coze-coding-dev-sdk 0.7.9-beta.0 → 0.7.9-beta.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/dist/cjs/index.js +1 -1
  2. package/package.json +1 -1
  3. package/dist/esm/131.mjs +0 -85
  4. package/dist/esm/131.mjs.LICENSE.txt +0 -13
  5. package/dist/esm/1~113.mjs +0 -1
  6. package/dist/esm/1~134.mjs +0 -1
  7. package/dist/esm/1~23.mjs +0 -1
  8. package/dist/esm/1~300.mjs +0 -1
  9. package/dist/esm/1~35.mjs +0 -5
  10. package/dist/esm/1~390.mjs +0 -2
  11. package/dist/esm/1~398.mjs +0 -2
  12. package/dist/esm/1~410.mjs +0 -1
  13. package/dist/esm/1~45.mjs +0 -1
  14. package/dist/esm/1~461.mjs +0 -1
  15. package/dist/esm/1~462.mjs +0 -1
  16. package/dist/esm/1~489.mjs +0 -1
  17. package/dist/esm/1~518.mjs +0 -1
  18. package/dist/esm/1~622.mjs +0 -1
  19. package/dist/esm/1~666.mjs +0 -1
  20. package/dist/esm/1~815.mjs +0 -1
  21. package/dist/esm/1~844.mjs +0 -1
  22. package/dist/esm/1~967.mjs +0 -1
  23. package/dist/esm/1~976.mjs +0 -1
  24. package/dist/esm/57.mjs +0 -1
  25. package/dist/esm/cli/index.mjs +0 -28
  26. package/dist/esm/index.mjs +0 -1
  27. package/dist/esm/rslib-runtime.mjs +0 -1
  28. /package/dist/cjs/{0~134.js → 134.js} +0 -0
  29. /package/dist/cjs/{0~195.js → 195.js} +0 -0
  30. /package/dist/cjs/{0~216.js → 216.js} +0 -0
  31. /package/dist/cjs/{0~292.js → 292.js} +0 -0
  32. /package/dist/cjs/{0~329.js → 329.js} +0 -0
  33. /package/dist/cjs/{0~335.js → 335.js} +0 -0
  34. /package/dist/cjs/{0~53.js → 53.js} +0 -0
  35. /package/dist/cjs/{0~560.js → 560.js} +0 -0
  36. /package/dist/cjs/{0~634.js → 634.js} +0 -0
  37. /package/dist/cjs/{0~710.js → 710.js} +0 -0
  38. /package/dist/cjs/{0~730.js → 730.js} +0 -0
  39. /package/dist/cjs/{0~769.js → 769.js} +0 -0
  40. /package/dist/cjs/{0~864.js → 864.js} +0 -0
  41. /package/dist/cjs/{0~911.js → 911.js} +0 -0
  42. /package/dist/cjs/{0~965.js → 965.js} +0 -0
@@ -1,13 +0,0 @@
1
- /*!
2
- * mime-db
3
- * Copyright(c) 2014 Jonathan Ong
4
- * Copyright(c) 2015-2022 Douglas Christopher Wilson
5
- * MIT Licensed
6
- */
7
-
8
- /*!
9
- * mime-types
10
- * Copyright(c) 2014 Jonathan Ong
11
- * Copyright(c) 2015 Douglas Christopher Wilson
12
- * MIT Licensed
13
- */
@@ -1 +0,0 @@
1
- import{__webpack_require__ as e}from"./rslib-runtime.mjs";import{createHash as t,createPrivateKey as r,createPublicKey as n,sign as o}from"node:crypto";import{readFile_readFile as i,chain_chain as s,getProfileName as a,CredentialsProviderError as l,setCredentialFeature as c,HttpRequest as d}from"./131.mjs";import{homedir as f}from"./57.mjs";import{parseKnownFiles as g}from"./1~23.mjs";let _=e=>c(e,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p"),u=async(e,t,r,n,o={},i)=>{r.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let d=t[e],{source_profile:f,region:g}=d;if(!r.roleAssumer){let{getDefaultRoleAssumer:e}=await import("./1~410.mjs").then(e=>({getDefaultRoleAssumer:e.defaultRoleAssumers_getDefaultRoleAssumer}));r.roleAssumer=e({...r.clientConfig,credentialProviderLogger:r.logger,parentClientConfig:{...n,...r?.parentClientConfig,region:g??r?.parentClientConfig?.region??n?.region}},r.clientPlugins)}if(f&&f in o)throw new l(`Detected a cycle attempting to resolve credentials for profile ${a(r)}. Profiles visited: `+Object.keys(o).join(", "),{logger:r.logger});r.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${f?`source_profile=[${f}]`:`profile=[${e}]`}`);let u=f?i(f,t,r,n,{...o,[f]:!0},p(t[f]??{})):(await ((e,t,r)=>{let n={EcsContainer:async e=>{let{fromHttp:t}=await import("./1~35.mjs").then(e=>({fromHttp:e.fromHttp})),{fromContainerMetadata:n}=await import("./1~398.mjs").then(e=>({fromContainerMetadata:e.fromContainerMetadata}));return r?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>s(t(e??{}),n(e))().then(_)},Ec2InstanceMetadata:async e=>{r?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:t}=await import("./1~398.mjs").then(e=>({fromInstanceMetadata:e.fromInstanceMetadata}));return async()=>t(e)().then(_)},Environment:async e=>{r?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:t}=await import("./1~134.mjs").then(e=>({fromEnv:e.fromEnv_fromEnv}));return async()=>t(e)().then(_)}};if(e in n)return n[e];throw new l(`Unsupported credential source in profile ${t}. Got ${e}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:r})})(d.credential_source,e,r.logger)(r))();if(p(d))return u.then(e=>c(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"));{let t={RoleArn:d.role_arn,RoleSessionName:d.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:d.external_id,DurationSeconds:parseInt(d.duration_seconds||"3600",10)},{mfa_serial:n}=d;if(n){if(!r.mfaCodeProvider)throw new l(`Profile ${e} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:r.logger,tryNextLink:!1});t.SerialNumber=n,t.TokenCode=await r.mfaCodeProvider(n)}let o=await u;return r.roleAssumer(o,t).then(e=>c(e,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"))}},p=e=>!e.role_arn&&!!e.credential_source,h=e("node:fs"),y=e("node:path");class C{profileData;init;callerClientConfig;static REFRESH_THRESHOLD=3e5;constructor(e,t,r){this.profileData=e,this.init=t,this.callerClientConfig=r}async loadCredentials(){let e=await this.loadToken();if(!e)throw new l(`Failed to load a token for session ${this.loginSession}, please re-authenticate using aws login`,{tryNextLink:!1,logger:this.logger});let t=e.accessToken,r=Date.now();return new Date(t.expiresAt).getTime()-r<=C.REFRESH_THRESHOLD?this.refresh(e):{accessKeyId:t.accessKeyId,secretAccessKey:t.secretAccessKey,sessionToken:t.sessionToken,accountId:t.accountId,expiration:new Date(t.expiresAt)}}get logger(){return this.init?.logger}get loginSession(){return this.profileData.login_session}async refresh(e){let t,{SigninClient:r,CreateOAuth2TokenCommand:n}=await import("./1~518.mjs").then(e=>({SigninClient:e.SigninClient,CreateOAuth2TokenCommand:e.CreateOAuth2TokenCommand})),{logger:o,userAgentAppId:i}=this.callerClientConfig??{},s=(t=this.callerClientConfig?.requestHandler,t?.metadata?.handlerProtocol==="h2")?void 0:this.callerClientConfig?.requestHandler,a=new r({credentials:{accessKeyId:"",secretAccessKey:""},region:this.profileData.region??await this.callerClientConfig?.region?.()??process.env.AWS_REGION,requestHandler:s,logger:o,userAgentAppId:i,...this.init?.clientConfig});this.createDPoPInterceptor(a.middlewareStack);let c={tokenInput:{clientId:e.clientId,refreshToken:e.refreshToken,grantType:"refresh_token"}};try{let t=await a.send(new n(c)),{accessKeyId:r,secretAccessKey:o,sessionToken:i}=t.tokenOutput?.accessToken??{},{refreshToken:s,expiresIn:d}=t.tokenOutput??{};if(!r||!o||!i||!s)throw new l("Token refresh response missing required fields",{logger:this.logger,tryNextLink:!1});let f=new Date(Date.now()+(d??900)*1e3),g={...e,accessToken:{...e.accessToken,accessKeyId:r,secretAccessKey:o,sessionToken:i,expiresAt:f.toISOString()},refreshToken:s};await this.saveToken(g);let _=g.accessToken;return{accessKeyId:_.accessKeyId,secretAccessKey:_.secretAccessKey,sessionToken:_.sessionToken,accountId:_.accountId,expiration:f}}catch(e){if("AccessDeniedException"===e.name){let t;switch(e.error){case"TOKEN_EXPIRED":t="Your session has expired. Please reauthenticate.";break;case"USER_CREDENTIALS_CHANGED":t="Unable to refresh credentials because of a change in your password. Please reauthenticate with your new password.";break;case"INSUFFICIENT_PERMISSIONS":t="Unable to refresh credentials due to insufficient permissions. You may be missing permission for the 'CreateOAuth2Token' action.";break;default:t=`Failed to refresh token: ${String(e)}. Please re-authenticate using \`aws login\``}throw new l(t,{logger:this.logger,tryNextLink:!1})}throw new l(`Failed to refresh token: ${String(e)}. Please re-authenticate using aws login`,{logger:this.logger})}}async loadToken(){let e=this.getTokenFilePath();try{let t;try{t=await i(e,{ignoreCache:this.init?.ignoreCache})}catch{t=await h.promises.readFile(e,"utf8")}let r=JSON.parse(t),n=["accessToken","clientId","refreshToken","dpopKey"].filter(e=>!r[e]);if(r.accessToken?.accountId||n.push("accountId"),n.length>0)throw new l(`Token validation failed, missing fields: ${n.join(", ")}`,{logger:this.logger,tryNextLink:!1});return r}catch(t){throw new l(`Failed to load token from ${e}: ${String(t)}`,{logger:this.logger,tryNextLink:!1})}}async saveToken(e){let t=this.getTokenFilePath(),r=(0,y.dirname)(t);try{await h.promises.mkdir(r,{recursive:!0})}catch(e){}await h.promises.writeFile(t,JSON.stringify(e,null,2),"utf8")}getTokenFilePath(){let e=process.env.AWS_LOGIN_CACHE_DIRECTORY??(0,y.join)(f(),".aws","login","cache"),r=Buffer.from(this.loginSession,"utf8"),n=t("sha256").update(r).digest("hex");return(0,y.join)(e,`${n}.json`)}derToRawSignature(e){let t=2;if(2!==e[2])throw Error("Invalid DER signature");t++;let r=e[t++],n=e.subarray(t,t+r);if(2!==e[t+=r])throw Error("Invalid DER signature");t++;let o=e[t++],i=e.subarray(t,t+o);n=0===n[0]?n.subarray(1):n,i=0===i[0]?i.subarray(1):i;let s=Buffer.concat([Buffer.alloc(32-n.length),n]),a=Buffer.concat([Buffer.alloc(32-i.length),i]);return Buffer.concat([s,a])}createDPoPInterceptor(e){e.add(e=>async t=>{if(d.isInstance(t.request)){let e=t.request,r=`${e.protocol}//${e.hostname}${e.port?`:${e.port}`:""}${e.path}`,n=await this.generateDpop(e.method,r);e.headers={...e.headers,DPoP:n}}return e(t)},{step:"finalizeRequest",name:"dpopInterceptor",override:!0})}async generateDpop(e="POST",t){let i=await this.loadToken();try{let s=r({key:i.dpopKey,format:"pem",type:"sec1"}),a=n(s).export({format:"der",type:"spki"}),l=-1;for(let e=0;e<a.length;e++)if(4===a[e]){l=e;break}let c=a.slice(l+1,l+33),d=a.slice(l+33,l+65),f={alg:"ES256",typ:"dpop+jwt",jwk:{kty:"EC",crv:"P-256",x:c.toString("base64url"),y:d.toString("base64url")}},g={jti:crypto.randomUUID(),htm:e,htu:t,iat:Math.floor(Date.now()/1e3)},_=Buffer.from(JSON.stringify(f)).toString("base64url"),u=Buffer.from(JSON.stringify(g)).toString("base64url"),p=`${_}.${u}`,h=o("sha256",Buffer.from(p),s),y=this.derToRawSignature(h).toString("base64url");return`${p}.${y}`}catch(e){throw new l(`Failed to generate Dpop proof: ${e instanceof Error?e.message:String(e)}`,{logger:this.logger,tryNextLink:!1})}}}let w=async(e,t,r)=>{let n,o=await (n={...t,profile:e},async({callerClientConfig:e}={})=>{n?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");let t=await g(n||{}),r=a({profile:n?.profile??e?.profile}),o=t[r];if(!o?.login_session)throw new l(`Profile ${r} does not contain login_session.`,{tryNextLink:!0,logger:n?.logger});let i=new C(o,n,e);return c(await i.loadCredentials(),"CREDENTIALS_LOGIN","AD")})({callerClientConfig:r});return c(o,"CREDENTIALS_PROFILE_LOGIN","AC")},S=async(e,t)=>import("./1~844.mjs").then(e=>({fromProcess:e.fromProcess})).then(({fromProcess:r})=>r({...e,profile:t})().then(e=>c(e,"CREDENTIALS_PROFILE_PROCESS","v"))),m=async(e,t,r={},n)=>{let{fromSSO:o}=await import("./1~390.mjs").then(e=>({fromSSO:e.fromSSO}));return o({profile:e,logger:r.logger,parentClientConfig:r.parentClientConfig,clientConfig:r.clientConfig})({callerClientConfig:n}).then(e=>t.sso_session?c(e,"CREDENTIALS_PROFILE_SSO","r"):c(e,"CREDENTIALS_PROFILE_SSO_LEGACY","t"))},E=e=>!!e&&"object"==typeof e&&"string"==typeof e.aws_access_key_id&&"string"==typeof e.aws_secret_access_key&&["undefined","string"].indexOf(typeof e.aws_session_token)>-1&&["undefined","string"].indexOf(typeof e.aws_account_id)>-1,k=async(e,t)=>(t?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials"),c({accessKeyId:e.aws_access_key_id,secretAccessKey:e.aws_secret_access_key,sessionToken:e.aws_session_token,...e.aws_credential_scope&&{credentialScope:e.aws_credential_scope},...e.aws_account_id&&{accountId:e.aws_account_id}},"CREDENTIALS_PROFILE","n")),I=async(e,t,r)=>import("./1~622.mjs").then(e=>({fromTokenFile:e.fromTokenFile})).then(({fromTokenFile:n})=>n({webIdentityTokenFile:e.web_identity_token_file,roleArn:e.role_arn,roleSessionName:e.role_session_name,roleAssumerWithWebIdentity:t.roleAssumerWithWebIdentity,logger:t.logger,parentClientConfig:t.parentClientConfig})({callerClientConfig:r}).then(e=>c(e,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q"))),R=async(e,t,r,n,o={},i=!1)=>{let s=t[e];if(Object.keys(o).length>0&&E(s))return k(s,r);if(i||((e,{profile:t="default",logger:r}={})=>!!e&&"object"==typeof e&&"string"==typeof e.role_arn&&["undefined","string"].indexOf(typeof e.role_session_name)>-1&&["undefined","string"].indexOf(typeof e.external_id)>-1&&["undefined","string"].indexOf(typeof e.mfa_serial)>-1&&(((e,{profile:t,logger:r})=>{let n="string"==typeof e.source_profile&&void 0===e.credential_source;return n&&r?.debug?.(` ${t} isAssumeRoleWithSourceProfile source_profile=${e.source_profile}`),n})(e,{profile:t,logger:r})||((e,{profile:t,logger:r})=>{let n="string"==typeof e.credential_source&&void 0===e.source_profile;return n&&r?.debug?.(` ${t} isCredentialSourceProfile credential_source=${e.credential_source}`),n})(e,{profile:t,logger:r})))(s,{profile:e,logger:r.logger}))return u(e,t,r,n,o,R);if(E(s))return k(s,r);if(s&&"object"==typeof s&&"string"==typeof s.web_identity_token_file&&"string"==typeof s.role_arn&&["undefined","string"].indexOf(typeof s.role_session_name)>-1)return I(s,r,n);if(s&&"object"==typeof s&&"string"==typeof s.credential_process)return S(r,e);if(s&&("string"==typeof s.sso_start_url||"string"==typeof s.sso_account_id||"string"==typeof s.sso_session||"string"==typeof s.sso_region||"string"==typeof s.sso_role_name))return await m(e,s,r,n);if(s&&s.login_session)return w(e,r,n);throw new l(`Could not resolve credentials using profile: [${e}] in configuration/credentials file(s).`,{logger:r.logger})},A=(e={})=>async({callerClientConfig:t}={})=>{e.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let r=await g(e);return R(a({profile:e.profile??t?.profile}),r,e,t)};export{A as fromIni};
@@ -1 +0,0 @@
1
- import"./131.mjs";
package/dist/esm/1~23.mjs DELETED
@@ -1 +0,0 @@
1
- import{loadSharedConfigFiles as e}from"./131.mjs";let t=async t=>{let r=await e(t);return((...e)=>{let t={};for(let r of e)for(let[e,i]of Object.entries(r))void 0!==t[e]?Object.assign(t[e],i):t[e]=i;return t})(r.configFile,r.credentialsFile)};export{t as parseKnownFiles};
@@ -1 +0,0 @@
1
- import{determineTimestampFormat as e,deserializingStructIterator as t,parseEpochTimestamp as r,SerdeContextConfig as s,lazy_json_LazyJsonString as i,dateToUtcString as n,collect_stream_body_collectBody as a,parseRfc7231DateTime as o,ProtocolLib as c,UnionSerde as u,serializingStructIterator as l,TypeRegistry as h,NumericValue as f,NormalizedSchema as p,v4 as d,parseRfc3339DateTimeWithOffset as m,HttpBindingProtocol as g,dist_es_toUtf8_toUtf8 as S,HttpInterceptingShapeDeserializer as y,fromBase64 as w,toBase64 as b,HttpInterceptingShapeSerializer as _}from"./131.mjs";function x(e,t,r){if(r?.source){let e=r.source;if("number"==typeof t&&(t>Number.MAX_SAFE_INTEGER||t<Number.MIN_SAFE_INTEGER||e!==String(t)))return e.includes(".")?new f(e,"bigDecimal"):BigInt(e)}return t}class N extends s{settings;constructor(e){super(),this.settings=e}async read(e,t){let r;return this._read(e,"string"==typeof t?JSON.parse(t,x):await a(t,r=this.serdeContext).then(e=>(r?.utf8Encoder??S)(e)).then(e=>{if(e.length)try{return JSON.parse(e)}catch(t){throw t?.name==="SyntaxError"&&Object.defineProperty(t,"$responseBodyText",{value:e}),t}return{}}))}readObject(e,t){return this._read(e,t)}_read(s,n){let a=null!==n&&"object"==typeof n,c=p.of(s);if(a){if(c.isStructSchema()){let e,r=c.isUnionSchema(),s={};for(let[i,a]of(r&&(e=new u(n,s)),t(c,n,!!this.settings.jsonName&&"jsonName"))){let t=this.settings.jsonName?a.getMergedTraits().jsonName??i:i;r&&e.mark(t),null!=n[t]&&(s[i]=this._read(a,n[t]))}return r&&e.writeUnknown(),s}if(Array.isArray(n)&&c.isListSchema()){let e=c.getValueSchema(),t=[],r=!!c.getMergedTraits().sparse;for(let s of n)(r||null!=s)&&t.push(this._read(e,s));return t}if(c.isMapSchema()){let e=c.getValueSchema(),t={},r=!!c.getMergedTraits().sparse;for(let[s,i]of Object.entries(n))(r||null!=i)&&(t[s]=this._read(e,i));return t}}if(c.isBlobSchema()&&"string"==typeof n)return w(n);let l=c.getMergedTraits().mediaType;if(c.isStringSchema()&&"string"==typeof n&&l)return"application/json"===l||l.endsWith("+json")?i.from(n):n;if(c.isTimestampSchema()&&null!=n)switch(e(c,this.settings)){case 5:return m(n);case 6:return o(n);case 7:return r(n);default:return console.warn("Missing timestamp format, parsing value with Date constructor:",n),new Date(n)}if(c.isBigIntegerSchema()&&("number"==typeof n||"string"==typeof n))return BigInt(n);if(c.isBigDecimalSchema()&&void 0!=n)return n instanceof f?n:"bigDecimal"===n.type&&"string"in n?new f(n.string,n.type):new f(String(n),"bigDecimal");if(c.isNumericSchema()&&"string"==typeof n){switch(n){case"Infinity":return 1/0;case"-Infinity":return-1/0;case"NaN":return NaN}return n}if(c.isDocumentSchema())if(!a)return structuredClone(n);else{let e=Array.isArray(n)?[]:{};for(let[t,r]of Object.entries(n))r instanceof f?e[t]=r:e[t]=this._read(c,r);return e}return n}}let j=String.fromCharCode(925);class T{values=new Map;counter=0;stage=0;createReplacer(){if(1===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer already created.");if(2===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer exhausted.");return this.stage=1,(e,t)=>{if(t instanceof f){let e=`${j+"nv"+this.counter++}_`+t.string;return this.values.set(`"${e}"`,t.string),e}if("bigint"==typeof t){let e=t.toString(),r=`${j+"b"+this.counter++}_`+e;return this.values.set(`"${r}"`,e),r}return t}}replaceInJson(e){if(0===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer not created yet.");if(2===this.stage)throw Error("@aws-sdk/core/protocols - JsonReplacer exhausted.");if(this.stage=2,0===this.counter)return e;for(let[t,r]of this.values)e=e.replace(t,r);return e}}class C extends s{settings;buffer;useReplacer=!1;rootSchema;constructor(e){super(),this.settings=e}write(e,t){this.rootSchema=p.of(e),this.buffer=this._write(this.rootSchema,t)}writeDiscriminatedDocument(e,t){this.write(e,t),"object"==typeof this.buffer&&(this.buffer.__type=p.of(e).getName(!0))}flush(){let{rootSchema:e,useReplacer:t}=this;if(this.rootSchema=void 0,this.useReplacer=!1,e?.isStructSchema()||e?.isDocumentSchema()){if(!t)return JSON.stringify(this.buffer);let e=new T;return e.replaceInJson(JSON.stringify(this.buffer,e.createReplacer(),0))}return this.buffer}_write(t,r,s){let a=null!==r&&"object"==typeof r,o=p.of(t);if(a){if(o.isStructSchema()){let e={};for(let[t,s]of l(o,r)){let i=this._write(s,r[t],o);if(void 0!==i){let r=s.getMergedTraits().jsonName;e[this.settings.jsonName?r??t:t]=i}}if(o.isUnionSchema()&&0===Object.keys(e).length){let{$unknown:t}=r;if(Array.isArray(t)){let[r,s]=t;e[r]=this._write(15,s)}}return e}if(Array.isArray(r)&&o.isListSchema()){let e=o.getValueSchema(),t=[],s=!!o.getMergedTraits().sparse;for(let i of r)(s||null!=i)&&t.push(this._write(e,i));return t}if(o.isMapSchema()){let e=o.getValueSchema(),t={},s=!!o.getMergedTraits().sparse;for(let[i,n]of Object.entries(r))(s||null!=n)&&(t[i]=this._write(e,n));return t}if(r instanceof Uint8Array&&(o.isBlobSchema()||o.isDocumentSchema()))return o===this.rootSchema?r:(this.serdeContext?.base64Encoder??b)(r);if(r instanceof Date&&(o.isTimestampSchema()||o.isDocumentSchema()))switch(e(o,this.settings)){case 5:return r.toISOString().replace(".000Z","Z");case 6:return n(r);case 7:return r.getTime()/1e3;default:return console.warn("Missing timestamp format, using epoch seconds",r),r.getTime()/1e3}r instanceof f&&(this.useReplacer=!0)}if(!(null===r&&s?.isStructSchema())){if(o.isStringSchema()){if(void 0===r&&o.isIdempotencyToken())return d();let e=o.getMergedTraits().mediaType;return null!=r&&e&&("application/json"===e||e.endsWith("+json"))?i.from(r):r}if("number"==typeof r&&o.isNumericSchema())return Math.abs(r)===1/0||isNaN(r)?String(r):r;if("string"==typeof r&&o.isBlobSchema())return o===this.rootSchema?r:(this.serdeContext?.base64Encoder??b)(r);if("bigint"==typeof r&&(this.useReplacer=!0),o.isDocumentSchema())if(!a)return structuredClone(r);else{let e=Array.isArray(r)?[]:{};for(let[t,s]of Object.entries(r))s instanceof f?(this.useReplacer=!0,e[t]=s):e[t]=this._write(o,s);return e}return r}}}class M extends s{settings;constructor(e){super(),this.settings=e}createSerializer(){let e=new C(this.settings);return e.setSerdeContext(this.serdeContext),e}createDeserializer(){let e=new N(this.settings);return e.setSerdeContext(this.serdeContext),e}}class E extends g{serializer;deserializer;codec;mixin=new c;constructor({defaultNamespace:e}){super({defaultNamespace:e});let t={timestampFormat:{useTrait:!0,default:7},httpBindings:!0,jsonName:!0};this.codec=new M(t),this.serializer=new _(this.codec.createSerializer(),t),this.deserializer=new y(this.codec.createDeserializer(),t)}getShapeId(){return"aws.protocols#restJson1"}getPayloadCodec(){return this.codec}setSerdeContext(e){this.codec.setSerdeContext(e),super.setSerdeContext(e)}async serializeRequest(e,t,r){let s=await super.serializeRequest(e,t,r),i=p.of(e.input);if(!s.headers["content-type"]){let e=this.mixin.resolveRestContentType(this.getDefaultContentType(),i);e&&(s.headers["content-type"]=e)}return null==s.body&&s.headers["content-type"]===this.getDefaultContentType()&&(s.body="{}"),s}async deserializeResponse(e,t,r){let s=await super.deserializeResponse(e,t,r);for(let[t,r]of p.of(e.output).structIterator())!r.getMemberTraits().httpPayload||t in s||(s[t]=null);return s}async handleError(e,t,r,s,i){let n=((e,t)=>{let r=(e,t)=>Object.keys(e).find(e=>e.toLowerCase()===t.toLowerCase()),s=e=>{let t=e;return"number"==typeof t&&(t=t.toString()),t.indexOf(",")>=0&&(t=t.split(",")[0]),t.indexOf(":")>=0&&(t=t.split(":")[0]),t.indexOf("#")>=0&&(t=t.split("#")[1]),t},i=r(e.headers,"x-amzn-errortype");if(void 0!==i)return s(e.headers[i]);if(t&&"object"==typeof t){let e=r(t,"code");if(e&&void 0!==t[e])return s(t[e]);if(void 0!==t.__type)return s(t.__type)}})(r,s)??"Unknown",{errorSchema:a,errorMetadata:o}=await this.mixin.getErrorSchemaOrThrowBaseException(n,this.options.defaultNamespace,r,s,i),c=p.of(a),u=s.message??s.Message??"Unknown",l=new(h.for(a[1]).getErrorCtor(a)??Error)(u);await this.deserializeHttpMessage(a,t,r,s);let f={};for(let[e,t]of c.structIterator()){let r=t.getMergedTraits().jsonName??e;f[e]=this.codec.createDeserializer().readObject(t,s[r])}throw this.mixin.decorateServiceException(Object.assign(l,o,{$fault:c.getMergedTraits().error,message:u},f),s)}getDefaultContentType(){return"application/json"}}export{E as AwsRestJsonProtocol};
package/dist/esm/1~35.mjs DELETED
@@ -1,5 +0,0 @@
1
- import{NodeHttpHandler as e,parseRfc3339DateTime as t,CredentialsProviderError as r,HttpRequest as o,setCredentialFeature as n,sdk_stream_mixin_sdkStreamMixin as s}from"./131.mjs";import{promises as a}from"./1~461.mjs";async function i(e,o){let n=s(e.body),a=await n.transformToString();if(200===e.statusCode){let e=JSON.parse(a);if("string"!=typeof e.AccessKeyId||"string"!=typeof e.SecretAccessKey||"string"!=typeof e.Token||"string"!=typeof e.Expiration)throw new r("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:o});return{accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:t(e.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let t={};try{t=JSON.parse(a)}catch(e){}throw Object.assign(new r(`Server responded with status: ${e.statusCode}`,{logger:o}),{Code:t.Code,Message:t.Message})}throw new r(`Server responded with status: ${e.statusCode}`,{logger:o})}let c=(t={})=>{let s,c,l,h;t.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let d=t.awsContainerCredentialsRelativeUri??process.env.AWS_CONTAINER_CREDENTIALS_RELATIVE_URI,p=t.awsContainerCredentialsFullUri??process.env.AWS_CONTAINER_CREDENTIALS_FULL_URI,u=t.awsContainerAuthorizationToken??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN,w=t.awsContainerAuthorizationTokenFile??process.env.AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE,g=t.logger?.constructor?.name!=="NoOpLogger"&&t.logger?.warn?t.logger.warn.bind(t.logger):console.warn;if(d&&p&&(g("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),g("awsContainerCredentialsFullUri will take precedence.")),u&&w&&(g("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),g("awsContainerAuthorizationToken will take precedence.")),p)s=p;else if(d)s=`http://169.254.170.2${d}`;else throw new r(`No HTTP credential provider host provided.
2
- Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:t.logger});let A=new URL(s);((e,t)=>{if("https:"!==e.protocol&&"169.254.170.2"!==e.hostname&&"169.254.170.23"!==e.hostname&&"[fd00:ec2::23]"!==e.hostname){if(e.hostname.includes("[")){if("[::1]"===e.hostname||"[0000:0000:0000:0000:0000:0000:0000:0001]"===e.hostname)return}else{if("localhost"===e.hostname)return;let t=e.hostname.split("."),r=e=>{let t=parseInt(e,10);return 0<=t&&t<=255};if("127"===t[0]&&r(t[1])&&r(t[2])&&r(t[3])&&4===t.length)return}throw new r(`URL not accepted. It must either be HTTPS or match one of the following:
3
- - loopback CIDR 127.0.0.0/8 or [::1/128]
4
- - ECS container host 169.254.170.2
5
- - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:t})}})(A,t.logger);let T=e.create({requestTimeout:t.timeout??1e3,connectionTimeout:t.timeout??1e3});return c=async()=>{let e=new o({protocol:A.protocol,hostname:A.hostname,port:Number(A.port),path:A.pathname,query:Array.from(A.searchParams.entries()).reduce((e,[t,r])=>(e[t]=r,e),{}),fragment:A.hash});u?e.headers.Authorization=u:w&&(e.headers.Authorization=(await a.readFile(w)).toString());try{let t=await T.handle(e);return i(t.response).then(e=>n(e,"CREDENTIALS_HTTP","z"))}catch(e){throw new r(String(e),{logger:t.logger})}},l=t.maxRetries??3,h=t.timeout??1e3,async()=>{for(let e=0;e<l;++e)try{return await c()}catch(e){await new Promise(e=>setTimeout(e,h))}return await c()}};export{c as fromHttp};
@@ -1,2 +0,0 @@
1
- import{__webpack_require__ as e}from"./rslib-runtime.mjs";import{profile_IniSectionType as t,getProfileName as o,CredentialsProviderError as r,setCredentialFeature as i,readFile_readFile as n,getConfigFilepath as s,ProviderError as a,parseIni as l}from"./131.mjs";import{getSSOTokenFilepath as g,getSSOTokenFromFile as c}from"./1~462.mjs";import{parseKnownFiles as f}from"./1~23.mjs";let p=e=>Object.entries(e).filter(([e])=>e.startsWith(t.SSO_SESSION+".")).reduce((e,[t,o])=>({...e,[t.substring(t.indexOf(".")+1)]:o}),{}),w=()=>({}),h=async(e={})=>n(e.configFilepath??s()).then(l).then(p).catch(w);class _ extends a{name="TokenProviderError";constructor(e,t=!0){super(e,t),Object.setPrototypeOf(this,_.prototype)}}let S="To refresh this SSO session run 'aws sso login' with the corresponding profile.",d=async(e,t={},o)=>{let{SSOOIDCClient:r}=await import("./1~45.mjs").then(e=>({SSOOIDCClient:e.SSOOIDCClient})),i=e=>t.clientConfig?.[e]??t.parentClientConfig?.[e]??o?.[e];return new r(Object.assign({},t.clientConfig??{},{region:e??t.clientConfig?.region,logger:i("logger"),userAgentAppId:i("userAgentAppId")}))},C=async(e,t,o={},r)=>{let{CreateTokenCommand:i}=await import("./1~45.mjs").then(e=>({CreateTokenCommand:e.CreateTokenCommand}));return(await d(t,o,r)).send(new i({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))},u=e=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new _(`Token is expired. ${S}`,!1)},m=(e,t,o=!1)=>{if(void 0===t)throw new _(`Value not present for '${e}' in SSO Token${o?". Cannot refresh":""}. ${S}`,!1)},{writeFile:k}=e("fs").promises,y=new Date(0),O=async({ssoStartUrl:e,ssoSession:t,ssoAccountId:n,ssoRegion:s,ssoRoleName:a,ssoClient:l,clientConfig:p,parentClientConfig:w,callerClientConfig:d,profile:O,filepath:T,configFilepath:x,ignoreCache:A,logger:I})=>{let N,$,R="To refresh this SSO session run aws sso login with the corresponding profile.";if(t)try{let e=await ((e={})=>async({callerClientConfig:t}={})=>{let r;e.logger?.debug("@aws-sdk/token-providers - fromSso");let i=await f(e),n=o({profile:e.profile??t?.profile}),s=i[n];if(s){if(!s.sso_session)throw new _(`Profile '${n}' is missing required property 'sso_session'.`)}else throw new _(`Profile '${n}' could not be found in shared credentials file.`,!1);let a=s.sso_session,l=(await h(e))[a];if(!l)throw new _(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let e of["sso_start_url","sso_region"])if(!l[e])throw new _(`Sso session '${a}' is missing required property '${e}'.`,!1);l.sso_start_url;let p=l.sso_region;try{r=await c(a)}catch(e){throw new _(`The SSO session token associated with profile=${n} was not found or is invalid. ${S}`,!1)}m("accessToken",r.accessToken),m("expiresAt",r.expiresAt);let{accessToken:w,expiresAt:d}=r,O={token:w,expiration:new Date(d)};if(O.expiration.getTime()-Date.now()>3e5)return O;if(Date.now()-y.getTime()<3e4)return u(O),O;m("clientId",r.clientId,!0),m("clientSecret",r.clientSecret,!0),m("refreshToken",r.refreshToken,!0);try{y.setTime(Date.now());let o=await C(r,p,e,t);m("accessToken",o.accessToken),m("expiresIn",o.expiresIn);let i=new Date(Date.now()+1e3*o.expiresIn);try{var T;let e;await (T={...r,accessToken:o.accessToken,expiresAt:i.toISOString(),refreshToken:o.refreshToken},e=g(a),k(e,JSON.stringify(T,null,2)))}catch(e){}return{token:o.accessToken,expiration:i}}catch(e){return u(O),O}})({profile:O,filepath:T,configFilepath:x,ignoreCache:A})();N={accessToken:e.token,expiresAt:new Date(e.expiration).toISOString()}}catch(e){throw new r(e.message,{tryNextLink:!1,logger:I})}else try{N=await c(e)}catch(e){throw new r(`The SSO session associated with this profile is invalid. ${R}`,{tryNextLink:!1,logger:I})}if(new Date(N.expiresAt).getTime()-Date.now()<=0)throw new r(`The SSO session associated with this profile has expired. ${R}`,{tryNextLink:!1,logger:I});let{accessToken:D}=N,{SSOClient:E,GetRoleCredentialsCommand:K}=await import("./1~967.mjs").then(e=>({SSOClient:e.SSOClient,GetRoleCredentialsCommand:e.GetRoleCredentialsCommand})),P=l||new E(Object.assign({},p??{},{logger:p?.logger??d?.logger??w?.logger,region:p?.region??s,userAgentAppId:p?.userAgentAppId??d?.userAgentAppId??w?.userAgentAppId}));try{$=await P.send(new K({accountId:n,roleName:a,accessToken:D}))}catch(e){throw new r(e,{tryNextLink:!1,logger:I})}let{roleCredentials:{accessKeyId:L,secretAccessKey:b,sessionToken:v,expiration:U,credentialScope:H,accountId:M}={}}=$;if(!L||!b||!v||!U)throw new r("SSO returns an invalid temporary credential.",{tryNextLink:!1,logger:I});let j={accessKeyId:L,secretAccessKey:b,sessionToken:v,expiration:new Date(U),...H&&{credentialScope:H},...M&&{accountId:M}};return t?i(j,"CREDENTIALS_SSO","s"):i(j,"CREDENTIALS_SSO_LEGACY","u"),j},T=(e={})=>async({callerClientConfig:t}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:i,ssoAccountId:n,ssoRegion:s,ssoRoleName:a,ssoSession:l}=e,{ssoClient:g}=e,c=o({profile:e.profile??t?.profile});if(i||n||s||a||l)if(i&&n&&s&&a)return O({ssoStartUrl:i,ssoSession:l,ssoAccountId:n,ssoRegion:s,ssoRoleName:a,ssoClient:g,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:c,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger});else throw new r('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});{let t=(await f(e))[c];if(!t)throw new r(`Profile ${c} was not found.`,{logger:e.logger});if(!(t&&("string"==typeof t.sso_start_url||"string"==typeof t.sso_account_id||"string"==typeof t.sso_session||"string"==typeof t.sso_region||"string"==typeof t.sso_role_name)))throw new r(`Profile ${c} is not configured with SSO credentials.`,{logger:e.logger});if(t?.sso_session){let o=(await h(e))[t.sso_session],n=` configurations in profile ${c} and sso-session ${t.sso_session}`;if(s&&s!==o.sso_region)throw new r("Conflicting SSO region"+n,{tryNextLink:!1,logger:e.logger});if(i&&i!==o.sso_start_url)throw new r("Conflicting SSO start_url"+n,{tryNextLink:!1,logger:e.logger});t.sso_region=o.sso_region,t.sso_start_url=o.sso_start_url}let{sso_start_url:o,sso_account_id:n,sso_region:a,sso_role_name:l,sso_session:p}=((e,t)=>{let{sso_start_url:o,sso_account_id:i,sso_region:n,sso_role_name:s}=e;if(!o||!i||!n||!s)throw new r(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
2
- Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:t});return e})(t,e.logger);return O({ssoStartUrl:o,ssoSession:p,ssoAccountId:n,ssoRegion:a,ssoRoleName:l,ssoClient:g,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,callerClientConfig:e.callerClientConfig,profile:c,filepath:e.filepath,configFilepath:e.configFilepath,ignoreCache:e.ignoreCache,logger:e.logger})}};export{T as fromSSO};
@@ -1,2 +0,0 @@
1
- var e,t,a,r;import{__webpack_require__ as n}from"./rslib-runtime.mjs";import{loadConfig as o,dist_es_parseUrl as i,external_buffer_Buffer as s,ProviderError as c,CredentialsProviderError as l}from"./131.mjs";let d=n("http");function p(e){return new Promise((t,a)=>{let r=(0,d.request)({method:"GET",...e,hostname:e.hostname?.replace(/^\[(.+)\]$/,"$1")});r.on("error",e=>{a(Object.assign(new c("Unable to connect to instance metadata service"),e)),r.destroy()}),r.on("timeout",()=>{a(new c("TimeoutError from instance metadata service")),r.destroy()}),r.on("response",e=>{let{statusCode:n=400}=e;(n<200||300<=n)&&(a(Object.assign(new c("Error response received from instance metadata service"),{statusCode:n})),r.destroy());let o=[];e.on("data",e=>{o.push(e)}),e.on("end",()=>{t(s.concat(o)),r.destroy()})}),r.end()})}let u=e=>!!e&&"object"==typeof e&&"string"==typeof e.AccessKeyId&&"string"==typeof e.SecretAccessKey&&"string"==typeof e.Token&&"string"==typeof e.Expiration,h=e=>({accessKeyId:e.AccessKeyId,secretAccessKey:e.SecretAccessKey,sessionToken:e.Token,expiration:new Date(e.Expiration),...e.AccountId&&{accountId:e.AccountId}}),m=1e3,f=0,v=({maxRetries:e=f,timeout:t=m})=>({maxRetries:e,timeout:t}),g=(e,t)=>{let a=e();for(let r=0;r<t;r++)a=a.catch(e);return a},w=n("url"),_="AWS_CONTAINER_CREDENTIALS_FULL_URI",y="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",I="AWS_CONTAINER_AUTHORIZATION_TOKEN",E=(e={})=>{let{timeout:t,maxRetries:a}=v(e);return()=>g(async()=>{let a=await T({logger:e.logger}),r=JSON.parse(await A(t,a));if(!u(r))throw new l("Invalid response received from instance metadata service.",{logger:e.logger});return h(r)},a)},A=async(e,t)=>(process.env[I]&&(t.headers={...t.headers,Authorization:process.env[I]}),(await p({...t,timeout:e})).toString()),S={localhost:!0,"127.0.0.1":!0},b={"http:":!0,"https:":!0},T=async({logger:e})=>{if(process.env[y])return{hostname:"169.254.170.2",path:process.env[y]};if(process.env[_]){let t=(0,w.parse)(process.env[_]);if(!t.hostname||!(t.hostname in S))throw new l(`${t.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:e});if(!t.protocol||!(t.protocol in b))throw new l(`${t.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:e});return{...t,port:t.port?parseInt(t.port,10):void 0}}throw new l(`The container metadata credential provider cannot be used unless the ${y} or ${_} environment variable is set`,{tryNextLink:!1,logger:e})};class N extends l{tryNextLink;name="InstanceMetadataV1FallbackError";constructor(e,t=!0){super(e,t),this.tryNextLink=t,Object.setPrototypeOf(this,N.prototype)}}(a=e||(e={})).IPv4="http://169.254.169.254",a.IPv6="http://[fd00:ec2::254]";let C={environmentVariableSelector:e=>e.AWS_EC2_METADATA_SERVICE_ENDPOINT,configFileSelector:e=>e.ec2_metadata_service_endpoint,default:void 0};(r=t||(t={})).IPv4="IPv4",r.IPv6="IPv6";let D={environmentVariableSelector:e=>e.AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE,configFileSelector:e=>e.ec2_metadata_service_endpoint_mode,default:t.IPv4},M=async()=>i(await k()||await x()),k=async()=>o(C)(),x=async()=>{let a=await o(D)();switch(a){case t.IPv4:return e.IPv4;case t.IPv6:return e.IPv6;default:throw Error(`Unsupported endpoint mode: ${a}. Select from ${Object.values(t)}`)}},P=(e,t)=>{let a=300+Math.floor(300*Math.random()),r=new Date(Date.now()+1e3*a);t.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(r)}.
2
- For more information, please visit: https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html`);let n=e.originalExpiration??e.expiration;return{...e,...n?{originalExpiration:n}:{},expiration:r}},O="/latest/meta-data/iam/security-credentials/",R="AWS_EC2_METADATA_V1_DISABLED",K="ec2_metadata_v1_disabled",L="x-aws-ec2-metadata-token",V=(e={})=>((e,t={})=>{let a,r=t?.logger||console;return async()=>{let t;try{(t=await e()).expiration&&t.expiration.getTime()<Date.now()&&(t=P(t,r))}catch(e){if(a)r.warn("Credential renew failed: ",e),t=P(a,r);else throw e}return a=t,t}})($(e),{logger:e.logger}),$=(e={})=>{let t=!1,{logger:a,profile:r}=e,{timeout:n,maxRetries:i}=v(e),s=async(a,n)=>{if(t||n.headers?.[L]==null){let t=!1,a=!1,n=await o({environmentVariableSelector:t=>{let r=t[R];if(a=!!r&&"false"!==r,void 0===r)throw new l(`${R} not set in env, checking config file next.`,{logger:e.logger});return a},configFileSelector:e=>{let a=e[K];return t=!!a&&"false"!==a},default:!1},{profile:r})();if(e.ec2MetadataV1Disabled||n){let r=[];throw e.ec2MetadataV1Disabled&&r.push("credential provider initialization (runtime option ec2MetadataV1Disabled)"),t&&r.push(`config file profile (${K})`),a&&r.push(`process environment variable (${R})`),new N(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${r.join(", ")}].`)}}let i=(await g(async()=>{let e;try{e=await W(n)}catch(e){throw 401===e.statusCode&&(t=!1),e}return e},a)).trim();return g(async()=>{let a;try{a=await j(i,n,e)}catch(e){throw 401===e.statusCode&&(t=!1),e}return a},a)};return async()=>{let e=await M();if(t)return a?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),s(i,{...e,timeout:n});{let r;try{r=(await U({...e,timeout:n})).toString()}catch(r){if(r?.statusCode===400)throw Object.assign(r,{message:"EC2 Metadata token request returned error"});return("TimeoutError"===r.message||[403,404,405].includes(r.statusCode))&&(t=!0),a?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),s(i,{...e,timeout:n})}return s(i,{...e,headers:{[L]:r},timeout:n})}}},U=async e=>p({...e,path:"/latest/api/token",method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),W=async e=>(await p({...e,path:O})).toString(),j=async(e,t,a)=>{let r=JSON.parse((await p({...t,path:O+e})).toString());if(!u(r))throw new l("Invalid response received from instance metadata service.",{logger:a.logger});return h(r)};export{_ as ENV_CMDS_FULL_URI,y as ENV_CMDS_RELATIVE_URI,E as fromContainerMetadata,V as fromInstanceMetadata,M as getInstanceMetadataEndpoint,p as httpRequest};
@@ -1 +0,0 @@
1
- import{NODE_RETRY_MODE_CONFIG_OPTIONS as e,resolveEndpointConfig as t,normalizeProvider as i,HttpRequest as r,resolveEndpoint as s,getSchemaSerdePlugin as n,getHttpSigningPlugin as o,getHttpHandlerExtensionConfiguration as a,XmlShapeDeserializer as l,resolveDefaultsModeConfig as c,resolveDefaultRuntimeConfig as d,serializingStructIterator as u,DefaultIdentityProviderConfig as p,command_Command as h,ServiceException as f,NodeHttpHandler as m,fromUtf8_fromUtf8 as g,Client as y,AwsSdkSigV4Signer as S,setCredentialFeature as E,determineTimestampFormat as w,NODE_MAX_ATTEMPT_CONFIG_OPTIONS as b,getAwsRegionExtensionConfiguration as P,SerdeContextConfig as v,dateToUtcString as A,getHttpAuthSchemeEndpointRuleSetPlugin as x,customEndpointFunctions as I,TypeRegistry as C,calculateBodyLength as R,NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS as T,dist_es_toUtf8_toUtf8 as k,getContentLengthPlugin as D,createDefaultUserAgentProvider as $,resolveRetryConfig as K,DEFAULT_RETRY_MODE as O,Hash as z,dist_es_parseUrl as M,NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS as N,getEndpointPlugin as _,resolveAwsRegionExtensionConfiguration as W,getSmithyContext as j,resolveUserAgentConfig as U,getUserAgentPlugin as L,resolveHostHeaderConfig as V,EndpointCache as F,collect_stream_body_collectBody as q,deref as H,loadConfigsForDefaultMode as Q,emitWarningIfUnsupportedVersion as B,NODE_AUTH_SCHEME_PREFERENCE_OPTIONS as G,getLoggerPlugin as Z,awsEndpointFunctions as J,NumericValue as X,NormalizedSchema as Y,v4 as ee,getHostHeaderPlugin as et,getDefaultExtensionConfiguration as ei,NODE_REGION_CONFIG_FILE_OPTIONS as er,toBase64 as es,fromBase64 as en,NODE_APP_ID_CONFIG_OPTIONS as eo,loadConfig as ea,getRecursionDetectionPlugin as el,emitWarningIfUnsupportedVersion_emitWarningIfUnsupportedVersion as ec,NoOpLogger as ed,resolveAwsSdkSigV4Config as eu,ProtocolLib as ep,streamCollector as eh,resolveRegionConfig as ef,HttpProtocol as em,resolveHttpHandlerRuntimeConfig as eg,NODE_REGION_CONFIG_OPTIONS as ey,extendedEncodeURIComponent as eS,getRetryPlugin as eE}from"./131.mjs";import{NoAuthSigner as ew}from"./1~489.mjs";import{package_namespaceObject as eb}from"./1~976.mjs";let eP=!1,ev={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};class eA extends f{constructor(e){super(e),Object.setPrototypeOf(this,eA.prototype)}}class ex extends eA{name="ExpiredTokenException";$fault="client";constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,ex.prototype)}}class eI extends eA{name="MalformedPolicyDocumentException";$fault="client";constructor(e){super({name:"MalformedPolicyDocumentException",$fault:"client",...e}),Object.setPrototypeOf(this,eI.prototype)}}class eC extends eA{name="PackedPolicyTooLargeException";$fault="client";constructor(e){super({name:"PackedPolicyTooLargeException",$fault:"client",...e}),Object.setPrototypeOf(this,eC.prototype)}}class eR extends eA{name="RegionDisabledException";$fault="client";constructor(e){super({name:"RegionDisabledException",$fault:"client",...e}),Object.setPrototypeOf(this,eR.prototype)}}class eT extends eA{name="IDPRejectedClaimException";$fault="client";constructor(e){super({name:"IDPRejectedClaimException",$fault:"client",...e}),Object.setPrototypeOf(this,eT.prototype)}}class ek extends eA{name="InvalidIdentityTokenException";$fault="client";constructor(e){super({name:"InvalidIdentityTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,ek.prototype)}}class eD extends eA{name="IDPCommunicationErrorException";$fault="client";constructor(e){super({name:"IDPCommunicationErrorException",$fault:"client",...e}),Object.setPrototypeOf(this,eD.prototype)}}let e$="AssumedRoleUser",eK="Credentials",eO="DurationSeconds",ez="Policy",eM="PolicyArns",eN="PackedPolicySize",e_="RoleArn",eW="RoleSessionName",ej="SourceIdentity",eU="awsQueryError",eL="client",eV="error",eF="httpError",eq="message",eH="smithy.ts.sdk.synthetic.com.amazonaws.sts",eQ="com.amazonaws.sts";var eB=[0,eQ,"accessKeySecretType",8,0],eG=[0,eQ,"clientTokenType",8,0],eZ=[3,eQ,e$,0,["AssumedRoleId","Arn"],[0,0]],eJ=[3,eQ,"AssumeRoleRequest",0,[e_,eW,eM,ez,eO,"Tags","TransitiveTagKeys","ExternalId","SerialNumber","TokenCode",ej,"ProvidedContexts"],[0,0,()=>tr,0,1,()=>tn,64,0,0,0,0,()=>ts]],eX=[3,eQ,"AssumeRoleResponse",0,[eK,e$,eN,ej],[[()=>e1,0],()=>eZ,1,0]],eY=[3,eQ,"AssumeRoleWithWebIdentityRequest",0,[e_,eW,"WebIdentityToken","ProviderId",eM,ez,eO],[0,0,[()=>eG,0],0,()=>tr,0,1]],e0=[3,eQ,"AssumeRoleWithWebIdentityResponse",0,[eK,"SubjectFromWebIdentityToken",e$,eN,"Provider","Audience",ej],[[()=>e1,0],0,()=>eZ,1,0,0,0]],e1=[3,eQ,eK,0,["AccessKeyId","SecretAccessKey","SessionToken","Expiration"],[0,[()=>eB,0],0,4]],e4=[-3,eQ,"ExpiredTokenException",{[eU]:["ExpiredTokenException",400],[eV]:eL,[eF]:400},[eq],[0]];C.for(eQ).registerError(e4,ex);var e3=[-3,eQ,"IDPCommunicationErrorException",{[eU]:["IDPCommunicationError",400],[eV]:eL,[eF]:400},[eq],[0]];C.for(eQ).registerError(e3,eD);var e6=[-3,eQ,"IDPRejectedClaimException",{[eU]:["IDPRejectedClaim",403],[eV]:eL,[eF]:403},[eq],[0]];C.for(eQ).registerError(e6,eT);var e2=[-3,eQ,"InvalidIdentityTokenException",{[eU]:["InvalidIdentityToken",400],[eV]:eL,[eF]:400},[eq],[0]];C.for(eQ).registerError(e2,ek);var e5=[-3,eQ,"MalformedPolicyDocumentException",{[eU]:["MalformedPolicyDocument",400],[eV]:eL,[eF]:400},[eq],[0]];C.for(eQ).registerError(e5,eI);var e8=[-3,eQ,"PackedPolicyTooLargeException",{[eU]:["PackedPolicyTooLarge",400],[eV]:eL,[eF]:400},[eq],[0]];C.for(eQ).registerError(e8,eC);var e9=[3,eQ,"PolicyDescriptorType",0,["arn"],[0]],e7=[3,eQ,"ProvidedContext",0,["ProviderArn","ContextAssertion"],[0,0]],te=[-3,eQ,"RegionDisabledException",{[eU]:["RegionDisabledException",403],[eV]:eL,[eF]:403},[eq],[0]];C.for(eQ).registerError(te,eR);var tt=[3,eQ,"Tag",0,["Key","Value"],[0,0]],ti=[-3,eH,"STSServiceException",0,[],[]];C.for(eH).registerError(ti,eA);var tr=[1,eQ,"policyDescriptorListType",0,()=>e9],ts=[1,eQ,"ProvidedContextsListType",0,()=>e7],tn=[1,eQ,"tagListType",0,()=>tt],to=[9,eQ,"AssumeRole",0,()=>eJ,()=>eX],ta=[9,eQ,"AssumeRoleWithWebIdentity",0,()=>eY,()=>e0];class tl extends h.classBuilder().ep(ev).m(function(e,t,i,r){return[_(i,e.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").sc(to).build(){}class tc extends h.classBuilder().ep(ev).m(function(e,t,i,r){return[_(i,e.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").sc(ta).build(){}let td=e=>{if("string"==typeof e?.Arn){let t=e.Arn.split(":");if(t.length>4&&""!==t[4])return t[4]}},tu=async(e,t,i,r={})=>{let s="function"==typeof e?await e():e,n="function"==typeof t?await t():t,o="",a=s??n??(o=await (function(e={}){return ea({...ey,default:async()=>(eP||console.warn("@aws-sdk - WARN - default STS region of us-east-1 used. See @aws-sdk/credential-providers README and set a region explicitly."),"us-east-1")},{...er,...e})})(r)());return i?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${s} (credential provider clientConfig)`,`${n} (contextual client)`,`${o} (STS default: AWS_REGION, profile region, or us-east-1)`),a},tp=e=>e?.metadata?.handlerProtocol==="h2",th=async(e,t,r)=>({operation:j(t).operation,region:await i(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),tf=e=>{let t=[];if("AssumeRoleWithWebIdentity"===e.operation)t.push({schemeId:"smithy.api#noAuth"});else t.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})});return t};class tm extends em{async serializeRequest(e,t,i){let s,n=this.serializer,o={},a={},l=await i.endpoint(),c=Y.of(e?.input),d=c.getSchema(),u=new r({protocol:"",hostname:"",port:void 0,path:"/",fragment:void 0,query:o,headers:a,body:void 0});l&&(this.updateServiceEndpoint(u,l),this.setHostPrefix(u,e,t));let p={...t};if(t){let e=c.getEventStreamMember();if(e){if(p[e]){let t={};for(let[i,r]of c.structIterator())i!==e&&p[i]&&(n.write(r,p[i]),t[i]=n.flush());s=await this.serializeEventStream({eventStream:p[e],requestSchema:c,initialRequest:t})}}else n.write(d,p),s=n.flush()}return u.headers=a,u.query=o,u.body=s,u.method="POST",u}async deserializeResponse(e,t,i){let r=this.deserializer,s=Y.of(e.output),n={};if(i.statusCode>=300){let s=await q(i.body,t);throw s.byteLength>0&&Object.assign(n,await r.read(15,s)),await this.handleError(e,t,i,n,this.deserializeMetadata(i)),Error("@smithy/core/protocols - RPC Protocol error handler failed to throw.")}for(let e in i.headers){let t=i.headers[e];delete i.headers[e],i.headers[e.toLowerCase()]=t}let o=s.getEventStreamMember();if(o)n[o]=await this.deserializeEventStream({response:i,responseSchema:s,initialResponseContainer:n});else{let e=await q(i.body,t);e.byteLength>0&&Object.assign(n,await r.read(s,e))}return n.$metadata=this.deserializeMetadata(i),n}}class tg extends v{settings;buffer;constructor(e){super(),this.settings=e}write(e,t,i=""){void 0===this.buffer&&(this.buffer="");let r=Y.of(e);if(i&&!i.endsWith(".")&&(i+="."),r.isBlobSchema())("string"==typeof t||t instanceof Uint8Array)&&(this.writeKey(i),this.writeValue((this.serdeContext?.base64Encoder??es)(t)));else if(r.isBooleanSchema()||r.isNumericSchema()||r.isStringSchema())null!=t?(this.writeKey(i),this.writeValue(String(t))):r.isIdempotencyToken()&&(this.writeKey(i),this.writeValue(ee()));else if(r.isBigIntegerSchema())null!=t&&(this.writeKey(i),this.writeValue(String(t)));else if(r.isBigDecimalSchema())null!=t&&(this.writeKey(i),this.writeValue(t instanceof X?t.string:String(t)));else if(r.isTimestampSchema()){if(t instanceof Date)switch(this.writeKey(i),w(r,this.settings)){case 5:this.writeValue(t.toISOString().replace(".000Z","Z"));break;case 6:this.writeValue(A(t));break;case 7:this.writeValue(String(t.getTime()/1e3))}}else if(r.isDocumentSchema())Array.isArray(t)?this.write(79,t,i):t instanceof Date?this.write(4,t,i):t instanceof Uint8Array?this.write(21,t,i):t&&"object"==typeof t?this.write(143,t,i):(this.writeKey(i),this.writeValue(String(t)));else if(r.isListSchema()){if(Array.isArray(t))if(0===t.length)this.settings.serializeEmptyLists&&(this.writeKey(i),this.writeValue(""));else{let e=r.getValueSchema(),s=this.settings.flattenLists||r.getMergedTraits().xmlFlattened,n=1;for(let r of t){if(null==r)continue;let t=this.getKey("member",e.getMergedTraits().xmlName),o=s?`${i}${n}`:`${i}${t}.${n}`;this.write(e,r,o),++n}}}else if(r.isMapSchema()){if(t&&"object"==typeof t){let e=r.getKeySchema(),s=r.getValueSchema(),n=r.getMergedTraits().xmlFlattened,o=1;for(let[r,a]of Object.entries(t)){if(null==a)continue;let t=this.getKey("key",e.getMergedTraits().xmlName),l=n?`${i}${o}.${t}`:`${i}entry.${o}.${t}`,c=this.getKey("value",s.getMergedTraits().xmlName),d=n?`${i}${o}.${c}`:`${i}entry.${o}.${c}`;this.write(e,r,l),this.write(s,a,d),++o}}}else if(r.isStructSchema()){if(t&&"object"==typeof t){let e=!1;for(let[s,n]of u(r,t)){if(null==t[s]&&!n.isIdempotencyToken())continue;let r=this.getKey(s,n.getMergedTraits().xmlName),o=`${i}${r}`;this.write(n,t[s],o),e=!0}if(!e&&r.isUnionSchema()){let{$unknown:e}=t;if(Array.isArray(e)){let[t,r]=e,s=`${i}${t}`;this.write(15,r,s)}}}}else if(r.isUnitSchema());else throw Error(`@aws-sdk/core/protocols - QuerySerializer unrecognized schema type ${r.getName(!0)}`)}flush(){if(void 0===this.buffer)throw Error("@aws-sdk/core/protocols - QuerySerializer cannot flush with nothing written to buffer.");let e=this.buffer;return delete this.buffer,e}getKey(e,t){let i=t??e;return this.settings.capitalizeKeys?i[0].toUpperCase()+i.slice(1):i}writeKey(e){e.endsWith(".")&&(e=e.slice(0,e.length-1)),this.buffer+=`&${eS(e)}=`}writeValue(e){this.buffer+=eS(e)}}class ty extends tm{options;serializer;deserializer;mixin=new ep;constructor(e){super({defaultNamespace:e.defaultNamespace}),this.options=e;let t={timestampFormat:{useTrait:!0,default:5},httpBindings:!1,xmlNamespace:e.xmlNamespace,serviceNamespace:e.defaultNamespace,serializeEmptyLists:!0};this.serializer=new tg(t),this.deserializer=new l(t)}getShapeId(){return"aws.protocols#awsQuery"}setSerdeContext(e){this.serializer.setSerdeContext(e),this.deserializer.setSerdeContext(e)}getPayloadCodec(){throw Error("AWSQuery protocol has no payload codec.")}async serializeRequest(e,t,i){let r=await super.serializeRequest(e,t,i);r.path.endsWith("/")||(r.path+="/"),Object.assign(r.headers,{"content-type":"application/x-www-form-urlencoded"}),"unit"!==H(e.input)&&r.body||(r.body="");let s=e.name.split("#")[1]??e.name;return r.body=`Action=${s}&Version=${this.options.version}`+r.body,r.body.endsWith("&")&&(r.body=r.body.slice(-1)),r}async deserializeResponse(e,t,i){let r=this.deserializer,s=Y.of(e.output),n={};if(i.statusCode>=300){let s=await q(i.body,t);s.byteLength>0&&Object.assign(n,await r.read(15,s)),await this.handleError(e,t,i,n,this.deserializeMetadata(i))}for(let e in i.headers){let t=i.headers[e];delete i.headers[e],i.headers[e.toLowerCase()]=t}let o=e.name.split("#")[1]??e.name,a=s.isStructSchema()&&this.useNestedResult()?o+"Result":void 0,l=await q(i.body,t);return l.byteLength>0&&Object.assign(n,await r.read(s,l,a)),{$metadata:this.deserializeMetadata(i),...n}}useNestedResult(){return!0}async handleError(e,t,i,r,s){let n=this.loadQueryErrorCode(i,r)??"Unknown",o=this.loadQueryError(r),a=this.loadQueryErrorMessage(r);o.message=a,o.Error={Type:o.Type,Code:o.Code,Message:a};let{errorSchema:l,errorMetadata:c}=await this.mixin.getErrorSchemaOrThrowBaseException(n,this.options.defaultNamespace,i,o,s,this.mixin.findQueryCompatibleError),d=Y.of(l),u=new(C.for(l[1]).getErrorCtor(l)??Error)(a),p={Type:o.Error.Type,Code:o.Error.Code,Error:o.Error};for(let[e,t]of d.structIterator()){let i=t.getMergedTraits().xmlName??e,s=o[i]??r[i];p[e]=this.deserializer.readSchema(t,s)}throw this.mixin.decorateServiceException(Object.assign(u,c,{$fault:d.getMergedTraits().error,message:a},p),r)}loadQueryErrorCode(e,t){let i=(t.Errors?.[0]?.Error??t.Errors?.Error??t.Error)?.Code;return void 0!==i?i:404==e.statusCode?"NotFound":void 0}loadQueryError(e){return e.Errors?.[0]?.Error??e.Errors?.Error??e.Error}loadQueryErrorMessage(e){let t=this.loadQueryError(e);return t?.message??t?.Message??e.message??e.Message??"Unknown"}getDefaultContentType(){return"application/x-www-form-urlencoded"}}let tS="required",tE="type",tw="argv",tb="booleanEquals",tP="stringEquals",tv="sigv4",tA="us-east-1",tx="endpoint",tI="https://sts.{Region}.{PartitionResult#dnsSuffix}",tC="tree",tR="error",tT="getAttr",tk={[tS]:!1,[tE]:"string"},tD={[tS]:!0,default:!1,[tE]:"boolean"},t$={ref:"Endpoint"},tK={fn:"isSet",[tw]:[{ref:"Region"}]},tO={ref:"Region"},tz={fn:"aws.partition",[tw]:[tO],assign:"PartitionResult"},tM={ref:"UseFIPS"},tN={ref:"UseDualStack"},t_={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:tv,signingName:"sts",signingRegion:tA}]},headers:{}},tW={},tj={conditions:[{fn:tP,[tw]:[tO,"aws-global"]}],[tx]:t_,[tE]:tx},tU={fn:tb,[tw]:[tM,!0]},tL={fn:tb,[tw]:[tN,!0]},tV={fn:tT,[tw]:[{ref:"PartitionResult"},"supportsFIPS"]},tF={ref:"PartitionResult"},tq={fn:tb,[tw]:[!0,{fn:tT,[tw]:[tF,"supportsDualStack"]}]},tH=[{fn:"isSet",[tw]:[t$]}],tQ=[tU],tB=[tL],tG={version:"1.0",parameters:{Region:tk,UseDualStack:tD,UseFIPS:tD,Endpoint:tk,UseGlobalEndpoint:tD},rules:[{conditions:[{fn:tb,[tw]:[{ref:"UseGlobalEndpoint"},!0]},{fn:"not",[tw]:tH},tK,tz,{fn:tb,[tw]:[tM,!1]},{fn:tb,[tw]:[tN,!1]}],rules:[{conditions:[{fn:tP,[tw]:[tO,"ap-northeast-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"ap-south-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"ap-southeast-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"ap-southeast-2"]}],endpoint:t_,[tE]:tx},tj,{conditions:[{fn:tP,[tw]:[tO,"ca-central-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"eu-central-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"eu-north-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"eu-west-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"eu-west-2"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"eu-west-3"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"sa-east-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,tA]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"us-east-2"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"us-west-1"]}],endpoint:t_,[tE]:tx},{conditions:[{fn:tP,[tw]:[tO,"us-west-2"]}],endpoint:t_,[tE]:tx},{endpoint:{url:tI,properties:{authSchemes:[{name:tv,signingName:"sts",signingRegion:"{Region}"}]},headers:tW},[tE]:tx}],[tE]:tC},{conditions:tH,rules:[{conditions:tQ,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[tE]:tR},{conditions:tB,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[tE]:tR},{endpoint:{url:t$,properties:tW,headers:tW},[tE]:tx}],[tE]:tC},{conditions:[tK],rules:[{conditions:[tz],rules:[{conditions:[tU,tL],rules:[{conditions:[{fn:tb,[tw]:[!0,tV]},tq],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:tW,headers:tW},[tE]:tx}],[tE]:tC},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[tE]:tR}],[tE]:tC},{conditions:tQ,rules:[{conditions:[{fn:tb,[tw]:[tV,!0]}],rules:[{conditions:[{fn:tP,[tw]:[{fn:tT,[tw]:[tF,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:tW,headers:tW},[tE]:tx},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:tW,headers:tW},[tE]:tx}],[tE]:tC},{error:"FIPS is enabled but this partition does not support FIPS",[tE]:tR}],[tE]:tC},{conditions:tB,rules:[{conditions:[tq],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:tW,headers:tW},[tE]:tx}],[tE]:tC},{error:"DualStack is enabled but this partition does not support DualStack",[tE]:tR}],[tE]:tC},tj,{endpoint:{url:tI,properties:tW,headers:tW},[tE]:tx}],[tE]:tC}],[tE]:tC},{error:"Invalid Configuration: Missing Region",[tE]:tR}]},tZ=new F({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),tJ=(e,t={})=>tZ.get(e,()=>s(tG,{endpointParams:e,logger:t.logger}));I.aws=J;class tX extends y{config;constructor(...[r]){var s,l,u;let h,f,y,E,w,v,A,I,C,_=(s=r||{},ec(process.version),f=c(s),y=()=>f().then(Q),E={apiVersion:"2011-06-15",base64Decoder:s?.base64Decoder??en,base64Encoder:s?.base64Encoder??es,disableHostPrefix:s?.disableHostPrefix??!1,endpointProvider:s?.endpointProvider??tJ,extensions:s?.extensions??[],httpAuthSchemeProvider:s?.httpAuthSchemeProvider??tf,httpAuthSchemes:s?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new S},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ew}],logger:s?.logger??new ed,protocol:s?.protocol??ty,protocolSettings:s?.protocolSettings??{defaultNamespace:"com.amazonaws.sts",xmlNamespace:"https://sts.amazonaws.com/doc/2011-06-15/",version:"2011-06-15",serviceTarget:"AWSSecurityTokenServiceV20110615"},serviceId:s?.serviceId??"STS",urlParser:s?.urlParser??M,utf8Decoder:s?.utf8Decoder??g,utf8Encoder:s?.utf8Encoder??k},B(process.version),w={profile:s?.profile,logger:E.logger},{...E,...s,runtime:"node",defaultsMode:f,authSchemePreference:s?.authSchemePreference??ea(G,w),bodyLengthChecker:s?.bodyLengthChecker??R,defaultUserAgentProvider:s?.defaultUserAgentProvider??$({serviceId:E.serviceId,clientVersion:eb.rE}),httpAuthSchemes:s?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4")||(async e=>await s.credentialDefaultProvider(e?.__config||{})()),signer:new S},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ew}],maxAttempts:s?.maxAttempts??ea(b,s),region:s?.region??ea(ey,{...er,...w}),requestHandler:m.create(s?.requestHandler??y),retryMode:s?.retryMode??ea({...e,default:async()=>(await y()).retryMode||O},s),sha256:s?.sha256??z.bind(null,"sha256"),streamCollector:s?.streamCollector??eh,useDualstackEndpoint:s?.useDualstackEndpoint??ea(N,w),useFipsEndpoint:s?.useFipsEndpoint??ea(T,w),userAgentAppId:s?.userAgentAppId??ea(eo,w)});super(_),this.initConfig=_;let j=(l=Object.assign(eu(Object.assign(h=t(V(ef(K(U(Object.assign(_,{useDualstackEndpoint:_.useDualstackEndpoint??!1,useFipsEndpoint:_.useFipsEndpoint??!1,useGlobalEndpoint:_.useGlobalEndpoint??!1,defaultSigningName:"sts"})))))),{stsClientCtor:tX})),{authSchemePreference:i(h.authSchemePreference??[])}),u=r?.extensions||[],C=Object.assign(P(l),ei(l),a(l),(v=l.httpAuthSchemes,A=l.httpAuthSchemeProvider,I=l.credentials,{setHttpAuthScheme(e){let t=v.findIndex(t=>t.schemeId===e.schemeId);-1===t?v.push(e):v.splice(t,1,e)},httpAuthSchemes:()=>v,setHttpAuthSchemeProvider(e){A=e},httpAuthSchemeProvider:()=>A,setCredentials(e){I=e},credentials:()=>I})),u.forEach(e=>e.configure(C)),Object.assign(l,W(C),d(C),eg(C),{httpAuthSchemes:C.httpAuthSchemes(),httpAuthSchemeProvider:C.httpAuthSchemeProvider(),credentials:C.credentials()}));this.config=j,this.middlewareStack.use(n(this.config)),this.middlewareStack.use(L(this.config)),this.middlewareStack.use(eE(this.config)),this.middlewareStack.use(D(this.config)),this.middlewareStack.use(et(this.config)),this.middlewareStack.use(Z(this.config)),this.middlewareStack.use(el(this.config)),this.middlewareStack.use(x(this.config,{httpAuthSchemeParametersProvider:th,identityProviderConfigProvider:async e=>new p({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use(o(this.config))}destroy(){super.destroy()}}let tY=(e,t)=>t?class extends e{constructor(e){for(let i of(super(e),t))this.middlewareStack.use(i)}}:e,t0=(e={},t)=>{var i;let r,s;return i=tY(tX,t),async(t,n)=>{if(s=t,!r){let{logger:t=e?.parentClientConfig?.logger,profile:n=e?.parentClientConfig?.profile,region:o,requestHandler:a=e?.parentClientConfig?.requestHandler,credentialProviderLogger:l,userAgentAppId:c=e?.parentClientConfig?.userAgentAppId}=e,d=await tu(o,e?.parentClientConfig?.region,l,{logger:t,profile:n}),u=!tp(a);r=new i({...e,userAgentAppId:c,profile:n,credentialDefaultProvider:()=>async()=>s,region:d,requestHandler:u?a:void 0,logger:t})}let{Credentials:o,AssumedRoleUser:a}=await r.send(new tl(n));if(!o||!o.AccessKeyId||!o.SecretAccessKey)throw Error(`Invalid response from STS.assumeRole call with role ${n.RoleArn}`);let l=td(a),c={accessKeyId:o.AccessKeyId,secretAccessKey:o.SecretAccessKey,sessionToken:o.SessionToken,expiration:o.Expiration,...o.CredentialScope&&{credentialScope:o.CredentialScope},...l&&{accountId:l}};return E(c,"CREDENTIALS_STS_ASSUME_ROLE","i"),c}},t1=(e={},t)=>{var i;let r;return i=tY(tX,t),async t=>{if(!r){let{logger:t=e?.parentClientConfig?.logger,profile:s=e?.parentClientConfig?.profile,region:n,requestHandler:o=e?.parentClientConfig?.requestHandler,credentialProviderLogger:a,userAgentAppId:l=e?.parentClientConfig?.userAgentAppId}=e,c=await tu(n,e?.parentClientConfig?.region,a,{logger:t,profile:s}),d=!tp(o);r=new i({...e,userAgentAppId:l,profile:s,region:c,requestHandler:d?o:void 0,logger:t})}let{Credentials:s,AssumedRoleUser:n}=await r.send(new tc(t));if(!s||!s.AccessKeyId||!s.SecretAccessKey)throw Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${t.RoleArn}`);let o=td(n),a={accessKeyId:s.AccessKeyId,secretAccessKey:s.SecretAccessKey,sessionToken:s.SessionToken,expiration:s.Expiration,...s.CredentialScope&&{credentialScope:s.CredentialScope},...o&&{accountId:o}};return o&&E(a,"RESOLVED_ACCOUNT_ID","T"),E(a,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),a}};export{t0 as defaultRoleAssumers_getDefaultRoleAssumer,t1 as defaultRoleAssumers_getDefaultRoleAssumerWithWebIdentity};
package/dist/esm/1~45.mjs DELETED
@@ -1 +0,0 @@
1
- import{NODE_RETRY_MODE_CONFIG_OPTIONS as e,resolveEndpointConfig as r,normalizeProvider as t,resolveEndpoint as o,getSchemaSerdePlugin as i,getHttpSigningPlugin as n,getHttpHandlerExtensionConfiguration as s,resolveDefaultsModeConfig as a,resolveDefaultRuntimeConfig as c,DefaultIdentityProviderConfig as p,command_Command as d,ServiceException as u,NodeHttpHandler as l,fromUtf8_fromUtf8 as h,Client as f,AwsSdkSigV4Signer as m,NODE_MAX_ATTEMPT_CONFIG_OPTIONS as g,getAwsRegionExtensionConfiguration as S,getHttpAuthSchemeEndpointRuleSetPlugin as E,customEndpointFunctions as y,TypeRegistry as v,calculateBodyLength as P,NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS as x,dist_es_toUtf8_toUtf8 as I,getContentLengthPlugin as _,createDefaultUserAgentProvider as k,resolveRetryConfig as C,DEFAULT_RETRY_MODE as O,Hash as b,dist_es_parseUrl as A,NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS as w,resolveAwsRegionExtensionConfiguration as D,resolveUserAgentConfig as R,getSmithyContext as T,getUserAgentPlugin as $,getEndpointPlugin as U,resolveHostHeaderConfig as j,EndpointCache as F,loadConfigsForDefaultMode as z,emitWarningIfUnsupportedVersion as H,awsEndpointFunctions as q,NODE_AUTH_SCHEME_PREFERENCE_OPTIONS as K,getLoggerPlugin as M,getHostHeaderPlugin as G,getDefaultExtensionConfiguration as N,NODE_REGION_CONFIG_FILE_OPTIONS as V,fromBase64 as L,toBase64 as W,NODE_APP_ID_CONFIG_OPTIONS as B,loadConfig as J,getRecursionDetectionPlugin as Q,emitWarningIfUnsupportedVersion_emitWarningIfUnsupportedVersion as X,NoOpLogger as Y,resolveAwsSdkSigV4Config as Z,streamCollector as ee,resolveRegionConfig as er,resolveHttpHandlerRuntimeConfig as et,NODE_REGION_CONFIG_OPTIONS as eo,getRetryPlugin as ei}from"./131.mjs";import{NoAuthSigner as en}from"./1~489.mjs";import{AwsRestJsonProtocol as es}from"./1~300.mjs";import{package_namespaceObject as ea}from"./1~976.mjs";let ec=async(e,r,o)=>({operation:T(r).operation,region:await t(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),ep=e=>{let r=[];if("CreateToken"===e.operation)r.push({schemeId:"smithy.api#noAuth"});else r.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:(e,r)=>({signingProperties:{config:e,context:r}})});return r},ed={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}},eu="required",el="argv",eh="isSet",ef="booleanEquals",em="error",eg="endpoint",eS="tree",eE="PartitionResult",ey="getAttr",ev={[eu]:!1,type:"string"},eP={[eu]:!0,default:!1,type:"boolean"},ex={ref:"Endpoint"},eI={fn:ef,[el]:[{ref:"UseFIPS"},!0]},e_={fn:ef,[el]:[{ref:"UseDualStack"},!0]},ek={},eC={fn:ey,[el]:[{ref:eE},"supportsFIPS"]},eO={ref:eE},eb={fn:ef,[el]:[!0,{fn:ey,[el]:[eO,"supportsDualStack"]}]},eA=[eI],ew=[e_],eD=[{ref:"Region"}],eR={version:"1.0",parameters:{Region:ev,UseDualStack:eP,UseFIPS:eP,Endpoint:ev},rules:[{conditions:[{fn:eh,[el]:[ex]}],rules:[{conditions:eA,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:em},{conditions:ew,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:em},{endpoint:{url:ex,properties:ek,headers:ek},type:eg}],type:eS},{conditions:[{fn:eh,[el]:eD}],rules:[{conditions:[{fn:"aws.partition",[el]:eD,assign:eE}],rules:[{conditions:[eI,e_],rules:[{conditions:[{fn:ef,[el]:[!0,eC]},eb],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:ek,headers:ek},type:eg}],type:eS},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:em}],type:eS},{conditions:eA,rules:[{conditions:[{fn:ef,[el]:[eC,!0]}],rules:[{conditions:[{fn:"stringEquals",[el]:[{fn:ey,[el]:[eO,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:ek,headers:ek},type:eg},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:ek,headers:ek},type:eg}],type:eS},{error:"FIPS is enabled but this partition does not support FIPS",type:em}],type:eS},{conditions:ew,rules:[{conditions:[eb],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:ek,headers:ek},type:eg}],type:eS},{error:"DualStack is enabled but this partition does not support DualStack",type:em}],type:eS},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:ek,headers:ek},type:eg}],type:eS}],type:eS},{error:"Invalid Configuration: Missing Region",type:em}]},eT=new F({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),e$=(e,r={})=>eT.get(e,()=>o(eR,{endpointParams:e,logger:r.logger}));y.aws=q;class eU extends f{config;constructor(...[o]){var d,u,f,y;let v,T,U,F,q,ed,eu,el,eh=(d=o||{},X(process.version),v=a(d),T=()=>v().then(z),U={apiVersion:"2019-06-10",base64Decoder:d?.base64Decoder??L,base64Encoder:d?.base64Encoder??W,disableHostPrefix:d?.disableHostPrefix??!1,endpointProvider:d?.endpointProvider??e$,extensions:d?.extensions??[],httpAuthSchemeProvider:d?.httpAuthSchemeProvider??ep,httpAuthSchemes:d?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new m},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new en}],logger:d?.logger??new Y,protocol:d?.protocol??es,protocolSettings:d?.protocolSettings??{defaultNamespace:"com.amazonaws.ssooidc",version:"2019-06-10",serviceTarget:"AWSSSOOIDCService"},serviceId:d?.serviceId??"SSO OIDC",urlParser:d?.urlParser??A,utf8Decoder:d?.utf8Decoder??h,utf8Encoder:d?.utf8Encoder??I},H(process.version),F={profile:d?.profile,logger:U.logger},{...U,...d,runtime:"node",defaultsMode:v,authSchemePreference:d?.authSchemePreference??J(K,F),bodyLengthChecker:d?.bodyLengthChecker??P,defaultUserAgentProvider:d?.defaultUserAgentProvider??k({serviceId:U.serviceId,clientVersion:ea.rE}),maxAttempts:d?.maxAttempts??J(g,d),region:d?.region??J(eo,{...V,...F}),requestHandler:l.create(d?.requestHandler??T),retryMode:d?.retryMode??J({...e,default:async()=>(await T()).retryMode||O},d),sha256:d?.sha256??b.bind(null,"sha256"),streamCollector:d?.streamCollector??ee,useDualstackEndpoint:d?.useDualstackEndpoint??J(w,F),useFipsEndpoint:d?.useFipsEndpoint??J(x,F),userAgentAppId:d?.userAgentAppId??J(B,F)});super(eh),this.initConfig=eh;let ef=(f=Object.assign(Z(u=r(j(er(C(R(Object.assign(eh,{useDualstackEndpoint:eh.useDualstackEndpoint??!1,useFipsEndpoint:eh.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"}))))))),{authSchemePreference:t(u.authSchemePreference??[])}),y=o?.extensions||[],el=Object.assign(S(f),N(f),s(f),(q=f.httpAuthSchemes,ed=f.httpAuthSchemeProvider,eu=f.credentials,{setHttpAuthScheme(e){let r=q.findIndex(r=>r.schemeId===e.schemeId);-1===r?q.push(e):q.splice(r,1,e)},httpAuthSchemes:()=>q,setHttpAuthSchemeProvider(e){ed=e},httpAuthSchemeProvider:()=>ed,setCredentials(e){eu=e},credentials:()=>eu})),y.forEach(e=>e.configure(el)),Object.assign(f,D(el),c(el),et(el),{httpAuthSchemes:el.httpAuthSchemes(),httpAuthSchemeProvider:el.httpAuthSchemeProvider(),credentials:el.credentials()}));this.config=ef,this.middlewareStack.use(i(this.config)),this.middlewareStack.use($(this.config)),this.middlewareStack.use(ei(this.config)),this.middlewareStack.use(_(this.config)),this.middlewareStack.use(G(this.config)),this.middlewareStack.use(M(this.config)),this.middlewareStack.use(Q(this.config)),this.middlewareStack.use(E(this.config,{httpAuthSchemeParametersProvider:ec,identityProviderConfigProvider:async e=>new p({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use(n(this.config))}destroy(){super.destroy()}}class ej extends u{constructor(e){super(e),Object.setPrototypeOf(this,ej.prototype)}}class eF extends ej{name="AccessDeniedException";$fault="client";error;reason;error_description;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,eF.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class ez extends ej{name="AuthorizationPendingException";$fault="client";error;error_description;constructor(e){super({name:"AuthorizationPendingException",$fault:"client",...e}),Object.setPrototypeOf(this,ez.prototype),this.error=e.error,this.error_description=e.error_description}}class eH extends ej{name="ExpiredTokenException";$fault="client";error;error_description;constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e}),Object.setPrototypeOf(this,eH.prototype),this.error=e.error,this.error_description=e.error_description}}class eq extends ej{name="InternalServerException";$fault="server";error;error_description;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,eq.prototype),this.error=e.error,this.error_description=e.error_description}}class eK extends ej{name="InvalidClientException";$fault="client";error;error_description;constructor(e){super({name:"InvalidClientException",$fault:"client",...e}),Object.setPrototypeOf(this,eK.prototype),this.error=e.error,this.error_description=e.error_description}}class eM extends ej{name="InvalidGrantException";$fault="client";error;error_description;constructor(e){super({name:"InvalidGrantException",$fault:"client",...e}),Object.setPrototypeOf(this,eM.prototype),this.error=e.error,this.error_description=e.error_description}}class eG extends ej{name="InvalidRequestException";$fault="client";error;reason;error_description;constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,eG.prototype),this.error=e.error,this.reason=e.reason,this.error_description=e.error_description}}class eN extends ej{name="InvalidScopeException";$fault="client";error;error_description;constructor(e){super({name:"InvalidScopeException",$fault:"client",...e}),Object.setPrototypeOf(this,eN.prototype),this.error=e.error,this.error_description=e.error_description}}class eV extends ej{name="SlowDownException";$fault="client";error;error_description;constructor(e){super({name:"SlowDownException",$fault:"client",...e}),Object.setPrototypeOf(this,eV.prototype),this.error=e.error,this.error_description=e.error_description}}class eL extends ej{name="UnauthorizedClientException";$fault="client";error;error_description;constructor(e){super({name:"UnauthorizedClientException",$fault:"client",...e}),Object.setPrototypeOf(this,eL.prototype),this.error=e.error,this.error_description=e.error_description}}class eW extends ej{name="UnsupportedGrantTypeException";$fault="client";error;error_description;constructor(e){super({name:"UnsupportedGrantTypeException",$fault:"client",...e}),Object.setPrototypeOf(this,eW.prototype),this.error=e.error,this.error_description=e.error_description}}let eB="client",eJ="error",eQ="error_description",eX="httpError",eY="reason",eZ="refreshToken",e0="smithy.ts.sdk.synthetic.com.amazonaws.ssooidc",e4="com.amazonaws.ssooidc";var e1=[0,e4,"AccessToken",8,0],e3=[0,e4,"ClientSecret",8,0],e6=[0,e4,"CodeVerifier",8,0],e8=[0,e4,"IdToken",8,0],e2=[0,e4,"RefreshToken",8,0],e5=[-3,e4,"AccessDeniedException",{[eJ]:eB,[eX]:400},[eJ,eY,eQ],[0,0,0]];v.for(e4).registerError(e5,eF);var e9=[-3,e4,"AuthorizationPendingException",{[eJ]:eB,[eX]:400},[eJ,eQ],[0,0]];v.for(e4).registerError(e9,ez);var e7=[3,e4,"CreateTokenRequest",0,["clientId","clientSecret","grantType","deviceCode","code",eZ,"scope","redirectUri","codeVerifier"],[0,[()=>e3,0],0,0,0,[()=>e2,0],64,0,[()=>e6,0]]],re=[3,e4,"CreateTokenResponse",0,["accessToken","tokenType","expiresIn",eZ,"idToken"],[[()=>e1,0],0,1,[()=>e2,0],[()=>e8,0]]],rr=[-3,e4,"ExpiredTokenException",{[eJ]:eB,[eX]:400},[eJ,eQ],[0,0]];v.for(e4).registerError(rr,eH);var rt=[-3,e4,"InternalServerException",{[eJ]:"server",[eX]:500},[eJ,eQ],[0,0]];v.for(e4).registerError(rt,eq);var ro=[-3,e4,"InvalidClientException",{[eJ]:eB,[eX]:401},[eJ,eQ],[0,0]];v.for(e4).registerError(ro,eK);var ri=[-3,e4,"InvalidGrantException",{[eJ]:eB,[eX]:400},[eJ,eQ],[0,0]];v.for(e4).registerError(ri,eM);var rn=[-3,e4,"InvalidRequestException",{[eJ]:eB,[eX]:400},[eJ,eY,eQ],[0,0,0]];v.for(e4).registerError(rn,eG);var rs=[-3,e4,"InvalidScopeException",{[eJ]:eB,[eX]:400},[eJ,eQ],[0,0]];v.for(e4).registerError(rs,eN);var ra=[-3,e4,"SlowDownException",{[eJ]:eB,[eX]:400},[eJ,eQ],[0,0]];v.for(e4).registerError(ra,eV);var rc=[-3,e4,"UnauthorizedClientException",{[eJ]:eB,[eX]:400},[eJ,eQ],[0,0]];v.for(e4).registerError(rc,eL);var rp=[-3,e4,"UnsupportedGrantTypeException",{[eJ]:eB,[eX]:400},[eJ,eQ],[0,0]];v.for(e4).registerError(rp,eW);var rd=[-3,e0,"SSOOIDCServiceException",0,[],[]];v.for(e0).registerError(rd,ej);var ru=[9,e4,"CreateToken",{http:["POST","/token",200]},()=>e7,()=>re];class rl extends d.classBuilder().ep(ed).m(function(e,r,t,o){return[U(t,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").sc(ru).build(){}export{rl as CreateTokenCommand,eU as SSOOIDCClient};
@@ -1 +0,0 @@
1
- export{default as promises,readFile}from"fs/promises";
@@ -1 +0,0 @@
1
- import{__webpack_require__ as e}from"./rslib-runtime.mjs";import{getHomeDir as t}from"./131.mjs";import{readFile as r}from"./1~461.mjs";let o=e("crypto"),_=e("path"),a=e=>{let r=(0,o.createHash)("sha1").update(e).digest("hex");return(0,_.join)(t(),".aws","sso","cache",`${r}.json`)},S={},n=async e=>{if(S[e])return S[e];let t=a(e);return JSON.parse(await r(t,"utf8"))};export{a as getSSOTokenFilepath,n as getSSOTokenFromFile,S as tokenIntercept};
@@ -1 +0,0 @@
1
- class n{async sign(n,r,s){return n}}export{n as NoAuthSigner};
@@ -1 +0,0 @@
1
- import{NODE_RETRY_MODE_CONFIG_OPTIONS as e,resolveEndpointConfig as t,normalizeProvider as r,resolveEndpoint as n,getSchemaSerdePlugin as s,getHttpSigningPlugin as i,getHttpHandlerExtensionConfiguration as o,resolveDefaultsModeConfig as a,resolveDefaultRuntimeConfig as p,DefaultIdentityProviderConfig as c,command_Command as d,ServiceException as u,NodeHttpHandler as h,fromUtf8_fromUtf8 as l,Client as g,AwsSdkSigV4Signer as f,NODE_MAX_ATTEMPT_CONFIG_OPTIONS as m,getAwsRegionExtensionConfiguration as S,getHttpAuthSchemeEndpointRuleSetPlugin as y,customEndpointFunctions as P,TypeRegistry as v,calculateBodyLength as k,NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS as E,dist_es_toUtf8_toUtf8 as A,getContentLengthPlugin as I,createDefaultUserAgentProvider as b,resolveRetryConfig as w,DEFAULT_RETRY_MODE as x,Hash as C,dist_es_parseUrl as R,NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS as O,resolveAwsRegionExtensionConfiguration as D,resolveUserAgentConfig as T,getSmithyContext as _,getUserAgentPlugin as U,getEndpointPlugin as F,resolveHostHeaderConfig as M,EndpointCache as j,loadConfigsForDefaultMode as q,emitWarningIfUnsupportedVersion as H,awsEndpointFunctions as K,NODE_AUTH_SCHEME_PREFERENCE_OPTIONS as $,getLoggerPlugin as z,getHostHeaderPlugin as N,getDefaultExtensionConfiguration as V,NODE_REGION_CONFIG_FILE_OPTIONS as B,fromBase64 as L,toBase64 as G,NODE_APP_ID_CONFIG_OPTIONS as J,loadConfig as Q,getRecursionDetectionPlugin as W,emitWarningIfUnsupportedVersion_emitWarningIfUnsupportedVersion as X,NoOpLogger as Y,resolveAwsSdkSigV4Config as Z,streamCollector as ee,resolveRegionConfig as et,resolveHttpHandlerRuntimeConfig as er,NODE_REGION_CONFIG_OPTIONS as en,getRetryPlugin as es}from"./131.mjs";import{NoAuthSigner as ei}from"./1~489.mjs";import{AwsRestJsonProtocol as eo}from"./1~300.mjs";import{package_namespaceObject as ea}from"./1~976.mjs";let ep=async(e,t,n)=>({operation:_(t).operation,region:await r(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),ec=e=>{let t=[];if("CreateOAuth2Token"===e.operation)t.push({schemeId:"smithy.api#noAuth"});else t.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"signin",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})});return t},ed={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}},eu="required",eh="argv",el="isSet",eg="booleanEquals",ef="error",em="endpoint",eS="tree",ey="PartitionResult",eP="stringEquals",ev={[eu]:!0,default:!1,type:"boolean"},ek={[eu]:!1,type:"string"},eE={ref:"Endpoint"},eA={fn:eg,[eh]:[{ref:"UseFIPS"},!0]},eI={fn:eg,[eh]:[{ref:"UseDualStack"},!0]},eb={},ew={fn:"getAttr",[eh]:[{ref:ey},"name"]},ex={fn:eg,[eh]:[{ref:"UseFIPS"},!1]},eC={fn:eg,[eh]:[{ref:"UseDualStack"},!1]},eR={fn:"getAttr",[eh]:[{ref:ey},"supportsFIPS"]},eO={fn:eg,[eh]:[!0,{fn:"getAttr",[eh]:[{ref:ey},"supportsDualStack"]}]},eD=[{ref:"Region"}],eT={version:"1.0",parameters:{UseDualStack:ev,UseFIPS:ev,Endpoint:ek,Region:ek},rules:[{conditions:[{fn:el,[eh]:[eE]}],rules:[{conditions:[eA],error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:ef},{rules:[{conditions:[eI],error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:ef},{endpoint:{url:eE,properties:eb,headers:eb},type:em}],type:eS}],type:eS},{rules:[{conditions:[{fn:el,[eh]:eD}],rules:[{conditions:[{fn:"aws.partition",[eh]:eD,assign:ey}],rules:[{conditions:[{fn:eP,[eh]:[ew,"aws"]},ex,eC],endpoint:{url:"https://{Region}.signin.aws.amazon.com",properties:eb,headers:eb},type:em},{conditions:[{fn:eP,[eh]:[ew,"aws-cn"]},ex,eC],endpoint:{url:"https://{Region}.signin.amazonaws.cn",properties:eb,headers:eb},type:em},{conditions:[{fn:eP,[eh]:[ew,"aws-us-gov"]},ex,eC],endpoint:{url:"https://{Region}.signin.amazonaws-us-gov.com",properties:eb,headers:eb},type:em},{conditions:[eA,eI],rules:[{conditions:[{fn:eg,[eh]:[!0,eR]},eO],rules:[{endpoint:{url:"https://signin-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eb,headers:eb},type:em}],type:eS},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:ef}],type:eS},{conditions:[eA,eC],rules:[{conditions:[{fn:eg,[eh]:[eR,!0]}],rules:[{endpoint:{url:"https://signin-fips.{Region}.{PartitionResult#dnsSuffix}",properties:eb,headers:eb},type:em}],type:eS},{error:"FIPS is enabled but this partition does not support FIPS",type:ef}],type:eS},{conditions:[ex,eI],rules:[{conditions:[eO],rules:[{endpoint:{url:"https://signin.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eb,headers:eb},type:em}],type:eS},{error:"DualStack is enabled but this partition does not support DualStack",type:ef}],type:eS},{endpoint:{url:"https://signin.{Region}.{PartitionResult#dnsSuffix}",properties:eb,headers:eb},type:em}],type:eS}],type:eS},{error:"Invalid Configuration: Missing Region",type:ef}],type:eS}]},e_=new j({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),eU=(e,t={})=>e_.get(e,()=>n(eT,{endpointParams:e,logger:t.logger}));P.aws=K;class eF extends g{config;constructor(...[n]){var d,u,g,P;let v,_,F,j,K,ed,eu,eh,el=(d=n||{},X(process.version),v=a(d),_=()=>v().then(q),F={apiVersion:"2023-01-01",base64Decoder:d?.base64Decoder??L,base64Encoder:d?.base64Encoder??G,disableHostPrefix:d?.disableHostPrefix??!1,endpointProvider:d?.endpointProvider??eU,extensions:d?.extensions??[],httpAuthSchemeProvider:d?.httpAuthSchemeProvider??ec,httpAuthSchemes:d?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new f},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ei}],logger:d?.logger??new Y,protocol:d?.protocol??eo,protocolSettings:d?.protocolSettings??{defaultNamespace:"com.amazonaws.signin",version:"2023-01-01",serviceTarget:"Signin"},serviceId:d?.serviceId??"Signin",urlParser:d?.urlParser??R,utf8Decoder:d?.utf8Decoder??l,utf8Encoder:d?.utf8Encoder??A},H(process.version),j={profile:d?.profile,logger:F.logger},{...F,...d,runtime:"node",defaultsMode:v,authSchemePreference:d?.authSchemePreference??Q($,j),bodyLengthChecker:d?.bodyLengthChecker??k,defaultUserAgentProvider:d?.defaultUserAgentProvider??b({serviceId:F.serviceId,clientVersion:ea.rE}),maxAttempts:d?.maxAttempts??Q(m,d),region:d?.region??Q(en,{...B,...j}),requestHandler:h.create(d?.requestHandler??_),retryMode:d?.retryMode??Q({...e,default:async()=>(await _()).retryMode||x},d),sha256:d?.sha256??C.bind(null,"sha256"),streamCollector:d?.streamCollector??ee,useDualstackEndpoint:d?.useDualstackEndpoint??Q(O,j),useFipsEndpoint:d?.useFipsEndpoint??Q(E,j),userAgentAppId:d?.userAgentAppId??Q(J,j)});super(el),this.initConfig=el;let eg=(g=Object.assign(Z(u=t(M(et(w(T(Object.assign(el,{useDualstackEndpoint:el.useDualstackEndpoint??!1,useFipsEndpoint:el.useFipsEndpoint??!1,defaultSigningName:"signin"}))))))),{authSchemePreference:r(u.authSchemePreference??[])}),P=n?.extensions||[],eh=Object.assign(S(g),V(g),o(g),(K=g.httpAuthSchemes,ed=g.httpAuthSchemeProvider,eu=g.credentials,{setHttpAuthScheme(e){let t=K.findIndex(t=>t.schemeId===e.schemeId);-1===t?K.push(e):K.splice(t,1,e)},httpAuthSchemes:()=>K,setHttpAuthSchemeProvider(e){ed=e},httpAuthSchemeProvider:()=>ed,setCredentials(e){eu=e},credentials:()=>eu})),P.forEach(e=>e.configure(eh)),Object.assign(g,D(eh),p(eh),er(eh),{httpAuthSchemes:eh.httpAuthSchemes(),httpAuthSchemeProvider:eh.httpAuthSchemeProvider(),credentials:eh.credentials()}));this.config=eg,this.middlewareStack.use(s(this.config)),this.middlewareStack.use(U(this.config)),this.middlewareStack.use(es(this.config)),this.middlewareStack.use(I(this.config)),this.middlewareStack.use(N(this.config)),this.middlewareStack.use(z(this.config)),this.middlewareStack.use(W(this.config)),this.middlewareStack.use(y(this.config,{httpAuthSchemeParametersProvider:ep,identityProviderConfigProvider:async e=>new c({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use(i(this.config))}destroy(){super.destroy()}}class eM extends u{constructor(e){super(e),Object.setPrototypeOf(this,eM.prototype)}}class ej extends eM{name="AccessDeniedException";$fault="client";error;constructor(e){super({name:"AccessDeniedException",$fault:"client",...e}),Object.setPrototypeOf(this,ej.prototype),this.error=e.error}}class eq extends eM{name="InternalServerException";$fault="server";error;constructor(e){super({name:"InternalServerException",$fault:"server",...e}),Object.setPrototypeOf(this,eq.prototype),this.error=e.error}}class eH extends eM{name="TooManyRequestsError";$fault="client";error;constructor(e){super({name:"TooManyRequestsError",$fault:"client",...e}),Object.setPrototypeOf(this,eH.prototype),this.error=e.error}}class eK extends eM{name="ValidationException";$fault="client";error;constructor(e){super({name:"ValidationException",$fault:"client",...e}),Object.setPrototypeOf(this,eK.prototype),this.error=e.error}}let e$="accessKeyId",ez="accessToken",eN="client",eV="clientId",eB="codeVerifier",eL="error",eG="expiresIn",eJ="grantType",eQ="httpError",eW="idToken",eX="jsonName",eY="message",eZ="refreshToken",e0="redirectUri",e1="secretAccessKey",e2="sessionToken",e3="smithy.ts.sdk.synthetic.com.amazonaws.signin",e4="tokenType",e6="com.amazonaws.signin";var e8=[0,e6,"RefreshToken",8,0],e5=[-3,e6,"AccessDeniedException",{[eL]:eN},[eL,eY],[0,0]];v.for(e6).registerError(e5,ej);var e9=[3,e6,"AccessToken",8,[e$,e1,e2],[[0,{[eX]:e$}],[0,{[eX]:e1}],[0,{[eX]:e2}]]],e7=[3,e6,"CreateOAuth2TokenRequest",0,["tokenInput"],[[()=>te,16]]],te=[3,e6,"CreateOAuth2TokenRequestBody",0,[eV,eJ,"code",e0,eB,eZ],[[0,{[eX]:eV}],[0,{[eX]:eJ}],0,[0,{[eX]:e0}],[0,{[eX]:eB}],[()=>e8,{[eX]:eZ}]]],tt=[3,e6,"CreateOAuth2TokenResponse",0,["tokenOutput"],[[()=>tr,16]]],tr=[3,e6,"CreateOAuth2TokenResponseBody",0,[ez,e4,eG,eZ,eW],[[()=>e9,{[eX]:ez}],[0,{[eX]:e4}],[1,{[eX]:eG}],[()=>e8,{[eX]:eZ}],[0,{[eX]:eW}]]],tn=[-3,e6,"InternalServerException",{[eL]:"server",[eQ]:500},[eL,eY],[0,0]];v.for(e6).registerError(tn,eq);var ts=[-3,e6,"TooManyRequestsError",{[eL]:eN,[eQ]:429},[eL,eY],[0,0]];v.for(e6).registerError(ts,eH);var ti=[-3,e6,"ValidationException",{[eL]:eN,[eQ]:400},[eL,eY],[0,0]];v.for(e6).registerError(ti,eK);var to=[-3,e3,"SigninServiceException",0,[],[]];v.for(e3).registerError(to,eM);var ta=[9,e6,"CreateOAuth2Token",{http:["POST","/v1/token",200]},()=>e7,()=>tt];class tp extends d.classBuilder().ep(ed).m(function(e,t,r,n){return[F(r,e.getEndpointParameterInstructions())]}).s("Signin","CreateOAuth2Token",{}).n("SigninClient","CreateOAuth2TokenCommand").sc(ta).build(){}export{tp as CreateOAuth2TokenCommand,eF as SigninClient};
@@ -1 +0,0 @@
1
- import{__webpack_require__ as e}from"./rslib-runtime.mjs";import{CredentialsProviderError as o,setCredentialFeature as i}from"./131.mjs";import{externalDataInterceptor as n}from"./1~666.mjs";let t=e("fs"),r="AWS_WEB_IDENTITY_TOKEN_FILE",l=(e={})=>async l=>{let s;e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");let _=e?.webIdentityTokenFile??process.env[r],d=e?.roleArn??process.env.AWS_ROLE_ARN,a=e?.roleSessionName??process.env.AWS_ROLE_SESSION_NAME;if(!_||!d)throw new o("Web identity configuration not specified",{logger:e.logger});let g=await (s={...e,webIdentityToken:n?.getTokenRecord?.()[_]??(0,t.readFileSync)(_,{encoding:"ascii"}),roleArn:d,roleSessionName:a},async e=>{s.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");let{roleArn:o,roleSessionName:i,webIdentityToken:n,providerId:t,policyArns:r,policy:l,durationSeconds:_}=s,{roleAssumerWithWebIdentity:d}=s;if(!d){let{getDefaultRoleAssumerWithWebIdentity:o}=await import("./1~410.mjs").then(e=>({getDefaultRoleAssumerWithWebIdentity:e.defaultRoleAssumers_getDefaultRoleAssumerWithWebIdentity}));d=o({...s.clientConfig,credentialProviderLogger:s.logger,parentClientConfig:{...e?.callerClientConfig,...s.parentClientConfig}},s.clientPlugins)}return d({RoleArn:o,RoleSessionName:i??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:n,ProviderId:t,PolicyArns:r,Policy:l,DurationSeconds:_})})(l);return _===process.env[r]&&i(g,"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN","h"),g};export{l as fromTokenFile};
@@ -1 +0,0 @@
1
- import{fileIntercept as e}from"./131.mjs";import{tokenIntercept as r}from"./1~462.mjs";let t={getFileRecord:()=>e,interceptFile(r,t){e[r]=Promise.resolve(t)},getTokenRecord:()=>r,interceptToken(e,t){r[e]=t}};export{t as externalDataInterceptor};
@@ -1 +0,0 @@
1
- import{dist_es_toUtf8_toUtf8 as e,fromUtf8_fromUtf8 as t}from"./131.mjs";class r{marshaller;serializer;deserializer;serdeContext;defaultContentType;constructor({marshaller:e,serializer:t,deserializer:r,serdeContext:i,defaultContentType:a}){this.marshaller=e,this.serializer=t,this.deserializer=r,this.serdeContext=i,this.defaultContentType=a}async serializeEventStream({eventStream:e,requestSchema:t,initialRequest:r}){let i=this.marshaller,a=t.getEventStreamMember(),s=t.getMemberSchema(a),n=this.serializer,l=this.defaultContentType,o=Symbol("initialRequestMarker"),m={async *[Symbol.asyncIterator](){if(r){n.write(t,r);let e=n.flush();yield{[o]:!0,headers:{":event-type":{type:"string",value:"initial-request"},":message-type":{type:"string",value:"event"},":content-type":{type:"string",value:l}},body:e}}for await(let t of e)yield t}};return i.serialize(m,e=>{if(e[o])return{headers:e.headers,body:e.body};let t=Object.keys(e).find(e=>"__type"!==e)??"",{additionalHeaders:r,body:i,eventType:a,explicitPayloadContentType:n}=this.writeEventBody(t,s,e);return{headers:{":event-type":{type:"string",value:a},":message-type":{type:"string",value:"event"},":content-type":{type:"string",value:n??l},...r},body:i}})}async deserializeEventStream({response:t,responseSchema:r,initialResponseContainer:i}){let a=this.marshaller,s=r.getEventStreamMember(),n=r.getMemberSchema(s).getMemberSchemas(),l=Symbol("initialResponseMarker"),o=a.deserialize(t.body,async t=>{let i=Object.keys(t).find(e=>"__type"!==e)??"",a=t[i].body;if("initial-response"===i){let e=await this.deserializer.read(r,a);return delete e[s],{[l]:!0,...e}}if(!(i in n))return{$unknown:t};{let r=n[i];if(r.isStructSchema()){let s={},n=!1;for(let[l,o]of r.structIterator()){let{eventHeader:r,eventPayload:m}=o.getMergedTraits();if(n=n||!!(r||m),m)o.isBlobSchema()?s[l]=a:o.isStringSchema()?s[l]=(this.serdeContext?.utf8Encoder??e)(a):o.isStructSchema()&&(s[l]=await this.deserializer.read(o,a));else if(r){let e=t[i].headers[l]?.value;null!=e&&(o.isNumericSchema()?e&&"object"==typeof e&&"bytes"in e?s[l]=BigInt(e.toString()):s[l]=Number(e):s[l]=e)}}if(n)return{[i]:s}}return{[i]:await this.deserializer.read(r,a)}}}),m=o[Symbol.asyncIterator](),c=await m.next();if(c.done)return o;if(c.value?.[l]){if(!r)throw Error("@smithy::core/protocols - initial-response event encountered in event stream but no response schema given.");for(let[e,t]of Object.entries(c.value))i[e]=t}return{async *[Symbol.asyncIterator](){for(c?.value?.[l]||(yield c.value);;){let{done:e,value:t}=await m.next();if(e)break;yield t}}}}writeEventBody(e,r,i){let a,s=this.serializer,n=e,l=null,o=r.getSchema()[4].includes(e),m={};if(o){let t=r.getMemberSchema(e);if(t.isStructSchema()){for(let[r,a]of t.structIterator()){let{eventHeader:t,eventPayload:s}=a.getMergedTraits();if(s)l=r;else if(t){let t=i[e][r],s="binary";a.isNumericSchema()?s=-0x80000000<=t&&t<=0x80000000-1?"integer":"long":a.isTimestampSchema()?s="timestamp":a.isStringSchema()?s="string":a.isBooleanSchema()&&(s="boolean"),null!=t&&(m[r]={type:s,value:t},delete i[e][r])}}if(null!==l){let r=t.getMemberSchema(l);r.isBlobSchema()?a="application/octet-stream":r.isStringSchema()&&(a="text/plain"),s.write(r,i[e][l])}else s.write(t,i[e])}else throw Error("@smithy/core/event-streams - non-struct member not supported in event stream union.")}else{let[t,r]=i[e];n=t,s.write(15,r)}let c=s.flush();return{body:"string"==typeof c?(this.serdeContext?.utf8Decoder??t)(c):c,eventType:n,explicitPayloadContentType:a,additionalHeaders:m}}}export{r as EventStreamSerde};
@@ -1 +0,0 @@
1
- import{__webpack_require__ as e}from"./rslib-runtime.mjs";import{exec as r,getProfileName as o,setCredentialFeature as i,CredentialsProviderError as t}from"./131.mjs";import{externalDataInterceptor as c}from"./1~666.mjs";import{parseKnownFiles as s}from"./1~23.mjs";let n=e("util"),a=async(e,o,s)=>{let a=o[e];if(o[e]){let l=a.credential_process;if(void 0!==l){let a=(0,n.promisify)(c?.getTokenRecord?.().exec??r);try{let r,{stdout:t}=await a(l);try{r=JSON.parse(t.trim())}catch{throw Error(`Profile ${e} credential_process returned invalid JSON.`)}var d=r;if(1!==d.Version)throw Error(`Profile ${e} credential_process did not return Version 1.`);if(void 0===d.AccessKeyId||void 0===d.SecretAccessKey)throw Error(`Profile ${e} credential_process returned invalid credentials.`);if(d.Expiration){let r=new Date;if(new Date(d.Expiration)<r)throw Error(`Profile ${e} credential_process returned expired credentials.`)}let c=d.AccountId;!c&&o?.[e]?.aws_account_id&&(c=o[e].aws_account_id);let s={accessKeyId:d.AccessKeyId,secretAccessKey:d.SecretAccessKey,...d.SessionToken&&{sessionToken:d.SessionToken},...d.Expiration&&{expiration:new Date(d.Expiration)},...d.CredentialScope&&{credentialScope:d.CredentialScope},...c&&{accountId:c}};return i(s,"CREDENTIALS_PROCESS","w"),s}catch(e){throw new t(e.message,{logger:s})}}throw new t(`Profile ${e} did not contain credential_process.`,{logger:s})}throw new t(`Profile ${e} could not be found in shared credentials file.`,{logger:s})},d=(e={})=>async({callerClientConfig:r}={})=>{e.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let i=await s(e);return a(o({profile:e.profile??r?.profile}),i,e.logger)};export{d as fromProcess};
@@ -1 +0,0 @@
1
- import{NODE_RETRY_MODE_CONFIG_OPTIONS as e,resolveEndpointConfig as t,normalizeProvider as s,resolveEndpoint as r,getSchemaSerdePlugin as o,getHttpSigningPlugin as n,getHttpHandlerExtensionConfiguration as i,resolveDefaultsModeConfig as a,resolveDefaultRuntimeConfig as c,DefaultIdentityProviderConfig as p,command_Command as d,ServiceException as u,NodeHttpHandler as l,fromUtf8_fromUtf8 as h,Client as m,AwsSdkSigV4Signer as g,NODE_MAX_ATTEMPT_CONFIG_OPTIONS as f,getAwsRegionExtensionConfiguration as S,getHttpAuthSchemeEndpointRuleSetPlugin as y,customEndpointFunctions as P,TypeRegistry as v,calculateBodyLength as E,NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS as R,dist_es_toUtf8_toUtf8 as x,getContentLengthPlugin as I,createDefaultUserAgentProvider as b,resolveRetryConfig as A,DEFAULT_RETRY_MODE as k,Hash as w,dist_es_parseUrl as C,NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS as D,getEndpointPlugin as _,resolveAwsRegionExtensionConfiguration as O,getSmithyContext as F,resolveUserAgentConfig as U,getUserAgentPlugin as q,resolveHostHeaderConfig as T,EndpointCache as H,loadConfigsForDefaultMode as M,emitWarningIfUnsupportedVersion as j,awsEndpointFunctions as z,NODE_AUTH_SCHEME_PREFERENCE_OPTIONS as K,getLoggerPlugin as N,getHostHeaderPlugin as G,getDefaultExtensionConfiguration as $,fromBase64 as L,toBase64 as B,NODE_REGION_CONFIG_FILE_OPTIONS as V,NODE_APP_ID_CONFIG_OPTIONS as W,loadConfig as Q,getRecursionDetectionPlugin as J,emitWarningIfUnsupportedVersion_emitWarningIfUnsupportedVersion as X,NoOpLogger as Y,resolveAwsSdkSigV4Config as Z,streamCollector as ee,resolveRegionConfig as et,resolveHttpHandlerRuntimeConfig as es,NODE_REGION_CONFIG_OPTIONS as er,getRetryPlugin as eo}from"./131.mjs";import{NoAuthSigner as en}from"./1~489.mjs";import{AwsRestJsonProtocol as ei}from"./1~300.mjs";let ea={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};class ec extends u{constructor(e){super(e),Object.setPrototypeOf(this,ec.prototype)}}class ep extends ec{name="InvalidRequestException";$fault="client";constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),Object.setPrototypeOf(this,ep.prototype)}}class ed extends ec{name="ResourceNotFoundException";$fault="client";constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),Object.setPrototypeOf(this,ed.prototype)}}class eu extends ec{name="TooManyRequestsException";$fault="client";constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e}),Object.setPrototypeOf(this,eu.prototype)}}class el extends ec{name="UnauthorizedException";$fault="client";constructor(e){super({name:"UnauthorizedException",$fault:"client",...e}),Object.setPrototypeOf(this,el.prototype)}}let eh="client",em="error",eg="httpError",ef="httpQuery",eS="message",ey="smithy.ts.sdk.synthetic.com.amazonaws.sso",eP="com.amazonaws.sso";var ev=[0,eP,"AccessTokenType",8,0],eE=[0,eP,"SecretAccessKeyType",8,0],eR=[0,eP,"SessionTokenType",8,0],ex=[3,eP,"GetRoleCredentialsRequest",0,["roleName","accountId","accessToken"],[[0,{[ef]:"role_name"}],[0,{[ef]:"account_id"}],[()=>ev,{httpHeader:"x-amz-sso_bearer_token"}]]],eI=[3,eP,"GetRoleCredentialsResponse",0,["roleCredentials"],[[()=>ek,0]]],eb=[-3,eP,"InvalidRequestException",{[em]:eh,[eg]:400},[eS],[0]];v.for(eP).registerError(eb,ep);var eA=[-3,eP,"ResourceNotFoundException",{[em]:eh,[eg]:404},[eS],[0]];v.for(eP).registerError(eA,ed);var ek=[3,eP,"RoleCredentials",0,["accessKeyId","secretAccessKey","sessionToken","expiration"],[0,[()=>eE,0],[()=>eR,0],1]],ew=[-3,eP,"TooManyRequestsException",{[em]:eh,[eg]:429},[eS],[0]];v.for(eP).registerError(ew,eu);var eC=[-3,eP,"UnauthorizedException",{[em]:eh,[eg]:401},[eS],[0]];v.for(eP).registerError(eC,el);var eD=[-3,ey,"SSOServiceException",0,[],[]];v.for(ey).registerError(eD,ec);var e_=[9,eP,"GetRoleCredentials",{http:["GET","/federation/credentials",200]},()=>ex,()=>eI];class eO extends d.classBuilder().ep(ea).m(function(e,t,s,r){return[_(s,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").sc(e_).build(){}let eF=async(e,t,r)=>({operation:F(t).operation,region:await s(e.region)()||(()=>{throw Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),eU=e=>{let t=[];switch(e.operation){case"GetRoleCredentials":case"ListAccountRoles":case"ListAccounts":case"Logout":t.push({schemeId:"smithy.api#noAuth"});break;default:t.push({schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})})}return t},eq="required",eT="argv",eH="isSet",eM="booleanEquals",ej="error",ez="endpoint",eK="tree",eN="PartitionResult",eG="getAttr",e$={[eq]:!1,type:"string"},eL={[eq]:!0,default:!1,type:"boolean"},eB={ref:"Endpoint"},eV={fn:eM,[eT]:[{ref:"UseFIPS"},!0]},eW={fn:eM,[eT]:[{ref:"UseDualStack"},!0]},eQ={},eJ={fn:eG,[eT]:[{ref:eN},"supportsFIPS"]},eX={ref:eN},eY={fn:eM,[eT]:[!0,{fn:eG,[eT]:[eX,"supportsDualStack"]}]},eZ=[eV],e0=[eW],e1=[{ref:"Region"}],e4={version:"1.0",parameters:{Region:e$,UseDualStack:eL,UseFIPS:eL,Endpoint:e$},rules:[{conditions:[{fn:eH,[eT]:[eB]}],rules:[{conditions:eZ,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:ej},{conditions:e0,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:ej},{endpoint:{url:eB,properties:eQ,headers:eQ},type:ez}],type:eK},{conditions:[{fn:eH,[eT]:e1}],rules:[{conditions:[{fn:"aws.partition",[eT]:e1,assign:eN}],rules:[{conditions:[eV,eW],rules:[{conditions:[{fn:eM,[eT]:[!0,eJ]},eY],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eQ,headers:eQ},type:ez}],type:eK},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:ej}],type:eK},{conditions:eZ,rules:[{conditions:[{fn:eM,[eT]:[eJ,!0]}],rules:[{conditions:[{fn:"stringEquals",[eT]:[{fn:eG,[eT]:[eX,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:eQ,headers:eQ},type:ez},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:eQ,headers:eQ},type:ez}],type:eK},{error:"FIPS is enabled but this partition does not support FIPS",type:ej}],type:eK},{conditions:e0,rules:[{conditions:[eY],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:eQ,headers:eQ},type:ez}],type:eK},{error:"DualStack is enabled but this partition does not support DualStack",type:ej}],type:eK},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:eQ,headers:eQ},type:ez}],type:eK}],type:eK},{error:"Invalid Configuration: Missing Region",type:ej}]},e3=new H({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),e6=(e,t={})=>e3.get(e,()=>r(e4,{endpointParams:e,logger:t.logger}));P.aws=z;class e8 extends m{config;constructor(...[r]){var d,u,m,P;let v,_,F,H,z,ea,ec,ep,ed=(d=r||{},X(process.version),v=a(d),_=()=>v().then(M),F={apiVersion:"2019-06-10",base64Decoder:d?.base64Decoder??L,base64Encoder:d?.base64Encoder??B,disableHostPrefix:d?.disableHostPrefix??!1,endpointProvider:d?.endpointProvider??e6,extensions:d?.extensions??[],httpAuthSchemeProvider:d?.httpAuthSchemeProvider??eU,httpAuthSchemes:d?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new g},{schemeId:"smithy.api#noAuth",identityProvider:e=>e.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new en}],logger:d?.logger??new Y,protocol:d?.protocol??ei,protocolSettings:d?.protocolSettings??{defaultNamespace:"com.amazonaws.sso",version:"2019-06-10",serviceTarget:"SWBPortalService"},serviceId:d?.serviceId??"SSO",urlParser:d?.urlParser??C,utf8Decoder:d?.utf8Decoder??h,utf8Encoder:d?.utf8Encoder??x},j(process.version),H={profile:d?.profile,logger:F.logger},{...F,...d,runtime:"node",defaultsMode:v,authSchemePreference:d?.authSchemePreference??Q(K,H),bodyLengthChecker:d?.bodyLengthChecker??E,defaultUserAgentProvider:d?.defaultUserAgentProvider??b({serviceId:F.serviceId,clientVersion:"3.964.0"}),maxAttempts:d?.maxAttempts??Q(f,d),region:d?.region??Q(er,{...V,...H}),requestHandler:l.create(d?.requestHandler??_),retryMode:d?.retryMode??Q({...e,default:async()=>(await _()).retryMode||k},d),sha256:d?.sha256??w.bind(null,"sha256"),streamCollector:d?.streamCollector??ee,useDualstackEndpoint:d?.useDualstackEndpoint??Q(D,H),useFipsEndpoint:d?.useFipsEndpoint??Q(R,H),userAgentAppId:d?.userAgentAppId??Q(W,H)});super(ed),this.initConfig=ed;let eu=(m=Object.assign(Z(u=t(T(et(A(U(Object.assign(ed,{useDualstackEndpoint:ed.useDualstackEndpoint??!1,useFipsEndpoint:ed.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}))))))),{authSchemePreference:s(u.authSchemePreference??[])}),P=r?.extensions||[],ep=Object.assign(S(m),$(m),i(m),(z=m.httpAuthSchemes,ea=m.httpAuthSchemeProvider,ec=m.credentials,{setHttpAuthScheme(e){let t=z.findIndex(t=>t.schemeId===e.schemeId);-1===t?z.push(e):z.splice(t,1,e)},httpAuthSchemes:()=>z,setHttpAuthSchemeProvider(e){ea=e},httpAuthSchemeProvider:()=>ea,setCredentials(e){ec=e},credentials:()=>ec})),P.forEach(e=>e.configure(ep)),Object.assign(m,O(ep),c(ep),es(ep),{httpAuthSchemes:ep.httpAuthSchemes(),httpAuthSchemeProvider:ep.httpAuthSchemeProvider(),credentials:ep.credentials()}));this.config=eu,this.middlewareStack.use(o(this.config)),this.middlewareStack.use(q(this.config)),this.middlewareStack.use(eo(this.config)),this.middlewareStack.use(I(this.config)),this.middlewareStack.use(G(this.config)),this.middlewareStack.use(N(this.config)),this.middlewareStack.use(J(this.config)),this.middlewareStack.use(y(this.config,{httpAuthSchemeParametersProvider:eF,identityProviderConfigProvider:async e=>new p({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use(n(this.config))}destroy(){super.destroy()}}export{eO as GetRoleCredentialsCommand,e8 as SSOClient};
@@ -1 +0,0 @@
1
- var a={rE:"3.964.0"};export{a as package_namespaceObject};
package/dist/esm/57.mjs DELETED
@@ -1 +0,0 @@
1
- import*as o from"node:path";import{__webpack_require__ as d}from"./rslib-runtime.mjs";d.add({"node:path"(d){d.exports=o}});export{default as node_os,homedir}from"node:os";