coze-coding-dev-sdk 0.7.4 → 0.7.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. package/bin/coze-coding-ai.js +1 -1
  2. package/dist/cjs/134.js +1 -0
  3. package/dist/cjs/195.js +1 -0
  4. package/dist/cjs/216.js +1 -0
  5. package/dist/cjs/292.js +1 -0
  6. package/dist/cjs/329.js +2 -0
  7. package/dist/cjs/335.js +1 -0
  8. package/dist/cjs/53.js +1 -0
  9. package/dist/cjs/560.js +2 -0
  10. package/dist/cjs/634.js +5 -0
  11. package/dist/cjs/710.js +2 -0
  12. package/dist/cjs/730.js +1 -0
  13. package/dist/cjs/769.js +1 -0
  14. package/dist/cjs/864.js +1 -0
  15. package/dist/cjs/911.js +1 -0
  16. package/dist/cjs/965.js +1 -0
  17. package/dist/cjs/cli/index.js +76 -0
  18. package/dist/cjs/cli/index.js.LICENSE.txt +13 -0
  19. package/dist/cjs/index.js +85 -0
  20. package/dist/cjs/index.js.LICENSE.txt +13 -0
  21. package/dist/types/cli/commands/chat.d.ts.map +1 -0
  22. package/dist/types/cli/commands/db.d.ts.map +1 -0
  23. package/dist/types/cli/commands/embedding.d.ts.map +1 -0
  24. package/dist/types/cli/commands/image.d.ts.map +1 -0
  25. package/dist/types/cli/commands/knowledge.d.ts.map +1 -0
  26. package/dist/types/cli/commands/search.d.ts.map +1 -0
  27. package/dist/types/cli/commands/video.d.ts.map +1 -0
  28. package/dist/types/cli/commands/voice.d.ts.map +1 -0
  29. package/dist/types/cli/constants.d.ts.map +1 -0
  30. package/dist/{cli → types/cli}/index.d.ts.map +1 -1
  31. package/dist/types/cli/utils.d.ts.map +1 -0
  32. package/dist/types/core/client.d.ts.map +1 -0
  33. package/dist/types/core/config.d.ts.map +1 -0
  34. package/dist/types/core/exceptions.d.ts.map +1 -0
  35. package/dist/types/core/headers.d.ts +4 -0
  36. package/dist/types/core/headers.d.ts.map +1 -0
  37. package/dist/{core → types/core}/index.d.ts +1 -0
  38. package/dist/types/core/index.d.ts.map +1 -0
  39. package/dist/types/database/client.d.ts.map +1 -0
  40. package/dist/types/database/index.d.ts.map +1 -0
  41. package/dist/types/database/migration.d.ts.map +1 -0
  42. package/dist/types/database/models.d.ts.map +1 -0
  43. package/dist/types/embedding/client.d.ts.map +1 -0
  44. package/dist/types/embedding/index.d.ts.map +1 -0
  45. package/dist/types/embedding/types.d.ts.map +1 -0
  46. package/dist/types/image/client.d.ts.map +1 -0
  47. package/dist/types/image/index.d.ts.map +1 -0
  48. package/dist/types/image/models.d.ts.map +1 -0
  49. package/dist/types/index.d.ts.map +1 -0
  50. package/dist/types/knowledge/client.d.ts.map +1 -0
  51. package/dist/types/knowledge/index.d.ts.map +1 -0
  52. package/dist/types/knowledge/models.d.ts.map +1 -0
  53. package/dist/types/llm/client.d.ts.map +1 -0
  54. package/dist/types/llm/index.d.ts.map +1 -0
  55. package/dist/types/llm/models.d.ts.map +1 -0
  56. package/dist/types/s3/client.d.ts.map +1 -0
  57. package/dist/types/s3/index.d.ts.map +1 -0
  58. package/dist/{s3 → types/s3}/models.d.ts +1 -1
  59. package/dist/types/s3/models.d.ts.map +1 -0
  60. package/dist/types/search/client.d.ts.map +1 -0
  61. package/dist/types/search/index.d.ts.map +1 -0
  62. package/dist/types/search/models.d.ts.map +1 -0
  63. package/dist/types/version.d.ts.map +1 -0
  64. package/dist/types/video/client.d.ts.map +1 -0
  65. package/dist/types/video/index.d.ts.map +1 -0
  66. package/dist/types/video/models.d.ts.map +1 -0
  67. package/dist/types/video_edit/client.d.ts.map +1 -0
  68. package/dist/types/video_edit/index.d.ts.map +1 -0
  69. package/dist/types/video_edit/models.d.ts.map +1 -0
  70. package/dist/types/voice/asr.d.ts.map +1 -0
  71. package/dist/types/voice/index.d.ts.map +1 -0
  72. package/dist/types/voice/models.d.ts.map +1 -0
  73. package/dist/types/voice/tts.d.ts.map +1 -0
  74. package/package.json +25 -16
  75. package/dist/cli/commands/chat.d.ts.map +0 -1
  76. package/dist/cli/commands/chat.js +0 -59
  77. package/dist/cli/commands/chat.js.map +0 -1
  78. package/dist/cli/commands/db.d.ts.map +0 -1
  79. package/dist/cli/commands/db.js +0 -91
  80. package/dist/cli/commands/db.js.map +0 -1
  81. package/dist/cli/commands/embedding.d.ts.map +0 -1
  82. package/dist/cli/commands/embedding.js +0 -115
  83. package/dist/cli/commands/embedding.js.map +0 -1
  84. package/dist/cli/commands/image.d.ts.map +0 -1
  85. package/dist/cli/commands/image.js +0 -93
  86. package/dist/cli/commands/image.js.map +0 -1
  87. package/dist/cli/commands/knowledge.d.ts.map +0 -1
  88. package/dist/cli/commands/knowledge.js +0 -119
  89. package/dist/cli/commands/knowledge.js.map +0 -1
  90. package/dist/cli/commands/search.d.ts.map +0 -1
  91. package/dist/cli/commands/search.js +0 -56
  92. package/dist/cli/commands/search.js.map +0 -1
  93. package/dist/cli/commands/video.d.ts.map +0 -1
  94. package/dist/cli/commands/video.js +0 -190
  95. package/dist/cli/commands/video.js.map +0 -1
  96. package/dist/cli/commands/voice.d.ts.map +0 -1
  97. package/dist/cli/commands/voice.js +0 -113
  98. package/dist/cli/commands/voice.js.map +0 -1
  99. package/dist/cli/constants.d.ts.map +0 -1
  100. package/dist/cli/constants.js +0 -7
  101. package/dist/cli/constants.js.map +0 -1
  102. package/dist/cli/index.js +0 -27
  103. package/dist/cli/index.js.map +0 -1
  104. package/dist/cli/utils.d.ts.map +0 -1
  105. package/dist/cli/utils.js +0 -58
  106. package/dist/cli/utils.js.map +0 -1
  107. package/dist/core/client.d.ts.map +0 -1
  108. package/dist/core/client.js +0 -185
  109. package/dist/core/client.js.map +0 -1
  110. package/dist/core/config.d.ts.map +0 -1
  111. package/dist/core/config.js +0 -29
  112. package/dist/core/config.js.map +0 -1
  113. package/dist/core/exceptions.d.ts.map +0 -1
  114. package/dist/core/exceptions.js +0 -35
  115. package/dist/core/exceptions.js.map +0 -1
  116. package/dist/core/index.d.ts.map +0 -1
  117. package/dist/core/index.js +0 -13
  118. package/dist/core/index.js.map +0 -1
  119. package/dist/database/client.d.ts.map +0 -1
  120. package/dist/database/client.js +0 -142
  121. package/dist/database/client.js.map +0 -1
  122. package/dist/database/index.d.ts.map +0 -1
  123. package/dist/database/index.js +0 -20
  124. package/dist/database/index.js.map +0 -1
  125. package/dist/database/migration.d.ts.map +0 -1
  126. package/dist/database/migration.js +0 -222
  127. package/dist/database/migration.js.map +0 -1
  128. package/dist/database/models.d.ts.map +0 -1
  129. package/dist/database/models.js +0 -15
  130. package/dist/database/models.js.map +0 -1
  131. package/dist/embedding/client.d.ts.map +0 -1
  132. package/dist/embedding/client.js +0 -152
  133. package/dist/embedding/client.js.map +0 -1
  134. package/dist/embedding/index.d.ts.map +0 -1
  135. package/dist/embedding/index.js +0 -8
  136. package/dist/embedding/index.js.map +0 -1
  137. package/dist/embedding/types.d.ts.map +0 -1
  138. package/dist/embedding/types.js +0 -9
  139. package/dist/embedding/types.js.map +0 -1
  140. package/dist/image/client.d.ts.map +0 -1
  141. package/dist/image/client.js +0 -34
  142. package/dist/image/client.js.map +0 -1
  143. package/dist/image/index.d.ts.map +0 -1
  144. package/dist/image/index.js +0 -19
  145. package/dist/image/index.js.map +0 -1
  146. package/dist/image/models.d.ts.map +0 -1
  147. package/dist/image/models.js +0 -109
  148. package/dist/image/models.js.map +0 -1
  149. package/dist/index.d.ts.map +0 -1
  150. package/dist/index.js +0 -31
  151. package/dist/index.js.map +0 -1
  152. package/dist/knowledge/client.d.ts.map +0 -1
  153. package/dist/knowledge/client.js +0 -68
  154. package/dist/knowledge/client.js.map +0 -1
  155. package/dist/knowledge/index.d.ts.map +0 -1
  156. package/dist/knowledge/index.js +0 -19
  157. package/dist/knowledge/index.js.map +0 -1
  158. package/dist/knowledge/models.d.ts.map +0 -1
  159. package/dist/knowledge/models.js +0 -10
  160. package/dist/knowledge/models.js.map +0 -1
  161. package/dist/llm/client.d.ts.map +0 -1
  162. package/dist/llm/client.js +0 -111
  163. package/dist/llm/client.js.map +0 -1
  164. package/dist/llm/index.d.ts.map +0 -1
  165. package/dist/llm/index.js +0 -8
  166. package/dist/llm/index.js.map +0 -1
  167. package/dist/llm/models.d.ts.map +0 -1
  168. package/dist/llm/models.js +0 -11
  169. package/dist/llm/models.js.map +0 -1
  170. package/dist/s3/client.d.ts.map +0 -1
  171. package/dist/s3/client.js +0 -283
  172. package/dist/s3/client.js.map +0 -1
  173. package/dist/s3/index.d.ts.map +0 -1
  174. package/dist/s3/index.js +0 -19
  175. package/dist/s3/index.js.map +0 -1
  176. package/dist/s3/models.d.ts.map +0 -1
  177. package/dist/s3/models.js +0 -15
  178. package/dist/s3/models.js.map +0 -1
  179. package/dist/search/client.d.ts.map +0 -1
  180. package/dist/search/client.js +0 -83
  181. package/dist/search/client.js.map +0 -1
  182. package/dist/search/index.d.ts.map +0 -1
  183. package/dist/search/index.js +0 -19
  184. package/dist/search/index.js.map +0 -1
  185. package/dist/search/models.d.ts.map +0 -1
  186. package/dist/search/models.js +0 -70
  187. package/dist/search/models.js.map +0 -1
  188. package/dist/version.d.ts.map +0 -1
  189. package/dist/version.js +0 -5
  190. package/dist/version.js.map +0 -1
  191. package/dist/video/client.d.ts.map +0 -1
  192. package/dist/video/client.js +0 -157
  193. package/dist/video/client.js.map +0 -1
  194. package/dist/video/index.d.ts.map +0 -1
  195. package/dist/video/index.js +0 -19
  196. package/dist/video/index.js.map +0 -1
  197. package/dist/video/models.d.ts.map +0 -1
  198. package/dist/video/models.js +0 -14
  199. package/dist/video/models.js.map +0 -1
  200. package/dist/video_edit/client.d.ts.map +0 -1
  201. package/dist/video_edit/client.js +0 -225
  202. package/dist/video_edit/client.js.map +0 -1
  203. package/dist/video_edit/index.d.ts.map +0 -1
  204. package/dist/video_edit/index.js +0 -9
  205. package/dist/video_edit/index.js.map +0 -1
  206. package/dist/video_edit/models.d.ts.map +0 -1
  207. package/dist/video_edit/models.js +0 -24
  208. package/dist/video_edit/models.js.map +0 -1
  209. package/dist/voice/asr.d.ts.map +0 -1
  210. package/dist/voice/asr.js +0 -55
  211. package/dist/voice/asr.js.map +0 -1
  212. package/dist/voice/index.d.ts.map +0 -1
  213. package/dist/voice/index.js +0 -20
  214. package/dist/voice/index.js.map +0 -1
  215. package/dist/voice/models.d.ts.map +0 -1
  216. package/dist/voice/models.js +0 -52
  217. package/dist/voice/models.js.map +0 -1
  218. package/dist/voice/tts.d.ts.map +0 -1
  219. package/dist/voice/tts.js +0 -100
  220. package/dist/voice/tts.js.map +0 -1
  221. /package/dist/{cli → types/cli}/commands/chat.d.ts +0 -0
  222. /package/dist/{cli → types/cli}/commands/db.d.ts +0 -0
  223. /package/dist/{cli → types/cli}/commands/embedding.d.ts +0 -0
  224. /package/dist/{cli → types/cli}/commands/image.d.ts +0 -0
  225. /package/dist/{cli → types/cli}/commands/knowledge.d.ts +0 -0
  226. /package/dist/{cli → types/cli}/commands/search.d.ts +0 -0
  227. /package/dist/{cli → types/cli}/commands/video.d.ts +0 -0
  228. /package/dist/{cli → types/cli}/commands/voice.d.ts +0 -0
  229. /package/dist/{cli → types/cli}/constants.d.ts +0 -0
  230. /package/dist/{cli → types/cli}/index.d.ts +0 -0
  231. /package/dist/{cli → types/cli}/utils.d.ts +0 -0
  232. /package/dist/{core → types/core}/client.d.ts +0 -0
  233. /package/dist/{core → types/core}/config.d.ts +0 -0
  234. /package/dist/{core → types/core}/exceptions.d.ts +0 -0
  235. /package/dist/{database → types/database}/client.d.ts +0 -0
  236. /package/dist/{database → types/database}/index.d.ts +0 -0
  237. /package/dist/{database → types/database}/migration.d.ts +0 -0
  238. /package/dist/{database → types/database}/models.d.ts +0 -0
  239. /package/dist/{embedding → types/embedding}/client.d.ts +0 -0
  240. /package/dist/{embedding → types/embedding}/index.d.ts +0 -0
  241. /package/dist/{embedding → types/embedding}/types.d.ts +0 -0
  242. /package/dist/{image → types/image}/client.d.ts +0 -0
  243. /package/dist/{image → types/image}/index.d.ts +0 -0
  244. /package/dist/{image → types/image}/models.d.ts +0 -0
  245. /package/dist/{index.d.ts → types/index.d.ts} +0 -0
  246. /package/dist/{knowledge → types/knowledge}/client.d.ts +0 -0
  247. /package/dist/{knowledge → types/knowledge}/index.d.ts +0 -0
  248. /package/dist/{knowledge → types/knowledge}/models.d.ts +0 -0
  249. /package/dist/{llm → types/llm}/client.d.ts +0 -0
  250. /package/dist/{llm → types/llm}/index.d.ts +0 -0
  251. /package/dist/{llm → types/llm}/models.d.ts +0 -0
  252. /package/dist/{s3 → types/s3}/client.d.ts +0 -0
  253. /package/dist/{s3 → types/s3}/index.d.ts +0 -0
  254. /package/dist/{search → types/search}/client.d.ts +0 -0
  255. /package/dist/{search → types/search}/index.d.ts +0 -0
  256. /package/dist/{search → types/search}/models.d.ts +0 -0
  257. /package/dist/{version.d.ts → types/version.d.ts} +0 -0
  258. /package/dist/{video → types/video}/client.d.ts +0 -0
  259. /package/dist/{video → types/video}/index.d.ts +0 -0
  260. /package/dist/{video → types/video}/models.d.ts +0 -0
  261. /package/dist/{video_edit → types/video_edit}/client.d.ts +0 -0
  262. /package/dist/{video_edit → types/video_edit}/index.d.ts +0 -0
  263. /package/dist/{video_edit → types/video_edit}/models.d.ts +0 -0
  264. /package/dist/{voice → types/voice}/asr.d.ts +0 -0
  265. /package/dist/{voice → types/voice}/index.d.ts +0 -0
  266. /package/dist/{voice → types/voice}/models.d.ts +0 -0
  267. /package/dist/{voice → types/voice}/tts.d.ts +0 -0
@@ -1,3 +1,3 @@
1
1
  #!/usr/bin/env node
2
2
 
3
- require('../dist/cli/index.js');
3
+ require('../dist/cjs/cli/index.js');
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["134"],exports.modules={"./node_modules/@aws-sdk/credential-provider-env/dist-es/index.js"(e,r,s){s.d(r,{fromEnv:()=>d.sF});var d=s("./node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js")}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["195"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/signin/index.js"(e,s,t){t.d(s,{CreateOAuth2TokenCommand:()=>si,SigninClient:()=>ex});var n=t("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),i=t("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),o=t("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),r=t("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),d=t("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),a=t("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),u=t("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),l=t("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),c=t("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),p=t("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),m=t("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),h=t("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),g=t("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),f=t("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),y=t("./node_modules/@smithy/smithy-client/dist-es/client.js"),S=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),w=t("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),k=t("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let _=async(e,s,t)=>({operation:(0,w.u)(s).operation,region:await (0,k.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),v=e=>{let s=[];if("CreateOAuth2Token"===e.operation)s.push({schemeId:"smithy.api#noAuth"});else s.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"signin",region:e.region},propertiesExtractor:(e,s)=>({signingProperties:{config:e,context:s}})});return s},j={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var P=t("./node_modules/@aws-sdk/nested-clients/package.json"),E=t("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),A=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),x=t("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),I=t("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),b=t("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),C=t("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),O=t("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),R=t("./node_modules/@smithy/hash-node/dist-es/index.js"),D=t("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),T=t("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),U=t("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),F=t("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),q=t("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),M=t("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),V=t("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),$=t("./node_modules/@smithy/util-retry/dist-es/config.js"),H=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),N=t("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),z=t("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),L=t("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),Z=t("./node_modules/@smithy/url-parser/dist-es/index.js"),B=t("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),K=t("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),G=t("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),W=t("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),Y=t("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),J=t("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),Q=t("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),X=t("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let ee="required",es="argv",et="isSet",en="booleanEquals",ei="error",eo="endpoint",er="tree",ed="PartitionResult",ea="stringEquals",eu={[ee]:!0,default:!1,type:"boolean"},el={[ee]:!1,type:"string"},ec={ref:"Endpoint"},ep={fn:en,[es]:[{ref:"UseFIPS"},!0]},em={fn:en,[es]:[{ref:"UseDualStack"},!0]},eh={},eg={fn:"getAttr",[es]:[{ref:ed},"name"]},ef={fn:en,[es]:[{ref:"UseFIPS"},!1]},ey={fn:en,[es]:[{ref:"UseDualStack"},!1]},eS={fn:"getAttr",[es]:[{ref:ed},"supportsFIPS"]},ew={fn:en,[es]:[!0,{fn:"getAttr",[es]:[{ref:ed},"supportsDualStack"]}]},ek=[{ref:"Region"}],e_={version:"1.0",parameters:{UseDualStack:eu,UseFIPS:eu,Endpoint:el,Region:el},rules:[{conditions:[{fn:et,[es]:[ec]}],rules:[{conditions:[ep],error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:ei},{rules:[{conditions:[em],error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:ei},{endpoint:{url:ec,properties:eh,headers:eh},type:eo}],type:er}],type:er},{rules:[{conditions:[{fn:et,[es]:ek}],rules:[{conditions:[{fn:"aws.partition",[es]:ek,assign:ed}],rules:[{conditions:[{fn:ea,[es]:[eg,"aws"]},ef,ey],endpoint:{url:"https://{Region}.signin.aws.amazon.com",properties:eh,headers:eh},type:eo},{conditions:[{fn:ea,[es]:[eg,"aws-cn"]},ef,ey],endpoint:{url:"https://{Region}.signin.amazonaws.cn",properties:eh,headers:eh},type:eo},{conditions:[{fn:ea,[es]:[eg,"aws-us-gov"]},ef,ey],endpoint:{url:"https://{Region}.signin.amazonaws-us-gov.com",properties:eh,headers:eh},type:eo},{conditions:[ep,em],rules:[{conditions:[{fn:en,[es]:[!0,eS]},ew],rules:[{endpoint:{url:"https://signin-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eh,headers:eh},type:eo}],type:er},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:ei}],type:er},{conditions:[ep,ey],rules:[{conditions:[{fn:en,[es]:[eS,!0]}],rules:[{endpoint:{url:"https://signin-fips.{Region}.{PartitionResult#dnsSuffix}",properties:eh,headers:eh},type:eo}],type:er},{error:"FIPS is enabled but this partition does not support FIPS",type:ei}],type:er},{conditions:[ef,em],rules:[{conditions:[ew],rules:[{endpoint:{url:"https://signin.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eh,headers:eh},type:eo}],type:er},{error:"DualStack is enabled but this partition does not support DualStack",type:ei}],type:er},{endpoint:{url:"https://signin.{Region}.{PartitionResult#dnsSuffix}",properties:eh,headers:eh},type:eo}],type:er}],type:er},{error:"Invalid Configuration: Missing Region",type:ei}],type:er}]},ev=new J.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ej=(e,s={})=>ev.get(e,()=>(0,Q.s)(e_,{endpointParams:e,logger:s.logger}));X.m.aws=Y.UF;var eP=t("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),eE=t("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),eA=t("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class ex extends y.K{config;constructor(...[e]){const s=(e=>{(0,F.I)(process.version);let s=(0,V.I)(e),t=()=>s().then(q.l),n={apiVersion:"2023-01-01",base64Decoder:e?.base64Decoder??B.E,base64Encoder:e?.base64Encoder??K.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??ej,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??v,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new H.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new z.m}],logger:e?.logger??new L.N,protocol:e?.protocol??N.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.signin",version:"2023-01-01",serviceTarget:"Signin"},serviceId:e?.serviceId??"Signin",urlParser:e?.urlParser??Z.D,utf8Decoder:e?.utf8Decoder??G.a,utf8Encoder:e?.utf8Encoder??W.P};(0,E.I)(process.version);let i={profile:e?.profile,logger:n.logger};return{...n,...e,runtime:"node",defaultsMode:s,authSchemePreference:e?.authSchemePreference??(0,D.Z)(A.$,i),bodyLengthChecker:e?.bodyLengthChecker??M.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,x.pf)({serviceId:n.serviceId,clientVersion:P.rE}),maxAttempts:e?.maxAttempts??(0,D.Z)(g.qs,e),region:e?.region??(0,D.Z)(b.GG,{...b.zH,...i}),requestHandler:T.$.create(e?.requestHandler??t),retryMode:e?.retryMode??(0,D.Z)({...g.kN,default:async()=>(await t()).retryMode||$.L},e),sha256:e?.sha256??R.V.bind(null,"sha256"),streamCollector:e?.streamCollector??U.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,D.Z)(C.e$,i),useFipsEndpoint:e?.useFipsEndpoint??(0,D.Z)(O.Ko,i),userAgentAppId:e?.userAgentAppId??(0,D.Z)(I.hV,i)}})(e||{});super(s),this.initConfig=s;const t=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"signin"}))(s),y=(0,r.D)(t),w=(0,g.$z)(y),j=(0,a.T)(w),Y=(0,n.OV)(j),J=((e,s)=>{let t,n,i,o=Object.assign((0,eP.R)(e),(0,eA.xA)(e),(0,eE.e)(e),(t=e.httpAuthSchemes,n=e.httpAuthSchemeProvider,i=e.credentials,{setHttpAuthScheme(e){let s=t.findIndex(s=>s.schemeId===e.schemeId);-1===s?t.push(e):t.splice(s,1,e)},httpAuthSchemes:()=>t,setHttpAuthSchemeProvider(e){n=e},httpAuthSchemeProvider:()=>n,setCredentials(e){i=e},credentials:()=>i}));return s.forEach(e=>e.configure(o)),Object.assign(e,(0,eP.$)(o),(0,eA.uv)(o),(0,eE.j)(o),{httpAuthSchemes:o.httpAuthSchemes(),httpAuthSchemeProvider:o.httpAuthSchemeProvider(),credentials:o.credentials()})})((e=>Object.assign((0,S.h)(e),{authSchemePreference:(0,k.t)(e.authSchemePreference??[])}))((0,h.C)(Y)),e?.extensions||[]);this.config=J,this.middlewareStack.use((0,p.wq)(this.config)),this.middlewareStack.use((0,d.sM)(this.config)),this.middlewareStack.use((0,f.ey)(this.config)),this.middlewareStack.use((0,m.vK)(this.config)),this.middlewareStack.use((0,n.TC)(this.config)),this.middlewareStack.use((0,i.Y7)(this.config)),this.middlewareStack.use((0,o.n)(this.config)),this.middlewareStack.use((0,u.w)(this.config,{httpAuthSchemeParametersProvider:_,identityProviderConfigProvider:async e=>new l.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,c.l)(this.config))}destroy(){super.destroy()}}var eI=t("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),eb=t("./node_modules/@smithy/smithy-client/dist-es/command.js"),eC=t("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),eO=t("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class eR extends eO.T{constructor(e){super(e),Object.setPrototypeOf(this,eR.prototype)}}class eD extends eR{name="AccessDeniedException";$fault="client";error;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,eD.prototype),this.error=e.error}}class eT extends eR{name="InternalServerException";$fault="server";error;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,eT.prototype),this.error=e.error}}class eU extends eR{name="TooManyRequestsError";$fault="client";error;constructor(e){super({name:"TooManyRequestsError",$fault:"client",...e}),Object.setPrototypeOf(this,eU.prototype),this.error=e.error}}class eF extends eR{name="ValidationException";$fault="client";error;constructor(e){super({name:"ValidationException",$fault:"client",...e}),Object.setPrototypeOf(this,eF.prototype),this.error=e.error}}let eq="accessKeyId",eM="accessToken",eV="client",e$="clientId",eH="codeVerifier",eN="error",ez="expiresIn",eL="grantType",eZ="httpError",eB="idToken",eK="jsonName",eG="message",eW="refreshToken",eY="redirectUri",eJ="secretAccessKey",eQ="sessionToken",eX="smithy.ts.sdk.synthetic.com.amazonaws.signin",e0="tokenType",e1="com.amazonaws.signin";var e2=[0,e1,"RefreshToken",8,0],e4=[-3,e1,"AccessDeniedException",{[eN]:eV},[eN,eG],[0,0]];eC.O.for(e1).registerError(e4,eD);var e6=[3,e1,"AccessToken",8,[eq,eJ,eQ],[[0,{[eK]:eq}],[0,{[eK]:eJ}],[0,{[eK]:eQ}]]],e3=[3,e1,"CreateOAuth2TokenRequest",0,["tokenInput"],[[()=>e8,16]]],e8=[3,e1,"CreateOAuth2TokenRequestBody",0,[e$,eL,"code",eY,eH,eW],[[0,{[eK]:e$}],[0,{[eK]:eL}],0,[0,{[eK]:eY}],[0,{[eK]:eH}],[()=>e2,{[eK]:eW}]]],e5=[3,e1,"CreateOAuth2TokenResponse",0,["tokenOutput"],[[()=>e9,16]]],e9=[3,e1,"CreateOAuth2TokenResponseBody",0,[eM,e0,ez,eW,eB],[[()=>e6,{[eK]:eM}],[0,{[eK]:e0}],[1,{[eK]:ez}],[()=>e2,{[eK]:eW}],[0,{[eK]:eB}]]],e7=[-3,e1,"InternalServerException",{[eN]:"server",[eZ]:500},[eN,eG],[0,0]];eC.O.for(e1).registerError(e7,eT);var se=[-3,e1,"TooManyRequestsError",{[eN]:eV,[eZ]:429},[eN,eG],[0,0]];eC.O.for(e1).registerError(se,eU);var ss=[-3,e1,"ValidationException",{[eN]:eV,[eZ]:400},[eN,eG],[0,0]];eC.O.for(e1).registerError(ss,eF);var st=[-3,eX,"SigninServiceException",0,[],[]];eC.O.for(eX).registerError(st,eR);var sn=[9,e1,"CreateOAuth2Token",{http:["POST","/v1/token",200]},()=>e3,()=>e5];class si extends eb.u.classBuilder().ep(j).m(function(e,s,t,n){return[(0,eI.r)(t,e.getEndpointParameterInstructions())]}).s("Signin","CreateOAuth2Token",{}).n("SigninClient","CreateOAuth2TokenCommand").sc(sn).build(){}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["216"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"(e,t,s){s.d(t,{getDefaultRoleAssumerWithWebIdentity:()=>tJ,getDefaultRoleAssumer:()=>tZ});var i=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),o=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),r=s("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js");let n=!1;var d=s("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),a=s("./node_modules/@smithy/smithy-client/dist-es/command.js");let l={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var c=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),u=s("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class m extends u.T{constructor(e){super(e),Object.setPrototypeOf(this,m.prototype)}}class h extends m{name="ExpiredTokenException";$fault="client";constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,h.prototype)}}class p extends m{name="MalformedPolicyDocumentException";$fault="client";constructor(e){super({name:"MalformedPolicyDocumentException",$fault:"client",...e}),Object.setPrototypeOf(this,p.prototype)}}class g extends m{name="PackedPolicyTooLargeException";$fault="client";constructor(e){super({name:"PackedPolicyTooLargeException",$fault:"client",...e}),Object.setPrototypeOf(this,g.prototype)}}class f extends m{name="RegionDisabledException";$fault="client";constructor(e){super({name:"RegionDisabledException",$fault:"client",...e}),Object.setPrototypeOf(this,f.prototype)}}class y extends m{name="IDPRejectedClaimException";$fault="client";constructor(e){super({name:"IDPRejectedClaimException",$fault:"client",...e}),Object.setPrototypeOf(this,y.prototype)}}class S extends m{name="InvalidIdentityTokenException";$fault="client";constructor(e){super({name:"InvalidIdentityTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,S.prototype)}}class w extends m{name="IDPCommunicationErrorException";$fault="client";constructor(e){super({name:"IDPCommunicationErrorException",$fault:"client",...e}),Object.setPrototypeOf(this,w.prototype)}}let E="AssumedRoleUser",b="Credentials",v="DurationSeconds",P="Policy",x="PolicyArns",A="PackedPolicySize",C="RoleArn",j="RoleSessionName",_="SourceIdentity",I="awsQueryError",k="client",R="error",T="httpError",D="message",$="smithy.ts.sdk.synthetic.com.amazonaws.sts",O="com.amazonaws.sts";var z=[0,O,"accessKeySecretType",8,0],N=[0,O,"clientTokenType",8,0],U=[3,O,E,0,["AssumedRoleId","Arn"],[0,0]],K=[3,O,"AssumeRoleRequest",0,[C,j,x,P,v,"Tags","TransitiveTagKeys","ExternalId","SerialNumber","TokenCode",_,"ProvidedContexts"],[0,0,()=>et,0,1,()=>ei,64,0,0,0,0,()=>es]],M=[3,O,"AssumeRoleResponse",0,[b,E,A,_],[[()=>W,0],()=>U,1,0]],L=[3,O,"AssumeRoleWithWebIdentityRequest",0,[C,j,"WebIdentityToken","ProviderId",x,P,v],[0,0,[()=>N,0],0,()=>et,0,1]],V=[3,O,"AssumeRoleWithWebIdentityResponse",0,[b,"SubjectFromWebIdentityToken",E,A,"Provider","Audience",_],[[()=>W,0],0,()=>U,1,0,0,0]],W=[3,O,b,0,["AccessKeyId","SecretAccessKey","SessionToken","Expiration"],[0,[()=>z,0],0,4]],F=[-3,O,"ExpiredTokenException",{[I]:["ExpiredTokenException",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(F,h);var q=[-3,O,"IDPCommunicationErrorException",{[I]:["IDPCommunicationError",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(q,w);var H=[-3,O,"IDPRejectedClaimException",{[I]:["IDPRejectedClaim",403],[R]:k,[T]:403},[D],[0]];c.O.for(O).registerError(H,y);var B=[-3,O,"InvalidIdentityTokenException",{[I]:["InvalidIdentityToken",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(B,S);var Q=[-3,O,"MalformedPolicyDocumentException",{[I]:["MalformedPolicyDocument",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(Q,p);var G=[-3,O,"PackedPolicyTooLargeException",{[I]:["PackedPolicyTooLarge",400],[R]:k,[T]:400},[D],[0]];c.O.for(O).registerError(G,g);var Z=[3,O,"PolicyDescriptorType",0,["arn"],[0]],J=[3,O,"ProvidedContext",0,["ProviderArn","ContextAssertion"],[0,0]],X=[-3,O,"RegionDisabledException",{[I]:["RegionDisabledException",403],[R]:k,[T]:403},[D],[0]];c.O.for(O).registerError(X,f);var Y=[3,O,"Tag",0,["Key","Value"],[0,0]],ee=[-3,$,"STSServiceException",0,[],[]];c.O.for($).registerError(ee,m);var et=[1,O,"policyDescriptorListType",0,()=>Z],es=[1,O,"ProvidedContextsListType",0,()=>J],ei=[1,O,"tagListType",0,()=>Y],eo=[9,O,"AssumeRole",0,()=>K,()=>M],er=[9,O,"AssumeRoleWithWebIdentity",0,()=>L,()=>V];class en extends a.u.classBuilder().ep(l).m(function(e,t,s,i){return[(0,d.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").sc(eo).build(){}class ed extends a.u.classBuilder().ep(l).m(function(e,t,s,i){return[(0,d.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").sc(er).build(){}let ea=e=>{if("string"==typeof e?.Arn){let t=e.Arn.split(":");if(t.length>4&&""!==t[4])return t[4]}},el=async(e,t,s,i={})=>{let d="function"==typeof e?await e():e,a="function"==typeof t?await t():t,l="",c=d??a??(l=await (function(e={}){return(0,r.Z)({...o.GG,default:async()=>(n||console.warn("@aws-sdk - WARN - default STS region of us-east-1 used. See @aws-sdk/credential-providers README and set a region explicitly."),"us-east-1")},{...o.zH,...e})})(i)());return s?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${d} (credential provider clientConfig)`,`${a} (contextual client)`,`${l} (STS default: AWS_REGION, profile region, or us-east-1)`),c},ec=e=>e?.metadata?.handlerProtocol==="h2";var eu=s("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),em=s("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),eh=s("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),ep=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),eg=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),ef=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),ey=s("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),eS=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),ew=s("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),eE=s("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),eb=s("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),ev=s("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),eP=s("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),ex=s("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),eA=s("./node_modules/@smithy/smithy-client/dist-es/client.js"),eC=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),ej=s("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),e_=s("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let eI=async(e,t,s)=>({operation:(0,ej.u)(t).operation,region:await (0,e_.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),ek=e=>{let t=[];if("AssumeRoleWithWebIdentity"===e.operation)t.push({schemeId:"smithy.api#noAuth"});else t.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})});return t};var eR=s("./node_modules/@aws-sdk/nested-clients/package.json"),eT=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),eD=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),e$=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),eO=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),ez=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),eN=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),eU=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),eK=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),eM=s("./node_modules/@smithy/hash-node/dist-es/index.js"),eL=s("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),eV=s("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),eW=s("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),eF=s("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),eq=s("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),eH=s("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),eB=s("./node_modules/@smithy/util-retry/dist-es/config.js"),eQ=s("./node_modules/@smithy/core/dist-es/submodules/schema/schemas/NormalizedSchema.js"),eG=s("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),eZ=s("./node_modules/@smithy/core/dist-es/submodules/protocols/collect-stream-body.js"),eJ=s("./node_modules/@smithy/core/dist-es/submodules/protocols/HttpProtocol.js");class eX extends eJ.t{async serializeRequest(e,t,s){let i,o=this.serializer,r={},n={},d=await s.endpoint(),a=eQ.l.of(e?.input),l=a.getSchema(),c=new eG.K({protocol:"",hostname:"",port:void 0,path:"/",fragment:void 0,query:r,headers:n,body:void 0});d&&(this.updateServiceEndpoint(c,d),this.setHostPrefix(c,e,t));let u={...t};if(t){let e=a.getEventStreamMember();if(e){if(u[e]){let t={};for(let[s,i]of a.structIterator())s!==e&&u[s]&&(o.write(i,u[s]),t[s]=o.flush());i=await this.serializeEventStream({eventStream:u[e],requestSchema:a,initialRequest:t})}}else o.write(l,u),i=o.flush()}return c.headers=n,c.query=r,c.body=i,c.method="POST",c}async deserializeResponse(e,t,s){let i=this.deserializer,o=eQ.l.of(e.output),r={};if(s.statusCode>=300){let o=await (0,eZ.P)(s.body,t);throw o.byteLength>0&&Object.assign(r,await i.read(15,o)),await this.handleError(e,t,s,r,this.deserializeMetadata(s)),Error("@smithy/core/protocols - RPC Protocol error handler failed to throw.")}for(let e in s.headers){let t=s.headers[e];delete s.headers[e],s.headers[e.toLowerCase()]=t}let n=o.getEventStreamMember();if(n)r[n]=await this.deserializeEventStream({response:s,responseSchema:o,initialResponseContainer:r});else{let e=await (0,eZ.P)(s.body,t);e.byteLength>0&&Object.assign(r,await i.read(o,e))}return r.$metadata=this.deserializeMetadata(s),r}}var eY=s("./node_modules/@smithy/core/dist-es/submodules/schema/deref.js"),e0=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ProtocolLib.js"),e1=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/xml/XmlShapeDeserializer.js"),e4=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/determineTimestampFormat.js"),e3=s("./node_modules/@smithy/core/dist-es/submodules/protocols/extended-encode-uri-component.js"),e6=s("./node_modules/@smithy/uuid/dist-es/v4.js"),e2=s("./node_modules/@smithy/core/dist-es/submodules/serde/value/NumericValue.js"),e5=s("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),e8=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),e9=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ConfigurableSerdeContext.js"),e7=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/structIterator.js");class te extends e9.B{settings;buffer;constructor(e){super(),this.settings=e}write(e,t,s=""){void 0===this.buffer&&(this.buffer="");let i=eQ.l.of(e);if(s&&!s.endsWith(".")&&(s+="."),i.isBlobSchema())("string"==typeof t||t instanceof Uint8Array)&&(this.writeKey(s),this.writeValue((this.serdeContext?.base64Encoder??e8.n)(t)));else if(i.isBooleanSchema()||i.isNumericSchema()||i.isStringSchema())null!=t?(this.writeKey(s),this.writeValue(String(t))):i.isIdempotencyToken()&&(this.writeKey(s),this.writeValue((0,e6.v4)()));else if(i.isBigIntegerSchema())null!=t&&(this.writeKey(s),this.writeValue(String(t)));else if(i.isBigDecimalSchema())null!=t&&(this.writeKey(s),this.writeValue(t instanceof e2.D?t.string:String(t)));else if(i.isTimestampSchema()){if(t instanceof Date)switch(this.writeKey(s),(0,e4.V)(i,this.settings)){case 5:this.writeValue(t.toISOString().replace(".000Z","Z"));break;case 6:this.writeValue((0,e5.JV)(t));break;case 7:this.writeValue(String(t.getTime()/1e3))}}else if(i.isDocumentSchema())Array.isArray(t)?this.write(79,t,s):t instanceof Date?this.write(4,t,s):t instanceof Uint8Array?this.write(21,t,s):t&&"object"==typeof t?this.write(143,t,s):(this.writeKey(s),this.writeValue(String(t)));else if(i.isListSchema()){if(Array.isArray(t))if(0===t.length)this.settings.serializeEmptyLists&&(this.writeKey(s),this.writeValue(""));else{let e=i.getValueSchema(),o=this.settings.flattenLists||i.getMergedTraits().xmlFlattened,r=1;for(let i of t){if(null==i)continue;let t=this.getKey("member",e.getMergedTraits().xmlName),n=o?`${s}${r}`:`${s}${t}.${r}`;this.write(e,i,n),++r}}}else if(i.isMapSchema()){if(t&&"object"==typeof t){let e=i.getKeySchema(),o=i.getValueSchema(),r=i.getMergedTraits().xmlFlattened,n=1;for(let[i,d]of Object.entries(t)){if(null==d)continue;let t=this.getKey("key",e.getMergedTraits().xmlName),a=r?`${s}${n}.${t}`:`${s}entry.${n}.${t}`,l=this.getKey("value",o.getMergedTraits().xmlName),c=r?`${s}${n}.${l}`:`${s}entry.${n}.${l}`;this.write(e,i,a),this.write(o,d,c),++n}}}else if(i.isStructSchema()){if(t&&"object"==typeof t){let e=!1;for(let[o,r]of(0,e7.R)(i,t)){if(null==t[o]&&!r.isIdempotencyToken())continue;let i=this.getKey(o,r.getMergedTraits().xmlName),n=`${s}${i}`;this.write(r,t[o],n),e=!0}if(!e&&i.isUnionSchema()){let{$unknown:e}=t;if(Array.isArray(e)){let[t,i]=e,o=`${s}${t}`;this.write(15,i,o)}}}}else if(i.isUnitSchema());else throw Error(`@aws-sdk/core/protocols - QuerySerializer unrecognized schema type ${i.getName(!0)}`)}flush(){if(void 0===this.buffer)throw Error("@aws-sdk/core/protocols - QuerySerializer cannot flush with nothing written to buffer.");let e=this.buffer;return delete this.buffer,e}getKey(e,t){let s=t??e;return this.settings.capitalizeKeys?s[0].toUpperCase()+s.slice(1):s}writeKey(e){e.endsWith(".")&&(e=e.slice(0,e.length-1)),this.buffer+=`&${(0,e3.$)(e)}=`}writeValue(e){this.buffer+=(0,e3.$)(e)}}class tt extends eX{options;serializer;deserializer;mixin=new e0.U;constructor(e){super({defaultNamespace:e.defaultNamespace}),this.options=e;const t={timestampFormat:{useTrait:!0,default:5},httpBindings:!1,xmlNamespace:e.xmlNamespace,serviceNamespace:e.defaultNamespace,serializeEmptyLists:!0};this.serializer=new te(t),this.deserializer=new e1._(t)}getShapeId(){return"aws.protocols#awsQuery"}setSerdeContext(e){this.serializer.setSerdeContext(e),this.deserializer.setSerdeContext(e)}getPayloadCodec(){throw Error("AWSQuery protocol has no payload codec.")}async serializeRequest(e,t,s){let i=await super.serializeRequest(e,t,s);i.path.endsWith("/")||(i.path+="/"),Object.assign(i.headers,{"content-type":"application/x-www-form-urlencoded"}),"unit"!==(0,eY.L)(e.input)&&i.body||(i.body="");let o=e.name.split("#")[1]??e.name;return i.body=`Action=${o}&Version=${this.options.version}`+i.body,i.body.endsWith("&")&&(i.body=i.body.slice(-1)),i}async deserializeResponse(e,t,s){let i=this.deserializer,o=eQ.l.of(e.output),r={};if(s.statusCode>=300){let o=await (0,eZ.P)(s.body,t);o.byteLength>0&&Object.assign(r,await i.read(15,o)),await this.handleError(e,t,s,r,this.deserializeMetadata(s))}for(let e in s.headers){let t=s.headers[e];delete s.headers[e],s.headers[e.toLowerCase()]=t}let n=e.name.split("#")[1]??e.name,d=o.isStructSchema()&&this.useNestedResult()?n+"Result":void 0,a=await (0,eZ.P)(s.body,t);return a.byteLength>0&&Object.assign(r,await i.read(o,a,d)),{$metadata:this.deserializeMetadata(s),...r}}useNestedResult(){return!0}async handleError(e,t,s,i,o){let r=this.loadQueryErrorCode(s,i)??"Unknown",n=this.loadQueryError(i),d=this.loadQueryErrorMessage(i);n.message=d,n.Error={Type:n.Type,Code:n.Code,Message:d};let{errorSchema:a,errorMetadata:l}=await this.mixin.getErrorSchemaOrThrowBaseException(r,this.options.defaultNamespace,s,n,o,this.mixin.findQueryCompatibleError),u=eQ.l.of(a),m=new(c.O.for(a[1]).getErrorCtor(a)??Error)(d),h={Type:n.Error.Type,Code:n.Error.Code,Error:n.Error};for(let[e,t]of u.structIterator()){let s=t.getMergedTraits().xmlName??e,o=n[s]??i[s];h[e]=this.deserializer.readSchema(t,o)}throw this.mixin.decorateServiceException(Object.assign(m,l,{$fault:u.getMergedTraits().error,message:d},h),i)}loadQueryErrorCode(e,t){let s=(t.Errors?.[0]?.Error??t.Errors?.Error??t.Error)?.Code;return void 0!==s?s:404==e.statusCode?"NotFound":void 0}loadQueryError(e){return e.Errors?.[0]?.Error??e.Errors?.Error??e.Error}loadQueryErrorMessage(e){let t=this.loadQueryError(e);return t?.message??t?.Message??e.message??e.Message??"Unknown"}getDefaultContentType(){return"application/x-www-form-urlencoded"}}var ts=s("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),ti=s("./node_modules/@smithy/url-parser/dist-es/index.js"),to=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),tr=s("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),tn=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),td=s("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),ta=s("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),tl=s("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),tc=s("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let tu="required",tm="type",th="argv",tp="booleanEquals",tg="stringEquals",tf="sigv4",ty="us-east-1",tS="endpoint",tw="https://sts.{Region}.{PartitionResult#dnsSuffix}",tE="tree",tb="error",tv="getAttr",tP={[tu]:!1,[tm]:"string"},tx={[tu]:!0,default:!1,[tm]:"boolean"},tA={ref:"Endpoint"},tC={fn:"isSet",[th]:[{ref:"Region"}]},tj={ref:"Region"},t_={fn:"aws.partition",[th]:[tj],assign:"PartitionResult"},tI={ref:"UseFIPS"},tk={ref:"UseDualStack"},tR={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:tf,signingName:"sts",signingRegion:ty}]},headers:{}},tT={},tD={conditions:[{fn:tg,[th]:[tj,"aws-global"]}],[tS]:tR,[tm]:tS},t$={fn:tp,[th]:[tI,!0]},tO={fn:tp,[th]:[tk,!0]},tz={fn:tv,[th]:[{ref:"PartitionResult"},"supportsFIPS"]},tN={ref:"PartitionResult"},tU={fn:tp,[th]:[!0,{fn:tv,[th]:[tN,"supportsDualStack"]}]},tK=[{fn:"isSet",[th]:[tA]}],tM=[t$],tL=[tO],tV={version:"1.0",parameters:{Region:tP,UseDualStack:tx,UseFIPS:tx,Endpoint:tP,UseGlobalEndpoint:tx},rules:[{conditions:[{fn:tp,[th]:[{ref:"UseGlobalEndpoint"},!0]},{fn:"not",[th]:tK},tC,t_,{fn:tp,[th]:[tI,!1]},{fn:tp,[th]:[tk,!1]}],rules:[{conditions:[{fn:tg,[th]:[tj,"ap-northeast-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"ap-south-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"ap-southeast-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"ap-southeast-2"]}],endpoint:tR,[tm]:tS},tD,{conditions:[{fn:tg,[th]:[tj,"ca-central-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-central-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-north-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-west-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-west-2"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"eu-west-3"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"sa-east-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,ty]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"us-east-2"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"us-west-1"]}],endpoint:tR,[tm]:tS},{conditions:[{fn:tg,[th]:[tj,"us-west-2"]}],endpoint:tR,[tm]:tS},{endpoint:{url:tw,properties:{authSchemes:[{name:tf,signingName:"sts",signingRegion:"{Region}"}]},headers:tT},[tm]:tS}],[tm]:tE},{conditions:tK,rules:[{conditions:tM,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[tm]:tb},{conditions:tL,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[tm]:tb},{endpoint:{url:tA,properties:tT,headers:tT},[tm]:tS}],[tm]:tE},{conditions:[tC],rules:[{conditions:[t_],rules:[{conditions:[t$,tO],rules:[{conditions:[{fn:tp,[th]:[!0,tz]},tU],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:tT,headers:tT},[tm]:tS}],[tm]:tE},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[tm]:tb}],[tm]:tE},{conditions:tM,rules:[{conditions:[{fn:tp,[th]:[tz,!0]}],rules:[{conditions:[{fn:tg,[th]:[{fn:tv,[th]:[tN,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:tT,headers:tT},[tm]:tS},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:tT,headers:tT},[tm]:tS}],[tm]:tE},{error:"FIPS is enabled but this partition does not support FIPS",[tm]:tb}],[tm]:tE},{conditions:tL,rules:[{conditions:[tU],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:tT,headers:tT},[tm]:tS}],[tm]:tE},{error:"DualStack is enabled but this partition does not support DualStack",[tm]:tb}],[tm]:tE},tD,{endpoint:{url:tw,properties:tT,headers:tT},[tm]:tS}],[tm]:tE}],[tm]:tE},{error:"Invalid Configuration: Missing Region",[tm]:tb}]},tW=new ta.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),tF=(e,t={})=>tW.get(e,()=>(0,tl.s)(tV,{endpointParams:e,logger:t.logger}));tc.m.aws=td.UF;var tq=s("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),tH=s("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),tB=s("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class tQ extends eA.K{config;constructor(...[e]){const t=(e=>{(0,eW.I)(process.version);let t=(0,eH.I)(e),s=()=>t().then(eF.l),i={apiVersion:"2011-06-15",base64Decoder:e?.base64Decoder??to.E,base64Encoder:e?.base64Encoder??e8.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??tF,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??ek,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new e$.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new eK.m}],logger:e?.logger??new ts.N,protocol:e?.protocol??tt,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sts",xmlNamespace:"https://sts.amazonaws.com/doc/2011-06-15/",version:"2011-06-15",serviceTarget:"AWSSecurityTokenServiceV20110615"},serviceId:e?.serviceId??"STS",urlParser:e?.urlParser??ti.D,utf8Decoder:e?.utf8Decoder??tr.a,utf8Encoder:e?.utf8Encoder??tn.P};(0,eT.I)(process.version);let n={profile:e?.profile,logger:i.logger};return{...i,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,r.Z)(eD.$,n),bodyLengthChecker:e?.bodyLengthChecker??eq.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,eO.pf)({serviceId:i.serviceId,clientVersion:eR.rE}),httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:t=>t.getIdentityProvider("aws.auth#sigv4")||(async t=>await e.credentialDefaultProvider(t?.__config||{})()),signer:new e$.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new eK.m}],maxAttempts:e?.maxAttempts??(0,r.Z)(eP.qs,e),region:e?.region??(0,r.Z)(o.GG,{...o.zH,...n}),requestHandler:eL.$.create(e?.requestHandler??s),retryMode:e?.retryMode??(0,r.Z)({...eP.kN,default:async()=>(await s()).retryMode||eB.L},e),sha256:e?.sha256??eM.V.bind(null,"sha256"),streamCollector:e?.streamCollector??eV.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,r.Z)(eN.e$,n),useFipsEndpoint:e?.useFipsEndpoint??(0,r.Z)(eU.Ko,n),userAgentAppId:e?.userAgentAppId??(0,r.Z)(ez.hV,n)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,useGlobalEndpoint:e.useGlobalEndpoint??!1,defaultSigningName:"sts"}))(t),i=(0,ep.D)(s),n=(0,eP.$z)(i),d=(0,ef.T)(n),a=(0,eu.OV)(d),l=((e,t)=>{let s,i,o,r=Object.assign((0,tq.R)(e),(0,tB.xA)(e),(0,tH.e)(e),(s=e.httpAuthSchemes,i=e.httpAuthSchemeProvider,o=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){i=e},httpAuthSchemeProvider:()=>i,setCredentials(e){o=e},credentials:()=>o}));return t.forEach(e=>e.configure(r)),Object.assign(e,(0,tq.$)(r),(0,tB.uv)(r),(0,tH.j)(r),{httpAuthSchemes:r.httpAuthSchemes(),httpAuthSchemeProvider:r.httpAuthSchemeProvider(),credentials:r.credentials()})})((e=>{let t=Object.assign(e,{stsClientCtor:tQ});return Object.assign((0,eC.h)(t),{authSchemePreference:(0,e_.t)(e.authSchemePreference??[])})})((0,ev.C)(a)),e?.extensions||[]);this.config=l,this.middlewareStack.use((0,eE.wq)(this.config)),this.middlewareStack.use((0,eg.sM)(this.config)),this.middlewareStack.use((0,ex.ey)(this.config)),this.middlewareStack.use((0,eb.vK)(this.config)),this.middlewareStack.use((0,eu.TC)(this.config)),this.middlewareStack.use((0,em.Y7)(this.config)),this.middlewareStack.use((0,eh.n)(this.config)),this.middlewareStack.use((0,ey.w)(this.config,{httpAuthSchemeParametersProvider:eI,identityProviderConfigProvider:async e=>new eS.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,ew.l)(this.config))}destroy(){super.destroy()}}let tG=(e,t)=>t?class extends e{constructor(e){for(const s of(super(e),t))this.middlewareStack.use(s)}}:e,tZ=(e={},t)=>{var s;let o,r;return s=tG(tQ,t),async(t,n)=>{if(r=t,!o){let{logger:t=e?.parentClientConfig?.logger,profile:i=e?.parentClientConfig?.profile,region:n,requestHandler:d=e?.parentClientConfig?.requestHandler,credentialProviderLogger:a,userAgentAppId:l=e?.parentClientConfig?.userAgentAppId}=e,c=await el(n,e?.parentClientConfig?.region,a,{logger:t,profile:i}),u=!ec(d);o=new s({...e,userAgentAppId:l,profile:i,credentialDefaultProvider:()=>async()=>r,region:c,requestHandler:u?d:void 0,logger:t})}let{Credentials:d,AssumedRoleUser:a}=await o.send(new en(n));if(!d||!d.AccessKeyId||!d.SecretAccessKey)throw Error(`Invalid response from STS.assumeRole call with role ${n.RoleArn}`);let l=ea(a),c={accessKeyId:d.AccessKeyId,secretAccessKey:d.SecretAccessKey,sessionToken:d.SessionToken,expiration:d.Expiration,...d.CredentialScope&&{credentialScope:d.CredentialScope},...l&&{accountId:l}};return(0,i.g)(c,"CREDENTIALS_STS_ASSUME_ROLE","i"),c}},tJ=(e={},t)=>{var s;let o;return s=tG(tQ,t),async t=>{if(!o){let{logger:t=e?.parentClientConfig?.logger,profile:i=e?.parentClientConfig?.profile,region:r,requestHandler:n=e?.parentClientConfig?.requestHandler,credentialProviderLogger:d,userAgentAppId:a=e?.parentClientConfig?.userAgentAppId}=e,l=await el(r,e?.parentClientConfig?.region,d,{logger:t,profile:i}),c=!ec(n);o=new s({...e,userAgentAppId:a,profile:i,region:l,requestHandler:c?n:void 0,logger:t})}let{Credentials:r,AssumedRoleUser:n}=await o.send(new ed(t));if(!r||!r.AccessKeyId||!r.SecretAccessKey)throw Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${t.RoleArn}`);let d=ea(n),a={accessKeyId:r.AccessKeyId,secretAccessKey:r.SecretAccessKey,sessionToken:r.SessionToken,expiration:r.Expiration,...r.CredentialScope&&{credentialScope:r.CredentialScope},...d&&{accountId:d}};return d&&(0,i.g)(a,"RESOLVED_ACCOUNT_ID","T"),(0,i.g)(a,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),a}}},"./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"(e,t,s){s.d(t,{m:()=>i});class i{async sign(e,t,s){return e}}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["292"],exports.modules={"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js"(e,r,s){s.d(r,{fromProcess:()=>u});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),o=s("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),d=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=s("child_process"),l=s("util"),a=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js");let c=async(e,r,s)=>{let i=r[e];if(r[e]){let c=i.credential_process;if(void 0!==c){let i=(0,l.promisify)(d.Z?.getTokenRecord?.().exec??n.exec);try{let s,{stdout:o}=await i(c);try{s=JSON.parse(o.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}var t=s;if(1!==t.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===t.AccessKeyId||void 0===t.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(t.Expiration){let r=new Date;if(new Date(t.Expiration)<r)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let d=t.AccountId;!d&&r?.[e]?.aws_account_id&&(d=r[e].aws_account_id);let n={accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,...t.SessionToken&&{sessionToken:t.SessionToken},...t.Expiration&&{expiration:new Date(t.Expiration)},...t.CredentialScope&&{credentialScope:t.CredentialScope},...d&&{accountId:d}};return(0,a.g)(n,"CREDENTIALS_PROCESS","w"),n}catch(e){throw new o.C(e.message,{logger:s})}}throw new o.C(`Profile ${e} did not contain credential_process.`,{logger:s})}throw new o.C(`Profile ${e} could not be found in shared credentials file.`,{logger:s})},u=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let s=await (0,i.Y)(e);return c((0,t.Bz)({profile:e.profile??r?.profile}),s,e.logger)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,r,s){s.d(r,{Z:()=>o});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let o={getFileRecord:()=>t.Jj,interceptFile(e,r){t.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>i.a,interceptToken(e,r){i.a[e]=r}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,r,s){s.d(r,{C:()=>d});var i=s("crypto"),t=s("path"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let d=e=>{let r=(0,i.createHash)("sha1").update(e).digest("hex");return(0,t.join)((0,o.R)(),".aws","sso","cache",`${r}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,r,s){s.d(r,{a:()=>o,v:()=>d});var i=s("fs/promises"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let o={},d=async e=>{if(o[e])return o[e];let r=(0,t.C)(e);return JSON.parse(await (0,i.readFile)(r,"utf8"))}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,r,s){s.d(r,{Y:()=>t});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let t=async e=>{let r=await (0,i.p)(e);return((...e)=>{let r={};for(let s of e)for(let[e,i]of Object.entries(s))void 0!==r[e]?Object.assign(r[e],i):r[e]=i;return r})(r.configFile,r.credentialsFile)}}};
@@ -0,0 +1,2 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["329"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"(e,s,i){i.d(s,{fromSSO:()=>j});var t=i("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),n=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getConfigFilepath.js"),l=i("./node_modules/@smithy/types/dist-es/profile.js");let a=e=>Object.entries(e).filter(([e])=>e.startsWith(l.I.SSO_SESSION+".")).reduce((e,[s,i])=>({...e,[s.substring(s.indexOf(".")+1)]:i}),{});var d=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseIni.js"),c=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let g=()=>({}),f=async(e={})=>(0,c.TA)(e.configFilepath??(0,n.g)()).then(d.A).then(a).catch(g);var h=i("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),p=i("./node_modules/@smithy/property-provider/dist-es/ProviderError.js");class u extends p.m{name="TokenProviderError";constructor(e,s=!0){super(e,s),Object.setPrototypeOf(this,u.prototype)}}var w=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js");let m="To refresh this SSO session run 'aws sso login' with the corresponding profile.",_=async(e,s={},t)=>{let{SSOOIDCClient:o}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js")),r=e=>s.clientConfig?.[e]??s.parentClientConfig?.[e]??t?.[e];return new o(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:r("logger"),userAgentAppId:r("userAgentAppId")}))},S=async(e,s,t={},o)=>{let{CreateTokenCommand:r}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"));return(await _(s,t,o)).send(new r({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))},y=e=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new u(`Token is expired. ${m}`,!1)},C=(e,s,i=!1)=>{if(void 0===s)throw new u(`Value not present for '${e}' in SSO Token${i?". Cannot refresh":""}. ${m}`,!1)};var k=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let{writeFile:T}=i("fs").promises,O=new Date(0),x=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:d,clientConfig:c,parentClientConfig:g,callerClientConfig:p,profile:_,filepath:x,configFilepath:j,ignoreCache:v,logger:I})=>{let A,F,b="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let e=await ((e={})=>async({callerClientConfig:s}={})=>{let i;e.logger?.debug("@aws-sdk/token-providers - fromSso");let t=await (0,r.Y)(e),n=(0,o.Bz)({profile:e.profile??s?.profile}),l=t[n];if(l){if(!l.sso_session)throw new u(`Profile '${n}' is missing required property 'sso_session'.`)}else throw new u(`Profile '${n}' could not be found in shared credentials file.`,!1);let a=l.sso_session,d=(await f(e))[a];if(!d)throw new u(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let e of["sso_start_url","sso_region"])if(!d[e])throw new u(`Sso session '${a}' is missing required property '${e}'.`,!1);d.sso_start_url;let c=d.sso_region;try{i=await (0,w.v)(a)}catch(e){throw new u(`The SSO session token associated with profile=${n} was not found or is invalid. ${m}`,!1)}C("accessToken",i.accessToken),C("expiresAt",i.expiresAt);let{accessToken:g,expiresAt:h}=i,p={token:g,expiration:new Date(h)};if(p.expiration.getTime()-Date.now()>3e5)return p;if(Date.now()-O.getTime()<3e4)return y(p),p;C("clientId",i.clientId,!0),C("clientSecret",i.clientSecret,!0),C("refreshToken",i.refreshToken,!0);try{O.setTime(Date.now());let t=await S(i,c,e,s);C("accessToken",t.accessToken),C("expiresIn",t.expiresIn);let o=new Date(Date.now()+1e3*t.expiresIn);try{var _;let e;await (_={...i,accessToken:t.accessToken,expiresAt:o.toISOString(),refreshToken:t.refreshToken},e=(0,k.C)(a),T(e,JSON.stringify(_,null,2)))}catch(e){}return{token:t.accessToken,expiration:o}}catch(e){return y(p),p}})({profile:_,filepath:x,configFilepath:j,ignoreCache:v})();A={accessToken:e.token,expiresAt:new Date(e.expiration).toISOString()}}catch(e){throw new t.C(e.message,{tryNextLink:!1,logger:I})}else try{A=await (0,w.v)(e)}catch(e){throw new t.C(`The SSO session associated with this profile is invalid. ${b}`,{tryNextLink:!1,logger:I})}if(new Date(A.expiresAt).getTime()-Date.now()<=0)throw new t.C(`The SSO session associated with this profile has expired. ${b}`,{tryNextLink:!1,logger:I});let{accessToken:$}=A,{SSOClient:N,GetRoleCredentialsCommand:D}=await Promise.all([i.e("769"),i.e("965")]).then(i.bind(i,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js")),L=d||new N(Object.assign({},c??{},{logger:c?.logger??p?.logger??g?.logger,region:c?.region??l,userAgentAppId:c?.userAgentAppId??p?.userAgentAppId??g?.userAgentAppId}));try{F=await L.send(new D({accountId:n,roleName:a,accessToken:$}))}catch(e){throw new t.C(e,{tryNextLink:!1,logger:I})}let{roleCredentials:{accessKeyId:P,secretAccessKey:R,sessionToken:E,expiration:U,credentialScope:q,accountId:Y}={}}=F;if(!P||!R||!E||!U)throw new t.C("SSO returns an invalid temporary credential.",{tryNextLink:!1,logger:I});let z={accessKeyId:P,secretAccessKey:R,sessionToken:E,expiration:new Date(U),...q&&{credentialScope:q},...Y&&{accountId:Y}};return s?(0,h.g)(z,"CREDENTIALS_SSO","s"):(0,h.g)(z,"CREDENTIALS_SSO_LEGACY","u"),z},j=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:i,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,g=(0,o.Bz)({profile:e.profile??s?.profile});if(i||n||l||a||d)if(i&&n&&l&&a)return x({ssoStartUrl:i,ssoSession:d,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger});else throw new t.C('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});{let s=(await (0,r.Y)(e))[g];if(!s)throw new t.C(`Profile ${g} was not found.`,{logger:e.logger});if(!(s&&("string"==typeof s.sso_start_url||"string"==typeof s.sso_account_id||"string"==typeof s.sso_session||"string"==typeof s.sso_region||"string"==typeof s.sso_role_name)))throw new t.C(`Profile ${g} is not configured with SSO credentials.`,{logger:e.logger});if(s?.sso_session){let o=(await f(e))[s.sso_session],r=` configurations in profile ${g} and sso-session ${s.sso_session}`;if(l&&l!==o.sso_region)throw new t.C("Conflicting SSO region"+r,{tryNextLink:!1,logger:e.logger});if(i&&i!==o.sso_start_url)throw new t.C("Conflicting SSO start_url"+r,{tryNextLink:!1,logger:e.logger});s.sso_region=o.sso_region,s.sso_start_url=o.sso_start_url}let{sso_start_url:o,sso_account_id:n,sso_region:a,sso_role_name:d,sso_session:h}=((e,s)=>{let{sso_start_url:i,sso_account_id:o,sso_region:r,sso_role_name:n}=e;if(!i||!o||!r||!n)throw new t.C(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
2
+ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e})(s,e.logger);return x({ssoStartUrl:o,ssoSession:h,ssoAccountId:n,ssoRegion:a,ssoRoleName:d,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger})}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,s,i){i.d(s,{C:()=>n});var t=i("crypto"),o=i("path"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let n=e=>{let s=(0,t.createHash)("sha1").update(e).digest("hex");return(0,o.join)((0,r.R)(),".aws","sso","cache",`${s}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,s,i){i.d(s,{a:()=>r,v:()=>n});var t=i("fs/promises"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let r={},n=async e=>{if(r[e])return r[e];let s=(0,o.C)(e);return JSON.parse(await (0,t.readFile)(s,"utf8"))}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,s,i){i.d(s,{Y:()=>o});var t=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let o=async e=>{let s=await (0,t.p)(e);return((...e)=>{let s={};for(let i of e)for(let[e,t]of Object.entries(i))void 0!==s[e]?Object.assign(s[e],t):s[e]=t;return s})(s.configFile,s.credentialsFile)}}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["335"],exports.modules={"./node_modules/@smithy/core/dist-es/submodules/event-streams/index.js"(e,t,r){r.d(t,{EventStreamSerde:()=>a});var i=r("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),s=r("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js");class a{marshaller;serializer;deserializer;serdeContext;defaultContentType;constructor({marshaller:e,serializer:t,deserializer:r,serdeContext:i,defaultContentType:s}){this.marshaller=e,this.serializer=t,this.deserializer=r,this.serdeContext=i,this.defaultContentType=s}async serializeEventStream({eventStream:e,requestSchema:t,initialRequest:r}){let i=this.marshaller,s=t.getEventStreamMember(),a=t.getMemberSchema(s),n=this.serializer,l=this.defaultContentType,o=Symbol("initialRequestMarker"),m={async *[Symbol.asyncIterator](){if(r){n.write(t,r);let e=n.flush();yield{[o]:!0,headers:{":event-type":{type:"string",value:"initial-request"},":message-type":{type:"string",value:"event"},":content-type":{type:"string",value:l}},body:e}}for await(let t of e)yield t}};return i.serialize(m,e=>{if(e[o])return{headers:e.headers,body:e.body};let t=Object.keys(e).find(e=>"__type"!==e)??"",{additionalHeaders:r,body:i,eventType:s,explicitPayloadContentType:n}=this.writeEventBody(t,a,e);return{headers:{":event-type":{type:"string",value:s},":message-type":{type:"string",value:"event"},":content-type":{type:"string",value:n??l},...r},body:i}})}async deserializeEventStream({response:e,responseSchema:t,initialResponseContainer:r}){let s=this.marshaller,a=t.getEventStreamMember(),n=t.getMemberSchema(a).getMemberSchemas(),l=Symbol("initialResponseMarker"),o=s.deserialize(e.body,async e=>{let r=Object.keys(e).find(e=>"__type"!==e)??"",s=e[r].body;if("initial-response"===r){let e=await this.deserializer.read(t,s);return delete e[a],{[l]:!0,...e}}if(!(r in n))return{$unknown:e};{let t=n[r];if(t.isStructSchema()){let a={},n=!1;for(let[l,o]of t.structIterator()){let{eventHeader:t,eventPayload:m}=o.getMergedTraits();if(n=n||!!(t||m),m)o.isBlobSchema()?a[l]=s:o.isStringSchema()?a[l]=(this.serdeContext?.utf8Encoder??i.P)(s):o.isStructSchema()&&(a[l]=await this.deserializer.read(o,s));else if(t){let t=e[r].headers[l]?.value;null!=t&&(o.isNumericSchema()?t&&"object"==typeof t&&"bytes"in t?a[l]=BigInt(t.toString()):a[l]=Number(t):a[l]=t)}}if(n)return{[r]:a}}return{[r]:await this.deserializer.read(t,s)}}}),m=o[Symbol.asyncIterator](),u=await m.next();if(u.done)return o;if(u.value?.[l]){if(!t)throw Error("@smithy::core/protocols - initial-response event encountered in event stream but no response schema given.");for(let[e,t]of Object.entries(u.value))r[e]=t}return{async *[Symbol.asyncIterator](){for(u?.value?.[l]||(yield u.value);;){let{done:e,value:t}=await m.next();if(e)break;yield t}}}}writeEventBody(e,t,r){let i,a=this.serializer,n=e,l=null,o=t.getSchema()[4].includes(e),m={};if(o){let s=t.getMemberSchema(e);if(s.isStructSchema()){for(let[t,i]of s.structIterator()){let{eventHeader:s,eventPayload:a}=i.getMergedTraits();if(a)l=t;else if(s){let s=r[e][t],a="binary";i.isNumericSchema()?a=-0x80000000<=s&&s<=0x80000000-1?"integer":"long":i.isTimestampSchema()?a="timestamp":i.isStringSchema()?a="string":i.isBooleanSchema()&&(a="boolean"),null!=s&&(m[t]={type:a,value:s},delete r[e][t])}}if(null!==l){let t=s.getMemberSchema(l);t.isBlobSchema()?i="application/octet-stream":t.isStringSchema()&&(i="text/plain"),a.write(t,r[e][l])}else a.write(s,r[e])}else throw Error("@smithy/core/event-streams - non-struct member not supported in event stream union.")}else{let[t,i]=r[e];n=t,a.write(15,i)}let u=a.flush();return{body:"string"==typeof u?(this.serdeContext?.utf8Decoder??s.a)(u):u,eventType:n,explicitPayloadContentType:i,additionalHeaders:m}}}}};
package/dist/cjs/53.js ADDED
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["53"],exports.modules={"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"(e,t,s){s.d(t,{CreateTokenCommand:()=>ta,SSOOIDCClient:()=>eI});var r=s("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),o=s("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),i=s("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),n=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),d=s("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),a=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),c=s("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),l=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),u=s("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),p=s("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),h=s("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),m=s("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),g=s("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),f=s("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),y=s("./node_modules/@smithy/smithy-client/dist-es/client.js"),_=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),S=s("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),E=s("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let v=async(e,t,s)=>({operation:(0,S.u)(t).operation,region:await (0,E.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),x=e=>{let t=[];if("CreateToken"===e.operation)t.push({schemeId:"smithy.api#noAuth"});else t.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})});return t},w={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var j=s("./node_modules/@aws-sdk/nested-clients/package.json"),P=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),k=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),I=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),O=s("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),C=s("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),b=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),A=s("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),D=s("./node_modules/@smithy/hash-node/dist-es/index.js"),R=s("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),T=s("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),U=s("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),$=s("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),F=s("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),z=s("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),q=s("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),H=s("./node_modules/@smithy/util-retry/dist-es/config.js"),V=s("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),M=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),N=s("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),G=s("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),L=s("./node_modules/@smithy/url-parser/dist-es/index.js"),Z=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),B=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),W=s("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),K=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),Y=s("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),J=s("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),Q=s("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),X=s("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let ee="required",et="argv",es="isSet",er="booleanEquals",eo="error",ei="endpoint",en="tree",ed="PartitionResult",ea="getAttr",ec={[ee]:!1,type:"string"},el={[ee]:!0,default:!1,type:"boolean"},eu={ref:"Endpoint"},ep={fn:er,[et]:[{ref:"UseFIPS"},!0]},eh={fn:er,[et]:[{ref:"UseDualStack"},!0]},em={},eg={fn:ea,[et]:[{ref:ed},"supportsFIPS"]},ef={ref:ed},ey={fn:er,[et]:[!0,{fn:ea,[et]:[ef,"supportsDualStack"]}]},e_=[ep],eS=[eh],eE=[{ref:"Region"}],ev={version:"1.0",parameters:{Region:ec,UseDualStack:el,UseFIPS:el,Endpoint:ec},rules:[{conditions:[{fn:es,[et]:[eu]}],rules:[{conditions:e_,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:eo},{conditions:eS,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:eo},{endpoint:{url:eu,properties:em,headers:em},type:ei}],type:en},{conditions:[{fn:es,[et]:eE}],rules:[{conditions:[{fn:"aws.partition",[et]:eE,assign:ed}],rules:[{conditions:[ep,eh],rules:[{conditions:[{fn:er,[et]:[!0,eg]},ey],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:em,headers:em},type:ei}],type:en},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:eo}],type:en},{conditions:e_,rules:[{conditions:[{fn:er,[et]:[eg,!0]}],rules:[{conditions:[{fn:"stringEquals",[et]:[{fn:ea,[et]:[ef,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:em,headers:em},type:ei},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:em,headers:em},type:ei}],type:en},{error:"FIPS is enabled but this partition does not support FIPS",type:eo}],type:en},{conditions:eS,rules:[{conditions:[ey],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:em,headers:em},type:ei}],type:en},{error:"DualStack is enabled but this partition does not support DualStack",type:eo}],type:en},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:em,headers:em},type:ei}],type:en}],type:en},{error:"Invalid Configuration: Missing Region",type:eo}]},ex=new J.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ew=(e,t={})=>ex.get(e,()=>(0,Q.s)(ev,{endpointParams:e,logger:t.logger}));X.m.aws=Y.UF;var ej=s("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),eP=s("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),ek=s("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class eI extends y.K{config;constructor(...[e]){const t=(e=>{(0,$.I)(process.version);let t=(0,q.I)(e),s=()=>t().then(F.l),r={apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??Z.E,base64Encoder:e?.base64Encoder??B.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??ew,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??x,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new V.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new N.m}],logger:e?.logger??new G.N,protocol:e?.protocol??M.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.ssooidc",version:"2019-06-10",serviceTarget:"AWSSSOOIDCService"},serviceId:e?.serviceId??"SSO OIDC",urlParser:e?.urlParser??L.D,utf8Decoder:e?.utf8Decoder??W.a,utf8Encoder:e?.utf8Encoder??K.P};(0,P.I)(process.version);let o={profile:e?.profile,logger:r.logger};return{...r,...e,runtime:"node",defaultsMode:t,authSchemePreference:e?.authSchemePreference??(0,R.Z)(k.$,o),bodyLengthChecker:e?.bodyLengthChecker??z.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,I.pf)({serviceId:r.serviceId,clientVersion:j.rE}),maxAttempts:e?.maxAttempts??(0,R.Z)(g.qs,e),region:e?.region??(0,R.Z)(C.GG,{...C.zH,...o}),requestHandler:T.$.create(e?.requestHandler??s),retryMode:e?.retryMode??(0,R.Z)({...g.kN,default:async()=>(await s()).retryMode||H.L},e),sha256:e?.sha256??D.V.bind(null,"sha256"),streamCollector:e?.streamCollector??U.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,R.Z)(b.e$,o),useFipsEndpoint:e?.useFipsEndpoint??(0,R.Z)(A.Ko,o),userAgentAppId:e?.userAgentAppId??(0,R.Z)(O.hV,o)}})(e||{});super(t),this.initConfig=t;const s=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"}))(t),y=(0,n.D)(s),S=(0,g.$z)(y),w=(0,a.T)(S),Y=(0,r.OV)(w),J=((e,t)=>{let s,r,o,i=Object.assign((0,ej.R)(e),(0,ek.xA)(e),(0,eP.e)(e),(s=e.httpAuthSchemes,r=e.httpAuthSchemeProvider,o=e.credentials,{setHttpAuthScheme(e){let t=s.findIndex(t=>t.schemeId===e.schemeId);-1===t?s.push(e):s.splice(t,1,e)},httpAuthSchemes:()=>s,setHttpAuthSchemeProvider(e){r=e},httpAuthSchemeProvider:()=>r,setCredentials(e){o=e},credentials:()=>o}));return t.forEach(e=>e.configure(i)),Object.assign(e,(0,ej.$)(i),(0,ek.uv)(i),(0,eP.j)(i),{httpAuthSchemes:i.httpAuthSchemes(),httpAuthSchemeProvider:i.httpAuthSchemeProvider(),credentials:i.credentials()})})((e=>Object.assign((0,_.h)(e),{authSchemePreference:(0,E.t)(e.authSchemePreference??[])}))((0,m.C)(Y)),e?.extensions||[]);this.config=J,this.middlewareStack.use((0,p.wq)(this.config)),this.middlewareStack.use((0,d.sM)(this.config)),this.middlewareStack.use((0,f.ey)(this.config)),this.middlewareStack.use((0,h.vK)(this.config)),this.middlewareStack.use((0,r.TC)(this.config)),this.middlewareStack.use((0,o.Y7)(this.config)),this.middlewareStack.use((0,i.n)(this.config)),this.middlewareStack.use((0,c.w)(this.config,{httpAuthSchemeParametersProvider:v,identityProviderConfigProvider:async e=>new l.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,u.l)(this.config))}destroy(){super.destroy()}}var eO=s("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),eC=s("./node_modules/@smithy/smithy-client/dist-es/command.js"),eb=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),eA=s("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class eD extends eA.T{constructor(e){super(e),Object.setPrototypeOf(this,eD.prototype)}}class eR extends eD{name="AccessDeniedException";$fault="client";error;reason;error_description;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,eR.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class eT extends eD{name="AuthorizationPendingException";$fault="client";error;error_description;constructor(e){super({name:"AuthorizationPendingException",$fault:"client",...e}),Object.setPrototypeOf(this,eT.prototype),this.error=e.error,this.error_description=e.error_description}}class eU extends eD{name="ExpiredTokenException";$fault="client";error;error_description;constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,eU.prototype),this.error=e.error,this.error_description=e.error_description}}class e$ extends eD{name="InternalServerException";$fault="server";error;error_description;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,e$.prototype),this.error=e.error,this.error_description=e.error_description}}class eF extends eD{name="InvalidClientException";$fault="client";error;error_description;constructor(e){super({name:"InvalidClientException",$fault:"client",...e}),Object.setPrototypeOf(this,eF.prototype),this.error=e.error,this.error_description=e.error_description}}class ez extends eD{name="InvalidGrantException";$fault="client";error;error_description;constructor(e){super({name:"InvalidGrantException",$fault:"client",...e}),Object.setPrototypeOf(this,ez.prototype),this.error=e.error,this.error_description=e.error_description}}class eq extends eD{name="InvalidRequestException";$fault="client";error;reason;error_description;constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,eq.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class eH extends eD{name="InvalidScopeException";$fault="client";error;error_description;constructor(e){super({name:"InvalidScopeException",$fault:"client",...e}),Object.setPrototypeOf(this,eH.prototype),this.error=e.error,this.error_description=e.error_description}}class eV extends eD{name="SlowDownException";$fault="client";error;error_description;constructor(e){super({name:"SlowDownException",$fault:"client",...e}),Object.setPrototypeOf(this,eV.prototype),this.error=e.error,this.error_description=e.error_description}}class eM extends eD{name="UnauthorizedClientException";$fault="client";error;error_description;constructor(e){super({name:"UnauthorizedClientException",$fault:"client",...e}),Object.setPrototypeOf(this,eM.prototype),this.error=e.error,this.error_description=e.error_description}}class eN extends eD{name="UnsupportedGrantTypeException";$fault="client";error;error_description;constructor(e){super({name:"UnsupportedGrantTypeException",$fault:"client",...e}),Object.setPrototypeOf(this,eN.prototype),this.error=e.error,this.error_description=e.error_description}}let eG="client",eL="error",eZ="error_description",eB="httpError",eW="reason",eK="refreshToken",eY="smithy.ts.sdk.synthetic.com.amazonaws.ssooidc",eJ="com.amazonaws.ssooidc";var eQ=[0,eJ,"AccessToken",8,0],eX=[0,eJ,"ClientSecret",8,0],e0=[0,eJ,"CodeVerifier",8,0],e4=[0,eJ,"IdToken",8,0],e3=[0,eJ,"RefreshToken",8,0],e6=[-3,eJ,"AccessDeniedException",{[eL]:eG,[eB]:400},[eL,eW,eZ],[0,0,0]];eb.O.for(eJ).registerError(e6,eR);var e1=[-3,eJ,"AuthorizationPendingException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(e1,eT);var e8=[3,eJ,"CreateTokenRequest",0,["clientId","clientSecret","grantType","deviceCode","code",eK,"scope","redirectUri","codeVerifier"],[0,[()=>eX,0],0,0,0,[()=>e3,0],64,0,[()=>e0,0]]],e2=[3,eJ,"CreateTokenResponse",0,["accessToken","tokenType","expiresIn",eK,"idToken"],[[()=>eQ,0],0,1,[()=>e3,0],[()=>e4,0]]],e5=[-3,eJ,"ExpiredTokenException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(e5,eU);var e9=[-3,eJ,"InternalServerException",{[eL]:"server",[eB]:500},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(e9,e$);var e7=[-3,eJ,"InvalidClientException",{[eL]:eG,[eB]:401},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(e7,eF);var te=[-3,eJ,"InvalidGrantException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(te,ez);var tt=[-3,eJ,"InvalidRequestException",{[eL]:eG,[eB]:400},[eL,eW,eZ],[0,0,0]];eb.O.for(eJ).registerError(tt,eq);var ts=[-3,eJ,"InvalidScopeException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(ts,eH);var tr=[-3,eJ,"SlowDownException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(tr,eV);var to=[-3,eJ,"UnauthorizedClientException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(to,eM);var ti=[-3,eJ,"UnsupportedGrantTypeException",{[eL]:eG,[eB]:400},[eL,eZ],[0,0]];eb.O.for(eJ).registerError(ti,eN);var tn=[-3,eY,"SSOOIDCServiceException",0,[],[]];eb.O.for(eY).registerError(tn,eD);var td=[9,eJ,"CreateToken",{http:["POST","/token",200]},()=>e8,()=>e2];class ta extends eC.u.classBuilder().ep(w).m(function(e,t,s,r){return[(0,eO.r)(s,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").sc(td).build(){}},"./node_modules/@aws-sdk/nested-clients/package.json"(e){e.exports={rE:"3.964.0"}}};
@@ -0,0 +1,2 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["560"],exports.modules={"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"(e,t,r){r.d(t,{httpRequest:()=>u,ENV_CMDS_FULL_URI:()=>_,getInstanceMetadataEndpoint:()=>M,ENV_CMDS_RELATIVE_URI:()=>y,fromContainerMetadata:()=>E,fromInstanceMetadata:()=>$});var a,n,o,i,s=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),c=r("url"),d=r("./node_modules/@smithy/property-provider/dist-es/ProviderError.js"),l=r("buffer"),p=r("http");function u(e){return new Promise((t,r)=>{let a=(0,p.request)({method:"GET",...e,hostname:e.hostname?.replace(/^\[(.+)\]$/,"$1")});a.on("error",e=>{r(Object.assign(new d.m("Unable to connect to instance metadata service"),e)),a.destroy()}),a.on("timeout",()=>{r(new d.m("TimeoutError from instance metadata service")),a.destroy()}),a.on("response",e=>{let{statusCode:n=400}=e;(n<200||300<=n)&&(r(Object.assign(new d.m("Error response received from instance metadata service"),{statusCode:n})),a.destroy());let o=[];e.on("data",e=>{o.push(e)}),e.on("end",()=>{t(l.Buffer.concat(o)),a.destroy()})}),a.end()})}let m=e=>!!e&&"object"==typeof e&&"string"==typeof e.AccessKeyId&&"string"==typeof e.SecretAccessKey&&"string"==typeof e.Token&&"string"==typeof e.Expiration,h=e=>({accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:new Date(e.Expiration),...e.AccountId&&{accountId:e.AccountId}}),f=1e3,v=0,g=({maxRetries:e=v,timeout:t=f})=>({maxRetries:e,timeout:t}),w=(e,t)=>{let r=e();for(let a=0;a<t;a++)r=r.catch(e);return r},_="AWS_CONTAINER_CREDENTIALS_FULL_URI",y="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",I="AWS_CONTAINER_AUTHORIZATION_TOKEN",E=(e={})=>{let{timeout:t,maxRetries:r}=g(e);return()=>w(async()=>{let r=await C({logger:e.logger}),a=JSON.parse(await A(t,r));if(!m(a))throw new s.C("Invalid response received from instance metadata service.",{logger:e.logger});return h(a)},r)},A=async(e,t)=>(process.env[I]&&(t.headers={...t.headers,Authorization:process.env[I]}),(await u({...t,timeout:e})).toString()),S={localhost:!0,"127.0.0.1":!0},b={"http:":!0,"https:":!0},C=async({logger:e})=>{if(process.env[y])return{hostname:"169.254.170.2",path:process.env[y]};if(process.env[_]){let t=(0,c.parse)(process.env[_]);if(!t.hostname||!(t.hostname in S))throw new s.C(`${t.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:e});if(!t.protocol||!(t.protocol in b))throw new s.C(`${t.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:e});return{...t,port:t.port?parseInt(t.port,10):void 0}}throw new s.C(`The container metadata credential provider cannot be used unless the ${y} or ${_} environment variable is set`,{tryNextLink:!1,logger:e})};var T=r("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js");class D extends s.C{tryNextLink;name="InstanceMetadataV1FallbackError";constructor(e,t=!0){super(e,t),this.tryNextLink=t,Object.setPrototypeOf(this,D.prototype)}}var x=r("./node_modules/@smithy/url-parser/dist-es/index.js");(a=o||(o={})).IPv4="http://169.254.169.254",a.IPv6="http://[fd00:ec2::254]";let N={environmentVariableSelector:e=>e.AWS_EC2_METADATA_SERVICE_ENDPOINT,configFileSelector:e=>e.ec2_metadata_service_endpoint,default:void 0};(n=i||(i={})).IPv4="IPv4",n.IPv6="IPv6";let k={environmentVariableSelector:e=>e.AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE,configFileSelector:e=>e.ec2_metadata_service_endpoint_mode,default:i.IPv4},M=async()=>(0,x.D)(await P()||await R()),P=async()=>(0,T.Z)(N)(),R=async()=>{let e=await (0,T.Z)(k)();switch(e){case i.IPv4:return o.IPv4;case i.IPv6:return o.IPv6;default:throw Error(`Unsupported endpoint mode: ${e}. Select from ${Object.values(i)}`)}},L=(e,t)=>{let r=300+Math.floor(300*Math.random()),a=new Date(Date.now()+1e3*r);t.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(a)}.
2
+ For more information, please visit: https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html`);let n=e.originalExpiration??e.expiration;return{...e,...n?{originalExpiration:n}:{},expiration:a}},O="/latest/meta-data/iam/security-credentials/",V="AWS_EC2_METADATA_V1_DISABLED",j="ec2_metadata_v1_disabled",U="x-aws-ec2-metadata-token",$=(e={})=>((e,t={})=>{let r,a=t?.logger||console;return async()=>{let t;try{(t=await e()).expiration&&t.expiration.getTime()<Date.now()&&(t=L(t,a))}catch(e){if(r)a.warn("Credential renew failed: ",e),t=L(r,a);else throw e}return r=t,t}})(K(e),{logger:e.logger}),K=(e={})=>{let t=!1,{logger:r,profile:a}=e,{timeout:n,maxRetries:o}=g(e),i=async(r,n)=>{if(t||n.headers?.[U]==null){let t=!1,r=!1,n=await (0,T.Z)({environmentVariableSelector:t=>{let a=t[V];if(r=!!a&&"false"!==a,void 0===a)throw new s.C(`${V} not set in env, checking config file next.`,{logger:e.logger});return r},configFileSelector:e=>{let r=e[j];return t=!!r&&"false"!==r},default:!1},{profile:a})();if(e.ec2MetadataV1Disabled||n){let a=[];throw e.ec2MetadataV1Disabled&&a.push("credential provider initialization (runtime option ec2MetadataV1Disabled)"),t&&a.push(`config file profile (${j})`),r&&a.push(`process environment variable (${V})`),new D(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${a.join(", ")}].`)}}let o=(await w(async()=>{let e;try{e=await F(n)}catch(e){throw 401===e.statusCode&&(t=!1),e}return e},r)).trim();return w(async()=>{let r;try{r=await q(o,n,e)}catch(e){throw 401===e.statusCode&&(t=!1),e}return r},r)};return async()=>{let e=await M();if(t)return r?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),i(o,{...e,timeout:n});{let a;try{a=(await W({...e,timeout:n})).toString()}catch(a){if(a?.statusCode===400)throw Object.assign(a,{message:"EC2 Metadata token request returned error"});return("TimeoutError"===a.message||[403,404,405].includes(a.statusCode))&&(t=!0),r?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),i(o,{...e,timeout:n})}return i(o,{...e,headers:{[U]:a},timeout:n})}}},W=async e=>u({...e,path:"/latest/api/token",method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),F=async e=>(await u({...e,path:O})).toString(),q=async(e,t,r)=>{let a=JSON.parse((await u({...t,path:O+e})).toString());if(!m(a))throw new s.C("Invalid response received from instance metadata service.",{logger:r.logger});return h(a)}}};
@@ -0,0 +1,5 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["634"],exports.modules={"./node_modules/@aws-sdk/credential-provider-http/dist-es/index.js"(e,t,r){r.d(t,{fromHttp:()=>h});var o=r("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),s=r("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),n=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),i=r("fs/promises"),a=r.n(i),d=r("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),l=r("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),c=r("./node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js");async function u(e,t){let r=(0,c.c)(e.body),o=await r.transformToString();if(200===e.statusCode){let e=JSON.parse(o);if("string"!=typeof e.AccessKeyId||"string"!=typeof e.SecretAccessKey||"string"!=typeof e.Token||"string"!=typeof e.Expiration)throw new n.C("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:t});return{accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:(0,l.EI)(e.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let r={};try{r=JSON.parse(o)}catch(e){}throw Object.assign(new n.C(`Server responded with status: ${e.statusCode}`,{logger:t}),{Code:r.Code,Message:r.Message})}throw new n.C(`Server responded with status: ${e.statusCode}`,{logger:t})}let h=(e={})=>{let t,r,i,l;e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let c=e.awsContainerCredentialsRelativeUri??process.env.AWS_CONTAINER_CREDENTIALS_RELATIVE_URI,h=e.awsContainerCredentialsFullUri??process.env.AWS_CONTAINER_CREDENTIALS_FULL_URI,p=e.awsContainerAuthorizationToken??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN,m=e.awsContainerAuthorizationTokenFile??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE,w=e.logger?.constructor?.name!=="NoOpLogger"&&e.logger?.warn?e.logger.warn.bind(e.logger):console.warn;if(c&&h&&(w("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),w("awsContainerCredentialsFullUri will take precedence.")),p&&m&&(w("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),w("awsContainerAuthorizationToken will take precedence.")),h)t=h;else if(c)t=`http://169.254.170.2${c}`;else throw new n.C(`No HTTP credential provider host provided.
2
+ Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:e.logger});let C=new URL(t);((e,t)=>{if("https:"!==e.protocol&&"169.254.170.2"!==e.hostname&&"169.254.170.23"!==e.hostname&&"[fd00:ec2::23]"!==e.hostname){if(e.hostname.includes("[")){if("[::1]"===e.hostname||"[0000:0000:0000:0000:0000:0000:0000:0001]"===e.hostname)return}else{if("localhost"===e.hostname)return;let t=e.hostname.split("."),r=e=>{let t=parseInt(e,10);return 0<=t&&t<=255};if("127"===t[0]&&r(t[1])&&r(t[2])&&r(t[3])&&4===t.length)return}throw new n.C(`URL not accepted. It must either be HTTPS or match one of the following:
3
+ - loopback CIDR 127.0.0.0/8 or [::1/128]
4
+ - ECS container host 169.254.170.2
5
+ - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:t})}})(C,e.logger);let g=s.$.create({requestTimeout:e.timeout??1e3,connectionTimeout:e.timeout??1e3});return r=async()=>{let t=new d.K({protocol:C.protocol,hostname:C.hostname,port:Number(C.port),path:C.pathname,query:Array.from(C.searchParams.entries()).reduce((e,[t,r])=>(e[t]=r,e),{}),fragment:C.hash});p?t.headers.Authorization=p:m&&(t.headers.Authorization=(await a().readFile(m)).toString());try{let e=await g.handle(t);return u(e.response).then(e=>(0,o.g)(e,"CREDENTIALS_HTTP","z"))}catch(t){throw new n.C(String(t),{logger:e.logger})}},i=e.maxRetries??3,l=e.timeout??1e3,async()=>{for(let e=0;e<i;++e)try{return await r()}catch(e){await new Promise(e=>setTimeout(e,l))}return await r()}}}};
@@ -0,0 +1,2 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["710"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"(e,s,i){i.d(s,{fromSSO:()=>j});var t=i("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),n=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getConfigFilepath.js"),l=i("./node_modules/@smithy/types/dist-es/profile.js");let a=e=>Object.entries(e).filter(([e])=>e.startsWith(l.I.SSO_SESSION+".")).reduce((e,[s,i])=>({...e,[s.substring(s.indexOf(".")+1)]:i}),{});var d=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseIni.js"),c=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let g=()=>({}),f=async(e={})=>(0,c.TA)(e.configFilepath??(0,n.g)()).then(d.A).then(a).catch(g);var h=i("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),p=i("./node_modules/@smithy/property-provider/dist-es/ProviderError.js");class u extends p.m{name="TokenProviderError";constructor(e,s=!0){super(e,s),Object.setPrototypeOf(this,u.prototype)}}var w=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js");let m="To refresh this SSO session run 'aws sso login' with the corresponding profile.",_=async(e,s={},t)=>{let{SSOOIDCClient:o}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js")),r=e=>s.clientConfig?.[e]??s.parentClientConfig?.[e]??t?.[e];return new o(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:r("logger"),userAgentAppId:r("userAgentAppId")}))},S=async(e,s,t={},o)=>{let{CreateTokenCommand:r}=await Promise.all([i.e("769"),i.e("53")]).then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sso-oidc/index.js"));return(await _(s,t,o)).send(new r({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))},y=e=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new u(`Token is expired. ${m}`,!1)},C=(e,s,i=!1)=>{if(void 0===s)throw new u(`Value not present for '${e}' in SSO Token${i?". Cannot refresh":""}. ${m}`,!1)};var k=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let{writeFile:T}=i("fs").promises,x=new Date(0),O=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:d,clientConfig:c,parentClientConfig:g,callerClientConfig:p,profile:_,filepath:O,configFilepath:j,ignoreCache:v,logger:I})=>{let A,$,b="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let e=await ((e={})=>async({callerClientConfig:s}={})=>{let i;e.logger?.debug("@aws-sdk/token-providers - fromSso");let t=await (0,r.Y)(e),n=(0,o.Bz)({profile:e.profile??s?.profile}),l=t[n];if(l){if(!l.sso_session)throw new u(`Profile '${n}' is missing required property 'sso_session'.`)}else throw new u(`Profile '${n}' could not be found in shared credentials file.`,!1);let a=l.sso_session,d=(await f(e))[a];if(!d)throw new u(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let e of["sso_start_url","sso_region"])if(!d[e])throw new u(`Sso session '${a}' is missing required property '${e}'.`,!1);d.sso_start_url;let c=d.sso_region;try{i=await (0,w.v)(a)}catch(e){throw new u(`The SSO session token associated with profile=${n} was not found or is invalid. ${m}`,!1)}C("accessToken",i.accessToken),C("expiresAt",i.expiresAt);let{accessToken:g,expiresAt:h}=i,p={token:g,expiration:new Date(h)};if(p.expiration.getTime()-Date.now()>3e5)return p;if(Date.now()-x.getTime()<3e4)return y(p),p;C("clientId",i.clientId,!0),C("clientSecret",i.clientSecret,!0),C("refreshToken",i.refreshToken,!0);try{x.setTime(Date.now());let t=await S(i,c,e,s);C("accessToken",t.accessToken),C("expiresIn",t.expiresIn);let o=new Date(Date.now()+1e3*t.expiresIn);try{var _;let e;await (_={...i,accessToken:t.accessToken,expiresAt:o.toISOString(),refreshToken:t.refreshToken},e=(0,k.C)(a),T(e,JSON.stringify(_,null,2)))}catch(e){}return{token:t.accessToken,expiration:o}}catch(e){return y(p),p}})({profile:_,filepath:O,configFilepath:j,ignoreCache:v})();A={accessToken:e.token,expiresAt:new Date(e.expiration).toISOString()}}catch(e){throw new t.C(e.message,{tryNextLink:!1,logger:I})}else try{A=await (0,w.v)(e)}catch(e){throw new t.C(`The SSO session associated with this profile is invalid. ${b}`,{tryNextLink:!1,logger:I})}if(new Date(A.expiresAt).getTime()-Date.now()<=0)throw new t.C(`The SSO session associated with this profile has expired. ${b}`,{tryNextLink:!1,logger:I});let{accessToken:N}=A,{SSOClient:F,GetRoleCredentialsCommand:D}=await Promise.all([i.e("769"),i.e("965")]).then(i.bind(i,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js")),L=d||new F(Object.assign({},c??{},{logger:c?.logger??p?.logger??g?.logger,region:c?.region??l,userAgentAppId:c?.userAgentAppId??p?.userAgentAppId??g?.userAgentAppId}));try{$=await L.send(new D({accountId:n,roleName:a,accessToken:N}))}catch(e){throw new t.C(e,{tryNextLink:!1,logger:I})}let{roleCredentials:{accessKeyId:P,secretAccessKey:R,sessionToken:E,expiration:U,credentialScope:q,accountId:z}={}}=$;if(!P||!R||!E||!U)throw new t.C("SSO returns an invalid temporary credential.",{tryNextLink:!1,logger:I});let Y={accessKeyId:P,secretAccessKey:R,sessionToken:E,expiration:new Date(U),...q&&{credentialScope:q},...z&&{accountId:z}};return s?(0,h.g)(Y,"CREDENTIALS_SSO","s"):(0,h.g)(Y,"CREDENTIALS_SSO_LEGACY","u"),Y},j=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:i,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,g=(0,o.Bz)({profile:e.profile??s?.profile});if(i||n||l||a||d)if(i&&n&&l&&a)return O({ssoStartUrl:i,ssoSession:d,ssoAccountId:n,ssoRegion:l,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger});else throw new t.C('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});{let s=(await (0,r.Y)(e))[g];if(!s)throw new t.C(`Profile ${g} was not found.`,{logger:e.logger});if(!(s&&("string"==typeof s.sso_start_url||"string"==typeof s.sso_account_id||"string"==typeof s.sso_session||"string"==typeof s.sso_region||"string"==typeof s.sso_role_name)))throw new t.C(`Profile ${g} is not configured with SSO credentials.`,{logger:e.logger});if(s?.sso_session){let o=(await f(e))[s.sso_session],r=` configurations in profile ${g} and sso-session ${s.sso_session}`;if(l&&l!==o.sso_region)throw new t.C("Conflicting SSO region"+r,{tryNextLink:!1,logger:e.logger});if(i&&i!==o.sso_start_url)throw new t.C("Conflicting SSO start_url"+r,{tryNextLink:!1,logger:e.logger});s.sso_region=o.sso_region,s.sso_start_url=o.sso_start_url}let{sso_start_url:o,sso_account_id:n,sso_region:a,sso_role_name:d,sso_session:h}=((e,s)=>{let{sso_start_url:i,sso_account_id:o,sso_region:r,sso_role_name:n}=e;if(!i||!o||!r||!n)throw new t.C(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
2
+ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e})(s,e.logger);return O({ssoStartUrl:o,ssoSession:h,ssoAccountId:n,ssoRegion:a,ssoRoleName:d,ssoClient:c,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:g,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger})}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,s,i){i.d(s,{C:()=>n});var t=i("crypto"),o=i("path"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let n=e=>{let s=(0,t.createHash)("sha1").update(e).digest("hex");return(0,o.join)((0,r.R)(),".aws","sso","cache",`${s}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,s,i){i.d(s,{a:()=>r,v:()=>n});var t=i("fs/promises"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let r={},n=async e=>{if(r[e])return r[e];let s=(0,o.C)(e);return JSON.parse(await (0,t.readFile)(s,"utf8"))}}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["730"],exports.modules={"./node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js"(e,s,i){i.d(s,{fromTokenFile:()=>l});var t=i("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),r=i("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=i("fs");let d="AWS_WEB_IDENTITY_TOKEN_FILE",l=(e={})=>async s=>{let l;e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");let a=e?.webIdentityTokenFile??process.env[d],c=e?.roleArn??process.env.AWS_ROLE_ARN,m=e?.roleSessionName??process.env.AWS_ROLE_SESSION_NAME;if(!a||!c)throw new r.C("Web identity configuration not specified",{logger:e.logger});let u=await (l={...e,webIdentityToken:o.Z?.getTokenRecord?.()[a]??(0,n.readFileSync)(a,{encoding:"ascii"}),roleArn:c,roleSessionName:m},async e=>{l.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");let{roleArn:s,roleSessionName:t,webIdentityToken:r,providerId:o,policyArns:n,policy:d,durationSeconds:a}=l,{roleAssumerWithWebIdentity:c}=l;if(!c){let{getDefaultRoleAssumerWithWebIdentity:s}=await i.e("216").then(i.bind(i,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"));c=s({...l.clientConfig,credentialProviderLogger:l.logger,parentClientConfig:{...e?.callerClientConfig,...l.parentClientConfig}},l.clientPlugins)}return c({RoleArn:s,RoleSessionName:t??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:r,ProviderId:o,PolicyArns:n,Policy:d,DurationSeconds:a})})(s);return a===process.env[d]&&(0,t.g)(u,"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN","h"),u}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,s,i){i.d(s,{Z:()=>o});var t=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let o={getFileRecord:()=>r.Jj,interceptFile(e,s){r.Jj[e]=Promise.resolve(s)},getTokenRecord:()=>t.a,interceptToken(e,s){t.a[e]=s}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,s,i){i.d(s,{C:()=>n});var t=i("crypto"),r=i("path"),o=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let n=e=>{let s=(0,t.createHash)("sha1").update(e).digest("hex");return(0,r.join)((0,o.R)(),".aws","sso","cache",`${s}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,s,i){i.d(s,{a:()=>o,v:()=>n});var t=i("fs/promises"),r=i("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let o={},n=async e=>{if(o[e])return o[e];let s=(0,r.C)(e);return JSON.parse(await (0,t.readFile)(s,"utf8"))}}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["769"],exports.modules={"./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"(e,t,s){s.d(t,{Y:()=>C});var r=s("./node_modules/@smithy/core/dist-es/submodules/protocols/HttpBindingProtocol.js"),i=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/HttpInterceptingShapeSerializer.js"),o=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/HttpInterceptingShapeDeserializer.js"),n=s("./node_modules/@smithy/core/dist-es/submodules/schema/schemas/NormalizedSchema.js"),a=s("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),c=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ProtocolLib.js"),u=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/ConfigurableSerdeContext.js"),l=s("./node_modules/@smithy/core/dist-es/submodules/protocols/serde/determineTimestampFormat.js"),d=s("./node_modules/@smithy/core/dist-es/submodules/serde/lazy-json.js"),h=s("./node_modules/@smithy/core/dist-es/submodules/serde/date-utils.js"),m=s("./node_modules/@smithy/core/dist-es/submodules/serde/value/NumericValue.js"),f=s("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),p=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/structIterator.js"),g=s("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/UnionSerde.js");function y(e,t,s){if(s?.source){let e=s.source;if("number"==typeof t&&(t>Number.MAX_SAFE_INTEGER||t<Number.MIN_SAFE_INTEGER||e!==String(t)))return e.includes(".")?new m.D(e,"bigDecimal"):BigInt(e)}return t}var S=s("./node_modules/@smithy/core/dist-es/submodules/protocols/collect-stream-body.js"),b=s("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js");class w extends u.B{settings;constructor(e){super(),this.settings=e}async read(e,t){var s;return this._read(e,"string"==typeof t?JSON.parse(t,y):await (s=this.serdeContext,(0,S.P)(t,s).then(e=>(s?.utf8Encoder??b.P)(e))).then(e=>{if(e.length)try{return JSON.parse(e)}catch(t){throw t?.name==="SyntaxError"&&Object.defineProperty(t,"$responseBodyText",{value:e}),t}return{}}))}readObject(e,t){return this._read(e,t)}_read(e,t){let s=null!==t&&"object"==typeof t,r=n.l.of(e);if(s){if(r.isStructSchema()){let e,s=r.isUnionSchema(),i={};for(let[o,n]of(s&&(e=new g.F(t,i)),(0,p.G)(r,t,!!this.settings.jsonName&&"jsonName"))){let r=this.settings.jsonName?n.getMergedTraits().jsonName??o:o;s&&e.mark(r),null!=t[r]&&(i[o]=this._read(n,t[r]))}return s&&e.writeUnknown(),i}if(Array.isArray(t)&&r.isListSchema()){let e=r.getValueSchema(),s=[],i=!!r.getMergedTraits().sparse;for(let r of t)(i||null!=r)&&s.push(this._read(e,r));return s}if(r.isMapSchema()){let e=r.getValueSchema(),s={},i=!!r.getMergedTraits().sparse;for(let[r,o]of Object.entries(t))(i||null!=o)&&(s[r]=this._read(e,o));return s}}if(r.isBlobSchema()&&"string"==typeof t)return(0,f.E)(t);let i=r.getMergedTraits().mediaType;if(r.isStringSchema()&&"string"==typeof t&&i)return"application/json"===i||i.endsWith("+json")?d.A.from(t):t;if(r.isTimestampSchema()&&null!=t)switch((0,l.V)(r,this.settings)){case 5:return(0,h.t_)(t);case 6:return(0,h.xE)(t);case 7:return(0,h.l3)(t);default:return console.warn("Missing timestamp format, parsing value with Date constructor:",t),new Date(t)}if(r.isBigIntegerSchema()&&("number"==typeof t||"string"==typeof t))return BigInt(t);if(r.isBigDecimalSchema()&&void 0!=t)return t instanceof m.D?t:"bigDecimal"===t.type&&"string"in t?new m.D(t.string,t.type):new m.D(String(t),"bigDecimal");if(r.isNumericSchema()&&"string"==typeof t){switch(t){case"Infinity":return 1/0;case"-Infinity":return-1/0;case"NaN":return NaN}return t}if(r.isDocumentSchema())if(!s)return structuredClone(t);else{let e=Array.isArray(t)?[]:{};for(let[s,i]of Object.entries(t))i instanceof m.D?e[s]=i:e[s]=this._read(r,i);return e}return t}}var _=s("./node_modules/@smithy/uuid/dist-es/v4.js"),j=s("./node_modules/@smithy/util-base64/dist-es/toBase64.js");let x=String.fromCharCode(925);class D{values=new Map;counter=0;stage=0;createReplacer(){if(1===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer already created.");if(2===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer exhausted.");return this.stage=1,(e,t)=>{if(t instanceof m.D){let e=`${x+"nv"+this.counter++}_`+t.string;return this.values.set(`"${e}"`,t.string),e}if("bigint"==typeof t){let e=t.toString(),s=`${x+"b"+this.counter++}_`+e;return this.values.set(`"${s}"`,e),s}return t}}replaceInJson(e){if(0===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer not created yet.");if(2===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer exhausted.");if(this.stage=2,0===this.counter)return e;for(let[t,s]of this.values)e=e.replace(t,s);return e}}class N extends u.B{settings;buffer;useReplacer=!1;rootSchema;constructor(e){super(),this.settings=e}write(e,t){this.rootSchema=n.l.of(e),this.buffer=this._write(this.rootSchema,t)}writeDiscriminatedDocument(e,t){this.write(e,t),"object"==typeof this.buffer&&(this.buffer.__type=n.l.of(e).getName(!0))}flush(){let{rootSchema:e,useReplacer:t}=this;if(this.rootSchema=void 0,this.useReplacer=!1,e?.isStructSchema()||e?.isDocumentSchema()){if(!t)return JSON.stringify(this.buffer);let e=new D;return e.replaceInJson(JSON.stringify(this.buffer,e.createReplacer(),0))}return this.buffer}_write(e,t,s){let r=null!==t&&"object"==typeof t,i=n.l.of(e);if(r){if(i.isStructSchema()){let e={};for(let[s,r]of(0,p.R)(i,t)){let o=this._write(r,t[s],i);if(void 0!==o){let t=r.getMergedTraits().jsonName;e[this.settings.jsonName?t??s:s]=o}}if(i.isUnionSchema()&&0===Object.keys(e).length){let{$unknown:s}=t;if(Array.isArray(s)){let[t,r]=s;e[t]=this._write(15,r)}}return e}if(Array.isArray(t)&&i.isListSchema()){let e=i.getValueSchema(),s=[],r=!!i.getMergedTraits().sparse;for(let i of t)(r||null!=i)&&s.push(this._write(e,i));return s}if(i.isMapSchema()){let e=i.getValueSchema(),s={},r=!!i.getMergedTraits().sparse;for(let[i,o]of Object.entries(t))(r||null!=o)&&(s[i]=this._write(e,o));return s}if(t instanceof Uint8Array&&(i.isBlobSchema()||i.isDocumentSchema()))return i===this.rootSchema?t:(this.serdeContext?.base64Encoder??j.n)(t);if(t instanceof Date&&(i.isTimestampSchema()||i.isDocumentSchema()))switch((0,l.V)(i,this.settings)){case 5:return t.toISOString().replace(".000Z","Z");case 6:return(0,h.JV)(t);case 7:return t.getTime()/1e3;default:return console.warn("Missing timestamp format, using epoch seconds",t),t.getTime()/1e3}t instanceof m.D&&(this.useReplacer=!0)}if(!(null===t&&s?.isStructSchema())){if(i.isStringSchema()){if(void 0===t&&i.isIdempotencyToken())return(0,_.v4)();let e=i.getMergedTraits().mediaType;return null!=t&&e&&("application/json"===e||e.endsWith("+json"))?d.A.from(t):t}if("number"==typeof t&&i.isNumericSchema())return Math.abs(t)===1/0||isNaN(t)?String(t):t;if("string"==typeof t&&i.isBlobSchema())return i===this.rootSchema?t:(this.serdeContext?.base64Encoder??j.n)(t);if("bigint"==typeof t&&(this.useReplacer=!0),i.isDocumentSchema())if(!r)return structuredClone(t);else{let e=Array.isArray(t)?[]:{};for(let[s,r]of Object.entries(t))r instanceof m.D?(this.useReplacer=!0,e[s]=r):e[s]=this._write(i,r);return e}return t}}}class T extends u.B{settings;constructor(e){super(),this.settings=e}createSerializer(){let e=new N(this.settings);return e.setSerdeContext(this.serdeContext),e}createDeserializer(){let e=new w(this.settings);return e.setSerdeContext(this.serdeContext),e}}class C extends r.s{serializer;deserializer;codec;mixin=new c.U;constructor({defaultNamespace:e}){super({defaultNamespace:e});const t={timestampFormat:{useTrait:!0,default:7},httpBindings:!0,jsonName:!0};this.codec=new T(t),this.serializer=new i._(this.codec.createSerializer(),t),this.deserializer=new o.z(this.codec.createDeserializer(),t)}getShapeId(){return"aws.protocols#restJson1"}getPayloadCodec(){return this.codec}setSerdeContext(e){this.codec.setSerdeContext(e),super.setSerdeContext(e)}async serializeRequest(e,t,s){let r=await super.serializeRequest(e,t,s),i=n.l.of(e.input);if(!r.headers["content-type"]){let e=this.mixin.resolveRestContentType(this.getDefaultContentType(),i);e&&(r.headers["content-type"]=e)}return null==r.body&&r.headers["content-type"]===this.getDefaultContentType()&&(r.body="{}"),r}async deserializeResponse(e,t,s){let r=await super.deserializeResponse(e,t,s);for(let[t,s]of n.l.of(e.output).structIterator())!s.getMemberTraits().httpPayload||t in r||(r[t]=null);return r}async handleError(e,t,s,r,i){let o=((e,t)=>{let s=(e,t)=>Object.keys(e).find(e=>e.toLowerCase()===t.toLowerCase()),r=e=>{let t=e;return"number"==typeof t&&(t=t.toString()),t.indexOf(",")>=0&&(t=t.split(",")[0]),t.indexOf(":")>=0&&(t=t.split(":")[0]),t.indexOf("#")>=0&&(t=t.split("#")[1]),t},i=s(e.headers,"x-amzn-errortype");if(void 0!==i)return r(e.headers[i]);if(t&&"object"==typeof t){let e=s(t,"code");if(e&&void 0!==t[e])return r(t[e]);if(void 0!==t.__type)return r(t.__type)}})(s,r)??"Unknown",{errorSchema:c,errorMetadata:u}=await this.mixin.getErrorSchemaOrThrowBaseException(o,this.options.defaultNamespace,s,r,i),l=n.l.of(c),d=r.message??r.Message??"Unknown",h=new(a.O.for(c[1]).getErrorCtor(c)??Error)(d);await this.deserializeHttpMessage(c,t,s,r);let m={};for(let[e,t]of l.structIterator()){let s=t.getMergedTraits().jsonName??e;m[e]=this.codec.createDeserializer().readObject(t,r[s])}throw this.mixin.decorateServiceException(Object.assign(h,u,{$fault:l.getMergedTraits().error,message:d},m),r)}getDefaultContentType(){return"application/json"}}},"./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"(e,t,s){s.d(t,{m:()=>r});class r{async sign(e,t,s){return e}}}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["864"],exports.modules={"./node_modules/@aws-sdk/credential-provider-ini/dist-es/index.js"(e,t,r){r.d(t,{fromIni:()=>b});var s=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),i=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),n=r("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),o=r("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js"),a=r("./node_modules/@smithy/property-provider/dist-es/chain.js");let l=e=>(0,o.g)(e,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p"),d=async(e,t,s,d,g={},u)=>{s.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let f=t[e],{source_profile:p,region:h}=f;if(!s.roleAssumer){let{getDefaultRoleAssumer:e}=await r.e("216").then(r.bind(r,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/sts/index.js"));s.roleAssumer=e({...s.clientConfig,credentialProviderLogger:s.logger,parentClientConfig:{...d,...s?.parentClientConfig,region:h??s?.parentClientConfig?.region??d?.region}},s.clientPlugins)}if(p&&p in g)throw new n.C(`Detected a cycle attempting to resolve credentials for profile ${(0,i.Bz)(s)}. Profiles visited: `+Object.keys(g).join(", "),{logger:s.logger});s.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${p?`source_profile=[${p}]`:`profile=[${e}]`}`);let _=p?u(p,t,s,d,{...g,[p]:!0},c(t[p]??{})):(await ((e,t,s)=>{let i={EcsContainer:async e=>{let{fromHttp:t}=await r.e("634").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-http/dist-es/index.js")),{fromContainerMetadata:i}=await r.e("560").then(r.bind(r,"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"));return s?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>(0,a.c)(t(e??{}),i(e))().then(l)},Ec2InstanceMetadata:async e=>{s?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:t}=await r.e("560").then(r.bind(r,"./node_modules/@smithy/credential-provider-imds/dist-es/index.js"));return async()=>t(e)().then(l)},Environment:async e=>{s?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:t}=await r.e("134").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-env/dist-es/index.js"));return async()=>t(e)().then(l)}};if(e in i)return i[e];throw new n.C(`Unsupported credential source in profile ${t}. Got ${e}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:s})})(f.credential_source,e,s.logger)(s))();if(c(f))return _.then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"));{let t={RoleArn:f.role_arn,RoleSessionName:f.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:f.external_id,DurationSeconds:parseInt(f.duration_seconds||"3600",10)},{mfa_serial:r}=f;if(r){if(!s.mfaCodeProvider)throw new n.C(`Profile ${e} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:s.logger,tryNextLink:!1});t.SerialNumber=r,t.TokenCode=await s.mfaCodeProvider(r)}let i=await _;return s.roleAssumer(i,t).then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"))}},c=e=>!e.role_arn&&!!e.credential_source;var g=r("./node_modules/@smithy/protocol-http/dist-es/httpRequest.js"),u=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js"),f=r("node:crypto"),p=r("node:fs"),h=r("node:os"),_=r("node:path");class y{profileData;init;callerClientConfig;static REFRESH_THRESHOLD=3e5;constructor(e,t,r){this.profileData=e,this.init=t,this.callerClientConfig=r}async loadCredentials(){let e=await this.loadToken();if(!e)throw new n.C(`Failed to load a token for session ${this.loginSession}, please re-authenticate using aws login`,{tryNextLink:!1,logger:this.logger});let t=e.accessToken,r=Date.now();return new Date(t.expiresAt).getTime()-r<=y.REFRESH_THRESHOLD?this.refresh(e):{accessKeyId:t.accessKeyId,secretAccessKey:t.secretAccessKey,sessionToken:t.sessionToken,accountId:t.accountId,expiration:new Date(t.expiresAt)}}get logger(){return this.init?.logger}get loginSession(){return this.profileData.login_session}async refresh(e){let t,{SigninClient:s,CreateOAuth2TokenCommand:i}=await Promise.all([r.e("769"),r.e("195")]).then(r.bind(r,"./node_modules/@aws-sdk/nested-clients/dist-es/submodules/signin/index.js")),{logger:o,userAgentAppId:a}=this.callerClientConfig??{},l=(t=this.callerClientConfig?.requestHandler,t?.metadata?.handlerProtocol==="h2")?void 0:this.callerClientConfig?.requestHandler,d=new s({credentials:{accessKeyId:"",secretAccessKey:""},region:this.profileData.region??await this.callerClientConfig?.region?.()??process.env.AWS_REGION,requestHandler:l,logger:o,userAgentAppId:a,...this.init?.clientConfig});this.createDPoPInterceptor(d.middlewareStack);let c={tokenInput:{clientId:e.clientId,refreshToken:e.refreshToken,grantType:"refresh_token"}};try{let t=await d.send(new i(c)),{accessKeyId:r,secretAccessKey:s,sessionToken:o}=t.tokenOutput?.accessToken??{},{refreshToken:a,expiresIn:l}=t.tokenOutput??{};if(!r||!s||!o||!a)throw new n.C("Token refresh response missing required fields",{logger:this.logger,tryNextLink:!1});let g=new Date(Date.now()+(l??900)*1e3),u={...e,accessToken:{...e.accessToken,accessKeyId:r,secretAccessKey:s,sessionToken:o,expiresAt:g.toISOString()},refreshToken:a};await this.saveToken(u);let f=u.accessToken;return{accessKeyId:f.accessKeyId,secretAccessKey:f.secretAccessKey,sessionToken:f.sessionToken,accountId:f.accountId,expiration:g}}catch(e){if("AccessDeniedException"===e.name){let t;switch(e.error){case"TOKEN_EXPIRED":t="Your session has expired. Please reauthenticate.";break;case"USER_CREDENTIALS_CHANGED":t="Unable to refresh credentials because of a change in your password. Please reauthenticate with your new password.";break;case"INSUFFICIENT_PERMISSIONS":t="Unable to refresh credentials due to insufficient permissions. You may be missing permission for the 'CreateOAuth2Token' action.";break;default:t=`Failed to refresh token: ${String(e)}. Please re-authenticate using \`aws login\``}throw new n.C(t,{logger:this.logger,tryNextLink:!1})}throw new n.C(`Failed to refresh token: ${String(e)}. Please re-authenticate using aws login`,{logger:this.logger})}}async loadToken(){let e=this.getTokenFilePath();try{let t;try{t=await (0,u.TA)(e,{ignoreCache:this.init?.ignoreCache})}catch{t=await p.promises.readFile(e,"utf8")}let r=JSON.parse(t),s=["accessToken","clientId","refreshToken","dpopKey"].filter(e=>!r[e]);if(r.accessToken?.accountId||s.push("accountId"),s.length>0)throw new n.C(`Token validation failed, missing fields: ${s.join(", ")}`,{logger:this.logger,tryNextLink:!1});return r}catch(t){throw new n.C(`Failed to load token from ${e}: ${String(t)}`,{logger:this.logger,tryNextLink:!1})}}async saveToken(e){let t=this.getTokenFilePath(),r=(0,_.dirname)(t);try{await p.promises.mkdir(r,{recursive:!0})}catch(e){}await p.promises.writeFile(t,JSON.stringify(e,null,2),"utf8")}getTokenFilePath(){let e=process.env.AWS_LOGIN_CACHE_DIRECTORY??(0,_.join)((0,h.homedir)(),".aws","login","cache"),t=Buffer.from(this.loginSession,"utf8"),r=(0,f.createHash)("sha256").update(t).digest("hex");return(0,_.join)(e,`${r}.json`)}derToRawSignature(e){let t=2;if(2!==e[2])throw Error("Invalid DER signature");t++;let r=e[t++],s=e.subarray(t,t+r);if(2!==e[t+=r])throw Error("Invalid DER signature");t++;let i=e[t++],n=e.subarray(t,t+i);s=0===s[0]?s.subarray(1):s,n=0===n[0]?n.subarray(1):n;let o=Buffer.concat([Buffer.alloc(32-s.length),s]),a=Buffer.concat([Buffer.alloc(32-n.length),n]);return Buffer.concat([o,a])}createDPoPInterceptor(e){e.add(e=>async t=>{if(g.K.isInstance(t.request)){let e=t.request,r=`${e.protocol}//${e.hostname}${e.port?`:${e.port}`:""}${e.path}`,s=await this.generateDpop(e.method,r);e.headers={...e.headers,DPoP:s}}return e(t)},{step:"finalizeRequest",name:"dpopInterceptor",override:!0})}async generateDpop(e="POST",t){let r=await this.loadToken();try{let s=(0,f.createPrivateKey)({key:r.dpopKey,format:"pem",type:"sec1"}),i=(0,f.createPublicKey)(s).export({format:"der",type:"spki"}),n=-1;for(let e=0;e<i.length;e++)if(4===i[e]){n=e;break}let o=i.slice(n+1,n+33),a=i.slice(n+33,n+65),l={alg:"ES256",typ:"dpop+jwt",jwk:{kty:"EC",crv:"P-256",x:o.toString("base64url"),y:a.toString("base64url")}},d={jti:crypto.randomUUID(),htm:e,htu:t,iat:Math.floor(Date.now()/1e3)},c=Buffer.from(JSON.stringify(l)).toString("base64url"),g=Buffer.from(JSON.stringify(d)).toString("base64url"),u=`${c}.${g}`,p=(0,f.sign)("sha256",Buffer.from(u),s),h=this.derToRawSignature(p).toString("base64url");return`${u}.${h}`}catch(e){throw new n.C(`Failed to generate Dpop proof: ${e instanceof Error?e.message:String(e)}`,{logger:this.logger,tryNextLink:!1})}}}let w=async(e,t,r)=>{let a,l=await (a={...t,profile:e},async({callerClientConfig:e}={})=>{a?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");let t=await (0,s.Y)(a||{}),r=(0,i.Bz)({profile:a?.profile??e?.profile}),l=t[r];if(!l?.login_session)throw new n.C(`Profile ${r} does not contain login_session.`,{tryNextLink:!0,logger:a?.logger});let d=new y(l,a,e),c=await d.loadCredentials();return(0,o.g)(c,"CREDENTIALS_LOGIN","AD")})({callerClientConfig:r});return(0,o.g)(l,"CREDENTIALS_PROFILE_LOGIN","AC")},m=async(e,t)=>r.e("911").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js")).then(({fromProcess:r})=>r({...e,profile:t})().then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_PROCESS","v"))),k=async(e,t,s={},i)=>{let{fromSSO:n}=await r.e("710").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-sso/dist-es/index.js"));return n({profile:e,logger:s.logger,parentClientConfig:s.parentClientConfig,clientConfig:s.clientConfig})({callerClientConfig:i}).then(e=>t.sso_session?(0,o.g)(e,"CREDENTIALS_PROFILE_SSO","r"):(0,o.g)(e,"CREDENTIALS_PROFILE_SSO_LEGACY","t"))},C=e=>!!e&&"object"==typeof e&&"string"==typeof e.aws_access_key_id&&"string"==typeof e.aws_secret_access_key&&["undefined","string"].indexOf(typeof e.aws_session_token)>-1&&["undefined","string"].indexOf(typeof e.aws_account_id)>-1,E=async(e,t)=>{t?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");let r={accessKeyId:e.aws_access_key_id,secretAccessKey:e.aws_secret_access_key,sessionToken:e.aws_session_token,...e.aws_credential_scope&&{credentialScope:e.aws_credential_scope},...e.aws_account_id&&{accountId:e.aws_account_id}};return(0,o.g)(r,"CREDENTIALS_PROFILE","n")},I=async(e,t,s)=>r.e("730").then(r.bind(r,"./node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js")).then(({fromTokenFile:r})=>r({webIdentityTokenFile:e.web_identity_token_file,roleArn:e.role_arn,roleSessionName:e.role_session_name,roleAssumerWithWebIdentity:t.roleAssumerWithWebIdentity,logger:t.logger,parentClientConfig:t.parentClientConfig})({callerClientConfig:s}).then(e=>(0,o.g)(e,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q"))),S=async(e,t,r,s,i={},o=!1)=>{let a=t[e];if(Object.keys(i).length>0&&C(a))return E(a,r);if(o||((e,{profile:t="default",logger:r}={})=>!!e&&"object"==typeof e&&"string"==typeof e.role_arn&&["undefined","string"].indexOf(typeof e.role_session_name)>-1&&["undefined","string"].indexOf(typeof e.external_id)>-1&&["undefined","string"].indexOf(typeof e.mfa_serial)>-1&&(((e,{profile:t,logger:r})=>{let s="string"==typeof e.source_profile&&void 0===e.credential_source;return s&&r?.debug?.(` ${t} isAssumeRoleWithSourceProfile source_profile=${e.source_profile}`),s})(e,{profile:t,logger:r})||((e,{profile:t,logger:r})=>{let s="string"==typeof e.credential_source&&void 0===e.source_profile;return s&&r?.debug?.(` ${t} isCredentialSourceProfile credential_source=${e.credential_source}`),s})(e,{profile:t,logger:r})))(a,{profile:e,logger:r.logger}))return d(e,t,r,s,i,S);if(C(a))return E(a,r);if(a&&"object"==typeof a&&"string"==typeof a.web_identity_token_file&&"string"==typeof a.role_arn&&["undefined","string"].indexOf(typeof a.role_session_name)>-1)return I(a,r,s);if(a&&"object"==typeof a&&"string"==typeof a.credential_process)return m(r,e);if(a&&("string"==typeof a.sso_start_url||"string"==typeof a.sso_account_id||"string"==typeof a.sso_session||"string"==typeof a.sso_region||"string"==typeof a.sso_role_name))return await k(e,a,r,s);if(a&&a.login_session)return w(e,r,s);throw new n.C(`Could not resolve credentials using profile: [${e}] in configuration/credentials file(s).`,{logger:r.logger})},b=(e={})=>async({callerClientConfig:t}={})=>{e.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let r=await (0,s.Y)(e);return S((0,i.Bz)({profile:e.profile??t?.profile}),r,e,t)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"(e,t,r){r.d(t,{Y:()=>i});var s=r("./node_modules/@smithy/shared-ini-file-loader/dist-es/loadSharedConfigFiles.js");let i=async e=>{let t=await (0,s.p)(e);return((...e)=>{let t={};for(let r of e)for(let[e,s]of Object.entries(r))void 0!==t[e]?Object.assign(t[e],s):t[e]=s;return t})(t.configFile,t.credentialsFile)}}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["911"],exports.modules={"./node_modules/@aws-sdk/credential-provider-process/dist-es/index.js"(e,r,s){s.d(r,{fromProcess:()=>p});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/parseKnownFiles.js"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getProfileName.js"),o=s("./node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js"),d=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"),n=s("child_process"),a=s("util"),l=s("./node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js");let c=async(e,r,s)=>{let i=r[e];if(r[e]){let c=i.credential_process;if(void 0!==c){let i=(0,a.promisify)(d.Z?.getTokenRecord?.().exec??n.exec);try{let s,{stdout:o}=await i(c);try{s=JSON.parse(o.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}var t=s;if(1!==t.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===t.AccessKeyId||void 0===t.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(t.Expiration){let r=new Date;if(new Date(t.Expiration)<r)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let d=t.AccountId;!d&&r?.[e]?.aws_account_id&&(d=r[e].aws_account_id);let n={accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,...t.SessionToken&&{sessionToken:t.SessionToken},...t.Expiration&&{expiration:new Date(t.Expiration)},...t.CredentialScope&&{credentialScope:t.CredentialScope},...d&&{accountId:d}};return(0,l.g)(n,"CREDENTIALS_PROCESS","w"),n}catch(e){throw new o.C(e.message,{logger:s})}}throw new o.C(`Profile ${e} did not contain credential_process.`,{logger:s})}throw new o.C(`Profile ${e} could not be found in shared credentials file.`,{logger:s})},p=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let s=await (0,i.Y)(e);return c((0,t.Bz)({profile:e.profile??r?.profile}),s,e.logger)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/externalDataInterceptor.js"(e,r,s){s.d(r,{Z:()=>o});var i=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/readFile.js");let o={getFileRecord:()=>t.Jj,interceptFile(e,r){t.Jj[e]=Promise.resolve(r)},getTokenRecord:()=>i.a,interceptToken(e,r){i.a[e]=r}}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js"(e,r,s){s.d(r,{C:()=>d});var i=s("crypto"),t=s("path"),o=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getHomeDir.js");let d=e=>{let r=(0,i.createHash)("sha1").update(e).digest("hex");return(0,t.join)((0,o.R)(),".aws","sso","cache",`${r}.json`)}},"./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFromFile.js"(e,r,s){s.d(r,{a:()=>o,v:()=>d});var i=s("fs/promises"),t=s("./node_modules/@smithy/shared-ini-file-loader/dist-es/getSSOTokenFilepath.js");let o={},d=async e=>{if(o[e])return o[e];let r=(0,t.C)(e);return JSON.parse(await (0,i.readFile)(r,"utf8"))}}};
@@ -0,0 +1 @@
1
+ "use strict";const __rslib_import_meta_url__="u"<typeof document?new(require("url".replace("",""))).URL("file:"+__filename).href:document.currentScript&&document.currentScript.src||new URL("main.js",document.baseURI).href;exports.ids=["965"],exports.modules={"./node_modules/@aws-sdk/credential-provider-sso/dist-es/loadSso.js"(e,s,t){t.d(s,{SSOClient:()=>e4,GetRoleCredentialsCommand:()=>O});var o=t("./node_modules/@smithy/middleware-endpoint/dist-es/getEndpointPlugin.js"),i=t("./node_modules/@smithy/smithy-client/dist-es/command.js");let n={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var r=t("./node_modules/@smithy/core/dist-es/submodules/schema/TypeRegistry.js"),d=t("./node_modules/@smithy/smithy-client/dist-es/exceptions.js");class a extends d.T{constructor(e){super(e),Object.setPrototypeOf(this,a.prototype)}}class l extends a{name="InvalidRequestException";$fault="client";constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,l.prototype)}}class u extends a{name="ResourceNotFoundException";$fault="client";constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,u.prototype)}}class c extends a{name="TooManyRequestsException";$fault="client";constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e}),Object.setPrototypeOf(this,c.prototype)}}class p extends a{name="UnauthorizedException";$fault="client";constructor(e){super({name:"UnauthorizedException",$fault:"client",...e}),Object.setPrototypeOf(this,p.prototype)}}let m="client",h="error",g="httpError",f="httpQuery",y="message",S="smithy.ts.sdk.synthetic.com.amazonaws.sso",w="com.amazonaws.sso";var _=[0,w,"AccessTokenType",8,0],v=[0,w,"SecretAccessKeyType",8,0],j=[0,w,"SessionTokenType",8,0],P=[3,w,"GetRoleCredentialsRequest",0,["roleName","accountId","accessToken"],[[0,{[f]:"role_name"}],[0,{[f]:"account_id"}],[()=>_,{httpHeader:"x-amz-sso_bearer_token"}]]],E=[3,w,"GetRoleCredentialsResponse",0,["roleCredentials"],[[()=>b,0]]],k=[-3,w,"InvalidRequestException",{[h]:m,[g]:400},[y],[0]];r.O.for(w).registerError(k,l);var x=[-3,w,"ResourceNotFoundException",{[h]:m,[g]:404},[y],[0]];r.O.for(w).registerError(x,u);var b=[3,w,"RoleCredentials",0,["accessKeyId","secretAccessKey","sessionToken","expiration"],[0,[()=>v,0],[()=>j,0],1]],I=[-3,w,"TooManyRequestsException",{[h]:m,[g]:429},[y],[0]];r.O.for(w).registerError(I,c);var R=[-3,w,"UnauthorizedException",{[h]:m,[g]:401},[y],[0]];r.O.for(w).registerError(R,p);var A=[-3,S,"SSOServiceException",0,[],[]];r.O.for(S).registerError(A,a);var C=[9,w,"GetRoleCredentials",{http:["GET","/federation/credentials",200]},()=>P,()=>E];class O extends i.u.classBuilder().ep(n).m(function(e,s,t,i){return[(0,o.r)(t,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").sc(C).build(){}var D=t("./node_modules/@aws-sdk/middleware-host-header/dist-es/index.js"),U=t("./node_modules/@aws-sdk/middleware-logger/dist-es/loggerMiddleware.js"),F=t("./node_modules/@aws-sdk/middleware-recursion-detection/dist-es/getRecursionDetectionPlugin.js"),T=t("./node_modules/@aws-sdk/middleware-user-agent/dist-es/configurations.js"),q=t("./node_modules/@aws-sdk/middleware-user-agent/dist-es/user-agent-middleware.js"),N=t("./node_modules/@smithy/config-resolver/dist-es/regionConfig/resolveRegionConfig.js"),M=t("./node_modules/@smithy/core/dist-es/middleware-http-auth-scheme/getHttpAuthSchemeEndpointRuleSetPlugin.js"),$=t("./node_modules/@smithy/core/dist-es/util-identity-and-auth/DefaultIdentityProviderConfig.js"),z=t("./node_modules/@smithy/core/dist-es/middleware-http-signing/getHttpSigningMiddleware.js"),H=t("./node_modules/@smithy/core/dist-es/submodules/schema/middleware/getSchemaSerdePlugin.js"),L=t("./node_modules/@smithy/middleware-content-length/dist-es/index.js"),G=t("./node_modules/@smithy/middleware-endpoint/dist-es/resolveEndpointConfig.js"),V=t("./node_modules/@smithy/middleware-retry/dist-es/configurations.js"),Z=t("./node_modules/@smithy/middleware-retry/dist-es/retryMiddleware.js"),B=t("./node_modules/@smithy/smithy-client/dist-es/client.js"),K=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.js"),W=t("./node_modules/@smithy/util-middleware/dist-es/getSmithyContext.js"),Y=t("./node_modules/@smithy/util-middleware/dist-es/normalizeProvider.js");let J=async(e,s,t)=>({operation:(0,W.u)(s).operation,region:await (0,Y.t)(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),Q=e=>{let s=[];switch(e.operation){case"GetRoleCredentials":case"ListAccountRoles":case"ListAccounts":case"Logout":s.push({schemeId:"smithy.api#noAuth"});break;default:s.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(e,s)=>({signingProperties:{config:e,context:s}})})}return s};var X=t("./node_modules/@aws-sdk/core/dist-es/submodules/client/emitWarningIfUnsupportedVersion.js"),ee=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/NODE_AUTH_SCHEME_PREFERENCE_OPTIONS.js"),es=t("./node_modules/@aws-sdk/util-user-agent-node/dist-es/defaultUserAgent.js"),et=t("./node_modules/@aws-sdk/util-user-agent-node/dist-es/nodeAppIdConfigOptions.js"),eo=t("./node_modules/@smithy/config-resolver/dist-es/regionConfig/config.js"),ei=t("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseDualstackEndpointConfigOptions.js"),en=t("./node_modules/@smithy/config-resolver/dist-es/endpointsConfig/NodeUseFipsEndpointConfigOptions.js"),er=t("./node_modules/@smithy/hash-node/dist-es/index.js"),ed=t("./node_modules/@smithy/node-config-provider/dist-es/configLoader.js"),ea=t("./node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js"),el=t("./node_modules/@smithy/node-http-handler/dist-es/stream-collector/index.js"),eu=t("./node_modules/@smithy/smithy-client/dist-es/emitWarningIfUnsupportedVersion.js"),ec=t("./node_modules/@smithy/smithy-client/dist-es/defaults-mode.js"),ep=t("./node_modules/@smithy/util-body-length-node/dist-es/calculateBodyLength.js"),em=t("./node_modules/@smithy/util-defaults-mode-node/dist-es/resolveDefaultsModeConfig.js"),eh=t("./node_modules/@smithy/util-retry/dist-es/config.js"),eg=t("./node_modules/@aws-sdk/core/dist-es/submodules/httpAuthSchemes/aws_sdk/AwsSdkSigV4Signer.js"),ef=t("./node_modules/@aws-sdk/core/dist-es/submodules/protocols/json/AwsRestJsonProtocol.js"),ey=t("./node_modules/@smithy/core/dist-es/util-identity-and-auth/httpAuthSchemes/noAuth.js"),eS=t("./node_modules/@smithy/smithy-client/dist-es/NoOpLogger.js"),ew=t("./node_modules/@smithy/url-parser/dist-es/index.js"),e_=t("./node_modules/@smithy/util-base64/dist-es/fromBase64.js"),ev=t("./node_modules/@smithy/util-base64/dist-es/toBase64.js"),ej=t("./node_modules/@smithy/util-utf8/dist-es/fromUtf8.js"),eP=t("./node_modules/@smithy/util-utf8/dist-es/toUtf8.js"),eE=t("./node_modules/@aws-sdk/util-endpoints/dist-es/index.js"),ek=t("./node_modules/@smithy/util-endpoints/dist-es/cache/EndpointCache.js"),ex=t("./node_modules/@smithy/util-endpoints/dist-es/resolveEndpoint.js"),eb=t("./node_modules/@smithy/util-endpoints/dist-es/utils/customEndpointFunctions.js");let eI="required",eR="argv",eA="isSet",eC="booleanEquals",eO="error",eD="endpoint",eU="tree",eF="PartitionResult",eT="getAttr",eq={[eI]:!1,type:"string"},eN={[eI]:!0,default:!1,type:"boolean"},eM={ref:"Endpoint"},e$={fn:eC,[eR]:[{ref:"UseFIPS"},!0]},ez={fn:eC,[eR]:[{ref:"UseDualStack"},!0]},eH={},eL={fn:eT,[eR]:[{ref:eF},"supportsFIPS"]},eG={ref:eF},eV={fn:eC,[eR]:[!0,{fn:eT,[eR]:[eG,"supportsDualStack"]}]},eZ=[e$],eB=[ez],eK=[{ref:"Region"}],eW={version:"1.0",parameters:{Region:eq,UseDualStack:eN,UseFIPS:eN,Endpoint:eq},rules:[{conditions:[{fn:eA,[eR]:[eM]}],rules:[{conditions:eZ,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:eO},{conditions:eB,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:eO},{endpoint:{url:eM,properties:eH,headers:eH},type:eD}],type:eU},{conditions:[{fn:eA,[eR]:eK}],rules:[{conditions:[{fn:"aws.partition",[eR]:eK,assign:eF}],rules:[{conditions:[e$,ez],rules:[{conditions:[{fn:eC,[eR]:[!0,eL]},eV],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eH,headers:eH},type:eD}],type:eU},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:eO}],type:eU},{conditions:eZ,rules:[{conditions:[{fn:eC,[eR]:[eL,!0]}],rules:[{conditions:[{fn:"stringEquals",[eR]:[{fn:eT,[eR]:[eG,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:eH,headers:eH},type:eD},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:eH,headers:eH},type:eD}],type:eU},{error:"FIPS is enabled but this partition does not support FIPS",type:eO}],type:eU},{conditions:eB,rules:[{conditions:[eV],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eH,headers:eH},type:eD}],type:eU},{error:"DualStack is enabled but this partition does not support DualStack",type:eO}],type:eU},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:eH,headers:eH},type:eD}],type:eU}],type:eU},{error:"Invalid Configuration: Missing Region",type:eO}]},eY=new ek.k({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),eJ=(e,s={})=>eY.get(e,()=>(0,ex.s)(eW,{endpointParams:e,logger:s.logger}));eb.m.aws=eE.UF;var eQ=t("./node_modules/@aws-sdk/region-config-resolver/dist-es/extensions/index.js"),eX=t("./node_modules/@smithy/protocol-http/dist-es/extensions/httpExtensionConfiguration.js"),e0=t("./node_modules/@smithy/smithy-client/dist-es/extensions/defaultExtensionConfiguration.js");class e4 extends B.K{config;constructor(...[e]){const s=(e=>{(0,eu.I)(process.version);let s=(0,em.I)(e),t=()=>s().then(ec.l),o={apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??e_.E,base64Encoder:e?.base64Encoder??ev.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??eJ,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??Q,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new eg.f2},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ey.m}],logger:e?.logger??new eS.N,protocol:e?.protocol??ef.Y,protocolSettings:e?.protocolSettings??{defaultNamespace:"com.amazonaws.sso",version:"2019-06-10",serviceTarget:"SWBPortalService"},serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??ew.D,utf8Decoder:e?.utf8Decoder??ej.a,utf8Encoder:e?.utf8Encoder??eP.P};(0,X.I)(process.version);let i={profile:e?.profile,logger:o.logger};return{...o,...e,runtime:"node",defaultsMode:s,authSchemePreference:e?.authSchemePreference??(0,ed.Z)(ee.$,i),bodyLengthChecker:e?.bodyLengthChecker??ep.n,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,es.pf)({serviceId:o.serviceId,clientVersion:"3.964.0"}),maxAttempts:e?.maxAttempts??(0,ed.Z)(V.qs,e),region:e?.region??(0,ed.Z)(eo.GG,{...eo.zH,...i}),requestHandler:ea.$.create(e?.requestHandler??t),retryMode:e?.retryMode??(0,ed.Z)({...V.kN,default:async()=>(await t()).retryMode||eh.L},e),sha256:e?.sha256??er.V.bind(null,"sha256"),streamCollector:e?.streamCollector??el.k,useDualstackEndpoint:e?.useDualstackEndpoint??(0,ed.Z)(ei.e$,i),useFipsEndpoint:e?.useFipsEndpoint??(0,ed.Z)(en.Ko,i),userAgentAppId:e?.userAgentAppId??(0,ed.Z)(et.hV,i)}})(e||{});super(s),this.initConfig=s;const t=(e=>Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}))(s),o=(0,T.D)(t),i=(0,V.$z)(o),n=(0,N.T)(i),r=(0,D.OV)(n),d=((e,s)=>{let t,o,i,n=Object.assign((0,eQ.R)(e),(0,e0.xA)(e),(0,eX.e)(e),(t=e.httpAuthSchemes,o=e.httpAuthSchemeProvider,i=e.credentials,{setHttpAuthScheme(e){let s=t.findIndex(s=>s.schemeId===e.schemeId);-1===s?t.push(e):t.splice(s,1,e)},httpAuthSchemes:()=>t,setHttpAuthSchemeProvider(e){o=e},httpAuthSchemeProvider:()=>o,setCredentials(e){i=e},credentials:()=>i}));return s.forEach(e=>e.configure(n)),Object.assign(e,(0,eQ.$)(n),(0,e0.uv)(n),(0,eX.j)(n),{httpAuthSchemes:n.httpAuthSchemes(),httpAuthSchemeProvider:n.httpAuthSchemeProvider(),credentials:n.credentials()})})((e=>Object.assign((0,K.h)(e),{authSchemePreference:(0,Y.t)(e.authSchemePreference??[])}))((0,G.C)(r)),e?.extensions||[]);this.config=d,this.middlewareStack.use((0,H.wq)(this.config)),this.middlewareStack.use((0,q.sM)(this.config)),this.middlewareStack.use((0,Z.ey)(this.config)),this.middlewareStack.use((0,L.vK)(this.config)),this.middlewareStack.use((0,D.TC)(this.config)),this.middlewareStack.use((0,U.Y7)(this.config)),this.middlewareStack.use((0,F.n)(this.config)),this.middlewareStack.use((0,M.w)(this.config,{httpAuthSchemeParametersProvider:J,identityProviderConfigProvider:async e=>new $.h({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,z.l)(this.config))}destroy(){super.destroy()}}}};