gemi 0.14.2 → 0.15.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (89) hide show
  1. package/dist/app/index.js +2 -2
  2. package/dist/app/index.js.map +1 -1
  3. package/dist/bin/gemi.js +7 -1
  4. package/dist/bin/gemi.js.map +4 -4
  5. package/dist/{chunk-tqzj43a7.js → chunk-00nc1ycm.js} +2 -2
  6. package/dist/{chunk-tqzj43a7.js.map → chunk-00nc1ycm.js.map} +1 -1
  7. package/dist/{chunk-4dcj158v.js → chunk-12dsc8ya.js} +3 -3
  8. package/dist/{chunk-4dcj158v.js.map → chunk-12dsc8ya.js.map} +1 -1
  9. package/dist/{chunk-7ptvr91c.js → chunk-1vs946fr.js} +2 -2
  10. package/dist/{chunk-7ptvr91c.js.map → chunk-1vs946fr.js.map} +1 -1
  11. package/dist/{chunk-wf991m48.js → chunk-2sshh9jw.js} +2 -2
  12. package/dist/{chunk-wf991m48.js.map → chunk-2sshh9jw.js.map} +1 -1
  13. package/dist/{chunk-exf16mn0.js → chunk-7dp9xw46.js} +3 -3
  14. package/dist/{chunk-exf16mn0.js.map → chunk-7dp9xw46.js.map} +1 -1
  15. package/dist/{chunk-ryg1dde5.js → chunk-9v19kd7s.js} +3 -3
  16. package/dist/{chunk-ryg1dde5.js.map → chunk-9v19kd7s.js.map} +1 -1
  17. package/dist/chunk-ac8m7p53.js +5 -0
  18. package/dist/chunk-ac8m7p53.js.map +11 -0
  19. package/dist/{chunk-dy5fyccd.js → chunk-acy96d33.js} +2 -2
  20. package/dist/{chunk-dy5fyccd.js.map → chunk-acy96d33.js.map} +1 -1
  21. package/dist/{chunk-57z3h6hy.js → chunk-b38shk5c.js} +2 -2
  22. package/dist/{chunk-57z3h6hy.js.map → chunk-b38shk5c.js.map} +1 -1
  23. package/dist/{chunk-phkp7w79.js → chunk-cmxfn1e4.js} +3 -3
  24. package/dist/{chunk-phkp7w79.js.map → chunk-cmxfn1e4.js.map} +1 -1
  25. package/dist/{chunk-htxxjgd5.js → chunk-e4htsnc2.js} +2 -2
  26. package/dist/{chunk-htxxjgd5.js.map → chunk-e4htsnc2.js.map} +1 -1
  27. package/dist/{chunk-2ndhh6td.js → chunk-gngynbtx.js} +2 -2
  28. package/dist/{chunk-2ndhh6td.js.map → chunk-gngynbtx.js.map} +1 -1
  29. package/dist/{chunk-g4t4r905.js → chunk-gnxcqb9a.js} +2 -2
  30. package/dist/{chunk-g4t4r905.js.map → chunk-gnxcqb9a.js.map} +1 -1
  31. package/dist/{chunk-qdyp0w7x.js → chunk-h3c37nbe.js} +2 -2
  32. package/dist/{chunk-qdyp0w7x.js.map → chunk-h3c37nbe.js.map} +1 -1
  33. package/dist/{chunk-yxmc7x64.js → chunk-ke08h1ew.js} +2 -2
  34. package/dist/{chunk-yxmc7x64.js.map → chunk-ke08h1ew.js.map} +1 -1
  35. package/dist/{chunk-jmscazht.js → chunk-m118y18n.js} +2 -2
  36. package/dist/{chunk-jmscazht.js.map → chunk-m118y18n.js.map} +1 -1
  37. package/dist/{chunk-n8tr3h68.js → chunk-psb1w3j2.js} +2 -2
  38. package/dist/{chunk-n8tr3h68.js.map → chunk-psb1w3j2.js.map} +1 -1
  39. package/dist/{chunk-cxxwxz6t.js → chunk-qepwc6py.js} +2 -2
  40. package/dist/{chunk-cxxwxz6t.js.map → chunk-qepwc6py.js.map} +1 -1
  41. package/dist/{chunk-r13m0b3y.js → chunk-qsb7ddwv.js} +2 -2
  42. package/dist/{chunk-r13m0b3y.js.map → chunk-qsb7ddwv.js.map} +1 -1
  43. package/dist/{chunk-4gfrxz19.js → chunk-t0xrvrt4.js} +2 -2
  44. package/dist/{chunk-4gfrxz19.js.map → chunk-t0xrvrt4.js.map} +1 -1
  45. package/dist/{chunk-27xgse4n.js → chunk-v8kgghec.js} +2 -2
  46. package/dist/{chunk-27xgse4n.js.map → chunk-v8kgghec.js.map} +1 -1
  47. package/dist/{chunk-bpqf6csg.js → chunk-wwn6qm2v.js} +2 -2
  48. package/dist/{chunk-bpqf6csg.js.map → chunk-wwn6qm2v.js.map} +1 -1
  49. package/dist/{chunk-hq7crmd4.js → chunk-xehvtwhb.js} +2 -2
  50. package/dist/{chunk-hq7crmd4.js.map → chunk-xehvtwhb.js.map} +1 -1
  51. package/dist/{chunk-ypadv725.js → chunk-xsjhb7em.js} +2 -2
  52. package/dist/{chunk-ypadv725.js.map → chunk-xsjhb7em.js.map} +1 -1
  53. package/dist/client/ClientRouter.d.ts.map +1 -1
  54. package/dist/client/Head.d.ts +7 -0
  55. package/dist/client/Head.d.ts.map +1 -0
  56. package/dist/client/OpenGraphImage.d.ts +14 -0
  57. package/dist/client/OpenGraphImage.d.ts.map +1 -0
  58. package/dist/client/ServerDataProvider.d.ts +1 -0
  59. package/dist/client/ServerDataProvider.d.ts.map +1 -1
  60. package/dist/client/index.d.ts +2 -0
  61. package/dist/client/index.d.ts.map +1 -1
  62. package/dist/client/index.js +81 -0
  63. package/dist/client/index.js.map +1 -1
  64. package/dist/client/init.d.ts +1 -1
  65. package/dist/client/init.d.ts.map +1 -1
  66. package/dist/facades/Meta.d.ts +8 -0
  67. package/dist/facades/Meta.d.ts.map +1 -0
  68. package/dist/facades/index.d.ts +1 -0
  69. package/dist/facades/index.d.ts.map +1 -1
  70. package/dist/facades/index.js +66 -4
  71. package/dist/facades/index.js.map +27 -6
  72. package/dist/http/HttpRequest.d.ts +6 -0
  73. package/dist/http/HttpRequest.d.ts.map +1 -1
  74. package/dist/http/Metadata.d.ts +25 -0
  75. package/dist/http/Metadata.d.ts.map +1 -0
  76. package/dist/http/index.js +2 -2
  77. package/dist/http/index.js.map +5 -4
  78. package/dist/http/requestContext.d.ts +7 -0
  79. package/dist/http/requestContext.d.ts.map +1 -1
  80. package/dist/kernel/index.js +2 -2
  81. package/dist/kernel/index.js.map +1 -1
  82. package/dist/server/index.js +5 -5
  83. package/dist/server/index.js.map +4 -4
  84. package/dist/services/index.js +73 -62
  85. package/dist/services/index.js.map +16 -4
  86. package/dist/services/router/ApiRouterServiceContainer.d.ts.map +1 -1
  87. package/dist/services/router/ViewRouterServiceContainer.d.ts +1 -0
  88. package/dist/services/router/ViewRouterServiceContainer.d.ts.map +1 -1
  89. package/package.json +2 -1
@@ -1,4 +1,4 @@
1
1
  // @bun
2
- import{a as kI,b as LI,c as WI,d as bd,e as yd,f as YI,g as _l,h as JI,i as dI,j as id,k as I1,l as II,m as Vl,n as PI,o as EI,p as SI,q as DI,r as NI,s as VI}from"./chunk-yxmc7x64.js";import{Nb as Bd,Ob as il,Pb as l1,Rb as A,Sb as m}from"./chunk-4dcj158v.js";import{Ub as $l,Xb as md,Yb as Cd,_b as lI}from"./chunk-exf16mn0.js";import{jc as bI}from"./chunk-htxxjgd5.js";import"./chunk-r13m0b3y.js";import"./chunk-4gfrxz19.js";import{vc as td}from"./chunk-4kkyjz2j.js";import{xc as V}from"./chunk-5zy36vzw.js";var o=V((j1)=>{Object.defineProperty(j1,"__esModule",{value:!0});j1.resolveHttpAuthSchemeConfig=j1.resolveStsAuthConfig=j1.defaultSTSHttpAuthSchemeProvider=j1.defaultSTSHttpAuthSchemeParametersProvider=void 0;var kd=m(),c=Bd(),Ld=O(),Wd=async(l,I,d)=>{return{operation:c.getSmithyContext(I).operation,region:await c.normalizeProvider(l.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};j1.defaultSTSHttpAuthSchemeParametersProvider=Wd;function Yd(l){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:l.region},propertiesExtractor:(I,d)=>({signingProperties:{config:I,context:d}})}}function Jd(l){return{schemeId:"smithy.api#noAuth"}}var Kd=(l)=>{let I=[];switch(l.operation){case"AssumeRoleWithWebIdentity":{I.push(Jd(l));break}default:I.push(Yd(l))}return I};j1.defaultSTSHttpAuthSchemeProvider=Kd;var Xd=(l)=>Object.assign(l,{stsClientCtor:Ld.STSClient});j1.resolveStsAuthConfig=Xd;var Qd=(l)=>{let I=j1.resolveStsAuthConfig(l),d=kd.resolveAwsSdkSigV4Config(I);return Object.assign(d,{authSchemePreference:c.normalizeProvider(l.authSchemePreference??[])})};j1.resolveHttpAuthSchemeConfig=Qd});var s=V((b1)=>{Object.defineProperty(b1,"__esModule",{value:!0});b1.commonParams=b1.resolveClientEndpointParameters=void 0;var jd=(l)=>{return Object.assign(l,{useDualstackEndpoint:l.useDualstackEndpoint??!1,useFipsEndpoint:l.useFipsEndpoint??!1,useGlobalEndpoint:l.useGlobalEndpoint??!1,defaultSigningName:"sts"})};b1.resolveClientEndpointParameters=jd;b1.commonParams={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}}});var Fl=V((Dl)=>{Object.defineProperty(Dl,"__esModule",{value:!0});Dl.ruleSet=void 0;var n1="required",D="type",F="fn",q="argv",J="ref",f1=!1,n=!0,Y="booleanEquals",U="stringEquals",p1="sigv4",u1="sts",t1="us-east-1",r="endpoint",O1="https://sts.{Region}.{PartitionResult#dnsSuffix}",B="tree",X="error",u="getAttr",s1={[n1]:!1,[D]:"String"},p={[n1]:!0,default:!1,[D]:"Boolean"},ll={[J]:"Endpoint"},g1={[F]:"isSet",[q]:[{[J]:"Region"}]},G={[J]:"Region"},m1={[F]:"aws.partition",[q]:[G],assign:"PartitionResult"},dl={[J]:"UseFIPS"},Il={[J]:"UseDualStack"},M={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:p1,signingName:u1,signingRegion:t1}]},headers:{}},a={},C1={conditions:[{[F]:U,[q]:[G,"aws-global"]}],[r]:M,[D]:r},Pl={[F]:Y,[q]:[dl,!0]},El={[F]:Y,[q]:[Il,!0]},i1={[F]:u,[q]:[{[J]:"PartitionResult"},"supportsFIPS"]},Sl={[J]:"PartitionResult"},x1={[F]:Y,[q]:[!0,{[F]:u,[q]:[Sl,"supportsDualStack"]}]},e1=[{[F]:"isSet",[q]:[ll]}],c1=[Pl],o1=[El],zd={version:"1.0",parameters:{Region:s1,UseDualStack:p,UseFIPS:p,Endpoint:s1,UseGlobalEndpoint:p},rules:[{conditions:[{[F]:Y,[q]:[{[J]:"UseGlobalEndpoint"},n]},{[F]:"not",[q]:e1},g1,m1,{[F]:Y,[q]:[dl,f1]},{[F]:Y,[q]:[Il,f1]}],rules:[{conditions:[{[F]:U,[q]:[G,"ap-northeast-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-south-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-southeast-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-southeast-2"]}],endpoint:M,[D]:r},C1,{conditions:[{[F]:U,[q]:[G,"ca-central-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-central-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-north-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-2"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-3"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"sa-east-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,t1]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-east-2"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-west-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-west-2"]}],endpoint:M,[D]:r},{endpoint:{url:O1,properties:{authSchemes:[{name:p1,signingName:u1,signingRegion:"{Region}"}]},headers:a},[D]:r}],[D]:B},{conditions:e1,rules:[{conditions:c1,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[D]:X},{conditions:o1,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[D]:X},{endpoint:{url:ll,properties:a,headers:a},[D]:r}],[D]:B},{conditions:[g1],rules:[{conditions:[m1],rules:[{conditions:[Pl,El],rules:[{conditions:[{[F]:Y,[q]:[n,i1]},x1],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[D]:X}],[D]:B},{conditions:c1,rules:[{conditions:[{[F]:Y,[q]:[i1,n]}],rules:[{conditions:[{[F]:U,[q]:[{[F]:u,[q]:[Sl,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:a,headers:a},[D]:r},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"FIPS is enabled but this partition does not support FIPS",[D]:X}],[D]:B},{conditions:o1,rules:[{conditions:[x1],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"DualStack is enabled but this partition does not support DualStack",[D]:X}],[D]:B},C1,{endpoint:{url:O1,properties:a,headers:a},[D]:r}],[D]:B}],[D]:B},{error:"Invalid Configuration: Missing Region",[D]:X}]};Dl.ruleSet=zd});var wl=V((ql)=>{Object.defineProperty(ql,"__esModule",{value:!0});ql.defaultEndpointResolver=void 0;var fd=yd(),t=bd(),Od=Fl(),sd=new t.EndpointCache({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),gd=(l,I={})=>{return sd.get(l,()=>t.resolveEndpoint(Od.ruleSet,{endpointParams:l,logger:I.logger}))};ql.defaultEndpointResolver=gd;t.customEndpointFunctions.aws=fd.awsEndpointFunctions});var Ml=V((Ul)=>{Object.defineProperty(Ul,"__esModule",{value:!0});Ul.getRuntimeConfig=void 0;var xd=m(),ed=l1(),cd=A(),od=id(),rl=Cd(),Rl=md(),nd=o(),pd=wl(),ud=(l)=>{return{apiVersion:"2011-06-15",base64Decoder:l?.base64Decoder??rl.fromBase64,base64Encoder:l?.base64Encoder??rl.toBase64,disableHostPrefix:l?.disableHostPrefix??!1,endpointProvider:l?.endpointProvider??pd.defaultEndpointResolver,extensions:l?.extensions??[],httpAuthSchemeProvider:l?.httpAuthSchemeProvider??nd.defaultSTSHttpAuthSchemeProvider,httpAuthSchemes:l?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(I)=>I.getIdentityProvider("aws.auth#sigv4"),signer:new xd.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(I)=>I.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ed.NoAuthSigner}],logger:l?.logger??new cd.NoOpLogger,serviceId:l?.serviceId??"STS",urlParser:l?.urlParser??od.parseUrl,utf8Decoder:l?.utf8Decoder??Rl.fromUtf8,utf8Encoder:l?.utf8Encoder??Rl.toUtf8}};Ul.getRuntimeConfig=ud});var Ll=V((Bl)=>{Object.defineProperty(Bl,"__esModule",{value:!0});Bl.getRuntimeConfig=void 0;var FI=td(),qI=FI.__importDefault(PI()),hl=m(),al=EI(),C=_l(),vI=l1(),wI=SI(),Al=Vl(),Q=dI(),Tl=lI(),rI=DI(),RI=II(),UI=Ml(),GI=A(),MI=NI(),hI=A(),aI=(l)=>{hI.emitWarningIfUnsupportedVersion(process.version);let I=MI.resolveDefaultsModeConfig(l),d=()=>I().then(GI.loadConfigsForDefaultMode),E=UI.getRuntimeConfig(l);hl.emitWarningIfUnsupportedVersion(process.version);let P={profile:l?.profile};return{...E,...l,runtime:"node",defaultsMode:I,bodyLengthChecker:l?.bodyLengthChecker??rI.calculateBodyLength,defaultUserAgentProvider:l?.defaultUserAgentProvider??al.createDefaultUserAgentProvider({serviceId:E.serviceId,clientVersion:qI.default.version}),httpAuthSchemes:l?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(v)=>v.getIdentityProvider("aws.auth#sigv4")||(async(N)=>await l.credentialDefaultProvider(N?.__config||{})()),signer:new hl.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(v)=>v.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new vI.NoAuthSigner}],maxAttempts:l?.maxAttempts??Q.loadConfig(Al.NODE_MAX_ATTEMPT_CONFIG_OPTIONS,l),region:l?.region??Q.loadConfig(C.NODE_REGION_CONFIG_OPTIONS,{...C.NODE_REGION_CONFIG_FILE_OPTIONS,...P}),requestHandler:Tl.NodeHttpHandler.create(l?.requestHandler??d),retryMode:l?.retryMode??Q.loadConfig({...Al.NODE_RETRY_MODE_CONFIG_OPTIONS,default:async()=>(await d()).retryMode||RI.DEFAULT_RETRY_MODE},l),sha256:l?.sha256??wI.Hash.bind(null,"sha256"),streamCollector:l?.streamCollector??Tl.streamCollector,useDualstackEndpoint:l?.useDualstackEndpoint??Q.loadConfig(C.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS,P),useFipsEndpoint:l?.useFipsEndpoint??Q.loadConfig(C.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS,P),userAgentAppId:l?.userAgentAppId??Q.loadConfig(al.NODE_APP_ID_CONFIG_OPTIONS,P)}};Bl.getRuntimeConfig=aI});var Jl=V((Wl)=>{Object.defineProperty(Wl,"__esModule",{value:!0});Wl.resolveHttpAuthRuntimeConfig=Wl.getHttpAuthExtensionConfiguration=void 0;var AI=(l)=>{let{httpAuthSchemes:I,httpAuthSchemeProvider:d,credentials:E}=l;return{setHttpAuthScheme(P){let v=I.findIndex((N)=>N.schemeId===P.schemeId);if(v===-1)I.push(P);else I.splice(v,1,P)},httpAuthSchemes(){return I},setHttpAuthSchemeProvider(P){d=P},httpAuthSchemeProvider(){return d},setCredentials(P){E=P},credentials(){return E}}};Wl.getHttpAuthExtensionConfiguration=AI;var TI=(l)=>{return{httpAuthSchemes:l.httpAuthSchemes(),httpAuthSchemeProvider:l.httpAuthSchemeProvider(),credentials:l.credentials()}};Wl.resolveHttpAuthRuntimeConfig=TI});var zl=V((jl)=>{Object.defineProperty(jl,"__esModule",{value:!0});jl.resolveRuntimeExtensions=void 0;var Kl=VI(),Xl=$l(),Ql=A(),Zl=Jl(),BI=(l,I)=>{let d=Object.assign(Kl.getAwsRegionExtensionConfiguration(l),Ql.getDefaultExtensionConfiguration(l),Xl.getHttpHandlerExtensionConfiguration(l),Zl.getHttpAuthExtensionConfiguration(l));return I.forEach((E)=>E.configure(d)),Object.assign(l,Kl.resolveAwsRegionExtensionConfiguration(d),Ql.resolveDefaultRuntimeConfig(d),Xl.resolveHttpHandlerRuntimeConfig(d),Zl.resolveHttpAuthRuntimeConfig(d))};jl.resolveRuntimeExtensions=BI});var O=V((P1)=>{Object.defineProperty(P1,"__esModule",{value:!0});P1.STSClient=P1.__Client=void 0;var bl=kI(),KI=LI(),XI=WI(),yl=YI(),QI=_l(),d1=l1(),ZI=JI(),$I=I1(),fl=Vl(),sl=A();Object.defineProperty(P1,"__Client",{enumerable:!0,get:function(){return sl.Client}});var Ol=o(),jI=s(),HI=Ll(),zI=zl();class gl extends sl.Client{config;constructor(...[l]){let I=HI.getRuntimeConfig(l||{});super(I);this.initConfig=I;let d=jI.resolveClientEndpointParameters(I),E=yl.resolveUserAgentConfig(d),P=fl.resolveRetryConfig(E),v=QI.resolveRegionConfig(P),N=bl.resolveHostHeaderConfig(v),h=$I.resolveEndpointConfig(N),T=Ol.resolveHttpAuthSchemeConfig(h),_=zI.resolveRuntimeExtensions(T,l?.extensions||[]);this.config=_,this.middlewareStack.use(yl.getUserAgentPlugin(this.config)),this.middlewareStack.use(fl.getRetryPlugin(this.config)),this.middlewareStack.use(ZI.getContentLengthPlugin(this.config)),this.middlewareStack.use(bl.getHostHeaderPlugin(this.config)),this.middlewareStack.use(KI.getLoggerPlugin(this.config)),this.middlewareStack.use(XI.getRecursionDetectionPlugin(this.config)),this.middlewareStack.use(d1.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Ol.defaultSTSHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async(K)=>new d1.DefaultIdentityProviderConfig({"aws.auth#sigv4":K.credentials})})),this.middlewareStack.use(d1.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}P1.STSClient=gl});var fP=V((nP,$1)=>{var{defineProperty:i,getOwnPropertyDescriptor:yI,getOwnPropertyNames:fI}=Object,OI=Object.prototype.hasOwnProperty,S=(l,I)=>i(l,"name",{value:I,configurable:!0}),sI=(l,I)=>{for(var d in I)i(l,d,{get:I[d],enumerable:!0})},W1=(l,I,d,E)=>{if(I&&typeof I==="object"||typeof I==="function"){for(let P of fI(I))if(!OI.call(l,P)&&P!==d)i(l,P,{get:()=>I[P],enumerable:!(E=yI(I,P))||E.enumerable})}return l},gI=(l,I,d)=>(W1(l,I,"default"),d&&W1(d,I,"default")),mI=(l)=>W1(i({},"__esModule",{value:!0}),l),J1={};sI(J1,{AssumeRoleCommand:()=>Q1,AssumeRoleResponseFilterSensitiveLog:()=>el,AssumeRoleWithWebIdentityCommand:()=>Z1,AssumeRoleWithWebIdentityRequestFilterSensitiveLog:()=>ld,AssumeRoleWithWebIdentityResponseFilterSensitiveLog:()=>dd,ClientInputEndpointParameters:()=>HP.ClientInputEndpointParameters,CredentialsFilterSensitiveLog:()=>K1,ExpiredTokenException:()=>cl,IDPCommunicationErrorException:()=>Id,IDPRejectedClaimException:()=>ul,InvalidIdentityTokenException:()=>tl,MalformedPolicyDocumentException:()=>ol,PackedPolicyTooLargeException:()=>nl,RegionDisabledException:()=>pl,STS:()=>Rd,STSServiceException:()=>L,decorateDefaultCredentialProvider:()=>yP,getDefaultRoleAssumer:()=>Ad,getDefaultRoleAssumerWithWebIdentity:()=>Td});$1.exports=mI(J1);gI(J1,O(),$1.exports);var CI=A(),iI=I1(),xI=il(),eI=A(),cI=s(),xl=A(),oI=A(),L=class l extends oI.ServiceException{static{S(this,"STSServiceException")}constructor(I){super(I);Object.setPrototypeOf(this,l.prototype)}},K1=S((l)=>({...l,...l.SecretAccessKey&&{SecretAccessKey:xl.SENSITIVE_STRING}}),"CredentialsFilterSensitiveLog"),el=S((l)=>({...l,...l.Credentials&&{Credentials:K1(l.Credentials)}}),"AssumeRoleResponseFilterSensitiveLog"),cl=class l extends L{static{S(this,"ExpiredTokenException")}name="ExpiredTokenException";$fault="client";constructor(I){super({name:"ExpiredTokenException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ol=class l extends L{static{S(this,"MalformedPolicyDocumentException")}name="MalformedPolicyDocumentException";$fault="client";constructor(I){super({name:"MalformedPolicyDocumentException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},nl=class l extends L{static{S(this,"PackedPolicyTooLargeException")}name="PackedPolicyTooLargeException";$fault="client";constructor(I){super({name:"PackedPolicyTooLargeException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},pl=class l extends L{static{S(this,"RegionDisabledException")}name="RegionDisabledException";$fault="client";constructor(I){super({name:"RegionDisabledException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ul=class l extends L{static{S(this,"IDPRejectedClaimException")}name="IDPRejectedClaimException";$fault="client";constructor(I){super({name:"IDPRejectedClaimException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},tl=class l extends L{static{S(this,"InvalidIdentityTokenException")}name="InvalidIdentityTokenException";$fault="client";constructor(I){super({name:"InvalidIdentityTokenException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ld=S((l)=>({...l,...l.WebIdentityToken&&{WebIdentityToken:xl.SENSITIVE_STRING}}),"AssumeRoleWithWebIdentityRequestFilterSensitiveLog"),dd=S((l)=>({...l,...l.Credentials&&{Credentials:K1(l.Credentials)}}),"AssumeRoleWithWebIdentityResponseFilterSensitiveLog"),Id=class l extends L{static{S(this,"IDPCommunicationErrorException")}name="IDPCommunicationErrorException";$fault="client";constructor(I){super({name:"IDPCommunicationErrorException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},X1=m(),nI=$l(),w=A(),pI=S(async(l,I)=>{let d=Fd,E;return E=rd({...FP(l,I),[vd]:WP,[wd]:qd}),Nd(I,d,"/",void 0,E)},"se_AssumeRoleCommand"),uI=S(async(l,I)=>{let d=Fd,E;return E=rd({...qP(l,I),[vd]:YP,[wd]:qd}),Nd(I,d,"/",void 0,E)},"se_AssumeRoleWithWebIdentityCommand"),tI=S(async(l,I)=>{if(l.statusCode>=300)return Pd(l,I);let d=await X1.parseXmlBody(l.body,I),E={};return E=MP(d.AssumeRoleResult,I),{$metadata:W(l),...E}},"de_AssumeRoleCommand"),lP=S(async(l,I)=>{if(l.statusCode>=300)return Pd(l,I);let d=await X1.parseXmlBody(l.body,I),E={};return E=hP(d.AssumeRoleWithWebIdentityResult,I),{$metadata:W(l),...E}},"de_AssumeRoleWithWebIdentityCommand"),Pd=S(async(l,I)=>{let d={...l,body:await X1.parseXmlErrorBody(l.body,I)},E=JP(l,d.body);switch(E){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await dP(d,I);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await SP(d,I);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await DP(d,I);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await NP(d,I);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await IP(d,I);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await PP(d,I);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await EP(d,I);default:let P=d.body;return LP({output:l,parsedBody:P.Error,errorCode:E})}},"de_CommandError"),dP=S(async(l,I)=>{let d=l.body,E=aP(d.Error,I),P=new cl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_ExpiredTokenExceptionRes"),IP=S(async(l,I)=>{let d=l.body,E=AP(d.Error,I),P=new Id({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_IDPCommunicationErrorExceptionRes"),PP=S(async(l,I)=>{let d=l.body,E=TP(d.Error,I),P=new ul({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_IDPRejectedClaimExceptionRes"),EP=S(async(l,I)=>{let d=l.body,E=_P(d.Error,I),P=new tl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_InvalidIdentityTokenExceptionRes"),SP=S(async(l,I)=>{let d=l.body,E=VP(d.Error,I),P=new ol({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_MalformedPolicyDocumentExceptionRes"),DP=S(async(l,I)=>{let d=l.body,E=BP(d.Error,I),P=new nl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_PackedPolicyTooLargeExceptionRes"),NP=S(async(l,I)=>{let d=l.body,E=kP(d.Error,I),P=new pl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_RegionDisabledExceptionRes"),FP=S((l,I)=>{let d={};if(l[y]!=null)d[y]=l[y];if(l[f]!=null)d[f]=l[f];if(l[z]!=null){let E=Ed(l[z],I);if(l[z]?.length===0)d.PolicyArns=[];Object.entries(E).forEach(([P,v])=>{let N=`PolicyArns.${P}`;d[N]=v})}if(l[H]!=null)d[H]=l[H];if(l[j]!=null)d[j]=l[j];if(l[T1]!=null){let E=GP(l[T1],I);if(l[T1]?.length===0)d.Tags=[];Object.entries(E).forEach(([P,v])=>{let N=`Tags.${P}`;d[N]=v})}if(l[V1]!=null){let E=UP(l[V1],I);if(l[V1]?.length===0)d.TransitiveTagKeys=[];Object.entries(E).forEach(([P,v])=>{let N=`TransitiveTagKeys.${P}`;d[N]=v})}if(l[v1]!=null)d[v1]=l[v1];if(l[a1]!=null)d[a1]=l[a1];if(l[_1]!=null)d[_1]=l[_1];if(l[k]!=null)d[k]=l[k];if(l[R1]!=null){let E=rP(l[R1],I);if(l[R1]?.length===0)d.ProvidedContexts=[];Object.entries(E).forEach(([P,v])=>{let N=`ProvidedContexts.${P}`;d[N]=v})}return d},"se_AssumeRoleRequest"),qP=S((l,I)=>{let d={};if(l[y]!=null)d[y]=l[y];if(l[f]!=null)d[f]=l[f];if(l[k1]!=null)d[k1]=l[k1];if(l[U1]!=null)d[U1]=l[U1];if(l[z]!=null){let E=Ed(l[z],I);if(l[z]?.length===0)d.PolicyArns=[];Object.entries(E).forEach(([P,v])=>{let N=`PolicyArns.${P}`;d[N]=v})}if(l[H]!=null)d[H]=l[H];if(l[j]!=null)d[j]=l[j];return d},"se_AssumeRoleWithWebIdentityRequest"),Ed=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=vP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_policyDescriptorListType"),vP=S((l,I)=>{let d={};if(l[L1]!=null)d[L1]=l[L1];return d},"se_PolicyDescriptorType"),wP=S((l,I)=>{let d={};if(l[r1]!=null)d[r1]=l[r1];if(l[F1]!=null)d[F1]=l[F1];return d},"se_ProvidedContext"),rP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=wP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_ProvidedContextsListType"),RP=S((l,I)=>{let d={};if(l[w1]!=null)d[w1]=l[w1];if(l[B1]!=null)d[B1]=l[B1];return d},"se_Tag"),UP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;d[`member.${E}`]=P,E++}return d},"se_tagKeyListType"),GP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=RP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_tagListType"),Sd=S((l,I)=>{let d={};if(l[S1]!=null)d[S1]=w.expectString(l[S1]);if(l[D1]!=null)d[D1]=w.expectString(l[D1]);return d},"de_AssumedRoleUser"),MP=S((l,I)=>{let d={};if(l[$]!=null)d[$]=Dd(l[$],I);if(l[Z]!=null)d[Z]=Sd(l[Z],I);if(l[b]!=null)d[b]=w.strictParseInt32(l[b]);if(l[k]!=null)d[k]=w.expectString(l[k]);return d},"de_AssumeRoleResponse"),hP=S((l,I)=>{let d={};if(l[$]!=null)d[$]=Dd(l[$],I);if(l[h1]!=null)d[h1]=w.expectString(l[h1]);if(l[Z]!=null)d[Z]=Sd(l[Z],I);if(l[b]!=null)d[b]=w.strictParseInt32(l[b]);if(l[G1]!=null)d[G1]=w.expectString(l[G1]);if(l[N1]!=null)d[N1]=w.expectString(l[N1]);if(l[k]!=null)d[k]=w.expectString(l[k]);return d},"de_AssumeRoleWithWebIdentityResponse"),Dd=S((l,I)=>{let d={};if(l[E1]!=null)d[E1]=w.expectString(l[E1]);if(l[M1]!=null)d[M1]=w.expectString(l[M1]);if(l[A1]!=null)d[A1]=w.expectString(l[A1]);if(l[q1]!=null)d[q1]=w.expectNonNull(w.parseRfc3339DateTimeWithOffset(l[q1]));return d},"de_Credentials"),aP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_ExpiredTokenException"),AP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_IDPCommunicationErrorException"),TP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_IDPRejectedClaimException"),_P=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_InvalidIdentityTokenException"),VP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_MalformedPolicyDocumentException"),BP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_PackedPolicyTooLargeException"),kP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_RegionDisabledException"),W=S((l)=>({httpStatusCode:l.statusCode,requestId:l.headers["x-amzn-requestid"]??l.headers["x-amzn-request-id"]??l.headers["x-amz-request-id"],extendedRequestId:l.headers["x-amz-id-2"],cfId:l.headers["x-amz-cf-id"]}),"deserializeMetadata"),LP=w.withBaseException(L),Nd=S(async(l,I,d,E,P)=>{let{hostname:v,protocol:N="https",port:h,path:T}=await l.endpoint(),_={protocol:N,hostname:v,port:h,method:"POST",path:T.endsWith("/")?T.slice(0,-1)+d:T+d,headers:I};if(E!==void 0)_.hostname=E;if(P!==void 0)_.body=P;return new nI.HttpRequest(_)},"buildHttpRpcRequest"),Fd={"content-type":"application/x-www-form-urlencoded"},qd="2011-06-15",vd="Action",E1="AccessKeyId",WP="AssumeRole",S1="AssumedRoleId",Z="AssumedRoleUser",YP="AssumeRoleWithWebIdentity",D1="Arn",N1="Audience",$="Credentials",F1="ContextAssertion",j="DurationSeconds",q1="Expiration",v1="ExternalId",w1="Key",H="Policy",z="PolicyArns",r1="ProviderArn",R1="ProvidedContexts",U1="ProviderId",b="PackedPolicySize",G1="Provider",y="RoleArn",f="RoleSessionName",M1="SecretAccessKey",h1="SubjectFromWebIdentityToken",k="SourceIdentity",a1="SerialNumber",A1="SessionToken",T1="Tags",_1="TokenCode",V1="TransitiveTagKeys",wd="Version",B1="Value",k1="WebIdentityToken",L1="arn",R="message",rd=S((l)=>Object.entries(l).map(([I,d])=>w.extendedEncodeURIComponent(I)+"="+w.extendedEncodeURIComponent(d)).join("&"),"buildFormUrlencodedString"),JP=S((l,I)=>{if(I.Error?.Code!==void 0)return I.Error.Code;if(l.statusCode==404)return"NotFound"},"loadQueryErrorCode"),Q1=class extends eI.Command.classBuilder().ep(cI.commonParams).m(function(l,I,d,E){return[xI.getSerdePlugin(d,this.serialize,this.deserialize),iI.getEndpointPlugin(d,l.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,el).ser(pI).de(tI).build(){static{S(this,"AssumeRoleCommand")}},KP=I1(),XP=il(),QP=A(),ZP=s(),Z1=class extends QP.Command.classBuilder().ep(ZP.commonParams).m(function(l,I,d,E){return[XP.getSerdePlugin(d,this.serialize,this.deserialize),KP.getEndpointPlugin(d,l.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(ld,dd).ser(uI).de(lP).build(){static{S(this,"AssumeRoleWithWebIdentityCommand")}},$P=O(),jP={AssumeRoleCommand:Q1,AssumeRoleWithWebIdentityCommand:Z1},Rd=class extends $P.STSClient{static{S(this,"STS")}};CI.createAggregatedClient(jP,Rd);var HP=s(),Y1=bI(),Cl="us-east-1",Ud=S((l)=>{if(typeof l?.Arn==="string"){let I=l.Arn.split(":");if(I.length>4&&I[4]!=="")return I[4]}return},"getAccountIdFromAssumedRoleUser"),Gd=S(async(l,I,d)=>{let E=typeof l==="function"?await l():l,P=typeof I==="function"?await I():I;return d?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${E} (provider)`,`${P} (parent client)`,`${Cl} (STS default)`),E??P??Cl},"resolveRegion"),zP=S((l,I)=>{let d,E;return async(P,v)=>{if(E=P,!d){let{logger:K=l?.parentClientConfig?.logger,region:x,requestHandler:g=l?.parentClientConfig?.requestHandler,credentialProviderLogger:e}=l,_d=await Gd(x,l?.parentClientConfig?.region,e),Vd=!Md(g);d=new I({profile:l?.parentClientConfig?.profile,credentialDefaultProvider:S(()=>async()=>E,"credentialDefaultProvider"),region:_d,requestHandler:Vd?g:void 0,logger:K})}let{Credentials:N,AssumedRoleUser:h}=await d.send(new Q1(v));if(!N||!N.AccessKeyId||!N.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${v.RoleArn}`);let T=Ud(h),_={accessKeyId:N.AccessKeyId,secretAccessKey:N.SecretAccessKey,sessionToken:N.SessionToken,expiration:N.Expiration,...N.CredentialScope&&{credentialScope:N.CredentialScope},...T&&{accountId:T}};return Y1.setCredentialFeature(_,"CREDENTIALS_STS_ASSUME_ROLE","i"),_}},"getDefaultRoleAssumer"),bP=S((l,I)=>{let d;return async(E)=>{if(!d){let{logger:T=l?.parentClientConfig?.logger,region:_,requestHandler:K=l?.parentClientConfig?.requestHandler,credentialProviderLogger:x}=l,g=await Gd(_,l?.parentClientConfig?.region,x),e=!Md(K);d=new I({profile:l?.parentClientConfig?.profile,region:g,requestHandler:e?K:void 0,logger:T})}let{Credentials:P,AssumedRoleUser:v}=await d.send(new Z1(E));if(!P||!P.AccessKeyId||!P.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${E.RoleArn}`);let N=Ud(v),h={accessKeyId:P.AccessKeyId,secretAccessKey:P.SecretAccessKey,sessionToken:P.SessionToken,expiration:P.Expiration,...P.CredentialScope&&{credentialScope:P.CredentialScope},...N&&{accountId:N}};if(N)Y1.setCredentialFeature(h,"RESOLVED_ACCOUNT_ID","T");return Y1.setCredentialFeature(h,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),h}},"getDefaultRoleAssumerWithWebIdentity"),Md=S((l)=>{return l?.metadata?.handlerProtocol==="h2"},"isH2"),hd=O(),ad=S((l,I)=>{if(!I)return l;else return class d extends l{static{S(this,"CustomizableSTSClient")}constructor(E){super(E);for(let P of I)this.middlewareStack.use(P)}}},"getCustomizableStsClientCtor"),Ad=S((l={},I)=>zP(l,ad(hd.STSClient,I)),"getDefaultRoleAssumer"),Td=S((l={},I)=>bP(l,ad(hd.STSClient,I)),"getDefaultRoleAssumerWithWebIdentity"),yP=S((l)=>(I)=>l({roleAssumer:Ad(I),roleAssumerWithWebIdentity:Td(I),...I}),"decorateDefaultCredentialProvider")});export default fP();
2
+ import{a as kI,b as LI,c as WI,d as bd,e as yd,f as YI,g as _l,h as JI,i as dI,j as id,k as I1,l as II,m as Vl,n as PI,o as EI,p as SI,q as DI,r as NI,s as VI}from"./chunk-ke08h1ew.js";import{Vb as Bd,Wb as il,Xb as l1,Yb as A,Zb as m}from"./chunk-12dsc8ya.js";import{$b as $l,cc as md,dc as Cd,fc as lI}from"./chunk-7dp9xw46.js";import{ic as bI}from"./chunk-e4htsnc2.js";import"./chunk-qsb7ddwv.js";import"./chunk-t0xrvrt4.js";import{vc as td}from"./chunk-4kkyjz2j.js";import{xc as V}from"./chunk-5zy36vzw.js";var o=V((j1)=>{Object.defineProperty(j1,"__esModule",{value:!0});j1.resolveHttpAuthSchemeConfig=j1.resolveStsAuthConfig=j1.defaultSTSHttpAuthSchemeProvider=j1.defaultSTSHttpAuthSchemeParametersProvider=void 0;var kd=m(),c=Bd(),Ld=O(),Wd=async(l,I,d)=>{return{operation:c.getSmithyContext(I).operation,region:await c.normalizeProvider(l.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};j1.defaultSTSHttpAuthSchemeParametersProvider=Wd;function Yd(l){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:l.region},propertiesExtractor:(I,d)=>({signingProperties:{config:I,context:d}})}}function Jd(l){return{schemeId:"smithy.api#noAuth"}}var Kd=(l)=>{let I=[];switch(l.operation){case"AssumeRoleWithWebIdentity":{I.push(Jd(l));break}default:I.push(Yd(l))}return I};j1.defaultSTSHttpAuthSchemeProvider=Kd;var Xd=(l)=>Object.assign(l,{stsClientCtor:Ld.STSClient});j1.resolveStsAuthConfig=Xd;var Qd=(l)=>{let I=j1.resolveStsAuthConfig(l),d=kd.resolveAwsSdkSigV4Config(I);return Object.assign(d,{authSchemePreference:c.normalizeProvider(l.authSchemePreference??[])})};j1.resolveHttpAuthSchemeConfig=Qd});var s=V((b1)=>{Object.defineProperty(b1,"__esModule",{value:!0});b1.commonParams=b1.resolveClientEndpointParameters=void 0;var jd=(l)=>{return Object.assign(l,{useDualstackEndpoint:l.useDualstackEndpoint??!1,useFipsEndpoint:l.useFipsEndpoint??!1,useGlobalEndpoint:l.useGlobalEndpoint??!1,defaultSigningName:"sts"})};b1.resolveClientEndpointParameters=jd;b1.commonParams={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}}});var Fl=V((Dl)=>{Object.defineProperty(Dl,"__esModule",{value:!0});Dl.ruleSet=void 0;var n1="required",D="type",F="fn",q="argv",J="ref",f1=!1,n=!0,Y="booleanEquals",U="stringEquals",p1="sigv4",u1="sts",t1="us-east-1",r="endpoint",O1="https://sts.{Region}.{PartitionResult#dnsSuffix}",B="tree",X="error",u="getAttr",s1={[n1]:!1,[D]:"String"},p={[n1]:!0,default:!1,[D]:"Boolean"},ll={[J]:"Endpoint"},g1={[F]:"isSet",[q]:[{[J]:"Region"}]},G={[J]:"Region"},m1={[F]:"aws.partition",[q]:[G],assign:"PartitionResult"},dl={[J]:"UseFIPS"},Il={[J]:"UseDualStack"},M={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:p1,signingName:u1,signingRegion:t1}]},headers:{}},a={},C1={conditions:[{[F]:U,[q]:[G,"aws-global"]}],[r]:M,[D]:r},Pl={[F]:Y,[q]:[dl,!0]},El={[F]:Y,[q]:[Il,!0]},i1={[F]:u,[q]:[{[J]:"PartitionResult"},"supportsFIPS"]},Sl={[J]:"PartitionResult"},x1={[F]:Y,[q]:[!0,{[F]:u,[q]:[Sl,"supportsDualStack"]}]},e1=[{[F]:"isSet",[q]:[ll]}],c1=[Pl],o1=[El],zd={version:"1.0",parameters:{Region:s1,UseDualStack:p,UseFIPS:p,Endpoint:s1,UseGlobalEndpoint:p},rules:[{conditions:[{[F]:Y,[q]:[{[J]:"UseGlobalEndpoint"},n]},{[F]:"not",[q]:e1},g1,m1,{[F]:Y,[q]:[dl,f1]},{[F]:Y,[q]:[Il,f1]}],rules:[{conditions:[{[F]:U,[q]:[G,"ap-northeast-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-south-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-southeast-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-southeast-2"]}],endpoint:M,[D]:r},C1,{conditions:[{[F]:U,[q]:[G,"ca-central-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-central-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-north-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-2"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-3"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"sa-east-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,t1]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-east-2"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-west-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-west-2"]}],endpoint:M,[D]:r},{endpoint:{url:O1,properties:{authSchemes:[{name:p1,signingName:u1,signingRegion:"{Region}"}]},headers:a},[D]:r}],[D]:B},{conditions:e1,rules:[{conditions:c1,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[D]:X},{conditions:o1,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[D]:X},{endpoint:{url:ll,properties:a,headers:a},[D]:r}],[D]:B},{conditions:[g1],rules:[{conditions:[m1],rules:[{conditions:[Pl,El],rules:[{conditions:[{[F]:Y,[q]:[n,i1]},x1],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[D]:X}],[D]:B},{conditions:c1,rules:[{conditions:[{[F]:Y,[q]:[i1,n]}],rules:[{conditions:[{[F]:U,[q]:[{[F]:u,[q]:[Sl,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:a,headers:a},[D]:r},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"FIPS is enabled but this partition does not support FIPS",[D]:X}],[D]:B},{conditions:o1,rules:[{conditions:[x1],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"DualStack is enabled but this partition does not support DualStack",[D]:X}],[D]:B},C1,{endpoint:{url:O1,properties:a,headers:a},[D]:r}],[D]:B}],[D]:B},{error:"Invalid Configuration: Missing Region",[D]:X}]};Dl.ruleSet=zd});var wl=V((ql)=>{Object.defineProperty(ql,"__esModule",{value:!0});ql.defaultEndpointResolver=void 0;var fd=yd(),t=bd(),Od=Fl(),sd=new t.EndpointCache({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),gd=(l,I={})=>{return sd.get(l,()=>t.resolveEndpoint(Od.ruleSet,{endpointParams:l,logger:I.logger}))};ql.defaultEndpointResolver=gd;t.customEndpointFunctions.aws=fd.awsEndpointFunctions});var Ml=V((Ul)=>{Object.defineProperty(Ul,"__esModule",{value:!0});Ul.getRuntimeConfig=void 0;var xd=m(),ed=l1(),cd=A(),od=id(),rl=Cd(),Rl=md(),nd=o(),pd=wl(),ud=(l)=>{return{apiVersion:"2011-06-15",base64Decoder:l?.base64Decoder??rl.fromBase64,base64Encoder:l?.base64Encoder??rl.toBase64,disableHostPrefix:l?.disableHostPrefix??!1,endpointProvider:l?.endpointProvider??pd.defaultEndpointResolver,extensions:l?.extensions??[],httpAuthSchemeProvider:l?.httpAuthSchemeProvider??nd.defaultSTSHttpAuthSchemeProvider,httpAuthSchemes:l?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(I)=>I.getIdentityProvider("aws.auth#sigv4"),signer:new xd.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(I)=>I.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ed.NoAuthSigner}],logger:l?.logger??new cd.NoOpLogger,serviceId:l?.serviceId??"STS",urlParser:l?.urlParser??od.parseUrl,utf8Decoder:l?.utf8Decoder??Rl.fromUtf8,utf8Encoder:l?.utf8Encoder??Rl.toUtf8}};Ul.getRuntimeConfig=ud});var Ll=V((Bl)=>{Object.defineProperty(Bl,"__esModule",{value:!0});Bl.getRuntimeConfig=void 0;var FI=td(),qI=FI.__importDefault(PI()),hl=m(),al=EI(),C=_l(),vI=l1(),wI=SI(),Al=Vl(),Q=dI(),Tl=lI(),rI=DI(),RI=II(),UI=Ml(),GI=A(),MI=NI(),hI=A(),aI=(l)=>{hI.emitWarningIfUnsupportedVersion(process.version);let I=MI.resolveDefaultsModeConfig(l),d=()=>I().then(GI.loadConfigsForDefaultMode),E=UI.getRuntimeConfig(l);hl.emitWarningIfUnsupportedVersion(process.version);let P={profile:l?.profile};return{...E,...l,runtime:"node",defaultsMode:I,bodyLengthChecker:l?.bodyLengthChecker??rI.calculateBodyLength,defaultUserAgentProvider:l?.defaultUserAgentProvider??al.createDefaultUserAgentProvider({serviceId:E.serviceId,clientVersion:qI.default.version}),httpAuthSchemes:l?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(v)=>v.getIdentityProvider("aws.auth#sigv4")||(async(N)=>await l.credentialDefaultProvider(N?.__config||{})()),signer:new hl.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(v)=>v.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new vI.NoAuthSigner}],maxAttempts:l?.maxAttempts??Q.loadConfig(Al.NODE_MAX_ATTEMPT_CONFIG_OPTIONS,l),region:l?.region??Q.loadConfig(C.NODE_REGION_CONFIG_OPTIONS,{...C.NODE_REGION_CONFIG_FILE_OPTIONS,...P}),requestHandler:Tl.NodeHttpHandler.create(l?.requestHandler??d),retryMode:l?.retryMode??Q.loadConfig({...Al.NODE_RETRY_MODE_CONFIG_OPTIONS,default:async()=>(await d()).retryMode||RI.DEFAULT_RETRY_MODE},l),sha256:l?.sha256??wI.Hash.bind(null,"sha256"),streamCollector:l?.streamCollector??Tl.streamCollector,useDualstackEndpoint:l?.useDualstackEndpoint??Q.loadConfig(C.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS,P),useFipsEndpoint:l?.useFipsEndpoint??Q.loadConfig(C.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS,P),userAgentAppId:l?.userAgentAppId??Q.loadConfig(al.NODE_APP_ID_CONFIG_OPTIONS,P)}};Bl.getRuntimeConfig=aI});var Jl=V((Wl)=>{Object.defineProperty(Wl,"__esModule",{value:!0});Wl.resolveHttpAuthRuntimeConfig=Wl.getHttpAuthExtensionConfiguration=void 0;var AI=(l)=>{let{httpAuthSchemes:I,httpAuthSchemeProvider:d,credentials:E}=l;return{setHttpAuthScheme(P){let v=I.findIndex((N)=>N.schemeId===P.schemeId);if(v===-1)I.push(P);else I.splice(v,1,P)},httpAuthSchemes(){return I},setHttpAuthSchemeProvider(P){d=P},httpAuthSchemeProvider(){return d},setCredentials(P){E=P},credentials(){return E}}};Wl.getHttpAuthExtensionConfiguration=AI;var TI=(l)=>{return{httpAuthSchemes:l.httpAuthSchemes(),httpAuthSchemeProvider:l.httpAuthSchemeProvider(),credentials:l.credentials()}};Wl.resolveHttpAuthRuntimeConfig=TI});var zl=V((jl)=>{Object.defineProperty(jl,"__esModule",{value:!0});jl.resolveRuntimeExtensions=void 0;var Kl=VI(),Xl=$l(),Ql=A(),Zl=Jl(),BI=(l,I)=>{let d=Object.assign(Kl.getAwsRegionExtensionConfiguration(l),Ql.getDefaultExtensionConfiguration(l),Xl.getHttpHandlerExtensionConfiguration(l),Zl.getHttpAuthExtensionConfiguration(l));return I.forEach((E)=>E.configure(d)),Object.assign(l,Kl.resolveAwsRegionExtensionConfiguration(d),Ql.resolveDefaultRuntimeConfig(d),Xl.resolveHttpHandlerRuntimeConfig(d),Zl.resolveHttpAuthRuntimeConfig(d))};jl.resolveRuntimeExtensions=BI});var O=V((P1)=>{Object.defineProperty(P1,"__esModule",{value:!0});P1.STSClient=P1.__Client=void 0;var bl=kI(),KI=LI(),XI=WI(),yl=YI(),QI=_l(),d1=l1(),ZI=JI(),$I=I1(),fl=Vl(),sl=A();Object.defineProperty(P1,"__Client",{enumerable:!0,get:function(){return sl.Client}});var Ol=o(),jI=s(),HI=Ll(),zI=zl();class gl extends sl.Client{config;constructor(...[l]){let I=HI.getRuntimeConfig(l||{});super(I);this.initConfig=I;let d=jI.resolveClientEndpointParameters(I),E=yl.resolveUserAgentConfig(d),P=fl.resolveRetryConfig(E),v=QI.resolveRegionConfig(P),N=bl.resolveHostHeaderConfig(v),h=$I.resolveEndpointConfig(N),T=Ol.resolveHttpAuthSchemeConfig(h),_=zI.resolveRuntimeExtensions(T,l?.extensions||[]);this.config=_,this.middlewareStack.use(yl.getUserAgentPlugin(this.config)),this.middlewareStack.use(fl.getRetryPlugin(this.config)),this.middlewareStack.use(ZI.getContentLengthPlugin(this.config)),this.middlewareStack.use(bl.getHostHeaderPlugin(this.config)),this.middlewareStack.use(KI.getLoggerPlugin(this.config)),this.middlewareStack.use(XI.getRecursionDetectionPlugin(this.config)),this.middlewareStack.use(d1.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Ol.defaultSTSHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async(K)=>new d1.DefaultIdentityProviderConfig({"aws.auth#sigv4":K.credentials})})),this.middlewareStack.use(d1.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}P1.STSClient=gl});var fP=V((nP,$1)=>{var{defineProperty:i,getOwnPropertyDescriptor:yI,getOwnPropertyNames:fI}=Object,OI=Object.prototype.hasOwnProperty,S=(l,I)=>i(l,"name",{value:I,configurable:!0}),sI=(l,I)=>{for(var d in I)i(l,d,{get:I[d],enumerable:!0})},W1=(l,I,d,E)=>{if(I&&typeof I==="object"||typeof I==="function"){for(let P of fI(I))if(!OI.call(l,P)&&P!==d)i(l,P,{get:()=>I[P],enumerable:!(E=yI(I,P))||E.enumerable})}return l},gI=(l,I,d)=>(W1(l,I,"default"),d&&W1(d,I,"default")),mI=(l)=>W1(i({},"__esModule",{value:!0}),l),J1={};sI(J1,{AssumeRoleCommand:()=>Q1,AssumeRoleResponseFilterSensitiveLog:()=>el,AssumeRoleWithWebIdentityCommand:()=>Z1,AssumeRoleWithWebIdentityRequestFilterSensitiveLog:()=>ld,AssumeRoleWithWebIdentityResponseFilterSensitiveLog:()=>dd,ClientInputEndpointParameters:()=>HP.ClientInputEndpointParameters,CredentialsFilterSensitiveLog:()=>K1,ExpiredTokenException:()=>cl,IDPCommunicationErrorException:()=>Id,IDPRejectedClaimException:()=>ul,InvalidIdentityTokenException:()=>tl,MalformedPolicyDocumentException:()=>ol,PackedPolicyTooLargeException:()=>nl,RegionDisabledException:()=>pl,STS:()=>Rd,STSServiceException:()=>L,decorateDefaultCredentialProvider:()=>yP,getDefaultRoleAssumer:()=>Ad,getDefaultRoleAssumerWithWebIdentity:()=>Td});$1.exports=mI(J1);gI(J1,O(),$1.exports);var CI=A(),iI=I1(),xI=il(),eI=A(),cI=s(),xl=A(),oI=A(),L=class l extends oI.ServiceException{static{S(this,"STSServiceException")}constructor(I){super(I);Object.setPrototypeOf(this,l.prototype)}},K1=S((l)=>({...l,...l.SecretAccessKey&&{SecretAccessKey:xl.SENSITIVE_STRING}}),"CredentialsFilterSensitiveLog"),el=S((l)=>({...l,...l.Credentials&&{Credentials:K1(l.Credentials)}}),"AssumeRoleResponseFilterSensitiveLog"),cl=class l extends L{static{S(this,"ExpiredTokenException")}name="ExpiredTokenException";$fault="client";constructor(I){super({name:"ExpiredTokenException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ol=class l extends L{static{S(this,"MalformedPolicyDocumentException")}name="MalformedPolicyDocumentException";$fault="client";constructor(I){super({name:"MalformedPolicyDocumentException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},nl=class l extends L{static{S(this,"PackedPolicyTooLargeException")}name="PackedPolicyTooLargeException";$fault="client";constructor(I){super({name:"PackedPolicyTooLargeException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},pl=class l extends L{static{S(this,"RegionDisabledException")}name="RegionDisabledException";$fault="client";constructor(I){super({name:"RegionDisabledException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ul=class l extends L{static{S(this,"IDPRejectedClaimException")}name="IDPRejectedClaimException";$fault="client";constructor(I){super({name:"IDPRejectedClaimException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},tl=class l extends L{static{S(this,"InvalidIdentityTokenException")}name="InvalidIdentityTokenException";$fault="client";constructor(I){super({name:"InvalidIdentityTokenException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ld=S((l)=>({...l,...l.WebIdentityToken&&{WebIdentityToken:xl.SENSITIVE_STRING}}),"AssumeRoleWithWebIdentityRequestFilterSensitiveLog"),dd=S((l)=>({...l,...l.Credentials&&{Credentials:K1(l.Credentials)}}),"AssumeRoleWithWebIdentityResponseFilterSensitiveLog"),Id=class l extends L{static{S(this,"IDPCommunicationErrorException")}name="IDPCommunicationErrorException";$fault="client";constructor(I){super({name:"IDPCommunicationErrorException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},X1=m(),nI=$l(),w=A(),pI=S(async(l,I)=>{let d=Fd,E;return E=rd({...FP(l,I),[vd]:WP,[wd]:qd}),Nd(I,d,"/",void 0,E)},"se_AssumeRoleCommand"),uI=S(async(l,I)=>{let d=Fd,E;return E=rd({...qP(l,I),[vd]:YP,[wd]:qd}),Nd(I,d,"/",void 0,E)},"se_AssumeRoleWithWebIdentityCommand"),tI=S(async(l,I)=>{if(l.statusCode>=300)return Pd(l,I);let d=await X1.parseXmlBody(l.body,I),E={};return E=MP(d.AssumeRoleResult,I),{$metadata:W(l),...E}},"de_AssumeRoleCommand"),lP=S(async(l,I)=>{if(l.statusCode>=300)return Pd(l,I);let d=await X1.parseXmlBody(l.body,I),E={};return E=hP(d.AssumeRoleWithWebIdentityResult,I),{$metadata:W(l),...E}},"de_AssumeRoleWithWebIdentityCommand"),Pd=S(async(l,I)=>{let d={...l,body:await X1.parseXmlErrorBody(l.body,I)},E=JP(l,d.body);switch(E){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await dP(d,I);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await SP(d,I);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await DP(d,I);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await NP(d,I);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await IP(d,I);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await PP(d,I);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await EP(d,I);default:let P=d.body;return LP({output:l,parsedBody:P.Error,errorCode:E})}},"de_CommandError"),dP=S(async(l,I)=>{let d=l.body,E=aP(d.Error,I),P=new cl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_ExpiredTokenExceptionRes"),IP=S(async(l,I)=>{let d=l.body,E=AP(d.Error,I),P=new Id({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_IDPCommunicationErrorExceptionRes"),PP=S(async(l,I)=>{let d=l.body,E=TP(d.Error,I),P=new ul({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_IDPRejectedClaimExceptionRes"),EP=S(async(l,I)=>{let d=l.body,E=_P(d.Error,I),P=new tl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_InvalidIdentityTokenExceptionRes"),SP=S(async(l,I)=>{let d=l.body,E=VP(d.Error,I),P=new ol({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_MalformedPolicyDocumentExceptionRes"),DP=S(async(l,I)=>{let d=l.body,E=BP(d.Error,I),P=new nl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_PackedPolicyTooLargeExceptionRes"),NP=S(async(l,I)=>{let d=l.body,E=kP(d.Error,I),P=new pl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_RegionDisabledExceptionRes"),FP=S((l,I)=>{let d={};if(l[y]!=null)d[y]=l[y];if(l[f]!=null)d[f]=l[f];if(l[z]!=null){let E=Ed(l[z],I);if(l[z]?.length===0)d.PolicyArns=[];Object.entries(E).forEach(([P,v])=>{let N=`PolicyArns.${P}`;d[N]=v})}if(l[H]!=null)d[H]=l[H];if(l[j]!=null)d[j]=l[j];if(l[T1]!=null){let E=GP(l[T1],I);if(l[T1]?.length===0)d.Tags=[];Object.entries(E).forEach(([P,v])=>{let N=`Tags.${P}`;d[N]=v})}if(l[V1]!=null){let E=UP(l[V1],I);if(l[V1]?.length===0)d.TransitiveTagKeys=[];Object.entries(E).forEach(([P,v])=>{let N=`TransitiveTagKeys.${P}`;d[N]=v})}if(l[v1]!=null)d[v1]=l[v1];if(l[a1]!=null)d[a1]=l[a1];if(l[_1]!=null)d[_1]=l[_1];if(l[k]!=null)d[k]=l[k];if(l[R1]!=null){let E=rP(l[R1],I);if(l[R1]?.length===0)d.ProvidedContexts=[];Object.entries(E).forEach(([P,v])=>{let N=`ProvidedContexts.${P}`;d[N]=v})}return d},"se_AssumeRoleRequest"),qP=S((l,I)=>{let d={};if(l[y]!=null)d[y]=l[y];if(l[f]!=null)d[f]=l[f];if(l[k1]!=null)d[k1]=l[k1];if(l[U1]!=null)d[U1]=l[U1];if(l[z]!=null){let E=Ed(l[z],I);if(l[z]?.length===0)d.PolicyArns=[];Object.entries(E).forEach(([P,v])=>{let N=`PolicyArns.${P}`;d[N]=v})}if(l[H]!=null)d[H]=l[H];if(l[j]!=null)d[j]=l[j];return d},"se_AssumeRoleWithWebIdentityRequest"),Ed=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=vP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_policyDescriptorListType"),vP=S((l,I)=>{let d={};if(l[L1]!=null)d[L1]=l[L1];return d},"se_PolicyDescriptorType"),wP=S((l,I)=>{let d={};if(l[r1]!=null)d[r1]=l[r1];if(l[F1]!=null)d[F1]=l[F1];return d},"se_ProvidedContext"),rP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=wP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_ProvidedContextsListType"),RP=S((l,I)=>{let d={};if(l[w1]!=null)d[w1]=l[w1];if(l[B1]!=null)d[B1]=l[B1];return d},"se_Tag"),UP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;d[`member.${E}`]=P,E++}return d},"se_tagKeyListType"),GP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=RP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_tagListType"),Sd=S((l,I)=>{let d={};if(l[S1]!=null)d[S1]=w.expectString(l[S1]);if(l[D1]!=null)d[D1]=w.expectString(l[D1]);return d},"de_AssumedRoleUser"),MP=S((l,I)=>{let d={};if(l[$]!=null)d[$]=Dd(l[$],I);if(l[Z]!=null)d[Z]=Sd(l[Z],I);if(l[b]!=null)d[b]=w.strictParseInt32(l[b]);if(l[k]!=null)d[k]=w.expectString(l[k]);return d},"de_AssumeRoleResponse"),hP=S((l,I)=>{let d={};if(l[$]!=null)d[$]=Dd(l[$],I);if(l[h1]!=null)d[h1]=w.expectString(l[h1]);if(l[Z]!=null)d[Z]=Sd(l[Z],I);if(l[b]!=null)d[b]=w.strictParseInt32(l[b]);if(l[G1]!=null)d[G1]=w.expectString(l[G1]);if(l[N1]!=null)d[N1]=w.expectString(l[N1]);if(l[k]!=null)d[k]=w.expectString(l[k]);return d},"de_AssumeRoleWithWebIdentityResponse"),Dd=S((l,I)=>{let d={};if(l[E1]!=null)d[E1]=w.expectString(l[E1]);if(l[M1]!=null)d[M1]=w.expectString(l[M1]);if(l[A1]!=null)d[A1]=w.expectString(l[A1]);if(l[q1]!=null)d[q1]=w.expectNonNull(w.parseRfc3339DateTimeWithOffset(l[q1]));return d},"de_Credentials"),aP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_ExpiredTokenException"),AP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_IDPCommunicationErrorException"),TP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_IDPRejectedClaimException"),_P=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_InvalidIdentityTokenException"),VP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_MalformedPolicyDocumentException"),BP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_PackedPolicyTooLargeException"),kP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_RegionDisabledException"),W=S((l)=>({httpStatusCode:l.statusCode,requestId:l.headers["x-amzn-requestid"]??l.headers["x-amzn-request-id"]??l.headers["x-amz-request-id"],extendedRequestId:l.headers["x-amz-id-2"],cfId:l.headers["x-amz-cf-id"]}),"deserializeMetadata"),LP=w.withBaseException(L),Nd=S(async(l,I,d,E,P)=>{let{hostname:v,protocol:N="https",port:h,path:T}=await l.endpoint(),_={protocol:N,hostname:v,port:h,method:"POST",path:T.endsWith("/")?T.slice(0,-1)+d:T+d,headers:I};if(E!==void 0)_.hostname=E;if(P!==void 0)_.body=P;return new nI.HttpRequest(_)},"buildHttpRpcRequest"),Fd={"content-type":"application/x-www-form-urlencoded"},qd="2011-06-15",vd="Action",E1="AccessKeyId",WP="AssumeRole",S1="AssumedRoleId",Z="AssumedRoleUser",YP="AssumeRoleWithWebIdentity",D1="Arn",N1="Audience",$="Credentials",F1="ContextAssertion",j="DurationSeconds",q1="Expiration",v1="ExternalId",w1="Key",H="Policy",z="PolicyArns",r1="ProviderArn",R1="ProvidedContexts",U1="ProviderId",b="PackedPolicySize",G1="Provider",y="RoleArn",f="RoleSessionName",M1="SecretAccessKey",h1="SubjectFromWebIdentityToken",k="SourceIdentity",a1="SerialNumber",A1="SessionToken",T1="Tags",_1="TokenCode",V1="TransitiveTagKeys",wd="Version",B1="Value",k1="WebIdentityToken",L1="arn",R="message",rd=S((l)=>Object.entries(l).map(([I,d])=>w.extendedEncodeURIComponent(I)+"="+w.extendedEncodeURIComponent(d)).join("&"),"buildFormUrlencodedString"),JP=S((l,I)=>{if(I.Error?.Code!==void 0)return I.Error.Code;if(l.statusCode==404)return"NotFound"},"loadQueryErrorCode"),Q1=class extends eI.Command.classBuilder().ep(cI.commonParams).m(function(l,I,d,E){return[xI.getSerdePlugin(d,this.serialize,this.deserialize),iI.getEndpointPlugin(d,l.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,el).ser(pI).de(tI).build(){static{S(this,"AssumeRoleCommand")}},KP=I1(),XP=il(),QP=A(),ZP=s(),Z1=class extends QP.Command.classBuilder().ep(ZP.commonParams).m(function(l,I,d,E){return[XP.getSerdePlugin(d,this.serialize,this.deserialize),KP.getEndpointPlugin(d,l.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(ld,dd).ser(uI).de(lP).build(){static{S(this,"AssumeRoleWithWebIdentityCommand")}},$P=O(),jP={AssumeRoleCommand:Q1,AssumeRoleWithWebIdentityCommand:Z1},Rd=class extends $P.STSClient{static{S(this,"STS")}};CI.createAggregatedClient(jP,Rd);var HP=s(),Y1=bI(),Cl="us-east-1",Ud=S((l)=>{if(typeof l?.Arn==="string"){let I=l.Arn.split(":");if(I.length>4&&I[4]!=="")return I[4]}return},"getAccountIdFromAssumedRoleUser"),Gd=S(async(l,I,d)=>{let E=typeof l==="function"?await l():l,P=typeof I==="function"?await I():I;return d?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${E} (provider)`,`${P} (parent client)`,`${Cl} (STS default)`),E??P??Cl},"resolveRegion"),zP=S((l,I)=>{let d,E;return async(P,v)=>{if(E=P,!d){let{logger:K=l?.parentClientConfig?.logger,region:x,requestHandler:g=l?.parentClientConfig?.requestHandler,credentialProviderLogger:e}=l,_d=await Gd(x,l?.parentClientConfig?.region,e),Vd=!Md(g);d=new I({profile:l?.parentClientConfig?.profile,credentialDefaultProvider:S(()=>async()=>E,"credentialDefaultProvider"),region:_d,requestHandler:Vd?g:void 0,logger:K})}let{Credentials:N,AssumedRoleUser:h}=await d.send(new Q1(v));if(!N||!N.AccessKeyId||!N.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${v.RoleArn}`);let T=Ud(h),_={accessKeyId:N.AccessKeyId,secretAccessKey:N.SecretAccessKey,sessionToken:N.SessionToken,expiration:N.Expiration,...N.CredentialScope&&{credentialScope:N.CredentialScope},...T&&{accountId:T}};return Y1.setCredentialFeature(_,"CREDENTIALS_STS_ASSUME_ROLE","i"),_}},"getDefaultRoleAssumer"),bP=S((l,I)=>{let d;return async(E)=>{if(!d){let{logger:T=l?.parentClientConfig?.logger,region:_,requestHandler:K=l?.parentClientConfig?.requestHandler,credentialProviderLogger:x}=l,g=await Gd(_,l?.parentClientConfig?.region,x),e=!Md(K);d=new I({profile:l?.parentClientConfig?.profile,region:g,requestHandler:e?K:void 0,logger:T})}let{Credentials:P,AssumedRoleUser:v}=await d.send(new Z1(E));if(!P||!P.AccessKeyId||!P.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${E.RoleArn}`);let N=Ud(v),h={accessKeyId:P.AccessKeyId,secretAccessKey:P.SecretAccessKey,sessionToken:P.SessionToken,expiration:P.Expiration,...P.CredentialScope&&{credentialScope:P.CredentialScope},...N&&{accountId:N}};if(N)Y1.setCredentialFeature(h,"RESOLVED_ACCOUNT_ID","T");return Y1.setCredentialFeature(h,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),h}},"getDefaultRoleAssumerWithWebIdentity"),Md=S((l)=>{return l?.metadata?.handlerProtocol==="h2"},"isH2"),hd=O(),ad=S((l,I)=>{if(!I)return l;else return class d extends l{static{S(this,"CustomizableSTSClient")}constructor(E){super(E);for(let P of I)this.middlewareStack.use(P)}}},"getCustomizableStsClientCtor"),Ad=S((l={},I)=>zP(l,ad(hd.STSClient,I)),"getDefaultRoleAssumer"),Td=S((l={},I)=>bP(l,ad(hd.STSClient,I)),"getDefaultRoleAssumerWithWebIdentity"),yP=S((l)=>(I)=>l({roleAssumer:Ad(I),roleAssumerWithWebIdentity:Td(I),...I}),"decorateDefaultCredentialProvider")});export default fP();
3
3
 
4
- //# debugId=7BBFAB9A074A36DF64756E2164756E21
4
+ //# debugId=71380D8CC4BEB6D064756E2164756E21
@@ -14,6 +14,6 @@
14
14
  "\"use strict\";\nvar __defProp = Object.defineProperty;\nvar __getOwnPropDesc = Object.getOwnPropertyDescriptor;\nvar __getOwnPropNames = Object.getOwnPropertyNames;\nvar __hasOwnProp = Object.prototype.hasOwnProperty;\nvar __name = (target, value) => __defProp(target, \"name\", { value, configurable: true });\nvar __export = (target, all) => {\n for (var name in all)\n __defProp(target, name, { get: all[name], enumerable: true });\n};\nvar __copyProps = (to, from, except, desc) => {\n if (from && typeof from === \"object\" || typeof from === \"function\") {\n for (let key of __getOwnPropNames(from))\n if (!__hasOwnProp.call(to, key) && key !== except)\n __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });\n }\n return to;\n};\nvar __reExport = (target, mod, secondTarget) => (__copyProps(target, mod, \"default\"), secondTarget && __copyProps(secondTarget, mod, \"default\"));\nvar __toCommonJS = (mod) => __copyProps(__defProp({}, \"__esModule\", { value: true }), mod);\n\n// src/submodules/sts/index.ts\nvar index_exports = {};\n__export(index_exports, {\n AssumeRoleCommand: () => AssumeRoleCommand,\n AssumeRoleResponseFilterSensitiveLog: () => AssumeRoleResponseFilterSensitiveLog,\n AssumeRoleWithWebIdentityCommand: () => AssumeRoleWithWebIdentityCommand,\n AssumeRoleWithWebIdentityRequestFilterSensitiveLog: () => AssumeRoleWithWebIdentityRequestFilterSensitiveLog,\n AssumeRoleWithWebIdentityResponseFilterSensitiveLog: () => AssumeRoleWithWebIdentityResponseFilterSensitiveLog,\n ClientInputEndpointParameters: () => import_EndpointParameters3.ClientInputEndpointParameters,\n CredentialsFilterSensitiveLog: () => CredentialsFilterSensitiveLog,\n ExpiredTokenException: () => ExpiredTokenException,\n IDPCommunicationErrorException: () => IDPCommunicationErrorException,\n IDPRejectedClaimException: () => IDPRejectedClaimException,\n InvalidIdentityTokenException: () => InvalidIdentityTokenException,\n MalformedPolicyDocumentException: () => MalformedPolicyDocumentException,\n PackedPolicyTooLargeException: () => PackedPolicyTooLargeException,\n RegionDisabledException: () => RegionDisabledException,\n STS: () => STS,\n STSServiceException: () => STSServiceException,\n decorateDefaultCredentialProvider: () => decorateDefaultCredentialProvider,\n getDefaultRoleAssumer: () => getDefaultRoleAssumer2,\n getDefaultRoleAssumerWithWebIdentity: () => getDefaultRoleAssumerWithWebIdentity2\n});\nmodule.exports = __toCommonJS(index_exports);\n__reExport(index_exports, require(\"./STSClient\"), module.exports);\n\n// src/submodules/sts/STS.ts\nvar import_smithy_client6 = require(\"@smithy/smithy-client\");\n\n// src/submodules/sts/commands/AssumeRoleCommand.ts\nvar import_middleware_endpoint = require(\"@smithy/middleware-endpoint\");\nvar import_middleware_serde = require(\"@smithy/middleware-serde\");\nvar import_smithy_client4 = require(\"@smithy/smithy-client\");\nvar import_EndpointParameters = require(\"./endpoint/EndpointParameters\");\n\n// src/submodules/sts/models/models_0.ts\nvar import_smithy_client2 = require(\"@smithy/smithy-client\");\n\n// src/submodules/sts/models/STSServiceException.ts\nvar import_smithy_client = require(\"@smithy/smithy-client\");\nvar STSServiceException = class _STSServiceException extends import_smithy_client.ServiceException {\n static {\n __name(this, \"STSServiceException\");\n }\n /**\n * @internal\n */\n constructor(options) {\n super(options);\n Object.setPrototypeOf(this, _STSServiceException.prototype);\n }\n};\n\n// src/submodules/sts/models/models_0.ts\nvar CredentialsFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({\n ...obj,\n ...obj.SecretAccessKey && { SecretAccessKey: import_smithy_client2.SENSITIVE_STRING }\n}), \"CredentialsFilterSensitiveLog\");\nvar AssumeRoleResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({\n ...obj,\n ...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }\n}), \"AssumeRoleResponseFilterSensitiveLog\");\nvar ExpiredTokenException = class _ExpiredTokenException extends STSServiceException {\n static {\n __name(this, \"ExpiredTokenException\");\n }\n name = \"ExpiredTokenException\";\n $fault = \"client\";\n /**\n * @internal\n */\n constructor(opts) {\n super({\n name: \"ExpiredTokenException\",\n $fault: \"client\",\n ...opts\n });\n Object.setPrototypeOf(this, _ExpiredTokenException.prototype);\n }\n};\nvar MalformedPolicyDocumentException = class _MalformedPolicyDocumentException extends STSServiceException {\n static {\n __name(this, \"MalformedPolicyDocumentException\");\n }\n name = \"MalformedPolicyDocumentException\";\n $fault = \"client\";\n /**\n * @internal\n */\n constructor(opts) {\n super({\n name: \"MalformedPolicyDocumentException\",\n $fault: \"client\",\n ...opts\n });\n Object.setPrototypeOf(this, _MalformedPolicyDocumentException.prototype);\n }\n};\nvar PackedPolicyTooLargeException = class _PackedPolicyTooLargeException extends STSServiceException {\n static {\n __name(this, \"PackedPolicyTooLargeException\");\n }\n name = \"PackedPolicyTooLargeException\";\n $fault = \"client\";\n /**\n * @internal\n */\n constructor(opts) {\n super({\n name: \"PackedPolicyTooLargeException\",\n $fault: \"client\",\n ...opts\n });\n Object.setPrototypeOf(this, _PackedPolicyTooLargeException.prototype);\n }\n};\nvar RegionDisabledException = class _RegionDisabledException extends STSServiceException {\n static {\n __name(this, \"RegionDisabledException\");\n }\n name = \"RegionDisabledException\";\n $fault = \"client\";\n /**\n * @internal\n */\n constructor(opts) {\n super({\n name: \"RegionDisabledException\",\n $fault: \"client\",\n ...opts\n });\n Object.setPrototypeOf(this, _RegionDisabledException.prototype);\n }\n};\nvar IDPRejectedClaimException = class _IDPRejectedClaimException extends STSServiceException {\n static {\n __name(this, \"IDPRejectedClaimException\");\n }\n name = \"IDPRejectedClaimException\";\n $fault = \"client\";\n /**\n * @internal\n */\n constructor(opts) {\n super({\n name: \"IDPRejectedClaimException\",\n $fault: \"client\",\n ...opts\n });\n Object.setPrototypeOf(this, _IDPRejectedClaimException.prototype);\n }\n};\nvar InvalidIdentityTokenException = class _InvalidIdentityTokenException extends STSServiceException {\n static {\n __name(this, \"InvalidIdentityTokenException\");\n }\n name = \"InvalidIdentityTokenException\";\n $fault = \"client\";\n /**\n * @internal\n */\n constructor(opts) {\n super({\n name: \"InvalidIdentityTokenException\",\n $fault: \"client\",\n ...opts\n });\n Object.setPrototypeOf(this, _InvalidIdentityTokenException.prototype);\n }\n};\nvar AssumeRoleWithWebIdentityRequestFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({\n ...obj,\n ...obj.WebIdentityToken && { WebIdentityToken: import_smithy_client2.SENSITIVE_STRING }\n}), \"AssumeRoleWithWebIdentityRequestFilterSensitiveLog\");\nvar AssumeRoleWithWebIdentityResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({\n ...obj,\n ...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }\n}), \"AssumeRoleWithWebIdentityResponseFilterSensitiveLog\");\nvar IDPCommunicationErrorException = class _IDPCommunicationErrorException extends STSServiceException {\n static {\n __name(this, \"IDPCommunicationErrorException\");\n }\n name = \"IDPCommunicationErrorException\";\n $fault = \"client\";\n /**\n * @internal\n */\n constructor(opts) {\n super({\n name: \"IDPCommunicationErrorException\",\n $fault: \"client\",\n ...opts\n });\n Object.setPrototypeOf(this, _IDPCommunicationErrorException.prototype);\n }\n};\n\n// src/submodules/sts/protocols/Aws_query.ts\nvar import_core = require(\"@aws-sdk/core\");\nvar import_protocol_http = require(\"@smithy/protocol-http\");\nvar import_smithy_client3 = require(\"@smithy/smithy-client\");\nvar se_AssumeRoleCommand = /* @__PURE__ */ __name(async (input, context) => {\n const headers = SHARED_HEADERS;\n let body;\n body = buildFormUrlencodedString({\n ...se_AssumeRoleRequest(input, context),\n [_A]: _AR,\n [_V]: _\n });\n return buildHttpRpcRequest(context, headers, \"/\", void 0, body);\n}, \"se_AssumeRoleCommand\");\nvar se_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (input, context) => {\n const headers = SHARED_HEADERS;\n let body;\n body = buildFormUrlencodedString({\n ...se_AssumeRoleWithWebIdentityRequest(input, context),\n [_A]: _ARWWI,\n [_V]: _\n });\n return buildHttpRpcRequest(context, headers, \"/\", void 0, body);\n}, \"se_AssumeRoleWithWebIdentityCommand\");\nvar de_AssumeRoleCommand = /* @__PURE__ */ __name(async (output, context) => {\n if (output.statusCode >= 300) {\n return de_CommandError(output, context);\n }\n const data = await (0, import_core.parseXmlBody)(output.body, context);\n let contents = {};\n contents = de_AssumeRoleResponse(data.AssumeRoleResult, context);\n const response = {\n $metadata: deserializeMetadata(output),\n ...contents\n };\n return response;\n}, \"de_AssumeRoleCommand\");\nvar de_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (output, context) => {\n if (output.statusCode >= 300) {\n return de_CommandError(output, context);\n }\n const data = await (0, import_core.parseXmlBody)(output.body, context);\n let contents = {};\n contents = de_AssumeRoleWithWebIdentityResponse(data.AssumeRoleWithWebIdentityResult, context);\n const response = {\n $metadata: deserializeMetadata(output),\n ...contents\n };\n return response;\n}, \"de_AssumeRoleWithWebIdentityCommand\");\nvar de_CommandError = /* @__PURE__ */ __name(async (output, context) => {\n const parsedOutput = {\n ...output,\n body: await (0, import_core.parseXmlErrorBody)(output.body, context)\n };\n const errorCode = loadQueryErrorCode(output, parsedOutput.body);\n switch (errorCode) {\n case \"ExpiredTokenException\":\n case \"com.amazonaws.sts#ExpiredTokenException\":\n throw await de_ExpiredTokenExceptionRes(parsedOutput, context);\n case \"MalformedPolicyDocument\":\n case \"com.amazonaws.sts#MalformedPolicyDocumentException\":\n throw await de_MalformedPolicyDocumentExceptionRes(parsedOutput, context);\n case \"PackedPolicyTooLarge\":\n case \"com.amazonaws.sts#PackedPolicyTooLargeException\":\n throw await de_PackedPolicyTooLargeExceptionRes(parsedOutput, context);\n case \"RegionDisabledException\":\n case \"com.amazonaws.sts#RegionDisabledException\":\n throw await de_RegionDisabledExceptionRes(parsedOutput, context);\n case \"IDPCommunicationError\":\n case \"com.amazonaws.sts#IDPCommunicationErrorException\":\n throw await de_IDPCommunicationErrorExceptionRes(parsedOutput, context);\n case \"IDPRejectedClaim\":\n case \"com.amazonaws.sts#IDPRejectedClaimException\":\n throw await de_IDPRejectedClaimExceptionRes(parsedOutput, context);\n case \"InvalidIdentityToken\":\n case \"com.amazonaws.sts#InvalidIdentityTokenException\":\n throw await de_InvalidIdentityTokenExceptionRes(parsedOutput, context);\n default:\n const parsedBody = parsedOutput.body;\n return throwDefaultError({\n output,\n parsedBody: parsedBody.Error,\n errorCode\n });\n }\n}, \"de_CommandError\");\nvar de_ExpiredTokenExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {\n const body = parsedOutput.body;\n const deserialized = de_ExpiredTokenException(body.Error, context);\n const exception = new ExpiredTokenException({\n $metadata: deserializeMetadata(parsedOutput),\n ...deserialized\n });\n return (0, import_smithy_client3.decorateServiceException)(exception, body);\n}, \"de_ExpiredTokenExceptionRes\");\nvar de_IDPCommunicationErrorExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {\n const body = parsedOutput.body;\n const deserialized = de_IDPCommunicationErrorException(body.Error, context);\n const exception = new IDPCommunicationErrorException({\n $metadata: deserializeMetadata(parsedOutput),\n ...deserialized\n });\n return (0, import_smithy_client3.decorateServiceException)(exception, body);\n}, \"de_IDPCommunicationErrorExceptionRes\");\nvar de_IDPRejectedClaimExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {\n const body = parsedOutput.body;\n const deserialized = de_IDPRejectedClaimException(body.Error, context);\n const exception = new IDPRejectedClaimException({\n $metadata: deserializeMetadata(parsedOutput),\n ...deserialized\n });\n return (0, import_smithy_client3.decorateServiceException)(exception, body);\n}, \"de_IDPRejectedClaimExceptionRes\");\nvar de_InvalidIdentityTokenExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {\n const body = parsedOutput.body;\n const deserialized = de_InvalidIdentityTokenException(body.Error, context);\n const exception = new InvalidIdentityTokenException({\n $metadata: deserializeMetadata(parsedOutput),\n ...deserialized\n });\n return (0, import_smithy_client3.decorateServiceException)(exception, body);\n}, \"de_InvalidIdentityTokenExceptionRes\");\nvar de_MalformedPolicyDocumentExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {\n const body = parsedOutput.body;\n const deserialized = de_MalformedPolicyDocumentException(body.Error, context);\n const exception = new MalformedPolicyDocumentException({\n $metadata: deserializeMetadata(parsedOutput),\n ...deserialized\n });\n return (0, import_smithy_client3.decorateServiceException)(exception, body);\n}, \"de_MalformedPolicyDocumentExceptionRes\");\nvar de_PackedPolicyTooLargeExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {\n const body = parsedOutput.body;\n const deserialized = de_PackedPolicyTooLargeException(body.Error, context);\n const exception = new PackedPolicyTooLargeException({\n $metadata: deserializeMetadata(parsedOutput),\n ...deserialized\n });\n return (0, import_smithy_client3.decorateServiceException)(exception, body);\n}, \"de_PackedPolicyTooLargeExceptionRes\");\nvar de_RegionDisabledExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {\n const body = parsedOutput.body;\n const deserialized = de_RegionDisabledException(body.Error, context);\n const exception = new RegionDisabledException({\n $metadata: deserializeMetadata(parsedOutput),\n ...deserialized\n });\n return (0, import_smithy_client3.decorateServiceException)(exception, body);\n}, \"de_RegionDisabledExceptionRes\");\nvar se_AssumeRoleRequest = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n if (input[_RA] != null) {\n entries[_RA] = input[_RA];\n }\n if (input[_RSN] != null) {\n entries[_RSN] = input[_RSN];\n }\n if (input[_PA] != null) {\n const memberEntries = se_policyDescriptorListType(input[_PA], context);\n if (input[_PA]?.length === 0) {\n entries.PolicyArns = [];\n }\n Object.entries(memberEntries).forEach(([key, value]) => {\n const loc = `PolicyArns.${key}`;\n entries[loc] = value;\n });\n }\n if (input[_P] != null) {\n entries[_P] = input[_P];\n }\n if (input[_DS] != null) {\n entries[_DS] = input[_DS];\n }\n if (input[_T] != null) {\n const memberEntries = se_tagListType(input[_T], context);\n if (input[_T]?.length === 0) {\n entries.Tags = [];\n }\n Object.entries(memberEntries).forEach(([key, value]) => {\n const loc = `Tags.${key}`;\n entries[loc] = value;\n });\n }\n if (input[_TTK] != null) {\n const memberEntries = se_tagKeyListType(input[_TTK], context);\n if (input[_TTK]?.length === 0) {\n entries.TransitiveTagKeys = [];\n }\n Object.entries(memberEntries).forEach(([key, value]) => {\n const loc = `TransitiveTagKeys.${key}`;\n entries[loc] = value;\n });\n }\n if (input[_EI] != null) {\n entries[_EI] = input[_EI];\n }\n if (input[_SN] != null) {\n entries[_SN] = input[_SN];\n }\n if (input[_TC] != null) {\n entries[_TC] = input[_TC];\n }\n if (input[_SI] != null) {\n entries[_SI] = input[_SI];\n }\n if (input[_PC] != null) {\n const memberEntries = se_ProvidedContextsListType(input[_PC], context);\n if (input[_PC]?.length === 0) {\n entries.ProvidedContexts = [];\n }\n Object.entries(memberEntries).forEach(([key, value]) => {\n const loc = `ProvidedContexts.${key}`;\n entries[loc] = value;\n });\n }\n return entries;\n}, \"se_AssumeRoleRequest\");\nvar se_AssumeRoleWithWebIdentityRequest = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n if (input[_RA] != null) {\n entries[_RA] = input[_RA];\n }\n if (input[_RSN] != null) {\n entries[_RSN] = input[_RSN];\n }\n if (input[_WIT] != null) {\n entries[_WIT] = input[_WIT];\n }\n if (input[_PI] != null) {\n entries[_PI] = input[_PI];\n }\n if (input[_PA] != null) {\n const memberEntries = se_policyDescriptorListType(input[_PA], context);\n if (input[_PA]?.length === 0) {\n entries.PolicyArns = [];\n }\n Object.entries(memberEntries).forEach(([key, value]) => {\n const loc = `PolicyArns.${key}`;\n entries[loc] = value;\n });\n }\n if (input[_P] != null) {\n entries[_P] = input[_P];\n }\n if (input[_DS] != null) {\n entries[_DS] = input[_DS];\n }\n return entries;\n}, \"se_AssumeRoleWithWebIdentityRequest\");\nvar se_policyDescriptorListType = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n let counter = 1;\n for (const entry of input) {\n if (entry === null) {\n continue;\n }\n const memberEntries = se_PolicyDescriptorType(entry, context);\n Object.entries(memberEntries).forEach(([key, value]) => {\n entries[`member.${counter}.${key}`] = value;\n });\n counter++;\n }\n return entries;\n}, \"se_policyDescriptorListType\");\nvar se_PolicyDescriptorType = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n if (input[_a] != null) {\n entries[_a] = input[_a];\n }\n return entries;\n}, \"se_PolicyDescriptorType\");\nvar se_ProvidedContext = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n if (input[_PAr] != null) {\n entries[_PAr] = input[_PAr];\n }\n if (input[_CA] != null) {\n entries[_CA] = input[_CA];\n }\n return entries;\n}, \"se_ProvidedContext\");\nvar se_ProvidedContextsListType = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n let counter = 1;\n for (const entry of input) {\n if (entry === null) {\n continue;\n }\n const memberEntries = se_ProvidedContext(entry, context);\n Object.entries(memberEntries).forEach(([key, value]) => {\n entries[`member.${counter}.${key}`] = value;\n });\n counter++;\n }\n return entries;\n}, \"se_ProvidedContextsListType\");\nvar se_Tag = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n if (input[_K] != null) {\n entries[_K] = input[_K];\n }\n if (input[_Va] != null) {\n entries[_Va] = input[_Va];\n }\n return entries;\n}, \"se_Tag\");\nvar se_tagKeyListType = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n let counter = 1;\n for (const entry of input) {\n if (entry === null) {\n continue;\n }\n entries[`member.${counter}`] = entry;\n counter++;\n }\n return entries;\n}, \"se_tagKeyListType\");\nvar se_tagListType = /* @__PURE__ */ __name((input, context) => {\n const entries = {};\n let counter = 1;\n for (const entry of input) {\n if (entry === null) {\n continue;\n }\n const memberEntries = se_Tag(entry, context);\n Object.entries(memberEntries).forEach(([key, value]) => {\n entries[`member.${counter}.${key}`] = value;\n });\n counter++;\n }\n return entries;\n}, \"se_tagListType\");\nvar de_AssumedRoleUser = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_ARI] != null) {\n contents[_ARI] = (0, import_smithy_client3.expectString)(output[_ARI]);\n }\n if (output[_Ar] != null) {\n contents[_Ar] = (0, import_smithy_client3.expectString)(output[_Ar]);\n }\n return contents;\n}, \"de_AssumedRoleUser\");\nvar de_AssumeRoleResponse = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_C] != null) {\n contents[_C] = de_Credentials(output[_C], context);\n }\n if (output[_ARU] != null) {\n contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);\n }\n if (output[_PPS] != null) {\n contents[_PPS] = (0, import_smithy_client3.strictParseInt32)(output[_PPS]);\n }\n if (output[_SI] != null) {\n contents[_SI] = (0, import_smithy_client3.expectString)(output[_SI]);\n }\n return contents;\n}, \"de_AssumeRoleResponse\");\nvar de_AssumeRoleWithWebIdentityResponse = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_C] != null) {\n contents[_C] = de_Credentials(output[_C], context);\n }\n if (output[_SFWIT] != null) {\n contents[_SFWIT] = (0, import_smithy_client3.expectString)(output[_SFWIT]);\n }\n if (output[_ARU] != null) {\n contents[_ARU] = de_AssumedRoleUser(output[_ARU], context);\n }\n if (output[_PPS] != null) {\n contents[_PPS] = (0, import_smithy_client3.strictParseInt32)(output[_PPS]);\n }\n if (output[_Pr] != null) {\n contents[_Pr] = (0, import_smithy_client3.expectString)(output[_Pr]);\n }\n if (output[_Au] != null) {\n contents[_Au] = (0, import_smithy_client3.expectString)(output[_Au]);\n }\n if (output[_SI] != null) {\n contents[_SI] = (0, import_smithy_client3.expectString)(output[_SI]);\n }\n return contents;\n}, \"de_AssumeRoleWithWebIdentityResponse\");\nvar de_Credentials = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_AKI] != null) {\n contents[_AKI] = (0, import_smithy_client3.expectString)(output[_AKI]);\n }\n if (output[_SAK] != null) {\n contents[_SAK] = (0, import_smithy_client3.expectString)(output[_SAK]);\n }\n if (output[_ST] != null) {\n contents[_ST] = (0, import_smithy_client3.expectString)(output[_ST]);\n }\n if (output[_E] != null) {\n contents[_E] = (0, import_smithy_client3.expectNonNull)((0, import_smithy_client3.parseRfc3339DateTimeWithOffset)(output[_E]));\n }\n return contents;\n}, \"de_Credentials\");\nvar de_ExpiredTokenException = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_m] != null) {\n contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);\n }\n return contents;\n}, \"de_ExpiredTokenException\");\nvar de_IDPCommunicationErrorException = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_m] != null) {\n contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);\n }\n return contents;\n}, \"de_IDPCommunicationErrorException\");\nvar de_IDPRejectedClaimException = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_m] != null) {\n contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);\n }\n return contents;\n}, \"de_IDPRejectedClaimException\");\nvar de_InvalidIdentityTokenException = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_m] != null) {\n contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);\n }\n return contents;\n}, \"de_InvalidIdentityTokenException\");\nvar de_MalformedPolicyDocumentException = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_m] != null) {\n contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);\n }\n return contents;\n}, \"de_MalformedPolicyDocumentException\");\nvar de_PackedPolicyTooLargeException = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_m] != null) {\n contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);\n }\n return contents;\n}, \"de_PackedPolicyTooLargeException\");\nvar de_RegionDisabledException = /* @__PURE__ */ __name((output, context) => {\n const contents = {};\n if (output[_m] != null) {\n contents[_m] = (0, import_smithy_client3.expectString)(output[_m]);\n }\n return contents;\n}, \"de_RegionDisabledException\");\nvar deserializeMetadata = /* @__PURE__ */ __name((output) => ({\n httpStatusCode: output.statusCode,\n requestId: output.headers[\"x-amzn-requestid\"] ?? output.headers[\"x-amzn-request-id\"] ?? output.headers[\"x-amz-request-id\"],\n extendedRequestId: output.headers[\"x-amz-id-2\"],\n cfId: output.headers[\"x-amz-cf-id\"]\n}), \"deserializeMetadata\");\nvar throwDefaultError = (0, import_smithy_client3.withBaseException)(STSServiceException);\nvar buildHttpRpcRequest = /* @__PURE__ */ __name(async (context, headers, path, resolvedHostname, body) => {\n const { hostname, protocol = \"https\", port, path: basePath } = await context.endpoint();\n const contents = {\n protocol,\n hostname,\n port,\n method: \"POST\",\n path: basePath.endsWith(\"/\") ? basePath.slice(0, -1) + path : basePath + path,\n headers\n };\n if (resolvedHostname !== void 0) {\n contents.hostname = resolvedHostname;\n }\n if (body !== void 0) {\n contents.body = body;\n }\n return new import_protocol_http.HttpRequest(contents);\n}, \"buildHttpRpcRequest\");\nvar SHARED_HEADERS = {\n \"content-type\": \"application/x-www-form-urlencoded\"\n};\nvar _ = \"2011-06-15\";\nvar _A = \"Action\";\nvar _AKI = \"AccessKeyId\";\nvar _AR = \"AssumeRole\";\nvar _ARI = \"AssumedRoleId\";\nvar _ARU = \"AssumedRoleUser\";\nvar _ARWWI = \"AssumeRoleWithWebIdentity\";\nvar _Ar = \"Arn\";\nvar _Au = \"Audience\";\nvar _C = \"Credentials\";\nvar _CA = \"ContextAssertion\";\nvar _DS = \"DurationSeconds\";\nvar _E = \"Expiration\";\nvar _EI = \"ExternalId\";\nvar _K = \"Key\";\nvar _P = \"Policy\";\nvar _PA = \"PolicyArns\";\nvar _PAr = \"ProviderArn\";\nvar _PC = \"ProvidedContexts\";\nvar _PI = \"ProviderId\";\nvar _PPS = \"PackedPolicySize\";\nvar _Pr = \"Provider\";\nvar _RA = \"RoleArn\";\nvar _RSN = \"RoleSessionName\";\nvar _SAK = \"SecretAccessKey\";\nvar _SFWIT = \"SubjectFromWebIdentityToken\";\nvar _SI = \"SourceIdentity\";\nvar _SN = \"SerialNumber\";\nvar _ST = \"SessionToken\";\nvar _T = \"Tags\";\nvar _TC = \"TokenCode\";\nvar _TTK = \"TransitiveTagKeys\";\nvar _V = \"Version\";\nvar _Va = \"Value\";\nvar _WIT = \"WebIdentityToken\";\nvar _a = \"arn\";\nvar _m = \"message\";\nvar buildFormUrlencodedString = /* @__PURE__ */ __name((formEntries) => Object.entries(formEntries).map(([key, value]) => (0, import_smithy_client3.extendedEncodeURIComponent)(key) + \"=\" + (0, import_smithy_client3.extendedEncodeURIComponent)(value)).join(\"&\"), \"buildFormUrlencodedString\");\nvar loadQueryErrorCode = /* @__PURE__ */ __name((output, data) => {\n if (data.Error?.Code !== void 0) {\n return data.Error.Code;\n }\n if (output.statusCode == 404) {\n return \"NotFound\";\n }\n}, \"loadQueryErrorCode\");\n\n// src/submodules/sts/commands/AssumeRoleCommand.ts\nvar AssumeRoleCommand = class extends import_smithy_client4.Command.classBuilder().ep(import_EndpointParameters.commonParams).m(function(Command, cs, config, o) {\n return [\n (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),\n (0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())\n ];\n}).s(\"AWSSecurityTokenServiceV20110615\", \"AssumeRole\", {}).n(\"STSClient\", \"AssumeRoleCommand\").f(void 0, AssumeRoleResponseFilterSensitiveLog).ser(se_AssumeRoleCommand).de(de_AssumeRoleCommand).build() {\n static {\n __name(this, \"AssumeRoleCommand\");\n }\n};\n\n// src/submodules/sts/commands/AssumeRoleWithWebIdentityCommand.ts\nvar import_middleware_endpoint2 = require(\"@smithy/middleware-endpoint\");\nvar import_middleware_serde2 = require(\"@smithy/middleware-serde\");\nvar import_smithy_client5 = require(\"@smithy/smithy-client\");\nvar import_EndpointParameters2 = require(\"./endpoint/EndpointParameters\");\nvar AssumeRoleWithWebIdentityCommand = class extends import_smithy_client5.Command.classBuilder().ep(import_EndpointParameters2.commonParams).m(function(Command, cs, config, o) {\n return [\n (0, import_middleware_serde2.getSerdePlugin)(config, this.serialize, this.deserialize),\n (0, import_middleware_endpoint2.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())\n ];\n}).s(\"AWSSecurityTokenServiceV20110615\", \"AssumeRoleWithWebIdentity\", {}).n(\"STSClient\", \"AssumeRoleWithWebIdentityCommand\").f(AssumeRoleWithWebIdentityRequestFilterSensitiveLog, AssumeRoleWithWebIdentityResponseFilterSensitiveLog).ser(se_AssumeRoleWithWebIdentityCommand).de(de_AssumeRoleWithWebIdentityCommand).build() {\n static {\n __name(this, \"AssumeRoleWithWebIdentityCommand\");\n }\n};\n\n// src/submodules/sts/STS.ts\nvar import_STSClient = require(\"./STSClient\");\nvar commands = {\n AssumeRoleCommand,\n AssumeRoleWithWebIdentityCommand\n};\nvar STS = class extends import_STSClient.STSClient {\n static {\n __name(this, \"STS\");\n }\n};\n(0, import_smithy_client6.createAggregatedClient)(commands, STS);\n\n// src/submodules/sts/index.ts\nvar import_EndpointParameters3 = require(\"./endpoint/EndpointParameters\");\n\n// src/submodules/sts/defaultStsRoleAssumers.ts\nvar import_client = require(\"@aws-sdk/core/client\");\nvar ASSUME_ROLE_DEFAULT_REGION = \"us-east-1\";\nvar getAccountIdFromAssumedRoleUser = /* @__PURE__ */ __name((assumedRoleUser) => {\n if (typeof assumedRoleUser?.Arn === \"string\") {\n const arnComponents = assumedRoleUser.Arn.split(\":\");\n if (arnComponents.length > 4 && arnComponents[4] !== \"\") {\n return arnComponents[4];\n }\n }\n return void 0;\n}, \"getAccountIdFromAssumedRoleUser\");\nvar resolveRegion = /* @__PURE__ */ __name(async (_region, _parentRegion, credentialProviderLogger) => {\n const region = typeof _region === \"function\" ? await _region() : _region;\n const parentRegion = typeof _parentRegion === \"function\" ? await _parentRegion() : _parentRegion;\n credentialProviderLogger?.debug?.(\n \"@aws-sdk/client-sts::resolveRegion\",\n \"accepting first of:\",\n `${region} (provider)`,\n `${parentRegion} (parent client)`,\n `${ASSUME_ROLE_DEFAULT_REGION} (STS default)`\n );\n return region ?? parentRegion ?? ASSUME_ROLE_DEFAULT_REGION;\n}, \"resolveRegion\");\nvar getDefaultRoleAssumer = /* @__PURE__ */ __name((stsOptions, STSClient3) => {\n let stsClient;\n let closureSourceCreds;\n return async (sourceCreds, params) => {\n closureSourceCreds = sourceCreds;\n if (!stsClient) {\n const {\n logger = stsOptions?.parentClientConfig?.logger,\n region,\n requestHandler = stsOptions?.parentClientConfig?.requestHandler,\n credentialProviderLogger\n } = stsOptions;\n const resolvedRegion = await resolveRegion(\n region,\n stsOptions?.parentClientConfig?.region,\n credentialProviderLogger\n );\n const isCompatibleRequestHandler = !isH2(requestHandler);\n stsClient = new STSClient3({\n profile: stsOptions?.parentClientConfig?.profile,\n // A hack to make sts client uses the credential in current closure.\n credentialDefaultProvider: /* @__PURE__ */ __name(() => async () => closureSourceCreds, \"credentialDefaultProvider\"),\n region: resolvedRegion,\n requestHandler: isCompatibleRequestHandler ? requestHandler : void 0,\n logger\n });\n }\n const { Credentials: Credentials2, AssumedRoleUser: AssumedRoleUser2 } = await stsClient.send(new AssumeRoleCommand(params));\n if (!Credentials2 || !Credentials2.AccessKeyId || !Credentials2.SecretAccessKey) {\n throw new Error(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);\n }\n const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser2);\n const credentials = {\n accessKeyId: Credentials2.AccessKeyId,\n secretAccessKey: Credentials2.SecretAccessKey,\n sessionToken: Credentials2.SessionToken,\n expiration: Credentials2.Expiration,\n // TODO(credentialScope): access normally when shape is updated.\n ...Credentials2.CredentialScope && { credentialScope: Credentials2.CredentialScope },\n ...accountId && { accountId }\n };\n (0, import_client.setCredentialFeature)(credentials, \"CREDENTIALS_STS_ASSUME_ROLE\", \"i\");\n return credentials;\n };\n}, \"getDefaultRoleAssumer\");\nvar getDefaultRoleAssumerWithWebIdentity = /* @__PURE__ */ __name((stsOptions, STSClient3) => {\n let stsClient;\n return async (params) => {\n if (!stsClient) {\n const {\n logger = stsOptions?.parentClientConfig?.logger,\n region,\n requestHandler = stsOptions?.parentClientConfig?.requestHandler,\n credentialProviderLogger\n } = stsOptions;\n const resolvedRegion = await resolveRegion(\n region,\n stsOptions?.parentClientConfig?.region,\n credentialProviderLogger\n );\n const isCompatibleRequestHandler = !isH2(requestHandler);\n stsClient = new STSClient3({\n profile: stsOptions?.parentClientConfig?.profile,\n region: resolvedRegion,\n requestHandler: isCompatibleRequestHandler ? requestHandler : void 0,\n logger\n });\n }\n const { Credentials: Credentials2, AssumedRoleUser: AssumedRoleUser2 } = await stsClient.send(new AssumeRoleWithWebIdentityCommand(params));\n if (!Credentials2 || !Credentials2.AccessKeyId || !Credentials2.SecretAccessKey) {\n throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${params.RoleArn}`);\n }\n const accountId = getAccountIdFromAssumedRoleUser(AssumedRoleUser2);\n const credentials = {\n accessKeyId: Credentials2.AccessKeyId,\n secretAccessKey: Credentials2.SecretAccessKey,\n sessionToken: Credentials2.SessionToken,\n expiration: Credentials2.Expiration,\n // TODO(credentialScope): access normally when shape is updated.\n ...Credentials2.CredentialScope && { credentialScope: Credentials2.CredentialScope },\n ...accountId && { accountId }\n };\n if (accountId) {\n (0, import_client.setCredentialFeature)(credentials, \"RESOLVED_ACCOUNT_ID\", \"T\");\n }\n (0, import_client.setCredentialFeature)(credentials, \"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID\", \"k\");\n return credentials;\n };\n}, \"getDefaultRoleAssumerWithWebIdentity\");\nvar isH2 = /* @__PURE__ */ __name((requestHandler) => {\n return requestHandler?.metadata?.handlerProtocol === \"h2\";\n}, \"isH2\");\n\n// src/submodules/sts/defaultRoleAssumers.ts\nvar import_STSClient2 = require(\"./STSClient\");\nvar getCustomizableStsClientCtor = /* @__PURE__ */ __name((baseCtor, customizations) => {\n if (!customizations) return baseCtor;\n else\n return class CustomizableSTSClient extends baseCtor {\n static {\n __name(this, \"CustomizableSTSClient\");\n }\n constructor(config) {\n super(config);\n for (const customization of customizations) {\n this.middlewareStack.use(customization);\n }\n }\n };\n}, \"getCustomizableStsClientCtor\");\nvar getDefaultRoleAssumer2 = /* @__PURE__ */ __name((stsOptions = {}, stsPlugins) => getDefaultRoleAssumer(stsOptions, getCustomizableStsClientCtor(import_STSClient2.STSClient, stsPlugins)), \"getDefaultRoleAssumer\");\nvar getDefaultRoleAssumerWithWebIdentity2 = /* @__PURE__ */ __name((stsOptions = {}, stsPlugins) => getDefaultRoleAssumerWithWebIdentity(stsOptions, getCustomizableStsClientCtor(import_STSClient2.STSClient, stsPlugins)), \"getDefaultRoleAssumerWithWebIdentity\");\nvar decorateDefaultCredentialProvider = /* @__PURE__ */ __name((provider) => (input) => provider({\n roleAssumer: getDefaultRoleAssumer2(input),\n roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity2(input),\n ...input\n}), \"decorateDefaultCredentialProvider\");\n// Annotate the CommonJS export names for ESM import in node:\n0 && (module.exports = {\n AssumeRoleCommand,\n AssumeRoleResponseFilterSensitiveLog,\n AssumeRoleWithWebIdentityCommand,\n AssumeRoleWithWebIdentityRequestFilterSensitiveLog,\n AssumeRoleWithWebIdentityResponseFilterSensitiveLog,\n ClientInputEndpointParameters,\n CredentialsFilterSensitiveLog,\n ExpiredTokenException,\n IDPCommunicationErrorException,\n IDPRejectedClaimException,\n InvalidIdentityTokenException,\n MalformedPolicyDocumentException,\n PackedPolicyTooLargeException,\n RegionDisabledException,\n STS,\n STSServiceException,\n decorateDefaultCredentialProvider,\n getDefaultRoleAssumer,\n getDefaultRoleAssumerWithWebIdentity,\n ...require(\"./STSClient\")\n});\n"
15
15
  ],
16
16
  "mappings": ";wjBACA,CAAO,SAAe,HAAS,OAAc,LAAE,AAAO,JAAK,CAAC,EACpD,+BAAsC,wBAA+B,oCAA2C,8CAAkD,OAC1K,IAAM,OACA,OACA,OACA,GAA6C,MAAO,EAAQ,EAAS,IAAU,CACjF,MAAO,CACH,UAAe,EAAkB,iBAAkB,CAAO,EAAE,UAC5D,OAAS,MAAU,EAAkB,kBAAmB,EAAO,MAAM,EAAE,IAClE,IAAM,CACH,MAAM,IAAI,MAAM,yDAAyD,IAC1E,CACX,GAEI,8CAA6C,GACrD,SAAS,EAAgC,CAAC,EAAgB,CACtD,MAAO,CACH,SAAU,iBACV,kBAAmB,CACf,KAAM,MACN,OAAQ,EAAe,MAC3B,EACA,oBAAqB,CAAC,EAAQ,KAAa,CACvC,kBAAmB,CACf,SACA,SACJ,CACJ,EACJ,EAEJ,SAAS,EAAmC,CAAC,EAAgB,CACzD,MAAO,CACH,SAAU,mBACd,EAEJ,IAAM,GAAmC,CAAC,IAAmB,CACzD,IAAM,EAAU,CAAC,EACjB,OAAQ,EAAe,eACd,4BAA6B,CAC9B,EAAQ,KAAK,GAAoC,CAAc,CAAC,EAChE,KACJ,SAEI,EAAQ,KAAK,GAAiC,CAAc,CAAC,EAGrE,OAAO,GAEH,oCAAmC,GAC3C,IAAM,GAAuB,CAAC,IAAU,OAAO,OAAO,EAAO,CACzD,cAAe,GAAY,SAC/B,CAAC,EACO,wBAAuB,GAC/B,IAAM,GAA8B,CAAC,IAAW,CAC5C,IAAM,EAAuB,wBAAsB,CAAM,EACnD,EAAe,GAAO,yBAA0B,CAAQ,EAC9D,OAAO,OAAO,OAAO,EAAU,CAC3B,qBAA0B,EAAkB,kBAAmB,EAAO,sBAAwB,CAAC,CAAC,CACpG,CAAC,GAEG,+BAA8B,oBC5DtC,OAAO,eAAe,GAAS,aAAc,CAAE,MAAO,EAAK,CAAC,EACpD,gBAAuB,mCAAuC,OACtE,IAAM,GAAkC,CAAC,IAAY,CACjD,OAAO,OAAO,OAAO,EAAS,CAC1B,qBAAsB,EAAQ,sBAAwB,GACtD,gBAAiB,EAAQ,iBAAmB,GAC5C,kBAAmB,EAAQ,mBAAqB,GAChD,mBAAoB,KACxB,CAAC,GAEG,mCAAkC,GAClC,gBAAe,CACnB,kBAAmB,CAAE,KAAM,gBAAiB,KAAM,mBAAoB,EACtE,QAAS,CAAE,KAAM,gBAAiB,KAAM,iBAAkB,EAC1D,SAAU,CAAE,KAAM,gBAAiB,KAAM,UAAW,EACpD,OAAQ,CAAE,KAAM,gBAAiB,KAAM,QAAS,EAChD,aAAc,CAAE,KAAM,gBAAiB,KAAM,sBAAuB,CACxE,oBCjBA,OAAO,eAAe,GAAS,aAAc,CAAE,MAAO,EAAK,CAAC,EACpD,WAAe,OACvB,IAAM,GAAI,WAAY,EAAI,OAAQ,EAAI,KAAM,EAAI,OAAQ,EAAI,MACtD,GAAI,GAAO,EAAI,GAAM,EAAI,gBAAiB,EAAI,eAAgB,GAAI,QAAS,GAAI,MAAO,GAAI,YAAa,EAAI,WAAY,GAAI,mDAAoD,EAAI,OAAQ,EAAI,QAAS,EAAI,UAAW,GAAI,EAAG,IAAI,IAAQ,GAAI,QAAS,EAAG,EAAI,EAAG,IAAI,GAAM,QAAW,IAAQ,GAAI,SAAU,EAAG,GAAI,EAAG,GAAI,UAAW,EAAG,GAAI,EAAG,GAAI,SAAU,GAAI,CAAC,EAAG,GAAI,QAAS,CAAC,CAAE,EAAG,EAAI,EAAG,GAAI,QAAS,EAAG,GAAI,EAAG,GAAI,iBAAkB,GAAI,CAAC,CAAC,EAAG,OAAU,iBAAkB,EAAG,GAAI,EAAG,GAAI,SAAU,EAAG,GAAI,EAAG,GAAI,cAAe,EAAG,EAAI,CAAE,IAAO,4BAA6B,WAAc,CAAE,YAAe,CAAC,CAAE,KAAQ,GAAG,YAAe,GAAG,cAAiB,EAAE,CAAC,CAAE,EAAG,QAAW,CAAC,CAAE,EAAG,EAAI,CAAC,EAAG,GAAI,CAAE,WAAc,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,YAAY,CAAE,CAAC,GAAI,GAAI,GAAI,GAAI,CAAE,EAAG,GAAI,EAAG,GAAI,GAAI,GAAI,CAAC,GAAG,EAAI,CAAE,EAAG,GAAI,EAAG,GAAI,GAAI,GAAI,CAAC,GAAG,EAAI,CAAE,EAAG,GAAI,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,GAAI,iBAAkB,EAAG,cAAc,CAAE,EAAG,GAAI,EAAG,GAAI,iBAAkB,EAAG,GAAI,EAAG,GAAI,GAAI,GAAI,CAAC,GAAM,EAAG,GAAI,GAAI,GAAI,CAAC,GAAG,mBAAmB,CAAE,CAAC,CAAE,EAAG,GAAI,CAAC,EAAG,GAAI,SAAU,GAAI,CAAC,EAAC,CAAE,CAAC,EAAG,GAAI,CAAC,EAAC,EAAG,GAAI,CAAC,EAAC,EAC5gC,GAAQ,CAAE,QAAS,MAAO,WAAY,CAAE,OAAQ,GAAG,aAAc,EAAG,QAAS,EAAG,SAAU,GAAG,kBAAmB,CAAE,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,GAAI,mBAAoB,EAAG,CAAC,CAAE,EAAG,EAAG,GAAI,OAAQ,GAAI,EAAE,EAAG,GAAG,GAAG,EAAG,GAAI,GAAI,GAAI,CAAC,GAAG,EAAC,CAAE,EAAG,EAAG,GAAI,GAAI,GAAI,CAAC,GAAG,EAAC,CAAE,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,gBAAgB,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,YAAY,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,gBAAgB,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,gBAAgB,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,GAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,cAAc,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,cAAc,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,YAAY,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,WAAW,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,WAAW,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,WAAW,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,WAAW,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,EAAC,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,WAAW,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,WAAW,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,WAAW,CAAE,CAAC,EAAG,SAAU,GAAI,GAAI,CAAE,EAAG,CAAE,SAAU,CAAE,IAAK,GAAG,WAAY,CAAE,YAAa,CAAC,CAAE,KAAM,GAAG,YAAa,GAAG,cAAe,UAAW,CAAC,CAAE,EAAG,QAAS,CAAE,GAAI,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,GAAG,MAAO,CAAC,CAAE,WAAY,GAAG,MAAO,qEAAsE,GAAI,CAAE,EAAG,CAAE,WAAY,GAAG,MAAO,0EAA2E,GAAI,CAAE,EAAG,CAAE,SAAU,CAAE,IAAK,GAAG,WAAY,EAAG,QAAS,CAAE,GAAI,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,CAAC,EAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,GAAG,EAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,EAAC,CAAE,EAAG,EAAC,EAAG,MAAO,CAAC,CAAE,SAAU,CAAE,IAAK,iEAAkE,WAAY,EAAG,QAAS,CAAE,GAAI,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,CAAE,MAAO,mFAAoF,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,GAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,GAAG,CAAC,CAAE,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,EAAG,GAAI,GAAI,GAAI,CAAC,GAAG,MAAM,CAAE,EAAG,YAAY,CAAE,CAAC,EAAG,SAAU,CAAE,IAAK,qCAAsC,WAAY,EAAG,QAAS,CAAE,GAAI,GAAI,CAAE,EAAG,CAAE,SAAU,CAAE,IAAK,wDAAyD,WAAY,EAAG,QAAS,CAAE,GAAI,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,CAAE,MAAO,4DAA6D,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,CAAE,WAAY,GAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAC,EAAG,MAAO,CAAC,CAAE,SAAU,CAAE,IAAK,4DAA6D,WAAY,EAAG,QAAS,CAAE,GAAI,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,CAAE,MAAO,sEAAuE,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,GAAG,CAAE,SAAU,CAAE,IAAK,GAAG,WAAY,EAAG,QAAS,CAAE,GAAI,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,CAAC,GAAI,GAAI,CAAE,EAAG,CAAE,MAAO,yCAA0C,GAAI,CAAE,CAAC,CAAE,EAC5jG,WAAU,qBCLlB,OAAO,eAAe,GAAS,aAAc,CAAE,MAAO,EAAK,CAAC,EACpD,2BAA+B,OACvC,IAAM,QACA,OACA,QACA,GAAQ,IAAI,EAAiB,cAAc,CAC7C,KAAM,GACN,OAAQ,CAAC,WAAY,SAAU,eAAgB,UAAW,mBAAmB,CACjF,CAAC,EACK,GAA0B,CAAC,EAAgB,EAAU,CAAC,IAAM,CAC9D,OAAO,GAAM,IAAI,EAAgB,IAAU,EAAiB,gBAAiB,GAAU,QAAS,CAC5F,eAAgB,EAChB,OAAQ,EAAQ,MACpB,CAAC,CAAC,GAEE,2BAA0B,GAClC,EAAiB,wBAAwB,IAAM,GAAiB,uCChBhE,OAAO,eAAe,GAAS,aAAc,CAAE,MAAO,EAAK,CAAC,EACpD,oBAAwB,OAChC,IAAM,OACA,QACA,OACA,QACA,QACA,QACA,OACA,QACA,GAAmB,CAAC,IAAW,CACjC,MAAO,CACH,WAAY,aACZ,cAAe,GAAQ,eAAiB,GAAc,WACtD,cAAe,GAAQ,eAAiB,GAAc,SACtD,kBAAmB,GAAQ,mBAAqB,GAChD,iBAAkB,GAAQ,kBAAoB,GAAmB,wBACjE,WAAY,GAAQ,YAAc,CAAC,EACnC,uBAAwB,GAAQ,wBAA0B,GAAyB,iCACnF,gBAAiB,GAAQ,iBAAmB,CACxC,CACI,SAAU,iBACV,iBAAkB,CAAC,IAAQ,EAAI,oBAAoB,gBAAgB,EACnE,OAAQ,IAAI,GAAO,iBACvB,EACA,CACI,SAAU,oBACV,iBAAkB,CAAC,IAAQ,EAAI,oBAAoB,mBAAmB,IAAM,UAAa,CAAC,IAC1F,OAAQ,IAAI,GAAO,YACvB,CACJ,EACA,OAAQ,GAAQ,QAAU,IAAI,GAAgB,WAC9C,UAAW,GAAQ,WAAa,MAChC,UAAW,GAAQ,WAAa,GAAa,SAC7C,YAAa,GAAQ,aAAe,GAAY,SAChD,YAAa,GAAQ,aAAe,GAAY,MACpD,GAEI,oBAAmB,qBCtC3B,OAAO,eAAe,GAAS,aAAc,CAAE,MAAO,EAAK,CAAC,EACpD,oBAAwB,OAChC,IAAM,QACA,GAAiB,GAAQ,oBAAgD,EACzE,OACA,QACA,OACA,QACA,QACA,QACA,OACA,QACA,QACA,QACA,QACA,OACA,QACA,OACA,GAAmB,CAAC,IAAW,CAC7B,GAAgB,gCAAiC,QAAQ,OAAO,EACpE,IAAM,EAAmB,GAA0B,0BAA2B,CAAM,EAC9E,EAAwB,IAAM,EAAa,EAAE,KAAK,GAAgB,yBAAyB,EAC3F,EAAyB,GAAuB,iBAAkB,CAAM,EAC1E,GAAO,gCAAiC,QAAQ,OAAO,EAC3D,IAAM,EAAgB,CAAE,QAAS,GAAQ,OAAQ,EACjD,MAAO,IACA,KACA,EACH,QAAS,OACT,eACA,kBAAmB,GAAQ,mBAAqB,GAAwB,oBACxE,yBAA0B,GAAQ,0BAC1B,GAAuB,+BAAgC,CAAE,UAAW,EAAmB,UAAW,cAAe,GAAe,QAAQ,OAAQ,CAAC,EACzJ,gBAAiB,GAAQ,iBAAmB,CACxC,CACI,SAAU,iBACV,iBAAkB,CAAC,IAAQ,EAAI,oBAAoB,gBAAgB,IAC9D,MAAO,IAAY,MAAM,EAAO,0BAA0B,GAAS,UAAY,CAAC,CAAC,EAAE,GACxF,OAAQ,IAAI,GAAO,iBACvB,EACA,CACI,SAAU,oBACV,iBAAkB,CAAC,IAAQ,EAAI,oBAAoB,mBAAmB,IAAM,UAAa,CAAC,IAC1F,OAAQ,IAAI,GAAO,YACvB,CACJ,EACA,YAAa,GAAQ,aAAmB,EAAuB,WAAY,GAAmB,gCAAiC,CAAM,EACrI,OAAQ,GAAQ,QACR,EAAuB,WAAY,EAAkB,2BAA4B,IAAK,EAAkB,mCAAoC,CAAc,CAAC,EACnK,eAAgB,GAAoB,gBAAgB,OAAO,GAAQ,gBAAkB,CAAqB,EAC1G,UAAW,GAAQ,WACX,EAAuB,WAAY,IAChC,GAAmB,+BACtB,QAAS,UAAa,MAAM,EAAsB,GAAG,WAAa,GAAa,kBACnF,EAAG,CAAM,EACb,OAAQ,GAAQ,QAAU,GAAY,KAAK,KAAK,KAAM,QAAQ,EAC9D,gBAAiB,GAAQ,iBAAmB,GAAoB,gBAChE,qBAAsB,GAAQ,sBAA4B,EAAuB,WAAY,EAAkB,2CAA4C,CAAa,EACxK,gBAAiB,GAAQ,iBAAuB,EAAuB,WAAY,EAAkB,sCAAuC,CAAa,EACzJ,eAAgB,GAAQ,gBAAsB,EAAuB,WAAY,GAAuB,2BAA4B,CAAa,CACrJ,GAEI,oBAAmB,qBC9D3B,OAAO,eAAe,GAAS,aAAc,CAAE,MAAO,EAAK,CAAC,EACpD,gCAAuC,qCAAyC,OACxF,IAAM,GAAoC,CAAC,IAAkB,CACzD,IAAuC,gBAAjC,EACsC,uBAAxC,EAC6B,YAA7B,GAD0B,EAE9B,MAAO,CACH,iBAAiB,CAAC,EAAgB,CAC9B,IAAM,EAAQ,EAAiB,UAAU,CAAC,IAAW,EAAO,WAAa,EAAe,QAAQ,EAChG,GAAI,IAAU,GACV,EAAiB,KAAK,CAAc,EAGpC,OAAiB,OAAO,EAAO,EAAG,CAAc,GAGxD,eAAe,EAAG,CACd,OAAO,GAEX,yBAAyB,CAAC,EAAwB,CAC9C,EAA0B,GAE9B,sBAAsB,EAAG,CACrB,OAAO,GAEX,cAAc,CAAC,EAAa,CACxB,EAAe,GAEnB,WAAW,EAAG,CACV,OAAO,EAEf,GAEI,qCAAoC,GAC5C,IAAM,GAA+B,CAAC,IAAW,CAC7C,MAAO,CACH,gBAAiB,EAAO,gBAAgB,EACxC,uBAAwB,EAAO,uBAAuB,EACtD,YAAa,EAAO,YAAY,CACpC,GAEI,gCAA+B,qBCzCvC,OAAO,eAAe,GAAS,aAAc,CAAE,MAAO,EAAK,CAAC,EACpD,4BAAgC,OACxC,IAAM,QACA,QACA,OACA,QACA,GAA2B,CAAC,EAAe,IAAe,CAC5D,IAAM,EAAyB,OAAO,OAAW,GAAyB,mCAAoC,CAAa,EAAO,GAAgB,iCAAkC,CAAa,EAAO,GAAgB,qCAAsC,CAAa,EAAO,GAAiC,kCAAmC,CAAa,CAAC,EAEpW,OADA,EAAW,QAAQ,CAAC,IAAc,EAAU,UAAU,CAAsB,CAAC,EACtE,OAAO,OAAO,EAAmB,GAAyB,uCAAwC,CAAsB,EAAO,GAAgB,4BAA6B,CAAsB,EAAO,GAAgB,gCAAiC,CAAsB,EAAO,GAAiC,6BAA8B,CAAsB,CAAC,GAEhX,4BAA2B,oBCXnC,OAAO,eAAe,GAAS,aAAc,CAAE,MAAO,EAAK,CAAC,EACpD,aAAoB,YAAgB,OAC5C,IAAM,QACA,QACA,QACA,QACA,QACA,QACA,QACA,QACA,QACA,OACN,OAAO,eAAe,GAAS,WAAY,CAAE,WAAY,GAAM,IAAK,QAAS,EAAG,CAAE,OAAO,GAAgB,OAAU,CAAC,EACpH,IAAM,OACA,OACA,QACA,QACN,MAAM,WAAkB,GAAgB,MAAO,CAC3C,OACA,WAAW,KAAK,GAAgB,CAC5B,IAAM,EAAgB,GAAgB,iBAAkB,GAAiB,CAAC,CAAC,EAC3E,MAAM,CAAS,EACf,KAAK,WAAa,EAClB,IAAM,EAAgB,GAAqB,gCAAiC,CAAS,EAC/E,EAAgB,GAAwB,uBAAwB,CAAS,EACzE,EAAgB,GAAmB,mBAAoB,CAAS,EAChE,EAAgB,GAAkB,oBAAqB,CAAS,EAChE,EAAgB,GAAyB,wBAAyB,CAAS,EAC3E,EAAgB,GAAsB,sBAAuB,CAAS,EACtE,EAAgB,GAAyB,4BAA6B,CAAS,EAC/E,EAAgB,GAAoB,yBAA0B,EAAW,GAAe,YAAc,CAAC,CAAC,EAC9G,KAAK,OAAS,EACd,KAAK,gBAAgB,IAAQ,GAAwB,mBAAoB,KAAK,MAAM,CAAC,EACrF,KAAK,gBAAgB,IAAQ,GAAmB,eAAgB,KAAK,MAAM,CAAC,EAC5E,KAAK,gBAAgB,IAAQ,GAA4B,uBAAwB,KAAK,MAAM,CAAC,EAC7F,KAAK,gBAAgB,IAAQ,GAAyB,oBAAqB,KAAK,MAAM,CAAC,EACvF,KAAK,gBAAgB,IAAQ,GAAoB,gBAAiB,KAAK,MAAM,CAAC,EAC9E,KAAK,gBAAgB,IAAQ,GAAiC,4BAA6B,KAAK,MAAM,CAAC,EACvG,KAAK,gBAAgB,IAAQ,GAAO,uCAAwC,KAAK,OAAQ,CACrF,iCAAkC,GAAyB,2CAC3D,+BAAgC,MAAO,IAAW,IAAI,GAAO,8BAA8B,CACvF,iBAAkB,EAAO,WAC7B,CAAC,CACL,CAAC,CAAC,EACF,KAAK,gBAAgB,IAAQ,GAAO,qBAAsB,KAAK,MAAM,CAAC,EAE1E,OAAO,EAAG,CACN,MAAM,QAAQ,EAEtB,CACQ,aAAY,wBClDpB,IAAuB,eAAnB,EAC0B,yBAA1B,GAC2B,oBAA3B,IADmB,OAEnB,GAAe,OAAO,UAAU,eAChC,EAAS,CAAC,EAAQ,IAAU,EAAU,EAAQ,OAAQ,CAAE,QAAO,aAAc,EAAK,CAAC,EACnF,GAAW,CAAC,EAAQ,IAAQ,CAC9B,QAAS,KAAQ,EACf,EAAU,EAAQ,EAAM,CAAE,IAAK,EAAI,GAAO,WAAY,EAAK,CAAC,GAE5D,GAAc,CAAC,EAAI,EAAM,EAAQ,IAAS,CAC5C,GAAI,GAAQ,OAAO,IAAS,UAAY,OAAO,IAAS,YACtD,QAAS,KAAO,GAAkB,CAAI,EACpC,IAAK,GAAa,KAAK,EAAI,CAAG,GAAK,IAAQ,EACzC,EAAU,EAAI,EAAK,CAAE,IAAK,IAAM,EAAK,GAAM,aAAc,EAAO,GAAiB,EAAM,CAAG,IAAM,EAAK,UAAW,CAAC,EAEvH,OAAO,GAEL,GAAa,CAAC,EAAQ,EAAK,KAAkB,GAAY,EAAQ,EAAK,SAAS,EAAG,GAAgB,GAAY,EAAc,EAAK,SAAS,GAC1I,GAAe,CAAC,IAAQ,GAAY,EAAU,CAAC,EAAG,aAAc,CAAE,MAAO,EAAK,CAAC,EAAG,CAAG,EAGrF,GAAgB,CAAC,EACrB,GAAS,GAAe,CACtB,kBAAmB,IAAM,GACzB,qCAAsC,IAAM,GAC5C,iCAAkC,IAAM,GACxC,mDAAoD,IAAM,GAC1D,oDAAqD,IAAM,GAC3D,8BAA+B,IAAM,GAA2B,8BAChE,8BAA+B,IAAM,GACrC,sBAAuB,IAAM,GAC7B,+BAAgC,IAAM,GACtC,0BAA2B,IAAM,GACjC,8BAA+B,IAAM,GACrC,iCAAkC,IAAM,GACxC,8BAA+B,IAAM,GACrC,wBAAyB,IAAM,GAC/B,IAAK,IAAM,GACX,oBAAqB,IAAM,EAC3B,kCAAmC,IAAM,GACzC,sBAAuB,IAAM,GAC7B,qCAAsC,IAAM,EAC9C,CAAC,EACD,GAAO,QAAU,GAAa,EAAa,EAC3C,GAAW,OAAuC,GAAO,OAAO,EAGhE,IAAI,OAGA,QACA,QACA,OACA,OAGA,OAGA,OACA,EAAsB,MAAM,UAA6B,GAAqB,gBAAiB,OAC1F,CACL,EAAO,KAAM,qBAAqB,EAKpC,WAAW,CAAC,EAAS,CACnB,MAAM,CAAO,EACb,OAAO,eAAe,KAAM,EAAqB,SAAS,EAE9D,EAGI,GAAgD,EAAO,CAAC,KAAS,IAChE,KACA,EAAI,iBAAmB,CAAE,gBAAiB,GAAsB,gBAAiB,CACtF,GAAI,+BAA+B,EAC/B,GAAuD,EAAO,CAAC,KAAS,IACvE,KACA,EAAI,aAAe,CAAE,YAAa,GAA8B,EAAI,WAAW,CAAE,CACtF,GAAI,sCAAsC,EACtC,GAAwB,MAAM,UAA+B,CAAoB,OAC5E,CACL,EAAO,KAAM,uBAAuB,EAEtC,KAAO,wBACP,OAAS,SAIT,WAAW,CAAC,EAAM,CAChB,MAAM,CACJ,KAAM,wBACN,OAAQ,YACL,CACL,CAAC,EACD,OAAO,eAAe,KAAM,EAAuB,SAAS,EAEhE,EACI,GAAmC,MAAM,UAA0C,CAAoB,OAClG,CACL,EAAO,KAAM,kCAAkC,EAEjD,KAAO,mCACP,OAAS,SAIT,WAAW,CAAC,EAAM,CAChB,MAAM,CACJ,KAAM,mCACN,OAAQ,YACL,CACL,CAAC,EACD,OAAO,eAAe,KAAM,EAAkC,SAAS,EAE3E,EACI,GAAgC,MAAM,UAAuC,CAAoB,OAC5F,CACL,EAAO,KAAM,+BAA+B,EAE9C,KAAO,gCACP,OAAS,SAIT,WAAW,CAAC,EAAM,CAChB,MAAM,CACJ,KAAM,gCACN,OAAQ,YACL,CACL,CAAC,EACD,OAAO,eAAe,KAAM,EAA+B,SAAS,EAExE,EACI,GAA0B,MAAM,UAAiC,CAAoB,OAChF,CACL,EAAO,KAAM,yBAAyB,EAExC,KAAO,0BACP,OAAS,SAIT,WAAW,CAAC,EAAM,CAChB,MAAM,CACJ,KAAM,0BACN,OAAQ,YACL,CACL,CAAC,EACD,OAAO,eAAe,KAAM,EAAyB,SAAS,EAElE,EACI,GAA4B,MAAM,UAAmC,CAAoB,OACpF,CACL,EAAO,KAAM,2BAA2B,EAE1C,KAAO,4BACP,OAAS,SAIT,WAAW,CAAC,EAAM,CAChB,MAAM,CACJ,KAAM,4BACN,OAAQ,YACL,CACL,CAAC,EACD,OAAO,eAAe,KAAM,EAA2B,SAAS,EAEpE,EACI,GAAgC,MAAM,UAAuC,CAAoB,OAC5F,CACL,EAAO,KAAM,+BAA+B,EAE9C,KAAO,gCACP,OAAS,SAIT,WAAW,CAAC,EAAM,CAChB,MAAM,CACJ,KAAM,gCACN,OAAQ,YACL,CACL,CAAC,EACD,OAAO,eAAe,KAAM,EAA+B,SAAS,EAExE,EACI,GAAqE,EAAO,CAAC,KAAS,IACrF,KACA,EAAI,kBAAoB,CAAE,iBAAkB,GAAsB,gBAAiB,CACxF,GAAI,oDAAoD,EACpD,GAAsE,EAAO,CAAC,KAAS,IACtF,KACA,EAAI,aAAe,CAAE,YAAa,GAA8B,EAAI,WAAW,CAAE,CACtF,GAAI,qDAAqD,EACrD,GAAiC,MAAM,UAAwC,CAAoB,OAC9F,CACL,EAAO,KAAM,gCAAgC,EAE/C,KAAO,iCACP,OAAS,SAIT,WAAW,CAAC,EAAM,CAChB,MAAM,CACJ,KAAM,iCACN,OAAQ,YACL,CACL,CAAC,EACD,OAAO,eAAe,KAAM,EAAgC,SAAS,EAEzE,EAGI,OACA,QACA,MACA,GAAuC,EAAO,MAAO,EAAO,IAAY,CAC1E,IAAM,EAAU,GACZ,EAMJ,OALA,EAAO,GAA0B,IAC5B,GAAqB,EAAO,CAAO,GACrC,IAAK,IACL,IAAK,EACR,CAAC,EACM,GAAoB,EAAS,EAAS,IAAU,OAAG,CAAI,GAC7D,sBAAsB,EACrB,GAAsD,EAAO,MAAO,EAAO,IAAY,CACzF,IAAM,EAAU,GACZ,EAMJ,OALA,EAAO,GAA0B,IAC5B,GAAoC,EAAO,CAAO,GACpD,IAAK,IACL,IAAK,EACR,CAAC,EACM,GAAoB,EAAS,EAAS,IAAU,OAAG,CAAI,GAC7D,qCAAqC,EACpC,GAAuC,EAAO,MAAO,EAAQ,IAAY,CAC3E,GAAI,EAAO,YAAc,IACvB,OAAO,GAAgB,EAAQ,CAAO,EAExC,IAAM,EAAO,MAAU,GAAY,aAAc,EAAO,KAAM,CAAO,EACjE,EAAW,CAAC,EAMhB,OALA,EAAW,GAAsB,EAAK,iBAAkB,CAAO,EAC9C,CACf,UAAW,EAAoB,CAAM,KAClC,CACL,GAEC,sBAAsB,EACrB,GAAsD,EAAO,MAAO,EAAQ,IAAY,CAC1F,GAAI,EAAO,YAAc,IACvB,OAAO,GAAgB,EAAQ,CAAO,EAExC,IAAM,EAAO,MAAU,GAAY,aAAc,EAAO,KAAM,CAAO,EACjE,EAAW,CAAC,EAMhB,OALA,EAAW,GAAqC,EAAK,gCAAiC,CAAO,EAC5E,CACf,UAAW,EAAoB,CAAM,KAClC,CACL,GAEC,qCAAqC,EACpC,GAAkC,EAAO,MAAO,EAAQ,IAAY,CACtE,IAAM,EAAe,IAChB,EACH,KAAM,MAAU,GAAY,kBAAmB,EAAO,KAAM,CAAO,CACrE,EACM,EAAY,GAAmB,EAAQ,EAAa,IAAI,EAC9D,OAAQ,OACD,4BACA,0CACH,MAAM,MAAM,GAA4B,EAAc,CAAO,MAC1D,8BACA,qDACH,MAAM,MAAM,GAAuC,EAAc,CAAO,MACrE,2BACA,kDACH,MAAM,MAAM,GAAoC,EAAc,CAAO,MAClE,8BACA,4CACH,MAAM,MAAM,GAA8B,EAAc,CAAO,MAC5D,4BACA,mDACH,MAAM,MAAM,GAAqC,EAAc,CAAO,MACnE,uBACA,8CACH,MAAM,MAAM,GAAgC,EAAc,CAAO,MAC9D,2BACA,kDACH,MAAM,MAAM,GAAoC,EAAc,CAAO,UAErE,IAAM,EAAa,EAAa,KAChC,OAAO,GAAkB,CACvB,SACA,WAAY,EAAW,MACvB,WACF,CAAC,IAEJ,iBAAiB,EAChB,GAA8C,EAAO,MAAO,EAAc,IAAY,CACxF,IAAM,EAAO,EAAa,KACpB,EAAe,GAAyB,EAAK,MAAO,CAAO,EAC3D,EAAY,IAAI,GAAsB,CAC1C,UAAW,EAAoB,CAAY,KACxC,CACL,CAAC,EACD,OAAW,EAAsB,yBAA0B,EAAW,CAAI,GACzE,6BAA6B,EAC5B,GAAuD,EAAO,MAAO,EAAc,IAAY,CACjG,IAAM,EAAO,EAAa,KACpB,EAAe,GAAkC,EAAK,MAAO,CAAO,EACpE,EAAY,IAAI,GAA+B,CACnD,UAAW,EAAoB,CAAY,KACxC,CACL,CAAC,EACD,OAAW,EAAsB,yBAA0B,EAAW,CAAI,GACzE,sCAAsC,EACrC,GAAkD,EAAO,MAAO,EAAc,IAAY,CAC5F,IAAM,EAAO,EAAa,KACpB,EAAe,GAA6B,EAAK,MAAO,CAAO,EAC/D,EAAY,IAAI,GAA0B,CAC9C,UAAW,EAAoB,CAAY,KACxC,CACL,CAAC,EACD,OAAW,EAAsB,yBAA0B,EAAW,CAAI,GACzE,iCAAiC,EAChC,GAAsD,EAAO,MAAO,EAAc,IAAY,CAChG,IAAM,EAAO,EAAa,KACpB,EAAe,GAAiC,EAAK,MAAO,CAAO,EACnE,EAAY,IAAI,GAA8B,CAClD,UAAW,EAAoB,CAAY,KACxC,CACL,CAAC,EACD,OAAW,EAAsB,yBAA0B,EAAW,CAAI,GACzE,qCAAqC,EACpC,GAAyD,EAAO,MAAO,EAAc,IAAY,CACnG,IAAM,EAAO,EAAa,KACpB,EAAe,GAAoC,EAAK,MAAO,CAAO,EACtE,EAAY,IAAI,GAAiC,CACrD,UAAW,EAAoB,CAAY,KACxC,CACL,CAAC,EACD,OAAW,EAAsB,yBAA0B,EAAW,CAAI,GACzE,wCAAwC,EACvC,GAAsD,EAAO,MAAO,EAAc,IAAY,CAChG,IAAM,EAAO,EAAa,KACpB,EAAe,GAAiC,EAAK,MAAO,CAAO,EACnE,EAAY,IAAI,GAA8B,CAClD,UAAW,EAAoB,CAAY,KACxC,CACL,CAAC,EACD,OAAW,EAAsB,yBAA0B,EAAW,CAAI,GACzE,qCAAqC,EACpC,GAAgD,EAAO,MAAO,EAAc,IAAY,CAC1F,IAAM,EAAO,EAAa,KACpB,EAAe,GAA2B,EAAK,MAAO,CAAO,EAC7D,EAAY,IAAI,GAAwB,CAC5C,UAAW,EAAoB,CAAY,KACxC,CACL,CAAC,EACD,OAAW,EAAsB,yBAA0B,EAAW,CAAI,GACzE,+BAA+B,EAC9B,GAAuC,EAAO,CAAC,EAAO,IAAY,CACpE,IAAM,EAAU,CAAC,EACjB,GAAI,EAAM,IAAQ,KAChB,EAAQ,GAAO,EAAM,GAEvB,GAAI,EAAM,IAAS,KACjB,EAAQ,GAAQ,EAAM,GAExB,GAAI,EAAM,IAAQ,KAAM,CACtB,IAAM,EAAgB,GAA4B,EAAM,GAAM,CAAO,EACrE,GAAI,EAAM,IAAM,SAAW,EACzB,EAAQ,WAAa,CAAC,EAExB,OAAO,QAAQ,CAAa,EAAE,QAAQ,EAAE,EAAK,KAAW,CACtD,IAAM,EAAM,cAAc,IAC1B,EAAQ,GAAO,EAChB,EAEH,GAAI,EAAM,IAAO,KACf,EAAQ,GAAM,EAAM,GAEtB,GAAI,EAAM,IAAQ,KAChB,EAAQ,GAAO,EAAM,GAEvB,GAAI,EAAM,KAAO,KAAM,CACrB,IAAM,EAAgB,GAAe,EAAM,IAAK,CAAO,EACvD,GAAI,EAAM,KAAK,SAAW,EACxB,EAAQ,KAAO,CAAC,EAElB,OAAO,QAAQ,CAAa,EAAE,QAAQ,EAAE,EAAK,KAAW,CACtD,IAAM,EAAM,QAAQ,IACpB,EAAQ,GAAO,EAChB,EAEH,GAAI,EAAM,KAAS,KAAM,CACvB,IAAM,EAAgB,GAAkB,EAAM,IAAO,CAAO,EAC5D,GAAI,EAAM,KAAO,SAAW,EAC1B,EAAQ,kBAAoB,CAAC,EAE/B,OAAO,QAAQ,CAAa,EAAE,QAAQ,EAAE,EAAK,KAAW,CACtD,IAAM,EAAM,qBAAqB,IACjC,EAAQ,GAAO,EAChB,EAEH,GAAI,EAAM,KAAQ,KAChB,EAAQ,IAAO,EAAM,IAEvB,GAAI,EAAM,KAAQ,KAChB,EAAQ,IAAO,EAAM,IAEvB,GAAI,EAAM,KAAQ,KAChB,EAAQ,IAAO,EAAM,IAEvB,GAAI,EAAM,IAAQ,KAChB,EAAQ,GAAO,EAAM,GAEvB,GAAI,EAAM,KAAQ,KAAM,CACtB,IAAM,EAAgB,GAA4B,EAAM,IAAM,CAAO,EACrE,GAAI,EAAM,KAAM,SAAW,EACzB,EAAQ,iBAAmB,CAAC,EAE9B,OAAO,QAAQ,CAAa,EAAE,QAAQ,EAAE,EAAK,KAAW,CACtD,IAAM,EAAM,oBAAoB,IAChC,EAAQ,GAAO,EAChB,EAEH,OAAO,GACN,sBAAsB,EACrB,GAAsD,EAAO,CAAC,EAAO,IAAY,CACnF,IAAM,EAAU,CAAC,EACjB,GAAI,EAAM,IAAQ,KAChB,EAAQ,GAAO,EAAM,GAEvB,GAAI,EAAM,IAAS,KACjB,EAAQ,GAAQ,EAAM,GAExB,GAAI,EAAM,KAAS,KACjB,EAAQ,IAAQ,EAAM,IAExB,GAAI,EAAM,KAAQ,KAChB,EAAQ,IAAO,EAAM,IAEvB,GAAI,EAAM,IAAQ,KAAM,CACtB,IAAM,EAAgB,GAA4B,EAAM,GAAM,CAAO,EACrE,GAAI,EAAM,IAAM,SAAW,EACzB,EAAQ,WAAa,CAAC,EAExB,OAAO,QAAQ,CAAa,EAAE,QAAQ,EAAE,EAAK,KAAW,CACtD,IAAM,EAAM,cAAc,IAC1B,EAAQ,GAAO,EAChB,EAEH,GAAI,EAAM,IAAO,KACf,EAAQ,GAAM,EAAM,GAEtB,GAAI,EAAM,IAAQ,KAChB,EAAQ,GAAO,EAAM,GAEvB,OAAO,GACN,qCAAqC,EACpC,GAA8C,EAAO,CAAC,EAAO,IAAY,CAC3E,IAAM,EAAU,CAAC,EACb,EAAU,EACd,QAAW,KAAS,EAAO,CACzB,GAAI,IAAU,KACZ,SAEF,IAAM,EAAgB,GAAwB,EAAO,CAAO,EAC5D,OAAO,QAAQ,CAAa,EAAE,QAAQ,EAAE,EAAK,KAAW,CACtD,EAAQ,UAAU,KAAW,KAAS,EACvC,EACD,IAEF,OAAO,GACN,6BAA6B,EAC5B,GAA0C,EAAO,CAAC,EAAO,IAAY,CACvE,IAAM,EAAU,CAAC,EACjB,GAAI,EAAM,KAAO,KACf,EAAQ,IAAM,EAAM,IAEtB,OAAO,GACN,yBAAyB,EACxB,GAAqC,EAAO,CAAC,EAAO,IAAY,CAClE,IAAM,EAAU,CAAC,EACjB,GAAI,EAAM,KAAS,KACjB,EAAQ,IAAQ,EAAM,IAExB,GAAI,EAAM,KAAQ,KAChB,EAAQ,IAAO,EAAM,IAEvB,OAAO,GACN,oBAAoB,EACnB,GAA8C,EAAO,CAAC,EAAO,IAAY,CAC3E,IAAM,EAAU,CAAC,EACb,EAAU,EACd,QAAW,KAAS,EAAO,CACzB,GAAI,IAAU,KACZ,SAEF,IAAM,EAAgB,GAAmB,EAAO,CAAO,EACvD,OAAO,QAAQ,CAAa,EAAE,QAAQ,EAAE,EAAK,KAAW,CACtD,EAAQ,UAAU,KAAW,KAAS,EACvC,EACD,IAEF,OAAO,GACN,6BAA6B,EAC5B,GAAyB,EAAO,CAAC,EAAO,IAAY,CACtD,IAAM,EAAU,CAAC,EACjB,GAAI,EAAM,KAAO,KACf,EAAQ,IAAM,EAAM,IAEtB,GAAI,EAAM,KAAQ,KAChB,EAAQ,IAAO,EAAM,IAEvB,OAAO,GACN,QAAQ,EACP,GAAoC,EAAO,CAAC,EAAO,IAAY,CACjE,IAAM,EAAU,CAAC,EACb,EAAU,EACd,QAAW,KAAS,EAAO,CACzB,GAAI,IAAU,KACZ,SAEF,EAAQ,UAAU,KAAa,EAC/B,IAEF,OAAO,GACN,mBAAmB,EAClB,GAAiC,EAAO,CAAC,EAAO,IAAY,CAC9D,IAAM,EAAU,CAAC,EACb,EAAU,EACd,QAAW,KAAS,EAAO,CACzB,GAAI,IAAU,KACZ,SAEF,IAAM,EAAgB,GAAO,EAAO,CAAO,EAC3C,OAAO,QAAQ,CAAa,EAAE,QAAQ,EAAE,EAAK,KAAW,CACtD,EAAQ,UAAU,KAAW,KAAS,EACvC,EACD,IAEF,OAAO,GACN,gBAAgB,EACf,GAAqC,EAAO,CAAC,EAAQ,IAAY,CACnE,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,KAAS,KAClB,EAAS,IAAY,EAAsB,aAAc,EAAO,GAAK,EAEvE,GAAI,EAAO,KAAQ,KACjB,EAAS,IAAW,EAAsB,aAAc,EAAO,GAAI,EAErE,OAAO,GACN,oBAAoB,EACnB,GAAwC,EAAO,CAAC,EAAQ,IAAY,CACtE,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAM,GAAe,EAAO,GAAK,CAAO,EAEnD,GAAI,EAAO,IAAS,KAClB,EAAS,GAAQ,GAAmB,EAAO,GAAO,CAAO,EAE3D,GAAI,EAAO,IAAS,KAClB,EAAS,GAAY,EAAsB,iBAAkB,EAAO,EAAK,EAE3E,GAAI,EAAO,IAAQ,KACjB,EAAS,GAAW,EAAsB,aAAc,EAAO,EAAI,EAErE,OAAO,GACN,uBAAuB,EACtB,GAAuD,EAAO,CAAC,EAAQ,IAAY,CACrF,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAM,GAAe,EAAO,GAAK,CAAO,EAEnD,GAAI,EAAO,KAAW,KACpB,EAAS,IAAc,EAAsB,aAAc,EAAO,GAAO,EAE3E,GAAI,EAAO,IAAS,KAClB,EAAS,GAAQ,GAAmB,EAAO,GAAO,CAAO,EAE3D,GAAI,EAAO,IAAS,KAClB,EAAS,GAAY,EAAsB,iBAAkB,EAAO,EAAK,EAE3E,GAAI,EAAO,KAAQ,KACjB,EAAS,IAAW,EAAsB,aAAc,EAAO,GAAI,EAErE,GAAI,EAAO,KAAQ,KACjB,EAAS,IAAW,EAAsB,aAAc,EAAO,GAAI,EAErE,GAAI,EAAO,IAAQ,KACjB,EAAS,GAAW,EAAsB,aAAc,EAAO,EAAI,EAErE,OAAO,GACN,sCAAsC,EACrC,GAAiC,EAAO,CAAC,EAAQ,IAAY,CAC/D,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,KAAS,KAClB,EAAS,IAAY,EAAsB,aAAc,EAAO,GAAK,EAEvE,GAAI,EAAO,KAAS,KAClB,EAAS,IAAY,EAAsB,aAAc,EAAO,GAAK,EAEvE,GAAI,EAAO,KAAQ,KACjB,EAAS,IAAW,EAAsB,aAAc,EAAO,GAAI,EAErE,GAAI,EAAO,KAAO,KAChB,EAAS,IAAU,EAAsB,cAAmB,EAAsB,+BAAgC,EAAO,GAAG,CAAC,EAE/H,OAAO,GACN,gBAAgB,EACf,GAA2C,EAAO,CAAC,EAAQ,IAAY,CACzE,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAU,EAAsB,aAAc,EAAO,EAAG,EAEnE,OAAO,GACN,0BAA0B,EACzB,GAAoD,EAAO,CAAC,EAAQ,IAAY,CAClF,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAU,EAAsB,aAAc,EAAO,EAAG,EAEnE,OAAO,GACN,mCAAmC,EAClC,GAA+C,EAAO,CAAC,EAAQ,IAAY,CAC7E,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAU,EAAsB,aAAc,EAAO,EAAG,EAEnE,OAAO,GACN,8BAA8B,EAC7B,GAAmD,EAAO,CAAC,EAAQ,IAAY,CACjF,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAU,EAAsB,aAAc,EAAO,EAAG,EAEnE,OAAO,GACN,kCAAkC,EACjC,GAAsD,EAAO,CAAC,EAAQ,IAAY,CACpF,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAU,EAAsB,aAAc,EAAO,EAAG,EAEnE,OAAO,GACN,qCAAqC,EACpC,GAAmD,EAAO,CAAC,EAAQ,IAAY,CACjF,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAU,EAAsB,aAAc,EAAO,EAAG,EAEnE,OAAO,GACN,kCAAkC,EACjC,GAA6C,EAAO,CAAC,EAAQ,IAAY,CAC3E,IAAM,EAAW,CAAC,EAClB,GAAI,EAAO,IAAO,KAChB,EAAS,GAAU,EAAsB,aAAc,EAAO,EAAG,EAEnE,OAAO,GACN,4BAA4B,EAC3B,EAAsC,EAAO,CAAC,KAAY,CAC5D,eAAgB,EAAO,WACvB,UAAW,EAAO,QAAQ,qBAAuB,EAAO,QAAQ,sBAAwB,EAAO,QAAQ,oBACvG,kBAAmB,EAAO,QAAQ,cAClC,KAAM,EAAO,QAAQ,cACvB,GAAI,qBAAqB,EACrB,GAAwB,EAAsB,kBAAmB,CAAmB,EACpF,GAAsC,EAAO,MAAO,EAAS,EAAS,EAAM,EAAkB,IAAS,CACzG,IAAQ,WAAU,WAAW,QAAS,OAAM,KAAM,GAAa,MAAM,EAAQ,SAAS,EAChF,EAAW,CACf,WACA,WACA,OACA,OAAQ,OACR,KAAM,EAAS,SAAS,GAAG,EAAI,EAAS,MAAM,EAAG,EAAE,EAAI,EAAO,EAAW,EACzE,SACF,EACA,GAAI,IAA0B,OAC5B,EAAS,SAAW,EAEtB,GAAI,IAAc,OAChB,EAAS,KAAO,EAElB,OAAO,IAAI,GAAqB,YAAY,CAAQ,GACnD,qBAAqB,EACpB,GAAiB,CACnB,eAAgB,mCAClB,EACI,GAAI,aACJ,GAAK,SACL,GAAO,cACP,GAAM,aACN,GAAO,gBACP,EAAO,kBACP,GAAS,4BACT,GAAM,MACN,GAAM,WACN,EAAK,cACL,GAAM,mBACN,EAAM,kBACN,GAAK,aACL,GAAM,aACN,GAAK,MACL,EAAK,SACL,EAAM,aACN,GAAO,cACP,GAAM,mBACN,GAAM,aACN,EAAO,mBACP,GAAM,WACN,EAAM,UACN,EAAO,kBACP,GAAO,kBACP,GAAS,8BACT,EAAM,iBACN,GAAM,eACN,GAAM,eACN,GAAK,OACL,GAAM,YACN,GAAO,oBACP,GAAK,UACL,GAAM,QACN,GAAO,mBACP,GAAK,MACL,EAAK,UACL,GAA4C,EAAO,CAAC,IAAgB,OAAO,QAAQ,CAAW,EAAE,IAAI,EAAE,EAAK,KAAe,EAAsB,2BAA4B,CAAG,EAAI,IAAU,EAAsB,2BAA4B,CAAK,CAAC,EAAE,KAAK,GAAG,EAAG,2BAA2B,EAC7R,GAAqC,EAAO,CAAC,EAAQ,IAAS,CAChE,GAAI,EAAK,OAAO,OAAc,OAC5B,OAAO,EAAK,MAAM,KAEpB,GAAI,EAAO,YAAc,IACvB,MAAO,YAER,oBAAoB,EAGnB,GAAoB,cAAc,GAAsB,QAAQ,aAAa,EAAE,GAAG,GAA0B,YAAY,EAAE,EAAE,QAAQ,CAAC,EAAS,EAAI,EAAQ,EAAG,CAC/J,MAAO,CACD,GAAwB,eAAgB,EAAQ,KAAK,UAAW,KAAK,WAAW,EAChF,GAA2B,kBAAmB,EAAQ,EAAQ,iCAAiC,CAAC,CACtG,EACD,EAAE,EAAE,mCAAoC,aAAc,CAAC,CAAC,EAAE,EAAE,YAAa,mBAAmB,EAAE,EAAO,OAAG,EAAoC,EAAE,IAAI,EAAoB,EAAE,GAAG,EAAoB,EAAE,MAAM,CAAE,OACjM,CACL,EAAO,KAAM,mBAAmB,EAEpC,EAGI,QACA,QACA,OACA,OACA,GAAmC,cAAc,GAAsB,QAAQ,aAAa,EAAE,GAAG,GAA2B,YAAY,EAAE,EAAE,QAAQ,CAAC,EAAS,EAAI,EAAQ,EAAG,CAC/K,MAAO,CACD,GAAyB,eAAgB,EAAQ,KAAK,UAAW,KAAK,WAAW,EACjF,GAA4B,kBAAmB,EAAQ,EAAQ,iCAAiC,CAAC,CACvG,EACD,EAAE,EAAE,mCAAoC,4BAA6B,CAAC,CAAC,EAAE,EAAE,YAAa,kCAAkC,EAAE,EAAE,GAAoD,EAAmD,EAAE,IAAI,EAAmC,EAAE,GAAG,EAAmC,EAAE,MAAM,CAAE,OACxT,CACL,EAAO,KAAM,kCAAkC,EAEnD,EAGI,OACA,GAAW,CACb,qBACA,mCACF,EACI,GAAM,cAAc,GAAiB,SAAU,OAC1C,CACL,EAAO,KAAM,KAAK,EAEtB,EACI,GAAsB,uBAAwB,GAAU,EAAG,EAG/D,IAAI,OAGA,QACA,GAA6B,YAC7B,GAAkD,EAAO,CAAC,IAAoB,CAChF,GAAI,OAAO,GAAiB,MAAQ,SAAU,CAC5C,IAAM,EAAgB,EAAgB,IAAI,MAAM,GAAG,EACnD,GAAI,EAAc,OAAS,GAAK,EAAc,KAAO,GACnD,OAAO,EAAc,GAGzB,QACC,iCAAiC,EAChC,GAAgC,EAAO,MAAO,EAAS,EAAe,IAA6B,CACrG,IAAM,EAAS,OAAO,IAAY,WAAa,MAAM,EAAQ,EAAI,EAC3D,EAAe,OAAO,IAAkB,WAAa,MAAM,EAAc,EAAI,EAQnF,OAPA,GAA0B,QACxB,qCACA,sBACA,GAAG,eACH,GAAG,oBACH,GAAG,kBACL,EACO,GAAU,GAAgB,IAChC,eAAe,EACd,GAAwC,EAAO,CAAC,EAAY,IAAe,CAC7E,IAAI,EACA,EACJ,MAAO,OAAO,EAAa,IAAW,CAEpC,GADA,EAAqB,GAChB,EAAW,CACd,IACE,SAAS,GAAY,oBAAoB,OACzC,SACA,iBAAiB,GAAY,oBAAoB,eACjD,4BACE,EACE,GAAiB,MAAM,GAC3B,EACA,GAAY,oBAAoB,OAChC,CACF,EACM,IAA8B,GAAK,CAAc,EACvD,EAAY,IAAI,EAAW,CACzB,QAAS,GAAY,oBAAoB,QAEzC,0BAA2C,EAAO,IAAM,SAAY,EAAoB,2BAA2B,EACnH,OAAQ,GACR,eAAgB,GAA6B,EAAsB,OACnE,QACF,CAAC,EAEH,IAAQ,YAAa,EAAc,gBAAiB,GAAqB,MAAM,EAAU,KAAK,IAAI,GAAkB,CAAM,CAAC,EAC3H,IAAK,IAAiB,EAAa,cAAgB,EAAa,gBAC9D,MAAM,IAAI,MAAM,uDAAuD,EAAO,SAAS,EAEzF,IAAM,EAAY,GAAgC,CAAgB,EAC5D,EAAc,CAClB,YAAa,EAAa,YAC1B,gBAAiB,EAAa,gBAC9B,aAAc,EAAa,aAC3B,WAAY,EAAa,cAEtB,EAAa,iBAAmB,CAAE,gBAAiB,EAAa,eAAgB,KAChF,GAAa,CAAE,WAAU,CAC9B,EAEA,OADI,GAAc,qBAAsB,EAAa,8BAA+B,GAAG,EAChF,IAER,uBAAuB,EACtB,GAAuD,EAAO,CAAC,EAAY,IAAe,CAC5F,IAAI,EACJ,MAAO,OAAO,IAAW,CACvB,IAAK,EAAW,CACd,IACE,SAAS,GAAY,oBAAoB,OACzC,SACA,iBAAiB,GAAY,oBAAoB,eACjD,4BACE,EACE,EAAiB,MAAM,GAC3B,EACA,GAAY,oBAAoB,OAChC,CACF,EACM,GAA8B,GAAK,CAAc,EACvD,EAAY,IAAI,EAAW,CACzB,QAAS,GAAY,oBAAoB,QACzC,OAAQ,EACR,eAAgB,EAA6B,EAAsB,OACnE,QACF,CAAC,EAEH,IAAQ,YAAa,EAAc,gBAAiB,GAAqB,MAAM,EAAU,KAAK,IAAI,GAAiC,CAAM,CAAC,EAC1I,IAAK,IAAiB,EAAa,cAAgB,EAAa,gBAC9D,MAAM,IAAI,MAAM,sEAAsE,EAAO,SAAS,EAExG,IAAM,EAAY,GAAgC,CAAgB,EAC5D,EAAc,CAClB,YAAa,EAAa,YAC1B,gBAAiB,EAAa,gBAC9B,aAAc,EAAa,aAC3B,WAAY,EAAa,cAEtB,EAAa,iBAAmB,CAAE,gBAAiB,EAAa,eAAgB,KAChF,GAAa,CAAE,WAAU,CAC9B,EACA,GAAI,EACE,GAAc,qBAAsB,EAAa,sBAAuB,GAAG,EAGjF,OADI,GAAc,qBAAsB,EAAa,qCAAsC,GAAG,EACvF,IAER,sCAAsC,EACrC,GAAuB,EAAO,CAAC,IAAmB,CACpD,OAAO,GAAgB,UAAU,kBAAoB,MACpD,MAAM,EAGL,OACA,GAA+C,EAAO,CAAC,EAAU,IAAmB,CACtF,IAAK,EAAgB,OAAO,EAE1B,YAAO,MAAM,UAA8B,CAAS,OAC3C,CACL,EAAO,KAAM,uBAAuB,EAEtC,WAAW,CAAC,EAAQ,CAClB,MAAM,CAAM,EACZ,QAAW,KAAiB,EAC1B,KAAK,gBAAgB,IAAI,CAAa,EAG5C,GACD,8BAA8B,EAC7B,GAAyC,EAAO,CAAC,EAAa,CAAC,EAAG,IAAe,GAAsB,EAAY,GAA6B,GAAkB,UAAW,CAAU,CAAC,EAAG,uBAAuB,EAClN,GAAwD,EAAO,CAAC,EAAa,CAAC,EAAG,IAAe,GAAqC,EAAY,GAA6B,GAAkB,UAAW,CAAU,CAAC,EAAG,sCAAsC,EAC/P,GAAoD,EAAO,CAAC,IAAa,CAAC,IAAU,EAAS,CAC/F,YAAa,GAAuB,CAAK,EACzC,2BAA4B,GAAsC,CAAK,KACpE,CACL,CAAC,EAAG,mCAAmC",
17
- "debugId": "7BBFAB9A074A36DF64756E2164756E21",
17
+ "debugId": "71380D8CC4BEB6D064756E2164756E21",
18
18
  "names": []
19
19
  }
@@ -1,5 +1,5 @@
1
1
  // @bun
2
- import{Wa as z,Xa as P}from"./chunk-dy5fyccd.js";import"./chunk-wf991m48.js";import"./chunk-r13m0b3y.js";import{lc as D}from"./chunk-4gfrxz19.js";import{wc as _}from"./chunk-5zy36vzw.js";var m=_(D(),1);import{parse as o}from"url";var K=_(D(),1);import{Buffer as a}from"buffer";import{request as n}from"http";function u(c){return new Promise((I,x)=>{let T=n({method:"GET",...c,hostname:c.hostname?.replace(/^\[(.+)\]$/,"$1")});T.on("error",(N)=>{x(Object.assign(new K.ProviderError("Unable to connect to instance metadata service"),N)),T.destroy()}),T.on("timeout",()=>{x(new K.ProviderError("TimeoutError from instance metadata service")),T.destroy()}),T.on("response",(N)=>{let{statusCode:O=400}=N;if(O<200||300<=O)x(Object.assign(new K.ProviderError("Error response received from instance metadata service"),{statusCode:O})),T.destroy();let E=[];N.on("data",(y)=>{E.push(y)}),N.on("end",()=>{I(a.concat(E)),T.destroy()})}),T.end()})}var G=(c)=>Boolean(c)&&typeof c==="object"&&typeof c.AccessKeyId==="string"&&typeof c.SecretAccessKey==="string"&&typeof c.Token==="string"&&typeof c.Expiration==="string",Q=(c)=>({accessKeyId:c.AccessKeyId,secretAccessKey:c.SecretAccessKey,sessionToken:c.Token,expiration:new Date(c.Expiration),...c.AccountId&&{accountId:c.AccountId}});var uc=1000,Ec=0,X=({maxRetries:c=0,timeout:I=1000})=>({maxRetries:c,timeout:I});var f=(c,I)=>{let x=c();for(let T=0;T<I;T++)x=x.catch(c);return x};var v="AWS_CONTAINER_CREDENTIALS_FULL_URI",L="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",B="AWS_CONTAINER_AUTHORIZATION_TOKEN",Kc=(c={})=>{let{timeout:I,maxRetries:x}=X(c);return()=>f(async()=>{let T=await d({logger:c.logger}),N=JSON.parse(await s(I,T));if(!G(N))throw new m.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:c.logger});return Q(N)},x)},s=async(c,I)=>{if(process.env[B])I.headers={...I.headers,Authorization:process.env[B]};return(await u({...I,timeout:c})).toString()},g="169.254.170.2",l={localhost:!0,"127.0.0.1":!0},r={"http:":!0,"https:":!0},d=async({logger:c})=>{if(process.env[L])return{hostname:g,path:process.env[L]};if(process.env[v]){let I=o(process.env[v]);if(!I.hostname||!(I.hostname in l))throw new m.CredentialsProviderError(`${I.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:c});if(!I.protocol||!(I.protocol in r))throw new m.CredentialsProviderError(`${I.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:c});return{...I,port:I.port?parseInt(I.port,10):void 0}}throw new m.CredentialsProviderError(`The container metadata credential provider cannot be used unless the ${L} or ${v} environment variable is set`,{tryNextLink:!1,logger:c})};var q=_(D(),1);var U=_(D(),1);class Z extends U.CredentialsProviderError{constructor(c,I=!0){super(c,I);this.tryNextLink=I,this.name="InstanceMetadataV1FallbackError",Object.setPrototypeOf(this,Z.prototype)}}var A;(function(c){c.IPv4="http://169.254.169.254",c.IPv6="http://[fd00:ec2::254]"})(A||(A={}));var t={environmentVariableSelector:(c)=>c.AWS_EC2_METADATA_SERVICE_ENDPOINT,configFileSelector:(c)=>c.ec2_metadata_service_endpoint,default:void 0};var S;(function(c){c.IPv4="IPv4",c.IPv6="IPv6"})(S||(S={}));var e="AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE",i="ec2_metadata_service_endpoint_mode",F={environmentVariableSelector:(c)=>c[e],configFileSelector:(c)=>c[i],default:S.IPv4};var W=async()=>P(await cc()||await Ic()),cc=async()=>z(t)(),Ic=async()=>{let c=await z(F)();switch(c){case S.IPv4:return A.IPv4;case S.IPv6:return A.IPv6;default:throw new Error(`Unsupported endpoint mode: ${c}. Select from ${Object.values(S)}`)}};var b=(c,I)=>{let x=300+Math.floor(Math.random()*300),T=new Date(Date.now()+x*1000);I.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(T)}.
2
+ import{Wa as z,Xa as P}from"./chunk-acy96d33.js";import"./chunk-2sshh9jw.js";import"./chunk-qsb7ddwv.js";import{kc as D}from"./chunk-t0xrvrt4.js";import{wc as _}from"./chunk-5zy36vzw.js";var m=_(D(),1);import{parse as o}from"url";var K=_(D(),1);import{Buffer as a}from"buffer";import{request as n}from"http";function u(c){return new Promise((I,x)=>{let T=n({method:"GET",...c,hostname:c.hostname?.replace(/^\[(.+)\]$/,"$1")});T.on("error",(N)=>{x(Object.assign(new K.ProviderError("Unable to connect to instance metadata service"),N)),T.destroy()}),T.on("timeout",()=>{x(new K.ProviderError("TimeoutError from instance metadata service")),T.destroy()}),T.on("response",(N)=>{let{statusCode:O=400}=N;if(O<200||300<=O)x(Object.assign(new K.ProviderError("Error response received from instance metadata service"),{statusCode:O})),T.destroy();let E=[];N.on("data",(y)=>{E.push(y)}),N.on("end",()=>{I(a.concat(E)),T.destroy()})}),T.end()})}var G=(c)=>Boolean(c)&&typeof c==="object"&&typeof c.AccessKeyId==="string"&&typeof c.SecretAccessKey==="string"&&typeof c.Token==="string"&&typeof c.Expiration==="string",Q=(c)=>({accessKeyId:c.AccessKeyId,secretAccessKey:c.SecretAccessKey,sessionToken:c.Token,expiration:new Date(c.Expiration),...c.AccountId&&{accountId:c.AccountId}});var uc=1000,Ec=0,X=({maxRetries:c=0,timeout:I=1000})=>({maxRetries:c,timeout:I});var f=(c,I)=>{let x=c();for(let T=0;T<I;T++)x=x.catch(c);return x};var v="AWS_CONTAINER_CREDENTIALS_FULL_URI",L="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",B="AWS_CONTAINER_AUTHORIZATION_TOKEN",Kc=(c={})=>{let{timeout:I,maxRetries:x}=X(c);return()=>f(async()=>{let T=await d({logger:c.logger}),N=JSON.parse(await s(I,T));if(!G(N))throw new m.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:c.logger});return Q(N)},x)},s=async(c,I)=>{if(process.env[B])I.headers={...I.headers,Authorization:process.env[B]};return(await u({...I,timeout:c})).toString()},g="169.254.170.2",l={localhost:!0,"127.0.0.1":!0},r={"http:":!0,"https:":!0},d=async({logger:c})=>{if(process.env[L])return{hostname:g,path:process.env[L]};if(process.env[v]){let I=o(process.env[v]);if(!I.hostname||!(I.hostname in l))throw new m.CredentialsProviderError(`${I.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:c});if(!I.protocol||!(I.protocol in r))throw new m.CredentialsProviderError(`${I.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:c});return{...I,port:I.port?parseInt(I.port,10):void 0}}throw new m.CredentialsProviderError(`The container metadata credential provider cannot be used unless the ${L} or ${v} environment variable is set`,{tryNextLink:!1,logger:c})};var q=_(D(),1);var U=_(D(),1);class Z extends U.CredentialsProviderError{constructor(c,I=!0){super(c,I);this.tryNextLink=I,this.name="InstanceMetadataV1FallbackError",Object.setPrototypeOf(this,Z.prototype)}}var A;(function(c){c.IPv4="http://169.254.169.254",c.IPv6="http://[fd00:ec2::254]"})(A||(A={}));var t={environmentVariableSelector:(c)=>c.AWS_EC2_METADATA_SERVICE_ENDPOINT,configFileSelector:(c)=>c.ec2_metadata_service_endpoint,default:void 0};var S;(function(c){c.IPv4="IPv4",c.IPv6="IPv6"})(S||(S={}));var e="AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE",i="ec2_metadata_service_endpoint_mode",F={environmentVariableSelector:(c)=>c[e],configFileSelector:(c)=>c[i],default:S.IPv4};var W=async()=>P(await cc()||await Ic()),cc=async()=>z(t)(),Ic=async()=>{let c=await z(F)();switch(c){case S.IPv4:return A.IPv4;case S.IPv6:return A.IPv6;default:throw new Error(`Unsupported endpoint mode: ${c}. Select from ${Object.values(S)}`)}};var b=(c,I)=>{let x=300+Math.floor(Math.random()*300),T=new Date(Date.now()+x*1000);I.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(T)}.
3
3
  For more information, please visit: https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html`);let N=c.originalExpiration??c.expiration;return{...c,...N?{originalExpiration:N}:{},expiration:T}};var V=(c,I={})=>{let x=I?.logger||console,T;return async()=>{let N;try{if(N=await c(),N.expiration&&N.expiration.getTime()<Date.now())N=b(N,x)}catch(O){if(T)x.warn("Credential renew failed: ",O),N=b(T,x);else throw O}return T=N,N}};var k="/latest/meta-data/iam/security-credentials/",Tc="/latest/api/token",H="AWS_EC2_METADATA_V1_DISABLED",R="ec2_metadata_v1_disabled",M="x-aws-ec2-metadata-token",oc=(c={})=>V(Nc(c),{logger:c.logger}),Nc=(c={})=>{let I=!1,{logger:x,profile:T}=c,{timeout:N,maxRetries:O}=X(c),E=async(y,$)=>{if(I||$.headers?.[M]==null){let w=!1,h=!1,C=await z({environmentVariableSelector:(Y)=>{let j=Y[H];if(h=!!j&&j!=="false",j===void 0)throw new q.CredentialsProviderError(`${H} not set in env, checking config file next.`,{logger:c.logger});return h},configFileSelector:(Y)=>{let j=Y[R];return w=!!j&&j!=="false",w},default:!1},{profile:T})();if(c.ec2MetadataV1Disabled||C){let Y=[];if(c.ec2MetadataV1Disabled)Y.push("credential provider initialization (runtime option ec2MetadataV1Disabled)");if(w)Y.push(`config file profile (${R})`);if(h)Y.push(`process environment variable (${H})`);throw new Z(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${Y.join(", ")}].`)}}let p=(await f(async()=>{let w;try{w=await Oc($)}catch(h){if(h.statusCode===401)I=!1;throw h}return w},y)).trim();return f(async()=>{let w;try{w=await yc(p,$,c)}catch(h){if(h.statusCode===401)I=!1;throw h}return w},y)};return async()=>{let y=await W();if(I)return x?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),E(O,{...y,timeout:N});else{let $;try{$=(await xc({...y,timeout:N})).toString()}catch(J){if(J?.statusCode===400)throw Object.assign(J,{message:"EC2 Metadata token request returned error"});else if(J.message==="TimeoutError"||[403,404,405].includes(J.statusCode))I=!0;return x?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),E(O,{...y,timeout:N})}return E(O,{...y,headers:{[M]:$},timeout:N})}}},xc=async(c)=>u({...c,path:Tc,method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),Oc=async(c)=>(await u({...c,path:k})).toString(),yc=async(c,I,x)=>{let T=JSON.parse((await u({...I,path:k+c})).toString());if(!G(T))throw new q.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:x.logger});return Q(T)};export{X as providerConfigFromInit,u as httpRequest,W as getInstanceMetadataEndpoint,oc as fromInstanceMetadata,Kc as fromContainerMetadata,A as Endpoint,L as ENV_CMDS_RELATIVE_URI,v as ENV_CMDS_FULL_URI,B as ENV_CMDS_AUTH_TOKEN,uc as DEFAULT_TIMEOUT,Ec as DEFAULT_MAX_RETRIES};
4
4
 
5
- //# debugId=33001E1FCD3EB96F64756E2164756E21
5
+ //# debugId=36BB11556DB6F0FE64756E2164756E21
@@ -18,6 +18,6 @@
18
18
  "import { getExtendedInstanceMetadataCredentials } from \"./getExtendedInstanceMetadataCredentials\";\nexport const staticStabilityProvider = (provider, options = {}) => {\n const logger = options?.logger || console;\n let pastCredentials;\n return async () => {\n let credentials;\n try {\n credentials = await provider();\n if (credentials.expiration && credentials.expiration.getTime() < Date.now()) {\n credentials = getExtendedInstanceMetadataCredentials(credentials, logger);\n }\n }\n catch (e) {\n if (pastCredentials) {\n logger.warn(\"Credential renew failed: \", e);\n credentials = getExtendedInstanceMetadataCredentials(pastCredentials, logger);\n }\n else {\n throw e;\n }\n }\n pastCredentials = credentials;\n return credentials;\n };\n};\n"
19
19
  ],
20
20
  "mappings": ";mNAAA,SACA,UAAS,MCDT,SACA,iBAAS,eACT,kBAAS,aACF,SAAS,CAAW,CAAC,EAAS,CACjC,OAAO,IAAI,QAAQ,CAAC,EAAS,IAAW,CACpC,IAAM,EAAM,EAAQ,CAChB,OAAQ,SACL,EACH,SAAU,EAAQ,UAAU,QAAQ,aAAc,IAAI,CAC1D,CAAC,EACD,EAAI,GAAG,QAAS,CAAC,IAAQ,CACrB,EAAO,OAAO,OAAO,IAAI,gBAAc,gDAAgD,EAAG,CAAG,CAAC,EAC9F,EAAI,QAAQ,EACf,EACD,EAAI,GAAG,UAAW,IAAM,CACpB,EAAO,IAAI,gBAAc,6CAA6C,CAAC,EACvE,EAAI,QAAQ,EACf,EACD,EAAI,GAAG,WAAY,CAAC,IAAQ,CACxB,IAAQ,aAAa,KAAQ,EAC7B,GAAI,EAAa,KAAO,KAAO,EAC3B,EAAO,OAAO,OAAO,IAAI,gBAAc,wDAAwD,EAAG,CAAE,YAAW,CAAC,CAAC,EACjH,EAAI,QAAQ,EAEhB,IAAM,EAAS,CAAC,EAChB,EAAI,GAAG,OAAQ,CAAC,IAAU,CACtB,EAAO,KAAK,CAAK,EACpB,EACD,EAAI,GAAG,MAAO,IAAM,CAChB,EAAQ,EAAO,OAAO,CAAM,CAAC,EAC7B,EAAI,QAAQ,EACf,EACJ,EACD,EAAI,IAAI,EACX,EClCE,IAAM,EAAoB,CAAC,IAAQ,QAAQ,CAAG,GACjD,OAAO,IAAQ,UACf,OAAO,EAAI,cAAgB,UAC3B,OAAO,EAAI,kBAAoB,UAC/B,OAAO,EAAI,QAAU,UACrB,OAAO,EAAI,aAAe,SACjB,EAAsB,CAAC,KAAW,CAC3C,YAAa,EAAM,YACnB,gBAAiB,EAAM,gBACvB,aAAc,EAAM,MACpB,WAAY,IAAI,KAAK,EAAM,UAAU,KACjC,EAAM,WAAa,CAAE,UAAW,EAAM,SAAU,CACxD,GCZO,IAAM,GAAkB,KAClB,GAAsB,EACtB,EAAyB,EAAG,aADN,EACwC,UAF5C,SAE8E,CAAE,aAAY,SAAQ,GCF5H,IAAM,EAAQ,CAAC,EAAS,IAAe,CAC1C,IAAI,EAAU,EAAQ,EACtB,QAAS,EAAI,EAAG,EAAI,EAAY,IAC5B,EAAU,EAAQ,MAAM,CAAO,EAEnC,OAAO,GJCJ,IAAM,EAAoB,qCACpB,EAAwB,yCACxB,EAAsB,oCACtB,GAAwB,CAAC,EAAO,CAAC,IAAM,CAChD,IAAQ,UAAS,cAAe,EAAuB,CAAI,EAC3D,MAAO,IAAM,EAAM,SAAY,CAC3B,IAAM,EAAiB,MAAM,EAAW,CAAE,OAAQ,EAAK,MAAO,CAAC,EACzD,EAAgB,KAAK,MAAM,MAAM,EAAmB,EAAS,CAAc,CAAC,EAClF,IAAK,EAAkB,CAAa,EAChC,MAAM,IAAI,2BAAyB,4DAA6D,CAC5F,OAAQ,EAAK,MACjB,CAAC,EAEL,OAAO,EAAoB,CAAa,GACzC,CAAU,GAEX,EAAqB,MAAO,EAAS,IAAY,CACnD,GAAI,QAAQ,IAAI,GACZ,EAAQ,QAAU,IACX,EAAQ,QACX,cAAe,QAAQ,IAAI,EAC/B,EAMJ,OAJe,MAAM,EAAY,IAC1B,EACH,SACJ,CAAC,GACa,SAAS,GAErB,EAAU,gBACV,EAAmB,CACrB,UAAW,GACX,YAAa,EACjB,EACM,EAAuB,CACzB,QAAS,GACT,SAAU,EACd,EACM,EAAa,OAAS,YAAa,CACrC,GAAI,QAAQ,IAAI,GACZ,MAAO,CACH,SAAU,EACV,KAAM,QAAQ,IAAI,EACtB,EAEJ,GAAI,QAAQ,IAAI,GAAoB,CAChC,IAAM,EAAS,EAAM,QAAQ,IAAI,EAAkB,EACnD,IAAK,EAAO,YAAc,EAAO,YAAY,GACzC,MAAM,IAAI,2BAAyB,GAAG,EAAO,8DAA+D,CACxG,YAAa,GACb,QACJ,CAAC,EAEL,IAAK,EAAO,YAAc,EAAO,YAAY,GACzC,MAAM,IAAI,2BAAyB,GAAG,EAAO,8DAA+D,CACxG,YAAa,GACb,QACJ,CAAC,EAEL,MAAO,IACA,EACH,KAAM,EAAO,KAAO,SAAS,EAAO,KAAM,EAAE,EAAI,MACpD,EAEJ,MAAM,IAAI,2BAAyB,wEACvB,QAA4B,gCAChB,CACpB,YAAa,GACb,QACJ,CAAC,GK1EL,eCDA,eACO,MAAM,UAAwC,0BAAyB,CAC1E,WAAW,CAAC,EAAS,EAAc,GAAM,CACrC,MAAM,EAAS,CAAW,EAC1B,KAAK,YAAc,EACnB,KAAK,KAAO,kCACZ,OAAO,eAAe,KAAM,EAAgC,SAAS,EAE7E,CCRO,IAAI,GACV,QAAS,CAAC,EAAU,CACjB,EAAS,KAAU,yBACnB,EAAS,KAAU,2BACpB,IAAa,EAAW,CAAC,EAAE,ECFvB,IAAM,EAA0B,CACnC,4BAA6B,CAAC,IAAQ,EAHT,kCAI7B,mBAAoB,CAAC,IAAY,EAHD,8BAIhC,QAAS,MACb,ECNO,IAAI,GACV,QAAS,CAAC,EAAc,CACrB,EAAa,KAAU,OACvB,EAAa,KAAU,SACxB,IAAiB,EAAe,CAAC,EAAE,ECH/B,IAAM,EAAyB,yCACzB,EAA4B,qCAC5B,EAA+B,CACxC,4BAA6B,CAAC,IAAQ,EAAI,GAC1C,mBAAoB,CAAC,IAAY,EAAQ,GACzC,QAAS,EAAa,IAC1B,ECDO,IAAM,EAA8B,SAAY,EAAU,MAAM,GAAsB,GAAO,MAAM,GAA0B,CAAE,EAChI,GAAwB,SAAY,EAAW,CAAuB,EAAE,EACxE,GAA4B,SAAY,CAC1C,IAAM,EAAe,MAAM,EAAW,CAA4B,EAAE,EACpE,OAAQ,QACC,EAAa,KACd,OAAO,EAAyB,UAC/B,EAAa,KACd,OAAO,EAAyB,aAEhC,MAAM,IAAI,MAAM,8BAA8B,kBAAkC,OAAO,OAAO,CAAY,GAAG,ICblH,IAAM,EAAyC,CAAC,EAAa,IAAW,CAC3E,IAAM,EAJwC,IAK1C,KAAK,MAAM,KAAK,OAAO,EAJiC,GAI0B,EAChF,EAAgB,IAAI,KAAK,KAAK,IAAI,EAAI,EAAkB,IAAI,EAClE,EAAO,KAAK,qJAC+B,IAAI,KAAK,CAAa;AAAA,oHACrC,EAC5B,IAAM,EAAqB,EAAY,oBAAsB,EAAY,WACzE,MAAO,IACA,KACC,EAAqB,CAAE,oBAAmB,EAAI,CAAC,EACnD,WAAY,CAChB,GCdG,IAAM,EAA0B,CAAC,EAAU,EAAU,CAAC,IAAM,CAC/D,IAAM,EAAS,GAAS,QAAU,QAC9B,EACJ,MAAO,UAAY,CACf,IAAI,EACJ,GAAI,CAEA,GADA,EAAc,MAAM,EAAS,EACzB,EAAY,YAAc,EAAY,WAAW,QAAQ,EAAI,KAAK,IAAI,EACtE,EAAc,EAAuC,EAAa,CAAM,EAGhF,MAAO,EAAG,CACN,GAAI,EACA,EAAO,KAAK,4BAA6B,CAAC,EAC1C,EAAc,EAAuC,EAAiB,CAAM,EAG5E,WAAM,EAId,OADA,EAAkB,EACX,IRbf,IAAM,EAAY,8CACZ,GAAkB,oBAClB,EAA+B,+BAC/B,EAAuC,2BACvC,EAA2B,2BACpB,GAAuB,CAAC,EAAO,CAAC,IAAM,EAAwB,GAA4B,CAAI,EAAG,CAAE,OAAQ,EAAK,MAAO,CAAC,EAC/H,GAA8B,CAAC,EAAO,CAAC,IAAM,CAC/C,IAAI,EAAoB,IAChB,SAAQ,WAAY,GACpB,UAAS,cAAe,EAAuB,CAAI,EACrD,EAAiB,MAAO,EAAY,IAAY,CAElD,GADyB,GAAqB,EAAQ,UAAU,IAA6B,KACvE,CAClB,IAAI,EAA6B,GAC7B,EAAgC,GAC9B,EAAc,MAAM,EAAW,CACjC,4BAA6B,CAAC,IAAQ,CAClC,IAAM,EAAW,EAAI,GAErB,GADA,IAAkC,GAAY,IAAa,QACvD,IAAa,OACb,MAAM,IAAI,2BAAyB,GAAG,+CAA2E,CAAE,OAAQ,EAAK,MAAO,CAAC,EAE5I,OAAO,GAEX,mBAAoB,CAAC,IAAY,CAC7B,IAAM,EAAe,EAAQ,GAE7B,OADA,IAA+B,GAAgB,IAAiB,QACzD,GAEX,QAAS,EACb,EAAG,CACC,SACJ,CAAC,EAAE,EACH,GAAI,EAAK,uBAAyB,EAAa,CAC3C,IAAM,EAAS,CAAC,EAChB,GAAI,EAAK,sBACL,EAAO,KAAK,2EAA2E,EAC3F,GAAI,EACA,EAAO,KAAK,wBAAwB,IAAuC,EAC/E,GAAI,EACA,EAAO,KAAK,iCAAiC,IAA+B,EAChF,MAAM,IAAI,EAAgC,6FAA6F,EAAO,KAAK,IAAI,KAAK,GAGpK,IAAM,GAAe,MAAM,EAAM,SAAY,CACzC,IAAI,EACJ,GAAI,CACA,EAAU,MAAM,GAAW,CAAO,EAEtC,MAAO,EAAK,CACR,GAAI,EAAI,aAAe,IACnB,EAAoB,GAExB,MAAM,EAEV,OAAO,GACR,CAAU,GAAG,KAAK,EACrB,OAAO,EAAM,SAAY,CACrB,IAAI,EACJ,GAAI,CACA,EAAQ,MAAM,GAA0B,EAAa,EAAS,CAAI,EAEtE,MAAO,EAAK,CACR,GAAI,EAAI,aAAe,IACnB,EAAoB,GAExB,MAAM,EAEV,OAAO,GACR,CAAU,GAEjB,MAAO,UAAY,CACf,IAAM,EAAW,MAAM,EAA4B,EACnD,GAAI,EAEA,OADA,GAAQ,MAAM,4BAA6B,oCAAoC,EACxE,EAAe,EAAY,IAAK,EAAU,SAAQ,CAAC,EAEzD,KACD,IAAI,EACJ,GAAI,CACA,GAAS,MAAM,GAAiB,IAAK,EAAU,SAAQ,CAAC,GAAG,SAAS,EAExE,MAAO,EAAO,CACV,GAAI,GAAO,aAAe,IACtB,MAAM,OAAO,OAAO,EAAO,CACvB,QAAS,2CACb,CAAC,EAEA,QAAI,EAAM,UAAY,gBAAkB,CAAC,IAAK,IAAK,GAAG,EAAE,SAAS,EAAM,UAAU,EAClF,EAAoB,GAGxB,OADA,GAAQ,MAAM,4BAA6B,6BAA6B,EACjE,EAAe,EAAY,IAAK,EAAU,SAAQ,CAAC,EAE9D,OAAO,EAAe,EAAY,IAC3B,EACH,QAAS,EACJ,GAA2B,CAChC,EACA,SACJ,CAAC,KAIP,GAAmB,MAAO,IAAY,EAAY,IACjD,EACH,KAAM,GACN,OAAQ,MACR,QAAS,CACL,uCAAwC,OAC5C,CACJ,CAAC,EACK,GAAa,MAAO,KAAa,MAAM,EAAY,IAAK,EAAS,KAAM,CAAU,CAAC,GAAG,SAAS,EAC9F,GAA4B,MAAO,EAAS,EAAS,IAAS,CAChE,IAAM,EAAsB,KAAK,OAAO,MAAM,EAAY,IACnD,EACH,KAAM,EAAY,CACtB,CAAC,GAAG,SAAS,CAAC,EACd,IAAK,EAAkB,CAAmB,EACtC,MAAM,IAAI,2BAAyB,4DAA6D,CAC5F,OAAQ,EAAK,MACjB,CAAC,EAEL,OAAO,EAAoB,CAAmB",
21
- "debugId": "33001E1FCD3EB96F64756E2164756E21",
21
+ "debugId": "36BB11556DB6F0FE64756E2164756E21",
22
22
  "names": []
23
23
  }
@@ -1,5 +1,5 @@
1
1
  // @bun
2
- import{cc as I,dc as z,ec as R,hc as v,ic as A}from"./chunk-wf991m48.js";import{jc as oe}from"./chunk-htxxjgd5.js";import"./chunk-r13m0b3y.js";import{lc as u}from"./chunk-4gfrxz19.js";import{wc as S,yc as D}from"./chunk-5zy36vzw.js";var T=S(u(),1);var H=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var F=S(oe(),1);var x=S(u(),1);var U=300000,h="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var q=async(e,s={})=>{let{SSOOIDCClient:o}=await import("./chunk-57z3h6hy.js");return new o(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:s.clientConfig?.logger??s.parentClientConfig?.logger}))};var W=async(e,s,o={})=>{let{CreateTokenCommand:i}=await import("./chunk-57z3h6hy.js");return(await q(s,o)).send(new i({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var j=S(u(),1);var $=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new j.TokenProviderError(`Token is expired. ${h}`,!1)};var X=S(u(),1);var g=(e,s,o=!1)=>{if(typeof s==="undefined")throw new X.TokenProviderError(`Value not present for '${e}' in SSO Token${o?". Cannot refresh":""}. ${h}`,!1)};import{promises as Z}from"fs";var{writeFile:ee}=Z,J=(e,s)=>{let o=z(e),i=JSON.stringify(s,null,2);return ee(o,i)};var V=new Date(0),Y=(e={})=>async({callerClientConfig:s}={})=>{let o={...e,parentClientConfig:{...s,...e.parentClientConfig}};o.logger?.debug("@aws-sdk/token-providers - fromSso");let i=await A(o),r=I({profile:o.profile??s?.profile}),f=i[r];if(!f)throw new x.TokenProviderError(`Profile '${r}' could not be found in shared credentials file.`,!1);else if(!f.sso_session)throw new x.TokenProviderError(`Profile '${r}' is missing required property 'sso_session'.`);let l=f.sso_session,a=(await v(o))[l];if(!a)throw new x.TokenProviderError(`Sso session '${l}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!a[n])throw new x.TokenProviderError(`Sso session '${l}' is missing required property '${n}'.`,!1);let{sso_start_url:w,sso_region:t}=a,c;try{c=await R(l)}catch(n){throw new x.TokenProviderError(`The SSO session token associated with profile=${r} was not found or is invalid. ${h}`,!1)}g("accessToken",c.accessToken),g("expiresAt",c.expiresAt);let{accessToken:E,expiresAt:O}=c,p={token:E,expiration:new Date(O)};if(p.expiration.getTime()-Date.now()>U)return p;if(Date.now()-V.getTime()<30000)return $(p),p;g("clientId",c.clientId,!0),g("clientSecret",c.clientSecret,!0),g("refreshToken",c.refreshToken,!0);try{V.setTime(Date.now());let n=await W(c,t,o);g("accessToken",n.accessToken),g("expiresIn",n.expiresIn);let _=new Date(Date.now()+n.expiresIn*1000);try{await J(l,{...c,accessToken:n.accessToken,expiresAt:_.toISOString(),refreshToken:n.refreshToken})}catch(m){}return{token:n.accessToken,expiration:_}}catch(n){return $(p),p}};var k=S(u(),1);var N=!1,L=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:o,ssoRegion:i,ssoRoleName:r,ssoClient:f,clientConfig:l,parentClientConfig:y,profile:a,logger:w})=>{let t,c="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let d=await Y({profile:a})();t={accessToken:d.token,expiresAt:new Date(d.expiration).toISOString()}}catch(d){throw new k.CredentialsProviderError(d.message,{tryNextLink:N,logger:w})}else try{t=await R(e)}catch(d){throw new k.CredentialsProviderError("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:N,logger:w})}if(new Date(t.expiresAt).getTime()-Date.now()<=0)throw new k.CredentialsProviderError("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:N,logger:w});let{accessToken:E}=t,{SSOClient:O,GetRoleCredentialsCommand:p}=await import("./chunk-hq7crmd4.js"),n=f||new O(Object.assign({},l??{},{logger:l?.logger??y?.logger,region:l?.region??i})),_;try{_=await n.send(new p({accountId:o,roleName:r,accessToken:E}))}catch(d){throw new k.CredentialsProviderError(d,{tryNextLink:N,logger:w})}let{roleCredentials:{accessKeyId:m,secretAccessKey:C,sessionToken:M,expiration:G,credentialScope:K,accountId:b}={}}=_;if(!m||!C||!M||!G)throw new k.CredentialsProviderError("SSO returns an invalid temporary credential.",{tryNextLink:N,logger:w});let P={accessKeyId:m,secretAccessKey:C,sessionToken:M,expiration:new Date(G),...K&&{credentialScope:K},...b&&{accountId:b}};if(s)F.setCredentialFeature(P,"CREDENTIALS_SSO","s");else F.setCredentialFeature(P,"CREDENTIALS_SSO_LEGACY","u");return P};var B=S(u(),1),Q=(e,s)=>{let{sso_start_url:o,sso_account_id:i,sso_region:r,sso_role_name:f}=e;if(!o||!i||!r||!f)throw new B.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
2
+ import{$a as R,Za as I,_a as z,cb as v,db as A}from"./chunk-2sshh9jw.js";import{ic as oe}from"./chunk-e4htsnc2.js";import"./chunk-qsb7ddwv.js";import{kc as u}from"./chunk-t0xrvrt4.js";import{wc as S,yc as D}from"./chunk-5zy36vzw.js";var T=S(u(),1);var H=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var F=S(oe(),1);var x=S(u(),1);var U=300000,h="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var q=async(e,s={})=>{let{SSOOIDCClient:o}=await import("./chunk-b38shk5c.js");return new o(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:s.clientConfig?.logger??s.parentClientConfig?.logger}))};var W=async(e,s,o={})=>{let{CreateTokenCommand:i}=await import("./chunk-b38shk5c.js");return(await q(s,o)).send(new i({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var j=S(u(),1);var $=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new j.TokenProviderError(`Token is expired. ${h}`,!1)};var X=S(u(),1);var g=(e,s,o=!1)=>{if(typeof s==="undefined")throw new X.TokenProviderError(`Value not present for '${e}' in SSO Token${o?". Cannot refresh":""}. ${h}`,!1)};import{promises as Z}from"fs";var{writeFile:ee}=Z,J=(e,s)=>{let o=z(e),i=JSON.stringify(s,null,2);return ee(o,i)};var V=new Date(0),Y=(e={})=>async({callerClientConfig:s}={})=>{let o={...e,parentClientConfig:{...s,...e.parentClientConfig}};o.logger?.debug("@aws-sdk/token-providers - fromSso");let i=await A(o),r=I({profile:o.profile??s?.profile}),f=i[r];if(!f)throw new x.TokenProviderError(`Profile '${r}' could not be found in shared credentials file.`,!1);else if(!f.sso_session)throw new x.TokenProviderError(`Profile '${r}' is missing required property 'sso_session'.`);let l=f.sso_session,a=(await v(o))[l];if(!a)throw new x.TokenProviderError(`Sso session '${l}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!a[n])throw new x.TokenProviderError(`Sso session '${l}' is missing required property '${n}'.`,!1);let{sso_start_url:w,sso_region:t}=a,c;try{c=await R(l)}catch(n){throw new x.TokenProviderError(`The SSO session token associated with profile=${r} was not found or is invalid. ${h}`,!1)}g("accessToken",c.accessToken),g("expiresAt",c.expiresAt);let{accessToken:E,expiresAt:O}=c,p={token:E,expiration:new Date(O)};if(p.expiration.getTime()-Date.now()>U)return p;if(Date.now()-V.getTime()<30000)return $(p),p;g("clientId",c.clientId,!0),g("clientSecret",c.clientSecret,!0),g("refreshToken",c.refreshToken,!0);try{V.setTime(Date.now());let n=await W(c,t,o);g("accessToken",n.accessToken),g("expiresIn",n.expiresIn);let _=new Date(Date.now()+n.expiresIn*1000);try{await J(l,{...c,accessToken:n.accessToken,expiresAt:_.toISOString(),refreshToken:n.refreshToken})}catch(m){}return{token:n.accessToken,expiration:_}}catch(n){return $(p),p}};var k=S(u(),1);var N=!1,L=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:o,ssoRegion:i,ssoRoleName:r,ssoClient:f,clientConfig:l,parentClientConfig:y,profile:a,logger:w})=>{let t,c="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let d=await Y({profile:a})();t={accessToken:d.token,expiresAt:new Date(d.expiration).toISOString()}}catch(d){throw new k.CredentialsProviderError(d.message,{tryNextLink:N,logger:w})}else try{t=await R(e)}catch(d){throw new k.CredentialsProviderError("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:N,logger:w})}if(new Date(t.expiresAt).getTime()-Date.now()<=0)throw new k.CredentialsProviderError("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:N,logger:w});let{accessToken:E}=t,{SSOClient:O,GetRoleCredentialsCommand:p}=await import("./chunk-xehvtwhb.js"),n=f||new O(Object.assign({},l??{},{logger:l?.logger??y?.logger,region:l?.region??i})),_;try{_=await n.send(new p({accountId:o,roleName:r,accessToken:E}))}catch(d){throw new k.CredentialsProviderError(d,{tryNextLink:N,logger:w})}let{roleCredentials:{accessKeyId:m,secretAccessKey:C,sessionToken:M,expiration:G,credentialScope:K,accountId:b}={}}=_;if(!m||!C||!M||!G)throw new k.CredentialsProviderError("SSO returns an invalid temporary credential.",{tryNextLink:N,logger:w});let P={accessKeyId:m,secretAccessKey:C,sessionToken:M,expiration:new Date(G),...K&&{credentialScope:K},...b&&{accountId:b}};if(s)F.setCredentialFeature(P,"CREDENTIALS_SSO","s");else F.setCredentialFeature(P,"CREDENTIALS_SSO_LEGACY","u");return P};var B=S(u(),1),Q=(e,s)=>{let{sso_start_url:o,sso_account_id:i,sso_region:r,sso_role_name:f}=e;if(!o||!i||!r||!f)throw new B.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
3
3
  Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e};var Re=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:o,ssoAccountId:i,ssoRegion:r,ssoRoleName:f,ssoSession:l}=e,{ssoClient:y}=e,a=I({profile:e.profile??s?.profile});if(!o&&!i&&!r&&!f&&!l){let t=(await A(e))[a];if(!t)throw new T.CredentialsProviderError(`Profile ${a} was not found.`,{logger:e.logger});if(!H(t))throw new T.CredentialsProviderError(`Profile ${a} is not configured with SSO credentials.`,{logger:e.logger});if(t?.sso_session){let m=(await v(e))[t.sso_session],C=` configurations in profile ${a} and sso-session ${t.sso_session}`;if(r&&r!==m.sso_region)throw new T.CredentialsProviderError("Conflicting SSO region"+C,{tryNextLink:!1,logger:e.logger});if(o&&o!==m.sso_start_url)throw new T.CredentialsProviderError("Conflicting SSO start_url"+C,{tryNextLink:!1,logger:e.logger});t.sso_region=m.sso_region,t.sso_start_url=m.sso_start_url}let{sso_start_url:c,sso_account_id:E,sso_region:O,sso_role_name:p,sso_session:n}=Q(t,e.logger);return L({ssoStartUrl:c,ssoSession:n,ssoAccountId:E,ssoRegion:O,ssoRoleName:p,ssoClient:y,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,profile:a})}else if(!o||!i||!r||!f)throw new T.CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return L({ssoStartUrl:o,ssoSession:l,ssoAccountId:i,ssoRegion:r,ssoRoleName:f,ssoClient:y,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,profile:a})};export{Q as validateSsoProfile,H as isSsoProfile,Re as fromSSO};
4
4
 
5
- //# debugId=175D9AA434073D2A64756E2164756E21
5
+ //# debugId=9A4102BD9B39345C64756E2164756E21
@@ -15,6 +15,6 @@
15
15
  "import { CredentialsProviderError } from \"@smithy/property-provider\";\nexport const validateSsoProfile = (profile, logger) => {\n const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n throw new CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", ` +\n `\"sso_region\", \"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\", \")}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, { tryNextLink: false, logger });\n }\n return profile;\n};\n"
16
16
  ],
17
17
  "mappings": ";iQAAA,SCAO,FAAM,JAAe,LAAC,IAAQ,IAChC,OAAO,EAAI,gBAAkB,UAC1B,OAAO,EAAI,iBAAmB,UAC9B,OAAO,EAAI,cAAgB,UAC3B,OAAO,EAAI,aAAe,UAC1B,OAAO,EAAI,gBAAkB,UCLrC,gBCAA,eCAO,IAAM,EAAmB,OACnB,EAAkB,kFCDxB,IAAM,EAAmB,MAAO,EAAW,EAAO,CAAC,IAAM,CAC5D,IAAQ,iBAAkB,KAAa,+BAKvC,OAJsB,IAAI,EAAc,OAAO,OAAO,CAAC,EAAG,EAAK,cAAgB,CAAC,EAAG,CAC/E,OAAQ,GAAa,EAAK,cAAc,OACxC,OAAQ,EAAK,cAAc,QAAU,EAAK,oBAAoB,MAClE,CAAC,CAAC,GCJC,IAAM,EAAqB,MAAO,EAAU,EAAW,EAAO,CAAC,IAAM,CACxE,IAAQ,sBAAuB,KAAa,+BAE5C,OADsB,MAAM,EAAiB,EAAW,CAAI,GACvC,KAAK,IAAI,EAAmB,CAC7C,SAAU,EAAS,SACnB,aAAc,EAAS,aACvB,aAAc,EAAS,aACvB,UAAW,eACf,CAAC,CAAC,GCTN,eAEO,IAAM,EAAsB,CAAC,IAAU,CAC1C,GAAI,EAAM,YAAc,EAAM,WAAW,QAAQ,EAAI,KAAK,IAAI,EAC1D,MAAM,IAAI,qBAAmB,qBAAqB,IAAmB,EAAK,GCJlF,eAEO,IAAM,EAAmB,CAAC,EAAK,EAAO,EAAa,KAAU,CAChE,GAAI,OAAO,IAAU,YACjB,MAAM,IAAI,qBAAmB,0BAA0B,kBAAoB,EAAa,mBAAqB,OAAO,IAAmB,EAAK,GCHpJ,mBAAS,WACT,IAAQ,cAAc,EACT,EAAsB,CAAC,EAAI,IAAa,CACjD,IAAM,EAAgB,EAAoB,CAAE,EACtC,EAAc,KAAK,UAAU,EAAU,KAAM,CAAC,EACpD,OAAO,GAAU,EAAe,CAAW,GNC/C,IAAM,EAAyB,IAAI,KAAK,CAAC,EAC5B,EAAU,CAAC,EAAQ,CAAC,IAAM,OAAS,sBAAuB,CAAC,IAAM,CAC1E,IAAM,EAAO,IACN,EACH,mBAAoB,IACb,KACA,EAAM,kBACb,CACJ,EACA,EAAK,QAAQ,MAAM,oCAAoC,EACvD,IAAM,EAAW,MAAM,EAAgB,CAAI,EACrC,EAAc,EAAe,CAC/B,QAAS,EAAK,SAAW,GAAoB,OACjD,CAAC,EACK,EAAU,EAAS,GACzB,IAAK,EACD,MAAM,IAAI,qBAAmB,YAAY,oDAA+D,EAAK,EAE5G,SAAK,EAAQ,YACd,MAAM,IAAI,qBAAmB,YAAY,gDAA0D,EAEvG,IAAM,EAAiB,EAAQ,YAEzB,GADc,MAAM,EAAmB,CAAI,GAClB,GAC/B,IAAK,EACD,MAAM,IAAI,qBAAmB,gBAAgB,oDAAkE,EAAK,EAExH,QAAW,IAAyB,CAAC,gBAAiB,YAAY,EAC9D,IAAK,EAAW,GACZ,MAAM,IAAI,qBAAmB,gBAAgB,oCAAiD,MAA2B,EAAK,EAGtI,IAA+B,cAAzB,EACuB,WAAvB,GAAY,EACd,EACJ,GAAI,CACA,EAAW,MAAM,EAAoB,CAAc,EAEvD,MAAO,EAAG,CACN,MAAM,IAAI,qBAAmB,iDAAiD,kCAA4C,IAAmB,EAAK,EAEtJ,EAAiB,cAAe,EAAS,WAAW,EACpD,EAAiB,YAAa,EAAS,SAAS,EAChD,IAAQ,cAAa,aAAc,EAC7B,EAAgB,CAAE,MAAO,EAAa,WAAY,IAAI,KAAK,CAAS,CAAE,EAC5E,GAAI,EAAc,WAAW,QAAQ,EAAI,KAAK,IAAI,EAAI,EAClD,OAAO,EAEX,GAAI,KAAK,IAAI,EAAI,EAAuB,QAAQ,EAAI,MAEhD,OADA,EAAoB,CAAa,EAC1B,EAEX,EAAiB,WAAY,EAAS,SAAU,EAAI,EACpD,EAAiB,eAAgB,EAAS,aAAc,EAAI,EAC5D,EAAiB,eAAgB,EAAS,aAAc,EAAI,EAC5D,GAAI,CACA,EAAuB,QAAQ,KAAK,IAAI,CAAC,EACzC,IAAM,EAAkB,MAAM,EAAmB,EAAU,EAAW,CAAI,EAC1E,EAAiB,cAAe,EAAgB,WAAW,EAC3D,EAAiB,YAAa,EAAgB,SAAS,EACvD,IAAM,EAAqB,IAAI,KAAK,KAAK,IAAI,EAAI,EAAgB,UAAY,IAAI,EACjF,GAAI,CACA,MAAM,EAAoB,EAAgB,IACnC,EACH,YAAa,EAAgB,YAC7B,UAAW,EAAmB,YAAY,EAC1C,aAAc,EAAgB,YAClC,CAAC,EAEL,MAAO,EAAO,EAEd,MAAO,CACH,MAAO,EAAgB,YACvB,WAAY,CAChB,EAEJ,MAAO,EAAO,CAEV,OADA,EAAoB,CAAa,EAC1B,IDnFf,eAEA,IAAM,EAA+B,GACxB,EAAwB,OAAS,cAAa,aAAY,eAAc,YAAW,cAAa,YAAW,eAAc,qBAAoB,UAAS,YAAc,CAC7K,IAAI,EACE,EAAiB,gFACvB,GAAI,EACA,GAAI,CACA,IAAM,EAAS,MAAM,EAAoB,CAAE,SAAQ,CAAC,EAAE,EACtD,EAAQ,CACJ,YAAa,EAAO,MACpB,UAAW,IAAI,KAAK,EAAO,UAAU,EAAE,YAAY,CACvD,EAEJ,MAAO,EAAG,CACN,MAAM,IAAI,2BAAyB,EAAE,QAAS,CAC1C,YAAa,EACb,QACJ,CAAC,EAIL,QAAI,CACA,EAAQ,MAAM,EAAoB,CAAW,EAEjD,MAAO,EAAG,CACN,MAAM,IAAI,2BAAyB,yIAA8E,CAC7G,YAAa,EACb,QACJ,CAAC,EAGT,GAAI,IAAI,KAAK,EAAM,SAAS,EAAE,QAAQ,EAAI,KAAK,IAAI,GAAK,EACpD,MAAM,IAAI,2BAAyB,0IAA+E,CAC9G,YAAa,EACb,QACJ,CAAC,EAEL,IAAQ,eAAgB,GAChB,YAAW,6BAA8B,KAAa,+BACxD,EAAM,GACR,IAAI,EAAU,OAAO,OAAO,CAAC,EAAG,GAAgB,CAAC,EAAG,CAChD,OAAQ,GAAc,QAAU,GAAoB,OACpD,OAAQ,GAAc,QAAU,CACpC,CAAC,CAAC,EACF,EACJ,GAAI,CACA,EAAU,MAAM,EAAI,KAAK,IAAI,EAA0B,CACnD,UAAW,EACX,SAAU,EACV,aACJ,CAAC,CAAC,EAEN,MAAO,EAAG,CACN,MAAM,IAAI,2BAAyB,EAAG,CAClC,YAAa,EACb,QACJ,CAAC,EAEL,IAAQ,iBAAmB,cAAa,kBAAiB,eAAc,aAAY,kBAAiB,aAAc,CAAC,GAAO,EAC1H,IAAK,IAAgB,IAAoB,IAAiB,EACtD,MAAM,IAAI,2BAAyB,+CAAgD,CAC/E,YAAa,EACb,QACJ,CAAC,EAEL,IAAM,EAAc,CAChB,cACA,kBACA,eACA,WAAY,IAAI,KAAK,CAAU,KAC3B,GAAmB,CAAE,iBAAgB,KACrC,GAAa,CAAE,WAAU,CACjC,EACA,GAAI,EACA,uBAAqB,EAAa,kBAAmB,GAAG,EAGxD,4BAAqB,EAAa,yBAA0B,GAAG,EAEnE,OAAO,GQlFX,eACa,EAAqB,CAAC,EAAS,IAAW,CACnD,IAAQ,gBAAe,iBAAgB,aAAY,iBAAkB,EACrE,IAAK,IAAkB,IAAmB,IAAe,EACrD,MAAM,IAAI,2BAAyB,iJACwB,OAAO,KAAK,CAAO,EAAE,KAAK,IAAI;AAAA,oFAAyF,CAAE,YAAa,GAAO,QAAO,CAAC,EAEpN,OAAO,GVFJ,IAAM,GAAU,CAAC,EAAO,CAAC,IAAM,OAAS,sBAAuB,CAAC,IAAM,CACzE,EAAK,QAAQ,MAAM,4CAA4C,EAC/D,IAAQ,cAAa,eAAc,YAAW,cAAa,cAAe,GAClE,aAAc,EAChB,EAAc,EAAe,CAC/B,QAAS,EAAK,SAAW,GAAoB,OACjD,CAAC,EACD,IAAK,IAAgB,IAAiB,IAAc,IAAgB,EAAY,CAE5E,IAAM,GADW,MAAM,EAAgB,CAAI,GAClB,GACzB,IAAK,EACD,MAAM,IAAI,2BAAyB,WAAW,mBAA8B,CAAE,OAAQ,EAAK,MAAO,CAAC,EAEvG,IAAK,EAAa,CAAO,EACrB,MAAM,IAAI,2BAAyB,WAAW,4CAAuD,CACjG,OAAQ,EAAK,MACjB,CAAC,EAEL,GAAI,GAAS,YAAa,CAEtB,IAAM,GADc,MAAM,EAAmB,CAAI,GACrB,EAAQ,aAC9B,EAAc,8BAA8B,qBAA+B,EAAQ,cACzF,GAAI,GAAa,IAAc,EAAQ,WACnC,MAAM,IAAI,2BAAyB,yBAA2B,EAAa,CACvE,YAAa,GACb,OAAQ,EAAK,MACjB,CAAC,EAEL,GAAI,GAAe,IAAgB,EAAQ,cACvC,MAAM,IAAI,2BAAyB,4BAA8B,EAAa,CAC1E,YAAa,GACb,OAAQ,EAAK,MACjB,CAAC,EAEL,EAAQ,WAAa,EAAQ,WAC7B,EAAQ,cAAgB,EAAQ,cAEpC,IAAQ,gBAAe,iBAAgB,aAAY,gBAAe,eAAgB,EAAmB,EAAS,EAAK,MAAM,EACzH,OAAO,EAAsB,CACzB,YAAa,EACb,WAAY,EACZ,aAAc,EACd,UAAW,EACX,YAAa,EACb,UAAW,EACX,aAAc,EAAK,aACnB,mBAAoB,EAAK,mBACzB,QAAS,CACb,CAAC,EAEA,SAAK,IAAgB,IAAiB,IAAc,EACrD,MAAM,IAAI,2BAAyB,+HAC8B,CAAE,YAAa,GAAO,OAAQ,EAAK,MAAO,CAAC,EAG5G,YAAO,EAAsB,CACzB,cACA,aACA,eACA,YACA,cACA,YACA,aAAc,EAAK,aACnB,mBAAoB,EAAK,mBACzB,QAAS,CACb,CAAC",
18
- "debugId": "175D9AA434073D2A64756E2164756E21",
18
+ "debugId": "9A4102BD9B39345C64756E2164756E21",
19
19
  "names": []
20
20
  }