coze-coding-dev-sdk 0.7.19-beta.4 → 0.7.19-beta.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/cjs/0~195.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["195"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/signin/index.js"(e,s,t){t.d(s,{CreateOAuth2TokenCommand:()=>si,SigninClient:()=>ex});var n=t("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),i=t("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),o=t("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),r=t("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),d=t("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),a=t("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),u=t("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),l=t("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),c=t("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),p=t("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),m=t("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),h=t("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),g=t("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),f=t("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),y=t("./node_modules/@smithy/smithy-client/dist-es/client.js"),S=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),w=t("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),k=t("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let _=async(e,s,t)=>({operation:(0,w.u)(s).operation,region:await (0,k.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),v=e=>{let s=[];if("CreateOAuth2Token"===e.operation)s.push({schemeId:"smithy.api#noAuth"});else s.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"signin",region:e.region},propertiesExtractor:(e,s)=>({signingProperties:{config:e,context:s}})});return s},j={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var P=t("./node_modules/@aws-sdk/nested-clients/package.json"),E=t("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),A=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),x=t("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),I=t("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),b=t("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),C=t("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),O=t("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),R=t("./node_modules/@smithy/hash-node/dist-es/index.js"),D=t("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),T=t("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),U=t("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),F=t("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),q=t("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),M=t("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),V=t("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),$=t("./node_modules/@smithy/util-retry/dist-es/config.js"),H=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),N=t("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),z=t("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),L=t("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),Z=t("./node_modules/@smithy/url-parser/dist-es/index.js"),B=t("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),K=t("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),G=t("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),W=t("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),Y=t("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),J=t("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),Q=t("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),X=t("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let ee="required",es="argv",et="isSet",en="booleanEquals",ei="error",eo="endpoint",er="tree",ed="PartitionResult",ea="stringEquals",eu={[ee]:!0,default:!1,type:"boolean"},el={[ee]:!1,type:"string"},ec={ref:"Endpoint"},ep={fn:en,[es]:[{ref:"UseFIPS"},!0]},em={fn:en,[es]:[{ref:"UseDualStack"},!0]},eh={},eg={fn:"getAttr",[es]:[{ref:ed},"name"]},ef={fn:en,[es]:[{ref:"UseFIPS"},!1]},ey={fn:en,[es]:[{ref:"UseDualStack"},!1]},eS={fn:"getAttr",[es]:[{ref:ed},"supportsFIPS"]},ew={fn:en,[es]:[!0,{fn:"getAttr",[es]:[{ref:ed},"supportsDualStack"]}]},ek=[{ref:"Region"}],e_={version:"1.0",parameters:{UseDualStack:eu,UseFIPS:eu,Endpoint:el,Region:el},rules:[{conditions:[{fn:et,[es]:[ec]}],rules:[{conditions:[ep],error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:ei},{rules:[{conditions:[em],error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:ei},{endpoint:{url:ec,properties:eh,headers:eh},type:eo}],type:er}],type:er},{rules:[{conditions:[{fn:et,[es]:ek}],rules:[{conditions:[{fn:"aws.partition",[es]:ek,assign:ed}],rules:[{conditions:[{fn:ea,[es]:[eg,"aws"]},ef,ey],endpoint:{url:"https://{Region}.signin.aws.amazon.com",properties:eh,headers:eh},type:eo},{conditions:[{fn:ea,[es]:[eg,"aws-cn"]},ef,ey],endpoint:{url:"https://{Region}.signin.amazonaws.cn",properties:eh,headers:eh},type:eo},{conditions:[{fn:ea,[es]:[eg,"aws-us-gov"]},ef,ey],endpoint:{url:"https://{Region}.signin.amazonaws-us-gov.com",properties:eh,headers:eh},type:eo},{conditions:[ep,em],rules:[{conditions:[{fn:en,[es]:[!0,eS]},ew],rules:[{endpoint:{url:"https://signin-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eh,headers:eh},type:eo}],type:er},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:ei}],type:er},{conditions:[ep,ey],rules:[{conditions:[{fn:en,[es]:[eS,!0]}],rules:[{endpoint:{url:"https://signin-fips.{Region}.{PartitionResult#dnsSuffix}",properties:eh,headers:eh},type:eo}],type:er},{error:"FIPS is enabled but this partition does not support FIPS",type:ei}],type:er},{conditions:[ef,em],rules:[{conditions:[ew],rules:[{endpoint:{url:"https://signin.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eh,headers:eh},type:eo}],type:er},{error:"DualStack is enabled but this partition does not support DualStack",type:ei}],type:er},{endpoint:{url:"https://signin.{Region}.{PartitionResult#dnsSuffix}",properties:eh,headers:eh},type:eo}],type:er}],type:er},{error:"Invalid Configuration: Missing Region",type:ei}],type:er}]},ev=new J.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ej=(e,s={})=>ev.get(e,()=>(0,Q.s)(e_,{endpointParams:e,logger:s.logger}));X.m.aws=Y.UF;var eP=t("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),eE=t("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),eA=t("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class ex extends y.K{config;constructor(...[e]){const s=(e=>{(0,F.I)(process.version);let s=(0,V.I)(e),t=()=>s().then(q.l),n={apiVersion:"2023-01-01",base64Decoder:e?.base64Decoder??B.E,base64Encoder:e?.base64Encoder??K.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??ej,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??v,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new H.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new z.m}],logger:e?.logger??new L.N,protocol:e?.protocol??N.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.signin",version:"2023-01-01",serviceTarget:"Signin"},serviceId:e?.serviceId??"Signin",urlParser:e?.urlParser??Z.D,utf8Decoder:e?.utf8Decoder??G.a,utf8Encoder:e?.utf8Encoder??W.P};(0,E.I)(process.version);let i={profile:e?.profile,logger:n.logger};return{...n,...e,runtime:"node",defaultsMode:s,authSchemePreference:e?.authSchemePreference??(0,D.Z)(A.$,i),bodyLengthChecker:e?.bodyLengthChecker??M.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,x.pf)({serviceId:n.serviceId,clientVersion:P.rE}),maxAttempts:e?.maxAttempts??(0,D.Z)(g.qs,e),region:e?.region??(0,D.Z)(b.GG,{...b.zH,...i}),requestHandler:T.$.create(e?.requestHandler??t),retryMode:e?.retryMode??(0,D.Z)({...g.kN,default:async()=>(await t()).retryMode||$.L},e),sha256:e?.sha256??R.V.bind(null,"sha256"),streamCollector:e?.streamCollector??U.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,D.Z)(C.e$,i),useFipsEndpoint:e?.useFipsEndpoint??(0,D.Z)(O.Ko,i),userAgentAppId:e?.userAgentAppId??(0,D.Z)(I.hV,i)}})(e||{});super(s),this.initConfig=s;const t=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"signin"}))(s),y=(0,r.D)(t),w=(0,g.$z)(y),j=(0,a.T)(w),Y=(0,n.OV)(j),J=((e,s)=>{let t,n,i,o=Object.assign((0,eP.R)(e),(0,eA.xA)(e),(0,eE.e)(e),(t=e.httpAuthSchemes,n=e.httpAuthSchemeProvider,i=e.credentials,{setHttpAuthScheme(e){let s=t.findIndex(s=>s.schemeId===e.schemeId);-1===s?t.push(e):t.splice(s,1,e)},httpAuthSchemes:()=>t,setHttpAuthSchemeProvider(e){n=e},httpAuthSchemeProvider:()=>n,setCredentials(e){i=e},credentials:()=>i}));return s.forEach(e=>e.configure(o)),Object.assign(e,(0,eP.$)(o),(0,eA.uv)(o),(0,eE.j)(o),{httpAuthSchemes:o.httpAuthSchemes(),httpAuthSchemeProvider:o.httpAuthSchemeProvider(),credentials:o.credentials()})})((e=>Object.assign((0,S.h)(e),{authSchemePreference:(0,k.t)(e.authSchemePreference??[])}))((0,h.C)(Y)),e?.extensions||[]);this.config=J,this.middlewareStack.use((0,p.wq)(this.config)),this.middlewareStack.use((0,d.sM)(this.config)),this.middlewareStack.use((0,f.ey)(this.config)),this.middlewareStack.use((0,m.vK)(this.config)),this.middlewareStack.use((0,n.TC)(this.config)),this.middlewareStack.use((0,i.Y7)(this.config)),this.middlewareStack.use((0,o.n)(this.config)),this.middlewareStack.use((0,u.w)(this.config,{httpAuthSchemeParametersProvider:_,identityProviderConfigProvider:async e=>new l.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,c.l)(this.config))}destroy(){super.destroy()}}var eI=t("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),eb=t("./node_modules/@smithy/smithy-client/dist-es/command.js"),eC=t("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),eO=t("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class eR extends eO.T{constructor(e){super(e),Object.setPrototypeOf(this,eR.prototype)}}class eD extends eR{name="AccessDeniedException";$fault="client";error;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,eD.prototype),this.error=e.error}}class eT extends eR{name="InternalServerException";$fault="server";error;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,eT.prototype),this.error=e.error}}class eU extends eR{name="TooManyRequestsError";$fault="client";error;constructor(e){super({name:"TooManyRequestsError",$fault:"client",...e}),Object.setPrototypeOf(this,eU.prototype),this.error=e.error}}class eF extends eR{name="ValidationException";$fault="client";error;constructor(e){super({name:"ValidationException",$fault:"client",...e}),Object.setPrototypeOf(this,eF.prototype),this.error=e.error}}let eq="accessKeyId",eM="accessToken",eV="client",e$="clientId",eH="codeVerifier",eN="error",ez="expiresIn",eL="grantType",eZ="httpError",eB="idToken",eK="jsonName",eG="message",eW="refreshToken",eY="redirectUri",eJ="secretAccessKey",eQ="sessionToken",eX="smithy.ts.sdk.synthetic.com.amazonaws.signin",e0="tokenType",e1="com.amazonaws.signin";var e2=[0,e1,"RefreshToken",8,0],e4=[-3,e1,"AccessDeniedException",{[eN]:eV},[eN,eG],[0,0]];eC.O.for(e1).registerError(e4,eD);var e6=[3,e1,"AccessToken",8,[eq,eJ,eQ],[[0,{[eK]:eq}],[0,{[eK]:eJ}],[0,{[eK]:eQ}]]],e3=[3,e1,"CreateOAuth2TokenRequest",0,["tokenInput"],[[()=>e8,16]]],e8=[3,e1,"CreateOAuth2TokenRequestBody",0,[e$,eL,"code",eY,eH,eW],[[0,{[eK]:e$}],[0,{[eK]:eL}],0,[0,{[eK]:eY}],[0,{[eK]:eH}],[()=>e2,{[eK]:eW}]]],e5=[3,e1,"CreateOAuth2TokenResponse",0,["tokenOutput"],[[()=>e9,16]]],e9=[3,e1,"CreateOAuth2TokenResponseBody",0,[eM,e0,ez,eW,eB],[[()=>e6,{[eK]:eM}],[0,{[eK]:e0}],[1,{[eK]:ez}],[()=>e2,{[eK]:eW}],[0,{[eK]:eB}]]],e7=[-3,e1,"InternalServerException",{[eN]:"server",[eZ]:500},[eN,eG],[0,0]];eC.O.for(e1).registerError(e7,eT);var se=[-3,e1,"TooManyRequestsError",{[eN]:eV,[eZ]:429},[eN,eG],[0,0]];eC.O.for(e1).registerError(se,eU);var ss=[-3,e1,"ValidationException",{[eN]:eV,[eZ]:400},[eN,eG],[0,0]];eC.O.for(e1).registerError(ss,eF);var st=[-3,eX,"SigninServiceException",0,[],[]];eC.O.for(eX).registerError(st,eR);var sn=[9,e1,"CreateOAuth2Token",{http:["POST","/v1/token",200]},()=>e3,()=>e5];class si extends eb.u.classBuilder().ep(j).m(function(e,s,t,n){return[(0,eI.r)(t,e.getEndpointParameterInstructions())]}).s("Signin","CreateOAuth2Token",{}).n("SigninClient","CreateOAuth2TokenCommand").sc(sn).build(){}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["195"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/signin/index.js"(e,t,s){s.d(t,{CreateOAuth2TokenCommand:()=>tt,SigninClient:()=>eA});var i=s("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),n=s("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),o=s("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),r=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),d=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),a=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),u=s("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),l=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),c=s("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),p=s("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),m=s("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),h=s("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),g=s("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),f=s("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),y=s("./node_modules/@smithy/smithy-client/dist-es/client.js"),S=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),v=s("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),w=s("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let defaultSigninHttpAuthSchemeParametersProvider=async(e,t,s)=>({operation:(0,v.u)(t).operation,region:await (0,w.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()});function createAwsAuthSigv4HttpAuthOption(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"signin",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})}}function createSmithyApiNoAuthHttpAuthOption(e){return{schemeId:"smithy.api#noAuth"}}let defaultSigninHttpAuthSchemeProvider=e=>{let t=[];return"CreateOAuth2Token"===e.operation?t.push(createSmithyApiNoAuthHttpAuthOption(e)):t.push(createAwsAuthSigv4HttpAuthOption(e)),t},k={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var P=s("./node_modules/@aws-sdk/nested-clients/package.json"),_=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),A=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),j=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),E=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),x=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),I=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),b=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),C=s("./node_modules/@smithy/hash-node/dist-es/index.js"),O=s("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),R=s("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),D=s("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),T=s("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),U=s("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),F=s("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),H=s("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),q=s("./node_modules/@smithy/util-retry/dist-es/config.js"),M=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),N=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),V=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),$=s("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),z=s("./node_modules/@smithy/url-parser/dist-es/index.js"),L=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),Z=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),B=s("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),K=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),G=s("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),W=s("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),Y=s("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),J=s("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let Q="required",X="argv",ee="isSet",et="booleanEquals",es="error",ei="endpoint",en="tree",eo="PartitionResult",er="stringEquals",ed={[Q]:!0,default:!1,type:"boolean"},ea={[Q]:!1,type:"string"},eu={ref:"Endpoint"},el={fn:et,[X]:[{ref:"UseFIPS"},!0]},ec={fn:et,[X]:[{ref:"UseDualStack"},!0]},ep={},em={fn:"getAttr",[X]:[{ref:eo},"name"]},eh={fn:et,[X]:[{ref:"UseFIPS"},!1]},eg={fn:et,[X]:[{ref:"UseDualStack"},!1]},ef={fn:"getAttr",[X]:[{ref:eo},"supportsFIPS"]},ey={fn:et,[X]:[!0,{fn:"getAttr",[X]:[{ref:eo},"supportsDualStack"]}]},eS=[{ref:"Region"}],ev={version:"1.0",parameters:{UseDualStack:ed,UseFIPS:ed,Endpoint:ea,Region:ea},rules:[{conditions:[{fn:ee,[X]:[eu]}],rules:[{conditions:[el],error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:es},{rules:[{conditions:[ec],error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:es},{endpoint:{url:eu,properties:ep,headers:ep},type:ei}],type:en}],type:en},{rules:[{conditions:[{fn:ee,[X]:eS}],rules:[{conditions:[{fn:"aws.partition",[X]:eS,assign:eo}],rules:[{conditions:[{fn:er,[X]:[em,"aws"]},eh,eg],endpoint:{url:"https://{Region}.signin.aws.amazon.com",properties:ep,headers:ep},type:ei},{conditions:[{fn:er,[X]:[em,"aws-cn"]},eh,eg],endpoint:{url:"https://{Region}.signin.amazonaws.cn",properties:ep,headers:ep},type:ei},{conditions:[{fn:er,[X]:[em,"aws-us-gov"]},eh,eg],endpoint:{url:"https://{Region}.signin.amazonaws-us-gov.com",properties:ep,headers:ep},type:ei},{conditions:[el,ec],rules:[{conditions:[{fn:et,[X]:[!0,ef]},ey],rules:[{endpoint:{url:"https://signin-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:ep,headers:ep},type:ei}],type:en},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:es}],type:en},{conditions:[el,eg],rules:[{conditions:[{fn:et,[X]:[ef,!0]}],rules:[{endpoint:{url:"https://signin-fips.{Region}.{PartitionResult#dnsSuffix}",properties:ep,headers:ep},type:ei}],type:en},{error:"FIPS is enabled but this partition does not support FIPS",type:es}],type:en},{conditions:[eh,ec],rules:[{conditions:[ey],rules:[{endpoint:{url:"https://signin.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:ep,headers:ep},type:ei}],type:en},{error:"DualStack is enabled but this partition does not support DualStack",type:es}],type:en},{endpoint:{url:"https://signin.{Region}.{PartitionResult#dnsSuffix}",properties:ep,headers:ep},type:ei}],type:en}],type:en},{error:"Invalid Configuration: Missing Region",type:es}],type:en}]},ew=new W.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),defaultEndpointResolver=(e,t={})=>ew.get(e,()=>(0,Y.s)(ev,{endpointParams:e,logger:t.logger}));J.m.aws=G.UF;var ek=s("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),eP=s("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),e_=s("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class eA extends y.K{config;constructor(...[e]){const t=(e=>{(0,T.I)(process.version);let t=(0,H.I)(e),defaultConfigProvider=()=>t().then(U.l),s={apiVersion:"2023-01-01",base64Decoder:e?.base64Decoder??L.E,base64Encoder:e?.base64Encoder??Z.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??defaultEndpointResolver,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??defaultSigninHttpAuthSchemeProvider,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new M.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new V.m}],logger:e?.logger??new $.N,protocol:e?.protocol??N.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.signin",version:"2023-01-01",serviceTarget:"Signin"},serviceId:e?.serviceId??"Signin",urlParser:e?.urlParser??z.D,utf8Decoder:e?.utf8Decoder??B.a,utf8Encoder:e?.utf8Encoder??K.P};(0,_.I)(process.version);let i={profile:e?.profile,logger:s.logger};return{...s,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,O.Z)(A.$,i),bodyLengthChecker:e?.bodyLengthChecker??F.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,j.pf)({serviceId:s.serviceId,clientVersion:P.rE}),maxAttempts:e?.maxAttempts??(0,O.Z)(g.qs,e),region:e?.region??(0,O.Z)(x.GG,{...x.zH,...i}),requestHandler:R.$.create(e?.requestHandler??defaultConfigProvider),retryMode:e?.retryMode??(0,O.Z)({...g.kN,default:async()=>(await defaultConfigProvider()).retryMode||q.L},e),sha256:e?.sha256??C.V.bind(null,"sha256"),streamCollector:e?.streamCollector??D.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,O.Z)(I.e$,i),useFipsEndpoint:e?.useFipsEndpoint??(0,O.Z)(b.Ko,i),userAgentAppId:e?.userAgentAppId??(0,O.Z)(E.hV,i)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"signin"}))(t),y=(0,r.D)(s),v=(0,g.$z)(y),k=(0,a.T)(v),G=(0,i.OV)(k),W=((e,t)=>{let s,i,n,o=Object.assign((0,ek.R)(e),(0,e_.xA)(e),(0,eP.e)(e),(s=e.httpAuthSchemes,i=e.httpAuthSchemeProvider,n=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){i=e},httpAuthSchemeProvider:()=>i,setCredentials(e){n=e},credentials:()=>n}));return t.forEach(e=>e.configure(o)),Object.assign(e,(0,ek.$)(o),(0,e_.uv)(o),(0,eP.j)(o),{httpAuthSchemes:o.httpAuthSchemes(),httpAuthSchemeProvider:o.httpAuthSchemeProvider(),credentials:o.credentials()})})((e=>Object.assign((0,S.h)(e),{authSchemePreference:(0,w.t)(e.authSchemePreference??[])}))((0,h.C)(G)),e?.extensions||[]);this.config=W,this.middlewareStack.use((0,p.wq)(this.config)),this.middlewareStack.use((0,d.sM)(this.config)),this.middlewareStack.use((0,f.ey)(this.config)),this.middlewareStack.use((0,m.vK)(this.config)),this.middlewareStack.use((0,i.TC)(this.config)),this.middlewareStack.use((0,n.Y7)(this.config)),this.middlewareStack.use((0,o.n)(this.config)),this.middlewareStack.use((0,u.w)(this.config,{httpAuthSchemeParametersProvider:defaultSigninHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async e=>new l.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,c.l)(this.config))}destroy(){super.destroy()}}var ej=s("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),eE=s("./node_modules/@smithy/smithy-client/dist-es/command.js"),ex=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),eI=s("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class eb extends eI.T{constructor(e){super(e),Object.setPrototypeOf(this,eb.prototype)}}class eC extends eb{name="AccessDeniedException";$fault="client";error;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,eC.prototype),this.error=e.error}}class eO extends eb{name="InternalServerException";$fault="server";error;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,eO.prototype),this.error=e.error}}class eR extends eb{name="TooManyRequestsError";$fault="client";error;constructor(e){super({name:"TooManyRequestsError",$fault:"client",...e}),Object.setPrototypeOf(this,eR.prototype),this.error=e.error}}class eD extends eb{name="ValidationException";$fault="client";error;constructor(e){super({name:"ValidationException",$fault:"client",...e}),Object.setPrototypeOf(this,eD.prototype),this.error=e.error}}let eT="accessKeyId",eU="accessToken",eF="client",eH="clientId",eq="codeVerifier",eM="error",eN="expiresIn",eV="grantType",e$="httpError",ez="idToken",eL="jsonName",eZ="message",eB="refreshToken",eK="redirectUri",eG="secretAccessKey",eW="sessionToken",eY="smithy.ts.sdk.synthetic.com.amazonaws.signin",eJ="tokenType",eQ="com.amazonaws.signin";var eX=[0,eQ,"RefreshToken",8,0],e0=[-3,eQ,"AccessDeniedException",{[eM]:eF},[eM,eZ],[0,0]];ex.O.for(eQ).registerError(e0,eC);var e4=[3,eQ,"AccessToken",8,[eT,eG,eW],[[0,{[eL]:eT}],[0,{[eL]:eG}],[0,{[eL]:eW}]]],e1=[3,eQ,"CreateOAuth2TokenRequest",0,["tokenInput"],[[()=>e2,16]]],e2=[3,eQ,"CreateOAuth2TokenRequestBody",0,[eH,eV,"code",eK,eq,eB],[[0,{[eL]:eH}],[0,{[eL]:eV}],0,[0,{[eL]:eK}],[0,{[eL]:eq}],[()=>eX,{[eL]:eB}]]],e6=[3,eQ,"CreateOAuth2TokenResponse",0,["tokenOutput"],[[()=>e3,16]]],e3=[3,eQ,"CreateOAuth2TokenResponseBody",0,[eU,eJ,eN,eB,ez],[[()=>e4,{[eL]:eU}],[0,{[eL]:eJ}],[1,{[eL]:eN}],[()=>eX,{[eL]:eB}],[0,{[eL]:ez}]]],e8=[-3,eQ,"InternalServerException",{[eM]:"server",[e$]:500},[eM,eZ],[0,0]];ex.O.for(eQ).registerError(e8,eO);var e5=[-3,eQ,"TooManyRequestsError",{[eM]:eF,[e$]:429},[eM,eZ],[0,0]];ex.O.for(eQ).registerError(e5,eR);var e9=[-3,eQ,"ValidationException",{[eM]:eF,[e$]:400},[eM,eZ],[0,0]];ex.O.for(eQ).registerError(e9,eD);var e7=[-3,eY,"SigninServiceException",0,[],[]];ex.O.for(eY).registerError(e7,eb);var te=[9,eQ,"CreateOAuth2Token",{http:["POST","/v1/token",200]},()=>e1,()=>e6];class tt extends eE.u.classBuilder().ep(k).m(function(e,t,s,i){return[(0,ej.r)(s,e.getEndpointParameterInstructions())]}).s("Signin","CreateOAuth2Token",{}).n("SigninClient","CreateOAuth2TokenCommand").sc(te).build(){}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
package/dist/cjs/0~216.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["216"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"(e,t,s){s.d(t,{getDefaultRoleAssumerWithWebIdentity:()=>tJ,getDefaultRoleAssumer:()=>tZ});var i=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),o=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),r=s("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js");let n=!1;var d=s("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),a=s("./node_modules/@smithy/smithy-client/dist-es/command.js");let l={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var c=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),u=s("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class m extends u.T{constructor(e){super(e),Object.setPrototypeOf(this,m.prototype)}}class h extends m{name="ExpiredTokenException";$fault="client";constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,h.prototype)}}class p extends m{name="MalformedPolicyDocumentException";$fault="client";constructor(e){super({name:"MalformedPolicyDocumentException",$fault:"client",...e}),Object.setPrototypeOf(this,p.prototype)}}class g extends m{name="PackedPolicyTooLargeException";$fault="client";constructor(e){super({name:"PackedPolicyTooLargeException",$fault:"client",...e}),Object.setPrototypeOf(this,g.prototype)}}class f extends m{name="RegionDisabledException";$fault="client";constructor(e){super({name:"RegionDisabledException",$fault:"client",...e}),Object.setPrototypeOf(this,f.prototype)}}class y extends m{name="IDPRejectedClaimException";$fault="client";constructor(e){super({name:"IDPRejectedClaimException",$fault:"client",...e}),Object.setPrototypeOf(this,y.prototype)}}class S extends m{name="InvalidIdentityTokenException";$fault="client";constructor(e){super({name:"InvalidIdentityTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,S.prototype)}}class w extends m{name="IDPCommunicationErrorException";$fault="client";constructor(e){super({name:"IDPCommunicationErrorException",$fault:"client",...e}),Object.setPrototypeOf(this,w.prototype)}}let E="AssumedRoleUser",b="Credentials",v="DurationSeconds",P="Policy",x="PolicyArns",A="PackedPolicySize",C="RoleArn",j="RoleSessionName",_="SourceIdentity",I="awsQueryError",k="client",R="error",T="httpError",D="message",$="smithy.ts.sdk.synthetic.com.amazonaws.sts",O="com.amazonaws.sts";var z=[0,O,"accessKeySecretType",8,0],N=[0,O,"clientTokenType",8,0],U=[3,O,E,0,["AssumedRoleId","Arn"],[0,0]],K=[3,O,"AssumeRoleRequest",0,[C,j,x,P,v,"Tags","TransitiveTagKeys","ExternalId","SerialNumber","TokenCode",_,"ProvidedContexts"],[0,0,()=>et,0,1,()=>ei,64,0,0,0,0,()=>es]],M=[3,O,"AssumeRoleResponse",0,[b,E,A,_],[[()=>W,0],()=>U,1,0]],L=[3,O,"AssumeRoleWithWebIdentityRequest",0,[C,j,"WebIdentityToken","ProviderId",x,P,v],[0,0,[()=>N,0],0,()=>et,0,1]],V=[3,O,"AssumeRoleWithWebIdentityResponse",0,[b,"SubjectFromWebIdentityToken",E,A,"Provider","Audience",_],[[()=>W,0],0,()=>U,1,0,0,0]],W=[3,O,b,0,["AccessKeyId","SecretAccessKey","SessionToken","Expiration"],[0,[()=>z,0],0,4]],F=[-3,O,"ExpiredTokenException",{[I]:["ExpiredTokenException",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(F,h);var q=[-3,O,"IDPCommunicationErrorException",{[I]:["IDPCommunicationError",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(q,w);var H=[-3,O,"IDPRejectedClaimException",{[I]:["IDPRejectedClaim",403],[R]:k,[T]:403},[D],[0]];c.O.for(O).registerError(H,y);var B=[-3,O,"InvalidIdentityTokenException",{[I]:["InvalidIdentityToken",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(B,S);var Q=[-3,O,"MalformedPolicyDocumentException",{[I]:["MalformedPolicyDocument",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(Q,p);var G=[-3,O,"PackedPolicyTooLargeException",{[I]:["PackedPolicyTooLarge",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(G,g);var Z=[3,O,"PolicyDescriptorType",0,["arn"],[0]],J=[3,O,"ProvidedContext",0,["ProviderArn","ContextAssertion"],[0,0]],X=[-3,O,"RegionDisabledException",{[I]:["RegionDisabledException",403],[R]:k,[T]:403},[D],[0]];c.O.for(O).registerError(X,f);var Y=[3,O,"Tag",0,["Key","Value"],[0,0]],ee=[-3,$,"STSServiceException",0,[],[]];c.O.for($).registerError(ee,m);var et=[1,O,"policyDescriptorListType",0,()=>Z],es=[1,O,"ProvidedContextsListType",0,()=>J],ei=[1,O,"tagListType",0,()=>Y],eo=[9,O,"AssumeRole",0,()=>K,()=>M],er=[9,O,"AssumeRoleWithWebIdentity",0,()=>L,()=>V];class en extends a.u.classBuilder().ep(l).m(function(e,t,s,i){return[(0,d.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").sc(eo).build(){}class ed extends a.u.classBuilder().ep(l).m(function(e,t,s,i){return[(0,d.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").sc(er).build(){}let ea=e=>{if("string"==typeof e?.Arn){let t=e.Arn.split(":");if(t.length>4&&""!==t[4])return t[4]}},el=async(e,t,s,i={})=>{let d="function"==typeof e?await e():e,a="function"==typeof t?await t():t,l="",c=d??a??(l=await (function(e={}){return(0,r.Z)({...o.GG,default:async()=>(n||console.warn("@aws-sdk - WARN - default STS region of us-east-1 used. See @aws-sdk/credential-providers README and set a region explicitly."),"us-east-1")},{...o.zH,...e})})(i)());return s?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${d} (credential provider clientConfig)`,`${a} (contextual client)`,`${l} (STS default: AWS_REGION, profile region, or us-east-1)`),c},ec=e=>e?.metadata?.handlerProtocol==="h2";var eu=s("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),em=s("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),eh=s("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),ep=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),eg=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),ef=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),ey=s("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),eS=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),ew=s("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),eE=s("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),eb=s("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),ev=s("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),eP=s("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),ex=s("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),eA=s("./node_modules/@smithy/smithy-client/dist-es/client.js"),eC=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),ej=s("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),e_=s("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let eI=async(e,t,s)=>({operation:(0,ej.u)(t).operation,region:await (0,e_.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),ek=e=>{let t=[];if("AssumeRoleWithWebIdentity"===e.operation)t.push({schemeId:"smithy.api#noAuth"});else t.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})});return t};var eR=s("./node_modules/@aws-sdk/nested-clients/package.json"),eT=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),eD=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),e$=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),eO=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),ez=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),eN=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),eU=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),eK=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),eM=s("./node_modules/@smithy/hash-node/dist-es/index.js"),eL=s("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),eV=s("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),eW=s("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),eF=s("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),eq=s("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),eH=s("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),eB=s("./node_modules/@smithy/util-retry/dist-es/config.js"),eQ=s("./node_modules/@smithy/core/dist-es/submodules/schema/schemas/NormalizedSchema.js"),eG=s("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),eZ=s("./node_modules/@smithy/core/dist-es/submodules/protocols/collect-stream-body.js"),eJ=s("./node_modules/@smithy/core/dist-es/submodules/protocols/HttpProtocol.js");class eX extends eJ.t{async serializeRequest(e,t,s){let i,o=this.serializer,r={},n={},d=await s.endpoint(),a=eQ.l.of(e?.input),l=a.getSchema(),c=new eG.K({protocol:"",hostname:"",port:void 0,path:"/",fragment:void 0,query:r,headers:n,body:void 0});d&&(this.updateServiceEndpoint(c,d),this.setHostPrefix(c,e,t));let u={...t};if(t){let e=a.getEventStreamMember();if(e){if(u[e]){let t={};for(let[s,i]of a.structIterator())s!==e&&u[s]&&(o.write(i,u[s]),t[s]=o.flush());i=await this.serializeEventStream({eventStream:u[e],requestSchema:a,initialRequest:t})}}else o.write(l,u),i=o.flush()}return c.headers=n,c.query=r,c.body=i,c.method="POST",c}async deserializeResponse(e,t,s){let i=this.deserializer,o=eQ.l.of(e.output),r={};if(s.statusCode>=300){let o=await (0,eZ.P)(s.body,t);throw o.byteLength>0&&Object.assign(r,await i.read(15,o)),await this.handleError(e,t,s,r,this.deserializeMetadata(s)),Error("@smithy/core/protocols - RPC Protocol error handler failed to throw.")}for(let e in s.headers){let t=s.headers[e];delete s.headers[e],s.headers[e.toLowerCase()]=t}let n=o.getEventStreamMember();if(n)r[n]=await this.deserializeEventStream({response:s,responseSchema:o,initialResponseContainer:r});else{let e=await (0,eZ.P)(s.body,t);e.byteLength>0&&Object.assign(r,await i.read(o,e))}return r.$metadata=this.deserializeMetadata(s),r}}var eY=s("./node_modules/@smithy/core/dist-es/submodules/schema/deref.js"),e0=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ProtocolLib.js"),e1=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/xml/XmlShapeDeserializer.js"),e4=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/determineTimestampFormat.js"),e3=s("./node_modules/@smithy/core/dist-es/submodules/protocols/extended-encode-uri-component.js"),e6=s("./node_modules/@smithy/uuid/dist-es/v4.js"),e2=s("./node_modules/@smithy/core/dist-es/submodules/serde/value/NumericValue.js"),e5=s("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),e8=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),e9=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ConfigurableSerdeContext.js"),e7=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/structIterator.js");class te extends e9.B{settings;buffer;constructor(e){super(),this.settings=e}write(e,t,s=""){void 0===this.buffer&&(this.buffer="");let i=eQ.l.of(e);if(s&&!s.endsWith(".")&&(s+="."),i.isBlobSchema())("string"==typeof t||t instanceof Uint8Array)&&(this.writeKey(s),this.writeValue((this.serdeContext?.base64Encoder??e8.n)(t)));else if(i.isBooleanSchema()||i.isNumericSchema()||i.isStringSchema())null!=t?(this.writeKey(s),this.writeValue(String(t))):i.isIdempotencyToken()&&(this.writeKey(s),this.writeValue((0,e6.v4)()));else if(i.isBigIntegerSchema())null!=t&&(this.writeKey(s),this.writeValue(String(t)));else if(i.isBigDecimalSchema())null!=t&&(this.writeKey(s),this.writeValue(t instanceof e2.D?t.string:String(t)));else if(i.isTimestampSchema()){if(t instanceof Date)switch(this.writeKey(s),(0,e4.V)(i,this.settings)){case 5:this.writeValue(t.toISOString().replace(".000Z","Z"));break;case 6:this.writeValue((0,e5.JV)(t));break;case 7:this.writeValue(String(t.getTime()/1e3))}}else if(i.isDocumentSchema())Array.isArray(t)?this.write(79,t,s):t instanceof Date?this.write(4,t,s):t instanceof Uint8Array?this.write(21,t,s):t&&"object"==typeof t?this.write(143,t,s):(this.writeKey(s),this.writeValue(String(t)));else if(i.isListSchema()){if(Array.isArray(t))if(0===t.length)this.settings.serializeEmptyLists&&(this.writeKey(s),this.writeValue(""));else{let e=i.getValueSchema(),o=this.settings.flattenLists||i.getMergedTraits().xmlFlattened,r=1;for(let i of t){if(null==i)continue;let t=this.getKey("member",e.getMergedTraits().xmlName),n=o?`${s}${r}`:`${s}${t}.${r}`;this.write(e,i,n),++r}}}else if(i.isMapSchema()){if(t&&"object"==typeof t){let e=i.getKeySchema(),o=i.getValueSchema(),r=i.getMergedTraits().xmlFlattened,n=1;for(let[i,d]of Object.entries(t)){if(null==d)continue;let t=this.getKey("key",e.getMergedTraits().xmlName),a=r?`${s}${n}.${t}`:`${s}entry.${n}.${t}`,l=this.getKey("value",o.getMergedTraits().xmlName),c=r?`${s}${n}.${l}`:`${s}entry.${n}.${l}`;this.write(e,i,a),this.write(o,d,c),++n}}}else if(i.isStructSchema()){if(t&&"object"==typeof t){let e=!1;for(let[o,r]of(0,e7.R)(i,t)){if(null==t[o]&&!r.isIdempotencyToken())continue;let i=this.getKey(o,r.getMergedTraits().xmlName),n=`${s}${i}`;this.write(r,t[o],n),e=!0}if(!e&&i.isUnionSchema()){let{$unknown:e}=t;if(Array.isArray(e)){let[t,i]=e,o=`${s}${t}`;this.write(15,i,o)}}}}else if(i.isUnitSchema());else throw Error(`@aws-sdk/core/protocols - QuerySerializer unrecognized schema type ${i.getName(!0)}`)}flush(){if(void 0===this.buffer)throw Error("@aws-sdk/core/protocols - QuerySerializer cannot flush with nothing written to buffer.");let e=this.buffer;return delete this.buffer,e}getKey(e,t){let s=t??e;return this.settings.capitalizeKeys?s[0].toUpperCase()+s.slice(1):s}writeKey(e){e.endsWith(".")&&(e=e.slice(0,e.length-1)),this.buffer+=`&${(0,e3.$)(e)}=`}writeValue(e){this.buffer+=(0,e3.$)(e)}}class tt extends eX{options;serializer;deserializer;mixin=new e0.U;constructor(e){super({defaultNamespace:e.defaultNamespace}),this.options=e;const t={timestampFormat:{useTrait:!0,default:5},httpBindings:!1,xmlNamespace:e.xmlNamespace,serviceNamespace:e.defaultNamespace,serializeEmptyLists:!0};this.serializer=new te(t),this.deserializer=new e1._(t)}getShapeId(){return"aws.protocols#awsQuery"}setSerdeContext(e){this.serializer.setSerdeContext(e),this.deserializer.setSerdeContext(e)}getPayloadCodec(){throw Error("AWSQuery protocol has no payload codec.")}async serializeRequest(e,t,s){let i=await super.serializeRequest(e,t,s);i.path.endsWith("/")||(i.path+="/"),Object.assign(i.headers,{"content-type":"application/x-www-form-urlencoded"}),"unit"!==(0,eY.L)(e.input)&&i.body||(i.body="");let o=e.name.split("#")[1]??e.name;return i.body=`Action=${o}&Version=${this.options.version}`+i.body,i.body.endsWith("&")&&(i.body=i.body.slice(-1)),i}async deserializeResponse(e,t,s){let i=this.deserializer,o=eQ.l.of(e.output),r={};if(s.statusCode>=300){let o=await (0,eZ.P)(s.body,t);o.byteLength>0&&Object.assign(r,await i.read(15,o)),await this.handleError(e,t,s,r,this.deserializeMetadata(s))}for(let e in s.headers){let t=s.headers[e];delete s.headers[e],s.headers[e.toLowerCase()]=t}let n=e.name.split("#")[1]??e.name,d=o.isStructSchema()&&this.useNestedResult()?n+"Result":void 0,a=await (0,eZ.P)(s.body,t);return a.byteLength>0&&Object.assign(r,await i.read(o,a,d)),{$metadata:this.deserializeMetadata(s),...r}}useNestedResult(){return!0}async handleError(e,t,s,i,o){let r=this.loadQueryErrorCode(s,i)??"Unknown",n=this.loadQueryError(i),d=this.loadQueryErrorMessage(i);n.message=d,n.Error={Type:n.Type,Code:n.Code,Message:d};let{errorSchema:a,errorMetadata:l}=await this.mixin.getErrorSchemaOrThrowBaseException(r,this.options.defaultNamespace,s,n,o,this.mixin.findQueryCompatibleError),u=eQ.l.of(a),m=new(c.O.for(a[1]).getErrorCtor(a)??Error)(d),h={Type:n.Error.Type,Code:n.Error.Code,Error:n.Error};for(let[e,t]of u.structIterator()){let s=t.getMergedTraits().xmlName??e,o=n[s]??i[s];h[e]=this.deserializer.readSchema(t,o)}throw this.mixin.decorateServiceException(Object.assign(m,l,{$fault:u.getMergedTraits().error,message:d},h),i)}loadQueryErrorCode(e,t){let s=(t.Errors?.[0]?.Error??t.Errors?.Error??t.Error)?.Code;return void 0!==s?s:404==e.statusCode?"NotFound":void 0}loadQueryError(e){return e.Errors?.[0]?.Error??e.Errors?.Error??e.Error}loadQueryErrorMessage(e){let t=this.loadQueryError(e);return t?.message??t?.Message??e.message??e.Message??"Unknown"}getDefaultContentType(){return"application/x-www-form-urlencoded"}}var ts=s("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),ti=s("./node_modules/@smithy/url-parser/dist-es/index.js"),to=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),tr=s("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),tn=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),td=s("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),ta=s("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),tl=s("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),tc=s("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let tu="required",tm="type",th="argv",tp="booleanEquals",tg="stringEquals",tf="sigv4",ty="us-east-1",tS="endpoint",tw="https://sts.{Region}.{PartitionResult#dnsSuffix}",tE="tree",tb="error",tv="getAttr",tP={[tu]:!1,[tm]:"string"},tx={[tu]:!0,default:!1,[tm]:"boolean"},tA={ref:"Endpoint"},tC={fn:"isSet",[th]:[{ref:"Region"}]},tj={ref:"Region"},t_={fn:"aws.partition",[th]:[tj],assign:"PartitionResult"},tI={ref:"UseFIPS"},tk={ref:"UseDualStack"},tR={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:tf,signingName:"sts",signingRegion:ty}]},headers:{}},tT={},tD={conditions:[{fn:tg,[th]:[tj,"aws-global"]}],[tS]:tR,[tm]:tS},t$={fn:tp,[th]:[tI,!0]},tO={fn:tp,[th]:[tk,!0]},tz={fn:tv,[th]:[{ref:"PartitionResult"},"supportsFIPS"]},tN={ref:"PartitionResult"},tU={fn:tp,[th]:[!0,{fn:tv,[th]:[tN,"supportsDualStack"]}]},tK=[{fn:"isSet",[th]:[tA]}],tM=[t$],tL=[tO],tV={version:"1.0",parameters:{Region:tP,UseDualStack:tx,UseFIPS:tx,Endpoint:tP,UseGlobalEndpoint:tx},rules:[{conditions:[{fn:tp,[th]:[{ref:"UseGlobalEndpoint"},!0]},{fn:"not",[th]:tK},tC,t_,{fn:tp,[th]:[tI,!1]},{fn:tp,[th]:[tk,!1]}],rules:[{conditions:[{fn:tg,[th]:[tj,"ap-northeast-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"ap-south-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"ap-southeast-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"ap-southeast-2"]}],endpoint:tR,[tm]:tS},tD,{conditions:[{fn:tg,[th]:[tj,"ca-central-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-central-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-north-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-west-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-west-2"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-west-3"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"sa-east-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,ty]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"us-east-2"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"us-west-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"us-west-2"]}],endpoint:tR,[tm]:tS},{endpoint:{url:tw,properties:{authSchemes:[{name:tf,signingName:"sts",signingRegion:"{Region}"}]},headers:tT},[tm]:tS}],[tm]:tE},{conditions:tK,rules:[{conditions:tM,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[tm]:tb},{conditions:tL,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[tm]:tb},{endpoint:{url:tA,properties:tT,headers:tT},[tm]:tS}],[tm]:tE},{conditions:[tC],rules:[{conditions:[t_],rules:[{conditions:[t$,tO],rules:[{conditions:[{fn:tp,[th]:[!0,tz]},tU],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:tT,headers:tT},[tm]:tS}],[tm]:tE},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[tm]:tb}],[tm]:tE},{conditions:tM,rules:[{conditions:[{fn:tp,[th]:[tz,!0]}],rules:[{conditions:[{fn:tg,[th]:[{fn:tv,[th]:[tN,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:tT,headers:tT},[tm]:tS},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:tT,headers:tT},[tm]:tS}],[tm]:tE},{error:"FIPS is enabled but this partition does not support FIPS",[tm]:tb}],[tm]:tE},{conditions:tL,rules:[{conditions:[tU],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:tT,headers:tT},[tm]:tS}],[tm]:tE},{error:"DualStack is enabled but this partition does not support DualStack",[tm]:tb}],[tm]:tE},tD,{endpoint:{url:tw,properties:tT,headers:tT},[tm]:tS}],[tm]:tE}],[tm]:tE},{error:"Invalid Configuration: Missing Region",[tm]:tb}]},tW=new ta.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),tF=(e,t={})=>tW.get(e,()=>(0,tl.s)(tV,{endpointParams:e,logger:t.logger}));tc.m.aws=td.UF;var tq=s("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),tH=s("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),tB=s("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class tQ extends eA.K{config;constructor(...[e]){const t=(e=>{(0,eW.I)(process.version);let t=(0,eH.I)(e),s=()=>t().then(eF.l),i={apiVersion:"2011-06-15",base64Decoder:e?.base64Decoder??to.E,base64Encoder:e?.base64Encoder??e8.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??tF,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??ek,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new e$.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new eK.m}],logger:e?.logger??new ts.N,protocol:e?.protocol??tt,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sts",xmlNamespace:"https://sts.amazonaws.com/doc/2011-06-15/",version:"2011-06-15",serviceTarget:"AWSSecurityTokenServiceV20110615"},serviceId:e?.serviceId??"STS",urlParser:e?.urlParser??ti.D,utf8Decoder:e?.utf8Decoder??tr.a,utf8Encoder:e?.utf8Encoder??tn.P};(0,eT.I)(process.version);let n={profile:e?.profile,logger:i.logger};return{...i,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,r.Z)(eD.$,n),bodyLengthChecker:e?.bodyLengthChecker??eq.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,eO.pf)({serviceId:i.serviceId,clientVersion:eR.rE}),httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:t=>t.getIdentityProvider("aws.auth#sigv4")||(async t=>await e.credentialDefaultProvider(t?.__config||{})()),signer:new e$.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new eK.m}],maxAttempts:e?.maxAttempts??(0,r.Z)(eP.qs,e),region:e?.region??(0,r.Z)(o.GG,{...o.zH,...n}),requestHandler:eL.$.create(e?.requestHandler??s),retryMode:e?.retryMode??(0,r.Z)({...eP.kN,default:async()=>(await s()).retryMode||eB.L},e),sha256:e?.sha256??eM.V.bind(null,"sha256"),streamCollector:e?.streamCollector??eV.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,r.Z)(eN.e$,n),useFipsEndpoint:e?.useFipsEndpoint??(0,r.Z)(eU.Ko,n),userAgentAppId:e?.userAgentAppId??(0,r.Z)(ez.hV,n)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,useGlobalEndpoint:e.useGlobalEndpoint??!1,defaultSigningName:"sts"}))(t),i=(0,ep.D)(s),n=(0,eP.$z)(i),d=(0,ef.T)(n),a=(0,eu.OV)(d),l=((e,t)=>{let s,i,o,r=Object.assign((0,tq.R)(e),(0,tB.xA)(e),(0,tH.e)(e),(s=e.httpAuthSchemes,i=e.httpAuthSchemeProvider,o=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){i=e},httpAuthSchemeProvider:()=>i,setCredentials(e){o=e},credentials:()=>o}));return t.forEach(e=>e.configure(r)),Object.assign(e,(0,tq.$)(r),(0,tB.uv)(r),(0,tH.j)(r),{httpAuthSchemes:r.httpAuthSchemes(),httpAuthSchemeProvider:r.httpAuthSchemeProvider(),credentials:r.credentials()})})((e=>{let t=Object.assign(e,{stsClientCtor:tQ});return Object.assign((0,eC.h)(t),{authSchemePreference:(0,e_.t)(e.authSchemePreference??[])})})((0,ev.C)(a)),e?.extensions||[]);this.config=l,this.middlewareStack.use((0,eE.wq)(this.config)),this.middlewareStack.use((0,eg.sM)(this.config)),this.middlewareStack.use((0,ex.ey)(this.config)),this.middlewareStack.use((0,eb.vK)(this.config)),this.middlewareStack.use((0,eu.TC)(this.config)),this.middlewareStack.use((0,em.Y7)(this.config)),this.middlewareStack.use((0,eh.n)(this.config)),this.middlewareStack.use((0,ey.w)(this.config,{httpAuthSchemeParametersProvider:eI,identityProviderConfigProvider:async e=>new eS.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,ew.l)(this.config))}destroy(){super.destroy()}}let tG=(e,t)=>t?class extends e{constructor(e){for(const s of(super(e),t))this.middlewareStack.use(s)}}:e,tZ=(e={},t)=>{var s;let o,r;return s=tG(tQ,t),async(t,n)=>{if(r=t,!o){let{logger:t=e?.parentClientConfig?.logger,profile:i=e?.parentClientConfig?.profile,region:n,requestHandler:d=e?.parentClientConfig?.requestHandler,credentialProviderLogger:a,userAgentAppId:l=e?.parentClientConfig?.userAgentAppId}=e,c=await el(n,e?.parentClientConfig?.region,a,{logger:t,profile:i}),u=!ec(d);o=new s({...e,userAgentAppId:l,profile:i,credentialDefaultProvider:()=>async()=>r,region:c,requestHandler:u?d:void 0,logger:t})}let{Credentials:d,AssumedRoleUser:a}=await o.send(new en(n));if(!d||!d.AccessKeyId||!d.SecretAccessKey)throw Error(`Invalid response from STS.assumeRole call with role ${n.RoleArn}`);let l=ea(a),c={accessKeyId:d.AccessKeyId,secretAccessKey:d.SecretAccessKey,sessionToken:d.SessionToken,expiration:d.Expiration,...d.CredentialScope&&{credentialScope:d.CredentialScope},...l&&{accountId:l}};return(0,i.g)(c,"CREDENTIALS_STS_ASSUME_ROLE","i"),c}},tJ=(e={},t)=>{var s;let o;return s=tG(tQ,t),async t=>{if(!o){let{logger:t=e?.parentClientConfig?.logger,profile:i=e?.parentClientConfig?.profile,region:r,requestHandler:n=e?.parentClientConfig?.requestHandler,credentialProviderLogger:d,userAgentAppId:a=e?.parentClientConfig?.userAgentAppId}=e,l=await el(r,e?.parentClientConfig?.region,d,{logger:t,profile:i}),c=!ec(n);o=new s({...e,userAgentAppId:a,profile:i,region:l,requestHandler:c?n:void 0,logger:t})}let{Credentials:r,AssumedRoleUser:n}=await o.send(new ed(t));if(!r||!r.AccessKeyId||!r.SecretAccessKey)throw Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${t.RoleArn}`);let d=ea(n),a={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,sessionToken:r.SessionToken,expiration:r.Expiration,...r.CredentialScope&&{credentialScope:r.CredentialScope},...d&&{accountId:d}};return d&&(0,i.g)(a,"RESOLVED_ACCOUNT_ID","T"),(0,i.g)(a,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),a}}},"./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"(e,t,s){s.d(t,{m:()=>i});class i{async sign(e,t,s){return e}}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["216"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"(e,t,s){s.d(t,{getDefaultRoleAssumerWithWebIdentity:()=>defaultRoleAssumers_getDefaultRoleAssumerWithWebIdentity,getDefaultRoleAssumer:()=>defaultRoleAssumers_getDefaultRoleAssumer});var i=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),o=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),r=s("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js");function stsRegionDefaultResolver(e={}){return(0,r.Z)({...o.GG,default:async()=>(n.silence||console.warn("@aws-sdk - WARN - default STS region of us-east-1 used. See @aws-sdk/credential-providers README and set a region explicitly."),"us-east-1")},{...o.zH,...e})}let n={silence:!1};var d=s("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),a=s("./node_modules/@smithy/smithy-client/dist-es/command.js");let l={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var u=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),c=s("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class m extends c.T{constructor(e){super(e),Object.setPrototypeOf(this,m.prototype)}}class h extends m{name="ExpiredTokenException";$fault="client";constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,h.prototype)}}class p extends m{name="MalformedPolicyDocumentException";$fault="client";constructor(e){super({name:"MalformedPolicyDocumentException",$fault:"client",...e}),Object.setPrototypeOf(this,p.prototype)}}class g extends m{name="PackedPolicyTooLargeException";$fault="client";constructor(e){super({name:"PackedPolicyTooLargeException",$fault:"client",...e}),Object.setPrototypeOf(this,g.prototype)}}class f extends m{name="RegionDisabledException";$fault="client";constructor(e){super({name:"RegionDisabledException",$fault:"client",...e}),Object.setPrototypeOf(this,f.prototype)}}class y extends m{name="IDPRejectedClaimException";$fault="client";constructor(e){super({name:"IDPRejectedClaimException",$fault:"client",...e}),Object.setPrototypeOf(this,y.prototype)}}class S extends m{name="InvalidIdentityTokenException";$fault="client";constructor(e){super({name:"InvalidIdentityTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,S.prototype)}}class w extends m{name="IDPCommunicationErrorException";$fault="client";constructor(e){super({name:"IDPCommunicationErrorException",$fault:"client",...e}),Object.setPrototypeOf(this,w.prototype)}}let E="AssumedRoleUser",b="Credentials",v="DurationSeconds",A="Policy",P="PolicyArns",C="PackedPolicySize",x="RoleArn",I="RoleSessionName",_="SourceIdentity",R="awsQueryError",j="client",k="error",T="httpError",D="message",O="smithy.ts.sdk.synthetic.com.amazonaws.sts",$="com.amazonaws.sts";var z=[0,$,"accessKeySecretType",8,0],N=[0,$,"clientTokenType",8,0],U=[3,$,E,0,["AssumedRoleId","Arn"],[0,0]],K=[3,$,"AssumeRoleRequest",0,[x,I,P,A,v,"Tags","TransitiveTagKeys","ExternalId","SerialNumber","TokenCode",_,"ProvidedContexts"],[0,0,()=>et,0,1,()=>ei,64,0,0,0,0,()=>es]],M=[3,$,"AssumeRoleResponse",0,[b,E,C,_],[[()=>V,0],()=>U,1,0]],W=[3,$,"AssumeRoleWithWebIdentityRequest",0,[x,I,"WebIdentityToken","ProviderId",P,A,v],[0,0,[()=>N,0],0,()=>et,0,1]],L=[3,$,"AssumeRoleWithWebIdentityResponse",0,[b,"SubjectFromWebIdentityToken",E,C,"Provider","Audience",_],[[()=>V,0],0,()=>U,1,0,0,0]],V=[3,$,b,0,["AccessKeyId","SecretAccessKey","SessionToken","Expiration"],[0,[()=>z,0],0,4]],H=[-3,$,"ExpiredTokenException",{[R]:["ExpiredTokenException",400],[k]:j,[T]:400},[D],[0]];u.O.for($).registerError(H,h);var F=[-3,$,"IDPCommunicationErrorException",{[R]:["IDPCommunicationError",400],[k]:j,[T]:400},[D],[0]];u.O.for($).registerError(F,w);var q=[-3,$,"IDPRejectedClaimException",{[R]:["IDPRejectedClaim",403],[k]:j,[T]:403},[D],[0]];u.O.for($).registerError(q,y);var B=[-3,$,"InvalidIdentityTokenException",{[R]:["InvalidIdentityToken",400],[k]:j,[T]:400},[D],[0]];u.O.for($).registerError(B,S);var Q=[-3,$,"MalformedPolicyDocumentException",{[R]:["MalformedPolicyDocument",400],[k]:j,[T]:400},[D],[0]];u.O.for($).registerError(Q,p);var G=[-3,$,"PackedPolicyTooLargeException",{[R]:["PackedPolicyTooLarge",400],[k]:j,[T]:400},[D],[0]];u.O.for($).registerError(G,g);var Z=[3,$,"PolicyDescriptorType",0,["arn"],[0]],J=[3,$,"ProvidedContext",0,["ProviderArn","ContextAssertion"],[0,0]],X=[-3,$,"RegionDisabledException",{[R]:["RegionDisabledException",403],[k]:j,[T]:403},[D],[0]];u.O.for($).registerError(X,f);var Y=[3,$,"Tag",0,["Key","Value"],[0,0]],ee=[-3,O,"STSServiceException",0,[],[]];u.O.for(O).registerError(ee,m);var et=[1,$,"policyDescriptorListType",0,()=>Z],es=[1,$,"ProvidedContextsListType",0,()=>J],ei=[1,$,"tagListType",0,()=>Y],eo=[9,$,"AssumeRole",0,()=>K,()=>M],er=[9,$,"AssumeRoleWithWebIdentity",0,()=>W,()=>L];class en extends a.u.classBuilder().ep(l).m(function(e,t,s,i){return[(0,d.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").sc(eo).build(){}class ed extends a.u.classBuilder().ep(l).m(function(e,t,s,i){return[(0,d.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").sc(er).build(){}let getAccountIdFromAssumedRoleUser=e=>{if("string"==typeof e?.Arn){let t=e.Arn.split(":");if(t.length>4&&""!==t[4])return t[4]}},resolveRegion=async(e,t,s,i={})=>{let o="function"==typeof e?await e():e,r="function"==typeof t?await t():t,n="",d=o??r??(n=await stsRegionDefaultResolver(i)());return s?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${o} (credential provider clientConfig)`,`${r} (contextual client)`,`${n} (STS default: AWS_REGION, profile region, or us-east-1)`),d},isH2=e=>e?.metadata?.handlerProtocol==="h2";var ea=s("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),el=s("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),eu=s("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),ec=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),em=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),eh=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),ep=s("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),eg=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),ef=s("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),ey=s("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),eS=s("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),ew=s("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),eE=s("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),eb=s("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),ev=s("./node_modules/@smithy/smithy-client/dist-es/client.js"),eA=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),eP=s("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),eC=s("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let defaultSTSHttpAuthSchemeParametersProvider=async(e,t,s)=>({operation:(0,eP.u)(t).operation,region:await (0,eC.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()});function createAwsAuthSigv4HttpAuthOption(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})}}function createSmithyApiNoAuthHttpAuthOption(e){return{schemeId:"smithy.api#noAuth"}}let defaultSTSHttpAuthSchemeProvider=e=>{let t=[];return"AssumeRoleWithWebIdentity"===e.operation?t.push(createSmithyApiNoAuthHttpAuthOption(e)):t.push(createAwsAuthSigv4HttpAuthOption(e)),t};var ex=s("./node_modules/@aws-sdk/nested-clients/package.json"),eI=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),e_=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),eR=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),ej=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),ek=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),eT=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),eD=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),eO=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),e$=s("./node_modules/@smithy/hash-node/dist-es/index.js"),ez=s("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),eN=s("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),eU=s("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),eK=s("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),eM=s("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),eW=s("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),eL=s("./node_modules/@smithy/util-retry/dist-es/config.js"),eV=s("./node_modules/@smithy/core/dist-es/submodules/schema/schemas/NormalizedSchema.js"),eH=s("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),eF=s("./node_modules/@smithy/core/dist-es/submodules/protocols/collect-stream-body.js"),eq=s("./node_modules/@smithy/core/dist-es/submodules/protocols/HttpProtocol.js");class eB extends eq.t{async serializeRequest(e,t,s){let i,o=this.serializer,r={},n={},d=await s.endpoint(),a=eV.l.of(e?.input),l=a.getSchema(),u=new eH.K({protocol:"",hostname:"",port:void 0,path:"/",fragment:void 0,query:r,headers:n,body:void 0});d&&(this.updateServiceEndpoint(u,d),this.setHostPrefix(u,e,t));let c={...t};if(t){let e=a.getEventStreamMember();if(e){if(c[e]){let t={};for(let[s,i]of a.structIterator())s!==e&&c[s]&&(o.write(i,c[s]),t[s]=o.flush());i=await this.serializeEventStream({eventStream:c[e],requestSchema:a,initialRequest:t})}}else o.write(l,c),i=o.flush()}return u.headers=n,u.query=r,u.body=i,u.method="POST",u}async deserializeResponse(e,t,s){let i=this.deserializer,o=eV.l.of(e.output),r={};if(s.statusCode>=300){let o=await (0,eF.P)(s.body,t);throw o.byteLength>0&&Object.assign(r,await i.read(15,o)),await this.handleError(e,t,s,r,this.deserializeMetadata(s)),Error("@smithy/core/protocols - RPC Protocol error handler failed to throw.")}for(let e in s.headers){let t=s.headers[e];delete s.headers[e],s.headers[e.toLowerCase()]=t}let n=o.getEventStreamMember();if(n)r[n]=await this.deserializeEventStream({response:s,responseSchema:o,initialResponseContainer:r});else{let e=await (0,eF.P)(s.body,t);e.byteLength>0&&Object.assign(r,await i.read(o,e))}return r.$metadata=this.deserializeMetadata(s),r}}var eQ=s("./node_modules/@smithy/core/dist-es/submodules/schema/deref.js"),eG=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ProtocolLib.js"),eZ=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/xml/XmlShapeDeserializer.js"),eJ=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/determineTimestampFormat.js"),eX=s("./node_modules/@smithy/core/dist-es/submodules/protocols/extended-encode-uri-component.js"),eY=s("./node_modules/@smithy/uuid/dist-es/v4.js"),e0=s("./node_modules/@smithy/core/dist-es/submodules/serde/value/NumericValue.js"),e1=s("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),e4=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),e3=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ConfigurableSerdeContext.js"),e6=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/structIterator.js");class e2 extends e3.B{settings;buffer;constructor(e){super(),this.settings=e}write(e,t,s=""){void 0===this.buffer&&(this.buffer="");let i=eV.l.of(e);if(s&&!s.endsWith(".")&&(s+="."),i.isBlobSchema())("string"==typeof t||t instanceof Uint8Array)&&(this.writeKey(s),this.writeValue((this.serdeContext?.base64Encoder??e4.n)(t)));else if(i.isBooleanSchema()||i.isNumericSchema()||i.isStringSchema())null!=t?(this.writeKey(s),this.writeValue(String(t))):i.isIdempotencyToken()&&(this.writeKey(s),this.writeValue((0,eY.v4)()));else if(i.isBigIntegerSchema())null!=t&&(this.writeKey(s),this.writeValue(String(t)));else if(i.isBigDecimalSchema())null!=t&&(this.writeKey(s),this.writeValue(t instanceof e0.D?t.string:String(t)));else if(i.isTimestampSchema()){if(t instanceof Date)switch(this.writeKey(s),(0,eJ.V)(i,this.settings)){case 5:this.writeValue(t.toISOString().replace(".000Z","Z"));break;case 6:this.writeValue((0,e1.JV)(t));break;case 7:this.writeValue(String(t.getTime()/1e3))}}else if(i.isDocumentSchema())Array.isArray(t)?this.write(79,t,s):t instanceof Date?this.write(4,t,s):t instanceof Uint8Array?this.write(21,t,s):t&&"object"==typeof t?this.write(143,t,s):(this.writeKey(s),this.writeValue(String(t)));else if(i.isListSchema()){if(Array.isArray(t))if(0===t.length)this.settings.serializeEmptyLists&&(this.writeKey(s),this.writeValue(""));else{let e=i.getValueSchema(),o=this.settings.flattenLists||i.getMergedTraits().xmlFlattened,r=1;for(let i of t){if(null==i)continue;let t=this.getKey("member",e.getMergedTraits().xmlName),n=o?`${s}${r}`:`${s}${t}.${r}`;this.write(e,i,n),++r}}}else if(i.isMapSchema()){if(t&&"object"==typeof t){let e=i.getKeySchema(),o=i.getValueSchema(),r=i.getMergedTraits().xmlFlattened,n=1;for(let[i,d]of Object.entries(t)){if(null==d)continue;let t=this.getKey("key",e.getMergedTraits().xmlName),a=r?`${s}${n}.${t}`:`${s}entry.${n}.${t}`,l=this.getKey("value",o.getMergedTraits().xmlName),u=r?`${s}${n}.${l}`:`${s}entry.${n}.${l}`;this.write(e,i,a),this.write(o,d,u),++n}}}else if(i.isStructSchema()){if(t&&"object"==typeof t){let e=!1;for(let[o,r]of(0,e6.R)(i,t)){if(null==t[o]&&!r.isIdempotencyToken())continue;let i=this.getKey(o,r.getMergedTraits().xmlName),n=`${s}${i}`;this.write(r,t[o],n),e=!0}if(!e&&i.isUnionSchema()){let{$unknown:e}=t;if(Array.isArray(e)){let[t,i]=e,o=`${s}${t}`;this.write(15,i,o)}}}}else if(i.isUnitSchema());else throw Error(`@aws-sdk/core/protocols - QuerySerializer unrecognized schema type ${i.getName(!0)}`)}flush(){if(void 0===this.buffer)throw Error("@aws-sdk/core/protocols - QuerySerializer cannot flush with nothing written to buffer.");let e=this.buffer;return delete this.buffer,e}getKey(e,t){let s=t??e;return this.settings.capitalizeKeys?s[0].toUpperCase()+s.slice(1):s}writeKey(e){e.endsWith(".")&&(e=e.slice(0,e.length-1)),this.buffer+=`&${(0,eX.$)(e)}=`}writeValue(e){this.buffer+=(0,eX.$)(e)}}class e5 extends eB{options;serializer;deserializer;mixin=new eG.U;constructor(e){super({defaultNamespace:e.defaultNamespace}),this.options=e;const t={timestampFormat:{useTrait:!0,default:5},httpBindings:!1,xmlNamespace:e.xmlNamespace,serviceNamespace:e.defaultNamespace,serializeEmptyLists:!0};this.serializer=new e2(t),this.deserializer=new eZ._(t)}getShapeId(){return"aws.protocols#awsQuery"}setSerdeContext(e){this.serializer.setSerdeContext(e),this.deserializer.setSerdeContext(e)}getPayloadCodec(){throw Error("AWSQuery protocol has no payload codec.")}async serializeRequest(e,t,s){let i=await super.serializeRequest(e,t,s);i.path.endsWith("/")||(i.path+="/"),Object.assign(i.headers,{"content-type":"application/x-www-form-urlencoded"}),"unit"!==(0,eQ.L)(e.input)&&i.body||(i.body="");let o=e.name.split("#")[1]??e.name;return i.body=`Action=${o}&Version=${this.options.version}`+i.body,i.body.endsWith("&")&&(i.body=i.body.slice(-1)),i}async deserializeResponse(e,t,s){let i=this.deserializer,o=eV.l.of(e.output),r={};if(s.statusCode>=300){let o=await (0,eF.P)(s.body,t);o.byteLength>0&&Object.assign(r,await i.read(15,o)),await this.handleError(e,t,s,r,this.deserializeMetadata(s))}for(let e in s.headers){let t=s.headers[e];delete s.headers[e],s.headers[e.toLowerCase()]=t}let n=e.name.split("#")[1]??e.name,d=o.isStructSchema()&&this.useNestedResult()?n+"Result":void 0,a=await (0,eF.P)(s.body,t);return a.byteLength>0&&Object.assign(r,await i.read(o,a,d)),{$metadata:this.deserializeMetadata(s),...r}}useNestedResult(){return!0}async handleError(e,t,s,i,o){let r=this.loadQueryErrorCode(s,i)??"Unknown",n=this.loadQueryError(i),d=this.loadQueryErrorMessage(i);n.message=d,n.Error={Type:n.Type,Code:n.Code,Message:d};let{errorSchema:a,errorMetadata:l}=await this.mixin.getErrorSchemaOrThrowBaseException(r,this.options.defaultNamespace,s,n,o,this.mixin.findQueryCompatibleError),c=eV.l.of(a),m=new(u.O.for(a[1]).getErrorCtor(a)??Error)(d),h={Type:n.Error.Type,Code:n.Error.Code,Error:n.Error};for(let[e,t]of c.structIterator()){let s=t.getMergedTraits().xmlName??e,o=n[s]??i[s];h[e]=this.deserializer.readSchema(t,o)}throw this.mixin.decorateServiceException(Object.assign(m,l,{$fault:c.getMergedTraits().error,message:d},h),i)}loadQueryErrorCode(e,t){let s=(t.Errors?.[0]?.Error??t.Errors?.Error??t.Error)?.Code;return void 0!==s?s:404==e.statusCode?"NotFound":void 0}loadQueryError(e){return e.Errors?.[0]?.Error??e.Errors?.Error??e.Error}loadQueryErrorMessage(e){let t=this.loadQueryError(e);return t?.message??t?.Message??e.message??e.Message??"Unknown"}getDefaultContentType(){return"application/x-www-form-urlencoded"}}var e8=s("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),e9=s("./node_modules/@smithy/url-parser/dist-es/index.js"),e7=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),te=s("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),tt=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),ts=s("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),ti=s("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),to=s("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),tr=s("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let tn="required",td="type",ta="argv",tl="booleanEquals",tu="stringEquals",tc="sigv4",tm="us-east-1",th="endpoint",tp="https://sts.{Region}.{PartitionResult#dnsSuffix}",tg="tree",tf="error",ty="getAttr",tS={[tn]:!1,[td]:"string"},tw={[tn]:!0,default:!1,[td]:"boolean"},tE={ref:"Endpoint"},tb={fn:"isSet",[ta]:[{ref:"Region"}]},tv={ref:"Region"},tA={fn:"aws.partition",[ta]:[tv],assign:"PartitionResult"},tP={ref:"UseFIPS"},tC={ref:"UseDualStack"},tx={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:tc,signingName:"sts",signingRegion:tm}]},headers:{}},tI={},t_={conditions:[{fn:tu,[ta]:[tv,"aws-global"]}],[th]:tx,[td]:th},tR={fn:tl,[ta]:[tP,!0]},tj={fn:tl,[ta]:[tC,!0]},tk={fn:ty,[ta]:[{ref:"PartitionResult"},"supportsFIPS"]},tT={ref:"PartitionResult"},tD={fn:tl,[ta]:[!0,{fn:ty,[ta]:[tT,"supportsDualStack"]}]},tO=[{fn:"isSet",[ta]:[tE]}],t$=[tR],tz=[tj],tN={version:"1.0",parameters:{Region:tS,UseDualStack:tw,UseFIPS:tw,Endpoint:tS,UseGlobalEndpoint:tw},rules:[{conditions:[{fn:tl,[ta]:[{ref:"UseGlobalEndpoint"},!0]},{fn:"not",[ta]:tO},tb,tA,{fn:tl,[ta]:[tP,!1]},{fn:tl,[ta]:[tC,!1]}],rules:[{conditions:[{fn:tu,[ta]:[tv,"ap-northeast-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"ap-south-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"ap-southeast-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"ap-southeast-2"]}],endpoint:tx,[td]:th},t_,{conditions:[{fn:tu,[ta]:[tv,"ca-central-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"eu-central-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"eu-north-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"eu-west-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"eu-west-2"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"eu-west-3"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"sa-east-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,tm]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"us-east-2"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"us-west-1"]}],endpoint:tx,[td]:th},{conditions:[{fn:tu,[ta]:[tv,"us-west-2"]}],endpoint:tx,[td]:th},{endpoint:{url:tp,properties:{authSchemes:[{name:tc,signingName:"sts",signingRegion:"{Region}"}]},headers:tI},[td]:th}],[td]:tg},{conditions:tO,rules:[{conditions:t$,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[td]:tf},{conditions:tz,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[td]:tf},{endpoint:{url:tE,properties:tI,headers:tI},[td]:th}],[td]:tg},{conditions:[tb],rules:[{conditions:[tA],rules:[{conditions:[tR,tj],rules:[{conditions:[{fn:tl,[ta]:[!0,tk]},tD],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:tI,headers:tI},[td]:th}],[td]:tg},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[td]:tf}],[td]:tg},{conditions:t$,rules:[{conditions:[{fn:tl,[ta]:[tk,!0]}],rules:[{conditions:[{fn:tu,[ta]:[{fn:ty,[ta]:[tT,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:tI,headers:tI},[td]:th},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:tI,headers:tI},[td]:th}],[td]:tg},{error:"FIPS is enabled but this partition does not support FIPS",[td]:tf}],[td]:tg},{conditions:tz,rules:[{conditions:[tD],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:tI,headers:tI},[td]:th}],[td]:tg},{error:"DualStack is enabled but this partition does not support DualStack",[td]:tf}],[td]:tg},t_,{endpoint:{url:tp,properties:tI,headers:tI},[td]:th}],[td]:tg}],[td]:tg},{error:"Invalid Configuration: Missing Region",[td]:tf}]},tU=new ti.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),defaultEndpointResolver=(e,t={})=>tU.get(e,()=>(0,to.s)(tN,{endpointParams:e,logger:t.logger}));tr.m.aws=ts.UF;var tK=s("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),tM=s("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),tW=s("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class tL extends ev.K{config;constructor(...[e]){const t=(e=>{(0,eU.I)(process.version);let t=(0,eW.I)(e),defaultConfigProvider=()=>t().then(eK.l),s={apiVersion:"2011-06-15",base64Decoder:e?.base64Decoder??e7.E,base64Encoder:e?.base64Encoder??e4.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??defaultEndpointResolver,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??defaultSTSHttpAuthSchemeProvider,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new eR.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new eO.m}],logger:e?.logger??new e8.N,protocol:e?.protocol??e5,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sts",xmlNamespace:"https://sts.amazonaws.com/doc/2011-06-15/",version:"2011-06-15",serviceTarget:"AWSSecurityTokenServiceV20110615"},serviceId:e?.serviceId??"STS",urlParser:e?.urlParser??e9.D,utf8Decoder:e?.utf8Decoder??te.a,utf8Encoder:e?.utf8Encoder??tt.P};(0,eI.I)(process.version);let i={profile:e?.profile,logger:s.logger};return{...s,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,r.Z)(e_.$,i),bodyLengthChecker:e?.bodyLengthChecker??eM.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,ej.pf)({serviceId:s.serviceId,clientVersion:ex.rE}),httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:t=>t.getIdentityProvider("aws.auth#sigv4")||(async t=>await e.credentialDefaultProvider(t?.__config||{})()),signer:new eR.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new eO.m}],maxAttempts:e?.maxAttempts??(0,r.Z)(eE.qs,e),region:e?.region??(0,r.Z)(o.GG,{...o.zH,...i}),requestHandler:ez.$.create(e?.requestHandler??defaultConfigProvider),retryMode:e?.retryMode??(0,r.Z)({...eE.kN,default:async()=>(await defaultConfigProvider()).retryMode||eL.L},e),sha256:e?.sha256??e$.V.bind(null,"sha256"),streamCollector:e?.streamCollector??eN.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,r.Z)(eT.e$,i),useFipsEndpoint:e?.useFipsEndpoint??(0,r.Z)(eD.Ko,i),userAgentAppId:e?.userAgentAppId??(0,r.Z)(ek.hV,i)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,useGlobalEndpoint:e.useGlobalEndpoint??!1,defaultSigningName:"sts"}))(t),i=(0,ec.D)(s),n=(0,eE.$z)(i),d=(0,eh.T)(n),a=(0,ea.OV)(d),l=((e,t)=>{let s,i,o,r=Object.assign((0,tK.R)(e),(0,tW.xA)(e),(0,tM.e)(e),(s=e.httpAuthSchemes,i=e.httpAuthSchemeProvider,o=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){i=e},httpAuthSchemeProvider:()=>i,setCredentials(e){o=e},credentials:()=>o}));return t.forEach(e=>e.configure(r)),Object.assign(e,(0,tK.$)(r),(0,tW.uv)(r),(0,tM.j)(r),{httpAuthSchemes:r.httpAuthSchemes(),httpAuthSchemeProvider:r.httpAuthSchemeProvider(),credentials:r.credentials()})})((e=>{let t=Object.assign(e,{stsClientCtor:tL});return Object.assign((0,eA.h)(t),{authSchemePreference:(0,eC.t)(e.authSchemePreference??[])})})((0,ew.C)(a)),e?.extensions||[]);this.config=l,this.middlewareStack.use((0,ey.wq)(this.config)),this.middlewareStack.use((0,em.sM)(this.config)),this.middlewareStack.use((0,eb.ey)(this.config)),this.middlewareStack.use((0,eS.vK)(this.config)),this.middlewareStack.use((0,ea.TC)(this.config)),this.middlewareStack.use((0,el.Y7)(this.config)),this.middlewareStack.use((0,eu.n)(this.config)),this.middlewareStack.use((0,ep.w)(this.config,{httpAuthSchemeParametersProvider:defaultSTSHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async e=>new eg.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,ef.l)(this.config))}destroy(){super.destroy()}}let getCustomizableStsClientCtor=(e,t)=>t?class extends e{constructor(e){for(const s of(super(e),t))this.middlewareStack.use(s)}}:e,defaultRoleAssumers_getDefaultRoleAssumer=(e={},t)=>{var s;let o,r;return s=getCustomizableStsClientCtor(tL,t),async(t,n)=>{if(r=t,!o){let{logger:t=e?.parentClientConfig?.logger,profile:i=e?.parentClientConfig?.profile,region:n,requestHandler:d=e?.parentClientConfig?.requestHandler,credentialProviderLogger:a,userAgentAppId:l=e?.parentClientConfig?.userAgentAppId}=e,u=await resolveRegion(n,e?.parentClientConfig?.region,a,{logger:t,profile:i}),c=!isH2(d);o=new s({...e,userAgentAppId:l,profile:i,credentialDefaultProvider:()=>async()=>r,region:u,requestHandler:c?d:void 0,logger:t})}let{Credentials:d,AssumedRoleUser:a}=await o.send(new en(n));if(!d||!d.AccessKeyId||!d.SecretAccessKey)throw Error(`Invalid response from STS.assumeRole call with role ${n.RoleArn}`);let l=getAccountIdFromAssumedRoleUser(a),u={accessKeyId:d.AccessKeyId,secretAccessKey:d.SecretAccessKey,sessionToken:d.SessionToken,expiration:d.Expiration,...d.CredentialScope&&{credentialScope:d.CredentialScope},...l&&{accountId:l}};return(0,i.g)(u,"CREDENTIALS_STS_ASSUME_ROLE","i"),u}},defaultRoleAssumers_getDefaultRoleAssumerWithWebIdentity=(e={},t)=>{var s;let o;return s=getCustomizableStsClientCtor(tL,t),async t=>{if(!o){let{logger:t=e?.parentClientConfig?.logger,profile:i=e?.parentClientConfig?.profile,region:r,requestHandler:n=e?.parentClientConfig?.requestHandler,credentialProviderLogger:d,userAgentAppId:a=e?.parentClientConfig?.userAgentAppId}=e,l=await resolveRegion(r,e?.parentClientConfig?.region,d,{logger:t,profile:i}),u=!isH2(n);o=new s({...e,userAgentAppId:a,profile:i,region:l,requestHandler:u?n:void 0,logger:t})}let{Credentials:r,AssumedRoleUser:n}=await o.send(new ed(t));if(!r||!r.AccessKeyId||!r.SecretAccessKey)throw Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${t.RoleArn}`);let d=getAccountIdFromAssumedRoleUser(n),a={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,sessionToken:r.SessionToken,expiration:r.Expiration,...r.CredentialScope&&{credentialScope:r.CredentialScope},...d&&{accountId:d}};return d&&(0,i.g)(a,"RESOLVED_ACCOUNT_ID","T"),(0,i.g)(a,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),a}}},"./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"(e,t,s){s.d(t,{m:()=>i});class i{async sign(e,t,s){return e}}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
package/dist/cjs/0~292.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["292"],exports.modules={"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js"(e,r,s){s.d(r,{fromProcess:()=>u});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),o=s("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),d=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=s("child_process"),l=s("util"),a=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js");let c=async(e,r,s)=>{let i=r[e];if(r[e]){let c=i.credential_process;if(void 0!==c){let i=(0,l.promisify)(d.Z?.getTokenRecord?.().exec??n.exec);try{let s,{stdout:o}=await i(c);try{s=JSON.parse(o.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}var t=s;if(1!==t.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===t.AccessKeyId||void 0===t.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(t.Expiration){let r=new Date;if(new Date(t.Expiration)<r)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let d=t.AccountId;!d&&r?.[e]?.aws_account_id&&(d=r[e].aws_account_id);let n={accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,...t.SessionToken&&{sessionToken:t.SessionToken},...t.Expiration&&{expiration:new Date(t.Expiration)},...t.CredentialScope&&{credentialScope:t.CredentialScope},...d&&{accountId:d}};return(0,a.g)(n,"CREDENTIALS_PROCESS","w"),n}catch(e){throw new o.C(e.message,{logger:s})}}throw new o.C(`Profile ${e} did not contain credential_process.`,{logger:s})}throw new o.C(`Profile ${e} could not be found in shared credentials file.`,{logger:s})},u=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let s=await (0,i.Y)(e);return c((0,t.Bz)({profile:e.profile??r?.profile}),s,e.logger)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,r,s){s.d(r,{Z:()=>o});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let o={getFileRecord:()=>t.Jj,interceptFile(e,r){t.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>i.a,interceptToken(e,r){i.a[e]=r}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,r,s){s.d(r,{C:()=>d});var i=s("crypto"),t=s("path"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let d=e=>{let r=(0,i.createHash)("sha1").update(e).digest("hex");return(0,t.join)((0,o.R)(),".aws","sso","cache",`${r}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,r,s){s.d(r,{a:()=>o,v:()=>d});var i=s("fs/promises"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let o={},d=async e=>{if(o[e])return o[e];let r=(0,t.C)(e);return JSON.parse(await (0,i.readFile)(r,"utf8"))}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,r,s){s.d(r,{Y:()=>t});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let t=async e=>{let r=await (0,i.p)(e);return((...e)=>{let r={};for(let s of e)for(let[e,i]of Object.entries(s))void 0!==r[e]?Object.assign(r[e],i):r[e]=i;return r})(r.configFile,r.credentialsFile)}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["292"],exports.modules={"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js"(e,r,s){s.d(r,{fromProcess:()=>fromProcess});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),t=s("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),d=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=s("child_process"),l=s("util"),a=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js");let resolveProcessCredentials=async(e,r,s)=>{let i=r[e];if(r[e]){let c=i.credential_process;if(void 0!==c){let i=(0,l.promisify)(d.Z?.getTokenRecord?.().exec??n.exec);try{let s,{stdout:t}=await i(c);try{s=JSON.parse(t.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}var o=s;if(1!==o.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===o.AccessKeyId||void 0===o.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(o.Expiration){let r=new Date;if(new Date(o.Expiration)<r)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let d=o.AccountId;!d&&r?.[e]?.aws_account_id&&(d=r[e].aws_account_id);let n={accessKeyId:o.AccessKeyId,secretAccessKey:o.SecretAccessKey,...o.SessionToken&&{sessionToken:o.SessionToken},...o.Expiration&&{expiration:new Date(o.Expiration)},...o.CredentialScope&&{credentialScope:o.CredentialScope},...d&&{accountId:d}};return(0,a.g)(n,"CREDENTIALS_PROCESS","w"),n}catch(e){throw new t.C(e.message,{logger:s})}}throw new t.C(`Profile ${e} did not contain credential_process.`,{logger:s})}throw new t.C(`Profile ${e} could not be found in shared credentials file.`,{logger:s})},fromProcess=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let s=await (0,i.Y)(e);return resolveProcessCredentials((0,o.Bz)({profile:e.profile??r?.profile}),s,e.logger)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,r,s){s.d(r,{Z:()=>t});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let t={getFileRecord:()=>o.Jj,interceptFile(e,r){o.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>i.a,interceptToken(e,r){i.a[e]=r}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,r,s){s.d(r,{C:()=>getSSOTokenFilepath});var i=s("crypto"),o=s("path"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let getSSOTokenFilepath=e=>{let r=(0,i.createHash)("sha1").update(e).digest("hex");return(0,o.join)((0,t.R)(),".aws","sso","cache",`${r}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,r,s){s.d(r,{a:()=>t,v:()=>getSSOTokenFromFile});var i=s("fs/promises"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let t={},getSSOTokenFromFile=async e=>{if(t[e])return t[e];let r=(0,o.C)(e);return JSON.parse(await (0,i.readFile)(r,"utf8"))}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,r,s){s.d(r,{Y:()=>parseKnownFiles});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let parseKnownFiles=async e=>{let r=await (0,i.p)(e);return((...e)=>{let r={};for(let s of e)for(let[e,i]of Object.entries(s))void 0!==r[e]?Object.assign(r[e],i):r[e]=i;return r})(r.configFile,r.credentialsFile)}}};
package/dist/cjs/0~329.js CHANGED
@@ -1,2 +1,2 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["329"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"(e,s,i){i.d(s,{fromSSO:()=>j});var t=i("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),n=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getConfigFilepath.js"),l=i("./node_modules/@smithy/types/dist-es/profile.js");let a=e=>Object.entries(e).filter(([e])=>e.startsWith(l.I.SSO_SESSION+".")).reduce((e,[s,i])=>({...e,[s.substring(s.indexOf(".")+1)]:i}),{});var d=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseIni.js"),c=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let g=()=>({}),f=async(e={})=>(0,c.TA)(e.configFilepath??(0,n.g)()).then(d.A).then(a).catch(g);var h=i("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),p=i("./node_modules/@smithy/property-provider/dist-es/ProviderError.js");class u extends p.m{name="TokenProviderError";constructor(e,s=!0){super(e,s),Object.setPrototypeOf(this,u.prototype)}}var w=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js");let m="To refresh this SSO session run 'aws sso login' with the corresponding profile.",_=async(e,s={},t)=>{let{SSOOIDCClient:o}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js")),r=e=>s.clientConfig?.[e]??s.parentClientConfig?.[e]??t?.[e];return new o(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:r("logger"),userAgentAppId:r("userAgentAppId")}))},S=async(e,s,t={},o)=>{let{CreateTokenCommand:r}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"));return(await _(s,t,o)).send(new r({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))},y=e=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new u(`Token is expired. ${m}`,!1)},C=(e,s,i=!1)=>{if(void 0===s)throw new u(`Value not present for '${e}' in SSO Token${i?". Cannot refresh":""}. ${m}`,!1)};var k=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let{writeFile:T}=i("fs").promises,O=new Date(0),x=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:d,clientConfig:c,parentClientConfig:g,callerClientConfig:p,profile:_,filepath:x,configFilepath:j,ignoreCache:v,logger:I})=>{let A,F,b="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let e=await ((e={})=>async({callerClientConfig:s}={})=>{let i;e.logger?.debug("@aws-sdk/token-providers - fromSso");let t=await (0,r.Y)(e),n=(0,o.Bz)({profile:e.profile??s?.profile}),l=t[n];if(l){if(!l.sso_session)throw new u(`Profile '${n}' is missing required property 'sso_session'.`)}else throw new u(`Profile '${n}' could not be found in shared credentials file.`,!1);let a=l.sso_session,d=(await f(e))[a];if(!d)throw new u(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let e of["sso_start_url","sso_region"])if(!d[e])throw new u(`Sso session '${a}' is missing required property '${e}'.`,!1);d.sso_start_url;let c=d.sso_region;try{i=await (0,w.v)(a)}catch(e){throw new u(`The SSO session token associated with profile=${n} was not found or is invalid. ${m}`,!1)}C("accessToken",i.accessToken),C("expiresAt",i.expiresAt);let{accessToken:g,expiresAt:h}=i,p={token:g,expiration:new Date(h)};if(p.expiration.getTime()-Date.now()>3e5)return p;if(Date.now()-O.getTime()<3e4)return y(p),p;C("clientId",i.clientId,!0),C("clientSecret",i.clientSecret,!0),C("refreshToken",i.refreshToken,!0);try{O.setTime(Date.now());let t=await S(i,c,e,s);C("accessToken",t.accessToken),C("expiresIn",t.expiresIn);let o=new Date(Date.now()+1e3*t.expiresIn);try{var _;let e;await (_={...i,accessToken:t.accessToken,expiresAt:o.toISOString(),refreshToken:t.refreshToken},e=(0,k.C)(a),T(e,JSON.stringify(_,null,2)))}catch(e){}return{token:t.accessToken,expiration:o}}catch(e){return y(p),p}})({profile:_,filepath:x,configFilepath:j,ignoreCache:v})();A={accessToken:e.token,expiresAt:new Date(e.expiration).toISOString()}}catch(e){throw new t.C(e.message,{tryNextLink:!1,logger:I})}else try{A=await (0,w.v)(e)}catch(e){throw new t.C(`The SSO session associated with this profile is invalid. ${b}`,{tryNextLink:!1,logger:I})}if(new Date(A.expiresAt).getTime()-Date.now()<=0)throw new t.C(`The SSO session associated with this profile has expired. ${b}`,{tryNextLink:!1,logger:I});let{accessToken:$}=A,{SSOClient:N,GetRoleCredentialsCommand:D}=await Promise.all([i.e("769"),i.e("965")]).then(i.bind(i,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js")),L=d||new N(Object.assign({},c??{},{logger:c?.logger??p?.logger??g?.logger,region:c?.region??l,userAgentAppId:c?.userAgentAppId??p?.userAgentAppId??g?.userAgentAppId}));try{F=await L.send(new D({accountId:n,roleName:a,accessToken:$}))}catch(e){throw new t.C(e,{tryNextLink:!1,logger:I})}let{roleCredentials:{accessKeyId:P,secretAccessKey:R,sessionToken:E,expiration:U,credentialScope:q,accountId:Y}={}}=F;if(!P||!R||!E||!U)throw new t.C("SSO returns an invalid temporary credential.",{tryNextLink:!1,logger:I});let z={accessKeyId:P,secretAccessKey:R,sessionToken:E,expiration:new Date(U),...q&&{credentialScope:q},...Y&&{accountId:Y}};return s?(0,h.g)(z,"CREDENTIALS_SSO","s"):(0,h.g)(z,"CREDENTIALS_SSO_LEGACY","u"),z},j=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:i,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,g=(0,o.Bz)({profile:e.profile??s?.profile});if(i||n||l||a||d)if(i&&n&&l&&a)return x({ssoStartUrl:i,ssoSession:d,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger});else throw new t.C('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});{let s=(await (0,r.Y)(e))[g];if(!s)throw new t.C(`Profile ${g} was not found.`,{logger:e.logger});if(!(s&&("string"==typeof s.sso_start_url||"string"==typeof s.sso_account_id||"string"==typeof s.sso_session||"string"==typeof s.sso_region||"string"==typeof s.sso_role_name)))throw new t.C(`Profile ${g} is not configured with SSO credentials.`,{logger:e.logger});if(s?.sso_session){let o=(await f(e))[s.sso_session],r=` configurations in profile ${g} and sso-session ${s.sso_session}`;if(l&&l!==o.sso_region)throw new t.C("Conflicting SSO region"+r,{tryNextLink:!1,logger:e.logger});if(i&&i!==o.sso_start_url)throw new t.C("Conflicting SSO start_url"+r,{tryNextLink:!1,logger:e.logger});s.sso_region=o.sso_region,s.sso_start_url=o.sso_start_url}let{sso_start_url:o,sso_account_id:n,sso_region:a,sso_role_name:d,sso_session:h}=((e,s)=>{let{sso_start_url:i,sso_account_id:o,sso_region:r,sso_role_name:n}=e;if(!i||!o||!r||!n)throw new t.C(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
2
- Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e})(s,e.logger);return x({ssoStartUrl:o,ssoSession:h,ssoAccountId:n,ssoRegion:a,ssoRoleName:d,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger})}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,s,i){i.d(s,{C:()=>n});var t=i("crypto"),o=i("path"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let n=e=>{let s=(0,t.createHash)("sha1").update(e).digest("hex");return(0,o.join)((0,r.R)(),".aws","sso","cache",`${s}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,s,i){i.d(s,{a:()=>r,v:()=>n});var t=i("fs/promises"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let r={},n=async e=>{if(r[e])return r[e];let s=(0,o.C)(e);return JSON.parse(await (0,t.readFile)(s,"utf8"))}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,s,i){i.d(s,{Y:()=>o});var t=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let o=async e=>{let s=await (0,t.p)(e);return((...e)=>{let s={};for(let i of e)for(let[e,t]of Object.entries(i))void 0!==s[e]?Object.assign(s[e],t):s[e]=t;return s})(s.configFile,s.credentialsFile)}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["329"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"(e,s,i){i.d(s,{fromSSO:()=>fromSSO});var o=i("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),t=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),n=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getConfigFilepath.js"),l=i("./node_modules/@smithy/types/dist-es/profile.js");let getSsoSessionData=e=>Object.entries(e).filter(([e])=>e.startsWith(l.I.SSO_SESSION+".")).reduce((e,[s,i])=>({...e,[s.substring(s.indexOf(".")+1)]:i}),{});var a=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseIni.js"),d=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let swallowError=()=>({}),loadSsoSessionData=async(e={})=>(0,d.TA)(e.configFilepath??(0,n.g)()).then(a.A).then(getSsoSessionData).catch(swallowError);var c=i("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),g=i("./node_modules/@smithy/property-provider/dist-es/ProviderError.js");class f extends g.m{name="TokenProviderError";constructor(e,s=!0){super(e,s),Object.setPrototypeOf(this,f.prototype)}}var h=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js");let p="To refresh this SSO session run 'aws sso login' with the corresponding profile.",getSsoOidcClient=async(e,s={},o)=>{let{SSOOIDCClient:t}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js")),coalesce=e=>s.clientConfig?.[e]??s.parentClientConfig?.[e]??o?.[e];return new t(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:coalesce("logger"),userAgentAppId:coalesce("userAgentAppId")}))},getNewSsoOidcToken=async(e,s,o={},t)=>{let{CreateTokenCommand:r}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"));return(await getSsoOidcClient(s,o,t)).send(new r({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))},validateTokenExpiry=e=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new f(`Token is expired. ${p}`,!1)},validateTokenKey=(e,s,i=!1)=>{if(void 0===s)throw new f(`Value not present for '${e}' in SSO Token${i?". Cannot refresh":""}. ${p}`,!1)};var u=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let{writeFile:S}=i("fs").promises,w=new Date(0),resolveSSOCredentials=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:d,clientConfig:g,parentClientConfig:m,callerClientConfig:_,profile:y,filepath:k,configFilepath:C,ignoreCache:T,logger:O})=>{let v,x,j="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let e=await ((e={})=>async({callerClientConfig:s}={})=>{let i;e.logger?.debug("@aws-sdk/token-providers - fromSso");let o=await (0,r.Y)(e),n=(0,t.Bz)({profile:e.profile??s?.profile}),l=o[n];if(l){if(!l.sso_session)throw new f(`Profile '${n}' is missing required property 'sso_session'.`)}else throw new f(`Profile '${n}' could not be found in shared credentials file.`,!1);let a=l.sso_session,d=(await loadSsoSessionData(e))[a];if(!d)throw new f(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let e of["sso_start_url","sso_region"])if(!d[e])throw new f(`Sso session '${a}' is missing required property '${e}'.`,!1);d.sso_start_url;let c=d.sso_region;try{i=await (0,h.v)(a)}catch(e){throw new f(`The SSO session token associated with profile=${n} was not found or is invalid. ${p}`,!1)}validateTokenKey("accessToken",i.accessToken),validateTokenKey("expiresAt",i.expiresAt);let{accessToken:g,expiresAt:m}=i,_={token:g,expiration:new Date(m)};if(_.expiration.getTime()-Date.now()>3e5)return _;if(Date.now()-w.getTime()<3e4)return validateTokenExpiry(_),_;validateTokenKey("clientId",i.clientId,!0),validateTokenKey("clientSecret",i.clientSecret,!0),validateTokenKey("refreshToken",i.refreshToken,!0);try{w.setTime(Date.now());let o=await getNewSsoOidcToken(i,c,e,s);validateTokenKey("accessToken",o.accessToken),validateTokenKey("expiresIn",o.expiresIn);let t=new Date(Date.now()+1e3*o.expiresIn);try{var y;let e;await (y={...i,accessToken:o.accessToken,expiresAt:t.toISOString(),refreshToken:o.refreshToken},e=(0,u.C)(a),S(e,JSON.stringify(y,null,2)))}catch(e){}return{token:o.accessToken,expiration:t}}catch(e){return validateTokenExpiry(_),_}})({profile:y,filepath:k,configFilepath:C,ignoreCache:T})();v={accessToken:e.token,expiresAt:new Date(e.expiration).toISOString()}}catch(e){throw new o.C(e.message,{tryNextLink:!1,logger:O})}else try{v=await (0,h.v)(e)}catch(e){throw new o.C(`The SSO session associated with this profile is invalid. ${j}`,{tryNextLink:!1,logger:O})}if(new Date(v.expiresAt).getTime()-Date.now()<=0)throw new o.C(`The SSO session associated with this profile has expired. ${j}`,{tryNextLink:!1,logger:O});let{accessToken:F}=v,{SSOClient:I,GetRoleCredentialsCommand:A}=await Promise.all([i.e("769"),i.e("965")]).then(i.bind(i,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js")),b=d||new I(Object.assign({},g??{},{logger:g?.logger??_?.logger??m?.logger,region:g?.region??l,userAgentAppId:g?.userAgentAppId??_?.userAgentAppId??m?.userAgentAppId}));try{x=await b.send(new A({accountId:n,roleName:a,accessToken:F}))}catch(e){throw new o.C(e,{tryNextLink:!1,logger:O})}let{roleCredentials:{accessKeyId:D,secretAccessKey:N,sessionToken:$,expiration:E,credentialScope:L,accountId:P}={}}=x;if(!D||!N||!$||!E)throw new o.C("SSO returns an invalid temporary credential.",{tryNextLink:!1,logger:O});let K={accessKeyId:D,secretAccessKey:N,sessionToken:$,expiration:new Date(E),...L&&{credentialScope:L},...P&&{accountId:P}};return s?(0,c.g)(K,"CREDENTIALS_SSO","s"):(0,c.g)(K,"CREDENTIALS_SSO_LEGACY","u"),K},fromSSO=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:i,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,g=(0,t.Bz)({profile:e.profile??s?.profile});if(i||n||l||a||d)if(i&&n&&l&&a)return resolveSSOCredentials({ssoStartUrl:i,ssoSession:d,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger});else throw new o.C('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});{let s=(await (0,r.Y)(e))[g];if(!s)throw new o.C(`Profile ${g} was not found.`,{logger:e.logger});if(!(s&&("string"==typeof s.sso_start_url||"string"==typeof s.sso_account_id||"string"==typeof s.sso_session||"string"==typeof s.sso_region||"string"==typeof s.sso_role_name)))throw new o.C(`Profile ${g} is not configured with SSO credentials.`,{logger:e.logger});if(s?.sso_session){let t=(await loadSsoSessionData(e))[s.sso_session],r=` configurations in profile ${g} and sso-session ${s.sso_session}`;if(l&&l!==t.sso_region)throw new o.C("Conflicting SSO region"+r,{tryNextLink:!1,logger:e.logger});if(i&&i!==t.sso_start_url)throw new o.C("Conflicting SSO start_url"+r,{tryNextLink:!1,logger:e.logger});s.sso_region=t.sso_region,s.sso_start_url=t.sso_start_url}let{sso_start_url:t,sso_account_id:n,sso_region:a,sso_role_name:d,sso_session:f}=((e,s)=>{let{sso_start_url:i,sso_account_id:t,sso_region:r,sso_role_name:n}=e;if(!i||!t||!r||!n)throw new o.C(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
2
+ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e})(s,e.logger);return resolveSSOCredentials({ssoStartUrl:t,ssoSession:f,ssoAccountId:n,ssoRegion:a,ssoRoleName:d,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger})}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,s,i){i.d(s,{C:()=>getSSOTokenFilepath});var o=i("crypto"),t=i("path"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let getSSOTokenFilepath=e=>{let s=(0,o.createHash)("sha1").update(e).digest("hex");return(0,t.join)((0,r.R)(),".aws","sso","cache",`${s}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,s,i){i.d(s,{a:()=>r,v:()=>getSSOTokenFromFile});var o=i("fs/promises"),t=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let r={},getSSOTokenFromFile=async e=>{if(r[e])return r[e];let s=(0,t.C)(e);return JSON.parse(await (0,o.readFile)(s,"utf8"))}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,s,i){i.d(s,{Y:()=>parseKnownFiles});var o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let parseKnownFiles=async e=>{let s=await (0,o.p)(e);return((...e)=>{let s={};for(let i of e)for(let[e,o]of Object.entries(i))void 0!==s[e]?Object.assign(s[e],o):s[e]=o;return s})(s.configFile,s.credentialsFile)}}};
package/dist/cjs/0~53.js CHANGED
@@ -1 +1 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["53"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"(e,t,s){s.d(t,{CreateTokenCommand:()=>ta,SSOOIDCClient:()=>eI});var r=s("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),o=s("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),i=s("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),n=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),d=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),a=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),c=s("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),l=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),u=s("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),p=s("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),h=s("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),m=s("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),g=s("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),f=s("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),y=s("./node_modules/@smithy/smithy-client/dist-es/client.js"),_=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),S=s("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),E=s("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let v=async(e,t,s)=>({operation:(0,S.u)(t).operation,region:await (0,E.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),x=e=>{let t=[];if("CreateToken"===e.operation)t.push({schemeId:"smithy.api#noAuth"});else t.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})});return t},w={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var j=s("./node_modules/@aws-sdk/nested-clients/package.json"),P=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),k=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),I=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),O=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),C=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),b=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),A=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),D=s("./node_modules/@smithy/hash-node/dist-es/index.js"),R=s("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),T=s("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),U=s("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),$=s("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),F=s("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),z=s("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),q=s("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),H=s("./node_modules/@smithy/util-retry/dist-es/config.js"),V=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),M=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),N=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),G=s("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),L=s("./node_modules/@smithy/url-parser/dist-es/index.js"),Z=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),B=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),W=s("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),K=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),Y=s("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),J=s("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),Q=s("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),X=s("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let ee="required",et="argv",es="isSet",er="booleanEquals",eo="error",ei="endpoint",en="tree",ed="PartitionResult",ea="getAttr",ec={[ee]:!1,type:"string"},el={[ee]:!0,default:!1,type:"boolean"},eu={ref:"Endpoint"},ep={fn:er,[et]:[{ref:"UseFIPS"},!0]},eh={fn:er,[et]:[{ref:"UseDualStack"},!0]},em={},eg={fn:ea,[et]:[{ref:ed},"supportsFIPS"]},ef={ref:ed},ey={fn:er,[et]:[!0,{fn:ea,[et]:[ef,"supportsDualStack"]}]},e_=[ep],eS=[eh],eE=[{ref:"Region"}],ev={version:"1.0",parameters:{Region:ec,UseDualStack:el,UseFIPS:el,Endpoint:ec},rules:[{conditions:[{fn:es,[et]:[eu]}],rules:[{conditions:e_,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:eo},{conditions:eS,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:eo},{endpoint:{url:eu,properties:em,headers:em},type:ei}],type:en},{conditions:[{fn:es,[et]:eE}],rules:[{conditions:[{fn:"aws.partition",[et]:eE,assign:ed}],rules:[{conditions:[ep,eh],rules:[{conditions:[{fn:er,[et]:[!0,eg]},ey],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:em,headers:em},type:ei}],type:en},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:eo}],type:en},{conditions:e_,rules:[{conditions:[{fn:er,[et]:[eg,!0]}],rules:[{conditions:[{fn:"stringEquals",[et]:[{fn:ea,[et]:[ef,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:em,headers:em},type:ei},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:em,headers:em},type:ei}],type:en},{error:"FIPS is enabled but this partition does not support FIPS",type:eo}],type:en},{conditions:eS,rules:[{conditions:[ey],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:em,headers:em},type:ei}],type:en},{error:"DualStack is enabled but this partition does not support DualStack",type:eo}],type:en},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:em,headers:em},type:ei}],type:en}],type:en},{error:"Invalid Configuration: Missing Region",type:eo}]},ex=new J.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ew=(e,t={})=>ex.get(e,()=>(0,Q.s)(ev,{endpointParams:e,logger:t.logger}));X.m.aws=Y.UF;var ej=s("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),eP=s("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),ek=s("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class eI extends y.K{config;constructor(...[e]){const t=(e=>{(0,$.I)(process.version);let t=(0,q.I)(e),s=()=>t().then(F.l),r={apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??Z.E,base64Encoder:e?.base64Encoder??B.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??ew,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??x,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new V.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new N.m}],logger:e?.logger??new G.N,protocol:e?.protocol??M.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.ssooidc",version:"2019-06-10",serviceTarget:"AWSSSOOIDCService"},serviceId:e?.serviceId??"SSO OIDC",urlParser:e?.urlParser??L.D,utf8Decoder:e?.utf8Decoder??W.a,utf8Encoder:e?.utf8Encoder??K.P};(0,P.I)(process.version);let o={profile:e?.profile,logger:r.logger};return{...r,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,R.Z)(k.$,o),bodyLengthChecker:e?.bodyLengthChecker??z.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,I.pf)({serviceId:r.serviceId,clientVersion:j.rE}),maxAttempts:e?.maxAttempts??(0,R.Z)(g.qs,e),region:e?.region??(0,R.Z)(C.GG,{...C.zH,...o}),requestHandler:T.$.create(e?.requestHandler??s),retryMode:e?.retryMode??(0,R.Z)({...g.kN,default:async()=>(await s()).retryMode||H.L},e),sha256:e?.sha256??D.V.bind(null,"sha256"),streamCollector:e?.streamCollector??U.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,R.Z)(b.e$,o),useFipsEndpoint:e?.useFipsEndpoint??(0,R.Z)(A.Ko,o),userAgentAppId:e?.userAgentAppId??(0,R.Z)(O.hV,o)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"}))(t),y=(0,n.D)(s),S=(0,g.$z)(y),w=(0,a.T)(S),Y=(0,r.OV)(w),J=((e,t)=>{let s,r,o,i=Object.assign((0,ej.R)(e),(0,ek.xA)(e),(0,eP.e)(e),(s=e.httpAuthSchemes,r=e.httpAuthSchemeProvider,o=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){r=e},httpAuthSchemeProvider:()=>r,setCredentials(e){o=e},credentials:()=>o}));return t.forEach(e=>e.configure(i)),Object.assign(e,(0,ej.$)(i),(0,ek.uv)(i),(0,eP.j)(i),{httpAuthSchemes:i.httpAuthSchemes(),httpAuthSchemeProvider:i.httpAuthSchemeProvider(),credentials:i.credentials()})})((e=>Object.assign((0,_.h)(e),{authSchemePreference:(0,E.t)(e.authSchemePreference??[])}))((0,m.C)(Y)),e?.extensions||[]);this.config=J,this.middlewareStack.use((0,p.wq)(this.config)),this.middlewareStack.use((0,d.sM)(this.config)),this.middlewareStack.use((0,f.ey)(this.config)),this.middlewareStack.use((0,h.vK)(this.config)),this.middlewareStack.use((0,r.TC)(this.config)),this.middlewareStack.use((0,o.Y7)(this.config)),this.middlewareStack.use((0,i.n)(this.config)),this.middlewareStack.use((0,c.w)(this.config,{httpAuthSchemeParametersProvider:v,identityProviderConfigProvider:async e=>new l.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,u.l)(this.config))}destroy(){super.destroy()}}var eO=s("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),eC=s("./node_modules/@smithy/smithy-client/dist-es/command.js"),eb=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),eA=s("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class eD extends eA.T{constructor(e){super(e),Object.setPrototypeOf(this,eD.prototype)}}class eR extends eD{name="AccessDeniedException";$fault="client";error;reason;error_description;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,eR.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class eT extends eD{name="AuthorizationPendingException";$fault="client";error;error_description;constructor(e){super({name:"AuthorizationPendingException",$fault:"client",...e}),Object.setPrototypeOf(this,eT.prototype),this.error=e.error,this.error_description=e.error_description}}class eU extends eD{name="ExpiredTokenException";$fault="client";error;error_description;constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,eU.prototype),this.error=e.error,this.error_description=e.error_description}}class e$ extends eD{name="InternalServerException";$fault="server";error;error_description;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,e$.prototype),this.error=e.error,this.error_description=e.error_description}}class eF extends eD{name="InvalidClientException";$fault="client";error;error_description;constructor(e){super({name:"InvalidClientException",$fault:"client",...e}),Object.setPrototypeOf(this,eF.prototype),this.error=e.error,this.error_description=e.error_description}}class ez extends eD{name="InvalidGrantException";$fault="client";error;error_description;constructor(e){super({name:"InvalidGrantException",$fault:"client",...e}),Object.setPrototypeOf(this,ez.prototype),this.error=e.error,this.error_description=e.error_description}}class eq extends eD{name="InvalidRequestException";$fault="client";error;reason;error_description;constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,eq.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class eH extends eD{name="InvalidScopeException";$fault="client";error;error_description;constructor(e){super({name:"InvalidScopeException",$fault:"client",...e}),Object.setPrototypeOf(this,eH.prototype),this.error=e.error,this.error_description=e.error_description}}class eV extends eD{name="SlowDownException";$fault="client";error;error_description;constructor(e){super({name:"SlowDownException",$fault:"client",...e}),Object.setPrototypeOf(this,eV.prototype),this.error=e.error,this.error_description=e.error_description}}class eM extends eD{name="UnauthorizedClientException";$fault="client";error;error_description;constructor(e){super({name:"UnauthorizedClientException",$fault:"client",...e}),Object.setPrototypeOf(this,eM.prototype),this.error=e.error,this.error_description=e.error_description}}class eN extends eD{name="UnsupportedGrantTypeException";$fault="client";error;error_description;constructor(e){super({name:"UnsupportedGrantTypeException",$fault:"client",...e}),Object.setPrototypeOf(this,eN.prototype),this.error=e.error,this.error_description=e.error_description}}let eG="client",eL="error",eZ="error_description",eB="httpError",eW="reason",eK="refreshToken",eY="smithy.ts.sdk.synthetic.com.amazonaws.ssooidc",eJ="com.amazonaws.ssooidc";var eQ=[0,eJ,"AccessToken",8,0],eX=[0,eJ,"ClientSecret",8,0],e0=[0,eJ,"CodeVerifier",8,0],e4=[0,eJ,"IdToken",8,0],e3=[0,eJ,"RefreshToken",8,0],e6=[-3,eJ,"AccessDeniedException",{[eL]:eG,[eB]:400},[eL,eW,eZ],[0,0,0]];eb.O.for(eJ).registerError(e6,eR);var e1=[-3,eJ,"AuthorizationPendingException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(e1,eT);var e8=[3,eJ,"CreateTokenRequest",0,["clientId","clientSecret","grantType","deviceCode","code",eK,"scope","redirectUri","codeVerifier"],[0,[()=>eX,0],0,0,0,[()=>e3,0],64,0,[()=>e0,0]]],e2=[3,eJ,"CreateTokenResponse",0,["accessToken","tokenType","expiresIn",eK,"idToken"],[[()=>eQ,0],0,1,[()=>e3,0],[()=>e4,0]]],e5=[-3,eJ,"ExpiredTokenException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(e5,eU);var e9=[-3,eJ,"InternalServerException",{[eL]:"server",[eB]:500},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(e9,e$);var e7=[-3,eJ,"InvalidClientException",{[eL]:eG,[eB]:401},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(e7,eF);var te=[-3,eJ,"InvalidGrantException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(te,ez);var tt=[-3,eJ,"InvalidRequestException",{[eL]:eG,[eB]:400},[eL,eW,eZ],[0,0,0]];eb.O.for(eJ).registerError(tt,eq);var ts=[-3,eJ,"InvalidScopeException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(ts,eH);var tr=[-3,eJ,"SlowDownException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(tr,eV);var to=[-3,eJ,"UnauthorizedClientException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(to,eM);var ti=[-3,eJ,"UnsupportedGrantTypeException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(ti,eN);var tn=[-3,eY,"SSOOIDCServiceException",0,[],[]];eb.O.for(eY).registerError(tn,eD);var td=[9,eJ,"CreateToken",{http:["POST","/token",200]},()=>e8,()=>e2];class ta extends eC.u.classBuilder().ep(w).m(function(e,t,s,r){return[(0,eO.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").sc(td).build(){}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["53"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"(e,t,s){s.d(t,{CreateTokenCommand:()=>ti,SSOOIDCClient:()=>ew});var r=s("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),o=s("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),i=s("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),n=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),d=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),a=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),c=s("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),u=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),l=s("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),p=s("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),h=s("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),m=s("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),f=s("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),g=s("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),y=s("./node_modules/@smithy/smithy-client/dist-es/client.js"),S=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),_=s("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),v=s("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let defaultSSOOIDCHttpAuthSchemeParametersProvider=async(e,t,s)=>({operation:(0,_.u)(t).operation,region:await (0,v.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()});function createAwsAuthSigv4HttpAuthOption(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})}}function createSmithyApiNoAuthHttpAuthOption(e){return{schemeId:"smithy.api#noAuth"}}let defaultSSOOIDCHttpAuthSchemeProvider=e=>{let t=[];return"CreateToken"===e.operation?t.push(createSmithyApiNoAuthHttpAuthOption(e)):t.push(createAwsAuthSigv4HttpAuthOption(e)),t},E={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var x=s("./node_modules/@aws-sdk/nested-clients/package.json"),P=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),w=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),j=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),k=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),O=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),I=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),A=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),C=s("./node_modules/@smithy/hash-node/dist-es/index.js"),b=s("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),D=s("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),R=s("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),T=s("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),U=s("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),$=s("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),H=s("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),F=s("./node_modules/@smithy/util-retry/dist-es/config.js"),z=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),q=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),N=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),V=s("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),M=s("./node_modules/@smithy/url-parser/dist-es/index.js"),G=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),L=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),Z=s("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),B=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),W=s("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),K=s("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),Y=s("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),J=s("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let Q="required",X="argv",ee="isSet",et="booleanEquals",es="error",er="endpoint",eo="tree",ei="PartitionResult",en="getAttr",ed={[Q]:!1,type:"string"},ea={[Q]:!0,default:!1,type:"boolean"},ec={ref:"Endpoint"},eu={fn:et,[X]:[{ref:"UseFIPS"},!0]},el={fn:et,[X]:[{ref:"UseDualStack"},!0]},ep={},eh={fn:en,[X]:[{ref:ei},"supportsFIPS"]},em={ref:ei},ef={fn:et,[X]:[!0,{fn:en,[X]:[em,"supportsDualStack"]}]},eg=[eu],ey=[el],eS=[{ref:"Region"}],e_={version:"1.0",parameters:{Region:ed,UseDualStack:ea,UseFIPS:ea,Endpoint:ed},rules:[{conditions:[{fn:ee,[X]:[ec]}],rules:[{conditions:eg,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:es},{conditions:ey,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:es},{endpoint:{url:ec,properties:ep,headers:ep},type:er}],type:eo},{conditions:[{fn:ee,[X]:eS}],rules:[{conditions:[{fn:"aws.partition",[X]:eS,assign:ei}],rules:[{conditions:[eu,el],rules:[{conditions:[{fn:et,[X]:[!0,eh]},ef],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:ep,headers:ep},type:er}],type:eo},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:es}],type:eo},{conditions:eg,rules:[{conditions:[{fn:et,[X]:[eh,!0]}],rules:[{conditions:[{fn:"stringEquals",[X]:[{fn:en,[X]:[em,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:ep,headers:ep},type:er},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:ep,headers:ep},type:er}],type:eo},{error:"FIPS is enabled but this partition does not support FIPS",type:es}],type:eo},{conditions:ey,rules:[{conditions:[ef],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:ep,headers:ep},type:er}],type:eo},{error:"DualStack is enabled but this partition does not support DualStack",type:es}],type:eo},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:ep,headers:ep},type:er}],type:eo}],type:eo},{error:"Invalid Configuration: Missing Region",type:es}]},ev=new K.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),defaultEndpointResolver=(e,t={})=>ev.get(e,()=>(0,Y.s)(e_,{endpointParams:e,logger:t.logger}));J.m.aws=W.UF;var eE=s("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),ex=s("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),eP=s("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class ew extends y.K{config;constructor(...[e]){const t=(e=>{(0,T.I)(process.version);let t=(0,H.I)(e),defaultConfigProvider=()=>t().then(U.l),s={apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??G.E,base64Encoder:e?.base64Encoder??L.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??defaultEndpointResolver,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??defaultSSOOIDCHttpAuthSchemeProvider,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new z.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new N.m}],logger:e?.logger??new V.N,protocol:e?.protocol??q.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.ssooidc",version:"2019-06-10",serviceTarget:"AWSSSOOIDCService"},serviceId:e?.serviceId??"SSO OIDC",urlParser:e?.urlParser??M.D,utf8Decoder:e?.utf8Decoder??Z.a,utf8Encoder:e?.utf8Encoder??B.P};(0,P.I)(process.version);let r={profile:e?.profile,logger:s.logger};return{...s,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,b.Z)(w.$,r),bodyLengthChecker:e?.bodyLengthChecker??$.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,j.pf)({serviceId:s.serviceId,clientVersion:x.rE}),maxAttempts:e?.maxAttempts??(0,b.Z)(f.qs,e),region:e?.region??(0,b.Z)(O.GG,{...O.zH,...r}),requestHandler:D.$.create(e?.requestHandler??defaultConfigProvider),retryMode:e?.retryMode??(0,b.Z)({...f.kN,default:async()=>(await defaultConfigProvider()).retryMode||F.L},e),sha256:e?.sha256??C.V.bind(null,"sha256"),streamCollector:e?.streamCollector??R.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,b.Z)(I.e$,r),useFipsEndpoint:e?.useFipsEndpoint??(0,b.Z)(A.Ko,r),userAgentAppId:e?.userAgentAppId??(0,b.Z)(k.hV,r)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"}))(t),y=(0,n.D)(s),_=(0,f.$z)(y),E=(0,a.T)(_),W=(0,r.OV)(E),K=((e,t)=>{let s,r,o,i=Object.assign((0,eE.R)(e),(0,eP.xA)(e),(0,ex.e)(e),(s=e.httpAuthSchemes,r=e.httpAuthSchemeProvider,o=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){r=e},httpAuthSchemeProvider:()=>r,setCredentials(e){o=e},credentials:()=>o}));return t.forEach(e=>e.configure(i)),Object.assign(e,(0,eE.$)(i),(0,eP.uv)(i),(0,ex.j)(i),{httpAuthSchemes:i.httpAuthSchemes(),httpAuthSchemeProvider:i.httpAuthSchemeProvider(),credentials:i.credentials()})})((e=>Object.assign((0,S.h)(e),{authSchemePreference:(0,v.t)(e.authSchemePreference??[])}))((0,m.C)(W)),e?.extensions||[]);this.config=K,this.middlewareStack.use((0,p.wq)(this.config)),this.middlewareStack.use((0,d.sM)(this.config)),this.middlewareStack.use((0,g.ey)(this.config)),this.middlewareStack.use((0,h.vK)(this.config)),this.middlewareStack.use((0,r.TC)(this.config)),this.middlewareStack.use((0,o.Y7)(this.config)),this.middlewareStack.use((0,i.n)(this.config)),this.middlewareStack.use((0,c.w)(this.config,{httpAuthSchemeParametersProvider:defaultSSOOIDCHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async e=>new u.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,l.l)(this.config))}destroy(){super.destroy()}}var ej=s("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),ek=s("./node_modules/@smithy/smithy-client/dist-es/command.js"),eO=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),eI=s("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class eA extends eI.T{constructor(e){super(e),Object.setPrototypeOf(this,eA.prototype)}}class eC extends eA{name="AccessDeniedException";$fault="client";error;reason;error_description;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,eC.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class eb extends eA{name="AuthorizationPendingException";$fault="client";error;error_description;constructor(e){super({name:"AuthorizationPendingException",$fault:"client",...e}),Object.setPrototypeOf(this,eb.prototype),this.error=e.error,this.error_description=e.error_description}}class eD extends eA{name="ExpiredTokenException";$fault="client";error;error_description;constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,eD.prototype),this.error=e.error,this.error_description=e.error_description}}class eR extends eA{name="InternalServerException";$fault="server";error;error_description;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,eR.prototype),this.error=e.error,this.error_description=e.error_description}}class eT extends eA{name="InvalidClientException";$fault="client";error;error_description;constructor(e){super({name:"InvalidClientException",$fault:"client",...e}),Object.setPrototypeOf(this,eT.prototype),this.error=e.error,this.error_description=e.error_description}}class eU extends eA{name="InvalidGrantException";$fault="client";error;error_description;constructor(e){super({name:"InvalidGrantException",$fault:"client",...e}),Object.setPrototypeOf(this,eU.prototype),this.error=e.error,this.error_description=e.error_description}}class e$ extends eA{name="InvalidRequestException";$fault="client";error;reason;error_description;constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,e$.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class eH extends eA{name="InvalidScopeException";$fault="client";error;error_description;constructor(e){super({name:"InvalidScopeException",$fault:"client",...e}),Object.setPrototypeOf(this,eH.prototype),this.error=e.error,this.error_description=e.error_description}}class eF extends eA{name="SlowDownException";$fault="client";error;error_description;constructor(e){super({name:"SlowDownException",$fault:"client",...e}),Object.setPrototypeOf(this,eF.prototype),this.error=e.error,this.error_description=e.error_description}}class ez extends eA{name="UnauthorizedClientException";$fault="client";error;error_description;constructor(e){super({name:"UnauthorizedClientException",$fault:"client",...e}),Object.setPrototypeOf(this,ez.prototype),this.error=e.error,this.error_description=e.error_description}}class eq extends eA{name="UnsupportedGrantTypeException";$fault="client";error;error_description;constructor(e){super({name:"UnsupportedGrantTypeException",$fault:"client",...e}),Object.setPrototypeOf(this,eq.prototype),this.error=e.error,this.error_description=e.error_description}}let eN="client",eV="error",eM="error_description",eG="httpError",eL="reason",eZ="refreshToken",eB="smithy.ts.sdk.synthetic.com.amazonaws.ssooidc",eW="com.amazonaws.ssooidc";var eK=[0,eW,"AccessToken",8,0],eY=[0,eW,"ClientSecret",8,0],eJ=[0,eW,"CodeVerifier",8,0],eQ=[0,eW,"IdToken",8,0],eX=[0,eW,"RefreshToken",8,0],e0=[-3,eW,"AccessDeniedException",{[eV]:eN,[eG]:400},[eV,eL,eM],[0,0,0]];eO.O.for(eW).registerError(e0,eC);var e4=[-3,eW,"AuthorizationPendingException",{[eV]:eN,[eG]:400},[eV,eM],[0,0]];eO.O.for(eW).registerError(e4,eb);var e3=[3,eW,"CreateTokenRequest",0,["clientId","clientSecret","grantType","deviceCode","code",eZ,"scope","redirectUri","codeVerifier"],[0,[()=>eY,0],0,0,0,[()=>eX,0],64,0,[()=>eJ,0]]],e6=[3,eW,"CreateTokenResponse",0,["accessToken","tokenType","expiresIn",eZ,"idToken"],[[()=>eK,0],0,1,[()=>eX,0],[()=>eQ,0]]],e1=[-3,eW,"ExpiredTokenException",{[eV]:eN,[eG]:400},[eV,eM],[0,0]];eO.O.for(eW).registerError(e1,eD);var e8=[-3,eW,"InternalServerException",{[eV]:"server",[eG]:500},[eV,eM],[0,0]];eO.O.for(eW).registerError(e8,eR);var e2=[-3,eW,"InvalidClientException",{[eV]:eN,[eG]:401},[eV,eM],[0,0]];eO.O.for(eW).registerError(e2,eT);var e5=[-3,eW,"InvalidGrantException",{[eV]:eN,[eG]:400},[eV,eM],[0,0]];eO.O.for(eW).registerError(e5,eU);var e9=[-3,eW,"InvalidRequestException",{[eV]:eN,[eG]:400},[eV,eL,eM],[0,0,0]];eO.O.for(eW).registerError(e9,e$);var e7=[-3,eW,"InvalidScopeException",{[eV]:eN,[eG]:400},[eV,eM],[0,0]];eO.O.for(eW).registerError(e7,eH);var te=[-3,eW,"SlowDownException",{[eV]:eN,[eG]:400},[eV,eM],[0,0]];eO.O.for(eW).registerError(te,eF);var tt=[-3,eW,"UnauthorizedClientException",{[eV]:eN,[eG]:400},[eV,eM],[0,0]];eO.O.for(eW).registerError(tt,ez);var ts=[-3,eW,"UnsupportedGrantTypeException",{[eV]:eN,[eG]:400},[eV,eM],[0,0]];eO.O.for(eW).registerError(ts,eq);var tr=[-3,eB,"SSOOIDCServiceException",0,[],[]];eO.O.for(eB).registerError(tr,eA);var to=[9,eW,"CreateToken",{http:["POST","/token",200]},()=>e3,()=>e6];class ti extends ek.u.classBuilder().ep(E).m(function(e,t,s,r){return[(0,ej.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").sc(to).build(){}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
package/dist/cjs/0~560.js CHANGED
@@ -1,2 +1,2 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["560"],exports.modules={"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"(e,t,r){r.d(t,{httpRequest:()=>u,ENV_CMDS_FULL_URI:()=>_,getInstanceMetadataEndpoint:()=>M,ENV_CMDS_RELATIVE_URI:()=>y,fromContainerMetadata:()=>E,fromInstanceMetadata:()=>$});var a,n,o,i,s=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),c=r("url"),d=r("./node_modules/@smithy/property-provider/dist-es/ProviderError.js"),l=r("buffer"),p=r("http");function u(e){return new Promise((t,r)=>{let a=(0,p.request)({method:"GET",...e,hostname:e.hostname?.replace(/^\[(.+)\]$/,"$1")});a.on("error",e=>{r(Object.assign(new d.m("Unable to connect to instance metadata service"),e)),a.destroy()}),a.on("timeout",()=>{r(new d.m("TimeoutError from instance metadata service")),a.destroy()}),a.on("response",e=>{let{statusCode:n=400}=e;(n<200||300<=n)&&(r(Object.assign(new d.m("Error response received from instance metadata service"),{statusCode:n})),a.destroy());let o=[];e.on("data",e=>{o.push(e)}),e.on("end",()=>{t(l.Buffer.concat(o)),a.destroy()})}),a.end()})}let m=e=>!!e&&"object"==typeof e&&"string"==typeof e.AccessKeyId&&"string"==typeof e.SecretAccessKey&&"string"==typeof e.Token&&"string"==typeof e.Expiration,h=e=>({accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:new Date(e.Expiration),...e.AccountId&&{accountId:e.AccountId}}),f=1e3,v=0,g=({maxRetries:e=v,timeout:t=f})=>({maxRetries:e,timeout:t}),w=(e,t)=>{let r=e();for(let a=0;a<t;a++)r=r.catch(e);return r},_="AWS_CONTAINER_CREDENTIALS_FULL_URI",y="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",I="AWS_CONTAINER_AUTHORIZATION_TOKEN",E=(e={})=>{let{timeout:t,maxRetries:r}=g(e);return()=>w(async()=>{let r=await C({logger:e.logger}),a=JSON.parse(await A(t,r));if(!m(a))throw new s.C("Invalid response received from instance metadata service.",{logger:e.logger});return h(a)},r)},A=async(e,t)=>(process.env[I]&&(t.headers={...t.headers,Authorization:process.env[I]}),(await u({...t,timeout:e})).toString()),S={localhost:!0,"127.0.0.1":!0},b={"http:":!0,"https:":!0},C=async({logger:e})=>{if(process.env[y])return{hostname:"169.254.170.2",path:process.env[y]};if(process.env[_]){let t=(0,c.parse)(process.env[_]);if(!t.hostname||!(t.hostname in S))throw new s.C(`${t.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:e});if(!t.protocol||!(t.protocol in b))throw new s.C(`${t.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:e});return{...t,port:t.port?parseInt(t.port,10):void 0}}throw new s.C(`The container metadata credential provider cannot be used unless the ${y} or ${_} environment variable is set`,{tryNextLink:!1,logger:e})};var T=r("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js");class D extends s.C{tryNextLink;name="InstanceMetadataV1FallbackError";constructor(e,t=!0){super(e,t),this.tryNextLink=t,Object.setPrototypeOf(this,D.prototype)}}var x=r("./node_modules/@smithy/url-parser/dist-es/index.js");(a=o||(o={})).IPv4="http://169.254.169.254",a.IPv6="http://[fd00:ec2::254]";let N={environmentVariableSelector:e=>e.AWS_EC2_METADATA_SERVICE_ENDPOINT,configFileSelector:e=>e.ec2_metadata_service_endpoint,default:void 0};(n=i||(i={})).IPv4="IPv4",n.IPv6="IPv6";let k={environmentVariableSelector:e=>e.AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE,configFileSelector:e=>e.ec2_metadata_service_endpoint_mode,default:i.IPv4},M=async()=>(0,x.D)(await P()||await R()),P=async()=>(0,T.Z)(N)(),R=async()=>{let e=await (0,T.Z)(k)();switch(e){case i.IPv4:return o.IPv4;case i.IPv6:return o.IPv6;default:throw Error(`Unsupported endpoint mode: ${e}. Select from ${Object.values(i)}`)}},L=(e,t)=>{let r=300+Math.floor(300*Math.random()),a=new Date(Date.now()+1e3*r);t.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(a)}.
2
- For more information, please visit: https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html`);let n=e.originalExpiration??e.expiration;return{...e,...n?{originalExpiration:n}:{},expiration:a}},O="/latest/meta-data/iam/security-credentials/",V="AWS_EC2_METADATA_V1_DISABLED",j="ec2_metadata_v1_disabled",U="x-aws-ec2-metadata-token",$=(e={})=>((e,t={})=>{let r,a=t?.logger||console;return async()=>{let t;try{(t=await e()).expiration&&t.expiration.getTime()<Date.now()&&(t=L(t,a))}catch(e){if(r)a.warn("Credential renew failed: ",e),t=L(r,a);else throw e}return r=t,t}})(K(e),{logger:e.logger}),K=(e={})=>{let t=!1,{logger:r,profile:a}=e,{timeout:n,maxRetries:o}=g(e),i=async(r,n)=>{if(t||n.headers?.[U]==null){let t=!1,r=!1,n=await (0,T.Z)({environmentVariableSelector:t=>{let a=t[V];if(r=!!a&&"false"!==a,void 0===a)throw new s.C(`${V} not set in env, checking config file next.`,{logger:e.logger});return r},configFileSelector:e=>{let r=e[j];return t=!!r&&"false"!==r},default:!1},{profile:a})();if(e.ec2MetadataV1Disabled||n){let a=[];throw e.ec2MetadataV1Disabled&&a.push("credential provider initialization (runtime option ec2MetadataV1Disabled)"),t&&a.push(`config file profile (${j})`),r&&a.push(`process environment variable (${V})`),new D(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${a.join(", ")}].`)}}let o=(await w(async()=>{let e;try{e=await F(n)}catch(e){throw 401===e.statusCode&&(t=!1),e}return e},r)).trim();return w(async()=>{let r;try{r=await q(o,n,e)}catch(e){throw 401===e.statusCode&&(t=!1),e}return r},r)};return async()=>{let e=await M();if(t)return r?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),i(o,{...e,timeout:n});{let a;try{a=(await W({...e,timeout:n})).toString()}catch(a){if(a?.statusCode===400)throw Object.assign(a,{message:"EC2 Metadata token request returned error"});return("TimeoutError"===a.message||[403,404,405].includes(a.statusCode))&&(t=!0),r?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),i(o,{...e,timeout:n})}return i(o,{...e,headers:{[U]:a},timeout:n})}}},W=async e=>u({...e,path:"/latest/api/token",method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),F=async e=>(await u({...e,path:O})).toString(),q=async(e,t,r)=>{let a=JSON.parse((await u({...t,path:O+e})).toString());if(!m(a))throw new s.C("Invalid response received from instance metadata service.",{logger:r.logger});return h(a)}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["560"],exports.modules={"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"(e,t,r){r.d(t,{httpRequest:()=>httpRequest,ENV_CMDS_FULL_URI:()=>f,getInstanceMetadataEndpoint:()=>getInstanceMetadataEndpoint,ENV_CMDS_RELATIVE_URI:()=>g,fromContainerMetadata:()=>fromContainerMetadata,fromInstanceMetadata:()=>fromInstanceMetadata});var a,n,o,i,s=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),d=r("url"),c=r("./node_modules/@smithy/property-provider/dist-es/ProviderError.js"),l=r("buffer"),m=r("http");function httpRequest(e){return new Promise((t,r)=>{let a=(0,m.request)({method:"GET",...e,hostname:e.hostname?.replace(/^\[(.+)\]$/,"$1")});a.on("error",e=>{r(Object.assign(new c.m("Unable to connect to instance metadata service"),e)),a.destroy()}),a.on("timeout",()=>{r(new c.m("TimeoutError from instance metadata service")),a.destroy()}),a.on("response",e=>{let{statusCode:n=400}=e;(n<200||300<=n)&&(r(Object.assign(new c.m("Error response received from instance metadata service"),{statusCode:n})),a.destroy());let o=[];e.on("data",e=>{o.push(e)}),e.on("end",()=>{t(l.Buffer.concat(o)),a.destroy()})}),a.end()})}let isImdsCredentials=e=>!!e&&"object"==typeof e&&"string"==typeof e.AccessKeyId&&"string"==typeof e.SecretAccessKey&&"string"==typeof e.Token&&"string"==typeof e.Expiration,fromImdsCredentials=e=>({accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:new Date(e.Expiration),...e.AccountId&&{accountId:e.AccountId}}),p=1e3,u=0,providerConfigFromInit=({maxRetries:e=u,timeout:t=p})=>({maxRetries:e,timeout:t}),retry=(e,t)=>{let r=e();for(let a=0;a<t;a++)r=r.catch(e);return r},f="AWS_CONTAINER_CREDENTIALS_FULL_URI",g="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",h="AWS_CONTAINER_AUTHORIZATION_TOKEN",fromContainerMetadata=(e={})=>{let{timeout:t,maxRetries:r}=providerConfigFromInit(e);return()=>retry(async()=>{let r=await getCmdsUri({logger:e.logger}),a=JSON.parse(await requestFromEcsImds(t,r));if(!isImdsCredentials(a))throw new s.C("Invalid response received from instance metadata service.",{logger:e.logger});return fromImdsCredentials(a)},r)},requestFromEcsImds=async(e,t)=>(process.env[h]&&(t.headers={...t.headers,Authorization:process.env[h]}),(await httpRequest({...t,timeout:e})).toString()),v={localhost:!0,"127.0.0.1":!0},I={"http:":!0,"https:":!0},getCmdsUri=async({logger:e})=>{if(process.env[g])return{hostname:"169.254.170.2",path:process.env[g]};if(process.env[f]){let t=(0,d.parse)(process.env[f]);if(!t.hostname||!(t.hostname in v))throw new s.C(`${t.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:e});if(!t.protocol||!(t.protocol in I))throw new s.C(`${t.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:e});return{...t,port:t.port?parseInt(t.port,10):void 0}}throw new s.C(`The container metadata credential provider cannot be used unless the ${g} or ${f} environment variable is set`,{tryNextLink:!1,logger:e})};var y=r("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js");class w extends s.C{tryNextLink;name="InstanceMetadataV1FallbackError";constructor(e,t=!0){super(e,t),this.tryNextLink=t,Object.setPrototypeOf(this,w.prototype)}}var C=r("./node_modules/@smithy/url-parser/dist-es/index.js");(a=o||(o={})).IPv4="http://169.254.169.254",a.IPv6="http://[fd00:ec2::254]";let E={environmentVariableSelector:e=>e.AWS_EC2_METADATA_SERVICE_ENDPOINT,configFileSelector:e=>e.ec2_metadata_service_endpoint,default:void 0};(n=i||(i={})).IPv4="IPv4",n.IPv6="IPv6";let _={environmentVariableSelector:e=>e.AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE,configFileSelector:e=>e.ec2_metadata_service_endpoint_mode,default:i.IPv4},getInstanceMetadataEndpoint=async()=>(0,C.D)(await getFromEndpointConfig()||await getFromEndpointModeConfig()),getFromEndpointConfig=async()=>(0,y.Z)(E)(),getFromEndpointModeConfig=async()=>{let e=await (0,y.Z)(_)();switch(e){case i.IPv4:return o.IPv4;case i.IPv6:return o.IPv6;default:throw Error(`Unsupported endpoint mode: ${e}. Select from ${Object.values(i)}`)}},getExtendedInstanceMetadataCredentials=(e,t)=>{let r=300+Math.floor(300*Math.random()),a=new Date(Date.now()+1e3*r);t.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(a)}.
2
+ For more information, please visit: https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html`);let n=e.originalExpiration??e.expiration;return{...e,...n?{originalExpiration:n}:{},expiration:a}},A="/latest/meta-data/iam/security-credentials/",S="AWS_EC2_METADATA_V1_DISABLED",M="ec2_metadata_v1_disabled",b="x-aws-ec2-metadata-token",fromInstanceMetadata=(e={})=>((e,t={})=>{let r,a=t?.logger||console;return async()=>{let t;try{(t=await e()).expiration&&t.expiration.getTime()<Date.now()&&(t=getExtendedInstanceMetadataCredentials(t,a))}catch(e){if(r)a.warn("Credential renew failed: ",e),t=getExtendedInstanceMetadataCredentials(r,a);else throw e}return r=t,t}})(getInstanceMetadataProvider(e),{logger:e.logger}),getInstanceMetadataProvider=(e={})=>{let t=!1,{logger:r,profile:a}=e,{timeout:n,maxRetries:o}=providerConfigFromInit(e),getCredentials=async(r,n)=>{if(t||n.headers?.[b]==null){let t=!1,r=!1,n=await (0,y.Z)({environmentVariableSelector:t=>{let a=t[S];if(r=!!a&&"false"!==a,void 0===a)throw new s.C(`${S} not set in env, checking config file next.`,{logger:e.logger});return r},configFileSelector:e=>{let r=e[M];return t=!!r&&"false"!==r},default:!1},{profile:a})();if(e.ec2MetadataV1Disabled||n){let a=[];throw e.ec2MetadataV1Disabled&&a.push("credential provider initialization (runtime option ec2MetadataV1Disabled)"),t&&a.push(`config file profile (${M})`),r&&a.push(`process environment variable (${S})`),new w(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${a.join(", ")}].`)}}let o=(await retry(async()=>{let e;try{e=await getProfile(n)}catch(e){throw 401===e.statusCode&&(t=!1),e}return e},r)).trim();return retry(async()=>{let r;try{r=await getCredentialsFromProfile(o,n,e)}catch(e){throw 401===e.statusCode&&(t=!1),e}return r},r)};return async()=>{let e=await getInstanceMetadataEndpoint();if(t)return r?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),getCredentials(o,{...e,timeout:n});{let a;try{a=(await getMetadataToken({...e,timeout:n})).toString()}catch(a){if(a?.statusCode===400)throw Object.assign(a,{message:"EC2 Metadata token request returned error"});return("TimeoutError"===a.message||[403,404,405].includes(a.statusCode))&&(t=!0),r?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),getCredentials(o,{...e,timeout:n})}return getCredentials(o,{...e,headers:{[b]:a},timeout:n})}}},getMetadataToken=async e=>httpRequest({...e,path:"/latest/api/token",method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),getProfile=async e=>(await httpRequest({...e,path:A})).toString(),getCredentialsFromProfile=async(e,t,r)=>{let a=JSON.parse((await httpRequest({...t,path:A+e})).toString());if(!isImdsCredentials(a))throw new s.C("Invalid response received from instance metadata service.",{logger:r.logger});return fromImdsCredentials(a)}}};
package/dist/cjs/0~634.js CHANGED
@@ -1,5 +1,5 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["634"],exports.modules={"./node_modules/@aws-sdk/credential-provider-http/dist-es/index.js"(e,t,r){r.d(t,{fromHttp:()=>h});var o=r("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),s=r("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),n=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),i=r("fs/promises"),a=r.n(i),d=r("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),l=r("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),c=r("./node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js");async function u(e,t){let r=(0,c.c)(e.body),o=await r.transformToString();if(200===e.statusCode){let e=JSON.parse(o);if("string"!=typeof e.AccessKeyId||"string"!=typeof e.SecretAccessKey||"string"!=typeof e.Token||"string"!=typeof e.Expiration)throw new n.C("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:t});return{accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:(0,l.EI)(e.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let r={};try{r=JSON.parse(o)}catch(e){}throw Object.assign(new n.C(`Server responded with status: ${e.statusCode}`,{logger:t}),{Code:r.Code,Message:r.Message})}throw new n.C(`Server responded with status: ${e.statusCode}`,{logger:t})}let h=(e={})=>{let t,r,i,l;e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let c=e.awsContainerCredentialsRelativeUri??process.env.AWS_CONTAINER_CREDENTIALS_RELATIVE_URI,h=e.awsContainerCredentialsFullUri??process.env.AWS_CONTAINER_CREDENTIALS_FULL_URI,p=e.awsContainerAuthorizationToken??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN,m=e.awsContainerAuthorizationTokenFile??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE,w=e.logger?.constructor?.name!=="NoOpLogger"&&e.logger?.warn?e.logger.warn.bind(e.logger):console.warn;if(c&&h&&(w("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),w("awsContainerCredentialsFullUri will take precedence.")),p&&m&&(w("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),w("awsContainerAuthorizationToken will take precedence.")),h)t=h;else if(c)t=`http://169.254.170.2${c}`;else throw new n.C(`No HTTP credential provider host provided.
2
- Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:e.logger});let C=new URL(t);((e,t)=>{if("https:"!==e.protocol&&"169.254.170.2"!==e.hostname&&"169.254.170.23"!==e.hostname&&"[fd00:ec2::23]"!==e.hostname){if(e.hostname.includes("[")){if("[::1]"===e.hostname||"[0000:0000:0000:0000:0000:0000:0000:0001]"===e.hostname)return}else{if("localhost"===e.hostname)return;let t=e.hostname.split("."),r=e=>{let t=parseInt(e,10);return 0<=t&&t<=255};if("127"===t[0]&&r(t[1])&&r(t[2])&&r(t[3])&&4===t.length)return}throw new n.C(`URL not accepted. It must either be HTTPS or match one of the following:
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["634"],exports.modules={"./node_modules/@aws-sdk/credential-provider-http/dist-es/index.js"(e,t,r){r.d(t,{fromHttp:()=>fromHttp});var o=r("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),s=r("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),n=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),i=r("fs/promises"),a=r.n(i),d=r("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),l=r("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),c=r("./node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js");function createGetRequest(e){return new d.K({protocol:e.protocol,hostname:e.hostname,port:Number(e.port),path:e.pathname,query:Array.from(e.searchParams.entries()).reduce((e,[t,r])=>(e[t]=r,e),{}),fragment:e.hash})}async function getCredentials(e,t){let r=(0,c.c)(e.body),o=await r.transformToString();if(200===e.statusCode){let e=JSON.parse(o);if("string"!=typeof e.AccessKeyId||"string"!=typeof e.SecretAccessKey||"string"!=typeof e.Token||"string"!=typeof e.Expiration)throw new n.C("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:t});return{accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:(0,l.EI)(e.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let r={};try{r=JSON.parse(o)}catch(e){}throw Object.assign(new n.C(`Server responded with status: ${e.statusCode}`,{logger:t}),{Code:r.Code,Message:r.Message})}throw new n.C(`Server responded with status: ${e.statusCode}`,{logger:t})}let fromHttp=(e={})=>{let t,r,i,d;e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let l=e.awsContainerCredentialsRelativeUri??process.env.AWS_CONTAINER_CREDENTIALS_RELATIVE_URI,c=e.awsContainerCredentialsFullUri??process.env.AWS_CONTAINER_CREDENTIALS_FULL_URI,u=e.awsContainerAuthorizationToken??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN,h=e.awsContainerAuthorizationTokenFile??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE,p=e.logger?.constructor?.name!=="NoOpLogger"&&e.logger?.warn?e.logger.warn.bind(e.logger):console.warn;if(l&&c&&(p("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),p("awsContainerCredentialsFullUri will take precedence.")),u&&h&&(p("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),p("awsContainerAuthorizationToken will take precedence.")),c)t=c;else if(l)t=`http://169.254.170.2${l}`;else throw new n.C(`No HTTP credential provider host provided.
2
+ Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:e.logger});let m=new URL(t);((e,t)=>{if("https:"!==e.protocol&&"169.254.170.2"!==e.hostname&&"169.254.170.23"!==e.hostname&&"[fd00:ec2::23]"!==e.hostname){if(e.hostname.includes("[")){if("[::1]"===e.hostname||"[0000:0000:0000:0000:0000:0000:0000:0001]"===e.hostname)return}else{if("localhost"===e.hostname)return;let t=e.hostname.split("."),inRange=e=>{let t=parseInt(e,10);return 0<=t&&t<=255};if("127"===t[0]&&inRange(t[1])&&inRange(t[2])&&inRange(t[3])&&4===t.length)return}throw new n.C(`URL not accepted. It must either be HTTPS or match one of the following:
3
3
  - loopback CIDR 127.0.0.0/8 or [::1/128]
4
4
  - ECS container host 169.254.170.2
5
- - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:t})}})(C,e.logger);let g=s.$.create({requestTimeout:e.timeout??1e3,connectionTimeout:e.timeout??1e3});return r=async()=>{let t=new d.K({protocol:C.protocol,hostname:C.hostname,port:Number(C.port),path:C.pathname,query:Array.from(C.searchParams.entries()).reduce((e,[t,r])=>(e[t]=r,e),{}),fragment:C.hash});p?t.headers.Authorization=p:m&&(t.headers.Authorization=(await a().readFile(m)).toString());try{let e=await g.handle(t);return u(e.response).then(e=>(0,o.g)(e,"CREDENTIALS_HTTP","z"))}catch(t){throw new n.C(String(t),{logger:e.logger})}},i=e.maxRetries??3,l=e.timeout??1e3,async()=>{for(let e=0;e<i;++e)try{return await r()}catch(e){await new Promise(e=>setTimeout(e,l))}return await r()}}}};
5
+ - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:t})}})(m,e.logger);let g=s.$.create({requestTimeout:e.timeout??1e3,connectionTimeout:e.timeout??1e3});return r=async()=>{let t=createGetRequest(m);u?t.headers.Authorization=u:h&&(t.headers.Authorization=(await a().readFile(h)).toString());try{let e=await g.handle(t);return getCredentials(e.response).then(e=>(0,o.g)(e,"CREDENTIALS_HTTP","z"))}catch(t){throw new n.C(String(t),{logger:e.logger})}},i=e.maxRetries??3,d=e.timeout??1e3,async()=>{for(let e=0;e<i;++e)try{return await r()}catch(e){await new Promise(e=>setTimeout(e,d))}return await r()}}}};
package/dist/cjs/0~710.js CHANGED
@@ -1,2 +1,2 @@
1
- "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["710"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"(e,s,i){i.d(s,{fromSSO:()=>j});var t=i("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),n=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getConfigFilepath.js"),l=i("./node_modules/@smithy/types/dist-es/profile.js");let a=e=>Object.entries(e).filter(([e])=>e.startsWith(l.I.SSO_SESSION+".")).reduce((e,[s,i])=>({...e,[s.substring(s.indexOf(".")+1)]:i}),{});var d=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseIni.js"),c=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let g=()=>({}),f=async(e={})=>(0,c.TA)(e.configFilepath??(0,n.g)()).then(d.A).then(a).catch(g);var h=i("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),p=i("./node_modules/@smithy/property-provider/dist-es/ProviderError.js");class u extends p.m{name="TokenProviderError";constructor(e,s=!0){super(e,s),Object.setPrototypeOf(this,u.prototype)}}var w=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js");let m="To refresh this SSO session run 'aws sso login' with the corresponding profile.",_=async(e,s={},t)=>{let{SSOOIDCClient:o}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js")),r=e=>s.clientConfig?.[e]??s.parentClientConfig?.[e]??t?.[e];return new o(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:r("logger"),userAgentAppId:r("userAgentAppId")}))},S=async(e,s,t={},o)=>{let{CreateTokenCommand:r}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"));return(await _(s,t,o)).send(new r({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))},y=e=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new u(`Token is expired. ${m}`,!1)},C=(e,s,i=!1)=>{if(void 0===s)throw new u(`Value not present for '${e}' in SSO Token${i?". Cannot refresh":""}. ${m}`,!1)};var k=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let{writeFile:T}=i("fs").promises,x=new Date(0),O=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:d,clientConfig:c,parentClientConfig:g,callerClientConfig:p,profile:_,filepath:O,configFilepath:j,ignoreCache:v,logger:I})=>{let A,$,b="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let e=await ((e={})=>async({callerClientConfig:s}={})=>{let i;e.logger?.debug("@aws-sdk/token-providers - fromSso");let t=await (0,r.Y)(e),n=(0,o.Bz)({profile:e.profile??s?.profile}),l=t[n];if(l){if(!l.sso_session)throw new u(`Profile '${n}' is missing required property 'sso_session'.`)}else throw new u(`Profile '${n}' could not be found in shared credentials file.`,!1);let a=l.sso_session,d=(await f(e))[a];if(!d)throw new u(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let e of["sso_start_url","sso_region"])if(!d[e])throw new u(`Sso session '${a}' is missing required property '${e}'.`,!1);d.sso_start_url;let c=d.sso_region;try{i=await (0,w.v)(a)}catch(e){throw new u(`The SSO session token associated with profile=${n} was not found or is invalid. ${m}`,!1)}C("accessToken",i.accessToken),C("expiresAt",i.expiresAt);let{accessToken:g,expiresAt:h}=i,p={token:g,expiration:new Date(h)};if(p.expiration.getTime()-Date.now()>3e5)return p;if(Date.now()-x.getTime()<3e4)return y(p),p;C("clientId",i.clientId,!0),C("clientSecret",i.clientSecret,!0),C("refreshToken",i.refreshToken,!0);try{x.setTime(Date.now());let t=await S(i,c,e,s);C("accessToken",t.accessToken),C("expiresIn",t.expiresIn);let o=new Date(Date.now()+1e3*t.expiresIn);try{var _;let e;await (_={...i,accessToken:t.accessToken,expiresAt:o.toISOString(),refreshToken:t.refreshToken},e=(0,k.C)(a),T(e,JSON.stringify(_,null,2)))}catch(e){}return{token:t.accessToken,expiration:o}}catch(e){return y(p),p}})({profile:_,filepath:O,configFilepath:j,ignoreCache:v})();A={accessToken:e.token,expiresAt:new Date(e.expiration).toISOString()}}catch(e){throw new t.C(e.message,{tryNextLink:!1,logger:I})}else try{A=await (0,w.v)(e)}catch(e){throw new t.C(`The SSO session associated with this profile is invalid. ${b}`,{tryNextLink:!1,logger:I})}if(new Date(A.expiresAt).getTime()-Date.now()<=0)throw new t.C(`The SSO session associated with this profile has expired. ${b}`,{tryNextLink:!1,logger:I});let{accessToken:N}=A,{SSOClient:F,GetRoleCredentialsCommand:D}=await Promise.all([i.e("769"),i.e("965")]).then(i.bind(i,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js")),L=d||new F(Object.assign({},c??{},{logger:c?.logger??p?.logger??g?.logger,region:c?.region??l,userAgentAppId:c?.userAgentAppId??p?.userAgentAppId??g?.userAgentAppId}));try{$=await L.send(new D({accountId:n,roleName:a,accessToken:N}))}catch(e){throw new t.C(e,{tryNextLink:!1,logger:I})}let{roleCredentials:{accessKeyId:P,secretAccessKey:R,sessionToken:E,expiration:U,credentialScope:q,accountId:z}={}}=$;if(!P||!R||!E||!U)throw new t.C("SSO returns an invalid temporary credential.",{tryNextLink:!1,logger:I});let Y={accessKeyId:P,secretAccessKey:R,sessionToken:E,expiration:new Date(U),...q&&{credentialScope:q},...z&&{accountId:z}};return s?(0,h.g)(Y,"CREDENTIALS_SSO","s"):(0,h.g)(Y,"CREDENTIALS_SSO_LEGACY","u"),Y},j=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:i,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,g=(0,o.Bz)({profile:e.profile??s?.profile});if(i||n||l||a||d)if(i&&n&&l&&a)return O({ssoStartUrl:i,ssoSession:d,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger});else throw new t.C('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});{let s=(await (0,r.Y)(e))[g];if(!s)throw new t.C(`Profile ${g} was not found.`,{logger:e.logger});if(!(s&&("string"==typeof s.sso_start_url||"string"==typeof s.sso_account_id||"string"==typeof s.sso_session||"string"==typeof s.sso_region||"string"==typeof s.sso_role_name)))throw new t.C(`Profile ${g} is not configured with SSO credentials.`,{logger:e.logger});if(s?.sso_session){let o=(await f(e))[s.sso_session],r=` configurations in profile ${g} and sso-session ${s.sso_session}`;if(l&&l!==o.sso_region)throw new t.C("Conflicting SSO region"+r,{tryNextLink:!1,logger:e.logger});if(i&&i!==o.sso_start_url)throw new t.C("Conflicting SSO start_url"+r,{tryNextLink:!1,logger:e.logger});s.sso_region=o.sso_region,s.sso_start_url=o.sso_start_url}let{sso_start_url:o,sso_account_id:n,sso_region:a,sso_role_name:d,sso_session:h}=((e,s)=>{let{sso_start_url:i,sso_account_id:o,sso_region:r,sso_role_name:n}=e;if(!i||!o||!r||!n)throw new t.C(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
2
- Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e})(s,e.logger);return O({ssoStartUrl:o,ssoSession:h,ssoAccountId:n,ssoRegion:a,ssoRoleName:d,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger})}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,s,i){i.d(s,{C:()=>n});var t=i("crypto"),o=i("path"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let n=e=>{let s=(0,t.createHash)("sha1").update(e).digest("hex");return(0,o.join)((0,r.R)(),".aws","sso","cache",`${s}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,s,i){i.d(s,{a:()=>r,v:()=>n});var t=i("fs/promises"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let r={},n=async e=>{if(r[e])return r[e];let s=(0,o.C)(e);return JSON.parse(await (0,t.readFile)(s,"utf8"))}}};
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["710"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"(e,s,o){o.d(s,{fromSSO:()=>fromSSO});var i=o("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),t=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),r=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),n=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/getConfigFilepath.js"),a=o("./node_modules/@smithy/types/dist-es/profile.js");let getSsoSessionData=e=>Object.entries(e).filter(([e])=>e.startsWith(a.I.SSO_SESSION+".")).reduce((e,[s,o])=>({...e,[s.substring(s.indexOf(".")+1)]:o}),{});var l=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseIni.js"),d=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let swallowError=()=>({}),loadSsoSessionData=async(e={})=>(0,d.TA)(e.configFilepath??(0,n.g)()).then(l.A).then(getSsoSessionData).catch(swallowError);var c=o("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),g=o("./node_modules/@smithy/property-provider/dist-es/ProviderError.js");class f extends g.m{name="TokenProviderError";constructor(e,s=!0){super(e,s),Object.setPrototypeOf(this,f.prototype)}}var h=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js");let p="To refresh this SSO session run 'aws sso login' with the corresponding profile.",getSsoOidcClient=async(e,s={},i)=>{let{SSOOIDCClient:t}=await Promise.all([o.e("769"),o.e("53")]).then(o.bind(o,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js")),coalesce=e=>s.clientConfig?.[e]??s.parentClientConfig?.[e]??i?.[e];return new t(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:coalesce("logger"),userAgentAppId:coalesce("userAgentAppId")}))},getNewSsoOidcToken=async(e,s,i={},t)=>{let{CreateTokenCommand:r}=await Promise.all([o.e("769"),o.e("53")]).then(o.bind(o,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"));return(await getSsoOidcClient(s,i,t)).send(new r({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))},validateTokenExpiry=e=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new f(`Token is expired. ${p}`,!1)},validateTokenKey=(e,s,o=!1)=>{if(void 0===s)throw new f(`Value not present for '${e}' in SSO Token${o?". Cannot refresh":""}. ${p}`,!1)};var u=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let{writeFile:S}=o("fs").promises,w=new Date(0),resolveSSOCredentials=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:n,ssoRegion:a,ssoRoleName:l,ssoClient:d,clientConfig:g,parentClientConfig:m,callerClientConfig:_,profile:y,filepath:k,configFilepath:C,ignoreCache:T,logger:O})=>{let v,x,j="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let e=await ((e={})=>async({callerClientConfig:s}={})=>{let o;e.logger?.debug("@aws-sdk/token-providers - fromSso");let i=await (0,r.Y)(e),n=(0,t.Bz)({profile:e.profile??s?.profile}),a=i[n];if(a){if(!a.sso_session)throw new f(`Profile '${n}' is missing required property 'sso_session'.`)}else throw new f(`Profile '${n}' could not be found in shared credentials file.`,!1);let l=a.sso_session,d=(await loadSsoSessionData(e))[l];if(!d)throw new f(`Sso session '${l}' could not be found in shared credentials file.`,!1);for(let e of["sso_start_url","sso_region"])if(!d[e])throw new f(`Sso session '${l}' is missing required property '${e}'.`,!1);d.sso_start_url;let c=d.sso_region;try{o=await (0,h.v)(l)}catch(e){throw new f(`The SSO session token associated with profile=${n} was not found or is invalid. ${p}`,!1)}validateTokenKey("accessToken",o.accessToken),validateTokenKey("expiresAt",o.expiresAt);let{accessToken:g,expiresAt:m}=o,_={token:g,expiration:new Date(m)};if(_.expiration.getTime()-Date.now()>3e5)return _;if(Date.now()-w.getTime()<3e4)return validateTokenExpiry(_),_;validateTokenKey("clientId",o.clientId,!0),validateTokenKey("clientSecret",o.clientSecret,!0),validateTokenKey("refreshToken",o.refreshToken,!0);try{w.setTime(Date.now());let i=await getNewSsoOidcToken(o,c,e,s);validateTokenKey("accessToken",i.accessToken),validateTokenKey("expiresIn",i.expiresIn);let t=new Date(Date.now()+1e3*i.expiresIn);try{var y;let e;await (y={...o,accessToken:i.accessToken,expiresAt:t.toISOString(),refreshToken:i.refreshToken},e=(0,u.C)(l),S(e,JSON.stringify(y,null,2)))}catch(e){}return{token:i.accessToken,expiration:t}}catch(e){return validateTokenExpiry(_),_}})({profile:y,filepath:k,configFilepath:C,ignoreCache:T})();v={accessToken:e.token,expiresAt:new Date(e.expiration).toISOString()}}catch(e){throw new i.C(e.message,{tryNextLink:!1,logger:O})}else try{v=await (0,h.v)(e)}catch(e){throw new i.C(`The SSO session associated with this profile is invalid. ${j}`,{tryNextLink:!1,logger:O})}if(new Date(v.expiresAt).getTime()-Date.now()<=0)throw new i.C(`The SSO session associated with this profile has expired. ${j}`,{tryNextLink:!1,logger:O});let{accessToken:I}=v,{SSOClient:A,GetRoleCredentialsCommand:F}=await Promise.all([o.e("769"),o.e("965")]).then(o.bind(o,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js")),D=d||new A(Object.assign({},g??{},{logger:g?.logger??_?.logger??m?.logger,region:g?.region??a,userAgentAppId:g?.userAgentAppId??_?.userAgentAppId??m?.userAgentAppId}));try{x=await D.send(new F({accountId:n,roleName:l,accessToken:I}))}catch(e){throw new i.C(e,{tryNextLink:!1,logger:O})}let{roleCredentials:{accessKeyId:N,secretAccessKey:$,sessionToken:b,expiration:E,credentialScope:L,accountId:P}={}}=x;if(!N||!$||!b||!E)throw new i.C("SSO returns an invalid temporary credential.",{tryNextLink:!1,logger:O});let R={accessKeyId:N,secretAccessKey:$,sessionToken:b,expiration:new Date(E),...L&&{credentialScope:L},...P&&{accountId:P}};return s?(0,c.g)(R,"CREDENTIALS_SSO","s"):(0,c.g)(R,"CREDENTIALS_SSO_LEGACY","u"),R},fromSSO=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:o,ssoAccountId:n,ssoRegion:a,ssoRoleName:l,ssoSession:d}=e,{ssoClient:c}=e,g=(0,t.Bz)({profile:e.profile??s?.profile});if(o||n||a||l||d)if(o&&n&&a&&l)return resolveSSOCredentials({ssoStartUrl:o,ssoSession:d,ssoAccountId:n,ssoRegion:a,ssoRoleName:l,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger});else throw new i.C('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});{let s=(await (0,r.Y)(e))[g];if(!s)throw new i.C(`Profile ${g} was not found.`,{logger:e.logger});if(!(s&&("string"==typeof s.sso_start_url||"string"==typeof s.sso_account_id||"string"==typeof s.sso_session||"string"==typeof s.sso_region||"string"==typeof s.sso_role_name)))throw new i.C(`Profile ${g} is not configured with SSO credentials.`,{logger:e.logger});if(s?.sso_session){let t=(await loadSsoSessionData(e))[s.sso_session],r=` configurations in profile ${g} and sso-session ${s.sso_session}`;if(a&&a!==t.sso_region)throw new i.C("Conflicting SSO region"+r,{tryNextLink:!1,logger:e.logger});if(o&&o!==t.sso_start_url)throw new i.C("Conflicting SSO start_url"+r,{tryNextLink:!1,logger:e.logger});s.sso_region=t.sso_region,s.sso_start_url=t.sso_start_url}let{sso_start_url:t,sso_account_id:n,sso_region:l,sso_role_name:d,sso_session:f}=((e,s)=>{let{sso_start_url:o,sso_account_id:t,sso_region:r,sso_role_name:n}=e;if(!o||!t||!r||!n)throw new i.C(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
2
+ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e})(s,e.logger);return resolveSSOCredentials({ssoStartUrl:t,ssoSession:f,ssoAccountId:n,ssoRegion:l,ssoRoleName:d,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger})}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,s,o){o.d(s,{C:()=>getSSOTokenFilepath});var i=o("crypto"),t=o("path"),r=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let getSSOTokenFilepath=e=>{let s=(0,i.createHash)("sha1").update(e).digest("hex");return(0,t.join)((0,r.R)(),".aws","sso","cache",`${s}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,s,o){o.d(s,{a:()=>r,v:()=>getSSOTokenFromFile});var i=o("fs/promises"),t=o("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let r={},getSSOTokenFromFile=async e=>{if(r[e])return r[e];let s=(0,t.C)(e);return JSON.parse(await (0,i.readFile)(s,"utf8"))}}};