gemi 0.16.2 → 0.16.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/app/index.js +2 -2
- package/dist/app/index.js.map +1 -1
- package/dist/broadcasting/index.js +1 -1
- package/dist/{chunk-vas2h4rh.js → chunk-0zbw2v8k.js} +3 -3
- package/dist/{chunk-vas2h4rh.js.map → chunk-0zbw2v8k.js.map} +1 -1
- package/dist/{chunk-2e5r9zc8.js → chunk-2wsmhvhf.js} +2 -2
- package/dist/{chunk-2e5r9zc8.js.map → chunk-2wsmhvhf.js.map} +1 -1
- package/dist/chunk-3exng5ce.js +27 -0
- package/dist/{chunk-bq3ssfcb.js.map → chunk-3exng5ce.js.map} +4 -3
- package/dist/{chunk-eyw5m86d.js → chunk-3tn8zz3h.js} +2 -2
- package/dist/{chunk-eyw5m86d.js.map → chunk-3tn8zz3h.js.map} +1 -1
- package/dist/{chunk-4kkyjz2j.js → chunk-47xbr7nj.js} +3 -3
- package/dist/{chunk-4kkyjz2j.js.map → chunk-47xbr7nj.js.map} +1 -1
- package/dist/chunk-4dws72jb.js +4 -0
- package/dist/{chunk-a30zkbbx.js.map → chunk-4dws72jb.js.map} +5 -5
- package/dist/chunk-4hrrf55a.js +4 -0
- package/dist/{chunk-d5bjn9jq.js.map → chunk-4hrrf55a.js.map} +2 -2
- package/dist/chunk-4p9rzgdq.js +5 -0
- package/dist/{chunk-w19m1fcb.js.map → chunk-4p9rzgdq.js.map} +6 -6
- package/dist/chunk-5pmgwned.js +4 -0
- package/dist/{chunk-yjwabzsb.js.map → chunk-5pmgwned.js.map} +2 -2
- package/dist/{chunk-3exa3rf7.js → chunk-77hyr51s.js} +3 -3
- package/dist/{chunk-3exa3rf7.js.map → chunk-77hyr51s.js.map} +4 -4
- package/dist/{chunk-rfs3fhhw.js → chunk-8ctxajfc.js} +2 -2
- package/dist/{chunk-rfs3fhhw.js.map → chunk-8ctxajfc.js.map} +1 -1
- package/dist/chunk-9czphfs1.js +4 -0
- package/dist/{chunk-k5h445f9.js.map → chunk-9czphfs1.js.map} +2 -2
- package/dist/{chunk-8hz7nqa6.js → chunk-c3s0zqhy.js} +2 -2
- package/dist/{chunk-8hz7nqa6.js.map → chunk-c3s0zqhy.js.map} +1 -1
- package/dist/chunk-catb1gz8.js +4 -0
- package/dist/{chunk-hakywsfq.js.map → chunk-catb1gz8.js.map} +1 -1
- package/dist/{chunk-arayp1w0.js → chunk-catqfhfe.js} +2 -2
- package/dist/{chunk-arayp1w0.js.map → chunk-catqfhfe.js.map} +1 -1
- package/dist/{chunk-m65hegz2.js → chunk-e638b1fh.js} +4 -4
- package/dist/{chunk-m65hegz2.js.map → chunk-e638b1fh.js.map} +4 -3
- package/dist/{chunk-5zy36vzw.js → chunk-ebcx322z.js} +2 -2
- package/dist/{chunk-5zy36vzw.js.map → chunk-ebcx322z.js.map} +1 -1
- package/dist/{chunk-5saeq23h.js → chunk-egd5q5dg.js} +3 -3
- package/dist/{chunk-5saeq23h.js.map → chunk-egd5q5dg.js.map} +1 -1
- package/dist/chunk-fbr0hg21.js +9 -0
- package/dist/{chunk-662r0ncr.js.map → chunk-fbr0hg21.js.map} +4 -3
- package/dist/{chunk-ac8m7p53.js → chunk-g1pmzbbw.js} +1 -1
- package/dist/{chunk-v6kcbyg4.js → chunk-hj1wc760.js} +3 -3
- package/dist/{chunk-v6kcbyg4.js.map → chunk-hj1wc760.js.map} +1 -1
- package/dist/chunk-jk9pvh2e.js +5 -0
- package/dist/{chunk-fhx0vt7d.js.map → chunk-jk9pvh2e.js.map} +2 -2
- package/dist/{chunk-awqqsf8p.js → chunk-kbm8egme.js} +3 -3
- package/dist/{chunk-awqqsf8p.js.map → chunk-kbm8egme.js.map} +1 -1
- package/dist/{chunk-e4t6twrj.js → chunk-kbmhhmg4.js} +2 -2
- package/dist/{chunk-e4t6twrj.js.map → chunk-kbmhhmg4.js.map} +1 -1
- package/dist/chunk-m7nrq5eq.js +4 -0
- package/dist/{chunk-zv5ztmxm.js.map → chunk-m7nrq5eq.js.map} +2 -2
- package/dist/{chunk-yaeec5ch.js → chunk-mzcp229c.js} +2 -2
- package/dist/{chunk-yaeec5ch.js.map → chunk-mzcp229c.js.map} +1 -1
- package/dist/chunk-qh3wkfks.js +5 -0
- package/dist/{chunk-pdxpkd11.js.map → chunk-qh3wkfks.js.map} +5 -5
- package/dist/chunk-recx8xrk.js +8 -0
- package/dist/{chunk-xsmhw13v.js.map → chunk-recx8xrk.js.map} +2 -2
- package/dist/chunk-rfewd8qe.js +4 -0
- package/dist/{chunk-dgsssga5.js.map → chunk-rfewd8qe.js.map} +2 -2
- package/dist/chunk-tbtr71sn.js +4 -0
- package/dist/{chunk-dyq4bf49.js.map → chunk-tbtr71sn.js.map} +1 -1
- package/dist/chunk-w6rk9cf3.js +4 -0
- package/dist/{chunk-tzznavpf.js.map → chunk-w6rk9cf3.js.map} +4 -4
- package/dist/{chunk-5g8wefgj.js → chunk-wnq14j8v.js} +2 -2
- package/dist/{chunk-5g8wefgj.js.map → chunk-wnq14j8v.js.map} +1 -1
- package/dist/chunk-xn8m1vjf.js +3 -0
- package/dist/chunk-xn8m1vjf.js.map +15 -0
- package/dist/client/Mutation.d.ts +1 -1
- package/dist/client/Mutation.d.ts.map +1 -1
- package/dist/client/index.d.ts +1 -1
- package/dist/client/index.d.ts.map +1 -1
- package/dist/client/index.js +7 -0
- package/dist/client/index.js.map +1 -1
- package/dist/email/index.js +1 -1
- package/dist/facades/index.js +3 -3
- package/dist/facades/index.js.map +1 -1
- package/dist/http/index.js +2 -2
- package/dist/http/index.js.map +3 -3
- package/dist/i18n/index.js +1 -1
- package/dist/kernel/index.js +2 -2
- package/dist/kernel/index.js.map +1 -1
- package/dist/server/index.js +2 -2
- package/dist/server/index.js.map +1 -1
- package/dist/services/index.js +31 -31
- package/dist/services/index.js.map +4 -4
- package/package.json +1 -1
- package/dist/chunk-662r0ncr.js +0 -9
- package/dist/chunk-a30zkbbx.js +0 -4
- package/dist/chunk-bq3ssfcb.js +0 -27
- package/dist/chunk-d5bjn9jq.js +0 -4
- package/dist/chunk-dgsssga5.js +0 -4
- package/dist/chunk-dyq4bf49.js +0 -4
- package/dist/chunk-fhx0vt7d.js +0 -5
- package/dist/chunk-hakywsfq.js +0 -4
- package/dist/chunk-k5h445f9.js +0 -4
- package/dist/chunk-pdxpkd11.js +0 -5
- package/dist/chunk-qj8d5qgn.js +0 -4
- package/dist/chunk-qj8d5qgn.js.map +0 -10
- package/dist/chunk-tzznavpf.js +0 -4
- package/dist/chunk-w19m1fcb.js +0 -5
- package/dist/chunk-xsmhw13v.js +0 -8
- package/dist/chunk-yjwabzsb.js +0 -4
- package/dist/chunk-zv5ztmxm.js +0 -4
- /package/dist/{chunk-ac8m7p53.js.map → chunk-g1pmzbbw.js.map} +0 -0
package/dist/chunk-k5h445f9.js
DELETED
|
@@ -1,4 +0,0 @@
|
|
|
1
|
-
// @bun
|
|
2
|
-
import{a as kI,b as LI,c as WI,d as bd,e as yd,f as YI,g as _l,h as JI,i as dI,j as id,k as I1,l as II,m as Vl,n as PI,o as EI,p as SI,q as DI,r as NI,s as VI}from"./chunk-fhx0vt7d.js";import{Vb as Bd,Wb as il,Xb as l1,Zb as A,_b as m}from"./chunk-bq3ssfcb.js";import{ac as $l,dc as md,ec as Cd,gc as lI}from"./chunk-5saeq23h.js";import{kc as bI}from"./chunk-awqqsf8p.js";import"./chunk-v6kcbyg4.js";import"./chunk-qj8d5qgn.js";import{vc as td}from"./chunk-4kkyjz2j.js";import{xc as V}from"./chunk-5zy36vzw.js";var o=V((j1)=>{Object.defineProperty(j1,"__esModule",{value:!0});j1.resolveHttpAuthSchemeConfig=j1.resolveStsAuthConfig=j1.defaultSTSHttpAuthSchemeProvider=j1.defaultSTSHttpAuthSchemeParametersProvider=void 0;var kd=m(),c=Bd(),Ld=O(),Wd=async(l,I,d)=>{return{operation:c.getSmithyContext(I).operation,region:await c.normalizeProvider(l.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};j1.defaultSTSHttpAuthSchemeParametersProvider=Wd;function Yd(l){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:l.region},propertiesExtractor:(I,d)=>({signingProperties:{config:I,context:d}})}}function Jd(l){return{schemeId:"smithy.api#noAuth"}}var Kd=(l)=>{let I=[];switch(l.operation){case"AssumeRoleWithWebIdentity":{I.push(Jd(l));break}default:I.push(Yd(l))}return I};j1.defaultSTSHttpAuthSchemeProvider=Kd;var Xd=(l)=>Object.assign(l,{stsClientCtor:Ld.STSClient});j1.resolveStsAuthConfig=Xd;var Qd=(l)=>{let I=j1.resolveStsAuthConfig(l),d=kd.resolveAwsSdkSigV4Config(I);return Object.assign(d,{authSchemePreference:c.normalizeProvider(l.authSchemePreference??[])})};j1.resolveHttpAuthSchemeConfig=Qd});var s=V((b1)=>{Object.defineProperty(b1,"__esModule",{value:!0});b1.commonParams=b1.resolveClientEndpointParameters=void 0;var jd=(l)=>{return Object.assign(l,{useDualstackEndpoint:l.useDualstackEndpoint??!1,useFipsEndpoint:l.useFipsEndpoint??!1,useGlobalEndpoint:l.useGlobalEndpoint??!1,defaultSigningName:"sts"})};b1.resolveClientEndpointParameters=jd;b1.commonParams={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}}});var Fl=V((Dl)=>{Object.defineProperty(Dl,"__esModule",{value:!0});Dl.ruleSet=void 0;var n1="required",D="type",F="fn",q="argv",J="ref",f1=!1,n=!0,Y="booleanEquals",U="stringEquals",p1="sigv4",u1="sts",t1="us-east-1",r="endpoint",O1="https://sts.{Region}.{PartitionResult#dnsSuffix}",B="tree",X="error",u="getAttr",s1={[n1]:!1,[D]:"String"},p={[n1]:!0,default:!1,[D]:"Boolean"},ll={[J]:"Endpoint"},g1={[F]:"isSet",[q]:[{[J]:"Region"}]},G={[J]:"Region"},m1={[F]:"aws.partition",[q]:[G],assign:"PartitionResult"},dl={[J]:"UseFIPS"},Il={[J]:"UseDualStack"},M={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:p1,signingName:u1,signingRegion:t1}]},headers:{}},a={},C1={conditions:[{[F]:U,[q]:[G,"aws-global"]}],[r]:M,[D]:r},Pl={[F]:Y,[q]:[dl,!0]},El={[F]:Y,[q]:[Il,!0]},i1={[F]:u,[q]:[{[J]:"PartitionResult"},"supportsFIPS"]},Sl={[J]:"PartitionResult"},x1={[F]:Y,[q]:[!0,{[F]:u,[q]:[Sl,"supportsDualStack"]}]},e1=[{[F]:"isSet",[q]:[ll]}],c1=[Pl],o1=[El],zd={version:"1.0",parameters:{Region:s1,UseDualStack:p,UseFIPS:p,Endpoint:s1,UseGlobalEndpoint:p},rules:[{conditions:[{[F]:Y,[q]:[{[J]:"UseGlobalEndpoint"},n]},{[F]:"not",[q]:e1},g1,m1,{[F]:Y,[q]:[dl,f1]},{[F]:Y,[q]:[Il,f1]}],rules:[{conditions:[{[F]:U,[q]:[G,"ap-northeast-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-south-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-southeast-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"ap-southeast-2"]}],endpoint:M,[D]:r},C1,{conditions:[{[F]:U,[q]:[G,"ca-central-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-central-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-north-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-2"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"eu-west-3"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"sa-east-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,t1]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-east-2"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-west-1"]}],endpoint:M,[D]:r},{conditions:[{[F]:U,[q]:[G,"us-west-2"]}],endpoint:M,[D]:r},{endpoint:{url:O1,properties:{authSchemes:[{name:p1,signingName:u1,signingRegion:"{Region}"}]},headers:a},[D]:r}],[D]:B},{conditions:e1,rules:[{conditions:c1,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[D]:X},{conditions:o1,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[D]:X},{endpoint:{url:ll,properties:a,headers:a},[D]:r}],[D]:B},{conditions:[g1],rules:[{conditions:[m1],rules:[{conditions:[Pl,El],rules:[{conditions:[{[F]:Y,[q]:[n,i1]},x1],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[D]:X}],[D]:B},{conditions:c1,rules:[{conditions:[{[F]:Y,[q]:[i1,n]}],rules:[{conditions:[{[F]:U,[q]:[{[F]:u,[q]:[Sl,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:a,headers:a},[D]:r},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"FIPS is enabled but this partition does not support FIPS",[D]:X}],[D]:B},{conditions:o1,rules:[{conditions:[x1],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:a,headers:a},[D]:r}],[D]:B},{error:"DualStack is enabled but this partition does not support DualStack",[D]:X}],[D]:B},C1,{endpoint:{url:O1,properties:a,headers:a},[D]:r}],[D]:B}],[D]:B},{error:"Invalid Configuration: Missing Region",[D]:X}]};Dl.ruleSet=zd});var wl=V((ql)=>{Object.defineProperty(ql,"__esModule",{value:!0});ql.defaultEndpointResolver=void 0;var fd=yd(),t=bd(),Od=Fl(),sd=new t.EndpointCache({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),gd=(l,I={})=>{return sd.get(l,()=>t.resolveEndpoint(Od.ruleSet,{endpointParams:l,logger:I.logger}))};ql.defaultEndpointResolver=gd;t.customEndpointFunctions.aws=fd.awsEndpointFunctions});var Ml=V((Ul)=>{Object.defineProperty(Ul,"__esModule",{value:!0});Ul.getRuntimeConfig=void 0;var xd=m(),ed=l1(),cd=A(),od=id(),rl=Cd(),Rl=md(),nd=o(),pd=wl(),ud=(l)=>{return{apiVersion:"2011-06-15",base64Decoder:l?.base64Decoder??rl.fromBase64,base64Encoder:l?.base64Encoder??rl.toBase64,disableHostPrefix:l?.disableHostPrefix??!1,endpointProvider:l?.endpointProvider??pd.defaultEndpointResolver,extensions:l?.extensions??[],httpAuthSchemeProvider:l?.httpAuthSchemeProvider??nd.defaultSTSHttpAuthSchemeProvider,httpAuthSchemes:l?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(I)=>I.getIdentityProvider("aws.auth#sigv4"),signer:new xd.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(I)=>I.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ed.NoAuthSigner}],logger:l?.logger??new cd.NoOpLogger,serviceId:l?.serviceId??"STS",urlParser:l?.urlParser??od.parseUrl,utf8Decoder:l?.utf8Decoder??Rl.fromUtf8,utf8Encoder:l?.utf8Encoder??Rl.toUtf8}};Ul.getRuntimeConfig=ud});var Ll=V((Bl)=>{Object.defineProperty(Bl,"__esModule",{value:!0});Bl.getRuntimeConfig=void 0;var FI=td(),qI=FI.__importDefault(PI()),hl=m(),al=EI(),C=_l(),vI=l1(),wI=SI(),Al=Vl(),Q=dI(),Tl=lI(),rI=DI(),RI=II(),UI=Ml(),GI=A(),MI=NI(),hI=A(),aI=(l)=>{hI.emitWarningIfUnsupportedVersion(process.version);let I=MI.resolveDefaultsModeConfig(l),d=()=>I().then(GI.loadConfigsForDefaultMode),E=UI.getRuntimeConfig(l);hl.emitWarningIfUnsupportedVersion(process.version);let P={profile:l?.profile};return{...E,...l,runtime:"node",defaultsMode:I,bodyLengthChecker:l?.bodyLengthChecker??rI.calculateBodyLength,defaultUserAgentProvider:l?.defaultUserAgentProvider??al.createDefaultUserAgentProvider({serviceId:E.serviceId,clientVersion:qI.default.version}),httpAuthSchemes:l?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(v)=>v.getIdentityProvider("aws.auth#sigv4")||(async(N)=>await l.credentialDefaultProvider(N?.__config||{})()),signer:new hl.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(v)=>v.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new vI.NoAuthSigner}],maxAttempts:l?.maxAttempts??Q.loadConfig(Al.NODE_MAX_ATTEMPT_CONFIG_OPTIONS,l),region:l?.region??Q.loadConfig(C.NODE_REGION_CONFIG_OPTIONS,{...C.NODE_REGION_CONFIG_FILE_OPTIONS,...P}),requestHandler:Tl.NodeHttpHandler.create(l?.requestHandler??d),retryMode:l?.retryMode??Q.loadConfig({...Al.NODE_RETRY_MODE_CONFIG_OPTIONS,default:async()=>(await d()).retryMode||RI.DEFAULT_RETRY_MODE},l),sha256:l?.sha256??wI.Hash.bind(null,"sha256"),streamCollector:l?.streamCollector??Tl.streamCollector,useDualstackEndpoint:l?.useDualstackEndpoint??Q.loadConfig(C.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS,P),useFipsEndpoint:l?.useFipsEndpoint??Q.loadConfig(C.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS,P),userAgentAppId:l?.userAgentAppId??Q.loadConfig(al.NODE_APP_ID_CONFIG_OPTIONS,P)}};Bl.getRuntimeConfig=aI});var Jl=V((Wl)=>{Object.defineProperty(Wl,"__esModule",{value:!0});Wl.resolveHttpAuthRuntimeConfig=Wl.getHttpAuthExtensionConfiguration=void 0;var AI=(l)=>{let{httpAuthSchemes:I,httpAuthSchemeProvider:d,credentials:E}=l;return{setHttpAuthScheme(P){let v=I.findIndex((N)=>N.schemeId===P.schemeId);if(v===-1)I.push(P);else I.splice(v,1,P)},httpAuthSchemes(){return I},setHttpAuthSchemeProvider(P){d=P},httpAuthSchemeProvider(){return d},setCredentials(P){E=P},credentials(){return E}}};Wl.getHttpAuthExtensionConfiguration=AI;var TI=(l)=>{return{httpAuthSchemes:l.httpAuthSchemes(),httpAuthSchemeProvider:l.httpAuthSchemeProvider(),credentials:l.credentials()}};Wl.resolveHttpAuthRuntimeConfig=TI});var zl=V((jl)=>{Object.defineProperty(jl,"__esModule",{value:!0});jl.resolveRuntimeExtensions=void 0;var Kl=VI(),Xl=$l(),Ql=A(),Zl=Jl(),BI=(l,I)=>{let d=Object.assign(Kl.getAwsRegionExtensionConfiguration(l),Ql.getDefaultExtensionConfiguration(l),Xl.getHttpHandlerExtensionConfiguration(l),Zl.getHttpAuthExtensionConfiguration(l));return I.forEach((E)=>E.configure(d)),Object.assign(l,Kl.resolveAwsRegionExtensionConfiguration(d),Ql.resolveDefaultRuntimeConfig(d),Xl.resolveHttpHandlerRuntimeConfig(d),Zl.resolveHttpAuthRuntimeConfig(d))};jl.resolveRuntimeExtensions=BI});var O=V((P1)=>{Object.defineProperty(P1,"__esModule",{value:!0});P1.STSClient=P1.__Client=void 0;var bl=kI(),KI=LI(),XI=WI(),yl=YI(),QI=_l(),d1=l1(),ZI=JI(),$I=I1(),fl=Vl(),sl=A();Object.defineProperty(P1,"__Client",{enumerable:!0,get:function(){return sl.Client}});var Ol=o(),jI=s(),HI=Ll(),zI=zl();class gl extends sl.Client{config;constructor(...[l]){let I=HI.getRuntimeConfig(l||{});super(I);this.initConfig=I;let d=jI.resolveClientEndpointParameters(I),E=yl.resolveUserAgentConfig(d),P=fl.resolveRetryConfig(E),v=QI.resolveRegionConfig(P),N=bl.resolveHostHeaderConfig(v),h=$I.resolveEndpointConfig(N),T=Ol.resolveHttpAuthSchemeConfig(h),_=zI.resolveRuntimeExtensions(T,l?.extensions||[]);this.config=_,this.middlewareStack.use(yl.getUserAgentPlugin(this.config)),this.middlewareStack.use(fl.getRetryPlugin(this.config)),this.middlewareStack.use(ZI.getContentLengthPlugin(this.config)),this.middlewareStack.use(bl.getHostHeaderPlugin(this.config)),this.middlewareStack.use(KI.getLoggerPlugin(this.config)),this.middlewareStack.use(XI.getRecursionDetectionPlugin(this.config)),this.middlewareStack.use(d1.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Ol.defaultSTSHttpAuthSchemeParametersProvider,identityProviderConfigProvider:async(K)=>new d1.DefaultIdentityProviderConfig({"aws.auth#sigv4":K.credentials})})),this.middlewareStack.use(d1.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}P1.STSClient=gl});var fP=V((nP,$1)=>{var{defineProperty:i,getOwnPropertyDescriptor:yI,getOwnPropertyNames:fI}=Object,OI=Object.prototype.hasOwnProperty,S=(l,I)=>i(l,"name",{value:I,configurable:!0}),sI=(l,I)=>{for(var d in I)i(l,d,{get:I[d],enumerable:!0})},W1=(l,I,d,E)=>{if(I&&typeof I==="object"||typeof I==="function"){for(let P of fI(I))if(!OI.call(l,P)&&P!==d)i(l,P,{get:()=>I[P],enumerable:!(E=yI(I,P))||E.enumerable})}return l},gI=(l,I,d)=>(W1(l,I,"default"),d&&W1(d,I,"default")),mI=(l)=>W1(i({},"__esModule",{value:!0}),l),J1={};sI(J1,{AssumeRoleCommand:()=>Q1,AssumeRoleResponseFilterSensitiveLog:()=>el,AssumeRoleWithWebIdentityCommand:()=>Z1,AssumeRoleWithWebIdentityRequestFilterSensitiveLog:()=>ld,AssumeRoleWithWebIdentityResponseFilterSensitiveLog:()=>dd,ClientInputEndpointParameters:()=>HP.ClientInputEndpointParameters,CredentialsFilterSensitiveLog:()=>K1,ExpiredTokenException:()=>cl,IDPCommunicationErrorException:()=>Id,IDPRejectedClaimException:()=>ul,InvalidIdentityTokenException:()=>tl,MalformedPolicyDocumentException:()=>ol,PackedPolicyTooLargeException:()=>nl,RegionDisabledException:()=>pl,STS:()=>Rd,STSServiceException:()=>L,decorateDefaultCredentialProvider:()=>yP,getDefaultRoleAssumer:()=>Ad,getDefaultRoleAssumerWithWebIdentity:()=>Td});$1.exports=mI(J1);gI(J1,O(),$1.exports);var CI=A(),iI=I1(),xI=il(),eI=A(),cI=s(),xl=A(),oI=A(),L=class l extends oI.ServiceException{static{S(this,"STSServiceException")}constructor(I){super(I);Object.setPrototypeOf(this,l.prototype)}},K1=S((l)=>({...l,...l.SecretAccessKey&&{SecretAccessKey:xl.SENSITIVE_STRING}}),"CredentialsFilterSensitiveLog"),el=S((l)=>({...l,...l.Credentials&&{Credentials:K1(l.Credentials)}}),"AssumeRoleResponseFilterSensitiveLog"),cl=class l extends L{static{S(this,"ExpiredTokenException")}name="ExpiredTokenException";$fault="client";constructor(I){super({name:"ExpiredTokenException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ol=class l extends L{static{S(this,"MalformedPolicyDocumentException")}name="MalformedPolicyDocumentException";$fault="client";constructor(I){super({name:"MalformedPolicyDocumentException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},nl=class l extends L{static{S(this,"PackedPolicyTooLargeException")}name="PackedPolicyTooLargeException";$fault="client";constructor(I){super({name:"PackedPolicyTooLargeException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},pl=class l extends L{static{S(this,"RegionDisabledException")}name="RegionDisabledException";$fault="client";constructor(I){super({name:"RegionDisabledException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ul=class l extends L{static{S(this,"IDPRejectedClaimException")}name="IDPRejectedClaimException";$fault="client";constructor(I){super({name:"IDPRejectedClaimException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},tl=class l extends L{static{S(this,"InvalidIdentityTokenException")}name="InvalidIdentityTokenException";$fault="client";constructor(I){super({name:"InvalidIdentityTokenException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},ld=S((l)=>({...l,...l.WebIdentityToken&&{WebIdentityToken:xl.SENSITIVE_STRING}}),"AssumeRoleWithWebIdentityRequestFilterSensitiveLog"),dd=S((l)=>({...l,...l.Credentials&&{Credentials:K1(l.Credentials)}}),"AssumeRoleWithWebIdentityResponseFilterSensitiveLog"),Id=class l extends L{static{S(this,"IDPCommunicationErrorException")}name="IDPCommunicationErrorException";$fault="client";constructor(I){super({name:"IDPCommunicationErrorException",$fault:"client",...I});Object.setPrototypeOf(this,l.prototype)}},X1=m(),nI=$l(),w=A(),pI=S(async(l,I)=>{let d=Fd,E;return E=rd({...FP(l,I),[vd]:WP,[wd]:qd}),Nd(I,d,"/",void 0,E)},"se_AssumeRoleCommand"),uI=S(async(l,I)=>{let d=Fd,E;return E=rd({...qP(l,I),[vd]:YP,[wd]:qd}),Nd(I,d,"/",void 0,E)},"se_AssumeRoleWithWebIdentityCommand"),tI=S(async(l,I)=>{if(l.statusCode>=300)return Pd(l,I);let d=await X1.parseXmlBody(l.body,I),E={};return E=MP(d.AssumeRoleResult,I),{$metadata:W(l),...E}},"de_AssumeRoleCommand"),lP=S(async(l,I)=>{if(l.statusCode>=300)return Pd(l,I);let d=await X1.parseXmlBody(l.body,I),E={};return E=hP(d.AssumeRoleWithWebIdentityResult,I),{$metadata:W(l),...E}},"de_AssumeRoleWithWebIdentityCommand"),Pd=S(async(l,I)=>{let d={...l,body:await X1.parseXmlErrorBody(l.body,I)},E=JP(l,d.body);switch(E){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await dP(d,I);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await SP(d,I);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await DP(d,I);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await NP(d,I);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await IP(d,I);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await PP(d,I);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await EP(d,I);default:let P=d.body;return LP({output:l,parsedBody:P.Error,errorCode:E})}},"de_CommandError"),dP=S(async(l,I)=>{let d=l.body,E=aP(d.Error,I),P=new cl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_ExpiredTokenExceptionRes"),IP=S(async(l,I)=>{let d=l.body,E=AP(d.Error,I),P=new Id({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_IDPCommunicationErrorExceptionRes"),PP=S(async(l,I)=>{let d=l.body,E=TP(d.Error,I),P=new ul({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_IDPRejectedClaimExceptionRes"),EP=S(async(l,I)=>{let d=l.body,E=_P(d.Error,I),P=new tl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_InvalidIdentityTokenExceptionRes"),SP=S(async(l,I)=>{let d=l.body,E=VP(d.Error,I),P=new ol({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_MalformedPolicyDocumentExceptionRes"),DP=S(async(l,I)=>{let d=l.body,E=BP(d.Error,I),P=new nl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_PackedPolicyTooLargeExceptionRes"),NP=S(async(l,I)=>{let d=l.body,E=kP(d.Error,I),P=new pl({$metadata:W(l),...E});return w.decorateServiceException(P,d)},"de_RegionDisabledExceptionRes"),FP=S((l,I)=>{let d={};if(l[y]!=null)d[y]=l[y];if(l[f]!=null)d[f]=l[f];if(l[z]!=null){let E=Ed(l[z],I);if(l[z]?.length===0)d.PolicyArns=[];Object.entries(E).forEach(([P,v])=>{let N=`PolicyArns.${P}`;d[N]=v})}if(l[H]!=null)d[H]=l[H];if(l[j]!=null)d[j]=l[j];if(l[T1]!=null){let E=GP(l[T1],I);if(l[T1]?.length===0)d.Tags=[];Object.entries(E).forEach(([P,v])=>{let N=`Tags.${P}`;d[N]=v})}if(l[V1]!=null){let E=UP(l[V1],I);if(l[V1]?.length===0)d.TransitiveTagKeys=[];Object.entries(E).forEach(([P,v])=>{let N=`TransitiveTagKeys.${P}`;d[N]=v})}if(l[v1]!=null)d[v1]=l[v1];if(l[a1]!=null)d[a1]=l[a1];if(l[_1]!=null)d[_1]=l[_1];if(l[k]!=null)d[k]=l[k];if(l[R1]!=null){let E=rP(l[R1],I);if(l[R1]?.length===0)d.ProvidedContexts=[];Object.entries(E).forEach(([P,v])=>{let N=`ProvidedContexts.${P}`;d[N]=v})}return d},"se_AssumeRoleRequest"),qP=S((l,I)=>{let d={};if(l[y]!=null)d[y]=l[y];if(l[f]!=null)d[f]=l[f];if(l[k1]!=null)d[k1]=l[k1];if(l[U1]!=null)d[U1]=l[U1];if(l[z]!=null){let E=Ed(l[z],I);if(l[z]?.length===0)d.PolicyArns=[];Object.entries(E).forEach(([P,v])=>{let N=`PolicyArns.${P}`;d[N]=v})}if(l[H]!=null)d[H]=l[H];if(l[j]!=null)d[j]=l[j];return d},"se_AssumeRoleWithWebIdentityRequest"),Ed=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=vP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_policyDescriptorListType"),vP=S((l,I)=>{let d={};if(l[L1]!=null)d[L1]=l[L1];return d},"se_PolicyDescriptorType"),wP=S((l,I)=>{let d={};if(l[r1]!=null)d[r1]=l[r1];if(l[F1]!=null)d[F1]=l[F1];return d},"se_ProvidedContext"),rP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=wP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_ProvidedContextsListType"),RP=S((l,I)=>{let d={};if(l[w1]!=null)d[w1]=l[w1];if(l[B1]!=null)d[B1]=l[B1];return d},"se_Tag"),UP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;d[`member.${E}`]=P,E++}return d},"se_tagKeyListType"),GP=S((l,I)=>{let d={},E=1;for(let P of l){if(P===null)continue;let v=RP(P,I);Object.entries(v).forEach(([N,h])=>{d[`member.${E}.${N}`]=h}),E++}return d},"se_tagListType"),Sd=S((l,I)=>{let d={};if(l[S1]!=null)d[S1]=w.expectString(l[S1]);if(l[D1]!=null)d[D1]=w.expectString(l[D1]);return d},"de_AssumedRoleUser"),MP=S((l,I)=>{let d={};if(l[$]!=null)d[$]=Dd(l[$],I);if(l[Z]!=null)d[Z]=Sd(l[Z],I);if(l[b]!=null)d[b]=w.strictParseInt32(l[b]);if(l[k]!=null)d[k]=w.expectString(l[k]);return d},"de_AssumeRoleResponse"),hP=S((l,I)=>{let d={};if(l[$]!=null)d[$]=Dd(l[$],I);if(l[h1]!=null)d[h1]=w.expectString(l[h1]);if(l[Z]!=null)d[Z]=Sd(l[Z],I);if(l[b]!=null)d[b]=w.strictParseInt32(l[b]);if(l[G1]!=null)d[G1]=w.expectString(l[G1]);if(l[N1]!=null)d[N1]=w.expectString(l[N1]);if(l[k]!=null)d[k]=w.expectString(l[k]);return d},"de_AssumeRoleWithWebIdentityResponse"),Dd=S((l,I)=>{let d={};if(l[E1]!=null)d[E1]=w.expectString(l[E1]);if(l[M1]!=null)d[M1]=w.expectString(l[M1]);if(l[A1]!=null)d[A1]=w.expectString(l[A1]);if(l[q1]!=null)d[q1]=w.expectNonNull(w.parseRfc3339DateTimeWithOffset(l[q1]));return d},"de_Credentials"),aP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_ExpiredTokenException"),AP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_IDPCommunicationErrorException"),TP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_IDPRejectedClaimException"),_P=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_InvalidIdentityTokenException"),VP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_MalformedPolicyDocumentException"),BP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_PackedPolicyTooLargeException"),kP=S((l,I)=>{let d={};if(l[R]!=null)d[R]=w.expectString(l[R]);return d},"de_RegionDisabledException"),W=S((l)=>({httpStatusCode:l.statusCode,requestId:l.headers["x-amzn-requestid"]??l.headers["x-amzn-request-id"]??l.headers["x-amz-request-id"],extendedRequestId:l.headers["x-amz-id-2"],cfId:l.headers["x-amz-cf-id"]}),"deserializeMetadata"),LP=w.withBaseException(L),Nd=S(async(l,I,d,E,P)=>{let{hostname:v,protocol:N="https",port:h,path:T}=await l.endpoint(),_={protocol:N,hostname:v,port:h,method:"POST",path:T.endsWith("/")?T.slice(0,-1)+d:T+d,headers:I};if(E!==void 0)_.hostname=E;if(P!==void 0)_.body=P;return new nI.HttpRequest(_)},"buildHttpRpcRequest"),Fd={"content-type":"application/x-www-form-urlencoded"},qd="2011-06-15",vd="Action",E1="AccessKeyId",WP="AssumeRole",S1="AssumedRoleId",Z="AssumedRoleUser",YP="AssumeRoleWithWebIdentity",D1="Arn",N1="Audience",$="Credentials",F1="ContextAssertion",j="DurationSeconds",q1="Expiration",v1="ExternalId",w1="Key",H="Policy",z="PolicyArns",r1="ProviderArn",R1="ProvidedContexts",U1="ProviderId",b="PackedPolicySize",G1="Provider",y="RoleArn",f="RoleSessionName",M1="SecretAccessKey",h1="SubjectFromWebIdentityToken",k="SourceIdentity",a1="SerialNumber",A1="SessionToken",T1="Tags",_1="TokenCode",V1="TransitiveTagKeys",wd="Version",B1="Value",k1="WebIdentityToken",L1="arn",R="message",rd=S((l)=>Object.entries(l).map(([I,d])=>w.extendedEncodeURIComponent(I)+"="+w.extendedEncodeURIComponent(d)).join("&"),"buildFormUrlencodedString"),JP=S((l,I)=>{if(I.Error?.Code!==void 0)return I.Error.Code;if(l.statusCode==404)return"NotFound"},"loadQueryErrorCode"),Q1=class extends eI.Command.classBuilder().ep(cI.commonParams).m(function(l,I,d,E){return[xI.getSerdePlugin(d,this.serialize,this.deserialize),iI.getEndpointPlugin(d,l.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,el).ser(pI).de(tI).build(){static{S(this,"AssumeRoleCommand")}},KP=I1(),XP=il(),QP=A(),ZP=s(),Z1=class extends QP.Command.classBuilder().ep(ZP.commonParams).m(function(l,I,d,E){return[XP.getSerdePlugin(d,this.serialize,this.deserialize),KP.getEndpointPlugin(d,l.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(ld,dd).ser(uI).de(lP).build(){static{S(this,"AssumeRoleWithWebIdentityCommand")}},$P=O(),jP={AssumeRoleCommand:Q1,AssumeRoleWithWebIdentityCommand:Z1},Rd=class extends $P.STSClient{static{S(this,"STS")}};CI.createAggregatedClient(jP,Rd);var HP=s(),Y1=bI(),Cl="us-east-1",Ud=S((l)=>{if(typeof l?.Arn==="string"){let I=l.Arn.split(":");if(I.length>4&&I[4]!=="")return I[4]}return},"getAccountIdFromAssumedRoleUser"),Gd=S(async(l,I,d)=>{let E=typeof l==="function"?await l():l,P=typeof I==="function"?await I():I;return d?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${E} (provider)`,`${P} (parent client)`,`${Cl} (STS default)`),E??P??Cl},"resolveRegion"),zP=S((l,I)=>{let d,E;return async(P,v)=>{if(E=P,!d){let{logger:K=l?.parentClientConfig?.logger,region:x,requestHandler:g=l?.parentClientConfig?.requestHandler,credentialProviderLogger:e}=l,_d=await Gd(x,l?.parentClientConfig?.region,e),Vd=!Md(g);d=new I({profile:l?.parentClientConfig?.profile,credentialDefaultProvider:S(()=>async()=>E,"credentialDefaultProvider"),region:_d,requestHandler:Vd?g:void 0,logger:K})}let{Credentials:N,AssumedRoleUser:h}=await d.send(new Q1(v));if(!N||!N.AccessKeyId||!N.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${v.RoleArn}`);let T=Ud(h),_={accessKeyId:N.AccessKeyId,secretAccessKey:N.SecretAccessKey,sessionToken:N.SessionToken,expiration:N.Expiration,...N.CredentialScope&&{credentialScope:N.CredentialScope},...T&&{accountId:T}};return Y1.setCredentialFeature(_,"CREDENTIALS_STS_ASSUME_ROLE","i"),_}},"getDefaultRoleAssumer"),bP=S((l,I)=>{let d;return async(E)=>{if(!d){let{logger:T=l?.parentClientConfig?.logger,region:_,requestHandler:K=l?.parentClientConfig?.requestHandler,credentialProviderLogger:x}=l,g=await Gd(_,l?.parentClientConfig?.region,x),e=!Md(K);d=new I({profile:l?.parentClientConfig?.profile,region:g,requestHandler:e?K:void 0,logger:T})}let{Credentials:P,AssumedRoleUser:v}=await d.send(new Z1(E));if(!P||!P.AccessKeyId||!P.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${E.RoleArn}`);let N=Ud(v),h={accessKeyId:P.AccessKeyId,secretAccessKey:P.SecretAccessKey,sessionToken:P.SessionToken,expiration:P.Expiration,...P.CredentialScope&&{credentialScope:P.CredentialScope},...N&&{accountId:N}};if(N)Y1.setCredentialFeature(h,"RESOLVED_ACCOUNT_ID","T");return Y1.setCredentialFeature(h,"CREDENTIALS_STS_ASSUME_ROLE_WEB_ID","k"),h}},"getDefaultRoleAssumerWithWebIdentity"),Md=S((l)=>{return l?.metadata?.handlerProtocol==="h2"},"isH2"),hd=O(),ad=S((l,I)=>{if(!I)return l;else return class d extends l{static{S(this,"CustomizableSTSClient")}constructor(E){super(E);for(let P of I)this.middlewareStack.use(P)}}},"getCustomizableStsClientCtor"),Ad=S((l={},I)=>zP(l,ad(hd.STSClient,I)),"getDefaultRoleAssumer"),Td=S((l={},I)=>bP(l,ad(hd.STSClient,I)),"getDefaultRoleAssumerWithWebIdentity"),yP=S((l)=>(I)=>l({roleAssumer:Ad(I),roleAssumerWithWebIdentity:Td(I),...I}),"decorateDefaultCredentialProvider")});export default fP();
|
|
3
|
-
|
|
4
|
-
//# debugId=02A0C26C941C9DB564756E2164756E21
|
package/dist/chunk-pdxpkd11.js
DELETED
|
@@ -1,5 +0,0 @@
|
|
|
1
|
-
// @bun
|
|
2
|
-
import{Wa as z,Xa as P}from"./chunk-a30zkbbx.js";import"./chunk-eyw5m86d.js";import"./chunk-v6kcbyg4.js";import{mc as D}from"./chunk-qj8d5qgn.js";import{wc as _}from"./chunk-5zy36vzw.js";var m=_(D(),1);import{parse as o}from"url";var K=_(D(),1);import{Buffer as a}from"buffer";import{request as n}from"http";function u(c){return new Promise((I,x)=>{let T=n({method:"GET",...c,hostname:c.hostname?.replace(/^\[(.+)\]$/,"$1")});T.on("error",(N)=>{x(Object.assign(new K.ProviderError("Unable to connect to instance metadata service"),N)),T.destroy()}),T.on("timeout",()=>{x(new K.ProviderError("TimeoutError from instance metadata service")),T.destroy()}),T.on("response",(N)=>{let{statusCode:O=400}=N;if(O<200||300<=O)x(Object.assign(new K.ProviderError("Error response received from instance metadata service"),{statusCode:O})),T.destroy();let E=[];N.on("data",(y)=>{E.push(y)}),N.on("end",()=>{I(a.concat(E)),T.destroy()})}),T.end()})}var G=(c)=>Boolean(c)&&typeof c==="object"&&typeof c.AccessKeyId==="string"&&typeof c.SecretAccessKey==="string"&&typeof c.Token==="string"&&typeof c.Expiration==="string",Q=(c)=>({accessKeyId:c.AccessKeyId,secretAccessKey:c.SecretAccessKey,sessionToken:c.Token,expiration:new Date(c.Expiration),...c.AccountId&&{accountId:c.AccountId}});var uc=1000,Ec=0,X=({maxRetries:c=0,timeout:I=1000})=>({maxRetries:c,timeout:I});var f=(c,I)=>{let x=c();for(let T=0;T<I;T++)x=x.catch(c);return x};var v="AWS_CONTAINER_CREDENTIALS_FULL_URI",L="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",B="AWS_CONTAINER_AUTHORIZATION_TOKEN",Kc=(c={})=>{let{timeout:I,maxRetries:x}=X(c);return()=>f(async()=>{let T=await d({logger:c.logger}),N=JSON.parse(await s(I,T));if(!G(N))throw new m.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:c.logger});return Q(N)},x)},s=async(c,I)=>{if(process.env[B])I.headers={...I.headers,Authorization:process.env[B]};return(await u({...I,timeout:c})).toString()},g="169.254.170.2",l={localhost:!0,"127.0.0.1":!0},r={"http:":!0,"https:":!0},d=async({logger:c})=>{if(process.env[L])return{hostname:g,path:process.env[L]};if(process.env[v]){let I=o(process.env[v]);if(!I.hostname||!(I.hostname in l))throw new m.CredentialsProviderError(`${I.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:c});if(!I.protocol||!(I.protocol in r))throw new m.CredentialsProviderError(`${I.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:c});return{...I,port:I.port?parseInt(I.port,10):void 0}}throw new m.CredentialsProviderError(`The container metadata credential provider cannot be used unless the ${L} or ${v} environment variable is set`,{tryNextLink:!1,logger:c})};var q=_(D(),1);var U=_(D(),1);class Z extends U.CredentialsProviderError{constructor(c,I=!0){super(c,I);this.tryNextLink=I,this.name="InstanceMetadataV1FallbackError",Object.setPrototypeOf(this,Z.prototype)}}var A;(function(c){c.IPv4="http://169.254.169.254",c.IPv6="http://[fd00:ec2::254]"})(A||(A={}));var t={environmentVariableSelector:(c)=>c.AWS_EC2_METADATA_SERVICE_ENDPOINT,configFileSelector:(c)=>c.ec2_metadata_service_endpoint,default:void 0};var S;(function(c){c.IPv4="IPv4",c.IPv6="IPv6"})(S||(S={}));var e="AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE",i="ec2_metadata_service_endpoint_mode",F={environmentVariableSelector:(c)=>c[e],configFileSelector:(c)=>c[i],default:S.IPv4};var W=async()=>P(await cc()||await Ic()),cc=async()=>z(t)(),Ic=async()=>{let c=await z(F)();switch(c){case S.IPv4:return A.IPv4;case S.IPv6:return A.IPv6;default:throw new Error(`Unsupported endpoint mode: ${c}. Select from ${Object.values(S)}`)}};var b=(c,I)=>{let x=300+Math.floor(Math.random()*300),T=new Date(Date.now()+x*1000);I.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(T)}.
|
|
3
|
-
For more information, please visit: https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html`);let N=c.originalExpiration??c.expiration;return{...c,...N?{originalExpiration:N}:{},expiration:T}};var V=(c,I={})=>{let x=I?.logger||console,T;return async()=>{let N;try{if(N=await c(),N.expiration&&N.expiration.getTime()<Date.now())N=b(N,x)}catch(O){if(T)x.warn("Credential renew failed: ",O),N=b(T,x);else throw O}return T=N,N}};var k="/latest/meta-data/iam/security-credentials/",Tc="/latest/api/token",H="AWS_EC2_METADATA_V1_DISABLED",R="ec2_metadata_v1_disabled",M="x-aws-ec2-metadata-token",oc=(c={})=>V(Nc(c),{logger:c.logger}),Nc=(c={})=>{let I=!1,{logger:x,profile:T}=c,{timeout:N,maxRetries:O}=X(c),E=async(y,$)=>{if(I||$.headers?.[M]==null){let w=!1,h=!1,C=await z({environmentVariableSelector:(Y)=>{let j=Y[H];if(h=!!j&&j!=="false",j===void 0)throw new q.CredentialsProviderError(`${H} not set in env, checking config file next.`,{logger:c.logger});return h},configFileSelector:(Y)=>{let j=Y[R];return w=!!j&&j!=="false",w},default:!1},{profile:T})();if(c.ec2MetadataV1Disabled||C){let Y=[];if(c.ec2MetadataV1Disabled)Y.push("credential provider initialization (runtime option ec2MetadataV1Disabled)");if(w)Y.push(`config file profile (${R})`);if(h)Y.push(`process environment variable (${H})`);throw new Z(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${Y.join(", ")}].`)}}let p=(await f(async()=>{let w;try{w=await Oc($)}catch(h){if(h.statusCode===401)I=!1;throw h}return w},y)).trim();return f(async()=>{let w;try{w=await yc(p,$,c)}catch(h){if(h.statusCode===401)I=!1;throw h}return w},y)};return async()=>{let y=await W();if(I)return x?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),E(O,{...y,timeout:N});else{let $;try{$=(await xc({...y,timeout:N})).toString()}catch(J){if(J?.statusCode===400)throw Object.assign(J,{message:"EC2 Metadata token request returned error"});else if(J.message==="TimeoutError"||[403,404,405].includes(J.statusCode))I=!0;return x?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),E(O,{...y,timeout:N})}return E(O,{...y,headers:{[M]:$},timeout:N})}}},xc=async(c)=>u({...c,path:Tc,method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),Oc=async(c)=>(await u({...c,path:k})).toString(),yc=async(c,I,x)=>{let T=JSON.parse((await u({...I,path:k+c})).toString());if(!G(T))throw new q.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:x.logger});return Q(T)};export{X as providerConfigFromInit,u as httpRequest,W as getInstanceMetadataEndpoint,oc as fromInstanceMetadata,Kc as fromContainerMetadata,A as Endpoint,L as ENV_CMDS_RELATIVE_URI,v as ENV_CMDS_FULL_URI,B as ENV_CMDS_AUTH_TOKEN,uc as DEFAULT_TIMEOUT,Ec as DEFAULT_MAX_RETRIES};
|
|
4
|
-
|
|
5
|
-
//# debugId=31AAF78CC9A9E75164756E2164756E21
|
package/dist/chunk-qj8d5qgn.js
DELETED
|
@@ -1,4 +0,0 @@
|
|
|
1
|
-
import{xc as $}from"./chunk-5zy36vzw.js";var S=$((N,Z)=>{var{defineProperty:I,getOwnPropertyDescriptor:z,getOwnPropertyNames:A}=Object,D=Object.prototype.hasOwnProperty,H=(j,b)=>I(j,"name",{value:b,configurable:!0}),M=(j,b)=>{for(var F in b)I(j,F,{get:b[F],enumerable:!0})},J=(j,b,F,B)=>{if(b&&typeof b==="object"||typeof b==="function"){for(let G of A(b))if(!D.call(j,G)&&G!==F)I(j,G,{get:()=>b[G],enumerable:!(B=z(b,G))||B.enumerable})}return j},T=(j)=>J(I({},"__esModule",{value:!0}),j),Y={};M(Y,{CredentialsProviderError:()=>V,ProviderError:()=>K,TokenProviderError:()=>w,chain:()=>O,fromStatic:()=>q,memoize:()=>L});Z.exports=T(Y);var K=class j extends Error{constructor(b,F=!0){let B,G=!0;if(typeof F==="boolean")B=void 0,G=F;else if(F!=null&&typeof F==="object")B=F.logger,G=F.tryNextLink??!0;super(b);this.name="ProviderError",this.tryNextLink=G,Object.setPrototypeOf(this,j.prototype),B?.debug?.(`@smithy/property-provider ${G?"->":"(!)"} ${b}`)}static{H(this,"ProviderError")}static from(b,F=!0){return Object.assign(new this(b.message,F),b)}},V=class j extends K{constructor(b,F=!0){super(b,F);this.name="CredentialsProviderError",Object.setPrototypeOf(this,j.prototype)}static{H(this,"CredentialsProviderError")}},w=class j extends K{constructor(b,F=!0){super(b,F);this.name="TokenProviderError",Object.setPrototypeOf(this,j.prototype)}static{H(this,"TokenProviderError")}},O=H((...j)=>async()=>{if(j.length===0)throw new K("No providers in chain");let b;for(let F of j)try{return await F()}catch(B){if(b=B,B?.tryNextLink)continue;throw B}throw b},"chain"),q=H((j)=>()=>Promise.resolve(j),"fromStatic"),L=H((j,b,F)=>{let B,G,Q,U=!1,W=H(async()=>{if(!G)G=j();try{B=await G,Q=!0,U=!1}finally{G=void 0}return B},"coalesceProvider");if(b===void 0)return async(X)=>{if(!Q||X?.forceRefresh)B=await W();return B};return async(X)=>{if(!Q||X?.forceRefresh)B=await W();if(U)return B;if(F&&!F(B))return U=!0,B;if(b(B))return await W(),B;return B}},"memoize")});
|
|
2
|
-
export{S as mc};
|
|
3
|
-
|
|
4
|
-
//# debugId=71C7EB1D858222EF64756E2164756E21
|
|
@@ -1,10 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"version": 3,
|
|
3
|
-
"sources": ["../../../node_modules/@smithy/property-provider/dist-cjs/index.js"],
|
|
4
|
-
"sourcesContent": [
|
|
5
|
-
"var __defProp = Object.defineProperty;\nvar __getOwnPropDesc = Object.getOwnPropertyDescriptor;\nvar __getOwnPropNames = Object.getOwnPropertyNames;\nvar __hasOwnProp = Object.prototype.hasOwnProperty;\nvar __name = (target, value) => __defProp(target, \"name\", { value, configurable: true });\nvar __export = (target, all) => {\n for (var name in all)\n __defProp(target, name, { get: all[name], enumerable: true });\n};\nvar __copyProps = (to, from, except, desc) => {\n if (from && typeof from === \"object\" || typeof from === \"function\") {\n for (let key of __getOwnPropNames(from))\n if (!__hasOwnProp.call(to, key) && key !== except)\n __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });\n }\n return to;\n};\nvar __toCommonJS = (mod) => __copyProps(__defProp({}, \"__esModule\", { value: true }), mod);\n\n// src/index.ts\nvar src_exports = {};\n__export(src_exports, {\n CredentialsProviderError: () => CredentialsProviderError,\n ProviderError: () => ProviderError,\n TokenProviderError: () => TokenProviderError,\n chain: () => chain,\n fromStatic: () => fromStatic,\n memoize: () => memoize\n});\nmodule.exports = __toCommonJS(src_exports);\n\n// src/ProviderError.ts\nvar ProviderError = class _ProviderError extends Error {\n constructor(message, options = true) {\n let logger;\n let tryNextLink = true;\n if (typeof options === \"boolean\") {\n logger = void 0;\n tryNextLink = options;\n } else if (options != null && typeof options === \"object\") {\n logger = options.logger;\n tryNextLink = options.tryNextLink ?? true;\n }\n super(message);\n this.name = \"ProviderError\";\n this.tryNextLink = tryNextLink;\n Object.setPrototypeOf(this, _ProviderError.prototype);\n logger?.debug?.(`@smithy/property-provider ${tryNextLink ? \"->\" : \"(!)\"} ${message}`);\n }\n static {\n __name(this, \"ProviderError\");\n }\n /**\n * @deprecated use new operator.\n */\n static from(error, options = true) {\n return Object.assign(new this(error.message, options), error);\n }\n};\n\n// src/CredentialsProviderError.ts\nvar CredentialsProviderError = class _CredentialsProviderError extends ProviderError {\n /**\n * @override\n */\n constructor(message, options = true) {\n super(message, options);\n this.name = \"CredentialsProviderError\";\n Object.setPrototypeOf(this, _CredentialsProviderError.prototype);\n }\n static {\n __name(this, \"CredentialsProviderError\");\n }\n};\n\n// src/TokenProviderError.ts\nvar TokenProviderError = class _TokenProviderError extends ProviderError {\n /**\n * @override\n */\n constructor(message, options = true) {\n super(message, options);\n this.name = \"TokenProviderError\";\n Object.setPrototypeOf(this, _TokenProviderError.prototype);\n }\n static {\n __name(this, \"TokenProviderError\");\n }\n};\n\n// src/chain.ts\nvar chain = /* @__PURE__ */ __name((...providers) => async () => {\n if (providers.length === 0) {\n throw new ProviderError(\"No providers in chain\");\n }\n let lastProviderError;\n for (const provider of providers) {\n try {\n const credentials = await provider();\n return credentials;\n } catch (err) {\n lastProviderError = err;\n if (err?.tryNextLink) {\n continue;\n }\n throw err;\n }\n }\n throw lastProviderError;\n}, \"chain\");\n\n// src/fromStatic.ts\nvar fromStatic = /* @__PURE__ */ __name((staticValue) => () => Promise.resolve(staticValue), \"fromStatic\");\n\n// src/memoize.ts\nvar memoize = /* @__PURE__ */ __name((provider, isExpired, requiresRefresh) => {\n let resolved;\n let pending;\n let hasResult;\n let isConstant = false;\n const coalesceProvider = /* @__PURE__ */ __name(async () => {\n if (!pending) {\n pending = provider();\n }\n try {\n resolved = await pending;\n hasResult = true;\n isConstant = false;\n } finally {\n pending = void 0;\n }\n return resolved;\n }, \"coalesceProvider\");\n if (isExpired === void 0) {\n return async (options) => {\n if (!hasResult || options?.forceRefresh) {\n resolved = await coalesceProvider();\n }\n return resolved;\n };\n }\n return async (options) => {\n if (!hasResult || options?.forceRefresh) {\n resolved = await coalesceProvider();\n }\n if (isConstant) {\n return resolved;\n }\n if (requiresRefresh && !requiresRefresh(resolved)) {\n isConstant = true;\n return resolved;\n }\n if (isExpired(resolved)) {\n await coalesceProvider();\n return resolved;\n }\n return resolved;\n };\n}, \"memoize\");\n// Annotate the CommonJS export names for ESM import in node:\n\n0 && (module.exports = {\n CredentialsProviderError,\n ProviderError,\n TokenProviderError,\n chain,\n fromStatic,\n memoize\n});\n\n"
|
|
6
|
-
],
|
|
7
|
-
"mappings": "yDAAA,IAAuB,eAAnB,EAC0B,yBAA1B,EAC2B,oBAA3B,GADmB,OAEnB,EAAe,OAAO,UAAU,eAChC,EAAS,CAAC,EAAQ,IAAU,EAAU,EAAQ,OAAQ,CAAE,QAAO,aAAc,EAAK,CAAC,EACnF,EAAW,CAAC,EAAQ,IAAQ,CAC9B,QAAS,KAAQ,EACf,EAAU,EAAQ,EAAM,CAAE,IAAK,EAAI,GAAO,WAAY,EAAK,CAAC,GAE5D,EAAc,CAAC,EAAI,EAAM,EAAQ,IAAS,CAC5C,GAAI,GAAQ,OAAO,IAAS,UAAY,OAAO,IAAS,YACtD,QAAS,KAAO,EAAkB,CAAI,EACpC,IAAK,EAAa,KAAK,EAAI,CAAG,GAAK,IAAQ,EACzC,EAAU,EAAI,EAAK,CAAE,IAAK,IAAM,EAAK,GAAM,aAAc,EAAO,EAAiB,EAAM,CAAG,IAAM,EAAK,UAAW,CAAC,EAEvH,OAAO,GAEL,EAAe,CAAC,IAAQ,EAAY,EAAU,CAAC,EAAG,aAAc,CAAE,MAAO,EAAK,CAAC,EAAG,CAAG,EAGrF,EAAc,CAAC,EACnB,EAAS,EAAa,CACpB,yBAA0B,IAAM,EAChC,cAAe,IAAM,EACrB,mBAAoB,IAAM,EAC1B,MAAO,IAAM,EACb,WAAY,IAAM,EAClB,QAAS,IAAM,CACjB,CAAC,EACD,EAAO,QAAU,EAAa,CAAW,EAGzC,IAAI,EAAgB,MAAM,UAAuB,KAAM,CACrD,WAAW,CAAC,EAAS,EAAU,GAAM,CACnC,IAAI,EACA,EAAc,GAClB,GAAI,OAAO,IAAY,UACrB,EAAc,OACd,EAAc,EACT,QAAI,GAAW,MAAQ,OAAO,IAAY,SAC/C,EAAS,EAAQ,OACjB,EAAc,EAAQ,aAAe,GAEvC,MAAM,CAAO,EACb,KAAK,KAAO,gBACZ,KAAK,YAAc,EACnB,OAAO,eAAe,KAAM,EAAe,SAAS,EACpD,GAAQ,QAAQ,6BAA6B,EAAc,KAAO,SAAS,GAAS,QAE/E,CACL,EAAO,KAAM,eAAe,QAKvB,KAAI,CAAC,EAAO,EAAU,GAAM,CACjC,OAAO,OAAO,OAAO,IAAI,KAAK,EAAM,QAAS,CAAO,EAAG,CAAK,EAEhE,EAGI,EAA2B,MAAM,UAAkC,CAAc,CAInF,WAAW,CAAC,EAAS,EAAU,GAAM,CACnC,MAAM,EAAS,CAAO,EACtB,KAAK,KAAO,2BACZ,OAAO,eAAe,KAAM,EAA0B,SAAS,QAE1D,CACL,EAAO,KAAM,0BAA0B,EAE3C,EAGI,EAAqB,MAAM,UAA4B,CAAc,CAIvE,WAAW,CAAC,EAAS,EAAU,GAAM,CACnC,MAAM,EAAS,CAAO,EACtB,KAAK,KAAO,qBACZ,OAAO,eAAe,KAAM,EAAoB,SAAS,QAEpD,CACL,EAAO,KAAM,oBAAoB,EAErC,EAGI,EAAwB,EAAO,IAAI,IAAc,SAAY,CAC/D,GAAI,EAAU,SAAW,EACvB,MAAM,IAAI,EAAc,uBAAuB,EAEjD,IAAI,EACJ,QAAW,KAAY,EACrB,GAAI,CAEF,OADoB,MAAM,EAAS,EAEnC,MAAO,EAAK,CAEZ,GADA,EAAoB,EAChB,GAAK,YACP,SAEF,MAAM,EAGV,MAAM,GACL,OAAO,EAGN,EAA6B,EAAO,CAAC,IAAgB,IAAM,QAAQ,QAAQ,CAAW,EAAG,YAAY,EAGrG,EAA0B,EAAO,CAAC,EAAU,EAAW,IAAoB,CAC7E,IAAI,EACA,EACA,EACA,EAAa,GACX,EAAmC,EAAO,SAAY,CAC1D,IAAK,EACH,EAAU,EAAS,EAErB,GAAI,CACF,EAAW,MAAM,EACjB,EAAY,GACZ,EAAa,UACb,CACA,EAAe,OAEjB,OAAO,GACN,kBAAkB,EACrB,GAAI,IAAmB,OACrB,MAAO,OAAO,IAAY,CACxB,IAAK,GAAa,GAAS,aACzB,EAAW,MAAM,EAAiB,EAEpC,OAAO,GAGX,MAAO,OAAO,IAAY,CACxB,IAAK,GAAa,GAAS,aACzB,EAAW,MAAM,EAAiB,EAEpC,GAAI,EACF,OAAO,EAET,GAAI,IAAoB,EAAgB,CAAQ,EAE9C,OADA,EAAa,GACN,EAET,GAAI,EAAU,CAAQ,EAEpB,OADA,MAAM,EAAiB,EAChB,EAET,OAAO,IAER,SAAS",
|
|
8
|
-
"debugId": "71C7EB1D858222EF64756E2164756E21",
|
|
9
|
-
"names": []
|
|
10
|
-
}
|
package/dist/chunk-tzznavpf.js
DELETED
|
@@ -1,4 +0,0 @@
|
|
|
1
|
-
// @bun
|
|
2
|
-
import{Za as E,db as v}from"./chunk-eyw5m86d.js";import{kc as O}from"./chunk-awqqsf8p.js";import"./chunk-v6kcbyg4.js";import{mc as $}from"./chunk-qj8d5qgn.js";import{wc as k,yc as C}from"./chunk-5zy36vzw.js";var u=k($(),1);var q=k(O(),1),z=k($(),1);var U=k(O(),1),j=k($(),1),V=(y,w,_)=>{let I={EcsContainer:async(b)=>{let{fromHttp:x}=await import("./chunk-xsmhw13v.js"),{fromContainerMetadata:A}=await import("./chunk-pdxpkd11.js");return _?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>j.chain(x(b??{}),A(b))().then(R)},Ec2InstanceMetadata:async(b)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:x}=await import("./chunk-pdxpkd11.js");return async()=>x(b)().then(R)},Environment:async(b)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:x}=await import("./chunk-d5bjn9jq.js");return async()=>x(b)().then(R)}};if(y in I)return I[y];else throw new j.CredentialsProviderError(`Unsupported credential source in profile ${w}. Got ${y}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:_})},R=(y)=>U.setCredentialFeature(y,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p");var X=(y,{profile:w="default",logger:_}={})=>{return Boolean(y)&&typeof y==="object"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1&&["undefined","string"].indexOf(typeof y.external_id)>-1&&["undefined","string"].indexOf(typeof y.mfa_serial)>-1&&(d(y,{profile:w,logger:_})||n(y,{profile:w,logger:_}))},d=(y,{profile:w,logger:_})=>{let I=typeof y.source_profile==="string"&&typeof y.credential_source==="undefined";if(I)_?.debug?.(` ${w} isAssumeRoleWithSourceProfile source_profile=${y.source_profile}`);return I},n=(y,{profile:w,logger:_})=>{let I=typeof y.credential_source==="string"&&typeof y.source_profile==="undefined";if(I)_?.debug?.(` ${w} isCredentialSourceProfile credential_source=${y.credential_source}`);return I},Y=async(y,w,_,I={})=>{_.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let b=w[y],{source_profile:x,region:A}=b;if(!_.roleAssumer){let{getDefaultRoleAssumer:K}=await import("./chunk-k5h445f9.js");_.roleAssumer=K({..._.clientConfig,credentialProviderLogger:_.logger,parentClientConfig:{..._?.parentClientConfig,region:A??_?.parentClientConfig?.region}},_.clientPlugins)}if(x&&x in I)throw new z.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${E(_)}. Profiles visited: `+Object.keys(I).join(", "),{logger:_.logger});_.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${x?`source_profile=[${x}]`:`profile=[${y}]`}`);let T=x?L(x,w,_,{...I,[x]:!0},W(w[x]??{})):(await V(b.credential_source,y,_.logger)(_))();if(W(b))return T.then((K)=>q.setCredentialFeature(K,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"));else{let K={RoleArn:b.role_arn,RoleSessionName:b.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:b.external_id,DurationSeconds:parseInt(b.duration_seconds||"3600",10)},{mfa_serial:B}=b;if(B){if(!_.mfaCodeProvider)throw new z.CredentialsProviderError(`Profile ${y} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:_.logger,tryNextLink:!1});K.SerialNumber=B,K.TokenCode=await _.mfaCodeProvider(B)}let P=await T;return _.roleAssumer(P,K).then((N)=>q.setCredentialFeature(N,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"))}},W=(y)=>{return!y.role_arn&&!!y.credential_source};var Z=k(O(),1),H=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.credential_process==="string",c=async(y,w)=>import("./chunk-dgsssga5.js").then(({fromProcess:_})=>_({...y,profile:w})().then((I)=>Z.setCredentialFeature(I,"CREDENTIALS_PROFILE_PROCESS","v")));var G=k(O(),1),S=async(y,w,_={})=>{let{fromSSO:I}=await import("./chunk-w19m1fcb.js");return I({profile:y,logger:_.logger,parentClientConfig:_.parentClientConfig,clientConfig:_.clientConfig})().then((b)=>{if(w.sso_session)return G.setCredentialFeature(b,"CREDENTIALS_PROFILE_SSO","r");else return G.setCredentialFeature(b,"CREDENTIALS_PROFILE_SSO_LEGACY","t")})},F=(y)=>y&&(typeof y.sso_start_url==="string"||typeof y.sso_account_id==="string"||typeof y.sso_session==="string"||typeof y.sso_region==="string"||typeof y.sso_role_name==="string");var M=k(O(),1),J=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.aws_access_key_id==="string"&&typeof y.aws_secret_access_key==="string"&&["undefined","string"].indexOf(typeof y.aws_session_token)>-1&&["undefined","string"].indexOf(typeof y.aws_account_id)>-1,Q=async(y,w)=>{w?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");let _={accessKeyId:y.aws_access_key_id,secretAccessKey:y.aws_secret_access_key,sessionToken:y.aws_session_token,...y.aws_credential_scope&&{credentialScope:y.aws_credential_scope},...y.aws_account_id&&{accountId:y.aws_account_id}};return M.setCredentialFeature(_,"CREDENTIALS_PROFILE","n")};var h=k(O(),1),D=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.web_identity_token_file==="string"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1,m=async(y,w)=>import("./chunk-yjwabzsb.js").then(({fromTokenFile:_})=>_({webIdentityTokenFile:y.web_identity_token_file,roleArn:y.role_arn,roleSessionName:y.role_session_name,roleAssumerWithWebIdentity:w.roleAssumerWithWebIdentity,logger:w.logger,parentClientConfig:w.parentClientConfig})().then((I)=>h.setCredentialFeature(I,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q")));var L=async(y,w,_,I={},b=!1)=>{let x=w[y];if(Object.keys(I).length>0&&J(x))return Q(x,_);if(b||X(x,{profile:y,logger:_.logger}))return Y(y,w,_,I);if(J(x))return Q(x,_);if(D(x))return m(x,_);if(H(x))return c(_,y);if(F(x))return await S(y,x,_);throw new u.CredentialsProviderError(`Could not resolve credentials using profile: [${y}] in configuration/credentials file(s).`,{logger:_.logger})};var ky=(y={})=>async({callerClientConfig:w}={})=>{let _={...y,parentClientConfig:{...w,...y.parentClientConfig}};_.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let I=await v(_);return L(E({profile:y.profile??w?.profile}),I,_)};export{ky as fromIni};
|
|
3
|
-
|
|
4
|
-
//# debugId=85B320B6839C09E664756E2164756E21
|
package/dist/chunk-w19m1fcb.js
DELETED
|
@@ -1,5 +0,0 @@
|
|
|
1
|
-
// @bun
|
|
2
|
-
import{$a as R,Za as I,_a as z,cb as v,db as A}from"./chunk-eyw5m86d.js";import{kc as oe}from"./chunk-awqqsf8p.js";import"./chunk-v6kcbyg4.js";import{mc as u}from"./chunk-qj8d5qgn.js";import{wc as S,yc as D}from"./chunk-5zy36vzw.js";var T=S(u(),1);var H=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var F=S(oe(),1);var x=S(u(),1);var U=300000,h="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var q=async(e,s={})=>{let{SSOOIDCClient:o}=await import("./chunk-zv5ztmxm.js");return new o(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:s.clientConfig?.logger??s.parentClientConfig?.logger}))};var W=async(e,s,o={})=>{let{CreateTokenCommand:i}=await import("./chunk-zv5ztmxm.js");return(await q(s,o)).send(new i({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var j=S(u(),1);var $=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new j.TokenProviderError(`Token is expired. ${h}`,!1)};var X=S(u(),1);var g=(e,s,o=!1)=>{if(typeof s==="undefined")throw new X.TokenProviderError(`Value not present for '${e}' in SSO Token${o?". Cannot refresh":""}. ${h}`,!1)};import{promises as Z}from"fs";var{writeFile:ee}=Z,J=(e,s)=>{let o=z(e),i=JSON.stringify(s,null,2);return ee(o,i)};var V=new Date(0),Y=(e={})=>async({callerClientConfig:s}={})=>{let o={...e,parentClientConfig:{...s,...e.parentClientConfig}};o.logger?.debug("@aws-sdk/token-providers - fromSso");let i=await A(o),r=I({profile:o.profile??s?.profile}),f=i[r];if(!f)throw new x.TokenProviderError(`Profile '${r}' could not be found in shared credentials file.`,!1);else if(!f.sso_session)throw new x.TokenProviderError(`Profile '${r}' is missing required property 'sso_session'.`);let l=f.sso_session,a=(await v(o))[l];if(!a)throw new x.TokenProviderError(`Sso session '${l}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!a[n])throw new x.TokenProviderError(`Sso session '${l}' is missing required property '${n}'.`,!1);let{sso_start_url:w,sso_region:t}=a,c;try{c=await R(l)}catch(n){throw new x.TokenProviderError(`The SSO session token associated with profile=${r} was not found or is invalid. ${h}`,!1)}g("accessToken",c.accessToken),g("expiresAt",c.expiresAt);let{accessToken:E,expiresAt:O}=c,p={token:E,expiration:new Date(O)};if(p.expiration.getTime()-Date.now()>U)return p;if(Date.now()-V.getTime()<30000)return $(p),p;g("clientId",c.clientId,!0),g("clientSecret",c.clientSecret,!0),g("refreshToken",c.refreshToken,!0);try{V.setTime(Date.now());let n=await W(c,t,o);g("accessToken",n.accessToken),g("expiresIn",n.expiresIn);let _=new Date(Date.now()+n.expiresIn*1000);try{await J(l,{...c,accessToken:n.accessToken,expiresAt:_.toISOString(),refreshToken:n.refreshToken})}catch(m){}return{token:n.accessToken,expiration:_}}catch(n){return $(p),p}};var k=S(u(),1);var N=!1,L=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:o,ssoRegion:i,ssoRoleName:r,ssoClient:f,clientConfig:l,parentClientConfig:y,profile:a,logger:w})=>{let t,c="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let d=await Y({profile:a})();t={accessToken:d.token,expiresAt:new Date(d.expiration).toISOString()}}catch(d){throw new k.CredentialsProviderError(d.message,{tryNextLink:N,logger:w})}else try{t=await R(e)}catch(d){throw new k.CredentialsProviderError("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:N,logger:w})}if(new Date(t.expiresAt).getTime()-Date.now()<=0)throw new k.CredentialsProviderError("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:N,logger:w});let{accessToken:E}=t,{SSOClient:O,GetRoleCredentialsCommand:p}=await import("./chunk-yaeec5ch.js"),n=f||new O(Object.assign({},l??{},{logger:l?.logger??y?.logger,region:l?.region??i})),_;try{_=await n.send(new p({accountId:o,roleName:r,accessToken:E}))}catch(d){throw new k.CredentialsProviderError(d,{tryNextLink:N,logger:w})}let{roleCredentials:{accessKeyId:m,secretAccessKey:C,sessionToken:M,expiration:G,credentialScope:K,accountId:b}={}}=_;if(!m||!C||!M||!G)throw new k.CredentialsProviderError("SSO returns an invalid temporary credential.",{tryNextLink:N,logger:w});let P={accessKeyId:m,secretAccessKey:C,sessionToken:M,expiration:new Date(G),...K&&{credentialScope:K},...b&&{accountId:b}};if(s)F.setCredentialFeature(P,"CREDENTIALS_SSO","s");else F.setCredentialFeature(P,"CREDENTIALS_SSO_LEGACY","u");return P};var B=S(u(),1),Q=(e,s)=>{let{sso_start_url:o,sso_account_id:i,sso_region:r,sso_role_name:f}=e;if(!o||!i||!r||!f)throw new B.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
|
|
3
|
-
Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e};var Re=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:o,ssoAccountId:i,ssoRegion:r,ssoRoleName:f,ssoSession:l}=e,{ssoClient:y}=e,a=I({profile:e.profile??s?.profile});if(!o&&!i&&!r&&!f&&!l){let t=(await A(e))[a];if(!t)throw new T.CredentialsProviderError(`Profile ${a} was not found.`,{logger:e.logger});if(!H(t))throw new T.CredentialsProviderError(`Profile ${a} is not configured with SSO credentials.`,{logger:e.logger});if(t?.sso_session){let m=(await v(e))[t.sso_session],C=` configurations in profile ${a} and sso-session ${t.sso_session}`;if(r&&r!==m.sso_region)throw new T.CredentialsProviderError("Conflicting SSO region"+C,{tryNextLink:!1,logger:e.logger});if(o&&o!==m.sso_start_url)throw new T.CredentialsProviderError("Conflicting SSO start_url"+C,{tryNextLink:!1,logger:e.logger});t.sso_region=m.sso_region,t.sso_start_url=m.sso_start_url}let{sso_start_url:c,sso_account_id:E,sso_region:O,sso_role_name:p,sso_session:n}=Q(t,e.logger);return L({ssoStartUrl:c,ssoSession:n,ssoAccountId:E,ssoRegion:O,ssoRoleName:p,ssoClient:y,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,profile:a})}else if(!o||!i||!r||!f)throw new T.CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return L({ssoStartUrl:o,ssoSession:l,ssoAccountId:i,ssoRegion:r,ssoRoleName:f,ssoClient:y,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,profile:a})};export{Q as validateSsoProfile,H as isSsoProfile,Re as fromSSO};
|
|
4
|
-
|
|
5
|
-
//# debugId=1DE24D3A331D89F164756E2164756E21
|
package/dist/chunk-xsmhw13v.js
DELETED
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
// @bun
|
|
2
|
-
import{ka as w}from"./chunk-662r0ncr.js";import{Db as I,gb as g,qb as x}from"./chunk-m65hegz2.js";import"./chunk-5saeq23h.js";import{kc as b}from"./chunk-awqqsf8p.js";import"./chunk-v6kcbyg4.js";import{mc as i}from"./chunk-qj8d5qgn.js";import{wc as m}from"./chunk-5zy36vzw.js";var E=m(b(),1);var d=m(i(),1);import v from"fs/promises";var C=m(i(),1);var u="169.254.170.2",A="169.254.170.23",O="[fd00:ec2::23]",S=(e,a)=>{if(e.protocol==="https:")return;if(e.hostname===u||e.hostname===A||e.hostname===O)return;if(e.hostname.includes("[")){if(e.hostname==="[::1]"||e.hostname==="[0000:0000:0000:0000:0000:0000:0000:0001]")return}else{if(e.hostname==="localhost")return;let c=e.hostname.split("."),r=(t)=>{let s=parseInt(t,10);return 0<=s&&s<=255};if(c[0]==="127"&&r(c[1])&&r(c[2])&&r(c[3])&&c.length===4)return}throw new C.CredentialsProviderError(`URL not accepted. It must either be HTTPS or match one of the following:
|
|
3
|
-
- loopback CIDR 127.0.0.0/8 or [::1/128]
|
|
4
|
-
- ECS container host 169.254.170.2
|
|
5
|
-
- EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:a})};var o=m(i(),1);function P(e){return new g({protocol:e.protocol,hostname:e.hostname,port:Number(e.port),path:e.pathname,query:Array.from(e.searchParams.entries()).reduce((a,[c,r])=>{return a[c]=r,a},{}),fragment:e.hash})}async function K(e,a){let r=await w(e.body).transformToString();if(e.statusCode===200){let t=JSON.parse(r);if(typeof t.AccessKeyId!=="string"||typeof t.SecretAccessKey!=="string"||typeof t.Token!=="string"||typeof t.Expiration!=="string")throw new o.CredentialsProviderError("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:a});return{accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,sessionToken:t.Token,expiration:I(t.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let t={};try{t=JSON.parse(r)}catch(s){}throw Object.assign(new o.CredentialsProviderError(`Server responded with status: ${e.statusCode}`,{logger:a}),{Code:t.Code,Message:t.Message})}throw new o.CredentialsProviderError(`Server responded with status: ${e.statusCode}`,{logger:a})}var T=(e,a,c)=>{return async()=>{for(let r=0;r<a;++r)try{return await e()}catch(t){await new Promise((s)=>setTimeout(s,c))}return await e()}};var _="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",B="http://169.254.170.2",D="AWS_CONTAINER_CREDENTIALS_FULL_URI",M="AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE",N="AWS_CONTAINER_AUTHORIZATION_TOKEN",j=(e={})=>{e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let a,c=e.awsContainerCredentialsRelativeUri??process.env[_],r=e.awsContainerCredentialsFullUri??process.env[D],t=e.awsContainerAuthorizationToken??process.env[N],s=e.awsContainerAuthorizationTokenFile??process.env[M],n=e.logger?.constructor?.name==="NoOpLogger"||!e.logger?console.warn:e.logger.warn;if(c&&r)n("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),n("awsContainerCredentialsFullUri will take precedence.");if(t&&s)n("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),n("awsContainerAuthorizationToken will take precedence.");if(r)a=r;else if(c)a=`${B}${c}`;else throw new d.CredentialsProviderError(`No HTTP credential provider host provided.
|
|
6
|
-
Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:e.logger});let y=new URL(a);S(y,e.logger);let R=new x({requestTimeout:e.timeout??1000,connectionTimeout:e.timeout??1000});return T(async()=>{let f=P(y);if(t)f.headers.Authorization=t;else if(s)f.headers.Authorization=(await v.readFile(s)).toString();try{let h=await R.handle(f);return K(h.response).then((p)=>E.setCredentialFeature(p,"CREDENTIALS_HTTP","z"))}catch(h){throw new d.CredentialsProviderError(String(h),{logger:e.logger})}},e.maxRetries??3,e.timeout??1000)};export{j as fromHttp};
|
|
7
|
-
|
|
8
|
-
//# debugId=C5093FB613EC4E3E64756E2164756E21
|
package/dist/chunk-yjwabzsb.js
DELETED
|
@@ -1,4 +0,0 @@
|
|
|
1
|
-
// @bun
|
|
2
|
-
import{kc as T}from"./chunk-awqqsf8p.js";import{mc as f}from"./chunk-qj8d5qgn.js";import{wc as E,yc as p}from"./chunk-5zy36vzw.js";var c=E(T(),1),N=E(f(),1);import{readFileSync as A}from"fs";var i=(e)=>async(o)=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");let{roleArn:r,roleSessionName:s,webIdentityToken:n,providerId:S,policyArns:d,policy:l,durationSeconds:m}=e,{roleAssumerWithWebIdentity:t}=e;if(!t){let{getDefaultRoleAssumerWithWebIdentity:a}=await import("./chunk-k5h445f9.js");t=a({...e.clientConfig,credentialProviderLogger:e.logger,parentClientConfig:{...o?.callerClientConfig,...e.parentClientConfig}},e.clientPlugins)}return t({RoleArn:r,RoleSessionName:s??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:n,ProviderId:S,PolicyArns:d,Policy:l,DurationSeconds:m})};var _="AWS_WEB_IDENTITY_TOKEN_FILE",I="AWS_ROLE_ARN",O="AWS_ROLE_SESSION_NAME",k=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");let o=e?.webIdentityTokenFile??process.env[_],r=e?.roleArn??process.env[I],s=e?.roleSessionName??process.env[O];if(!o||!r)throw new N.CredentialsProviderError("Web identity configuration not specified",{logger:e.logger});let n=await i({...e,webIdentityToken:A(o,{encoding:"ascii"}),roleArn:r,roleSessionName:s})();if(o===process.env[_])c.setCredentialFeature(n,"CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN","h");return n};export{i as fromWebToken,k as fromTokenFile};
|
|
3
|
-
|
|
4
|
-
//# debugId=F8C6363824E0544F64756E2164756E21
|
package/dist/chunk-zv5ztmxm.js
DELETED
|
@@ -1,4 +0,0 @@
|
|
|
1
|
-
// @bun
|
|
2
|
-
import{a as gr,b as jr,c as nr,d as ir,e as Ir,f as ar,g as Se,h as fr,i as kr,j as Nr,k as we,l as wr,m as Ne,n as Cr,o as Ar,p as Gr,q as Hr,r as Lr,s as mr}from"./chunk-fhx0vt7d.js";import{Vb as Oe,Wb as hr,Xb as W,Zb as E,_b as w}from"./chunk-bq3ssfcb.js";import{ac as $r,dc as Pr,ec as Sr,gc as Tr}from"./chunk-5saeq23h.js";import"./chunk-awqqsf8p.js";import"./chunk-v6kcbyg4.js";import"./chunk-qj8d5qgn.js";import{vc as Mr}from"./chunk-4kkyjz2j.js";import{xc as d}from"./chunk-5zy36vzw.js";var L=d((X)=>{Object.defineProperty(X,"__esModule",{value:!0});X.resolveHttpAuthSchemeConfig=X.defaultSSOOIDCHttpAuthSchemeProvider=X.defaultSSOOIDCHttpAuthSchemeParametersProvider=void 0;var xe=w(),H=Oe(),ce=async(e,r,l)=>{return{operation:H.getSmithyContext(r).operation,region:await H.normalizeProvider(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};X.defaultSSOOIDCHttpAuthSchemeParametersProvider=ce;function oe(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:(r,l)=>({signingProperties:{config:r,context:l}})}}function ue(e){return{schemeId:"smithy.api#noAuth"}}var pe=(e)=>{let r=[];switch(e.operation){case"CreateToken":{r.push(ue(e));break}default:r.push(oe(e))}return r};X.defaultSSOOIDCHttpAuthSchemeProvider=pe;var te=(e)=>{let r=xe.resolveAwsSdkSigV4Config(e);return Object.assign(r,{authSchemePreference:H.normalizeProvider(e.authSchemePreference??[])})};X.resolveHttpAuthSchemeConfig=te});var p=d((o)=>{Object.defineProperty(o,"__esModule",{value:!0});o.ruleSet=void 0;var m="required",S="fn",N="argv",U="ref",J=!0,Q="isSet",k="booleanEquals",F="error",_="endpoint",s="tree",V="PartitionResult",b="getAttr",Z={[m]:!1,type:"String"},$={[m]:!0,default:!1,type:"Boolean"},h={[U]:"Endpoint"},O={[S]:k,[N]:[{[U]:"UseFIPS"},!0]},x={[S]:k,[N]:[{[U]:"UseDualStack"},!0]},P={},g={[S]:b,[N]:[{[U]:V},"supportsFIPS"]},c={[U]:V},j={[S]:k,[N]:[!0,{[S]:b,[N]:[c,"supportsDualStack"]}]},n=[O],a=[x],f=[{[U]:"Region"}],lr={version:"1.0",parameters:{Region:Z,UseDualStack:$,UseFIPS:$,Endpoint:Z},rules:[{conditions:[{[S]:Q,[N]:[h]}],rules:[{conditions:n,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:F},{conditions:a,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:F},{endpoint:{url:h,properties:P,headers:P},type:_}],type:s},{conditions:[{[S]:Q,[N]:f}],rules:[{conditions:[{[S]:"aws.partition",[N]:f,assign:V}],rules:[{conditions:[O,x],rules:[{conditions:[{[S]:k,[N]:[J,g]},j],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:P,headers:P},type:_}],type:s},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:F}],type:s},{conditions:n,rules:[{conditions:[{[S]:k,[N]:[g,J]}],rules:[{conditions:[{[S]:"stringEquals",[N]:[{[S]:b,[N]:[c,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:P,headers:P},type:_},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:P,headers:P},type:_}],type:s},{error:"FIPS is enabled but this partition does not support FIPS",type:F}],type:s},{conditions:a,rules:[{conditions:[j],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:P,headers:P},type:_}],type:s},{error:"DualStack is enabled but this partition does not support DualStack",type:F}],type:s},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:P,headers:P},type:_}],type:s}],type:s},{error:"Invalid Configuration: Missing Region",type:F}]};o.ruleSet=lr});var re=d((t)=>{Object.defineProperty(t,"__esModule",{value:!0});t.defaultEndpointResolver=void 0;var vr=Ir(),B=ir(),Dr=p(),qr=new B.EndpointCache({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),yr=(e,r={})=>{return qr.get(e,()=>B.resolveEndpoint(Dr.ruleSet,{endpointParams:e,logger:r.logger}))};t.defaultEndpointResolver=yr;B.customEndpointFunctions.aws=vr.awsEndpointFunctions});var De=d((Ie)=>{Object.defineProperty(Ie,"__esModule",{value:!0});Ie.getRuntimeConfig=void 0;var Rr=w(),Er=W(),sr=E(),dr=Nr(),le=Sr(),ie=Pr(),Fr=L(),_r=re(),Ur=(e)=>{return{apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??le.fromBase64,base64Encoder:e?.base64Encoder??le.toBase64,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??_r.defaultEndpointResolver,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??Fr.defaultSSOOIDCHttpAuthSchemeProvider,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(r)=>r.getIdentityProvider("aws.auth#sigv4"),signer:new Rr.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(r)=>r.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new Er.NoAuthSigner}],logger:e?.logger??new sr.NoOpLogger,serviceId:e?.serviceId??"SSO OIDC",urlParser:e?.urlParser??dr.parseUrl,utf8Decoder:e?.utf8Decoder??ie.fromUtf8,utf8Encoder:e?.utf8Encoder??ie.toUtf8}};Ie.getRuntimeConfig=Ur});var se=d((Re)=>{Object.defineProperty(Re,"__esModule",{value:!0});Re.getRuntimeConfig=void 0;var Vr=Mr(),br=Vr.__importDefault(Cr()),Br=w(),qe=Ar(),C=Se(),Wr=Gr(),ye=Ne(),M=kr(),Pe=Tr(),Yr=Hr(),Kr=wr(),Xr=De(),zr=E(),Jr=Lr(),Qr=E(),Zr=(e)=>{Qr.emitWarningIfUnsupportedVersion(process.version);let r=Jr.resolveDefaultsModeConfig(e),l=()=>r().then(zr.loadConfigsForDefaultMode),v=Xr.getRuntimeConfig(e);Br.emitWarningIfUnsupportedVersion(process.version);let I={profile:e?.profile};return{...v,...e,runtime:"node",defaultsMode:r,bodyLengthChecker:e?.bodyLengthChecker??Yr.calculateBodyLength,defaultUserAgentProvider:e?.defaultUserAgentProvider??qe.createDefaultUserAgentProvider({serviceId:v.serviceId,clientVersion:br.default.version}),maxAttempts:e?.maxAttempts??M.loadConfig(ye.NODE_MAX_ATTEMPT_CONFIG_OPTIONS,e),region:e?.region??M.loadConfig(C.NODE_REGION_CONFIG_OPTIONS,{...C.NODE_REGION_CONFIG_FILE_OPTIONS,...I}),requestHandler:Pe.NodeHttpHandler.create(e?.requestHandler??l),retryMode:e?.retryMode??M.loadConfig({...ye.NODE_RETRY_MODE_CONFIG_OPTIONS,default:async()=>(await l()).retryMode||Kr.DEFAULT_RETRY_MODE},e),sha256:e?.sha256??Wr.Hash.bind(null,"sha256"),streamCollector:e?.streamCollector??Pe.streamCollector,useDualstackEndpoint:e?.useDualstackEndpoint??M.loadConfig(C.NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS,I),useFipsEndpoint:e?.useFipsEndpoint??M.loadConfig(C.NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS,I),userAgentAppId:e?.userAgentAppId??M.loadConfig(qe.NODE_APP_ID_CONFIG_OPTIONS,I)}};Re.getRuntimeConfig=Zr});var Wl=d((Ql,je)=>{var{defineProperty:A,getOwnPropertyDescriptor:Or,getOwnPropertyNames:xr}=Object,cr=Object.prototype.hasOwnProperty,D=(e,r)=>A(e,"name",{value:r,configurable:!0}),or=(e,r)=>{for(var l in r)A(e,l,{get:r[l],enumerable:!0})},ur=(e,r,l,v)=>{if(r&&typeof r==="object"||typeof r==="function"){for(let I of xr(r))if(!cr.call(e,I)&&I!==l)A(e,I,{get:()=>r[I],enumerable:!(v=Or(r,I))||v.enumerable})}return e},pr=(e)=>ur(A({},"__esModule",{value:!0}),e),Ce={};or(Ce,{$Command:()=>He.Command,AccessDeniedException:()=>Le,AuthorizationPendingException:()=>Ve,CreateTokenCommand:()=>he,CreateTokenRequestFilterSensitiveLog:()=>be,CreateTokenResponseFilterSensitiveLog:()=>Be,ExpiredTokenException:()=>We,InternalServerException:()=>Ye,InvalidClientException:()=>Ke,InvalidGrantException:()=>Xe,InvalidRequestException:()=>ze,InvalidScopeException:()=>Je,SSOOIDC:()=>ge,SSOOIDCClient:()=>Ge,SSOOIDCServiceException:()=>y,SlowDownException:()=>Qe,UnauthorizedClientException:()=>Ze,UnsupportedGrantTypeException:()=>$e,__Client:()=>Ae.Client});je.exports=pr(Ce);var de=gr(),tr=jr(),el=nr(),Fe=ar(),rl=Se(),Y=W(),ll=fr(),il=we(),_e=Ne(),Ae=E(),Ue=L(),Il=D((e)=>{return Object.assign(e,{useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"})},"resolveClientEndpointParameters"),vl={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}},Dl=se(),Me=mr(),Te=$r(),ke=E(),ql=D((e)=>{let{httpAuthSchemes:r,httpAuthSchemeProvider:l,credentials:v}=e;return{setHttpAuthScheme(I){let q=r.findIndex((G)=>G.schemeId===I.schemeId);if(q===-1)r.push(I);else r.splice(q,1,I)},httpAuthSchemes(){return r},setHttpAuthSchemeProvider(I){l=I},httpAuthSchemeProvider(){return l},setCredentials(I){v=I},credentials(){return v}}},"getHttpAuthExtensionConfiguration"),yl=D((e)=>{return{httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}},"resolveHttpAuthRuntimeConfig"),Pl=D((e,r)=>{let l=Object.assign(Me.getAwsRegionExtensionConfiguration(e),ke.getDefaultExtensionConfiguration(e),Te.getHttpHandlerExtensionConfiguration(e),ql(e));return r.forEach((v)=>v.configure(l)),Object.assign(e,Me.resolveAwsRegionExtensionConfiguration(l),ke.resolveDefaultRuntimeConfig(l),Te.resolveHttpHandlerRuntimeConfig(l),yl(l))},"resolveRuntimeExtensions"),Ge=class extends Ae.Client{static{D(this,"SSOOIDCClient")}config;constructor(...[e]){let r=Dl.getRuntimeConfig(e||{});super(r);this.initConfig=r;let l=Il(r),v=Fe.resolveUserAgentConfig(l),I=_e.resolveRetryConfig(v),q=rl.resolveRegionConfig(I),G=de.resolveHostHeaderConfig(q),ne=il.resolveEndpointConfig(G),ae=Ue.resolveHttpAuthSchemeConfig(ne),fe=Pl(ae,e?.extensions||[]);this.config=fe,this.middlewareStack.use(Fe.getUserAgentPlugin(this.config)),this.middlewareStack.use(_e.getRetryPlugin(this.config)),this.middlewareStack.use(ll.getContentLengthPlugin(this.config)),this.middlewareStack.use(de.getHostHeaderPlugin(this.config)),this.middlewareStack.use(tr.getLoggerPlugin(this.config)),this.middlewareStack.use(el.getRecursionDetectionPlugin(this.config)),this.middlewareStack.use(Y.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Ue.defaultSSOOIDCHttpAuthSchemeParametersProvider,identityProviderConfigProvider:D(async(me)=>new Y.DefaultIdentityProviderConfig({"aws.auth#sigv4":me.credentials}),"identityProviderConfigProvider")})),this.middlewareStack.use(Y.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}},Sl=E(),Nl=we(),Rl=hr(),He=E(),T=E(),El=E(),y=class e extends El.ServiceException{static{D(this,"SSOOIDCServiceException")}constructor(r){super(r);Object.setPrototypeOf(this,e.prototype)}},Le=class e extends y{static{D(this,"AccessDeniedException")}name="AccessDeniedException";$fault="client";error;error_description;constructor(r){super({name:"AccessDeniedException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},Ve=class e extends y{static{D(this,"AuthorizationPendingException")}name="AuthorizationPendingException";$fault="client";error;error_description;constructor(r){super({name:"AuthorizationPendingException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},be=D((e)=>({...e,...e.clientSecret&&{clientSecret:T.SENSITIVE_STRING},...e.refreshToken&&{refreshToken:T.SENSITIVE_STRING},...e.codeVerifier&&{codeVerifier:T.SENSITIVE_STRING}}),"CreateTokenRequestFilterSensitiveLog"),Be=D((e)=>({...e,...e.accessToken&&{accessToken:T.SENSITIVE_STRING},...e.refreshToken&&{refreshToken:T.SENSITIVE_STRING},...e.idToken&&{idToken:T.SENSITIVE_STRING}}),"CreateTokenResponseFilterSensitiveLog"),We=class e extends y{static{D(this,"ExpiredTokenException")}name="ExpiredTokenException";$fault="client";error;error_description;constructor(r){super({name:"ExpiredTokenException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},Ye=class e extends y{static{D(this,"InternalServerException")}name="InternalServerException";$fault="server";error;error_description;constructor(r){super({name:"InternalServerException",$fault:"server",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},Ke=class e extends y{static{D(this,"InvalidClientException")}name="InvalidClientException";$fault="client";error;error_description;constructor(r){super({name:"InvalidClientException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},Xe=class e extends y{static{D(this,"InvalidGrantException")}name="InvalidGrantException";$fault="client";error;error_description;constructor(r){super({name:"InvalidGrantException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},ze=class e extends y{static{D(this,"InvalidRequestException")}name="InvalidRequestException";$fault="client";error;error_description;constructor(r){super({name:"InvalidRequestException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},Je=class e extends y{static{D(this,"InvalidScopeException")}name="InvalidScopeException";$fault="client";error;error_description;constructor(r){super({name:"InvalidScopeException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},Qe=class e extends y{static{D(this,"SlowDownException")}name="SlowDownException";$fault="client";error;error_description;constructor(r){super({name:"SlowDownException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},Ze=class e extends y{static{D(this,"UnauthorizedClientException")}name="UnauthorizedClientException";$fault="client";error;error_description;constructor(r){super({name:"UnauthorizedClientException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},$e=class e extends y{static{D(this,"UnsupportedGrantTypeException")}name="UnsupportedGrantTypeException";$fault="client";error;error_description;constructor(r){super({name:"UnsupportedGrantTypeException",$fault:"client",...r});Object.setPrototypeOf(this,e.prototype),this.error=r.error,this.error_description=r.error_description}},K=w(),sl=W(),i=E(),dl=D(async(e,r)=>{let l=sl.requestBuilder(e,r),v={"content-type":"application/json"};l.bp("/token");let I;return I=JSON.stringify(i.take(e,{clientId:[],clientSecret:[],code:[],codeVerifier:[],deviceCode:[],grantType:[],redirectUri:[],refreshToken:[],scope:D((q)=>i._json(q),"scope")})),l.m("POST").h(v).b(I),l.build()},"se_CreateTokenCommand"),Fl=D(async(e,r)=>{if(e.statusCode!==200&&e.statusCode>=300)return _l(e,r);let l=i.map({$metadata:R(e)}),v=i.expectNonNull(i.expectObject(await K.parseJsonBody(e.body,r)),"body"),I=i.take(v,{accessToken:i.expectString,expiresIn:i.expectInt32,idToken:i.expectString,refreshToken:i.expectString,tokenType:i.expectString});return Object.assign(l,I),l},"de_CreateTokenCommand"),_l=D(async(e,r)=>{let l={...e,body:await K.parseJsonErrorBody(e.body,r)},v=K.loadRestJsonErrorCode(e,l.body);switch(v){case"AccessDeniedException":case"com.amazonaws.ssooidc#AccessDeniedException":throw await Ml(l,r);case"AuthorizationPendingException":case"com.amazonaws.ssooidc#AuthorizationPendingException":throw await Tl(l,r);case"ExpiredTokenException":case"com.amazonaws.ssooidc#ExpiredTokenException":throw await kl(l,r);case"InternalServerException":case"com.amazonaws.ssooidc#InternalServerException":throw await wl(l,r);case"InvalidClientException":case"com.amazonaws.ssooidc#InvalidClientException":throw await Cl(l,r);case"InvalidGrantException":case"com.amazonaws.ssooidc#InvalidGrantException":throw await Al(l,r);case"InvalidRequestException":case"com.amazonaws.ssooidc#InvalidRequestException":throw await Gl(l,r);case"InvalidScopeException":case"com.amazonaws.ssooidc#InvalidScopeException":throw await Hl(l,r);case"SlowDownException":case"com.amazonaws.ssooidc#SlowDownException":throw await Ll(l,r);case"UnauthorizedClientException":case"com.amazonaws.ssooidc#UnauthorizedClientException":throw await Vl(l,r);case"UnsupportedGrantTypeException":case"com.amazonaws.ssooidc#UnsupportedGrantTypeException":throw await bl(l,r);default:let I=l.body;return Ul({output:e,parsedBody:I,errorCode:v})}},"de_CommandError"),Ul=i.withBaseException(y),Ml=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new Le({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_AccessDeniedExceptionRes"),Tl=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new Ve({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_AuthorizationPendingExceptionRes"),kl=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new We({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_ExpiredTokenExceptionRes"),wl=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new Ye({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_InternalServerExceptionRes"),Cl=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new Ke({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_InvalidClientExceptionRes"),Al=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new Xe({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_InvalidGrantExceptionRes"),Gl=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new ze({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_InvalidRequestExceptionRes"),Hl=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new Je({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_InvalidScopeExceptionRes"),Ll=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new Qe({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_SlowDownExceptionRes"),Vl=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new Ze({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_UnauthorizedClientExceptionRes"),bl=D(async(e,r)=>{let l=i.map({}),v=e.body,I=i.take(v,{error:i.expectString,error_description:i.expectString});Object.assign(l,I);let q=new $e({$metadata:R(e),...l});return i.decorateServiceException(q,e.body)},"de_UnsupportedGrantTypeExceptionRes"),R=D((e)=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]}),"deserializeMetadata"),he=class extends He.Command.classBuilder().ep(vl).m(function(e,r,l,v){return[Rl.getSerdePlugin(l,this.serialize,this.deserialize),Nl.getEndpointPlugin(l,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").f(be,Be).ser(dl).de(Fl).build(){static{D(this,"CreateTokenCommand")}},Bl={CreateTokenCommand:he},ge=class extends Ge{static{D(this,"SSOOIDC")}};Sl.createAggregatedClient(Bl,ge)});export default Wl();
|
|
3
|
-
|
|
4
|
-
//# debugId=21F3F7FFDD3D50C564756E2164756E21
|
|
File without changes
|