gemi 0.10.3 → 0.10.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (89) hide show
  1. package/dist/app/index.js +2 -2
  2. package/dist/app/index.js.map +1 -1
  3. package/dist/broadcasting/index.js +1 -1
  4. package/dist/{chunk-j7dp3ybs.js → chunk-0z6ff9e0.js} +2 -2
  5. package/dist/{chunk-j7dp3ybs.js.map → chunk-0z6ff9e0.js.map} +1 -1
  6. package/dist/{chunk-bq1en2df.js → chunk-2a0gv505.js} +3 -3
  7. package/dist/{chunk-bq1en2df.js.map → chunk-2a0gv505.js.map} +1 -1
  8. package/dist/chunk-33r34393.js +4 -0
  9. package/dist/{chunk-h6a9nyz3.js.map → chunk-33r34393.js.map} +1 -1
  10. package/dist/{chunk-3kyzvpxm.js → chunk-3rne5hgg.js} +2 -2
  11. package/dist/{chunk-3kyzvpxm.js.map → chunk-3rne5hgg.js.map} +1 -1
  12. package/dist/{chunk-7rpnpk1z.js → chunk-7ay7yt2j.js} +2 -2
  13. package/dist/{chunk-7rpnpk1z.js.map → chunk-7ay7yt2j.js.map} +1 -1
  14. package/dist/chunk-7c0ker8f.js +4 -0
  15. package/dist/chunk-7c0ker8f.js.map +10 -0
  16. package/dist/chunk-90wq9bk4.js +4 -0
  17. package/dist/{chunk-33nha0s0.js.map → chunk-90wq9bk4.js.map} +2 -2
  18. package/dist/chunk-a2b9d074.js +41 -0
  19. package/dist/{chunk-jf4cn9js.js.map → chunk-a2b9d074.js.map} +5 -6
  20. package/dist/chunk-ar7jn8qf.js +11 -0
  21. package/dist/{chunk-q9cmjch9.js.map → chunk-ar7jn8qf.js.map} +5 -5
  22. package/dist/chunk-b5mhzpz2.js +5 -0
  23. package/dist/{chunk-stmtmnqh.js.map → chunk-b5mhzpz2.js.map} +5 -5
  24. package/dist/chunk-bcyqtgcc.js +8 -0
  25. package/dist/{chunk-vwh3ggkh.js.map → chunk-bcyqtgcc.js.map} +2 -2
  26. package/dist/{chunk-cj0fmywk.js → chunk-bfmx3ept.js} +2 -2
  27. package/dist/{chunk-cj0fmywk.js.map → chunk-bfmx3ept.js.map} +1 -1
  28. package/dist/chunk-gw1yyfk8.js +5 -0
  29. package/dist/{chunk-90qqbngb.js.map → chunk-gw1yyfk8.js.map} +6 -6
  30. package/dist/chunk-j7rp9bfr.js +4 -0
  31. package/dist/{chunk-wzax4kjq.js.map → chunk-j7rp9bfr.js.map} +2 -2
  32. package/dist/{chunk-hkysyhdx.js → chunk-k8xgjdj1.js} +3 -3
  33. package/dist/{chunk-hkysyhdx.js.map → chunk-k8xgjdj1.js.map} +1 -1
  34. package/dist/chunk-mjw9eypm.js +13 -0
  35. package/dist/{chunk-s6b848wp.js.map → chunk-mjw9eypm.js.map} +5 -5
  36. package/dist/{chunk-6q78ag9e.js → chunk-mqdg2jq8.js} +3 -3
  37. package/dist/{chunk-6q78ag9e.js.map → chunk-mqdg2jq8.js.map} +1 -1
  38. package/dist/{chunk-ndhecb99.js → chunk-qnpctk8n.js} +2 -2
  39. package/dist/{chunk-ndhecb99.js.map → chunk-qnpctk8n.js.map} +1 -1
  40. package/dist/{chunk-fx6rsjzz.js → chunk-qyg03m1k.js} +3 -3
  41. package/dist/{chunk-fx6rsjzz.js.map → chunk-qyg03m1k.js.map} +1 -1
  42. package/dist/chunk-s8071mrg.js +4 -0
  43. package/dist/{chunk-4b3akwfv.js.map → chunk-s8071mrg.js.map} +5 -5
  44. package/dist/chunk-smxwz2cj.js +4 -0
  45. package/dist/{chunk-qywtzrf0.js.map → chunk-smxwz2cj.js.map} +5 -5
  46. package/dist/chunk-tcrnsk8p.js +4 -0
  47. package/dist/{chunk-2nrspkzr.js.map → chunk-tcrnsk8p.js.map} +2 -2
  48. package/dist/{chunk-spw59mrv.js → chunk-vxyr3gq3.js} +2 -2
  49. package/dist/{chunk-spw59mrv.js.map → chunk-vxyr3gq3.js.map} +1 -1
  50. package/dist/chunk-w8j4rmwj.js +4 -0
  51. package/dist/{chunk-ean0tyqg.js.map → chunk-w8j4rmwj.js.map} +2 -2
  52. package/dist/chunk-wr4ks2dq.js +4 -0
  53. package/dist/{chunk-4n2ggg2n.js.map → chunk-wr4ks2dq.js.map} +2 -2
  54. package/dist/chunk-ycjpgm9z.js +4 -0
  55. package/dist/{chunk-n5bvdddm.js.map → chunk-ycjpgm9z.js.map} +2 -2
  56. package/dist/{chunk-6vc15rqe.js → chunk-z1j6j14y.js} +2 -2
  57. package/dist/{chunk-6vc15rqe.js.map → chunk-z1j6j14y.js.map} +3 -3
  58. package/dist/email/index.js +2 -2
  59. package/dist/email/index.js.map +1 -1
  60. package/dist/facades/index.js +3 -3
  61. package/dist/facades/index.js.map +1 -1
  62. package/dist/http/Controller.d.ts.map +1 -1
  63. package/dist/http/index.js +2 -2
  64. package/dist/http/index.js.map +3 -3
  65. package/dist/kernel/index.js +2 -2
  66. package/dist/kernel/index.js.map +1 -1
  67. package/dist/server/index.js +2 -2
  68. package/dist/server/index.js.map +1 -1
  69. package/dist/services/index.js +52 -63
  70. package/dist/services/index.js.map +5 -16
  71. package/dist/services/router/ViewRouterServiceContainer.d.ts.map +1 -1
  72. package/package.json +2 -2
  73. package/dist/chunk-0v0x0g72.js +0 -3
  74. package/dist/chunk-0v0x0g72.js.map +0 -15
  75. package/dist/chunk-2nrspkzr.js +0 -4
  76. package/dist/chunk-33nha0s0.js +0 -4
  77. package/dist/chunk-4b3akwfv.js +0 -4
  78. package/dist/chunk-4n2ggg2n.js +0 -4
  79. package/dist/chunk-90qqbngb.js +0 -5
  80. package/dist/chunk-ean0tyqg.js +0 -4
  81. package/dist/chunk-h6a9nyz3.js +0 -4
  82. package/dist/chunk-jf4cn9js.js +0 -41
  83. package/dist/chunk-n5bvdddm.js +0 -4
  84. package/dist/chunk-q9cmjch9.js +0 -11
  85. package/dist/chunk-qywtzrf0.js +0 -4
  86. package/dist/chunk-s6b848wp.js +0 -13
  87. package/dist/chunk-stmtmnqh.js +0 -5
  88. package/dist/chunk-vwh3ggkh.js +0 -8
  89. package/dist/chunk-wzax4kjq.js +0 -4
@@ -1 +1 @@
1
- {"version":3,"file":"ViewRouterServiceContainer.d.ts","sourceRoot":"","sources":["../../../services/router/ViewRouterServiceContainer.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,YAAY,CAAC;AAKzC,OAAO,EAEL,cAAc,EAEf,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC;AAOxE,OAAO,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AAKvD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AAQxD,qBAAa,0BAA2B,SAAQ,gBAAgB;IAS3C,OAAO,EAAE,yBAAyB;IARrD,MAAM,CAAC,KAAK,SAAgC;IAE5C,cAAc,EAAE,cAAc,CAAM;IACpC,aAAa,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC,CAAM;IAC7C,aAAa,EAAE,aAAa,CAAM;IAClC,iBAAiB,EAAE,MAAM,EAAE,CAAM;IACjC,IAAI,EAAE,GAAG,CAAQ;gBAEE,OAAO,EAAE,yBAAyB;IAarD,IAAI;IAEJ,OAAO,CAAC,yBAAyB;IAW3B,YAAY,CAAC,GAAG,EAAE,WAAW;YAarB,MAAM;IA6Fd,iBAAiB,CAAC,GAAG,EAAE,OAAO,gCAxCZ;QACpB,SAAS,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,KAAK,OAAO,CAAC,GAAG,EAAE,CAAC,CAAC;QAC3C,aAAa,EAAE,GAAG,CAAC;QACnB,gBAAgB,EAAE,MAAM,EAAE,CAAC;QAC3B,OAAO,EAAE,MAAM,CAAC;QAChB,WAAW,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC,CAAC;KACvC;CA8MJ"}
1
+ {"version":3,"file":"ViewRouterServiceContainer.d.ts","sourceRoot":"","sources":["../../../services/router/ViewRouterServiceContainer.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,YAAY,CAAC;AAKzC,OAAO,EAEL,cAAc,EAEf,MAAM,wBAAwB,CAAC;AAChC,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC;AAOxE,OAAO,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AAKvD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AAQxD,qBAAa,0BAA2B,SAAQ,gBAAgB;IAS3C,OAAO,EAAE,yBAAyB;IARrD,MAAM,CAAC,KAAK,SAAgC;IAE5C,cAAc,EAAE,cAAc,CAAM;IACpC,aAAa,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC,CAAM;IAC7C,aAAa,EAAE,aAAa,CAAM;IAClC,iBAAiB,EAAE,MAAM,EAAE,CAAM;IACjC,IAAI,EAAE,GAAG,CAAQ;gBAEE,OAAO,EAAE,yBAAyB;IAarD,IAAI;IAEJ,OAAO,CAAC,yBAAyB;IAW3B,YAAY,CAAC,GAAG,EAAE,WAAW;YAarB,MAAM;IA6Fd,iBAAiB,CAAC,GAAG,EAAE,OAAO,gCAxCZ;QACpB,SAAS,EAAE,CAAC,CAAC,EAAE,MAAM,EAAE,KAAK,OAAO,CAAC,GAAG,EAAE,CAAC,CAAC;QAC3C,aAAa,EAAE,GAAG,CAAC;QACnB,gBAAgB,EAAE,MAAM,EAAE,CAAC;QAC3B,OAAO,EAAE,MAAM,CAAC;QAChB,WAAW,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC,CAAC;KACvC;CAiNJ"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "gemi",
3
- "version": "0.10.3",
3
+ "version": "0.10.4",
4
4
  "devDependencies": {
5
5
  "@babel/parser": "^7.25.4",
6
6
  "@repo/eslint-config": "*",
@@ -11,7 +11,7 @@
11
11
  "@types/react": "^19.0.2",
12
12
  "@types/react-dom": "^19.0.2",
13
13
  "eslint": "^8.57.0",
14
- "typescript": "^5.5.4",
14
+ "typescript": "^5.7.3",
15
15
  "vitest": "^1.6.0"
16
16
  },
17
17
  "bin": {
@@ -1,3 +0,0 @@
1
- class n extends Error{constructor(t,e=!0){let o,r=!0;if(typeof e==="boolean")o=void 0,r=e;else if(e!=null&&typeof e==="object")o=e.logger,r=e.tryNextLink??!0;super(t);this.name="ProviderError",this.tryNextLink=r,Object.setPrototypeOf(this,n.prototype),o?.debug?.(`@smithy/property-provider ${r?"->":"(!)"} ${t}`)}static from(t,e=!0){return Object.assign(new this(t.message,e),t)}}class u extends n{constructor(t,e=!0){super(t,e);this.name="CredentialsProviderError",Object.setPrototypeOf(this,u.prototype)}}class l extends n{constructor(t,e=!0){super(t,e);this.name="TokenProviderError",Object.setPrototypeOf(this,l.prototype)}}var v=(...t)=>async()=>{if(t.length===0)throw new n("No providers in chain");let e;for(let o of t)try{return await o()}catch(r){if(e=r,r?.tryNextLink)continue;throw r}throw e};var w=(t)=>()=>Promise.resolve(t);var b=(t,e,o)=>{let r,i,s,f=!1,a=async()=>{if(!i)i=t();try{r=await i,s=!0,f=!1}finally{i=void 0}return r};if(e===void 0)return async(c)=>{if(!s||c?.forceRefresh)r=await a();return r};return async(c)=>{if(!s||c?.forceRefresh)r=await a();if(f)return r;if(o&&!o(r))return f=!0,r;if(e(r))return await a(),r;return r}};export{n as mb,u as nb,l as ob,v as pb,w as qb,b as rb};
2
-
3
- //# debugId=6CFAD4A4F0FA556064756E2164756E21
@@ -1,15 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../node_modules/@smithy/property-provider/dist-es/ProviderError.js", "../../../node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js", "../../../node_modules/@smithy/property-provider/dist-es/TokenProviderError.js", "../../../node_modules/@smithy/property-provider/dist-es/chain.js", "../../../node_modules/@smithy/property-provider/dist-es/fromStatic.js", "../../../node_modules/@smithy/property-provider/dist-es/memoize.js"],
4
- "sourcesContent": [
5
- "export class ProviderError extends Error {\n constructor(message, options = true) {\n let logger;\n let tryNextLink = true;\n if (typeof options === \"boolean\") {\n logger = undefined;\n tryNextLink = options;\n }\n else if (options != null && typeof options === \"object\") {\n logger = options.logger;\n tryNextLink = options.tryNextLink ?? true;\n }\n super(message);\n this.name = \"ProviderError\";\n this.tryNextLink = tryNextLink;\n Object.setPrototypeOf(this, ProviderError.prototype);\n logger?.debug?.(`@smithy/property-provider ${tryNextLink ? \"->\" : \"(!)\"} ${message}`);\n }\n static from(error, options = true) {\n return Object.assign(new this(error.message, options), error);\n }\n}\n",
6
- "import { ProviderError } from \"./ProviderError\";\nexport class CredentialsProviderError extends ProviderError {\n constructor(message, options = true) {\n super(message, options);\n this.name = \"CredentialsProviderError\";\n Object.setPrototypeOf(this, CredentialsProviderError.prototype);\n }\n}\n",
7
- "import { ProviderError } from \"./ProviderError\";\nexport class TokenProviderError extends ProviderError {\n constructor(message, options = true) {\n super(message, options);\n this.name = \"TokenProviderError\";\n Object.setPrototypeOf(this, TokenProviderError.prototype);\n }\n}\n",
8
- "import { ProviderError } from \"./ProviderError\";\nexport const chain = (...providers) => async () => {\n if (providers.length === 0) {\n throw new ProviderError(\"No providers in chain\");\n }\n let lastProviderError;\n for (const provider of providers) {\n try {\n const credentials = await provider();\n return credentials;\n }\n catch (err) {\n lastProviderError = err;\n if (err?.tryNextLink) {\n continue;\n }\n throw err;\n }\n }\n throw lastProviderError;\n};\n",
9
- "export const fromStatic = (staticValue) => () => Promise.resolve(staticValue);\n",
10
- "export const memoize = (provider, isExpired, requiresRefresh) => {\n let resolved;\n let pending;\n let hasResult;\n let isConstant = false;\n const coalesceProvider = async () => {\n if (!pending) {\n pending = provider();\n }\n try {\n resolved = await pending;\n hasResult = true;\n isConstant = false;\n }\n finally {\n pending = undefined;\n }\n return resolved;\n };\n if (isExpired === undefined) {\n return async (options) => {\n if (!hasResult || options?.forceRefresh) {\n resolved = await coalesceProvider();\n }\n return resolved;\n };\n }\n return async (options) => {\n if (!hasResult || options?.forceRefresh) {\n resolved = await coalesceProvider();\n }\n if (isConstant) {\n return resolved;\n }\n if (requiresRefresh && !requiresRefresh(resolved)) {\n isConstant = true;\n return resolved;\n }\n if (isExpired(resolved)) {\n await coalesceProvider();\n return resolved;\n }\n return resolved;\n };\n};\n"
11
- ],
12
- "mappings": "AAAO,MAAM,UAAsB,KAAM,CACrC,WAAW,CAAC,EAAS,EAAU,GAAM,CACjC,IAAI,EACA,EAAc,GAClB,UAAW,IAAY,UACnB,EAAS,OACT,EAAc,UAET,GAAW,aAAe,IAAY,SAC3C,EAAS,EAAQ,OACjB,EAAc,EAAQ,aAAe,GAEzC,MAAM,CAAO,EACb,KAAK,KAAO,gBACZ,KAAK,YAAc,EACnB,OAAO,eAAe,KAAM,EAAc,SAAS,EACnD,GAAQ,QAAQ,6BAA6B,EAAc,KAAO,SAAS,GAAS,QAEjF,KAAI,CAAC,EAAO,EAAU,GAAM,CAC/B,OAAO,OAAO,OAAO,IAAI,KAAK,EAAM,QAAS,CAAO,EAAG,CAAK,EAEpE,CCpBO,MAAM,UAAiC,CAAc,CACxD,WAAW,CAAC,EAAS,EAAU,GAAM,CACjC,MAAM,EAAS,CAAO,EACtB,KAAK,KAAO,2BACZ,OAAO,eAAe,KAAM,EAAyB,SAAS,EAEtE,CCNO,MAAM,UAA2B,CAAc,CAClD,WAAW,CAAC,EAAS,EAAU,GAAM,CACjC,MAAM,EAAS,CAAO,EACtB,KAAK,KAAO,qBACZ,OAAO,eAAe,KAAM,EAAmB,SAAS,EAEhE,CCNO,IAAM,EAAQ,IAAI,IAAc,SAAY,CAC/C,GAAI,EAAU,SAAW,EACrB,MAAM,IAAI,EAAc,uBAAuB,EAEnD,IAAI,EACJ,QAAW,KAAY,EACnB,GAAI,CAEA,OADoB,MAAM,EAAS,QAGhC,EAAP,CAEI,GADA,EAAoB,EAChB,GAAK,YACL,SAEJ,MAAM,EAGd,MAAM,GCnBH,IAAM,EAAa,CAAC,IAAgB,IAAM,QAAQ,QAAQ,CAAW,ECArE,IAAM,EAAU,CAAC,EAAU,EAAW,IAAoB,CAC7D,IAAI,EACA,EACA,EACA,EAAa,GACX,EAAmB,SAAY,CACjC,IAAK,EACD,EAAU,EAAS,EAEvB,GAAI,CACA,EAAW,MAAM,EACjB,EAAY,GACZ,EAAa,UAEjB,CACI,EAAU,OAEd,OAAO,GAEX,GAAI,IAAc,OACd,MAAO,OAAO,IAAY,CACtB,IAAK,GAAa,GAAS,aACvB,EAAW,MAAM,EAAiB,EAEtC,OAAO,GAGf,MAAO,OAAO,IAAY,CACtB,IAAK,GAAa,GAAS,aACvB,EAAW,MAAM,EAAiB,EAEtC,GAAI,EACA,OAAO,EAEX,GAAI,IAAoB,EAAgB,CAAQ,EAE5C,OADA,EAAa,GACN,EAEX,GAAI,EAAU,CAAQ,EAElB,OADA,MAAM,EAAiB,EAChB,EAEX,OAAO",
13
- "debugId": "6CFAD4A4F0FA556064756E2164756E21",
14
- "names": []
15
- }
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{$ as Ie,A as Qe,B as V,C as N,D as f,E as g,F as Xe,G as he,H as ue,I as we,J as be,K as Ye,L as Ze,N as ns,O as ds,P as je,Q as xe,R as ve,S as Te,T as ke,U as He,V as x,W as Re,X as Ee,Y as qe,Z as Se,_ as Je,r as U,s as _,t as Le,u as Me,v as We,w as Ae,z as B}from"./chunk-jf4cn9js.js";import{aa as l,ba as de}from"./chunk-4b3akwfv.js";import{$a as es,Aa as as,Ba as k,Ga as z,Ha as fe,Ia as h,Pa as Ge,Qa as u,Ra as ge,Sa as ye,Ta as me,Ua as $e,Va as Pe,Ya as c,Za as y,ca as Ue,da as _e,ja as se,la as te,ma as re,oa as Ke,pa as ae,qa as ne,ta as le,ua as pe}from"./chunk-s6b848wp.js";import"./chunk-3kyzvpxm.js";import"./chunk-7rpnpk1z.js";import"./chunk-0v0x0g72.js";import"./chunk-6q78ag9e.js";import"./chunk-fx6rsjzz.js";import{ac as i}from"./chunk-spw59mrv.js";var p=i(B(),1);var $=i(x(),1);var P=async(e,s,t)=>{return{operation:U(s).operation,region:await _(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};function ps(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(s,t)=>({signingProperties:{config:s,context:t}})}}function b(e){return{schemeId:"smithy.api#noAuth"}}var J=(e)=>{let s=[];switch(e.operation){case"GetRoleCredentials":{s.push(b(e));break}case"ListAccountRoles":{s.push(b(e));break}case"ListAccounts":{s.push(b(e));break}case"Logout":{s.push(b(e));break}default:s.push(ps(e))}return s},I=(e)=>{return{...$.resolveAwsSdkSigV4Config(e)}};var C=(e)=>{return{...e,useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}},L={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var M={name:"@aws-sdk/client-sso",description:"AWS SDK for JavaScript Sso Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sso","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sso"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sso",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sso"}};var ze=i(x(),1);var oe=i(x(),1),ce=i(B(),1);var W={["required"]:!1,type:"String"},A={["required"]:!0,default:!1,type:"Boolean"},K={["ref"]:"Endpoint"},T={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseFIPS"},!0]},H={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseDualStack"},!0]},d={},Q={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},O={["ref"]:"PartitionResult"},X={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[O,"supportsDualStack"]}]},Y=[T],Z=[H],j=[{["ref"]:"Region"}],ms={version:"1.0",parameters:{Region:W,UseDualStack:A,UseFIPS:A,Endpoint:W},rules:[{conditions:[{["fn"]:"isSet",["argv"]:[K]}],rules:[{conditions:Y,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:"error"},{conditions:Z,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:"error"},{endpoint:{url:K,properties:d,headers:d},type:"endpoint"}],type:"tree"},{conditions:[{["fn"]:"isSet",["argv"]:j}],rules:[{conditions:[{["fn"]:"aws.partition",["argv"]:j,assign:"PartitionResult"}],rules:[{conditions:[T,H],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,Q]},X],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:"error"}],type:"tree"},{conditions:Y,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[Q,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[O,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:d,headers:d},type:"endpoint"},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",type:"error"}],type:"tree"},{conditions:Z,rules:[{conditions:[X],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",type:"error"}],type:"tree"},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"}],type:"tree"},{error:"Invalid Configuration: Missing Region",type:"error"}]},G=ms;var hs=new V({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ee=(e,s={})=>{return hs.get(e,()=>f(G,{endpointParams:e,logger:s.logger}))};N.aws=g;var ie=(e)=>{return{apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??ae,base64Encoder:e?.base64Encoder??ne,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??ee,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??J,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(s)=>s.getIdentityProvider("aws.auth#sigv4"),signer:new oe.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(s)=>s.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ce.NoAuthSigner}],logger:e?.logger??new re,serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??de,utf8Decoder:e?.utf8Decoder??se,utf8Encoder:e?.utf8Encoder??te}};var De=(e)=>{me(process.version);let s=Se(e),t=()=>s().then(ye),r=ie(e);return ze.emitWarningIfUnsupportedVersion(process.version),{...r,...e,runtime:"node",defaultsMode:s,bodyLengthChecker:e?.bodyLengthChecker??qe,defaultUserAgentProvider:e?.defaultUserAgentProvider??Re({serviceId:r.serviceId,clientVersion:M.version}),maxAttempts:e?.maxAttempts??l(ve),region:e?.region??l(we,be),requestHandler:le.create(e?.requestHandler??t),retryMode:e?.retryMode??l({...ke,default:async()=>(await t()).retryMode||xe}),sha256:e?.sha256??Ee.bind(null,"sha256"),streamCollector:e?.streamCollector??pe,useDualstackEndpoint:e?.useDualstackEndpoint??l(he),useFipsEndpoint:e?.useFipsEndpoint??l(ue)}};var Be=(e)=>{let{httpAuthSchemes:s,httpAuthSchemeProvider:t,credentials:r}=e;return{setHttpAuthScheme(a){let n=s.findIndex((D)=>D.schemeId===a.schemeId);if(n===-1)s.push(a);else s.splice(n,1,a)},httpAuthSchemes(){return s},setHttpAuthSchemeProvider(a){t=a},httpAuthSchemeProvider(){return t},setCredentials(a){r=a},credentials(){return r}}},Fe=(e)=>{return{httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}};var v=(e)=>e,Ce=(e,s)=>{let t={...v(Je(e)),...v($e(e)),...v(Ue(e)),...v(Be(e))};return s.forEach((r)=>r.configure(t)),{...e,...Ie(t),...Pe(t),..._e(t),...Fe(t)}};class Oe extends Ke{constructor(...[e]){let s=De(e||{}),t=C(s),r=Qe(t),a=Te(r),n=Ye(a),D=Le(n),cs=je(D),is=I(cs),F=Ce(is,e?.extensions||[]);super(F);this.config=F,this.middlewareStack.use(Xe(this.config)),this.middlewareStack.use(He(this.config)),this.middlewareStack.use(Ze(this.config)),this.middlewareStack.use(Me(this.config)),this.middlewareStack.use(We(this.config)),this.middlewareStack.use(Ae(this.config)),this.middlewareStack.use(p.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:P,identityProviderConfigProvider:async(ls)=>new p.DefaultIdentityProviderConfig({"aws.auth#sigv4":ls.credentials})})),this.middlewareStack.use(p.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class o extends Ge{constructor(e){super(e);Object.setPrototypeOf(this,o.prototype)}}class R extends o{constructor(e){super({name:"InvalidRequestException",$fault:"client",...e});this.name="InvalidRequestException",this.$fault="client",Object.setPrototypeOf(this,R.prototype)}}class E extends o{constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e});this.name="ResourceNotFoundException",this.$fault="client",Object.setPrototypeOf(this,E.prototype)}}class q extends o{constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e});this.name="TooManyRequestsException",this.$fault="client",Object.setPrototypeOf(this,q.prototype)}}class S extends o{constructor(e){super({name:"UnauthorizedException",$fault:"client",...e});this.name="UnauthorizedException",this.$fault="client",Object.setPrototypeOf(this,S.prototype)}}var Ve=(e)=>({...e,...e.accessToken&&{accessToken:k}}),us=(e)=>({...e,...e.secretAccessKey&&{secretAccessKey:k},...e.sessionToken&&{sessionToken:k}}),Ne=(e)=>({...e,...e.roleCredentials&&{roleCredentials:us(e.roleCredentials)}});var m=i(x(),1),ss=i(B(),1);var ts=async(e,s)=>{let t=ss.requestBuilder(e,s),r=c({},Es,{[Fs]:e[Ss]});t.bp("/federation/credentials");let a=c({[Bs]:[,z(e[Ds],"roleName")],[zs]:[,z(e[qs],"accountId")]}),n;return t.m("GET").h(r).q(a).b(n),t.build()};var rs=async(e,s)=>{if(e.statusCode!==200&&e.statusCode>=300)return ws(e,s);let t=c({$metadata:w(e)}),r=z(fe(await m.parseJsonBody(e.body,s)),"body"),a=y(r,{roleCredentials:es});return Object.assign(t,a),t};var ws=async(e,s)=>{let t={...e,body:await m.parseJsonErrorBody(e.body,s)},r=m.loadRestJsonErrorCode(e,t.body);switch(r){case"InvalidRequestException":case"com.amazonaws.sso#InvalidRequestException":throw await xs(t,s);case"ResourceNotFoundException":case"com.amazonaws.sso#ResourceNotFoundException":throw await vs(t,s);case"TooManyRequestsException":case"com.amazonaws.sso#TooManyRequestsException":throw await ks(t,s);case"UnauthorizedException":case"com.amazonaws.sso#UnauthorizedException":throw await Rs(t,s);default:let a=t.body;return bs({output:e,parsedBody:a,errorCode:r})}},bs=ge(o),xs=async(e,s)=>{let t=c({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);let n=new R({$metadata:w(e),...t});return u(n,e.body)},vs=async(e,s)=>{let t=c({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);let n=new E({$metadata:w(e),...t});return u(n,e.body)},ks=async(e,s)=>{let t=c({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);let n=new q({$metadata:w(e),...t});return u(n,e.body)},Rs=async(e,s)=>{let t=c({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);let n=new S({$metadata:w(e),...t});return u(n,e.body)},w=(e)=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]});var Es=(e)=>e!==void 0&&e!==null&&e!==""&&(!Object.getOwnPropertyNames(e).includes("length")||e.length!=0)&&(!Object.getOwnPropertyNames(e).includes("size")||e.size!=0),qs="accountId",Ss="accessToken",zs="account_id";var Ds="roleName",Bs="role_name",Fs="x-amz-sso_bearer_token";class os extends as.classBuilder().ep(L).m(function(e,s,t,r){return[ns(t,this.serialize,this.deserialize),ds(t,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").f(Ve,Ne).ser(ts).de(rs).build(){}export{Oe as SSOClient,os as GetRoleCredentialsCommand};
3
-
4
- //# debugId=D16750C77CC7009A64756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{nb as E}from"./chunk-0v0x0g72.js";import"./chunk-spw59mrv.js";var _="AWS_ACCESS_KEY_ID",S="AWS_SECRET_ACCESS_KEY",p="AWS_SESSION_TOKEN",A="AWS_CREDENTIAL_EXPIRATION",C="AWS_CREDENTIAL_SCOPE",N="AWS_ACCOUNT_ID",a=(e)=>async()=>{e?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");let o=process.env[_],r=process.env[S],n=process.env[p],s=process.env[A],t=process.env[C],c=process.env[N];if(o&&r)return{accessKeyId:o,secretAccessKey:r,...n&&{sessionToken:n},...s&&{expiration:new Date(s)},...t&&{credentialScope:t},...c&&{accountId:c}};throw new E("Unable to find environment variable credentials.",{logger:e?.logger})};export{a as fromEnv,p as ENV_SESSION,S as ENV_SECRET,_ as ENV_KEY,A as ENV_EXPIRATION,C as ENV_CREDENTIAL_SCOPE,N as ENV_ACCOUNT_ID};export{_ as jb,S as kb,a as lb};
3
-
4
- //# debugId=A2EA4A0F23BA788F64756E2164756E21
@@ -1,4 +0,0 @@
1
- import{bb as d,fb as g}from"./chunk-3kyzvpxm.js";import{nb as s,pb as y,qb as u,rb as C}from"./chunk-0v0x0g72.js";function c(o){try{let r=new Set(Array.from(o.match(/([A-Z_]){3,}/g)??[]));return r.delete("CONFIG"),r.delete("CONFIG_PREFIX_SEPARATOR"),r.delete("ENV"),[...r].join(", ")}catch(r){return o}}var l=(o,r)=>async()=>{try{let t=o(process.env);if(t===void 0)throw new Error;return t}catch(t){throw new s(t.message||`Not found in ENV: ${c(o.toString())}`,{logger:r})}};var h=(o,{preferredFile:r="config",...t}={})=>async()=>{let e=d(t),{configFile:n,credentialsFile:i}=await g(t),f=i[e]||{},m=n[e]||{},S=r==="config"?{...f,...m}:{...m,...f};try{let p=o(S,r==="config"?n:i);if(p===void 0)throw new Error;return p}catch(a){throw new s(a.message||`Not found in config files w/ profile [${e}]: ${c(o.toString())}`,{logger:t.logger})}};var E=(o)=>typeof o==="function",w=(o)=>E(o)?async()=>await o():u(o);var k=({environmentVariableSelector:o,configFileSelector:r,default:t},e={})=>C(y(l(o),h(r,e),w(t)));function F(o){let r={};if(o=o.replace(/^\?/,""),o)for(let t of o.split("&")){let[e,n=null]=t.split("=");if(e=decodeURIComponent(e),n)n=decodeURIComponent(n);if(!(e in r))r[e]=n;else if(Array.isArray(r[e]))r[e].push(n);else r[e]=[r[e],n]}return r}var N=(o)=>{if(typeof o==="string")return N(new URL(o));let{hostname:r,pathname:t,port:e,protocol:n,search:i}=o,f;if(i)f=F(i);return{hostname:r,port:e?parseInt(e):void 0,protocol:n,path:t,query:f}};
2
- export{k as aa,N as ba};
3
-
4
- //# debugId=5DF22163EEF0776164756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{q as Xh}from"./chunk-q9cmjch9.js";import{$ as E0,A as Q0,B as Ml,C as zl,D as Nl,E as Wl,F as X0,G as xl,H as il,I as cl,J as el,K as Y0,L as Z0,N as F,O as B,P as $0,Q as pl,R as nl,S as V0,T as ol,U as P0,V as Gh,W as ul,X as tl,Y as h0,Z as l0,_ as D0,r as Gl,s as Il,t as K0,u as F0,v as B0,w as U0,z as Qh}from"./chunk-jf4cn9js.js";import{aa as f,ba as sl}from"./chunk-4b3akwfv.js";import{Aa as K,Ba as Sh,Ca as hw,Ga as R0,Ia as H,Ka as u,Na as j0,Pa as q0,Qa as T,Ra as a0,Sa as Ol,Ta as gl,Ua as m0,Va as J0,Wa as eh,ca as S0,da as H0,ea as L0,ja as Al,la as Ll,ma as Rl,oa as y0,pa as jl,qa as al,ta as fl,ua as Cl}from"./chunk-s6b848wp.js";import"./chunk-3kyzvpxm.js";import"./chunk-7rpnpk1z.js";import"./chunk-33nha0s0.js";import"./chunk-0v0x0g72.js";import"./chunk-6q78ag9e.js";import"./chunk-fx6rsjzz.js";import{ac as b}from"./chunk-spw59mrv.js";var C=b(Qh(),1);var dl=b(Gh(),1);var Sl=async(h,w,l)=>{return{operation:Gl(w).operation,region:await Il(h.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};function Ew(h){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:h.region},propertiesExtractor:(w,l)=>({signingProperties:{config:w,context:l}})}}function wl(h){return{schemeId:"smithy.api#noAuth"}}var Hl=(h)=>{let w=[];switch(h.operation){case"AssumeRoleWithSAML":{w.push(wl(h));break}case"AssumeRoleWithWebIdentity":{w.push(wl(h));break}default:w.push(Ew(h))}return w},kw=(h)=>({...h,stsClientCtor:A}),ml=(h)=>{let w=kw(h);return{...dl.resolveAwsSdkSigV4Config(w)}};var Jl=(h)=>{return{...h,useDualstackEndpoint:h.useDualstackEndpoint??!1,useFipsEndpoint:h.useFipsEndpoint??!1,useGlobalEndpoint:h.useGlobalEndpoint??!1,defaultSigningName:"sts"}},D={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var Dl={name:"@aws-sdk/client-sts",description:"AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sts","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"rimraf ./dist-types tsconfig.types.tsbuildinfo && tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sts",test:"yarn test:unit","test:unit":"jest"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/client-sso-oidc":"3.654.0","@aws-sdk/core":"3.654.0","@aws-sdk/credential-provider-node":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sts",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sts"}};var Ih=b(Gh(),1);var w0=b(Qh(),1);var rl=b(Gh(),1),_l=b(Qh(),1);var El={["required"]:!1,["type"]:"String"},yh={["required"]:!0,default:!1,["type"]:"Boolean"},Yl={["ref"]:"Endpoint"},kl={["fn"]:"isSet",["argv"]:[{["ref"]:"Region"}]},J={["ref"]:"Region"},Kl={["fn"]:"aws.partition",["argv"]:[J],assign:"PartitionResult"},Zl={["ref"]:"UseFIPS"},$l={["ref"]:"UseDualStack"},E={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"us-east-1"}]},headers:{}},Y={},Fl={conditions:[{["fn"]:"stringEquals",["argv"]:[J,"aws-global"]}],["endpoint"]:E,["type"]:"endpoint"},Vl={["fn"]:"booleanEquals",["argv"]:[Zl,!0]},Pl={["fn"]:"booleanEquals",["argv"]:[$l,!0]},Bl={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},ql={["ref"]:"PartitionResult"},Ul={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[ql,"supportsDualStack"]}]},yl=[{["fn"]:"isSet",["argv"]:[Yl]}],Ql=[Vl],Xl=[Pl],Fw={version:"1.0",parameters:{Region:El,UseDualStack:yh,UseFIPS:yh,Endpoint:El,UseGlobalEndpoint:yh},rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseGlobalEndpoint"},!0]},{["fn"]:"not",["argv"]:yl},kl,Kl,{["fn"]:"booleanEquals",["argv"]:[Zl,!1]},{["fn"]:"booleanEquals",["argv"]:[$l,!1]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-northeast-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-south-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-southeast-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-southeast-2"]}],endpoint:E,["type"]:"endpoint"},Fl,{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ca-central-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-central-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-north-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-2"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-3"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"sa-east-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-east-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-east-2"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-west-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-west-2"]}],endpoint:E,["type"]:"endpoint"},{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"{Region}"}]},headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{conditions:yl,rules:[{conditions:Ql,error:"Invalid Configuration: FIPS and custom endpoint are not supported",["type"]:"error"},{conditions:Xl,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",["type"]:"error"},{endpoint:{url:Yl,properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{conditions:[kl],rules:[{conditions:[Kl],rules:[{conditions:[Vl,Pl],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,Bl]},Ul],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",["type"]:"error"}],["type"]:"tree"},{conditions:Ql,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[Bl,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[ql,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:Y,headers:Y},["type"]:"endpoint"},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",["type"]:"error"}],["type"]:"tree"},{conditions:Xl,rules:[{conditions:[Ul],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",["type"]:"error"}],["type"]:"tree"},Fl,{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"}],["type"]:"tree"},{error:"Invalid Configuration: Missing Region",["type"]:"error"}]},vl=Fw;var Bw=new Ml({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),Tl=(h,w={})=>{return Bw.get(h,()=>Nl(vl,{endpointParams:h,logger:w.logger}))};zl.aws=Wl;var bl=(h)=>{return{apiVersion:"2011-06-15",base64Decoder:h?.base64Decoder??jl,base64Encoder:h?.base64Encoder??al,disableHostPrefix:h?.disableHostPrefix??!1,endpointProvider:h?.endpointProvider??Tl,extensions:h?.extensions??[],httpAuthSchemeProvider:h?.httpAuthSchemeProvider??Hl,httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(w)=>w.getIdentityProvider("aws.auth#sigv4"),signer:new rl.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(w)=>w.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new _l.NoAuthSigner}],logger:h?.logger??new Rl,serviceId:h?.serviceId??"STS",urlParser:h?.urlParser??sl,utf8Decoder:h?.utf8Decoder??Al,utf8Encoder:h?.utf8Encoder??Ll}};var G0=(h)=>{gl(process.version);let w=l0(h),l=()=>w().then(Ol),G=bl(h);return Ih.emitWarningIfUnsupportedVersion(process.version),{...G,...h,runtime:"node",defaultsMode:w,bodyLengthChecker:h?.bodyLengthChecker??h0,credentialDefaultProvider:h?.credentialDefaultProvider??Xh,defaultUserAgentProvider:h?.defaultUserAgentProvider??ul({serviceId:G.serviceId,clientVersion:Dl.version}),httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(I)=>I.getIdentityProvider("aws.auth#sigv4")||(async(S)=>await Xh(S?.__config||{})()),signer:new Ih.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(I)=>I.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new w0.NoAuthSigner}],maxAttempts:h?.maxAttempts??f(nl),region:h?.region??f(cl,el),requestHandler:fl.create(h?.requestHandler??l),retryMode:h?.retryMode??f({...ol,default:async()=>(await l()).retryMode||pl}),sha256:h?.sha256??tl.bind(null,"sha256"),streamCollector:h?.streamCollector??Cl,useDualstackEndpoint:h?.useDualstackEndpoint??f(xl),useFipsEndpoint:h?.useFipsEndpoint??f(il)}};var I0=(h)=>{let{httpAuthSchemes:w,httpAuthSchemeProvider:l,credentials:G}=h;return{setHttpAuthScheme(I){let S=w.findIndex((d)=>d.schemeId===I.schemeId);if(S===-1)w.push(I);else w.splice(S,1,I)},httpAuthSchemes(){return w},setHttpAuthSchemeProvider(I){l=I},httpAuthSchemeProvider(){return l},setCredentials(I){G=I},credentials(){return G}}},d0=(h)=>{return{httpAuthSchemes:h.httpAuthSchemes(),httpAuthSchemeProvider:h.httpAuthSchemeProvider(),credentials:h.credentials()}};var dh=(h)=>h,k0=(h,w)=>{let l={...dh(D0(h)),...dh(m0(h)),...dh(S0(h)),...dh(I0(h))};return w.forEach((G)=>G.configure(l)),{...h,...E0(l),...J0(l),...H0(l),...d0(l)}};class A extends y0{constructor(...[h]){let w=G0(h||{}),l=Jl(w),G=Q0(l),I=V0(G),S=Y0(I),d=K0(S),X=$0(d),M=ml(X),q=k0(M,h?.extensions||[]);super(q);this.config=q,this.middlewareStack.use(X0(this.config)),this.middlewareStack.use(P0(this.config)),this.middlewareStack.use(Z0(this.config)),this.middlewareStack.use(F0(this.config)),this.middlewareStack.use(B0(this.config)),this.middlewareStack.use(U0(this.config)),this.middlewareStack.use(C.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Sl,identityProviderConfigProvider:async(n)=>new C.DefaultIdentityProviderConfig({"aws.auth#sigv4":n.credentials})})),this.middlewareStack.use(C.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class Q extends q0{constructor(h){super(h);Object.setPrototypeOf(this,Q.prototype)}}class Hh extends Q{constructor(h){super({name:"ExpiredTokenException",$fault:"client",...h});this.name="ExpiredTokenException",this.$fault="client",Object.setPrototypeOf(this,Hh.prototype)}}class mh extends Q{constructor(h){super({name:"MalformedPolicyDocumentException",$fault:"client",...h});this.name="MalformedPolicyDocumentException",this.$fault="client",Object.setPrototypeOf(this,mh.prototype)}}class Jh extends Q{constructor(h){super({name:"PackedPolicyTooLargeException",$fault:"client",...h});this.name="PackedPolicyTooLargeException",this.$fault="client",Object.setPrototypeOf(this,Jh.prototype)}}class Dh extends Q{constructor(h){super({name:"RegionDisabledException",$fault:"client",...h});this.name="RegionDisabledException",this.$fault="client",Object.setPrototypeOf(this,Dh.prototype)}}class Eh extends Q{constructor(h){super({name:"IDPRejectedClaimException",$fault:"client",...h});this.name="IDPRejectedClaimException",this.$fault="client",Object.setPrototypeOf(this,Eh.prototype)}}class kh extends Q{constructor(h){super({name:"InvalidIdentityTokenException",$fault:"client",...h});this.name="InvalidIdentityTokenException",this.$fault="client",Object.setPrototypeOf(this,kh.prototype)}}class Kh extends Q{constructor(h){super({name:"IDPCommunicationErrorException",$fault:"client",...h});this.name="IDPCommunicationErrorException",this.$fault="client",Object.setPrototypeOf(this,Kh.prototype)}}class Fh extends Q{constructor(h){super({name:"InvalidAuthorizationMessageException",$fault:"client",...h});this.name="InvalidAuthorizationMessageException",this.$fault="client",Object.setPrototypeOf(this,Fh.prototype)}}var o=(h)=>({...h,...h.SecretAccessKey&&{SecretAccessKey:Sh}}),v0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),M0=(h)=>({...h,...h.SAMLAssertion&&{SAMLAssertion:Sh}}),z0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),N0=(h)=>({...h,...h.WebIdentityToken&&{WebIdentityToken:Sh}}),W0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),T0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),A0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}});var v=b(Gh(),1);var s0=async(h,w)=>{let l=j,G;return G=_({...Pw(h,w),[s]:lG,[r]:a}),R(w,l,"/",void 0,G)},r0=async(h,w)=>{let l=j,G;return G=_({...qw(h,w),[s]:wG,[r]:a}),R(w,l,"/",void 0,G)},_0=async(h,w)=>{let l=j,G;return G=_({...vw(h,w),[s]:GG,[r]:a}),R(w,l,"/",void 0,G)},b0=async(h,w)=>{let l=j,G;return G=_({...Mw(h,w),[s]:IG,[r]:a}),R(w,l,"/",void 0,G)},f0=async(h,w)=>{let l=j,G;return G=_({...zw(h,w),[s]:dG,[r]:a}),R(w,l,"/",void 0,G)},C0=async(h,w)=>{let l=j,G;return G=_({...Nw(h,w),[s]:SG,[r]:a}),R(w,l,"/",void 0,G)},O0=async(h,w)=>{let l=j,G;return G=_({...Ww(h,w),[s]:HG,[r]:a}),R(w,l,"/",void 0,G)},g0=async(h,w)=>{let l=j,G;return G=_({...Tw(h,w),[s]:mG,[r]:a}),R(w,l,"/",void 0,G)},x0=async(h,w)=>{if(h.statusCode>=300)return L(h,w);let l=await v.parseXmlBody(h.body,w),G={};return G=sw(l.AssumeRoleResult,w),{$metadata:k(h),...G}},i0=async(h,w)=>{if(h.statusCode>=300)return L(h,w);let l=await v.parseXmlBody(h.body,w),G={};return G=rw(l.AssumeRoleWithSAMLResult,w),{$metadata:k(h),...G}},c0=async(h,w)=>{if(h.statusCode>=300)return L(h,w);let l=await v.parseXmlBody(h.body,w),G={};return G=_w(l.AssumeRoleWithWebIdentityResult,w),{$metadata:k(h),...G}},e0=async(h,w)=>{if(h.statusCode>=300)return L(h,w);let l=await v.parseXmlBody(h.body,w),G={};return G=bw(l.DecodeAuthorizationMessageResult,w),{$metadata:k(h),...G}},p0=async(h,w)=>{if(h.statusCode>=300)return L(h,w);let l=await v.parseXmlBody(h.body,w),G={};return G=Ow(l.GetAccessKeyInfoResult,w),{$metadata:k(h),...G}},n0=async(h,w)=>{if(h.statusCode>=300)return L(h,w);let l=await v.parseXmlBody(h.body,w),G={};return G=gw(l.GetCallerIdentityResult,w),{$metadata:k(h),...G}},o0=async(h,w)=>{if(h.statusCode>=300)return L(h,w);let l=await v.parseXmlBody(h.body,w),G={};return G=xw(l.GetFederationTokenResult,w),{$metadata:k(h),...G}},u0=async(h,w)=>{if(h.statusCode>=300)return L(h,w);let l=await v.parseXmlBody(h.body,w),G={};return G=iw(l.GetSessionTokenResult,w),{$metadata:k(h),...G}},L=async(h,w)=>{let l={...h,body:await v.parseXmlErrorBody(h.body,w)},G=JG(h,l.body);switch(G){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await Uw(l,w);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await Zw(l,w);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await $w(l,w);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await Vw(l,w);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await Qw(l,w);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await Yw(l,w);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await yw(l,w);case"InvalidAuthorizationMessageException":case"com.amazonaws.sts#InvalidAuthorizationMessageException":throw await Xw(l,w);default:let I=l.body;return hG({output:h,parsedBody:I.Error,errorCode:G})}},Uw=async(h,w)=>{let l=h.body,G=fw(l.Error,w),I=new Hh({$metadata:k(h),...G});return T(I,l)},yw=async(h,w)=>{let l=h.body,G=cw(l.Error,w),I=new Kh({$metadata:k(h),...G});return T(I,l)},Qw=async(h,w)=>{let l=h.body,G=ew(l.Error,w),I=new Eh({$metadata:k(h),...G});return T(I,l)},Xw=async(h,w)=>{let l=h.body,G=pw(l.Error,w),I=new Fh({$metadata:k(h),...G});return T(I,l)},Yw=async(h,w)=>{let l=h.body,G=nw(l.Error,w),I=new kh({$metadata:k(h),...G});return T(I,l)},Zw=async(h,w)=>{let l=h.body,G=ow(l.Error,w),I=new mh({$metadata:k(h),...G});return T(I,l)},$w=async(h,w)=>{let l=h.body,G=uw(l.Error,w),I=new Jh({$metadata:k(h),...G});return T(I,l)},Vw=async(h,w)=>{let l=h.body,G=tw(l.Error,w),I=new Dh({$metadata:k(h),...G});return T(I,l)},Pw=(h,w)=>{let l={};if(h[W]!=null)l[W]=h[W];if(h[i]!=null)l[i]=h[i];if(h[$]!=null){let G=Bh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([I,S])=>{let d=`PolicyArns.${I}`;l[d]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];if(h[e]!=null){let G=t0(h[e],w);if(h[e]?.length===0)l.Tags=[];Object.entries(G).forEach(([I,S])=>{let d=`Tags.${I}`;l[d]=S})}if(h[Oh]!=null){let G=aw(h[Oh],w);if(h[Oh]?.length===0)l.TransitiveTagKeys=[];Object.entries(G).forEach(([I,S])=>{let d=`TransitiveTagKeys.${I}`;l[d]=S})}if(h[Ph]!=null)l[Ph]=h[Ph];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];if(h[P]!=null)l[P]=h[P];if(h[Rh]!=null){let G=Rw(h[Rh],w);if(h[Rh]?.length===0)l.ProvidedContexts=[];Object.entries(G).forEach(([I,S])=>{let d=`ProvidedContexts.${I}`;l[d]=S})}return l},qw=(h,w)=>{let l={};if(h[W]!=null)l[W]=h[W];if(h[Ah]!=null)l[Ah]=h[Ah];if(h[_h]!=null)l[_h]=h[_h];if(h[$]!=null){let G=Bh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([I,S])=>{let d=`PolicyArns.${I}`;l[d]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},vw=(h,w)=>{let l={};if(h[W]!=null)l[W]=h[W];if(h[i]!=null)l[i]=h[i];if(h[ih]!=null)l[ih]=h[ih];if(h[jh]!=null)l[jh]=h[jh];if(h[$]!=null){let G=Bh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([I,S])=>{let d=`PolicyArns.${I}`;l[d]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},Mw=(h,w)=>{let l={};if(h[qh]!=null)l[qh]=h[qh];return l},zw=(h,w)=>{let l={};if(h[O]!=null)l[O]=h[O];return l},Nw=(h,w)=>{return{}},Ww=(h,w)=>{let l={};if(h[Wh]!=null)l[Wh]=h[Wh];if(h[Z]!=null)l[Z]=h[Z];if(h[$]!=null){let G=Bh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([I,S])=>{let d=`PolicyArns.${I}`;l[d]=S})}if(h[y]!=null)l[y]=h[y];if(h[e]!=null){let G=t0(h[e],w);if(h[e]?.length===0)l.Tags=[];Object.entries(G).forEach(([I,S])=>{let d=`Tags.${I}`;l[d]=S})}return l},Tw=(h,w)=>{let l={};if(h[y]!=null)l[y]=h[y];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];return l},Bh=(h,w)=>{let l={},G=1;for(let I of h){if(I===null)continue;let S=Aw(I,w);Object.entries(S).forEach(([d,X])=>{l[`member.${G}.${d}`]=X}),G++}return l},Aw=(h,w)=>{let l={};if(h[ch]!=null)l[ch]=h[ch];return l},Lw=(h,w)=>{let l={};if(h[Lh]!=null)l[Lh]=h[Lh];if(h[Zh]!=null)l[Zh]=h[Zh];return l},Rw=(h,w)=>{let l={},G=1;for(let I of h){if(I===null)continue;let S=Lw(I,w);Object.entries(S).forEach(([d,X])=>{l[`member.${G}.${d}`]=X}),G++}return l},jw=(h,w)=>{let l={};if(h[Nh]!=null)l[Nh]=h[Nh];if(h[xh]!=null)l[xh]=h[xh];return l},aw=(h,w)=>{let l={},G=1;for(let I of h){if(I===null)continue;l[`member.${G}`]=I,G++}return l},t0=(h,w)=>{let l={},G=1;for(let I of h){if(I===null)continue;let S=jw(I,w);Object.entries(S).forEach(([d,X])=>{l[`member.${G}.${d}`]=X}),G++}return l},ph=(h,w)=>{let l={};if(h[Yh]!=null)l[Yh]=H(h[Yh]);if(h[N]!=null)l[N]=H(h[N]);return l},sw=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[z]!=null)l[z]=ph(h[z],w);if(h[V]!=null)l[V]=u(h[V]);if(h[P]!=null)l[P]=H(h[P]);return l},rw=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[z]!=null)l[z]=ph(h[z],w);if(h[V]!=null)l[V]=u(h[V]);if(h[sh]!=null)l[sh]=H(h[sh]);if(h[fh]!=null)l[fh]=H(h[fh]);if(h[zh]!=null)l[zh]=H(h[zh]);if(h[x]!=null)l[x]=H(h[x]);if(h[Th]!=null)l[Th]=H(h[Th]);if(h[P]!=null)l[P]=H(h[P]);return l},_w=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[bh]!=null)l[bh]=H(h[bh]);if(h[z]!=null)l[z]=ph(h[z],w);if(h[V]!=null)l[V]=u(h[V]);if(h[ah]!=null)l[ah]=H(h[ah]);if(h[x]!=null)l[x]=H(h[x]);if(h[P]!=null)l[P]=H(h[P]);return l},t=(h,w)=>{let l={};if(h[O]!=null)l[O]=H(h[O]);if(h[rh]!=null)l[rh]=H(h[rh]);if(h[Ch]!=null)l[Ch]=H(h[Ch]);if(h[Vh]!=null)l[Vh]=R0(j0(h[Vh]));return l},bw=(h,w)=>{let l={};if(h[$h]!=null)l[$h]=H(h[$h]);return l},fw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},Cw=(h,w)=>{let l={};if(h[Mh]!=null)l[Mh]=H(h[Mh]);if(h[N]!=null)l[N]=H(h[N]);return l},Ow=(h,w)=>{let l={};if(h[g]!=null)l[g]=H(h[g]);return l},gw=(h,w)=>{let l={};if(h[gh]!=null)l[gh]=H(h[gh]);if(h[g]!=null)l[g]=H(h[g]);if(h[N]!=null)l[N]=H(h[N]);return l},xw=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[vh]!=null)l[vh]=Cw(h[vh],w);if(h[V]!=null)l[V]=u(h[V]);return l},iw=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);return l},cw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},ew=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},pw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},nw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},ow=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},uw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},tw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},k=(h)=>({httpStatusCode:h.statusCode,requestId:h.headers["x-amzn-requestid"]??h.headers["x-amzn-request-id"]??h.headers["x-amz-request-id"],extendedRequestId:h.headers["x-amz-id-2"],cfId:h.headers["x-amz-cf-id"]});var hG=a0(Q),R=async(h,w,l,G,I)=>{let{hostname:S,protocol:d="https",port:X,path:M}=await h.endpoint(),q={protocol:d,hostname:S,port:X,method:"POST",path:M.endsWith("/")?M.slice(0,-1)+l:M+l,headers:w};if(G!==void 0)q.hostname=G;if(I!==void 0)q.body=I;return new L0(q)},j={"content-type":"application/x-www-form-urlencoded"},a="2011-06-15",s="Action",O="AccessKeyId",lG="AssumeRole",Yh="AssumedRoleId",z="AssumedRoleUser",wG="AssumeRoleWithSAML",GG="AssumeRoleWithWebIdentity",g="Account",N="Arn",x="Audience",U="Credentials",Zh="ContextAssertion",IG="DecodeAuthorizationMessage",$h="DecodedMessage",y="DurationSeconds",Vh="Expiration",Ph="ExternalId",qh="EncodedMessage",vh="FederatedUser",Mh="FederatedUserId",dG="GetAccessKeyInfo",SG="GetCallerIdentity",HG="GetFederationToken",mG="GetSessionToken",zh="Issuer",Nh="Key",Wh="Name",Th="NameQualifier",Z="Policy",$="PolicyArns",Ah="PrincipalArn",Lh="ProviderArn",Rh="ProvidedContexts",jh="ProviderId",V="PackedPolicySize",ah="Provider",W="RoleArn",i="RoleSessionName",sh="Subject",rh="SecretAccessKey",_h="SAMLAssertion",bh="SubjectFromWebIdentityToken",P="SourceIdentity",c="SerialNumber",fh="SubjectType",Ch="SessionToken",e="Tags",p="TokenCode",Oh="TransitiveTagKeys",gh="UserId",r="Version",xh="Value",ih="WebIdentityToken",ch="arn",m="message",_=(h)=>Object.entries(h).map(([w,l])=>eh(w)+"="+eh(l)).join("&"),JG=(h,w)=>{if(w.Error?.Code!==void 0)return w.Error.Code;if(h.statusCode==404)return"NotFound"};class hh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,v0).ser(s0).de(x0).build(){}class nh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithSAML",{}).n("STSClient","AssumeRoleWithSAMLCommand").f(M0,z0).ser(r0).de(i0).build(){}class lh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(N0,W0).ser(_0).de(c0).build(){}class oh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","DecodeAuthorizationMessage",{}).n("STSClient","DecodeAuthorizationMessageCommand").f(void 0,void 0).ser(b0).de(e0).build(){}class uh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetAccessKeyInfo",{}).n("STSClient","GetAccessKeyInfoCommand").f(void 0,void 0).ser(f0).de(p0).build(){}class th extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetCallerIdentity",{}).n("STSClient","GetCallerIdentityCommand").f(void 0,void 0).ser(C0).de(n0).build(){}class hl extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetFederationToken",{}).n("STSClient","GetFederationTokenCommand").f(void 0,T0).ser(O0).de(o0).build(){}class ll extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetSessionToken",{}).n("STSClient","GetSessionTokenCommand").f(void 0,A0).ser(g0).de(u0).build(){}var DG={AssumeRoleCommand:hh,AssumeRoleWithSAMLCommand:nh,AssumeRoleWithWebIdentityCommand:lh,DecodeAuthorizationMessageCommand:oh,GetAccessKeyInfoCommand:uh,GetCallerIdentityCommand:th,GetFederationTokenCommand:hl,GetSessionTokenCommand:ll};class lw extends A{}hw(DG,lw);var ww="us-east-1",Gw=(h)=>{if(typeof h?.Arn==="string"){let w=h.Arn.split(":");if(w.length>4&&w[4]!=="")return w[4]}return},Iw=async(h,w,l)=>{let G=typeof h==="function"?await h():h,I=typeof w==="function"?await w():w;return l?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${G} (provider)`,`${I} (parent client)`,`${ww} (STS default)`),G??I??ww},dw=(h,w)=>{let l,G;return async(I,S)=>{if(G=I,!l){let{logger:q=h?.parentClientConfig?.logger,region:n,requestHandler:wh=h?.parentClientConfig?.requestHandler,credentialProviderLogger:Uh}=h,Jw=await Iw(n,h?.parentClientConfig?.region,Uh),Dw=!Hw(wh);l=new w({credentialDefaultProvider:()=>async()=>G,region:Jw,requestHandler:Dw?wh:void 0,logger:q})}let{Credentials:d,AssumedRoleUser:X}=await l.send(new hh(S));if(!d||!d.AccessKeyId||!d.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${S.RoleArn}`);let M=Gw(X);return{accessKeyId:d.AccessKeyId,secretAccessKey:d.SecretAccessKey,sessionToken:d.SessionToken,expiration:d.Expiration,...d.CredentialScope&&{credentialScope:d.CredentialScope},...M&&{accountId:M}}}},Sw=(h,w)=>{let l;return async(G)=>{if(!l){let{logger:X=h?.parentClientConfig?.logger,region:M,requestHandler:q=h?.parentClientConfig?.requestHandler,credentialProviderLogger:n}=h,wh=await Iw(M,h?.parentClientConfig?.region,n),Uh=!Hw(q);l=new w({region:wh,requestHandler:Uh?q:void 0,logger:X})}let{Credentials:I,AssumedRoleUser:S}=await l.send(new lh(G));if(!I||!I.AccessKeyId||!I.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${G.RoleArn}`);let d=Gw(S);return{accessKeyId:I.AccessKeyId,secretAccessKey:I.SecretAccessKey,sessionToken:I.SessionToken,expiration:I.Expiration,...I.CredentialScope&&{credentialScope:I.CredentialScope},...d&&{accountId:d}}}};var Hw=(h)=>{return h?.metadata?.handlerProtocol==="h2"};var mw=(h,w)=>{if(!w)return h;else return class l extends h{constructor(G){super(G);for(let I of w)this.middlewareStack.use(I)}}},EG=(h={},w)=>dw(h,mw(A,w)),kG=(h={},w)=>Sw(h,mw(A,w)),sd=(h)=>(w)=>h({roleAssumer:EG(w),roleAssumerWithWebIdentity:kG(w),...w});export{kG as getDefaultRoleAssumerWithWebIdentity,EG as getDefaultRoleAssumer,sd as decorateDefaultCredentialProvider,y0 as __Client,Q as STSServiceException,A as STSClient,lw as STS,Dh as RegionDisabledException,Jh as PackedPolicyTooLargeException,mh as MalformedPolicyDocumentException,kh as InvalidIdentityTokenException,Fh as InvalidAuthorizationMessageException,Eh as IDPRejectedClaimException,Kh as IDPCommunicationErrorException,A0 as GetSessionTokenResponseFilterSensitiveLog,ll as GetSessionTokenCommand,T0 as GetFederationTokenResponseFilterSensitiveLog,hl as GetFederationTokenCommand,th as GetCallerIdentityCommand,uh as GetAccessKeyInfoCommand,Hh as ExpiredTokenException,oh as DecodeAuthorizationMessageCommand,o as CredentialsFilterSensitiveLog,W0 as AssumeRoleWithWebIdentityResponseFilterSensitiveLog,N0 as AssumeRoleWithWebIdentityRequestFilterSensitiveLog,lh as AssumeRoleWithWebIdentityCommand,z0 as AssumeRoleWithSAMLResponseFilterSensitiveLog,M0 as AssumeRoleWithSAMLRequestFilterSensitiveLog,nh as AssumeRoleWithSAMLCommand,v0 as AssumeRoleResponseFilterSensitiveLog,hh as AssumeRoleCommand,K as $Command};
3
-
4
- //# debugId=A020EAEF10C4915D64756E2164756E21
@@ -1,5 +0,0 @@
1
- // @bun
2
- import{bb as y,cb as G,db as E,gb as C,hb as N}from"./chunk-3kyzvpxm.js";import"./chunk-7rpnpk1z.js";import{nb as i,ob as f}from"./chunk-0v0x0g72.js";import{ac as v,cc as P}from"./chunk-spw59mrv.js";var M=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var H=300000,_="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var I={},K=async(e)=>{let{SSOOIDCClient:r}=await import("./chunk-wzax4kjq.js");if(I[e])return I[e];let s=new r({region:e});return I[e]=s,s};var b=async(e,r)=>{let{CreateTokenCommand:s}=await import("./chunk-wzax4kjq.js");return(await K(r)).send(new s({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var R=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new f(`Token is expired. ${_}`,!1)};var m=(e,r,s=!1)=>{if(typeof r==="undefined")throw new f(`Value not present for '${e}' in SSO Token${s?". Cannot refresh":""}. ${_}`,!1)};import{promises as X}from"fs";var{writeFile:z}=X,U=(e,r)=>{let s=G(e),t=JSON.stringify(r,null,2);return z(s,t)};var q=new Date(0),W=(e={})=>async()=>{e.logger?.debug("@aws-sdk/token-providers - fromSso");let r=await N(e),s=y(e),t=r[s];if(!t)throw new f(`Profile '${s}' could not be found in shared credentials file.`,!1);else if(!t.sso_session)throw new f(`Profile '${s}' is missing required property 'sso_session'.`);let a=t.sso_session,c=(await C(e))[a];if(!c)throw new f(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!c[n])throw new f(`Sso session '${a}' is missing required property '${n}'.`,!1);let{sso_start_url:p,sso_region:S}=c,o;try{o=await E(a)}catch(n){throw new f(`The SSO session token associated with profile=${s} was not found or is invalid. ${_}`,!1)}m("accessToken",o.accessToken),m("expiresAt",o.expiresAt);let{accessToken:x,expiresAt:u}=o,l={token:x,expiration:new Date(u)};if(l.expiration.getTime()-Date.now()>H)return l;if(Date.now()-q.getTime()<30000)return R(l),l;m("clientId",o.clientId,!0),m("clientSecret",o.clientSecret,!0),m("refreshToken",o.refreshToken,!0);try{q.setTime(Date.now());let n=await b(o,S);m("accessToken",n.accessToken),m("expiresIn",n.expiresIn);let h=new Date(Date.now()+n.expiresIn*1000);try{await U(a,{...o,accessToken:n.accessToken,expiresAt:h.toISOString(),refreshToken:n.refreshToken})}catch(O){}return{token:n.accessToken,expiration:h}}catch(n){return R(l),l}};var T=!1,D=async({ssoStartUrl:e,ssoSession:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoClient:d,clientConfig:c,profile:p,logger:S})=>{let o,x="To refresh this SSO session run aws sso login with the corresponding profile.";if(r)try{let g=await W({profile:p})();o={accessToken:g.token,expiresAt:new Date(g.expiration).toISOString()}}catch(g){throw new i(g.message,{tryNextLink:T,logger:S})}else try{o=await E(e)}catch(g){throw new i("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:T,logger:S})}if(new Date(o.expiresAt).getTime()-Date.now()<=0)throw new i("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:T,logger:S});let{accessToken:u}=o,{SSOClient:l,GetRoleCredentialsCommand:n}=await import("./chunk-2nrspkzr.js"),h=d||new l(Object.assign({},c??{},{region:c?.region??t})),O;try{O=await h.send(new n({accountId:s,roleName:a,accessToken:u}))}catch(g){throw new i(g,{tryNextLink:T,logger:S})}let{roleCredentials:{accessKeyId:w,secretAccessKey:k,sessionToken:A,expiration:$,credentialScope:F,accountId:L}={}}=O;if(!w||!k||!A||!$)throw new i("SSO returns an invalid temporary credential.",{tryNextLink:T,logger:S});return{accessKeyId:w,secretAccessKey:k,sessionToken:A,expiration:new Date($),...F&&{credentialScope:F},...L&&{accountId:L}}};var j=(e,r)=>{let{sso_start_url:s,sso_account_id:t,sso_region:a,sso_role_name:d}=e;if(!s||!t||!a||!d)throw new i(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
3
- Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:r});return e};var Ne=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,p=y(e);if(!r&&!s&&!t&&!a&&!d){let o=(await N(e))[p];if(!o)throw new i(`Profile ${p} was not found.`,{logger:e.logger});if(!M(o))throw new i(`Profile ${p} is not configured with SSO credentials.`,{logger:e.logger});if(o?.sso_session){let w=(await C(e))[o.sso_session],k=` configurations in profile ${p} and sso-session ${o.sso_session}`;if(t&&t!==w.sso_region)throw new i("Conflicting SSO region"+k,{tryNextLink:!1,logger:e.logger});if(r&&r!==w.sso_start_url)throw new i("Conflicting SSO start_url"+k,{tryNextLink:!1,logger:e.logger});o.sso_region=w.sso_region,o.sso_start_url=w.sso_start_url}let{sso_start_url:x,sso_account_id:u,sso_region:l,sso_role_name:n,sso_session:h}=j(o,e.logger);return D({ssoStartUrl:x,ssoSession:h,ssoAccountId:u,ssoRegion:l,ssoRoleName:n,ssoClient:c,clientConfig:e.clientConfig,profile:p})}else if(!r||!s||!t||!a)throw new i('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return D({ssoStartUrl:r,ssoSession:d,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,profile:p})};export{j as validateSsoProfile,M as isSsoProfile,Ne as fromSSO};
4
-
5
- //# debugId=E8198B0DBAA02CA964756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{bb as K,hb as S}from"./chunk-3kyzvpxm.js";import"./chunk-7rpnpk1z.js";import{nb as o}from"./chunk-0v0x0g72.js";import"./chunk-spw59mrv.js";import{exec as _}from"child_process";import{promisify as y}from"util";var i=(c,n,s)=>{if(n.Version!==1)throw Error(`Profile ${c} credential_process did not return Version 1.`);if(n.AccessKeyId===void 0||n.SecretAccessKey===void 0)throw Error(`Profile ${c} credential_process returned invalid credentials.`);if(n.Expiration){let t=new Date;if(new Date(n.Expiration)<t)throw Error(`Profile ${c} credential_process returned expired credentials.`)}let e=n.AccountId;if(!e&&s?.[c]?.aws_account_id)e=s[c].aws_account_id;return{accessKeyId:n.AccessKeyId,secretAccessKey:n.SecretAccessKey,...n.SessionToken&&{sessionToken:n.SessionToken},...n.Expiration&&{expiration:new Date(n.Expiration)},...n.CredentialScope&&{credentialScope:n.CredentialScope},...e&&{accountId:e}}};var x=async(c,n,s)=>{let e=n[c];if(n[c]){let t=e.credential_process;if(t!==void 0){let u=y(_);try{let{stdout:r}=await u(t),w;try{w=JSON.parse(r.trim())}catch{throw Error(`Profile ${c} credential_process returned invalid JSON.`)}return i(c,w,n)}catch(r){throw new o(r.message,{logger:s})}}else throw new o(`Profile ${c} did not contain credential_process.`,{logger:s})}else throw new o(`Profile ${c} could not be found in shared credentials file.`,{logger:s})};var $=(c={})=>async()=>{c.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let n=await S(c);return x(K(c),n,c.logger)};export{$ as fromProcess};
3
-
4
- //# debugId=05FA5078D5085FB064756E2164756E21
@@ -1,4 +0,0 @@
1
- import{_b as e}from"./chunk-ndhecb99.js";class r extends e{service;static _name="EmailServiceContainer";constructor(i){super();this.service=i}}
2
- export{r as f};
3
-
4
- //# debugId=92753B0446114C4064756E2164756E21