresh(e){let t,{SigninClient:s,CreateOAuth2TokenCommand:i}=await Promise.all([r.e("769"),r.e("195")]).then(r.bind(r,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/signin/index.js")),{logger:o,userAgentAppId:a}=this.callerClientConfig??{},l=(t=this.callerClientConfig?.requestHandler,t?.metadata?.handlerProtocol==="h2")?void 0:this.callerClientConfig?.requestHandler,d=new s({credentials:{accessKeyId:"",secretAccessKey:""},region:this.profileData.region??await this.callerClientConfig?.region?.()??process.env.AWS_REGION,requestHandler:l,logger:o,userAgentAppId:a,...this.init?.clientConfig});this.createDPoPInterceptor(d.middlewareStack);let c={tokenInput:{clientId:e.clientId,refreshToken:e.refreshToken,grantType:"refresh_token"}};try{let t=await d.send(new i(c)),{accessKeyId:r,secretAccessKey:s,sessionToken:o}=t.tokenOutput?.accessToken??{},{refreshToken:a,expiresIn:l}=t.tokenOutput??{};if(!r||!s||!o||!a)throw new n.C("Token refresh response missing required fields",{logger:this.logger,tryNextLink:!1});let g=new Date(Date.now()+(l??900)*1e3),u={...e,accessToken:{...e.accessToken,accessKeyId:r,secretAccessKey:s,sessionToken:o,expiresAt:g.toISOString()},refreshToken:a};await this.saveToken(u);let f=u.accessToken;return{accessKeyId:f.accessKeyId,secretAccessKey:f.secretAccessKey,sessionToken:f.sessionToken,accountId:f.accountId,expiration:g}}catch(e){if("AccessDeniedException"===e.name){let t;switch(e.error){case"TOKEN_EXPIRED":t="Your session has expired. Please reauthenticate.";break;case"USER_CREDENTIALS_CHANGED":t="Unable to refresh credentials because of a change in your password. Please reauthenticate with your new password.";break;case"INSUFFICIENT_PERMISSIONS":t="Unable to refresh credentials due to insufficient permissions. You may be missing permission for the 'CreateOAuth2Token' action.";break;default:t=`Failed to refresh token: ${String(e)}. Please re-authenticate using \`aws login\``}throw new n.C(t,{logger:this.logger,tryNextLink:!1})}throw new n.C(`Failed to refresh token: ${String(e)}. Please re-authenticate using aws login`,{logger:this.logger})}}async loadToken(){let e=this.getTokenFilePath();try{let t;try{t=await (0,d.TA)(e,{ignoreCache:this.init?.ignoreCache})}catch{t=await g.promises.readFile(e,"utf8")}let r=JSON.parse(t),s=["accessToken","clientId","refreshToken","dpopKey"].filter(e=>!r[e]);if(r.accessToken?.accountId||s.push("accountId"),s.length>0)throw new n.C(`Token validation failed, missing fields: ${s.join(", ")}`,{logger:this.logger,tryNextLink:!1});return r}catch(t){throw new n.C(`Failed to load token from ${e}: ${String(t)}`,{logger:this.logger,tryNextLink:!1})}}async saveToken(e){let t=this.getTokenFilePath(),r=(0,f.dirname)(t);try{await g.promises.mkdir(r,{recursive:!0})}catch(e){}await g.promises.writeFile(t,JSON.stringify(e,null,2),"utf8")}getTokenFilePath(){let e=process.env.AWS_LOGIN_CACHE_DIRECTORY??(0,f.join)((0,u.homedir)(),".aws","login","cache"),t=Buffer.from(this.loginSession,"utf8"),r=(0,c.createHash)("sha256").update(t).digest("hex");return(0,f.join)(e,`${r}.json`)}derToRawSignature(e){let t=2;if(2!==e[2])throw Error("Invalid DER signature");t++;let r=e[t++],s=e.subarray(t,t+r);if(2!==e[t+=r])throw Error("Invalid DER signature");t++;let i=e[t++],n=e.subarray(t,t+i);s=0===s[0]?s.subarray(1):s,n=0===n[0]?n.subarray(1):n;let o=Buffer.concat([Buffer.alloc(32-s.length),s]),a=Buffer.concat([Buffer.alloc(32-n.length),n]);return Buffer.concat([o,a])}createDPoPInterceptor(e){e.add(e=>async t=>{if(l.K.isInstance(t.request)){let e=t.request,r=`${e.protocol}//${e.hostname}${e.port?`:${e.port}`:""}${e.path}`,s=await this.generateDpop(e.method,r);e.headers={...e.headers,DPoP:s}}return e(t)},{step:"finalizeRequest",name:"dpopInterceptor",override:!0})}async generateDpop(e="POST",t){let r=await this.loadToken();try{let s=(0,c.createPrivateKey)({key:r.dpopKey,format:"pem",type:"sec1"}),i=(0,c.createPublicKey)(s).export({format:"der",type:"spki"}),n=-1;for(let e=0;e<i.length;e++)if(4===i[e]){n=e;break}let o=i.slice(n+1,n+33),a=i.slice(n+33,n+65),l={alg:"ES256",typ:"dpop+jwt",jwk:{kty:"EC",crv:"P-256",x:o.toString("base64url"),y:a.toString("base64url")}},d={jti:crypto.randomUUID(),htm:e,htu:t,iat:Math.floor(Date.now()/1e3)},g=Buffer.from(JSON.stringify(l)).toString("base64url"),u=Buffer.from(JSON.stringify(d)).toString("base64url"),f=`${g}.${u}`,p=(0,c.sign)("sha256",Buffer.from(f),s),h=this.derToRawSignature(p).toString("base64url");return`${f}.${h}`}catch(e){throw new n.C(`Failed to generate Dpop proof: ${e instanceof Error?e.message:String(e)}`,{logger:this.logger,tryNextLink:!1})}}}let resolveLoginCredentials=async(e,t,r)=>{let a,l=await (a={...t,profile:e},async({callerClientConfig:e}={})=>{a?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");let t=await (0,s.Y)(a||{}),r=(0,i.Bz)({profile:a?.profile??e?.profile}),l=t[r];if(!l?.login_session)throw new n.C(`Profile ${r} does not contain login_session.`,{tryNextLink:!0,logger:a?.logger});let d=new p(l,a,e),c=await d.loadCredentials();return(0,o.g)(c,"CREDENTIALS_LOGIN","AD")})({callerClientConfig:r});return(0,o.g)(l,"CREDENTIALS_PROFILE_LOGIN","AC")},resolveProcessCredentials=async(e,t)=>r.e("911").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js")).then(({fromProcess:r})=>r({...e,profile:t})().then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_PROCESS","v"))),resolveSsoCredentials=async(e,t,s={},i)=>{let{fromSSO:n}=await r.e("710").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"));return n({profile:e,logger:s.logger,parentClientConfig:s.parentClientConfig,clientConfig:s.clientConfig})({callerClientConfig:i}).then(e=>t.sso_session?(0,o.g)(e,"CREDENTIALS_PROFILE_SSO","r"):(0,o.g)(e,"CREDENTIALS_PROFILE_SSO_LEGACY","t"))},isStaticCredsProfile=e=>!!e&&"object"==typeof e&&"string"==typeof e.aws_access_key_id&&"string"==typeof e.aws_secret_access_key&&["undefined","string"].indexOf(typeof e.aws_session_token)>-1&&["undefined","string"].indexOf(typeof e.aws_account_id)>-1,resolveStaticCredentials=async(e,t)=>{t?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");let r={accessKeyId:e.aws_access_key_id,secretAccessKey:e.aws_secret_access_key,sessionToken:e.aws_session_token,...e.aws_credential_scope&&{credentialScope:e.aws_credential_scope},...e.aws_account_id&&{accountId:e.aws_account_id}};return(0,o.g)(r,"CREDENTIALS_PROFILE","n")},resolveWebIdentityCredentials=async(e,t,s)=>r.e("730").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js")).then(({fromTokenFile:r})=>r({webIdentityTokenFile:e.web_identity_token_file,roleArn:e.role_arn,roleSessionName:e.role_session_name,roleAssumerWithWebIdentity:t.roleAssumerWithWebIdentity,logger:t.logger,parentClientConfig:t.parentClientConfig})({callerClientConfig:s}).then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q"))),resolveProfileData_resolveProfileData=async(e,t,r,s,i={},o=!1)=>{let a=t[e];if(Object.keys(i).length>0&&isStaticCredsProfile(a))return resolveStaticCredentials(a,r);if(o||((e,{profile:t="default",logger:r}={})=>!!e&&"object"==typeof e&&"string"==typeof e.role_arn&&["undefined","string"].indexOf(typeof e.role_session_name)>-1&&["undefined","string"].indexOf(typeof e.external_id)>-1&&["undefined","string"].indexOf(typeof e.mfa_serial)>-1&&(((e,{profile:t,logger:r})=>{let s="string"==typeof e.source_profile&&void 0===e.credential_source;return s&&r?.debug?.(` ${t} isAssumeRoleWithSourceProfile source_profile=${e.source_profile}`),s})(e,{profile:t,logger:r})||((e,{profile:t,logger:r})=>{let s="string"==typeof e.credential_source&&void 0===e.source_profile;return s&&r?.debug?.(` ${t} isCredentialSourceProfile credential_source=${e.credential_source}`),s})(e,{profile:t,logger:r})))(a,{profile:e,logger:r.logger}))return resolveAssumeRoleCredentials(e,t,r,s,i,resolveProfileData_resolveProfileData);if(isStaticCredsProfile(a))return resolveStaticCredentials(a,r);if(a&&"object"==typeof a&&"string"==typeof a.web_identity_token_file&&"string"==typeof a.role_arn&&["undefined","string"].indexOf(typeof a.role_session_name)>-1)return resolveWebIdentityCredentials(a,r,s);if(a&&"object"==typeof a&&"string"==typeof a.credential_process)return resolveProcessCredentials(r,e);if(a&&("string"==typeof a.sso_start_url||"string"==typeof a.sso_account_id||"string"==typeof a.sso_session||"string"==typeof a.sso_region||"string"==typeof a.sso_role_name))return await resolveSsoCredentials(e,a,r,s);if(a&&a.login_session)return resolveLoginCredentials(e,r,s);throw new n.C(`Could not resolve credentials using profile: [${e}] in configuration/credentials file(s).`,{logger:r.logger})},fromIni=(e={})=>async({callerClientConfig:t}={})=>{e.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let r=await (0,s.Y)(e);return resolveProfileData_resolveProfileData((0,i.Bz)({profile:e.profile??t?.profile}),r,e,t)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,t,r){r.d(t,{Y:()=>parseKnownFiles});var s=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let parseKnownFiles=async e=>{let t=await (0,s.p)(e);return((...e)=>{let t={};for(let r of e)for(let[e,s]of Object.entries(r))void 0!==t[e]?Object.assign(t[e],s):t[e]=s;return t})(t.configFile,t.credentialsFile)}}};
package/dist/cjs/0~911.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["911"],exports.modules={"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js"(e,r,s){s.d(r,{fromProcess:()=>p});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),o=s("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),d=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=s("child_process"),a=s("util"),l=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js");let c=async(e,r,s)=>{let i=r[e];if(r[e]){let c=i.credential_process;if(void 0!==c){let i=(0,a.promisify)(d.Z?.getTokenRecord?.().exec??n.exec);try{let s,{stdout:o}=await i(c);try{s=JSON.parse(o.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}var t=s;if(1!==t.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===t.AccessKeyId||void 0===t.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(t.Expiration){let r=new Date;if(new Date(t.Expiration)<r)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let d=t.AccountId;!d&&r?.[e]?.aws_account_id&&(d=r[e].aws_account_id);let n={accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,...t.SessionToken&&{sessionToken:t.SessionToken},...t.Expiration&&{expiration:new Date(t.Expiration)},...t.CredentialScope&&{credentialScope:t.CredentialScope},...d&&{accountId:d}};return(0,l.g)(n,"CREDENTIALS_PROCESS","w"),n}catch(e){throw new o.C(e.message,{logger:s})}}throw new o.C(`Profile ${e} did not contain credential_process.`,{logger:s})}throw new o.C(`Profile ${e} could not be found in shared credentials file.`,{logger:s})},p=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let s=await (0,i.Y)(e);return c((0,t.Bz)({profile:e.profile??r?.profile}),s,e.logger)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,r,s){s.d(r,{Z:()=>o});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let o={getFileRecord:()=>t.Jj,interceptFile(e,r){t.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>i.a,interceptToken(e,r){i.a[e]=r}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,r,s){s.d(r,{C:()=>d});var i=s("crypto"),t=s("path"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let d=e=>{let r=(0,i.createHash)("sha1").update(e).digest("hex");return(0,t.join)((0,o.R)(),".aws","sso","cache",`${r}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,r,s){s.d(r,{a:()=>o,v:()=>d});var i=s("fs/promises"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let o={},d=async e=>{if(o[e])return o[e];let r=(0,t.C)(e);return JSON.parse(await (0,i.readFile)(r,"utf8"))}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["911"],exports.modules={"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js"(e,r,s){s.d(r,{fromProcess:()=>fromProcess});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),t=s("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),d=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=s("child_process"),l=s("util"),a=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js");let resolveProcessCredentials=async(e,r,s)=>{let i=r[e];if(r[e]){let c=i.credential_process;if(void 0!==c){let i=(0,l.promisify)(d.Z?.getTokenRecord?.().exec??n.exec);try{let s,{stdout:t}=await i(c);try{s=JSON.parse(t.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}var o=s;if(1!==o.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===o.AccessKeyId||void 0===o.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(o.Expiration){let r=new Date;if(new Date(o.Expiration)<r)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let d=o.AccountId;!d&&r?.[e]?.aws_account_id&&(d=r[e].aws_account_id);let n={accessKeyId:o.AccessKeyId,secretAccessKey:o.SecretAccessKey,...o.SessionToken&&{sessionToken:o.SessionToken},...o.Expiration&&{expiration:new Date(o.Expiration)},...o.CredentialScope&&{credentialScope:o.CredentialScope},...d&&{accountId:d}};return(0,a.g)(n,"CREDENTIALS_PROCESS","w"),n}catch(e){throw new t.C(e.message,{logger:s})}}throw new t.C(`Profile ${e} did not contain credential_process.`,{logger:s})}throw new t.C(`Profile ${e} could not be found in shared credentials file.`,{logger:s})},fromProcess=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let s=await (0,i.Y)(e);return resolveProcessCredentials((0,o.Bz)({profile:e.profile??r?.profile}),s,e.logger)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,r,s){s.d(r,{Z:()=>t});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let t={getFileRecord:()=>o.Jj,interceptFile(e,r){o.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>i.a,interceptToken(e,r){i.a[e]=r}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,r,s){s.d(r,{C:()=>getSSOTokenFilepath});var i=s("crypto"),o=s("path"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let getSSOTokenFilepath=e=>{let r=(0,i.createHash)("sha1").update(e).digest("hex");return(0,o.join)((0,t.R)(),".aws","sso","cache",`${r}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,r,s){s.d(r,{a:()=>t,v:()=>getSSOTokenFromFile});var i=s("fs/promises"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let t={},getSSOTokenFromFile=async e=>{if(t[e])return t[e];let r=(0,o.C)(e);return JSON.parse(await (0,i.readFile)(r,"utf8"))}}};
package/dist/cjs/0~965.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["965"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js"(e,s,t){t.d(s,{SSOClient:()=>e4,GetRoleCredentialsCommand:()=>O});var o=t("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),i=t("./node_modules/@smithy/smithy-client/dist-es/command.js");let n={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var r=t("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),d=t("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class a extends d.T{constructor(e){super(e),Object.setPrototypeOf(this,a.prototype)}}class l extends a{name="InvalidRequestException";$fault="client";constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,l.prototype)}}class u extends a{name="ResourceNotFoundException";$fault="client";constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,u.prototype)}}class c extends a{name="TooManyRequestsException";$fault="client";constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e}),Object.setPrototypeOf(this,c.prototype)}}class p extends a{name="UnauthorizedException";$fault="client";constructor(e){super({name:"UnauthorizedException",$fault:"client",...e}),Object.setPrototypeOf(this,p.prototype)}}let m="client",h="error",g="httpError",f="httpQuery",y="message",S="smithy.ts.sdk.synthetic.com.amazonaws.sso",w="com.amazonaws.sso";var _=[0,w,"AccessTokenType",8,0],v=[0,w,"SecretAccessKeyType",8,0],j=[0,w,"SessionTokenType",8,0],P=[3,w,"GetRoleCredentialsRequest",0,["roleName","accountId","accessToken"],[[0,{[f]:"role_name"}],[0,{[f]:"account_id"}],[()=>_,{httpHeader:"x-amz-sso_bearer_token"}]]],E=[3,w,"GetRoleCredentialsResponse",0,["roleCredentials"],[[()=>b,0]]],k=[-3,w,"InvalidRequestException",{[h]:m,[g]:400},[y],[0]];r.O.for(w).registerError(k,l);var x=[-3,w,"ResourceNotFoundException",{[h]:m,[g]:404},[y],[0]];r.O.for(w).registerError(x,u);var b=[3,w,"RoleCredentials",0,["accessKeyId","secretAccessKey","sessionToken","expiration"],[0,[()=>v,0],[()=>j,0],1]],I=[-3,w,"TooManyRequestsException",{[h]:m,[g]:429},[y],[0]];r.O.for(w).registerError(I,c);var R=[-3,w,"UnauthorizedException",{[h]:m,[g]:401},[y],[0]];r.O.for(w).registerError(R,p);var A=[-3,S,"SSOServiceException",0,[],[]];r.O.for(S).registerError(A,a);var C=[9,w,"GetRoleCredentials",{http:["GET","/federation/credentials",200]},()=>P,()=>E];class O extends i.u.classBuilder().ep(n).m(function(e,s,t,i){return[(0,o.r)(t,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").sc(C).build(){}var D=t("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),U=t("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),F=t("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),T=t("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),q=t("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),N=t("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),M=t("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),$=t("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),z=t("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),H=t("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),L=t("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),G=t("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),V=t("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),Z=t("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),B=t("./node_modules/@smithy/smithy-client/dist-es/client.js"),K=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),W=t("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),Y=t("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let J=async(e,s,t)=>({operation:(0,W.u)(s).operation,region:await (0,Y.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),Q=e=>{let s=[];switch(e.operation){case"GetRoleCredentials":case"ListAccountRoles":case"ListAccounts":case"Logout":s.push({schemeId:"smithy.api#noAuth"});break;default:s.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(e,s)=>({signingProperties:{config:e,context:s}})})}return s};var X=t("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),ee=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),es=t("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),et=t("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),eo=t("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),ei=t("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),en=t("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),er=t("./node_modules/@smithy/hash-node/dist-es/index.js"),ed=t("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),ea=t("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),el=t("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),eu=t("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),ec=t("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),ep=t("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),em=t("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),eh=t("./node_modules/@smithy/util-retry/dist-es/config.js"),eg=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),ef=t("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),ey=t("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),eS=t("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),ew=t("./node_modules/@smithy/url-parser/dist-es/index.js"),e_=t("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),ev=t("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),ej=t("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),eP=t("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),eE=t("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),ek=t("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),ex=t("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),eb=t("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let eI="required",eR="argv",eA="isSet",eC="booleanEquals",eO="error",eD="endpoint",eU="tree",eF="PartitionResult",eT="getAttr",eq={[eI]:!1,type:"string"},eN={[eI]:!0,default:!1,type:"boolean"},eM={ref:"Endpoint"},e$={fn:eC,[eR]:[{ref:"UseFIPS"},!0]},ez={fn:eC,[eR]:[{ref:"UseDualStack"},!0]},eH={},eL={fn:eT,[eR]:[{ref:eF},"supportsFIPS"]},eG={ref:eF},eV={fn:eC,[eR]:[!0,{fn:eT,[eR]:[eG,"supportsDualStack"]}]},eZ=[e$],eB=[ez],eK=[{ref:"Region"}],eW={version:"1.0",parameters:{Region:eq,UseDualStack:eN,UseFIPS:eN,Endpoint:eq},rules:[{conditions:[{fn:eA,[eR]:[eM]}],rules:[{conditions:eZ,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:eO},{conditions:eB,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:eO},{endpoint:{url:eM,properties:eH,headers:eH},type:eD}],type:eU},{conditions:[{fn:eA,[eR]:eK}],rules:[{conditions:[{fn:"aws.partition",[eR]:eK,assign:eF}],rules:[{conditions:[e$,ez],rules:[{conditions:[{fn:eC,[eR]:[!0,eL]},eV],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eH,headers:eH},type:eD}],type:eU},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:eO}],type:eU},{conditions:eZ,rules:[{conditions:[{fn:eC,[eR]:[eL,!0]}],rules:[{conditions:[{fn:"stringEquals",[eR]:[{fn:eT,[eR]:[eG,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:eH,headers:eH},type:eD},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:eH,headers:eH},type:eD}],type:eU},{error:"FIPS is enabled but this partition does not support FIPS",type:eO}],type:eU},{conditions:eB,rules:[{conditions:[eV],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eH,headers:eH},type:eD}],type:eU},{error:"DualStack is enabled but this partition does not support DualStack",type:eO}],type:eU},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:eH,headers:eH},type:eD}],type:eU}],type:eU},{error:"Invalid Configuration: Missing Region",type:eO}]},eY=new ek.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),eJ=(e,s={})=>eY.get(e,()=>(0,ex.s)(eW,{endpointParams:e,logger:s.logger}));eb.m.aws=eE.UF;var eQ=t("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),eX=t("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),e0=t("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class e4 extends B.K{config;constructor(...[e]){const s=(e=>{(0,eu.I)(process.version);let s=(0,em.I)(e),t=()=>s().then(ec.l),o={apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??e_.E,base64Encoder:e?.base64Encoder??ev.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??eJ,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??Q,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new eg.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ey.m}],logger:e?.logger??new eS.N,protocol:e?.protocol??ef.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sso",version:"2019-06-10",serviceTarget:"SWBPortalService"},serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??ew.D,utf8Decoder:e?.utf8Decoder??ej.a,utf8Encoder:e?.utf8Encoder??eP.P};(0,X.I)(process.version);let i={profile:e?.profile,logger:o.logger};return{...o,...e,runtime:"node",defaultsMode:s,authSchemePreference:e?.authSchemePreference??(0,ed.Z)(ee.$,i),bodyLengthChecker:e?.bodyLengthChecker??ep.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,es.pf)({serviceId:o.serviceId,clientVersion:"3.964.0"}),maxAttempts:e?.maxAttempts??(0,ed.Z)(V.qs,e),region:e?.region??(0,ed.Z)(eo.GG,{...eo.zH,...i}),requestHandler:ea.$.create(e?.requestHandler??t),retryMode:e?.retryMode??(0,ed.Z)({...V.kN,default:async()=>(await t()).retryMode||eh.L},e),sha256:e?.sha256??er.V.bind(null,"sha256"),streamCollector:e?.streamCollector??el.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,ed.Z)(ei.e$,i),useFipsEndpoint:e?.useFipsEndpoint??(0,ed.Z)(en.Ko,i),userAgentAppId:e?.userAgentAppId??(0,ed.Z)(et.hV,i)}})(e||{});super(s),this.initConfig=s;const t=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}))(s),o=(0,T.D)(t),i=(0,V.$z)(o),n=(0,N.T)(i),r=(0,D.OV)(n),d=((e,s)=>{let t,o,i,n=Object.assign((0,eQ.R)(e),(0,e0.xA)(e),(0,eX.e)(e),(t=e.httpAuthSchemes,o=e.httpAuthSchemeProvider,i=e.credentials,{setHttpAuthScheme(e){let s=t.findIndex(s=>s.schemeId===e.schemeId);-1===s?t.push(e):t.splice(s,1,e)},httpAuthSchemes:()=>t,setHttpAuthSchemeProvider(e){o=e},httpAuthSchemeProvider:()=>o,setCredentials(e){i=e},credentials:()=>i}));return s.forEach(e=>e.configure(n)),Object.assign(e,(0,eQ.$)(n),(0,e0.uv)(n),(0,eX.j)(n),{httpAuthSchemes:n.httpAuthSchemes(),httpAuthSchemeProvider:n.httpAuthSchemeProvider(),credentials:n.credentials()})})((e=>Object.assign((0,K.h)(e),{authSchemePreference:(0,Y.t)(e.authSchemePreference??[])}))((0,G.C)(r)),e?.extensions||[]);this.config=d,this.middlewareStack.use((0,H.wq)(this.config)),this.middlewareStack.use((0,q.sM)(this.config)),this.middlewareStack.use((0,Z.ey)(this.config)),this.middlewareStack.use((0,L.vK)(this.config)),this.middlewareStack.use((0,D.TC)(this.config)),this.middlewareStack.use((0,U.Y7)(this.config)),this.middlewareStack.use((0,F.n)(this.config)),this.middlewareStack.use((0,M.w)(this.config,{httpAuthSchemeParametersProvider:J,identityProviderConfigProvider:async e=>new $.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,z.l)(this.config))}destroy(){super.destroy()}}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["965"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js"(e,t,s){s.d(t,{SSOClient:()=>eQ,GetRoleCredentialsCommand:()=>O});var o=s("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),i=s("./node_modules/@smithy/smithy-client/dist-es/command.js");let n={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var r=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),d=s("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class a extends d.T{constructor(e){super(e),Object.setPrototypeOf(this,a.prototype)}}class u extends a{name="InvalidRequestException";$fault="client";constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,u.prototype)}}class l extends a{name="ResourceNotFoundException";$fault="client";constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,l.prototype)}}class c extends a{name="TooManyRequestsException";$fault="client";constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e}),Object.setPrototypeOf(this,c.prototype)}}class p extends a{name="UnauthorizedException";$fault="client";constructor(e){super({name:"UnauthorizedException",$fault:"client",...e}),Object.setPrototypeOf(this,p.prototype)}}let m="client",h="error",g="httpError",f="httpQuery",y="message",S="smithy.ts.sdk.synthetic.com.amazonaws.sso",v="com.amazonaws.sso";var w=[0,v,"AccessTokenType",8,0],P=[0,v,"SecretAccessKeyType",8,0],_=[0,v,"SessionTokenType",8,0],j=[3,v,"GetRoleCredentialsRequest",0,["roleName","accountId","accessToken"],[[0,{[f]:"role_name"}],[0,{[f]:"account_id"}],[()=>w,{httpHeader:"x-amz-sso_bearer_token"}]]],E=[3,v,"GetRoleCredentialsResponse",0,["roleCredentials"],[[()=>x,0]]],A=[-3,v,"InvalidRequestException",{[h]:m,[g]:400},[y],[0]];r.O.for(v).registerError(A,u);var k=[-3,v,"ResourceNotFoundException",{[h]:m,[g]:404},[y],[0]];r.O.for(v).registerError(k,l);var x=[3,v,"RoleCredentials",0,["accessKeyId","secretAccessKey","sessionToken","expiration"],[0,[()=>P,0],[()=>_,0],1]],R=[-3,v,"TooManyRequestsException",{[h]:m,[g]:429},[y],[0]];r.O.for(v).registerError(R,c);var b=[-3,v,"UnauthorizedException",{[h]:m,[g]:401},[y],[0]];r.O.for(v).registerError(b,p);var C=[-3,S,"SSOServiceException",0,[],[]];r.O.for(S).registerError(C,a);var I=[9,v,"GetRoleCredentials",{http:["GET","/federation/credentials",200]},()=>j,()=>E];class O extends i.u.classBuilder().ep(n).m(function(e,t,s,i){return[(0,o.r)(s,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").sc(I).build(){}var D=s("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),U=s("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),F=s("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),H=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),T=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),N=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),q=s("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),M=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),$=s("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),z=s("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),L=s("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),G=s("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),V=s("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),Z=s("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),B=s("./node_modules/@smithy/smithy-client/dist-es/client.js"),K=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),W=s("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),Y=s("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let defaultSSOHttpAuthSchemeParametersProvider=async(e,t,s)=>({operation:(0,W.u)(t).operation,region:await (0,Y.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()});function createAwsAuthSigv4HttpAuthOption(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})}}function createSmithyApiNoAuthHttpAuthOption(e){return{schemeId:"smithy.api#noAuth"}}let defaultSSOHttpAuthSchemeProvider=e=>{let t=[];switch(e.operation){case"GetRoleCredentials":case"ListAccountRoles":case"ListAccounts":case"Logout":t.push(createSmithyApiNoAuthHttpAuthOption(e));break;default:t.push(createAwsAuthSigv4HttpAuthOption(e))}return t};var J=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),Q=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),X=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),ee=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),et=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),es=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),eo=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),ei=s("./node_modules/@smithy/hash-node/dist-es/index.js"),en=s("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),er=s("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),ed=s("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),ea=s("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),eu=s("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),el=s("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),ec=s("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),ep=s("./node_modules/@smithy/util-retry/dist-es/config.js"),em=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),eh=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),eg=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),ef=s("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),ey=s("./node_modules/@smithy/url-parser/dist-es/index.js"),eS=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),ev=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),ew=s("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),eP=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),e_=s("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),ej=s("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),eE=s("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),eA=s("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let ek="required",ex="argv",eR="isSet",eb="booleanEquals",eC="error",eI="endpoint",eO="tree",eD="PartitionResult",eU="getAttr",eF={[ek]:!1,type:"string"},eH={[ek]:!0,default:!1,type:"boolean"},eT={ref:"Endpoint"},eN={fn:eb,[ex]:[{ref:"UseFIPS"},!0]},eq={fn:eb,[ex]:[{ref:"UseDualStack"},!0]},eM={},e$={fn:eU,[ex]:[{ref:eD},"supportsFIPS"]},ez={ref:eD},eL={fn:eb,[ex]:[!0,{fn:eU,[ex]:[ez,"supportsDualStack"]}]},eG=[eN],eV=[eq],eZ=[{ref:"Region"}],eB={version:"1.0",parameters:{Region:eF,UseDualStack:eH,UseFIPS:eH,Endpoint:eF},rules:[{conditions:[{fn:eR,[ex]:[eT]}],rules:[{conditions:eG,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:eC},{conditions:eV,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:eC},{endpoint:{url:eT,properties:eM,headers:eM},type:eI}],type:eO},{conditions:[{fn:eR,[ex]:eZ}],rules:[{conditions:[{fn:"aws.partition",[ex]:eZ,assign:eD}],rules:[{conditions:[eN,eq],rules:[{conditions:[{fn:eb,[ex]:[!0,e$]},eL],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eM,headers:eM},type:eI}],type:eO},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:eC}],type:eO},{conditions:eG,rules:[{conditions:[{fn:eb,[ex]:[e$,!0]}],rules:[{conditions:[{fn:"stringEquals",[ex]:[{fn:eU,[ex]:[ez,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:eM,headers:eM},type:eI},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:eM,headers:eM},type:eI}],type:eO},{error:"FIPS is enabled but this partition does not support FIPS",type:eC}],type:eO},{conditions:eV,rules:[{conditions:[eL],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eM,headers:eM},type:eI}],type:eO},{error:"DualStack is enabled but this partition does not support DualStack",type:eC}],type:eO},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:eM,headers:eM},type:eI}],type:eO}],type:eO},{error:"Invalid Configuration: Missing Region",type:eC}]},eK=new ej.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),defaultEndpointResolver=(e,t={})=>eK.get(e,()=>(0,eE.s)(eB,{endpointParams:e,logger:t.logger}));eA.m.aws=e_.UF;var eW=s("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),eY=s("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),eJ=s("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class eQ extends B.K{config;constructor(...[e]){const t=(e=>{(0,ea.I)(process.version);let t=(0,ec.I)(e),defaultConfigProvider=()=>t().then(eu.l),s={apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??eS.E,base64Encoder:e?.base64Encoder??ev.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??defaultEndpointResolver,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??defaultSSOHttpAuthSchemeProvider,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new em.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new eg.m}],logger:e?.logger??new ef.N,protocol:e?.protocol??eh.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sso",version:"2019-06-10",serviceTarget:"SWBPortalService"},serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??ey.D,utf8Decoder:e?.utf8Decoder??ew.a,utf8Encoder:e?.utf8Encoder??eP.P};(0,J.I)(process.version);let o={profile:e?.profile,logger:s.logger};return{...s,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,en.Z)(Q.$,o),bodyLengthChecker:e?.bodyLengthChecker??el.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,X.pf)({serviceId:s.serviceId,clientVersion:"3.964.0"}),maxAttempts:e?.maxAttempts??(0,en.Z)(V.qs,e),region:e?.region??(0,en.Z)(et.GG,{...et.zH,...o}),requestHandler:er.$.create(e?.requestHandler??defaultConfigProvider),retryMode:e?.retryMode??(0,en.Z)({...V.kN,default:async()=>(await defaultConfigProvider()).retryMode||ep.L},e),sha256:e?.sha256??ei.V.bind(null,"sha256"),streamCollector:e?.streamCollector??ed.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,en.Z)(es.e$,o),useFipsEndpoint:e?.useFipsEndpoint??(0,en.Z)(eo.Ko,o),userAgentAppId:e?.userAgentAppId??(0,en.Z)(ee.hV,o)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}))(t),o=(0,H.D)(s),i=(0,V.$z)(o),n=(0,N.T)(i),r=(0,D.OV)(n),d=((e,t)=>{let s,o,i,n=Object.assign((0,eW.R)(e),(0,eJ.xA)(e),(0,eY.e)(e),(s=e.httpAuthSchemes,o=e.httpAuthSchemeProvider,i=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){o=e},httpAuthSchemeProvider:()=>o,setCredentials(e){i=e},credentials:()=>i}));return t.forEach(e=>e.configure(n)),Object.assign(e,(0,eW.$)(n),(0,eJ.uv)(n),(0,eY.j)(n),{httpAuthSchemes:n.httpAuthSchemes(),httpAuthSchemeProvider:n.httpAuthSchemeProvider(),credentials:n.credentials()})})((e=>Object.assign((0,K.h)(e),{authSchemePreference:(0,Y.t)(e.authSchemePreference??[])}))((0,G.C)(r)),e?.extensions||[]);this.config=d,this.middlewareStack.use((0,z.wq)(this.config)),this.middlewareStack.use((0,T.sM)(this.config)),this.middlewareStack.use((0,Z.ey)(this.config)),this.middlewareStack.use((0,L.vK)(this.config)),this.middlewareStack.use((0,D.TC)(this.config)),this.middlewareStack.use((0,U.Y7)(this.config)),this.middlewareStack.use((0,F.n)(this.config)),this.middlewareStack.use((0,q.w)(this.config,{httpAuthSchemeParametersProvider:defaultSSOHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async e=>new M.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,$.l)(this.config))}destroy(){super.destroy()}}}};