gemi 0.19.1 → 0.19.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (108) hide show
  1. package/dist/app/index.js +2 -2
  2. package/dist/app/index.js.map +1 -1
  3. package/dist/broadcasting/index.js +1 -1
  4. package/dist/{chunk-qc23kc53.js → chunk-2cfneq8g.js} +3 -3
  5. package/dist/{chunk-qc23kc53.js.map → chunk-2cfneq8g.js.map} +1 -1
  6. package/dist/chunk-2j91yc5g.js +4 -0
  7. package/dist/{chunk-bk09ychd.js.map → chunk-2j91yc5g.js.map} +4 -4
  8. package/dist/{chunk-07ca4ceg.js → chunk-6erxq55m.js} +1 -1
  9. package/dist/{chunk-ppdzh5mp.js → chunk-79ag9kvz.js} +3 -3
  10. package/dist/{chunk-ppdzh5mp.js.map → chunk-79ag9kvz.js.map} +1 -1
  11. package/dist/{chunk-298z5w9p.js → chunk-7pb9p4tj.js} +2 -2
  12. package/dist/{chunk-298z5w9p.js.map → chunk-7pb9p4tj.js.map} +1 -1
  13. package/dist/{chunk-qjf58f31.js → chunk-8xspwewa.js} +2 -2
  14. package/dist/{chunk-qjf58f31.js.map → chunk-8xspwewa.js.map} +1 -1
  15. package/dist/{chunk-bvf4sg7q.js → chunk-946x83cd.js} +2 -2
  16. package/dist/{chunk-bvf4sg7q.js.map → chunk-946x83cd.js.map} +1 -1
  17. package/dist/{chunk-cm0h7j42.js → chunk-9khdm7dc.js} +2 -2
  18. package/dist/{chunk-cm0h7j42.js.map → chunk-9khdm7dc.js.map} +1 -1
  19. package/dist/chunk-bxy6tqt8.js +4 -0
  20. package/dist/{chunk-3fsjzd51.js.map → chunk-bxy6tqt8.js.map} +2 -2
  21. package/dist/{chunk-72dc851j.js → chunk-cr3jz0qz.js} +3 -3
  22. package/dist/{chunk-72dc851j.js.map → chunk-cr3jz0qz.js.map} +1 -1
  23. package/dist/chunk-ezyz3gaq.js +4 -0
  24. package/dist/{chunk-b1z8jxf5.js.map → chunk-ezyz3gaq.js.map} +2 -2
  25. package/dist/chunk-gvtcy7a2.js +5 -0
  26. package/dist/{chunk-vfh6axzv.js.map → chunk-gvtcy7a2.js.map} +5 -5
  27. package/dist/chunk-hq6bnmbe.js +4 -0
  28. package/dist/{chunk-mm30bjah.js.map → chunk-hq6bnmbe.js.map} +1 -1
  29. package/dist/{chunk-cq0rr00v.js → chunk-j42e2g1d.js} +3 -3
  30. package/dist/{chunk-cq0rr00v.js.map → chunk-j42e2g1d.js.map} +1 -1
  31. package/dist/{chunk-s5qgyzqp.js → chunk-jwcetzcw.js} +2 -2
  32. package/dist/{chunk-s5qgyzqp.js.map → chunk-jwcetzcw.js.map} +1 -1
  33. package/dist/chunk-kcvz59db.js +5 -0
  34. package/dist/{chunk-8bdb28e6.js.map → chunk-kcvz59db.js.map} +2 -2
  35. package/dist/chunk-kejrbrr5.js +8 -0
  36. package/dist/{chunk-qt06jfw0.js.map → chunk-kejrbrr5.js.map} +2 -2
  37. package/dist/{chunk-1t8qmpmj.js → chunk-kwn176pr.js} +4 -4
  38. package/dist/{chunk-1t8qmpmj.js.map → chunk-kwn176pr.js.map} +4 -3
  39. package/dist/{chunk-xsx083wr.js → chunk-m88m39d2.js} +2 -2
  40. package/dist/{chunk-xsx083wr.js.map → chunk-m88m39d2.js.map} +1 -1
  41. package/dist/{chunk-cfewfaa5.js → chunk-njj6q7xt.js} +2 -2
  42. package/dist/{chunk-cfewfaa5.js.map → chunk-njj6q7xt.js.map} +1 -1
  43. package/dist/chunk-q04g7v20.js +5 -0
  44. package/dist/{chunk-wpetevqp.js.map → chunk-q04g7v20.js.map} +6 -6
  45. package/dist/{chunk-qsz6b41a.js → chunk-q4m9fgvw.js} +2 -2
  46. package/dist/{chunk-qsz6b41a.js.map → chunk-q4m9fgvw.js.map} +1 -1
  47. package/dist/chunk-r9vkr7kz.js +27 -0
  48. package/dist/{chunk-4fwt0fyj.js.map → chunk-r9vkr7kz.js.map} +4 -3
  49. package/dist/chunk-rcz6xqsr.js +4 -0
  50. package/dist/{chunk-w0p5vk3n.js.map → chunk-rcz6xqsr.js.map} +5 -5
  51. package/dist/chunk-shx43qev.js +3 -0
  52. package/dist/{chunk-415np062.js.map → chunk-shx43qev.js.map} +8 -11
  53. package/dist/chunk-szs1nkf4.js +4 -0
  54. package/dist/{chunk-8ag21jpk.js.map → chunk-szs1nkf4.js.map} +2 -2
  55. package/dist/chunk-xg82xtdy.js +4 -0
  56. package/dist/{chunk-99j22tkv.js.map → chunk-xg82xtdy.js.map} +2 -2
  57. package/dist/chunk-xn8m1vjf.js +3 -0
  58. package/dist/chunk-xn8m1vjf.js.map +15 -0
  59. package/dist/{chunk-fmwhbymf.js → chunk-y8ggk3r3.js} +2 -2
  60. package/dist/{chunk-fmwhbymf.js.map → chunk-y8ggk3r3.js.map} +1 -1
  61. package/dist/chunk-zdmjddvp.js +4 -0
  62. package/dist/{chunk-616257hy.js.map → chunk-zdmjddvp.js.map} +2 -2
  63. package/dist/chunk-zeyq4p6y.js +4 -0
  64. package/dist/{chunk-6j49em7j.js.map → chunk-zeyq4p6y.js.map} +5 -5
  65. package/dist/{chunk-44ec3e65.js → chunk-zja5jcxt.js} +3 -3
  66. package/dist/{chunk-44ec3e65.js.map → chunk-zja5jcxt.js.map} +1 -1
  67. package/dist/client/auth/useUser.d.ts +27 -2
  68. package/dist/client/auth/useUser.d.ts.map +1 -1
  69. package/dist/client/index.js +29 -25
  70. package/dist/client/index.js.map +1 -1
  71. package/dist/client/isPlainObject.d.ts +2 -0
  72. package/dist/client/isPlainObject.d.ts.map +1 -0
  73. package/dist/client/useQuery.d.ts +6 -12
  74. package/dist/client/useQuery.d.ts.map +1 -1
  75. package/dist/email/index.js +1 -1
  76. package/dist/facades/index.js +3 -3
  77. package/dist/facades/index.js.map +1 -1
  78. package/dist/http/HttpRequest.d.ts.map +1 -1
  79. package/dist/http/index.js +2 -2
  80. package/dist/http/index.js.map +3 -3
  81. package/dist/i18n/index.js +1 -1
  82. package/dist/kernel/index.js +2 -2
  83. package/dist/kernel/index.js.map +1 -1
  84. package/dist/server/index.js +2 -2
  85. package/dist/server/index.js.map +1 -1
  86. package/dist/services/index.js +73 -62
  87. package/dist/services/index.js.map +18 -6
  88. package/dist/utils/type.d.ts +3 -0
  89. package/dist/utils/type.d.ts.map +1 -1
  90. package/package.json +1 -1
  91. package/dist/chunk-3fsjzd51.js +0 -4
  92. package/dist/chunk-415np062.js +0 -4
  93. package/dist/chunk-4fwt0fyj.js +0 -27
  94. package/dist/chunk-616257hy.js +0 -4
  95. package/dist/chunk-6j49em7j.js +0 -4
  96. package/dist/chunk-8ag21jpk.js +0 -4
  97. package/dist/chunk-8bdb28e6.js +0 -5
  98. package/dist/chunk-99j22tkv.js +0 -4
  99. package/dist/chunk-b1z8jxf5.js +0 -4
  100. package/dist/chunk-bk09ychd.js +0 -4
  101. package/dist/chunk-eznd0gdt.js +0 -4
  102. package/dist/chunk-eznd0gdt.js.map +0 -10
  103. package/dist/chunk-mm30bjah.js +0 -4
  104. package/dist/chunk-qt06jfw0.js +0 -8
  105. package/dist/chunk-vfh6axzv.js +0 -5
  106. package/dist/chunk-w0p5vk3n.js +0 -4
  107. package/dist/chunk-wpetevqp.js +0 -5
  108. /package/dist/{chunk-07ca4ceg.js.map → chunk-6erxq55m.js.map} +0 -0
@@ -1,5 +0,0 @@
1
- import{$b as Q2,Xb as f0,Yb as X$,Zb as $7,ac as rj,bc as W2}from"./chunk-4fwt0fyj.js";import{cc as l,ec as o2,fc as t2}from"./chunk-72dc851j.js";import{mc as S1}from"./chunk-cq0rr00v.js";import{nc as a0}from"./chunk-eznd0gdt.js";import{yc as q,zc as F}from"./chunk-fmwhbymf.js";var a5=q((Fz,D1)=>{var{defineProperty:r,getOwnPropertyDescriptor:c5,getOwnPropertyNames:d5}=Object,l5=Object.prototype.hasOwnProperty,n=(j,$)=>r(j,"name",{value:$,configurable:!0}),_5=(j,$)=>{for(var z in $)r(j,z,{get:$[z],enumerable:!0})},s5=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of d5($))if(!l5.call(j,Q)&&Q!==z)r(j,Q,{get:()=>$[Q],enumerable:!(W=c5($,Q))||W.enumerable})}return j},m5=(j)=>s5(r({},"__esModule",{value:!0}),j),L1={};_5(L1,{getHostHeaderPlugin:()=>i5,hostHeaderMiddleware:()=>b1,hostHeaderMiddlewareOptions:()=>F1,resolveHostHeaderConfig:()=>M1});D1.exports=m5(L1);var p5=l();function M1(j){return j}n(M1,"resolveHostHeaderConfig");var b1=n((j)=>($)=>async(z)=>{if(!p5.HttpRequest.isInstance(z.request))return $(z);let{request:W}=z,{handlerProtocol:Q=""}=j.requestHandler.metadata||{};if(Q.indexOf("h2")>=0&&!W.headers[":authority"])delete W.headers.host,W.headers[":authority"]=W.hostname+(W.port?":"+W.port:"");else if(!W.headers.host){let Z=W.hostname;if(W.port!=null)Z+=`:${W.port}`;W.headers.host=Z}return $(z)},"hostHeaderMiddleware"),F1={name:"hostHeaderMiddleware",step:"build",priority:"low",tags:["HOST"],override:!0},i5=n((j)=>({applyToStack:n(($)=>{$.add(b1(j),F1)},"applyToStack")}),"getHostHeaderPlugin")});var zj=q((Dz,C1)=>{var{defineProperty:o,getOwnPropertyDescriptor:n5,getOwnPropertyNames:r5}=Object,o5=Object.prototype.hasOwnProperty,R0=(j,$)=>o(j,"name",{value:$,configurable:!0}),t5=(j,$)=>{for(var z in $)o(j,z,{get:$[z],enumerable:!0})},e5=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of r5($))if(!o5.call(j,Q)&&Q!==z)o(j,Q,{get:()=>$[Q],enumerable:!(W=n5($,Q))||W.enumerable})}return j},jj=(j)=>e5(o({},"__esModule",{value:!0}),j),h1={};t5(h1,{getLoggerPlugin:()=>$j,loggerMiddleware:()=>N1,loggerMiddlewareOptions:()=>O1});C1.exports=jj(h1);var N1=R0(()=>(j,$)=>async(z)=>{try{let W=await j(z),{clientName:Q,commandName:Z,logger:X,dynamoDbDocumentClientOptions:J={}}=$,{overrideInputFilterSensitiveLog:K,overrideOutputFilterSensitiveLog:G}=J,V=K??$.inputFilterSensitiveLog,Y=G??$.outputFilterSensitiveLog,{$metadata:B,...b}=W.output;return X?.info?.({clientName:Q,commandName:Z,input:V(z.input),output:Y(b),metadata:B}),W}catch(W){let{clientName:Q,commandName:Z,logger:X,dynamoDbDocumentClientOptions:J={}}=$,{overrideInputFilterSensitiveLog:K}=J,G=K??$.inputFilterSensitiveLog;throw X?.error?.({clientName:Q,commandName:Z,input:G(z.input),error:W,metadata:W.$metadata}),W}},"loggerMiddleware"),O1={name:"loggerMiddleware",tags:["LOGGER"],step:"initialize",override:!0},$j=R0((j)=>({applyToStack:R0(($)=>{$.add(N1(),O1)},"applyToStack")}),"getLoggerPlugin")});var Vj=q((hz,R1)=>{var{defineProperty:e,getOwnPropertyDescriptor:Qj,getOwnPropertyNames:Wj}=Object,Zj=Object.prototype.hasOwnProperty,t=(j,$)=>e(j,"name",{value:$,configurable:!0}),Xj=(j,$)=>{for(var z in $)e(j,z,{get:$[z],enumerable:!0})},Jj=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of Wj($))if(!Zj.call(j,Q)&&Q!==z)e(j,Q,{get:()=>$[Q],enumerable:!(W=Qj($,Q))||W.enumerable})}return j},Kj=(j)=>Jj(e({},"__esModule",{value:!0}),j),T1={};Xj(T1,{addRecursionDetectionMiddlewareOptions:()=>v1,getRecursionDetectionPlugin:()=>qj,recursionDetectionMiddleware:()=>I1});R1.exports=Kj(T1);var Gj=l(),S0="X-Amzn-Trace-Id",Yj="AWS_LAMBDA_FUNCTION_NAME",Bj="_X_AMZN_TRACE_ID",I1=t((j)=>($)=>async(z)=>{let{request:W}=z;if(!Gj.HttpRequest.isInstance(W)||j.runtime!=="node")return $(z);let Q=Object.keys(W.headers??{}).find((K)=>K.toLowerCase()===S0.toLowerCase())??S0;if(W.headers.hasOwnProperty(Q))return $(z);let Z=process.env[Yj],X=process.env[Bj],J=t((K)=>typeof K==="string"&&K.length>0,"nonEmptyString");if(J(Z)&&J(X))W.headers[S0]=X;return $({...z,request:W})},"recursionDetectionMiddleware"),v1={step:"build",tags:["RECURSION_DETECTION"],name:"recursionDetectionMiddleware",override:!0,priority:"low"},qj=t((j)=>({applyToStack:t(($)=>{$.add(I1(j),v1)},"applyToStack")}),"getRecursionDetectionPlugin")});var c1=q((Nz,u1)=>{var{defineProperty:j0,getOwnPropertyDescriptor:Hj,getOwnPropertyNames:wj}=Object,Uj=Object.prototype.hasOwnProperty,H=(j,$)=>j0(j,"name",{value:$,configurable:!0}),Lj=(j,$)=>{for(var z in $)j0(j,z,{get:$[z],enumerable:!0})},Mj=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of wj($))if(!Uj.call(j,Q)&&Q!==z)j0(j,Q,{get:()=>$[Q],enumerable:!(W=Hj($,Q))||W.enumerable})}return j},bj=(j)=>Mj(j0({},"__esModule",{value:!0}),j),k1={};Lj(k1,{EndpointCache:()=>Fj,EndpointError:()=>h,customEndpointFunctions:()=>P0,isIpAddress:()=>P1,isValidHostLabel:()=>x0,resolveEndpoint:()=>uj});u1.exports=bj(k1);var Fj=class{constructor({size:j,params:$}){if(this.data=new Map,this.parameters=[],this.capacity=j??50,$)this.parameters=$}static{H(this,"EndpointCache")}get(j,$){let z=this.hash(j);if(z===!1)return $();if(!this.data.has(z)){if(this.data.size>this.capacity+10){let W=this.data.keys(),Q=0;while(!0){let{value:Z,done:X}=W.next();if(this.data.delete(Z),X||++Q>10)break}}this.data.set(z,$())}return this.data.get(z)}size(){return this.data.size}hash(j){let $="",{parameters:z}=this;if(z.length===0)return!1;for(let W of z){let Q=String(j[W]??"");if(Q.includes("|;"))return!1;$+=Q+"|;"}return $}},Dj=new RegExp("^(?:25[0-5]|2[0-4]\\d|1\\d\\d|[1-9]\\d|\\d)(?:\\.(?:25[0-5]|2[0-4]\\d|1\\d\\d|[1-9]\\d|\\d)){3}$"),P1=H((j)=>Dj.test(j)||j.startsWith("[")&&j.endsWith("]"),"isIpAddress"),hj=new RegExp("^(?!.*-$)(?!-)[a-zA-Z0-9-]{1,63}$"),x0=H((j,$=!1)=>{if(!$)return hj.test(j);let z=j.split(".");for(let W of z)if(!x0(W))return!1;return!0},"isValidHostLabel"),P0={},_="endpoints";function k(j){if(typeof j!=="object"||j==null)return j;if("ref"in j)return`$${k(j.ref)}`;if("fn"in j)return`${j.fn}(${(j.argv||[]).map(k).join(", ")})`;return JSON.stringify(j,null,2)}H(k,"toDebugString");var h=class extends Error{static{H(this,"EndpointError")}constructor(j){super(j);this.name="EndpointError"}},Nj=H((j,$)=>j===$,"booleanEquals"),Oj=H((j)=>{let $=j.split("."),z=[];for(let W of $){let Q=W.indexOf("[");if(Q!==-1){if(W.indexOf("]")!==W.length-1)throw new h(`Path: '${j}' does not end with ']'`);let Z=W.slice(Q+1,-1);if(Number.isNaN(parseInt(Z)))throw new h(`Invalid array index: '${Z}' in path: '${j}'`);if(Q!==0)z.push(W.slice(0,Q));z.push(Z)}else z.push(W)}return z},"getAttrPathList"),A1=H((j,$)=>Oj($).reduce((z,W)=>{if(typeof z!=="object")throw new h(`Index '${W}' in '${$}' not found in '${JSON.stringify(j)}'`);else if(Array.isArray(z))return z[parseInt(W)];return z[W]},j),"getAttr"),Cj=H((j)=>j!=null,"isSet"),Tj=H((j)=>!j,"not"),A0=S1(),k0={[A0.EndpointURLScheme.HTTP]:80,[A0.EndpointURLScheme.HTTPS]:443},Ij=H((j)=>{let $=(()=>{try{if(j instanceof URL)return j;if(typeof j==="object"&&"hostname"in j){let{hostname:B,port:b,protocol:D="",path:O="",query:g5={}}=j,U1=new URL(`${D}//${B}${b?`:${b}`:""}${O}`);return U1.search=Object.entries(g5).map(([f5,u5])=>`${f5}=${u5}`).join("&"),U1}return new URL(j)}catch(B){return null}})();if(!$)return console.error(`Unable to parse ${JSON.stringify(j)} as a whatwg URL.`),null;let z=$.href,{host:W,hostname:Q,pathname:Z,protocol:X,search:J}=$;if(J)return null;let K=X.slice(0,-1);if(!Object.values(A0.EndpointURLScheme).includes(K))return null;let G=P1(Q),V=z.includes(`${W}:${k0[K]}`)||typeof j==="string"&&j.includes(`${W}:${k0[K]}`),Y=`${W}${V?`:${k0[K]}`:""}`;return{scheme:K,authority:Y,path:Z,normalizedPath:Z.endsWith("/")?Z:`${Z}/`,isIp:G}},"parseURL"),vj=H((j,$)=>j===$,"stringEquals"),Rj=H((j,$,z,W)=>{if($>=z||j.length<z)return null;if(!W)return j.substring($,z);return j.substring(j.length-z,j.length-$)},"substring"),Sj=H((j)=>encodeURIComponent(j).replace(/[!*'()]/g,($)=>`%${$.charCodeAt(0).toString(16).toUpperCase()}`),"uriEncode"),kj={booleanEquals:Nj,getAttr:A1,isSet:Cj,isValidHostLabel:x0,not:Tj,parseURL:Ij,stringEquals:vj,substring:Rj,uriEncode:Sj},x1=H((j,$)=>{let z=[],W={...$.endpointParams,...$.referenceRecord},Q=0;while(Q<j.length){let Z=j.indexOf("{",Q);if(Z===-1){z.push(j.slice(Q));break}z.push(j.slice(Q,Z));let X=j.indexOf("}",Z);if(X===-1){z.push(j.slice(Z));break}if(j[Z+1]==="{"&&j[X+1]==="}")z.push(j.slice(Z+1,X)),Q=X+2;let J=j.substring(Z+1,X);if(J.includes("#")){let[K,G]=J.split("#");z.push(A1(W[K],G))}else z.push(W[J]);Q=X+1}return z.join("")},"evaluateTemplate"),Pj=H(({ref:j},$)=>{return{...$.endpointParams,...$.referenceRecord}[j]},"getReferenceValue"),$0=H((j,$,z)=>{if(typeof j==="string")return x1(j,z);else if(j.fn)return E1(j,z);else if(j.ref)return Pj(j,z);throw new h(`'${$}': ${String(j)} is not a string, function or reference.`)},"evaluateExpression"),E1=H(({fn:j,argv:$},z)=>{let W=$.map((Z)=>["boolean","number"].includes(typeof Z)?Z:$0(Z,"arg",z)),Q=j.split(".");if(Q[0]in P0&&Q[1]!=null)return P0[Q[0]][Q[1]](...W);return kj[j](...W)},"callFunction"),Aj=H(({assign:j,...$},z)=>{if(j&&j in z.referenceRecord)throw new h(`'${j}' is already defined in Reference Record.`);let W=E1($,z);return z.logger?.debug?.(`${_} evaluateCondition: ${k($)} = ${k(W)}`),{result:W===""?!0:!!W,...j!=null&&{toAssign:{name:j,value:W}}}},"evaluateCondition"),E0=H((j=[],$)=>{let z={};for(let W of j){let{result:Q,toAssign:Z}=Aj(W,{...$,referenceRecord:{...$.referenceRecord,...z}});if(!Q)return{result:Q};if(Z)z[Z.name]=Z.value,$.logger?.debug?.(`${_} assign: ${Z.name} := ${k(Z.value)}`)}return{result:!0,referenceRecord:z}},"evaluateConditions"),xj=H((j,$)=>Object.entries(j).reduce((z,[W,Q])=>({...z,[W]:Q.map((Z)=>{let X=$0(Z,"Header value entry",$);if(typeof X!=="string")throw new h(`Header '${W}' value '${X}' is not a string`);return X})}),{}),"getEndpointHeaders"),y1=H((j,$)=>{if(Array.isArray(j))return j.map((z)=>y1(z,$));switch(typeof j){case"string":return x1(j,$);case"object":if(j===null)throw new h(`Unexpected endpoint property: ${j}`);return g1(j,$);case"boolean":return j;default:throw new h(`Unexpected endpoint property type: ${typeof j}`)}},"getEndpointProperty"),g1=H((j,$)=>Object.entries(j).reduce((z,[W,Q])=>({...z,[W]:y1(Q,$)}),{}),"getEndpointProperties"),Ej=H((j,$)=>{let z=$0(j,"Endpoint URL",$);if(typeof z==="string")try{return new URL(z)}catch(W){throw console.error(`Failed to construct URL with ${z}`,W),W}throw new h(`Endpoint URL must be a string, got ${typeof z}`)},"getEndpointUrl"),yj=H((j,$)=>{let{conditions:z,endpoint:W}=j,{result:Q,referenceRecord:Z}=E0(z,$);if(!Q)return;let X={...$,referenceRecord:{...$.referenceRecord,...Z}},{url:J,properties:K,headers:G}=W;return $.logger?.debug?.(`${_} Resolving endpoint from template: ${k(W)}`),{...G!=null&&{headers:xj(G,X)},...K!=null&&{properties:g1(K,X)},url:Ej(J,X)}},"evaluateEndpointRule"),gj=H((j,$)=>{let{conditions:z,error:W}=j,{result:Q,referenceRecord:Z}=E0(z,$);if(!Q)return;throw new h($0(W,"Error",{...$,referenceRecord:{...$.referenceRecord,...Z}}))},"evaluateErrorRule"),fj=H((j,$)=>{let{conditions:z,rules:W}=j,{result:Q,referenceRecord:Z}=E0(z,$);if(!Q)return;return f1(W,{...$,referenceRecord:{...$.referenceRecord,...Z}})},"evaluateTreeRule"),f1=H((j,$)=>{for(let z of j)if(z.type==="endpoint"){let W=yj(z,$);if(W)return W}else if(z.type==="error")gj(z,$);else if(z.type==="tree"){let W=fj(z,$);if(W)return W}else throw new h(`Unknown endpoint rule: ${z}`);throw new h("Rules evaluation failed")},"evaluateRules"),uj=H((j,$)=>{let{endpointParams:z,logger:W}=$,{parameters:Q,rules:Z}=j;$.logger?.debug?.(`${_} Initial EndpointParams: ${k(z)}`);let X=Object.entries(Q).filter(([,G])=>G.default!=null).map(([G,V])=>[G,V.default]);if(X.length>0)for(let[G,V]of X)z[G]=z[G]??V;let J=Object.entries(Q).filter(([,G])=>G.required).map(([G])=>G);for(let G of J)if(z[G]==null)throw new h(`Missing required parameter: '${G}'`);let K=f1(Z,{endpointParams:z,logger:W,referenceRecord:{}});return $.logger?.debug?.(`${_} Resolved endpoint: ${k(K)}`),K},"resolveEndpoint")});var o1=q((Tz,r1)=>{var{defineProperty:z0,getOwnPropertyDescriptor:cj,getOwnPropertyNames:dj}=Object,lj=Object.prototype.hasOwnProperty,y=(j,$)=>z0(j,"name",{value:$,configurable:!0}),_j=(j,$)=>{for(var z in $)z0(j,z,{get:$[z],enumerable:!0})},sj=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of dj($))if(!lj.call(j,Q)&&Q!==z)z0(j,Q,{get:()=>$[Q],enumerable:!(W=cj($,Q))||W.enumerable})}return j},mj=(j)=>sj(z0({},"__esModule",{value:!0}),j),l1={};_j(l1,{ConditionObject:()=>w.ConditionObject,DeprecatedObject:()=>w.DeprecatedObject,EndpointError:()=>w.EndpointError,EndpointObject:()=>w.EndpointObject,EndpointObjectHeaders:()=>w.EndpointObjectHeaders,EndpointObjectProperties:()=>w.EndpointObjectProperties,EndpointParams:()=>w.EndpointParams,EndpointResolverOptions:()=>w.EndpointResolverOptions,EndpointRuleObject:()=>w.EndpointRuleObject,ErrorRuleObject:()=>w.ErrorRuleObject,EvaluateOptions:()=>w.EvaluateOptions,Expression:()=>w.Expression,FunctionArgv:()=>w.FunctionArgv,FunctionObject:()=>w.FunctionObject,FunctionReturn:()=>w.FunctionReturn,ParameterObject:()=>w.ParameterObject,ReferenceObject:()=>w.ReferenceObject,ReferenceRecord:()=>w.ReferenceRecord,RuleSetObject:()=>w.RuleSetObject,RuleSetRules:()=>w.RuleSetRules,TreeRuleObject:()=>w.TreeRuleObject,awsEndpointFunctions:()=>n1,getUserAgentPrefix:()=>nj,isIpAddress:()=>w.isIpAddress,partition:()=>i1,resolveEndpoint:()=>w.resolveEndpoint,setPartitionInfo:()=>a1,useDefaultPartitionInfo:()=>aj});r1.exports=mj(l1);var w=c1(),_1=y((j,$=!1)=>{if($){for(let z of j.split("."))if(!_1(z))return!1;return!0}if(!w.isValidHostLabel(j))return!1;if(j.length<3||j.length>63)return!1;if(j!==j.toLowerCase())return!1;if(w.isIpAddress(j))return!1;return!0},"isVirtualHostableS3Bucket"),d1=":",pj="/",ij=y((j)=>{let $=j.split(d1);if($.length<6)return null;let[z,W,Q,Z,X,...J]=$;if(z!=="arn"||W===""||Q===""||J.join(d1)==="")return null;let K=J.map((G)=>G.split(pj)).flat();return{partition:W,service:Q,region:Z,accountId:X,resourceId:K}},"parseArn"),s1={partitions:[{id:"aws",outputs:{dnsSuffix:"amazonaws.com",dualStackDnsSuffix:"api.aws",implicitGlobalRegion:"us-east-1",name:"aws",supportsDualStack:!0,supportsFIPS:!0},regionRegex:"^(us|eu|ap|sa|ca|me|af|il|mx)\\-\\w+\\-\\d+$",regions:{"af-south-1":{description:"Africa (Cape Town)"},"ap-east-1":{description:"Asia Pacific (Hong Kong)"},"ap-northeast-1":{description:"Asia Pacific (Tokyo)"},"ap-northeast-2":{description:"Asia Pacific (Seoul)"},"ap-northeast-3":{description:"Asia Pacific (Osaka)"},"ap-south-1":{description:"Asia Pacific (Mumbai)"},"ap-south-2":{description:"Asia Pacific (Hyderabad)"},"ap-southeast-1":{description:"Asia Pacific (Singapore)"},"ap-southeast-2":{description:"Asia Pacific (Sydney)"},"ap-southeast-3":{description:"Asia Pacific (Jakarta)"},"ap-southeast-4":{description:"Asia Pacific (Melbourne)"},"ap-southeast-5":{description:"Asia Pacific (Malaysia)"},"ap-southeast-7":{description:"Asia Pacific (Thailand)"},"aws-global":{description:"AWS Standard global region"},"ca-central-1":{description:"Canada (Central)"},"ca-west-1":{description:"Canada West (Calgary)"},"eu-central-1":{description:"Europe (Frankfurt)"},"eu-central-2":{description:"Europe (Zurich)"},"eu-north-1":{description:"Europe (Stockholm)"},"eu-south-1":{description:"Europe (Milan)"},"eu-south-2":{description:"Europe (Spain)"},"eu-west-1":{description:"Europe (Ireland)"},"eu-west-2":{description:"Europe (London)"},"eu-west-3":{description:"Europe (Paris)"},"il-central-1":{description:"Israel (Tel Aviv)"},"me-central-1":{description:"Middle East (UAE)"},"me-south-1":{description:"Middle East (Bahrain)"},"mx-central-1":{description:"Mexico (Central)"},"sa-east-1":{description:"South America (Sao Paulo)"},"us-east-1":{description:"US East (N. Virginia)"},"us-east-2":{description:"US East (Ohio)"},"us-west-1":{description:"US West (N. California)"},"us-west-2":{description:"US West (Oregon)"}}},{id:"aws-cn",outputs:{dnsSuffix:"amazonaws.com.cn",dualStackDnsSuffix:"api.amazonwebservices.com.cn",implicitGlobalRegion:"cn-northwest-1",name:"aws-cn",supportsDualStack:!0,supportsFIPS:!0},regionRegex:"^cn\\-\\w+\\-\\d+$",regions:{"aws-cn-global":{description:"AWS China global region"},"cn-north-1":{description:"China (Beijing)"},"cn-northwest-1":{description:"China (Ningxia)"}}},{id:"aws-us-gov",outputs:{dnsSuffix:"amazonaws.com",dualStackDnsSuffix:"api.aws",implicitGlobalRegion:"us-gov-west-1",name:"aws-us-gov",supportsDualStack:!0,supportsFIPS:!0},regionRegex:"^us\\-gov\\-\\w+\\-\\d+$",regions:{"aws-us-gov-global":{description:"AWS GovCloud (US) global region"},"us-gov-east-1":{description:"AWS GovCloud (US-East)"},"us-gov-west-1":{description:"AWS GovCloud (US-West)"}}},{id:"aws-iso",outputs:{dnsSuffix:"c2s.ic.gov",dualStackDnsSuffix:"c2s.ic.gov",implicitGlobalRegion:"us-iso-east-1",name:"aws-iso",supportsDualStack:!1,supportsFIPS:!0},regionRegex:"^us\\-iso\\-\\w+\\-\\d+$",regions:{"aws-iso-global":{description:"AWS ISO (US) global region"},"us-iso-east-1":{description:"US ISO East"},"us-iso-west-1":{description:"US ISO WEST"}}},{id:"aws-iso-b",outputs:{dnsSuffix:"sc2s.sgov.gov",dualStackDnsSuffix:"sc2s.sgov.gov",implicitGlobalRegion:"us-isob-east-1",name:"aws-iso-b",supportsDualStack:!1,supportsFIPS:!0},regionRegex:"^us\\-isob\\-\\w+\\-\\d+$",regions:{"aws-iso-b-global":{description:"AWS ISOB (US) global region"},"us-isob-east-1":{description:"US ISOB East (Ohio)"}}},{id:"aws-iso-e",outputs:{dnsSuffix:"cloud.adc-e.uk",dualStackDnsSuffix:"cloud.adc-e.uk",implicitGlobalRegion:"eu-isoe-west-1",name:"aws-iso-e",supportsDualStack:!1,supportsFIPS:!0},regionRegex:"^eu\\-isoe\\-\\w+\\-\\d+$",regions:{"aws-iso-e-global":{description:"AWS ISOE (Europe) global region"},"eu-isoe-west-1":{description:"EU ISOE West"}}},{id:"aws-iso-f",outputs:{dnsSuffix:"csp.hci.ic.gov",dualStackDnsSuffix:"csp.hci.ic.gov",implicitGlobalRegion:"us-isof-south-1",name:"aws-iso-f",supportsDualStack:!1,supportsFIPS:!0},regionRegex:"^us\\-isof\\-\\w+\\-\\d+$",regions:{"aws-iso-f-global":{description:"AWS ISOF global region"},"us-isof-east-1":{description:"US ISOF EAST"},"us-isof-south-1":{description:"US ISOF SOUTH"}}},{id:"aws-eusc",outputs:{dnsSuffix:"amazonaws.eu",dualStackDnsSuffix:"amazonaws.eu",implicitGlobalRegion:"eusc-de-east-1",name:"aws-eusc",supportsDualStack:!1,supportsFIPS:!0},regionRegex:"^eusc\\-(de)\\-\\w+\\-\\d+$",regions:{"eusc-de-east-1":{description:"EU (Germany)"}}}],version:"1.1"},m1=s1,p1="",i1=y((j)=>{let{partitions:$}=m1;for(let W of $){let{regions:Q,outputs:Z}=W;for(let[X,J]of Object.entries(Q))if(X===j)return{...Z,...J}}for(let W of $){let{regionRegex:Q,outputs:Z}=W;if(new RegExp(Q).test(j))return{...Z}}let z=$.find((W)=>W.id==="aws");if(!z)throw new Error("Provided region was not found in the partition array or regex, and default partition with id 'aws' doesn't exist.");return{...z.outputs}},"partition"),a1=y((j,$="")=>{m1=j,p1=$},"setPartitionInfo"),aj=y(()=>{a1(s1,"")},"useDefaultPartitionInfo"),nj=y(()=>p1,"getUserAgentPrefix"),n1={isVirtualHostableS3Bucket:_1,parseArn:ij,partition:i1};w.customEndpointFunctions.aws=n1});var B7=q((Iz,Y7)=>{var{defineProperty:W0,getOwnPropertyDescriptor:oj,getOwnPropertyNames:tj}=Object,ej=Object.prototype.hasOwnProperty,P=(j,$)=>W0(j,"name",{value:$,configurable:!0}),j6=(j,$)=>{for(var z in $)W0(j,z,{get:$[z],enumerable:!0})},$6=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of tj($))if(!ej.call(j,Q)&&Q!==z)W0(j,Q,{get:()=>$[Q],enumerable:!(W=oj($,Q))||W.enumerable})}return j},z6=(j)=>$6(W0({},"__esModule",{value:!0}),j),z7={};j6(z7,{DEFAULT_UA_APP_ID:()=>Q7,getUserAgentMiddlewareOptions:()=>G7,getUserAgentPlugin:()=>Y6,resolveUserAgentConfig:()=>Z7,userAgentMiddleware:()=>K7});Y7.exports=z6(z7);var Q6=$7(),Q7=void 0;function W7(j){if(j===void 0)return!0;return typeof j==="string"&&j.length<=50}P(W7,"isValidUserAgentAppId");function Z7(j){let $=Q6.normalizeProvider(j.userAgentAppId??Q7),{customUserAgent:z}=j;return Object.assign(j,{customUserAgent:typeof z==="string"?[[z]]:z,userAgentAppId:P(async()=>{let W=await $();if(!W7(W)){let Q=j.logger?.constructor?.name==="NoOpLogger"||!j.logger?console:j.logger;if(typeof W!=="string")Q?.warn("userAgentAppId must be a string or undefined.");else if(W.length>50)Q?.warn("The provided userAgentAppId exceeds the maximum length of 50 characters.")}return W},"userAgentAppId")})}P(Z7,"resolveUserAgentConfig");var W6=o1(),Z6=l(),v=rj(),X6=/\d{12}\.ddb/;async function X7(j,$,z){if(z.request?.headers?.["smithy-protocol"]==="rpc-v2-cbor")v.setFeature(j,"PROTOCOL_RPC_V2_CBOR","M");if(typeof $.retryStrategy==="function"){let Z=await $.retryStrategy();if(typeof Z.acquireInitialRetryToken==="function")if(Z.constructor?.name?.includes("Adaptive"))v.setFeature(j,"RETRY_MODE_ADAPTIVE","F");else v.setFeature(j,"RETRY_MODE_STANDARD","E");else v.setFeature(j,"RETRY_MODE_LEGACY","D")}if(typeof $.accountIdEndpointMode==="function"){let Z=j.endpointV2;if(String(Z?.url?.hostname).match(X6))v.setFeature(j,"ACCOUNT_ID_ENDPOINT","O");switch(await $.accountIdEndpointMode?.()){case"disabled":v.setFeature(j,"ACCOUNT_ID_MODE_DISABLED","Q");break;case"preferred":v.setFeature(j,"ACCOUNT_ID_MODE_PREFERRED","P");break;case"required":v.setFeature(j,"ACCOUNT_ID_MODE_REQUIRED","R");break}}let Q=j.__smithy_context?.selectedHttpAuthScheme?.identity;if(Q?.$source){let Z=Q;if(Z.accountId)v.setFeature(j,"RESOLVED_ACCOUNT_ID","T");for(let[X,J]of Object.entries(Z.$source??{}))v.setFeature(j,X,J)}}P(X7,"checkFeatures");var t1="user-agent",y0="x-amz-user-agent",e1=" ",g0="/",J6=/[^\!\$\%\&\'\*\+\-\.\^\_\`\|\~\d\w]/g,K6=/[^\!\$\%\&\'\*\+\-\.\^\_\`\|\~\d\w\#]/g,j7="-",G6=1024;function J7(j){let $="";for(let z in j){let W=j[z];if($.length+W.length+1<=G6){if($.length)$+=","+W;else $+=W;continue}break}return $}P(J7,"encodeFeatures");var K7=P((j)=>($,z)=>async(W)=>{let{request:Q}=W;if(!Z6.HttpRequest.isInstance(Q))return $(W);let{headers:Z}=Q,X=z?.userAgent?.map(Q0)||[],J=(await j.defaultUserAgentProvider()).map(Q0);await X7(z,j,W);let K=z;J.push(`m/${J7(Object.assign({},z.__smithy_context?.features,K.__aws_sdk_context?.features))}`);let G=j?.customUserAgent?.map(Q0)||[],V=await j.userAgentAppId();if(V)J.push(Q0([`app/${V}`]));let Y=W6.getUserAgentPrefix(),B=(Y?[Y]:[]).concat([...J,...X,...G]).join(e1),b=[...J.filter((D)=>D.startsWith("aws-sdk-")),...G].join(e1);if(j.runtime!=="browser"){if(b)Z[y0]=Z[y0]?`${Z[t1]} ${b}`:b;Z[t1]=B}else Z[y0]=B;return $({...W,request:Q})},"userAgentMiddleware"),Q0=P((j)=>{let $=j[0].split(g0).map((X)=>X.replace(J6,j7)).join(g0),z=j[1]?.replace(K6,j7),W=$.indexOf(g0),Q=$.substring(0,W),Z=$.substring(W+1);if(Q==="api")Z=Z.toLowerCase();return[Q,Z,z].filter((X)=>X&&X.length>0).reduce((X,J,K)=>{switch(K){case 0:return J;case 1:return`${X}/${J}`;default:return`${X}#${J}`}},"")},"escapeUserAgent"),G7={name:"getUserAgentMiddleware",step:"build",priority:"low",tags:["SET_USER_AGENT","USER_AGENT"],override:!0},Y6=P((j)=>({applyToStack:P(($)=>{$.add(K7(j),G7)},"applyToStack")}),"getUserAgentPlugin")});var U7=q((vz,w7)=>{var{defineProperty:Z0,getOwnPropertyDescriptor:B6,getOwnPropertyNames:q6}=Object,V6=Object.prototype.hasOwnProperty,q7=(j,$)=>Z0(j,"name",{value:$,configurable:!0}),H6=(j,$)=>{for(var z in $)Z0(j,z,{get:$[z],enumerable:!0})},w6=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of q6($))if(!V6.call(j,Q)&&Q!==z)Z0(j,Q,{get:()=>$[Q],enumerable:!(W=B6($,Q))||W.enumerable})}return j},U6=(j)=>w6(Z0({},"__esModule",{value:!0}),j),V7={};H6(V7,{SelectorType:()=>H7,booleanSelector:()=>L6,numberSelector:()=>M6});w7.exports=U6(V7);var L6=q7((j,$,z)=>{if(!($ in j))return;if(j[$]==="true")return!0;if(j[$]==="false")return!1;throw new Error(`Cannot load ${z} "${$}". Expected "true" or "false", got ${j[$]}.`)},"booleanSelector"),M6=q7((j,$,z)=>{if(!($ in j))return;let W=parseInt(j[$],10);if(Number.isNaN(W))throw new TypeError(`Cannot load ${z} '${$}'. Expected number, got '${j[$]}'.`);return W},"numberSelector"),H7=((j)=>{return j.ENV="env",j.CONFIG="shared config entry",j})(H7||{})});var v7=q((Rz,I7)=>{var{defineProperty:J0,getOwnPropertyDescriptor:b6,getOwnPropertyNames:F6}=Object,D6=Object.prototype.hasOwnProperty,C=(j,$)=>J0(j,"name",{value:$,configurable:!0}),h6=(j,$)=>{for(var z in $)J0(j,z,{get:$[z],enumerable:!0})},N6=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of F6($))if(!D6.call(j,Q)&&Q!==z)J0(j,Q,{get:()=>$[Q],enumerable:!(W=b6($,Q))||W.enumerable})}return j},O6=(j)=>N6(J0({},"__esModule",{value:!0}),j),b7={};h6(b7,{CONFIG_USE_DUALSTACK_ENDPOINT:()=>D7,CONFIG_USE_FIPS_ENDPOINT:()=>N7,DEFAULT_USE_DUALSTACK_ENDPOINT:()=>C6,DEFAULT_USE_FIPS_ENDPOINT:()=>I6,ENV_USE_DUALSTACK_ENDPOINT:()=>F7,ENV_USE_FIPS_ENDPOINT:()=>h7,NODE_REGION_CONFIG_FILE_OPTIONS:()=>A6,NODE_REGION_CONFIG_OPTIONS:()=>P6,NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS:()=>T6,NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS:()=>v6,REGION_ENV_NAME:()=>O7,REGION_INI_NAME:()=>C7,getRegionInfo:()=>f6,resolveCustomEndpointsConfig:()=>R6,resolveEndpointsConfig:()=>k6,resolveRegionConfig:()=>x6});I7.exports=O6(b7);var A=U7(),F7="AWS_USE_DUALSTACK_ENDPOINT",D7="use_dualstack_endpoint",C6=!1,T6={environmentVariableSelector:(j)=>A.booleanSelector(j,F7,A.SelectorType.ENV),configFileSelector:(j)=>A.booleanSelector(j,D7,A.SelectorType.CONFIG),default:!1},h7="AWS_USE_FIPS_ENDPOINT",N7="use_fips_endpoint",I6=!1,v6={environmentVariableSelector:(j)=>A.booleanSelector(j,h7,A.SelectorType.ENV),configFileSelector:(j)=>A.booleanSelector(j,N7,A.SelectorType.CONFIG),default:!1},X0=f0(),R6=C((j)=>{let{tls:$,endpoint:z,urlParser:W,useDualstackEndpoint:Q}=j;return Object.assign(j,{tls:$??!0,endpoint:X0.normalizeProvider(typeof z==="string"?W(z):z),isCustomEndpoint:!0,useDualstackEndpoint:X0.normalizeProvider(Q??!1)})},"resolveCustomEndpointsConfig"),S6=C(async(j)=>{let{tls:$=!0}=j,z=await j.region();if(!new RegExp(/^([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9-]{0,61}[a-zA-Z0-9])$/).test(z))throw new Error("Invalid region in client config");let Q=await j.useDualstackEndpoint(),Z=await j.useFipsEndpoint(),{hostname:X}=await j.regionInfoProvider(z,{useDualstackEndpoint:Q,useFipsEndpoint:Z})??{};if(!X)throw new Error("Cannot resolve hostname from client config");return j.urlParser(`${$?"https:":"http:"}//${X}`)},"getEndpointFromRegion"),k6=C((j)=>{let $=X0.normalizeProvider(j.useDualstackEndpoint??!1),{endpoint:z,useFipsEndpoint:W,urlParser:Q,tls:Z}=j;return Object.assign(j,{tls:Z??!0,endpoint:z?X0.normalizeProvider(typeof z==="string"?Q(z):z):()=>S6({...j,useDualstackEndpoint:$,useFipsEndpoint:W}),isCustomEndpoint:!!z,useDualstackEndpoint:$})},"resolveEndpointsConfig"),O7="AWS_REGION",C7="region",P6={environmentVariableSelector:(j)=>j[O7],configFileSelector:(j)=>j[C7],default:()=>{throw new Error("Region is missing")}},A6={preferredFile:"credentials"},T7=C((j)=>typeof j==="string"&&(j.startsWith("fips-")||j.endsWith("-fips")),"isFipsRegion"),L7=C((j)=>T7(j)?["fips-aws-global","aws-fips"].includes(j)?"us-east-1":j.replace(/fips-(dkr-|prod-)?|-fips/,""):j,"getRealRegion"),x6=C((j)=>{let{region:$,useFipsEndpoint:z}=j;if(!$)throw new Error("Region is missing");return Object.assign(j,{region:async()=>{if(typeof $==="string")return L7($);let W=await $();return L7(W)},useFipsEndpoint:async()=>{let W=typeof $==="string"?$:await $();if(T7(W))return!0;return typeof z!=="function"?Promise.resolve(!!z):z()}})},"resolveRegionConfig"),M7=C((j=[],{useFipsEndpoint:$,useDualstackEndpoint:z})=>j.find(({tags:W})=>$===W.includes("fips")&&z===W.includes("dualstack"))?.hostname,"getHostnameFromVariants"),E6=C((j,{regionHostname:$,partitionHostname:z})=>$?$:z?z.replace("{region}",j):void 0,"getResolvedHostname"),y6=C((j,{partitionHash:$})=>Object.keys($||{}).find((z)=>$[z].regions.includes(j))??"aws","getResolvedPartition"),g6=C((j,{signingRegion:$,regionRegex:z,useFipsEndpoint:W})=>{if($)return $;else if(W){let Q=z.replace("\\\\","\\").replace(/^\^/g,"\\.").replace(/\$$/g,"\\."),Z=j.match(Q);if(Z)return Z[0].slice(1,-1)}},"getResolvedSigningRegion"),f6=C((j,{useFipsEndpoint:$=!1,useDualstackEndpoint:z=!1,signingService:W,regionHash:Q,partitionHash:Z})=>{let X=y6(j,{partitionHash:Z}),J=j in Q?j:Z[X]?.endpoint??j,K={useFipsEndpoint:$,useDualstackEndpoint:z},G=M7(Q[J]?.variants,K),V=M7(Z[X]?.variants,K),Y=E6(J,{regionHostname:G,partitionHostname:V});if(Y===void 0)throw new Error(`Endpoint resolution failed for: ${{resolvedRegion:J,useFipsEndpoint:$,useDualstackEndpoint:z}}`);let B=g6(Y,{signingRegion:Q[J]?.signingRegion,regionRegex:Z[X].regionRegex,useFipsEndpoint:$});return{partition:X,signingService:W,hostname:Y,...B&&{signingRegion:B},...Q[J]?.signingService&&{signingService:Q[J].signingService}}},"getRegionInfo")});var i6=q((Sz,A7)=>{var{defineProperty:K0,getOwnPropertyDescriptor:u6,getOwnPropertyNames:c6}=Object,d6=Object.prototype.hasOwnProperty,S7=(j,$)=>K0(j,"name",{value:$,configurable:!0}),l6=(j,$)=>{for(var z in $)K0(j,z,{get:$[z],enumerable:!0})},_6=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of c6($))if(!d6.call(j,Q)&&Q!==z)K0(j,Q,{get:()=>$[Q],enumerable:!(W=u6($,Q))||W.enumerable})}return j},s6=(j)=>_6(K0({},"__esModule",{value:!0}),j),k7={};l6(k7,{contentLengthMiddleware:()=>u0,contentLengthMiddlewareOptions:()=>P7,getContentLengthPlugin:()=>p6});A7.exports=s6(k7);var m6=l(),R7="content-length";function u0(j){return($)=>async(z)=>{let W=z.request;if(m6.HttpRequest.isInstance(W)){let{body:Q,headers:Z}=W;if(Q&&Object.keys(Z).map((X)=>X.toLowerCase()).indexOf(R7)===-1)try{let X=j(Q);W.headers={...W.headers,[R7]:String(X)}}catch(X){}}return $({...z,request:W})}}S7(u0,"contentLengthMiddleware");var P7={step:"build",tags:["SET_CONTENT_LENGTH","CONTENT_LENGTH"],name:"contentLengthMiddleware",override:!0},p6=S7((j)=>({applyToStack:($)=>{$.add(u0(j.bodyLengthChecker),P7)}}),"getContentLengthPlugin")});var g=q((x7)=>{Object.defineProperty(x7,"__esModule",{value:!0});x7.getHomeDir=void 0;var a6=F("os"),n6=F("path"),c0={},r6=()=>{if(process&&process.geteuid)return`${process.geteuid()}`;return"DEFAULT"},o6=()=>{let{HOME:j,USERPROFILE:$,HOMEPATH:z,HOMEDRIVE:W=`C:${n6.sep}`}=process.env;if(j)return j;if($)return $;if(z)return`${W}${z}`;let Q=r6();if(!c0[Q])c0[Q]=a6.homedir();return c0[Q]};x7.getHomeDir=o6});var d0=q((y7)=>{Object.defineProperty(y7,"__esModule",{value:!0});y7.getSSOTokenFilepath=void 0;var t6=F("crypto"),e6=F("path"),j8=g(),$8=(j)=>{let z=t6.createHash("sha1").update(j).digest("hex");return e6.join(j8.getHomeDir(),".aws","sso","cache",`${z}.json`)};y7.getSSOTokenFilepath=$8});var c7=q((f7)=>{Object.defineProperty(f7,"__esModule",{value:!0});f7.getSSOTokenFromFile=void 0;var z8=F("fs"),Q8=d0(),{readFile:W8}=z8.promises,Z8=async(j)=>{let $=Q8.getSSOTokenFilepath(j),z=await W8($,"utf8");return JSON.parse(z)};f7.getSSOTokenFromFile=Z8});var _0=q((d7)=>{Object.defineProperty(d7,"__esModule",{value:!0});d7.slurpFile=void 0;var X8=F("fs"),{readFile:J8}=X8.promises,l0={},K8=(j,$)=>{if(!l0[j]||($===null||$===void 0?void 0:$.ignoreCache))l0[j]=J8(j,"utf8");return l0[j]};d7.slurpFile=K8});var i0=q((Ez,m)=>{var{defineProperty:B0,getOwnPropertyDescriptor:G8,getOwnPropertyNames:Y8}=Object,B8=Object.prototype.hasOwnProperty,N=(j,$)=>B0(j,"name",{value:$,configurable:!0}),q8=(j,$)=>{for(var z in $)B0(j,z,{get:$[z],enumerable:!0})},s0=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of Y8($))if(!B8.call(j,Q)&&Q!==z)B0(j,Q,{get:()=>$[Q],enumerable:!(W=G8($,Q))||W.enumerable})}return j},p0=(j,$,z)=>(s0(j,$,"default"),z&&s0(z,$,"default")),V8=(j)=>s0(B0({},"__esModule",{value:!0}),j),s={};q8(s,{CONFIG_PREFIX_SEPARATOR:()=>E,DEFAULT_PROFILE:()=>p7,ENV_PROFILE:()=>m7,getProfileName:()=>H8,loadSharedConfigFiles:()=>a7,loadSsoSessionData:()=>I8,parseKnownFiles:()=>R8});m.exports=V8(s);p0(s,g(),m.exports);var m7="AWS_PROFILE",p7="default",H8=N((j)=>j.profile||process.env[m7]||p7,"getProfileName");p0(s,d0(),m.exports);p0(s,c7(),m.exports);var G0=S1(),w8=N((j)=>Object.entries(j).filter(([$])=>{let z=$.indexOf(E);if(z===-1)return!1;return Object.values(G0.IniSectionType).includes($.substring(0,z))}).reduce(($,[z,W])=>{let Q=z.indexOf(E),Z=z.substring(0,Q)===G0.IniSectionType.PROFILE?z.substring(Q+1):z;return $[Z]=W,$},{...j.default&&{default:j.default}}),"getConfigData"),Y0=F("path"),U8=g(),L8="AWS_CONFIG_FILE",i7=N(()=>process.env[L8]||Y0.join(U8.getHomeDir(),".aws","config"),"getConfigFilepath"),M8=g(),b8="AWS_SHARED_CREDENTIALS_FILE",F8=N(()=>process.env[b8]||Y0.join(M8.getHomeDir(),".aws","credentials"),"getCredentialsFilepath"),D8=g(),h8=/^([\w-]+)\s(["'])?([\w-@\+\.%:/]+)\2$/,N8=["__proto__","profile __proto__"],m0=N((j)=>{let $={},z,W;for(let Q of j.split(/\r?\n/)){let Z=Q.split(/(^|\s)[;#]/)[0].trim();if(Z[0]==="["&&Z[Z.length-1]==="]"){z=void 0,W=void 0;let J=Z.substring(1,Z.length-1),K=h8.exec(J);if(K){let[,G,,V]=K;if(Object.values(G0.IniSectionType).includes(G))z=[G,V].join(E)}else z=J;if(N8.includes(J))throw new Error(`Found invalid profile name "${J}"`)}else if(z){let J=Z.indexOf("=");if(![0,-1].includes(J)){let[K,G]=[Z.substring(0,J).trim(),Z.substring(J+1).trim()];if(G==="")W=K;else{if(W&&Q.trimStart()===Q)W=void 0;$[z]=$[z]||{};let V=W?[W,K].join(E):K;$[z][V]=G}}}}return $},"parseIni"),_7=_0(),s7=N(()=>({}),"swallowError"),E=".",a7=N(async(j={})=>{let{filepath:$=F8(),configFilepath:z=i7()}=j,W=D8.getHomeDir(),Q="~/",Z=$;if($.startsWith("~/"))Z=Y0.join(W,$.slice(2));let X=z;if(z.startsWith("~/"))X=Y0.join(W,z.slice(2));let J=await Promise.all([_7.slurpFile(X,{ignoreCache:j.ignoreCache}).then(m0).then(w8).catch(s7),_7.slurpFile(Z,{ignoreCache:j.ignoreCache}).then(m0).catch(s7)]);return{configFile:J[0],credentialsFile:J[1]}},"loadSharedConfigFiles"),O8=N((j)=>Object.entries(j).filter(([$])=>$.startsWith(G0.IniSectionType.SSO_SESSION+E)).reduce(($,[z,W])=>({...$,[z.substring(z.indexOf(E)+1)]:W}),{}),"getSsoSessionData"),C8=_0(),T8=N(()=>({}),"swallowError"),I8=N(async(j={})=>C8.slurpFile(j.configFilepath??i7()).then(m0).then(O8).catch(T8),"loadSsoSessionData"),v8=N((...j)=>{let $={};for(let z of j)for(let[W,Q]of Object.entries(z))if($[W]!==void 0)Object.assign($[W],Q);else $[W]=Q;return $},"mergeConfigFiles"),R8=N(async(j)=>{let $=await a7(j);return v8($.configFile,$.credentialsFile)},"parseKnownFiles")});var V0=q((yz,o7)=>{var{defineProperty:q0,getOwnPropertyDescriptor:S8,getOwnPropertyNames:k8}=Object,P8=Object.prototype.hasOwnProperty,f=(j,$)=>q0(j,"name",{value:$,configurable:!0}),A8=(j,$)=>{for(var z in $)q0(j,z,{get:$[z],enumerable:!0})},x8=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of k8($))if(!P8.call(j,Q)&&Q!==z)q0(j,Q,{get:()=>$[Q],enumerable:!(W=S8($,Q))||W.enumerable})}return j},E8=(j)=>x8(q0({},"__esModule",{value:!0}),j),r7={};A8(r7,{loadConfig:()=>c8});o7.exports=E8(r7);var p=a0();function n0(j){try{let $=new Set(Array.from(j.match(/([A-Z_]){3,}/g)??[]));return $.delete("CONFIG"),$.delete("CONFIG_PREFIX_SEPARATOR"),$.delete("ENV"),[...$].join(", ")}catch($){return j}}f(n0,"getSelectorName");var y8=f((j,$)=>async()=>{try{let z=j(process.env);if(z===void 0)throw new Error;return z}catch(z){throw new p.CredentialsProviderError(z.message||`Not found in ENV: ${n0(j.toString())}`,{logger:$})}},"fromEnv"),n7=i0(),g8=f((j,{preferredFile:$="config",...z}={})=>async()=>{let W=n7.getProfileName(z),{configFile:Q,credentialsFile:Z}=await n7.loadSharedConfigFiles(z),X=Z[W]||{},J=Q[W]||{},K=$==="config"?{...X,...J}:{...J,...X};try{let V=j(K,$==="config"?Q:Z);if(V===void 0)throw new Error;return V}catch(G){throw new p.CredentialsProviderError(G.message||`Not found in config files w/ profile [${W}]: ${n0(j.toString())}`,{logger:z.logger})}},"fromSharedConfigFiles"),f8=f((j)=>typeof j==="function","isFunction"),u8=f((j)=>f8(j)?async()=>await j():p.fromStatic(j),"fromStatic"),c8=f(({environmentVariableSelector:j,configFileSelector:$,default:z},W={})=>p.memoize(p.chain(y8(j),g8($,W),u8(z))),"loadConfig")});var Q4=q(($4)=>{Object.defineProperty($4,"__esModule",{value:!0});$4.getEndpointUrlConfig=void 0;var t7=i0(),e7="AWS_ENDPOINT_URL",j4="endpoint_url",d8=(j)=>({environmentVariableSelector:($)=>{let z=j.split(" ").map((Z)=>Z.toUpperCase()),W=$[[e7,...z].join("_")];if(W)return W;let Q=$[e7];if(Q)return Q;return},configFileSelector:($,z)=>{if(z&&$.services){let Q=z[["services",$.services].join(t7.CONFIG_PREFIX_SEPARATOR)];if(Q){let Z=j.split(" ").map((J)=>J.toLowerCase()),X=Q[[Z.join("_"),j4].join(t7.CONFIG_PREFIX_SEPARATOR)];if(X)return X}}let W=$[j4];if(W)return W;return},default:void 0});$4.getEndpointUrlConfig=d8});var r0=q((W4)=>{Object.defineProperty(W4,"__esModule",{value:!0});W4.getEndpointFromConfig=void 0;var l8=V0(),_8=Q4(),s8=async(j)=>l8.loadConfig(_8.getEndpointUrlConfig(j!==null&&j!==void 0?j:""))();W4.getEndpointFromConfig=s8});var G4=q((uz,K4)=>{var{defineProperty:H0,getOwnPropertyDescriptor:m8,getOwnPropertyNames:p8}=Object,i8=Object.prototype.hasOwnProperty,a8=(j,$)=>H0(j,"name",{value:$,configurable:!0}),n8=(j,$)=>{for(var z in $)H0(j,z,{get:$[z],enumerable:!0})},r8=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of p8($))if(!i8.call(j,Q)&&Q!==z)H0(j,Q,{get:()=>$[Q],enumerable:!(W=m8($,Q))||W.enumerable})}return j},o8=(j)=>r8(H0({},"__esModule",{value:!0}),j),X4={};n8(X4,{parseQueryString:()=>J4});K4.exports=o8(X4);function J4(j){let $={};if(j=j.replace(/^\?/,""),j)for(let z of j.split("&")){let[W,Q=null]=z.split("=");if(W=decodeURIComponent(W),Q)Q=decodeURIComponent(Q);if(!(W in $))$[W]=Q;else if(Array.isArray($[W]))$[W].push(Q);else $[W]=[$[W],Q]}return $}a8(J4,"parseQueryString")});var o0=q((cz,q4)=>{var{defineProperty:w0,getOwnPropertyDescriptor:t8,getOwnPropertyNames:e8}=Object,j$=Object.prototype.hasOwnProperty,$$=(j,$)=>w0(j,"name",{value:$,configurable:!0}),z$=(j,$)=>{for(var z in $)w0(j,z,{get:$[z],enumerable:!0})},Q$=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of e8($))if(!j$.call(j,Q)&&Q!==z)w0(j,Q,{get:()=>$[Q],enumerable:!(W=t8($,Q))||W.enumerable})}return j},W$=(j)=>Q$(w0({},"__esModule",{value:!0}),j),Y4={};z$(Y4,{parseUrl:()=>B4});q4.exports=W$(Y4);var Z$=G4(),B4=$$((j)=>{if(typeof j==="string")return B4(new URL(j));let{hostname:$,pathname:z,port:W,protocol:Q,search:Z}=j,X;if(Z)X=Z$.parseQueryString(Z);return{hostname:$,port:W?parseInt(W):void 0,protocol:Q,path:z,query:X}},"parseUrl")});var T$=q((dz,b4)=>{var{defineProperty:L0,getOwnPropertyDescriptor:J$,getOwnPropertyNames:K$}=Object,G$=Object.prototype.hasOwnProperty,T=(j,$)=>L0(j,"name",{value:$,configurable:!0}),Y$=(j,$)=>{for(var z in $)L0(j,z,{get:$[z],enumerable:!0})},B$=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of K$($))if(!G$.call(j,Q)&&Q!==z)L0(j,Q,{get:()=>$[Q],enumerable:!(W=J$($,Q))||W.enumerable})}return j},q$=(j)=>B$(L0({},"__esModule",{value:!0}),j),H4={};Y$(H4,{endpointMiddleware:()=>L4,endpointMiddlewareOptions:()=>M4,getEndpointFromInstructions:()=>w4,getEndpointPlugin:()=>N$,resolveEndpointConfig:()=>C$,resolveParams:()=>U4,toEndpointV1:()=>t0});b4.exports=q$(H4);var V$=T(async(j)=>{let $=j?.Bucket||"";if(typeof j.Bucket==="string")j.Bucket=$.replace(/#/g,encodeURIComponent("#")).replace(/\?/g,encodeURIComponent("?"));if(M$($)){if(j.ForcePathStyle===!0)throw new Error("Path-style addressing cannot be used with ARN buckets")}else if(!L$($)||$.indexOf(".")!==-1&&!String(j.Endpoint).startsWith("http:")||$.toLowerCase()!==$||$.length<3)j.ForcePathStyle=!0;if(j.DisableMultiRegionAccessPoints)j.disableMultiRegionAccessPoints=!0,j.DisableMRAP=!0;return j},"resolveParamsForS3"),H$=/^[a-z0-9][a-z0-9\.\-]{1,61}[a-z0-9]$/,w$=/(\d+\.){3}\d+/,U$=/\.\./,L$=T((j)=>H$.test(j)&&!w$.test(j)&&!U$.test(j),"isDnsCompatibleBucketName"),M$=T((j)=>{let[$,z,W,,,Q]=j.split(":"),Z=$==="arn"&&j.split(":").length>=6,X=Boolean(Z&&z&&W&&Q);if(Z&&!X)throw new Error(`Invalid ARN: ${j} was an invalid ARN.`);return X},"isArnBucketName"),b$=T((j,$,z)=>{let W=T(async()=>{let Q=z[j]??z[$];if(typeof Q==="function")return Q();return Q},"configProvider");if(j==="credentialScope"||$==="CredentialScope")return async()=>{let Q=typeof z.credentials==="function"?await z.credentials():z.credentials;return Q?.credentialScope??Q?.CredentialScope};if(j==="accountId"||$==="AccountId")return async()=>{let Q=typeof z.credentials==="function"?await z.credentials():z.credentials;return Q?.accountId??Q?.AccountId};if(j==="endpoint"||$==="endpoint")return async()=>{let Q=await W();if(Q&&typeof Q==="object"){if("url"in Q)return Q.url.href;if("hostname"in Q){let{protocol:Z,hostname:X,port:J,path:K}=Q;return`${Z}//${X}${J?":"+J:""}${K}`}}return Q};return W},"createConfigValueProvider"),F$=r0(),V4=o0(),t0=T((j)=>{if(typeof j==="object"){if("url"in j)return V4.parseUrl(j.url);return j}return V4.parseUrl(j)},"toEndpointV1"),w4=T(async(j,$,z,W)=>{if(!z.endpoint){let X;if(z.serviceConfiguredEndpoint)X=await z.serviceConfiguredEndpoint();else X=await F$.getEndpointFromConfig(z.serviceId);if(X)z.endpoint=()=>Promise.resolve(t0(X))}let Q=await U4(j,$,z);if(typeof z.endpointProvider!=="function")throw new Error("config.endpointProvider is not set.");return z.endpointProvider(Q,W)},"getEndpointFromInstructions"),U4=T(async(j,$,z)=>{let W={},Q=$?.getEndpointParameterInstructions?.()||{};for(let[Z,X]of Object.entries(Q))switch(X.type){case"staticContextParams":W[Z]=X.value;break;case"contextParams":W[Z]=j[X.name];break;case"clientContextParams":case"builtInParams":W[Z]=await b$(X.name,Z,z)();break;case"operationContextParams":W[Z]=X.get(j);break;default:throw new Error("Unrecognized endpoint parameter instruction: "+JSON.stringify(X))}if(Object.keys(Q).length===0)Object.assign(W,z);if(String(z.serviceId).toLowerCase()==="s3")await V$(W);return W},"resolveParams"),D$=$7(),U0=f0(),L4=T(({config:j,instructions:$})=>{return(z,W)=>async(Q)=>{if(j.endpoint)D$.setFeature(W,"ENDPOINT_OVERRIDE","N");let Z=await w4(Q.input,{getEndpointParameterInstructions(){return $}},{...j},W);W.endpointV2=Z,W.authSchemes=Z.properties?.authSchemes;let X=W.authSchemes?.[0];if(X){W.signing_region=X.signingRegion,W.signing_service=X.signingName;let K=U0.getSmithyContext(W)?.selectedHttpAuthScheme?.httpAuthOption;if(K)K.signingProperties=Object.assign(K.signingProperties||{},{signing_region:X.signingRegion,signingRegion:X.signingRegion,signing_service:X.signingName,signingName:X.signingName,signingRegionSet:X.signingRegionSet},X.properties)}return z({...Q})}},"endpointMiddleware"),h$=X$(),M4={step:"serialize",tags:["ENDPOINT_PARAMETERS","ENDPOINT_V2","ENDPOINT"],name:"endpointV2Middleware",override:!0,relation:"before",toMiddleware:h$.serializerMiddlewareOption.name},N$=T((j,$)=>({applyToStack:(z)=>{z.addRelativeTo(L4({config:j,instructions:$}),M4)}}),"getEndpointPlugin"),O$=r0(),C$=T((j)=>{let $=j.tls??!0,{endpoint:z,useDualstackEndpoint:W,useFipsEndpoint:Q}=j,Z=z!=null?async()=>t0(await U0.normalizeProvider(z)()):void 0,J=Object.assign(j,{endpoint:Z,tls:$,isCustomEndpoint:!!z,useDualstackEndpoint:U0.normalizeProvider(W??!1),useFipsEndpoint:U0.normalizeProvider(Q??!1)}),K=void 0;return J.serviceConfiguredEndpoint=async()=>{if(j.serviceId&&!K)K=O$.getEndpointFromConfig(j.serviceId);return K},J},"resolveEndpointConfig")});var j1=q((lz,h4)=>{var{defineProperty:M0,getOwnPropertyDescriptor:I$,getOwnPropertyNames:v$}=Object,R$=Object.prototype.hasOwnProperty,u=(j,$)=>M0(j,"name",{value:$,configurable:!0}),S$=(j,$)=>{for(var z in $)M0(j,z,{get:$[z],enumerable:!0})},k$=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of v$($))if(!R$.call(j,Q)&&Q!==z)M0(j,Q,{get:()=>$[Q],enumerable:!(W=I$($,Q))||W.enumerable})}return j},P$=(j)=>k$(M0({},"__esModule",{value:!0}),j),F4={};S$(F4,{isClockSkewCorrectedError:()=>D4,isClockSkewError:()=>u$,isRetryableByTrait:()=>f$,isServerError:()=>d$,isThrottlingError:()=>c$,isTransientError:()=>e0});h4.exports=P$(F4);var A$=["AuthFailure","InvalidSignatureException","RequestExpired","RequestInTheFuture","RequestTimeTooSkewed","SignatureDoesNotMatch"],x$=["BandwidthLimitExceeded","EC2ThrottledException","LimitExceededException","PriorRequestNotComplete","ProvisionedThroughputExceededException","RequestLimitExceeded","RequestThrottled","RequestThrottledException","SlowDown","ThrottledException","Throttling","ThrottlingException","TooManyRequestsException","TransactionInProgressException"],E$=["TimeoutError","RequestTimeout","RequestTimeoutException"],y$=[500,502,503,504],g$=["ECONNRESET","ECONNREFUSED","EPIPE","ETIMEDOUT"],f$=u((j)=>j.$retryable!==void 0,"isRetryableByTrait"),u$=u((j)=>A$.includes(j.name),"isClockSkewError"),D4=u((j)=>j.$metadata?.clockSkewCorrected,"isClockSkewCorrectedError"),c$=u((j)=>j.$metadata?.httpStatusCode===429||x$.includes(j.name)||j.$retryable?.throttling==!0,"isThrottlingError"),e0=u((j,$=0)=>D4(j)||E$.includes(j.name)||g$.includes(j?.code||"")||y$.includes(j.$metadata?.httpStatusCode||0)||j.cause!==void 0&&$<=10&&e0(j.cause,$+1),"isTransientError"),d$=u((j)=>{if(j.$metadata?.httpStatusCode!==void 0){let $=j.$metadata.httpStatusCode;if(500<=$&&$<=599&&!e0(j))return!0;return!1}return!1},"isServerError")});var P4=q((_z,k4)=>{var{defineProperty:b0,getOwnPropertyDescriptor:l$,getOwnPropertyNames:_$}=Object,s$=Object.prototype.hasOwnProperty,I=(j,$)=>b0(j,"name",{value:$,configurable:!0}),m$=(j,$)=>{for(var z in $)b0(j,z,{get:$[z],enumerable:!0})},p$=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of _$($))if(!s$.call(j,Q)&&Q!==z)b0(j,Q,{get:()=>$[Q],enumerable:!(W=l$($,Q))||W.enumerable})}return j},i$=(j)=>p$(b0({},"__esModule",{value:!0}),j),O4={};m$(O4,{AdaptiveRetryStrategy:()=>e$,ConfiguredRetryStrategy:()=>j2,DEFAULT_MAX_ATTEMPTS:()=>$1,DEFAULT_RETRY_DELAY_BASE:()=>i,DEFAULT_RETRY_MODE:()=>a$,DefaultRateLimiter:()=>T4,INITIAL_RETRY_TOKENS:()=>z1,INVOCATION_ID_HEADER:()=>r$,MAXIMUM_RETRY_DELAY:()=>Q1,NO_RETRY_INCREMENT:()=>S4,REQUEST_HEADER:()=>o$,RETRY_COST:()=>v4,RETRY_MODES:()=>C4,StandardRetryStrategy:()=>W1,THROTTLING_RETRY_DELAY_BASE:()=>I4,TIMEOUT_RETRY_COST:()=>R4});k4.exports=i$(O4);var C4=((j)=>{return j.STANDARD="standard",j.ADAPTIVE="adaptive",j})(C4||{}),$1=3,a$="standard",n$=j1(),T4=class j{constructor($){this.currentCapacity=0,this.enabled=!1,this.lastMaxRate=0,this.measuredTxRate=0,this.requestCount=0,this.lastTimestamp=0,this.timeWindow=0,this.beta=$?.beta??0.7,this.minCapacity=$?.minCapacity??1,this.minFillRate=$?.minFillRate??0.5,this.scaleConstant=$?.scaleConstant??0.4,this.smooth=$?.smooth??0.8;let z=this.getCurrentTimeInSeconds();this.lastThrottleTime=z,this.lastTxRateBucket=Math.floor(this.getCurrentTimeInSeconds()),this.fillRate=this.minFillRate,this.maxCapacity=this.minCapacity}static{I(this,"DefaultRateLimiter")}static{this.setTimeoutFn=setTimeout}getCurrentTimeInSeconds(){return Date.now()/1000}async getSendToken(){return this.acquireTokenBucket(1)}async acquireTokenBucket($){if(!this.enabled)return;if(this.refillTokenBucket(),$>this.currentCapacity){let z=($-this.currentCapacity)/this.fillRate*1000;await new Promise((W)=>j.setTimeoutFn(W,z))}this.currentCapacity=this.currentCapacity-$}refillTokenBucket(){let $=this.getCurrentTimeInSeconds();if(!this.lastTimestamp){this.lastTimestamp=$;return}let z=($-this.lastTimestamp)*this.fillRate;this.currentCapacity=Math.min(this.maxCapacity,this.currentCapacity+z),this.lastTimestamp=$}updateClientSendingRate($){let z;if(this.updateMeasuredRate(),n$.isThrottlingError($)){let Q=!this.enabled?this.measuredTxRate:Math.min(this.measuredTxRate,this.fillRate);this.lastMaxRate=Q,this.calculateTimeWindow(),this.lastThrottleTime=this.getCurrentTimeInSeconds(),z=this.cubicThrottle(Q),this.enableTokenBucket()}else this.calculateTimeWindow(),z=this.cubicSuccess(this.getCurrentTimeInSeconds());let W=Math.min(z,2*this.measuredTxRate);this.updateTokenBucketRate(W)}calculateTimeWindow(){this.timeWindow=this.getPrecise(Math.pow(this.lastMaxRate*(1-this.beta)/this.scaleConstant,0.3333333333333333))}cubicThrottle($){return this.getPrecise($*this.beta)}cubicSuccess($){return this.getPrecise(this.scaleConstant*Math.pow($-this.lastThrottleTime-this.timeWindow,3)+this.lastMaxRate)}enableTokenBucket(){this.enabled=!0}updateTokenBucketRate($){this.refillTokenBucket(),this.fillRate=Math.max($,this.minFillRate),this.maxCapacity=Math.max($,this.minCapacity),this.currentCapacity=Math.min(this.currentCapacity,this.maxCapacity)}updateMeasuredRate(){let $=this.getCurrentTimeInSeconds(),z=Math.floor($*2)/2;if(this.requestCount++,z>this.lastTxRateBucket){let W=this.requestCount/(z-this.lastTxRateBucket);this.measuredTxRate=this.getPrecise(W*this.smooth+this.measuredTxRate*(1-this.smooth)),this.requestCount=0,this.lastTxRateBucket=z}}getPrecise($){return parseFloat($.toFixed(8))}},i=100,Q1=20000,I4=500,z1=500,v4=5,R4=10,S4=1,r$="amz-sdk-invocation-id",o$="amz-sdk-request",t$=I(()=>{let j=i;return{computeNextBackoffDelay:I((W)=>{return Math.floor(Math.min(Q1,Math.random()*2**W*j))},"computeNextBackoffDelay"),setDelayBase:I((W)=>{j=W},"setDelayBase")}},"getDefaultRetryBackoffStrategy"),N4=I(({retryDelay:j,retryCount:$,retryCost:z})=>{return{getRetryCount:I(()=>$,"getRetryCount"),getRetryDelay:I(()=>Math.min(Q1,j),"getRetryDelay"),getRetryCost:I(()=>z,"getRetryCost")}},"createDefaultRetryToken"),W1=class{constructor(j){this.maxAttempts=j,this.mode="standard",this.capacity=z1,this.retryBackoffStrategy=t$(),this.maxAttemptsProvider=typeof j==="function"?j:async()=>j}static{I(this,"StandardRetryStrategy")}async acquireInitialRetryToken(j){return N4({retryDelay:i,retryCount:0})}async refreshRetryTokenForRetry(j,$){let z=await this.getMaxAttempts();if(this.shouldRetry(j,$,z)){let W=$.errorType;this.retryBackoffStrategy.setDelayBase(W==="THROTTLING"?I4:i);let Q=this.retryBackoffStrategy.computeNextBackoffDelay(j.getRetryCount()),Z=$.retryAfterHint?Math.max($.retryAfterHint.getTime()-Date.now()||0,Q):Q,X=this.getCapacityCost(W);return this.capacity-=X,N4({retryDelay:Z,retryCount:j.getRetryCount()+1,retryCost:X})}throw new Error("No retry token available")}recordSuccess(j){this.capacity=Math.max(z1,this.capacity+(j.getRetryCost()??S4))}getCapacity(){return this.capacity}async getMaxAttempts(){try{return await this.maxAttemptsProvider()}catch(j){return console.warn(`Max attempts provider could not resolve. Using default of ${$1}`),$1}}shouldRetry(j,$,z){return j.getRetryCount()+1<z&&this.capacity>=this.getCapacityCost($.errorType)&&this.isRetryableError($.errorType)}getCapacityCost(j){return j==="TRANSIENT"?R4:v4}isRetryableError(j){return j==="THROTTLING"||j==="TRANSIENT"}},e$=class{constructor(j,$){this.maxAttemptsProvider=j,this.mode="adaptive";let{rateLimiter:z}=$??{};this.rateLimiter=z??new T4,this.standardRetryStrategy=new W1(j)}static{I(this,"AdaptiveRetryStrategy")}async acquireInitialRetryToken(j){return await this.rateLimiter.getSendToken(),this.standardRetryStrategy.acquireInitialRetryToken(j)}async refreshRetryTokenForRetry(j,$){return this.rateLimiter.updateClientSendingRate($),this.standardRetryStrategy.refreshRetryTokenForRetry(j,$)}recordSuccess(j){this.rateLimiter.updateClientSendingRate({}),this.standardRetryStrategy.recordSuccess(j)}},j2=class extends W1{static{I(this,"ConfiguredRetryStrategy")}constructor(j,$=i){super(typeof j==="function"?j:async()=>j);if(typeof $==="number")this.computeNextBackoffDelay=()=>$;else this.computeNextBackoffDelay=$}async refreshRetryTokenForRetry(j,$){let z=await super.refreshRetryTokenForRetry(j,$);return z.getRetryDelay=()=>this.computeNextBackoffDelay(z.getRetryCount()),z}}});var E4=q((A4)=>{Object.defineProperty(A4,"__esModule",{value:!0});A4.isStreamingPayload=void 0;var $2=F("stream"),z2=(j)=>(j===null||j===void 0?void 0:j.body)instanceof $2.Readable||typeof ReadableStream!=="undefined"&&(j===null||j===void 0?void 0:j.body)instanceof ReadableStream;A4.isStreamingPayload=z2});var O2=q((az,r4)=>{var{defineProperty:F0,getOwnPropertyDescriptor:Z2,getOwnPropertyNames:X2}=Object,J2=Object.prototype.hasOwnProperty,L=(j,$)=>F0(j,"name",{value:$,configurable:!0}),K2=(j,$)=>{for(var z in $)F0(j,z,{get:$[z],enumerable:!0})},G2=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of X2($))if(!J2.call(j,Q)&&Q!==z)F0(j,Q,{get:()=>$[Q],enumerable:!(W=Z2($,Q))||W.enumerable})}return j},Y2=(j)=>G2(F0({},"__esModule",{value:!0}),j),g4={};K2(g4,{AdaptiveRetryStrategy:()=>V2,CONFIG_MAX_ATTEMPTS:()=>X1,CONFIG_RETRY_MODE:()=>s4,ENV_MAX_ATTEMPTS:()=>Z1,ENV_RETRY_MODE:()=>_4,NODE_MAX_ATTEMPT_CONFIG_OPTIONS:()=>H2,NODE_RETRY_MODE_CONFIG_OPTIONS:()=>U2,StandardRetryStrategy:()=>l4,defaultDelayDecider:()=>u4,defaultRetryDecider:()=>c4,getOmitRetryHeadersPlugin:()=>L2,getRetryAfterHint:()=>n4,getRetryPlugin:()=>N2,omitRetryHeadersMiddleware:()=>m4,omitRetryHeadersMiddlewareOptions:()=>p4,resolveRetryConfig:()=>w2,retryMiddleware:()=>i4,retryMiddlewareOptions:()=>a4});r4.exports=Y2(g4);var c=l(),f4=W2(),U=P4(),B2=L((j,$)=>{let z=j,W=$?.noRetryIncrement??U.NO_RETRY_INCREMENT,Q=$?.retryCost??U.RETRY_COST,Z=$?.timeoutRetryCost??U.TIMEOUT_RETRY_COST,X=j,J=L((Y)=>Y.name==="TimeoutError"?Z:Q,"getCapacityAmount"),K=L((Y)=>J(Y)<=X,"hasRetryTokens");return Object.freeze({hasRetryTokens:K,retrieveRetryTokens:L((Y)=>{if(!K(Y))throw new Error("No retry token available");let B=J(Y);return X-=B,B},"retrieveRetryTokens"),releaseRetryTokens:L((Y)=>{X+=Y??W,X=Math.min(X,z)},"releaseRetryTokens")})},"getDefaultRetryQuota"),u4=L((j,$)=>Math.floor(Math.min(U.MAXIMUM_RETRY_DELAY,Math.random()*2**$*j)),"defaultDelayDecider"),x=j1(),c4=L((j)=>{if(!j)return!1;return x.isRetryableByTrait(j)||x.isClockSkewError(j)||x.isThrottlingError(j)||x.isTransientError(j)},"defaultRetryDecider"),d4=L((j)=>{if(j instanceof Error)return j;if(j instanceof Object)return Object.assign(new Error,j);if(typeof j==="string")return new Error(j);return new Error(`AWS SDK error wrapper for ${j}`)},"asSdkError"),l4=class{constructor(j,$){this.maxAttemptsProvider=j,this.mode=U.RETRY_MODES.STANDARD,this.retryDecider=$?.retryDecider??c4,this.delayDecider=$?.delayDecider??u4,this.retryQuota=$?.retryQuota??B2(U.INITIAL_RETRY_TOKENS)}static{L(this,"StandardRetryStrategy")}shouldRetry(j,$,z){return $<z&&this.retryDecider(j)&&this.retryQuota.hasRetryTokens(j)}async getMaxAttempts(){let j;try{j=await this.maxAttemptsProvider()}catch($){j=U.DEFAULT_MAX_ATTEMPTS}return j}async retry(j,$,z){let W,Q=0,Z=0,X=await this.getMaxAttempts(),{request:J}=$;if(c.HttpRequest.isInstance(J))J.headers[U.INVOCATION_ID_HEADER]=f4.v4();while(!0)try{if(c.HttpRequest.isInstance(J))J.headers[U.REQUEST_HEADER]=`attempt=${Q+1}; max=${X}`;if(z?.beforeRequest)await z.beforeRequest();let{response:K,output:G}=await j($);if(z?.afterRequest)z.afterRequest(K);return this.retryQuota.releaseRetryTokens(W),G.$metadata.attempts=Q+1,G.$metadata.totalRetryDelay=Z,{response:K,output:G}}catch(K){let G=d4(K);if(Q++,this.shouldRetry(G,Q,X)){W=this.retryQuota.retrieveRetryTokens(G);let V=this.delayDecider(x.isThrottlingError(G)?U.THROTTLING_RETRY_DELAY_BASE:U.DEFAULT_RETRY_DELAY_BASE,Q),Y=q2(G.$response),B=Math.max(Y||0,V);Z+=B,await new Promise((b)=>setTimeout(b,B));continue}if(!G.$metadata)G.$metadata={};throw G.$metadata.attempts=Q,G.$metadata.totalRetryDelay=Z,G}}},q2=L((j)=>{if(!c.HttpResponse.isInstance(j))return;let $=Object.keys(j.headers).find((Z)=>Z.toLowerCase()==="retry-after");if(!$)return;let z=j.headers[$],W=Number(z);if(!Number.isNaN(W))return W*1000;return new Date(z).getTime()-Date.now()},"getDelayFromRetryAfterHeader"),V2=class extends l4{static{L(this,"AdaptiveRetryStrategy")}constructor(j,$){let{rateLimiter:z,...W}=$??{};super(j,W);this.rateLimiter=z??new U.DefaultRateLimiter,this.mode=U.RETRY_MODES.ADAPTIVE}async retry(j,$){return super.retry(j,$,{beforeRequest:async()=>{return this.rateLimiter.getSendToken()},afterRequest:(z)=>{this.rateLimiter.updateClientSendingRate(z)}})}},y4=f0(),Z1="AWS_MAX_ATTEMPTS",X1="max_attempts",H2={environmentVariableSelector:(j)=>{let $=j[Z1];if(!$)return;let z=parseInt($);if(Number.isNaN(z))throw new Error(`Environment variable ${Z1} mast be a number, got "${$}"`);return z},configFileSelector:(j)=>{let $=j[X1];if(!$)return;let z=parseInt($);if(Number.isNaN(z))throw new Error(`Shared config file entry ${X1} mast be a number, got "${$}"`);return z},default:U.DEFAULT_MAX_ATTEMPTS},w2=L((j)=>{let{retryStrategy:$,retryMode:z,maxAttempts:W}=j,Q=y4.normalizeProvider(W??U.DEFAULT_MAX_ATTEMPTS);return Object.assign(j,{maxAttempts:Q,retryStrategy:async()=>{if($)return $;if(await y4.normalizeProvider(z)()===U.RETRY_MODES.ADAPTIVE)return new U.AdaptiveRetryStrategy(Q);return new U.StandardRetryStrategy(Q)}})},"resolveRetryConfig"),_4="AWS_RETRY_MODE",s4="retry_mode",U2={environmentVariableSelector:(j)=>j[_4],configFileSelector:(j)=>j[s4],default:U.DEFAULT_RETRY_MODE},m4=L(()=>(j)=>async($)=>{let{request:z}=$;if(c.HttpRequest.isInstance(z))delete z.headers[U.INVOCATION_ID_HEADER],delete z.headers[U.REQUEST_HEADER];return j($)},"omitRetryHeadersMiddleware"),p4={name:"omitRetryHeadersMiddleware",tags:["RETRY","HEADERS","OMIT_RETRY_HEADERS"],relation:"before",toMiddleware:"awsAuthMiddleware",override:!0},L2=L((j)=>({applyToStack:($)=>{$.addRelativeTo(m4(),p4)}}),"getOmitRetryHeadersPlugin"),M2=Q2(),b2=E4(),i4=L((j)=>($,z)=>async(W)=>{let Q=await j.retryStrategy(),Z=await j.maxAttempts();if(F2(Q)){Q=Q;let X=await Q.acquireInitialRetryToken(z.partition_id),J=new Error,K=0,G=0,{request:V}=W,Y=c.HttpRequest.isInstance(V);if(Y)V.headers[U.INVOCATION_ID_HEADER]=f4.v4();while(!0)try{if(Y)V.headers[U.REQUEST_HEADER]=`attempt=${K+1}; max=${Z}`;let{response:B,output:b}=await $(W);return Q.recordSuccess(X),b.$metadata.attempts=K+1,b.$metadata.totalRetryDelay=G,{response:B,output:b}}catch(B){let b=D2(B);if(J=d4(B),Y&&b2.isStreamingPayload(V))throw(z.logger instanceof M2.NoOpLogger?console:z.logger)?.warn("An error was encountered in a non-retryable streaming request."),J;try{X=await Q.refreshRetryTokenForRetry(X,b)}catch(O){if(!J.$metadata)J.$metadata={};throw J.$metadata.attempts=K+1,J.$metadata.totalRetryDelay=G,J}K=X.getRetryCount();let D=X.getRetryDelay();G+=D,await new Promise((O)=>setTimeout(O,D))}}else{if(Q=Q,Q?.mode)z.userAgent=[...z.userAgent||[],["cfg/retry-mode",Q.mode]];return Q.retry($,W)}},"retryMiddleware"),F2=L((j)=>typeof j.acquireInitialRetryToken!=="undefined"&&typeof j.refreshRetryTokenForRetry!=="undefined"&&typeof j.recordSuccess!=="undefined","isRetryStrategyV2"),D2=L((j)=>{let $={error:j,errorType:h2(j)},z=n4(j.$response);if(z)$.retryAfterHint=z;return $},"getRetryErrorInfo"),h2=L((j)=>{if(x.isThrottlingError(j))return"THROTTLING";if(x.isTransientError(j))return"TRANSIENT";if(x.isServerError(j))return"SERVER_ERROR";return"CLIENT_ERROR"},"getRetryErrorType"),a4={name:"retryMiddleware",tags:["RETRY"],step:"finalizeRequest",priority:"high",override:!0},N2=L((j)=>({applyToStack:($)=>{$.add(i4(j),a4)}}),"getRetryPlugin"),n4=L((j)=>{if(!c.HttpResponse.isInstance(j))return;let $=Object.keys(j.headers).find((Z)=>Z.toLowerCase()==="retry-after");if(!$)return;let z=j.headers[$],W=Number(z);if(!Number.isNaN(W))return new Date(W*1000);return new Date(z)},"getRetryAfterHint")});var y2=q((oz,z5)=>{var{defineProperty:D0,getOwnPropertyDescriptor:C2,getOwnPropertyNames:T2}=Object,I2=Object.prototype.hasOwnProperty,R=(j,$)=>D0(j,"name",{value:$,configurable:!0}),v2=(j,$)=>{for(var z in $)D0(j,z,{get:$[z],enumerable:!0})},R2=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of T2($))if(!I2.call(j,Q)&&Q!==z)D0(j,Q,{get:()=>$[Q],enumerable:!(W=C2($,Q))||W.enumerable})}return j},S2=(j)=>R2(D0({},"__esModule",{value:!0}),j),t4={};v2(t4,{NODE_REGION_CONFIG_FILE_OPTIONS:()=>x2,NODE_REGION_CONFIG_OPTIONS:()=>A2,REGION_ENV_NAME:()=>e4,REGION_INI_NAME:()=>j5,getAwsRegionExtensionConfiguration:()=>k2,resolveAwsRegionExtensionConfiguration:()=>P2,resolveRegionConfig:()=>E2});z5.exports=S2(t4);var k2=R((j)=>{return{setRegion($){j.region=$},region(){return j.region}}},"getAwsRegionExtensionConfiguration"),P2=R((j)=>{return{region:j.region()}},"resolveAwsRegionExtensionConfiguration"),e4="AWS_REGION",j5="region",A2={environmentVariableSelector:R((j)=>j[e4],"environmentVariableSelector"),configFileSelector:R((j)=>j[j5],"configFileSelector"),default:R(()=>{throw new Error("Region is missing")},"default")},x2={preferredFile:"credentials"},$5=R((j)=>typeof j==="string"&&(j.startsWith("fips-")||j.endsWith("-fips")),"isFipsRegion"),o4=R((j)=>$5(j)?["fips-aws-global","aws-fips"].includes(j)?"us-east-1":j.replace(/fips-(dkr-|prod-)?|-fips/,""):j,"getRealRegion"),E2=R((j)=>{let{region:$,useFipsEndpoint:z}=j;if(!$)throw new Error("Region is missing");return Object.assign(j,{region:R(async()=>{if(typeof $==="string")return o4($);let W=await $();return o4(W)},"region"),useFipsEndpoint:R(async()=>{let W=typeof $==="string"?$:await $();if($5(W))return!0;return typeof z!=="function"?Promise.resolve(!!z):z()},"useFipsEndpoint")})},"resolveRegionConfig")});var f2=q((tz,g2)=>{g2.exports={name:"@aws-sdk/nested-clients",version:"3.797.0",description:"Nested clients for AWS SDK packages.",main:"./dist-cjs/index.js",module:"./dist-es/index.js",types:"./dist-types/index.d.ts",scripts:{build:"yarn lint && concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline nested-clients","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo",lint:"node ../../scripts/validation/submodules-linter.js --pkg nested-clients",test:"yarn g:vitest run","test:watch":"yarn g:vitest watch"},engines:{node:">=18.0.0"},author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.796.0","@aws-sdk/middleware-host-header":"3.775.0","@aws-sdk/middleware-logger":"3.775.0","@aws-sdk/middleware-recursion-detection":"3.775.0","@aws-sdk/middleware-user-agent":"3.796.0","@aws-sdk/region-config-resolver":"3.775.0","@aws-sdk/types":"3.775.0","@aws-sdk/util-endpoints":"3.787.0","@aws-sdk/util-user-agent-browser":"3.775.0","@aws-sdk/util-user-agent-node":"3.796.0","@smithy/config-resolver":"^4.1.0","@smithy/core":"^3.2.0","@smithy/fetch-http-handler":"^5.0.2","@smithy/hash-node":"^4.0.2","@smithy/invalid-dependency":"^4.0.2","@smithy/middleware-content-length":"^4.0.2","@smithy/middleware-endpoint":"^4.1.0","@smithy/middleware-retry":"^4.1.0","@smithy/middleware-serde":"^4.0.3","@smithy/middleware-stack":"^4.0.2","@smithy/node-config-provider":"^4.0.2","@smithy/node-http-handler":"^4.0.4","@smithy/protocol-http":"^5.1.0","@smithy/smithy-client":"^4.2.0","@smithy/types":"^4.2.0","@smithy/url-parser":"^4.0.2","@smithy/util-base64":"^4.0.0","@smithy/util-body-length-browser":"^4.0.0","@smithy/util-body-length-node":"^4.0.0","@smithy/util-defaults-mode-browser":"^4.0.8","@smithy/util-defaults-mode-node":"^4.0.8","@smithy/util-endpoints":"^3.0.2","@smithy/util-middleware":"^4.0.2","@smithy/util-retry":"^4.0.2","@smithy/util-utf8":"^4.0.0",tslib:"^2.6.2"},devDependencies:{concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~5.2.2"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["./sso-oidc.d.ts","./sso-oidc.js","./sts.d.ts","./sts.js","dist-*/**"],browser:{"./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"packages/nested-clients"},exports:{"./sso-oidc":{types:"./dist-types/submodules/sso-oidc/index.d.ts",module:"./dist-es/submodules/sso-oidc/index.js",node:"./dist-cjs/submodules/sso-oidc/index.js",import:"./dist-es/submodules/sso-oidc/index.js",require:"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{types:"./dist-types/submodules/sts/index.d.ts",module:"./dist-es/submodules/sts/index.js",node:"./dist-cjs/submodules/sts/index.js",import:"./dist-es/submodules/sts/index.js",require:"./dist-cjs/submodules/sts/index.js"}}}});var r2=q((ez,G5)=>{var{defineProperty:N0,getOwnPropertyDescriptor:u2,getOwnPropertyNames:c2}=Object,d2=Object.prototype.hasOwnProperty,h0=(j,$)=>N0(j,"name",{value:$,configurable:!0}),l2=(j,$)=>{for(var z in $)N0(j,z,{get:$[z],enumerable:!0})},_2=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of c2($))if(!d2.call(j,Q)&&Q!==z)N0(j,Q,{get:()=>$[Q],enumerable:!(W=u2($,Q))||W.enumerable})}return j},s2=(j)=>_2(N0({},"__esModule",{value:!0}),j),W5={};l2(W5,{NODE_APP_ID_CONFIG_OPTIONS:()=>n2,UA_APP_ID_ENV_NAME:()=>J5,UA_APP_ID_INI_NAME:()=>K5,createDefaultUserAgentProvider:()=>X5,crtAvailability:()=>Z5,defaultUserAgent:()=>p2});G5.exports=s2(W5);var Q5=F("os"),J1=F("process"),Z5={isCrtAvailable:!1},m2=h0(()=>{if(Z5.isCrtAvailable)return["md/crt-avail"];return null},"isCrtAvailable"),X5=h0(({serviceId:j,clientVersion:$})=>{return async(z)=>{let W=[["aws-sdk-js",$],["ua","2.1"],[`os/${Q5.platform()}`,Q5.release()],["lang/js"],["md/nodejs",`${J1.versions.node}`]],Q=m2();if(Q)W.push(Q);if(j)W.push([`api/${j}`,$]);if(J1.env.AWS_EXECUTION_ENV)W.push([`exec-env/${J1.env.AWS_EXECUTION_ENV}`]);let Z=await z?.userAgentAppId?.();return Z?[...W,[`app/${Z}`]]:[...W]}},"createDefaultUserAgentProvider"),p2=X5,i2=B7(),J5="AWS_SDK_UA_APP_ID",K5="sdk_ua_app_id",a2="sdk-ua-app-id",n2={environmentVariableSelector:h0((j)=>j[J5],"environmentVariableSelector"),configFileSelector:h0((j)=>j[K5]??j[a2],"configFileSelector"),default:i2.DEFAULT_UA_APP_ID}});var K9=q((jQ,V5)=>{var{defineProperty:O0,getOwnPropertyDescriptor:e2,getOwnPropertyNames:j9}=Object,$9=Object.prototype.hasOwnProperty,B5=(j,$)=>O0(j,"name",{value:$,configurable:!0}),z9=(j,$)=>{for(var z in $)O0(j,z,{get:$[z],enumerable:!0})},Q9=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of j9($))if(!$9.call(j,Q)&&Q!==z)O0(j,Q,{get:()=>$[Q],enumerable:!(W=e2($,Q))||W.enumerable})}return j},W9=(j)=>Q9(O0({},"__esModule",{value:!0}),j),q5={};z9(q5,{Hash:()=>J9});V5.exports=W9(q5);var K1=o2(),Z9=t2(),X9=F("buffer"),Y5=F("crypto"),J9=class{static{B5(this,"Hash")}constructor(j,$){this.algorithmIdentifier=j,this.secret=$,this.reset()}update(j,$){this.hash.update(Z9.toUint8Array(G1(j,$)))}digest(){return Promise.resolve(this.hash.digest())}reset(){this.hash=this.secret?Y5.createHmac(this.algorithmIdentifier,G1(this.secret)):Y5.createHash(this.algorithmIdentifier)}};function G1(j,$){if(X9.Buffer.isBuffer(j))return j;if(typeof j==="string")return K1.fromString(j,$);if(ArrayBuffer.isView(j))return K1.fromArrayBuffer(j.buffer,j.byteOffset,j.byteLength);return K1.fromArrayBuffer(j)}B5(G1,"castSourceData")});var L9=q((zQ,U5)=>{var{defineProperty:C0,getOwnPropertyDescriptor:G9,getOwnPropertyNames:Y9}=Object,B9=Object.prototype.hasOwnProperty,q9=(j,$)=>C0(j,"name",{value:$,configurable:!0}),V9=(j,$)=>{for(var z in $)C0(j,z,{get:$[z],enumerable:!0})},H9=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of Y9($))if(!B9.call(j,Q)&&Q!==z)C0(j,Q,{get:()=>$[Q],enumerable:!(W=G9($,Q))||W.enumerable})}return j},w9=(j)=>H9(C0({},"__esModule",{value:!0}),j),w5={};V9(w5,{calculateBodyLength:()=>U9});U5.exports=w9(w5);var H5=F("fs"),U9=q9((j)=>{if(!j)return 0;if(typeof j==="string")return Buffer.byteLength(j);else if(typeof j.byteLength==="number")return j.byteLength;else if(typeof j.size==="number")return j.size;else if(typeof j.start==="number"&&typeof j.end==="number")return j.end+1-j.start;else if(typeof j.path==="string"||Buffer.isBuffer(j.path))return H5.lstatSync(j.path).size;else if(typeof j.fd==="number")return H5.fstatSync(j.fd).size;throw new Error(`Body Length computation failed for ${j}`)},"calculateBodyLength")});var S5=q((QQ,R5)=>{var{defineProperty:v0,getOwnPropertyDescriptor:M9,getOwnPropertyNames:b9}=Object,F9=Object.prototype.hasOwnProperty,M=(j,$)=>v0(j,"name",{value:$,configurable:!0}),D9=(j,$)=>{for(var z in $)v0(j,z,{get:$[z],enumerable:!0})},h9=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of b9($))if(!F9.call(j,Q)&&Q!==z)v0(j,Q,{get:()=>$[Q],enumerable:!(W=M9($,Q))||W.enumerable})}return j},N9=(j)=>h9(v0({},"__esModule",{value:!0}),j),F5={};D9(F5,{DEFAULT_MAX_RETRIES:()=>O5,DEFAULT_TIMEOUT:()=>N5,ENV_CMDS_AUTH_TOKEN:()=>q1,ENV_CMDS_FULL_URI:()=>T0,ENV_CMDS_RELATIVE_URI:()=>I0,Endpoint:()=>C5,fromContainerMetadata:()=>I9,fromInstanceMetadata:()=>a9,getInstanceMetadataEndpoint:()=>I5,httpRequest:()=>d,providerConfigFromInit:()=>V1});R5.exports=N9(F5);var O9=F("url"),S=a0(),C9=F("buffer"),T9=F("http");function d(j){return new Promise(($,z)=>{let W=T9.request({method:"GET",...j,hostname:j.hostname?.replace(/^\[(.+)\]$/,"$1")});W.on("error",(Q)=>{z(Object.assign(new S.ProviderError("Unable to connect to instance metadata service"),Q)),W.destroy()}),W.on("timeout",()=>{z(new S.ProviderError("TimeoutError from instance metadata service")),W.destroy()}),W.on("response",(Q)=>{let{statusCode:Z=400}=Q;if(Z<200||300<=Z)z(Object.assign(new S.ProviderError("Error response received from instance metadata service"),{statusCode:Z})),W.destroy();let X=[];Q.on("data",(J)=>{X.push(J)}),Q.on("end",()=>{$(C9.Buffer.concat(X)),W.destroy()})}),W.end()})}M(d,"httpRequest");var D5=M((j)=>Boolean(j)&&typeof j==="object"&&typeof j.AccessKeyId==="string"&&typeof j.SecretAccessKey==="string"&&typeof j.Token==="string"&&typeof j.Expiration==="string","isImdsCredentials"),h5=M((j)=>({accessKeyId:j.AccessKeyId,secretAccessKey:j.SecretAccessKey,sessionToken:j.Token,expiration:new Date(j.Expiration),...j.AccountId&&{accountId:j.AccountId}}),"fromImdsCredentials"),N5=1000,O5=0,V1=M(({maxRetries:j=O5,timeout:$=N5})=>({maxRetries:j,timeout:$}),"providerConfigFromInit"),B1=M((j,$)=>{let z=j();for(let W=0;W<$;W++)z=z.catch(j);return z},"retry"),T0="AWS_CONTAINER_CREDENTIALS_FULL_URI",I0="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",q1="AWS_CONTAINER_AUTHORIZATION_TOKEN",I9=M((j={})=>{let{timeout:$,maxRetries:z}=V1(j);return()=>B1(async()=>{let W=await P9({logger:j.logger}),Q=JSON.parse(await v9($,W));if(!D5(Q))throw new S.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:j.logger});return h5(Q)},z)},"fromContainerMetadata"),v9=M(async(j,$)=>{if(process.env[q1])$.headers={...$.headers,Authorization:process.env[q1]};return(await d({...$,timeout:j})).toString()},"requestFromEcsImds"),R9="169.254.170.2",S9={localhost:!0,"127.0.0.1":!0},k9={"http:":!0,"https:":!0},P9=M(async({logger:j})=>{if(process.env[I0])return{hostname:R9,path:process.env[I0]};if(process.env[T0]){let $=O9.parse(process.env[T0]);if(!$.hostname||!($.hostname in S9))throw new S.CredentialsProviderError(`${$.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:j});if(!$.protocol||!($.protocol in k9))throw new S.CredentialsProviderError(`${$.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:j});return{...$,port:$.port?parseInt($.port,10):void 0}}throw new S.CredentialsProviderError(`The container metadata credential provider cannot be used unless the ${I0} or ${T0} environment variable is set`,{tryNextLink:!1,logger:j})},"getCmdsUri"),A9=class j extends S.CredentialsProviderError{constructor($,z=!0){super($,z);this.tryNextLink=z,this.name="InstanceMetadataV1FallbackError",Object.setPrototypeOf(this,j.prototype)}static{M(this,"InstanceMetadataV1FallbackError")}},H1=V0(),x9=o0(),C5=((j)=>{return j.IPv4="http://169.254.169.254",j.IPv6="http://[fd00:ec2::254]",j})(C5||{}),E9="AWS_EC2_METADATA_SERVICE_ENDPOINT",y9="ec2_metadata_service_endpoint",g9={environmentVariableSelector:(j)=>j[E9],configFileSelector:(j)=>j[y9],default:void 0},T5=((j)=>{return j.IPv4="IPv4",j.IPv6="IPv6",j})(T5||{}),f9="AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE",u9="ec2_metadata_service_endpoint_mode",c9={environmentVariableSelector:(j)=>j[f9],configFileSelector:(j)=>j[u9],default:"IPv4"},I5=M(async()=>x9.parseUrl(await d9()||await l9()),"getInstanceMetadataEndpoint"),d9=M(async()=>H1.loadConfig(g9)(),"getFromEndpointConfig"),l9=M(async()=>{let j=await H1.loadConfig(c9)();switch(j){case"IPv4":return"http://169.254.169.254";case"IPv6":return"http://[fd00:ec2::254]";default:throw new Error(`Unsupported endpoint mode: ${j}. Select from ${Object.values(T5)}`)}},"getFromEndpointModeConfig"),_9=300,s9=300,m9="https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html",L5=M((j,$)=>{let z=_9+Math.floor(Math.random()*s9),W=new Date(Date.now()+z*1000);$.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(W)}.
2
- For more information, please visit: `+m9);let Q=j.originalExpiration??j.expiration;return{...j,...Q?{originalExpiration:Q}:{},expiration:W}},"getExtendedInstanceMetadataCredentials"),p9=M((j,$={})=>{let z=$?.logger||console,W;return async()=>{let Q;try{if(Q=await j(),Q.expiration&&Q.expiration.getTime()<Date.now())Q=L5(Q,z)}catch(Z){if(W)z.warn("Credential renew failed: ",Z),Q=L5(W,z);else throw Z}return W=Q,Q}},"staticStabilityProvider"),v5="/latest/meta-data/iam/security-credentials/",i9="/latest/api/token",Y1="AWS_EC2_METADATA_V1_DISABLED",M5="ec2_metadata_v1_disabled",b5="x-aws-ec2-metadata-token",a9=M((j={})=>p9(n9(j),{logger:j.logger}),"fromInstanceMetadata"),n9=M((j={})=>{let $=!1,{logger:z,profile:W}=j,{timeout:Q,maxRetries:Z}=V1(j),X=M(async(J,K)=>{if($||K.headers?.[b5]==null){let Y=!1,B=!1,b=await H1.loadConfig({environmentVariableSelector:(D)=>{let O=D[Y1];if(B=!!O&&O!=="false",O===void 0)throw new S.CredentialsProviderError(`${Y1} not set in env, checking config file next.`,{logger:j.logger});return B},configFileSelector:(D)=>{let O=D[M5];return Y=!!O&&O!=="false",Y},default:!1},{profile:W})();if(j.ec2MetadataV1Disabled||b){let D=[];if(j.ec2MetadataV1Disabled)D.push("credential provider initialization (runtime option ec2MetadataV1Disabled)");if(Y)D.push(`config file profile (${M5})`);if(B)D.push(`process environment variable (${Y1})`);throw new A9(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${D.join(", ")}].`)}}let V=(await B1(async()=>{let Y;try{Y=await o9(K)}catch(B){if(B.statusCode===401)$=!1;throw B}return Y},J)).trim();return B1(async()=>{let Y;try{Y=await t9(V,K,j)}catch(B){if(B.statusCode===401)$=!1;throw B}return Y},J)},"getCredentials");return async()=>{let J=await I5();if($)return z?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),X(Z,{...J,timeout:Q});else{let K;try{K=(await r9({...J,timeout:Q})).toString()}catch(G){if(G?.statusCode===400)throw Object.assign(G,{message:"EC2 Metadata token request returned error"});else if(G.message==="TimeoutError"||[403,404,405].includes(G.statusCode))$=!0;return z?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),X(Z,{...J,timeout:Q})}return X(Z,{...J,headers:{[b5]:K},timeout:Q})}}},"getInstanceMetadataProvider"),r9=M(async(j)=>d({...j,path:i9,method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),"getMetadataToken"),o9=M(async(j)=>(await d({...j,path:v5})).toString(),"getProfile"),t9=M(async(j,$,z)=>{let W=JSON.parse((await d({...$,path:v5+j})).toString());if(!D5(W))throw new S.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:z.logger});return h5(W)},"getCredentialsFromProfile")});var bz=q((WQ,y5)=>{var{create:e9,defineProperty:a,getOwnPropertyDescriptor:jz,getOwnPropertyNames:$z,getPrototypeOf:zz}=Object,Qz=Object.prototype.hasOwnProperty,w1=(j,$)=>a(j,"name",{value:$,configurable:!0}),Wz=(j,$)=>{for(var z in $)a(j,z,{get:$[z],enumerable:!0})},x5=(j,$,z,W)=>{if($&&typeof $==="object"||typeof $==="function"){for(let Q of $z($))if(!Qz.call(j,Q)&&Q!==z)a(j,Q,{get:()=>$[Q],enumerable:!(W=jz($,Q))||W.enumerable})}return j},Zz=(j,$,z)=>(z=j!=null?e9(zz(j)):{},x5($||!j||!j.__esModule?a(z,"default",{value:j,enumerable:!0}):z,j)),Xz=(j)=>x5(a({},"__esModule",{value:!0}),j),E5={};Wz(E5,{resolveDefaultsModeConfig:()=>Uz});y5.exports=Xz(E5);var Jz=v7(),k5=V0(),Kz=a0(),Gz="AWS_EXECUTION_ENV",P5="AWS_REGION",A5="AWS_DEFAULT_REGION",Yz="AWS_EC2_METADATA_DISABLED",Bz=["in-region","cross-region","mobile","standard","legacy"],qz="/latest/meta-data/placement/region",Vz="AWS_DEFAULTS_MODE",Hz="defaults_mode",wz={environmentVariableSelector:(j)=>{return j[Vz]},configFileSelector:(j)=>{return j[Hz]},default:"legacy"},Uz=w1(({region:j=k5.loadConfig(Jz.NODE_REGION_CONFIG_OPTIONS),defaultsMode:$=k5.loadConfig(wz)}={})=>Kz.memoize(async()=>{let z=typeof $==="function"?await $():$;switch(z?.toLowerCase()){case"auto":return Lz(j);case"in-region":case"cross-region":case"mobile":case"standard":case"legacy":return Promise.resolve(z?.toLocaleLowerCase());case void 0:return Promise.resolve("legacy");default:throw new Error(`Invalid parameter for "defaultsMode", expect ${Bz.join(", ")}, got ${z}`)}}),"resolveDefaultsModeConfig"),Lz=w1(async(j)=>{if(j){let $=typeof j==="function"?await j():j,z=await Mz();if(!z)return"standard";if($===z)return"in-region";else return"cross-region"}return"standard"},"resolveNodeDefaultsModeAuto"),Mz=w1(async()=>{if(process.env[Gz]&&(process.env[P5]||process.env[A5]))return process.env[P5]??process.env[A5];if(!process.env[Yz])try{let{getInstanceMetadataEndpoint:j,httpRequest:$}=await Promise.resolve().then(()=>Zz(S5())),z=await j();return(await $({...z,path:qz})).toString()}catch(j){}},"inferPhysicalRegion")});
3
- export{a5 as a,zj as b,Vj as c,c1 as d,o1 as e,B7 as f,v7 as g,i6 as h,V0 as i,o0 as j,T$ as k,P4 as l,O2 as m,f2 as n,r2 as o,K9 as p,L9 as q,bz as r,y2 as s};
4
-
5
- //# debugId=3C23CEF25C37379564756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{lc as A}from"./chunk-ppdzh5mp.js";import{nc as C}from"./chunk-eznd0gdt.js";import{xc as _}from"./chunk-fmwhbymf.js";var S=_(A(),1),p=_(C(),1),N="AWS_ACCESS_KEY_ID",a="AWS_SECRET_ACCESS_KEY",i="AWS_SESSION_TOKEN",I="AWS_CREDENTIAL_EXPIRATION",d="AWS_CREDENTIAL_SCOPE",v="AWS_ACCOUNT_ID",T=(e)=>async()=>{e?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");let o=process.env[N],r=process.env[a],n=process.env[i],s=process.env[I],t=process.env[d],E=process.env[v];if(o&&r){let c={accessKeyId:o,secretAccessKey:r,...n&&{sessionToken:n},...s&&{expiration:new Date(s)},...t&&{credentialScope:t},...E&&{accountId:E}};return S.setCredentialFeature(c,"CREDENTIALS_ENV_VARS","g"),c}throw new p.CredentialsProviderError("Unable to find environment variable credentials.",{logger:e?.logger})};export{T as fromEnv,i as ENV_SESSION,a as ENV_SECRET,N as ENV_KEY,I as ENV_EXPIRATION,d as ENV_CREDENTIAL_SCOPE,v as ENV_ACCOUNT_ID};export{N as fa,a as ga,T as ha};
3
-
4
- //# debugId=67620B4E497C22CD64756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{$a as A,fb as E}from"./chunk-qsz6b41a.js";import{lc as K}from"./chunk-ppdzh5mp.js";import"./chunk-cq0rr00v.js";import{nc as T}from"./chunk-eznd0gdt.js";import{xc as w}from"./chunk-fmwhbymf.js";var o=w(T(),1);import{exec as y}from"child_process";import{promisify as I}from"util";var S=w(K(),1),x=(c,n,e)=>{if(n.Version!==1)throw Error(`Profile ${c} credential_process did not return Version 1.`);if(n.AccessKeyId===void 0||n.SecretAccessKey===void 0)throw Error(`Profile ${c} credential_process returned invalid credentials.`);if(n.Expiration){let i=new Date;if(new Date(n.Expiration)<i)throw Error(`Profile ${c} credential_process returned expired credentials.`)}let s=n.AccountId;if(!s&&e?.[c]?.aws_account_id)s=e[c].aws_account_id;let t={accessKeyId:n.AccessKeyId,secretAccessKey:n.SecretAccessKey,...n.SessionToken&&{sessionToken:n.SessionToken},...n.Expiration&&{expiration:new Date(n.Expiration)},...n.CredentialScope&&{credentialScope:n.CredentialScope},...s&&{accountId:s}};return S.setCredentialFeature(t,"CREDENTIALS_PROCESS","w"),t};var _=async(c,n,e)=>{let s=n[c];if(n[c]){let t=s.credential_process;if(t!==void 0){let i=I(y);try{let{stdout:r}=await i(t),u;try{u=JSON.parse(r.trim())}catch{throw Error(`Profile ${c} credential_process returned invalid JSON.`)}return x(c,u,n)}catch(r){throw new o.CredentialsProviderError(r.message,{logger:e})}}else throw new o.CredentialsProviderError(`Profile ${c} did not contain credential_process.`,{logger:e})}else throw new o.CredentialsProviderError(`Profile ${c} could not be found in shared credentials file.`,{logger:e})};var F=(c={})=>async({callerClientConfig:n}={})=>{c.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");let e=await E(c);return _(A({profile:c.profile??n?.profile}),e,c.logger)};export{F as fromProcess};
3
-
4
- //# debugId=79CF2E8898CB398264756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{$a as E,fb as v}from"./chunk-qsz6b41a.js";import{lc as O}from"./chunk-ppdzh5mp.js";import"./chunk-cq0rr00v.js";import{nc as $}from"./chunk-eznd0gdt.js";import{xc as k,zc as C}from"./chunk-fmwhbymf.js";var u=k($(),1);var q=k(O(),1),z=k($(),1);var U=k(O(),1),j=k($(),1),V=(y,w,_)=>{let I={EcsContainer:async(b)=>{let{fromHttp:x}=await import("./chunk-qt06jfw0.js"),{fromContainerMetadata:A}=await import("./chunk-vfh6axzv.js");return _?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),async()=>j.chain(x(b??{}),A(b))().then(R)},Ec2InstanceMetadata:async(b)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:x}=await import("./chunk-vfh6axzv.js");return async()=>x(b)().then(R)},Environment:async(b)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:x}=await import("./chunk-99j22tkv.js");return async()=>x(b)().then(R)}};if(y in I)return I[y];else throw new j.CredentialsProviderError(`Unsupported credential source in profile ${w}. Got ${y}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:_})},R=(y)=>U.setCredentialFeature(y,"CREDENTIALS_PROFILE_NAMED_PROVIDER","p");var X=(y,{profile:w="default",logger:_}={})=>{return Boolean(y)&&typeof y==="object"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1&&["undefined","string"].indexOf(typeof y.external_id)>-1&&["undefined","string"].indexOf(typeof y.mfa_serial)>-1&&(d(y,{profile:w,logger:_})||n(y,{profile:w,logger:_}))},d=(y,{profile:w,logger:_})=>{let I=typeof y.source_profile==="string"&&typeof y.credential_source==="undefined";if(I)_?.debug?.(` ${w} isAssumeRoleWithSourceProfile source_profile=${y.source_profile}`);return I},n=(y,{profile:w,logger:_})=>{let I=typeof y.credential_source==="string"&&typeof y.source_profile==="undefined";if(I)_?.debug?.(` ${w} isCredentialSourceProfile credential_source=${y.credential_source}`);return I},Y=async(y,w,_,I={})=>{_.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let b=w[y],{source_profile:x,region:A}=b;if(!_.roleAssumer){let{getDefaultRoleAssumer:K}=await import("./chunk-616257hy.js");_.roleAssumer=K({..._.clientConfig,credentialProviderLogger:_.logger,parentClientConfig:{..._?.parentClientConfig,region:A??_?.parentClientConfig?.region}},_.clientPlugins)}if(x&&x in I)throw new z.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile ${E(_)}. Profiles visited: `+Object.keys(I).join(", "),{logger:_.logger});_.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${x?`source_profile=[${x}]`:`profile=[${y}]`}`);let T=x?L(x,w,_,{...I,[x]:!0},W(w[x]??{})):(await V(b.credential_source,y,_.logger)(_))();if(W(b))return T.then((K)=>q.setCredentialFeature(K,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"));else{let K={RoleArn:b.role_arn,RoleSessionName:b.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:b.external_id,DurationSeconds:parseInt(b.duration_seconds||"3600",10)},{mfa_serial:B}=b;if(B){if(!_.mfaCodeProvider)throw new z.CredentialsProviderError(`Profile ${y} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:_.logger,tryNextLink:!1});K.SerialNumber=B,K.TokenCode=await _.mfaCodeProvider(B)}let P=await T;return _.roleAssumer(P,K).then((N)=>q.setCredentialFeature(N,"CREDENTIALS_PROFILE_SOURCE_PROFILE","o"))}},W=(y)=>{return!y.role_arn&&!!y.credential_source};var Z=k(O(),1),H=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.credential_process==="string",c=async(y,w)=>import("./chunk-b1z8jxf5.js").then(({fromProcess:_})=>_({...y,profile:w})().then((I)=>Z.setCredentialFeature(I,"CREDENTIALS_PROFILE_PROCESS","v")));var G=k(O(),1),S=async(y,w,_={})=>{let{fromSSO:I}=await import("./chunk-wpetevqp.js");return I({profile:y,logger:_.logger,parentClientConfig:_.parentClientConfig,clientConfig:_.clientConfig})().then((b)=>{if(w.sso_session)return G.setCredentialFeature(b,"CREDENTIALS_PROFILE_SSO","r");else return G.setCredentialFeature(b,"CREDENTIALS_PROFILE_SSO_LEGACY","t")})},F=(y)=>y&&(typeof y.sso_start_url==="string"||typeof y.sso_account_id==="string"||typeof y.sso_session==="string"||typeof y.sso_region==="string"||typeof y.sso_role_name==="string");var M=k(O(),1),J=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.aws_access_key_id==="string"&&typeof y.aws_secret_access_key==="string"&&["undefined","string"].indexOf(typeof y.aws_session_token)>-1&&["undefined","string"].indexOf(typeof y.aws_account_id)>-1,Q=async(y,w)=>{w?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");let _={accessKeyId:y.aws_access_key_id,secretAccessKey:y.aws_secret_access_key,sessionToken:y.aws_session_token,...y.aws_credential_scope&&{credentialScope:y.aws_credential_scope},...y.aws_account_id&&{accountId:y.aws_account_id}};return M.setCredentialFeature(_,"CREDENTIALS_PROFILE","n")};var h=k(O(),1),D=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.web_identity_token_file==="string"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1,m=async(y,w)=>import("./chunk-8ag21jpk.js").then(({fromTokenFile:_})=>_({webIdentityTokenFile:y.web_identity_token_file,roleArn:y.role_arn,roleSessionName:y.role_session_name,roleAssumerWithWebIdentity:w.roleAssumerWithWebIdentity,logger:w.logger,parentClientConfig:w.parentClientConfig})().then((I)=>h.setCredentialFeature(I,"CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN","q")));var L=async(y,w,_,I={},b=!1)=>{let x=w[y];if(Object.keys(I).length>0&&J(x))return Q(x,_);if(b||X(x,{profile:y,logger:_.logger}))return Y(y,w,_,I);if(J(x))return Q(x,_);if(D(x))return m(x,_);if(H(x))return c(_,y);if(F(x))return await S(y,x,_);throw new u.CredentialsProviderError(`Could not resolve credentials using profile: [${y}] in configuration/credentials file(s).`,{logger:_.logger})};var ky=(y={})=>async({callerClientConfig:w}={})=>{let _={...y,parentClientConfig:{...w,...y.parentClientConfig}};_.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let I=await v(_);return L(E({profile:y.profile??w?.profile}),I,_)};export{ky as fromIni};
3
-
4
- //# debugId=186DFCCE235BC42764756E2164756E21
@@ -1,4 +0,0 @@
1
- import{yc as $}from"./chunk-fmwhbymf.js";var S=$((N,Z)=>{var{defineProperty:I,getOwnPropertyDescriptor:z,getOwnPropertyNames:A}=Object,D=Object.prototype.hasOwnProperty,H=(j,b)=>I(j,"name",{value:b,configurable:!0}),M=(j,b)=>{for(var F in b)I(j,F,{get:b[F],enumerable:!0})},J=(j,b,F,B)=>{if(b&&typeof b==="object"||typeof b==="function"){for(let G of A(b))if(!D.call(j,G)&&G!==F)I(j,G,{get:()=>b[G],enumerable:!(B=z(b,G))||B.enumerable})}return j},T=(j)=>J(I({},"__esModule",{value:!0}),j),Y={};M(Y,{CredentialsProviderError:()=>V,ProviderError:()=>K,TokenProviderError:()=>w,chain:()=>O,fromStatic:()=>q,memoize:()=>L});Z.exports=T(Y);var K=class j extends Error{constructor(b,F=!0){let B,G=!0;if(typeof F==="boolean")B=void 0,G=F;else if(F!=null&&typeof F==="object")B=F.logger,G=F.tryNextLink??!0;super(b);this.name="ProviderError",this.tryNextLink=G,Object.setPrototypeOf(this,j.prototype),B?.debug?.(`@smithy/property-provider ${G?"->":"(!)"} ${b}`)}static{H(this,"ProviderError")}static from(b,F=!0){return Object.assign(new this(b.message,F),b)}},V=class j extends K{constructor(b,F=!0){super(b,F);this.name="CredentialsProviderError",Object.setPrototypeOf(this,j.prototype)}static{H(this,"CredentialsProviderError")}},w=class j extends K{constructor(b,F=!0){super(b,F);this.name="TokenProviderError",Object.setPrototypeOf(this,j.prototype)}static{H(this,"TokenProviderError")}},O=H((...j)=>async()=>{if(j.length===0)throw new K("No providers in chain");let b;for(let F of j)try{return await F()}catch(B){if(b=B,B?.tryNextLink)continue;throw B}throw b},"chain"),q=H((j)=>()=>Promise.resolve(j),"fromStatic"),L=H((j,b,F)=>{let B,G,Q,U=!1,W=H(async()=>{if(!G)G=j();try{B=await G,Q=!0,U=!1}finally{G=void 0}return B},"coalesceProvider");if(b===void 0)return async(X)=>{if(!Q||X?.forceRefresh)B=await W();return B};return async(X)=>{if(!Q||X?.forceRefresh)B=await W();if(U)return B;if(F&&!F(B))return U=!0,B;if(b(B))return await W(),B;return B}},"memoize")});
2
- export{S as nc};
3
-
4
- //# debugId=E47ADC8EB638514564756E2164756E21
@@ -1,10 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../node_modules/@smithy/property-provider/dist-cjs/index.js"],
4
- "sourcesContent": [
5
- "var __defProp = Object.defineProperty;\nvar __getOwnPropDesc = Object.getOwnPropertyDescriptor;\nvar __getOwnPropNames = Object.getOwnPropertyNames;\nvar __hasOwnProp = Object.prototype.hasOwnProperty;\nvar __name = (target, value) => __defProp(target, \"name\", { value, configurable: true });\nvar __export = (target, all) => {\n for (var name in all)\n __defProp(target, name, { get: all[name], enumerable: true });\n};\nvar __copyProps = (to, from, except, desc) => {\n if (from && typeof from === \"object\" || typeof from === \"function\") {\n for (let key of __getOwnPropNames(from))\n if (!__hasOwnProp.call(to, key) && key !== except)\n __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });\n }\n return to;\n};\nvar __toCommonJS = (mod) => __copyProps(__defProp({}, \"__esModule\", { value: true }), mod);\n\n// src/index.ts\nvar src_exports = {};\n__export(src_exports, {\n CredentialsProviderError: () => CredentialsProviderError,\n ProviderError: () => ProviderError,\n TokenProviderError: () => TokenProviderError,\n chain: () => chain,\n fromStatic: () => fromStatic,\n memoize: () => memoize\n});\nmodule.exports = __toCommonJS(src_exports);\n\n// src/ProviderError.ts\nvar ProviderError = class _ProviderError extends Error {\n constructor(message, options = true) {\n let logger;\n let tryNextLink = true;\n if (typeof options === \"boolean\") {\n logger = void 0;\n tryNextLink = options;\n } else if (options != null && typeof options === \"object\") {\n logger = options.logger;\n tryNextLink = options.tryNextLink ?? true;\n }\n super(message);\n this.name = \"ProviderError\";\n this.tryNextLink = tryNextLink;\n Object.setPrototypeOf(this, _ProviderError.prototype);\n logger?.debug?.(`@smithy/property-provider ${tryNextLink ? \"->\" : \"(!)\"} ${message}`);\n }\n static {\n __name(this, \"ProviderError\");\n }\n /**\n * @deprecated use new operator.\n */\n static from(error, options = true) {\n return Object.assign(new this(error.message, options), error);\n }\n};\n\n// src/CredentialsProviderError.ts\nvar CredentialsProviderError = class _CredentialsProviderError extends ProviderError {\n /**\n * @override\n */\n constructor(message, options = true) {\n super(message, options);\n this.name = \"CredentialsProviderError\";\n Object.setPrototypeOf(this, _CredentialsProviderError.prototype);\n }\n static {\n __name(this, \"CredentialsProviderError\");\n }\n};\n\n// src/TokenProviderError.ts\nvar TokenProviderError = class _TokenProviderError extends ProviderError {\n /**\n * @override\n */\n constructor(message, options = true) {\n super(message, options);\n this.name = \"TokenProviderError\";\n Object.setPrototypeOf(this, _TokenProviderError.prototype);\n }\n static {\n __name(this, \"TokenProviderError\");\n }\n};\n\n// src/chain.ts\nvar chain = /* @__PURE__ */ __name((...providers) => async () => {\n if (providers.length === 0) {\n throw new ProviderError(\"No providers in chain\");\n }\n let lastProviderError;\n for (const provider of providers) {\n try {\n const credentials = await provider();\n return credentials;\n } catch (err) {\n lastProviderError = err;\n if (err?.tryNextLink) {\n continue;\n }\n throw err;\n }\n }\n throw lastProviderError;\n}, \"chain\");\n\n// src/fromStatic.ts\nvar fromStatic = /* @__PURE__ */ __name((staticValue) => () => Promise.resolve(staticValue), \"fromStatic\");\n\n// src/memoize.ts\nvar memoize = /* @__PURE__ */ __name((provider, isExpired, requiresRefresh) => {\n let resolved;\n let pending;\n let hasResult;\n let isConstant = false;\n const coalesceProvider = /* @__PURE__ */ __name(async () => {\n if (!pending) {\n pending = provider();\n }\n try {\n resolved = await pending;\n hasResult = true;\n isConstant = false;\n } finally {\n pending = void 0;\n }\n return resolved;\n }, \"coalesceProvider\");\n if (isExpired === void 0) {\n return async (options) => {\n if (!hasResult || options?.forceRefresh) {\n resolved = await coalesceProvider();\n }\n return resolved;\n };\n }\n return async (options) => {\n if (!hasResult || options?.forceRefresh) {\n resolved = await coalesceProvider();\n }\n if (isConstant) {\n return resolved;\n }\n if (requiresRefresh && !requiresRefresh(resolved)) {\n isConstant = true;\n return resolved;\n }\n if (isExpired(resolved)) {\n await coalesceProvider();\n return resolved;\n }\n return resolved;\n };\n}, \"memoize\");\n// Annotate the CommonJS export names for ESM import in node:\n\n0 && (module.exports = {\n CredentialsProviderError,\n ProviderError,\n TokenProviderError,\n chain,\n fromStatic,\n memoize\n});\n\n"
6
- ],
7
- "mappings": "yDAAA,IAAuB,eAAnB,EAC0B,yBAA1B,EAC2B,oBAA3B,GADmB,OAEnB,EAAe,OAAO,UAAU,eAChC,EAAS,CAAC,EAAQ,IAAU,EAAU,EAAQ,OAAQ,CAAE,QAAO,aAAc,EAAK,CAAC,EACnF,EAAW,CAAC,EAAQ,IAAQ,CAC9B,QAAS,KAAQ,EACf,EAAU,EAAQ,EAAM,CAAE,IAAK,EAAI,GAAO,WAAY,EAAK,CAAC,GAE5D,EAAc,CAAC,EAAI,EAAM,EAAQ,IAAS,CAC5C,GAAI,GAAQ,OAAO,IAAS,UAAY,OAAO,IAAS,YACtD,QAAS,KAAO,EAAkB,CAAI,EACpC,IAAK,EAAa,KAAK,EAAI,CAAG,GAAK,IAAQ,EACzC,EAAU,EAAI,EAAK,CAAE,IAAK,IAAM,EAAK,GAAM,aAAc,EAAO,EAAiB,EAAM,CAAG,IAAM,EAAK,UAAW,CAAC,EAEvH,OAAO,GAEL,EAAe,CAAC,IAAQ,EAAY,EAAU,CAAC,EAAG,aAAc,CAAE,MAAO,EAAK,CAAC,EAAG,CAAG,EAGrF,EAAc,CAAC,EACnB,EAAS,EAAa,CACpB,yBAA0B,IAAM,EAChC,cAAe,IAAM,EACrB,mBAAoB,IAAM,EAC1B,MAAO,IAAM,EACb,WAAY,IAAM,EAClB,QAAS,IAAM,CACjB,CAAC,EACD,EAAO,QAAU,EAAa,CAAW,EAGzC,IAAI,EAAgB,MAAM,UAAuB,KAAM,CACrD,WAAW,CAAC,EAAS,EAAU,GAAM,CACnC,IAAI,EACA,EAAc,GAClB,GAAI,OAAO,IAAY,UACrB,EAAc,OACd,EAAc,EACT,QAAI,GAAW,MAAQ,OAAO,IAAY,SAC/C,EAAS,EAAQ,OACjB,EAAc,EAAQ,aAAe,GAEvC,MAAM,CAAO,EACb,KAAK,KAAO,gBACZ,KAAK,YAAc,EACnB,OAAO,eAAe,KAAM,EAAe,SAAS,EACpD,GAAQ,QAAQ,6BAA6B,EAAc,KAAO,SAAS,GAAS,QAE/E,CACL,EAAO,KAAM,eAAe,QAKvB,KAAI,CAAC,EAAO,EAAU,GAAM,CACjC,OAAO,OAAO,OAAO,IAAI,KAAK,EAAM,QAAS,CAAO,EAAG,CAAK,EAEhE,EAGI,EAA2B,MAAM,UAAkC,CAAc,CAInF,WAAW,CAAC,EAAS,EAAU,GAAM,CACnC,MAAM,EAAS,CAAO,EACtB,KAAK,KAAO,2BACZ,OAAO,eAAe,KAAM,EAA0B,SAAS,QAE1D,CACL,EAAO,KAAM,0BAA0B,EAE3C,EAGI,EAAqB,MAAM,UAA4B,CAAc,CAIvE,WAAW,CAAC,EAAS,EAAU,GAAM,CACnC,MAAM,EAAS,CAAO,EACtB,KAAK,KAAO,qBACZ,OAAO,eAAe,KAAM,EAAoB,SAAS,QAEpD,CACL,EAAO,KAAM,oBAAoB,EAErC,EAGI,EAAwB,EAAO,IAAI,IAAc,SAAY,CAC/D,GAAI,EAAU,SAAW,EACvB,MAAM,IAAI,EAAc,uBAAuB,EAEjD,IAAI,EACJ,QAAW,KAAY,EACrB,GAAI,CAEF,OADoB,MAAM,EAAS,EAEnC,MAAO,EAAK,CAEZ,GADA,EAAoB,EAChB,GAAK,YACP,SAEF,MAAM,EAGV,MAAM,GACL,OAAO,EAGN,EAA6B,EAAO,CAAC,IAAgB,IAAM,QAAQ,QAAQ,CAAW,EAAG,YAAY,EAGrG,EAA0B,EAAO,CAAC,EAAU,EAAW,IAAoB,CAC7E,IAAI,EACA,EACA,EACA,EAAa,GACX,EAAmC,EAAO,SAAY,CAC1D,IAAK,EACH,EAAU,EAAS,EAErB,GAAI,CACF,EAAW,MAAM,EACjB,EAAY,GACZ,EAAa,UACb,CACA,EAAe,OAEjB,OAAO,GACN,kBAAkB,EACrB,GAAI,IAAmB,OACrB,MAAO,OAAO,IAAY,CACxB,IAAK,GAAa,GAAS,aACzB,EAAW,MAAM,EAAiB,EAEpC,OAAO,GAGX,MAAO,OAAO,IAAY,CACxB,IAAK,GAAa,GAAS,aACzB,EAAW,MAAM,EAAiB,EAEpC,GAAI,EACF,OAAO,EAET,GAAI,IAAoB,EAAgB,CAAQ,EAE9C,OADA,EAAa,GACN,EAET,GAAI,EAAU,CAAQ,EAEpB,OADA,MAAM,EAAiB,EAChB,EAET,OAAO,IAER,SAAS",
8
- "debugId": "E47ADC8EB638514564756E2164756E21",
9
- "names": []
10
- }
@@ -1,4 +0,0 @@
1
- import{vc as e}from"./chunk-qjf58f31.js";class r extends e{service;static _name="EmailServiceContainer";constructor(i){super();this.service=i}}
2
- export{r as U};
3
-
4
- //# debugId=E56472DF43FFCBFA64756E2164756E21
@@ -1,8 +0,0 @@
1
- // @bun
2
- import{ma as w}from"./chunk-s5qgyzqp.js";import{Fb as I,ib as g,sb as x}from"./chunk-1t8qmpmj.js";import"./chunk-72dc851j.js";import{lc as b}from"./chunk-ppdzh5mp.js";import"./chunk-cq0rr00v.js";import{nc as i}from"./chunk-eznd0gdt.js";import{xc as m}from"./chunk-fmwhbymf.js";var E=m(b(),1);var d=m(i(),1);import v from"fs/promises";var C=m(i(),1);var u="169.254.170.2",A="169.254.170.23",O="[fd00:ec2::23]",S=(e,a)=>{if(e.protocol==="https:")return;if(e.hostname===u||e.hostname===A||e.hostname===O)return;if(e.hostname.includes("[")){if(e.hostname==="[::1]"||e.hostname==="[0000:0000:0000:0000:0000:0000:0000:0001]")return}else{if(e.hostname==="localhost")return;let c=e.hostname.split("."),r=(t)=>{let s=parseInt(t,10);return 0<=s&&s<=255};if(c[0]==="127"&&r(c[1])&&r(c[2])&&r(c[3])&&c.length===4)return}throw new C.CredentialsProviderError(`URL not accepted. It must either be HTTPS or match one of the following:
3
- - loopback CIDR 127.0.0.0/8 or [::1/128]
4
- - ECS container host 169.254.170.2
5
- - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:a})};var o=m(i(),1);function P(e){return new g({protocol:e.protocol,hostname:e.hostname,port:Number(e.port),path:e.pathname,query:Array.from(e.searchParams.entries()).reduce((a,[c,r])=>{return a[c]=r,a},{}),fragment:e.hash})}async function K(e,a){let r=await w(e.body).transformToString();if(e.statusCode===200){let t=JSON.parse(r);if(typeof t.AccessKeyId!=="string"||typeof t.SecretAccessKey!=="string"||typeof t.Token!=="string"||typeof t.Expiration!=="string")throw new o.CredentialsProviderError("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:a});return{accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,sessionToken:t.Token,expiration:I(t.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let t={};try{t=JSON.parse(r)}catch(s){}throw Object.assign(new o.CredentialsProviderError(`Server responded with status: ${e.statusCode}`,{logger:a}),{Code:t.Code,Message:t.Message})}throw new o.CredentialsProviderError(`Server responded with status: ${e.statusCode}`,{logger:a})}var T=(e,a,c)=>{return async()=>{for(let r=0;r<a;++r)try{return await e()}catch(t){await new Promise((s)=>setTimeout(s,c))}return await e()}};var _="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",B="http://169.254.170.2",D="AWS_CONTAINER_CREDENTIALS_FULL_URI",M="AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE",N="AWS_CONTAINER_AUTHORIZATION_TOKEN",j=(e={})=>{e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let a,c=e.awsContainerCredentialsRelativeUri??process.env[_],r=e.awsContainerCredentialsFullUri??process.env[D],t=e.awsContainerAuthorizationToken??process.env[N],s=e.awsContainerAuthorizationTokenFile??process.env[M],n=e.logger?.constructor?.name==="NoOpLogger"||!e.logger?console.warn:e.logger.warn;if(c&&r)n("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),n("awsContainerCredentialsFullUri will take precedence.");if(t&&s)n("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),n("awsContainerAuthorizationToken will take precedence.");if(r)a=r;else if(c)a=`${B}${c}`;else throw new d.CredentialsProviderError(`No HTTP credential provider host provided.
6
- Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:e.logger});let y=new URL(a);S(y,e.logger);let R=new x({requestTimeout:e.timeout??1000,connectionTimeout:e.timeout??1000});return T(async()=>{let f=P(y);if(t)f.headers.Authorization=t;else if(s)f.headers.Authorization=(await v.readFile(s)).toString();try{let h=await R.handle(f);return K(h.response).then((p)=>E.setCredentialFeature(p,"CREDENTIALS_HTTP","z"))}catch(h){throw new d.CredentialsProviderError(String(h),{logger:e.logger})}},e.maxRetries??3,e.timeout??1000)};export{j as fromHttp};
7
-
8
- //# debugId=EC238EC443734F9364756E2164756E21
@@ -1,5 +0,0 @@
1
- // @bun
2
- import{Ya as z,Za as P}from"./chunk-w0p5vk3n.js";import"./chunk-qsz6b41a.js";import"./chunk-cq0rr00v.js";import{nc as D}from"./chunk-eznd0gdt.js";import{xc as _}from"./chunk-fmwhbymf.js";var m=_(D(),1);import{parse as o}from"url";var K=_(D(),1);import{Buffer as a}from"buffer";import{request as n}from"http";function u(c){return new Promise((I,x)=>{let T=n({method:"GET",...c,hostname:c.hostname?.replace(/^\[(.+)\]$/,"$1")});T.on("error",(N)=>{x(Object.assign(new K.ProviderError("Unable to connect to instance metadata service"),N)),T.destroy()}),T.on("timeout",()=>{x(new K.ProviderError("TimeoutError from instance metadata service")),T.destroy()}),T.on("response",(N)=>{let{statusCode:O=400}=N;if(O<200||300<=O)x(Object.assign(new K.ProviderError("Error response received from instance metadata service"),{statusCode:O})),T.destroy();let E=[];N.on("data",(y)=>{E.push(y)}),N.on("end",()=>{I(a.concat(E)),T.destroy()})}),T.end()})}var G=(c)=>Boolean(c)&&typeof c==="object"&&typeof c.AccessKeyId==="string"&&typeof c.SecretAccessKey==="string"&&typeof c.Token==="string"&&typeof c.Expiration==="string",Q=(c)=>({accessKeyId:c.AccessKeyId,secretAccessKey:c.SecretAccessKey,sessionToken:c.Token,expiration:new Date(c.Expiration),...c.AccountId&&{accountId:c.AccountId}});var uc=1000,Ec=0,X=({maxRetries:c=0,timeout:I=1000})=>({maxRetries:c,timeout:I});var f=(c,I)=>{let x=c();for(let T=0;T<I;T++)x=x.catch(c);return x};var v="AWS_CONTAINER_CREDENTIALS_FULL_URI",L="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",B="AWS_CONTAINER_AUTHORIZATION_TOKEN",Kc=(c={})=>{let{timeout:I,maxRetries:x}=X(c);return()=>f(async()=>{let T=await d({logger:c.logger}),N=JSON.parse(await s(I,T));if(!G(N))throw new m.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:c.logger});return Q(N)},x)},s=async(c,I)=>{if(process.env[B])I.headers={...I.headers,Authorization:process.env[B]};return(await u({...I,timeout:c})).toString()},g="169.254.170.2",l={localhost:!0,"127.0.0.1":!0},r={"http:":!0,"https:":!0},d=async({logger:c})=>{if(process.env[L])return{hostname:g,path:process.env[L]};if(process.env[v]){let I=o(process.env[v]);if(!I.hostname||!(I.hostname in l))throw new m.CredentialsProviderError(`${I.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:c});if(!I.protocol||!(I.protocol in r))throw new m.CredentialsProviderError(`${I.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:c});return{...I,port:I.port?parseInt(I.port,10):void 0}}throw new m.CredentialsProviderError(`The container metadata credential provider cannot be used unless the ${L} or ${v} environment variable is set`,{tryNextLink:!1,logger:c})};var q=_(D(),1);var U=_(D(),1);class Z extends U.CredentialsProviderError{constructor(c,I=!0){super(c,I);this.tryNextLink=I,this.name="InstanceMetadataV1FallbackError",Object.setPrototypeOf(this,Z.prototype)}}var A;(function(c){c.IPv4="http://169.254.169.254",c.IPv6="http://[fd00:ec2::254]"})(A||(A={}));var t={environmentVariableSelector:(c)=>c.AWS_EC2_METADATA_SERVICE_ENDPOINT,configFileSelector:(c)=>c.ec2_metadata_service_endpoint,default:void 0};var S;(function(c){c.IPv4="IPv4",c.IPv6="IPv6"})(S||(S={}));var e="AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE",i="ec2_metadata_service_endpoint_mode",F={environmentVariableSelector:(c)=>c[e],configFileSelector:(c)=>c[i],default:S.IPv4};var W=async()=>P(await cc()||await Ic()),cc=async()=>z(t)(),Ic=async()=>{let c=await z(F)();switch(c){case S.IPv4:return A.IPv4;case S.IPv6:return A.IPv6;default:throw new Error(`Unsupported endpoint mode: ${c}. Select from ${Object.values(S)}`)}};var b=(c,I)=>{let x=300+Math.floor(Math.random()*300),T=new Date(Date.now()+x*1000);I.warn(`Attempting credential expiration extension due to a credential service availability issue. A refresh of these credentials will be attempted after ${new Date(T)}.
3
- For more information, please visit: https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html`);let N=c.originalExpiration??c.expiration;return{...c,...N?{originalExpiration:N}:{},expiration:T}};var V=(c,I={})=>{let x=I?.logger||console,T;return async()=>{let N;try{if(N=await c(),N.expiration&&N.expiration.getTime()<Date.now())N=b(N,x)}catch(O){if(T)x.warn("Credential renew failed: ",O),N=b(T,x);else throw O}return T=N,N}};var k="/latest/meta-data/iam/security-credentials/",Tc="/latest/api/token",H="AWS_EC2_METADATA_V1_DISABLED",R="ec2_metadata_v1_disabled",M="x-aws-ec2-metadata-token",oc=(c={})=>V(Nc(c),{logger:c.logger}),Nc=(c={})=>{let I=!1,{logger:x,profile:T}=c,{timeout:N,maxRetries:O}=X(c),E=async(y,$)=>{if(I||$.headers?.[M]==null){let w=!1,h=!1,C=await z({environmentVariableSelector:(Y)=>{let j=Y[H];if(h=!!j&&j!=="false",j===void 0)throw new q.CredentialsProviderError(`${H} not set in env, checking config file next.`,{logger:c.logger});return h},configFileSelector:(Y)=>{let j=Y[R];return w=!!j&&j!=="false",w},default:!1},{profile:T})();if(c.ec2MetadataV1Disabled||C){let Y=[];if(c.ec2MetadataV1Disabled)Y.push("credential provider initialization (runtime option ec2MetadataV1Disabled)");if(w)Y.push(`config file profile (${R})`);if(h)Y.push(`process environment variable (${H})`);throw new Z(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${Y.join(", ")}].`)}}let p=(await f(async()=>{let w;try{w=await Oc($)}catch(h){if(h.statusCode===401)I=!1;throw h}return w},y)).trim();return f(async()=>{let w;try{w=await yc(p,$,c)}catch(h){if(h.statusCode===401)I=!1;throw h}return w},y)};return async()=>{let y=await W();if(I)return x?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),E(O,{...y,timeout:N});else{let $;try{$=(await xc({...y,timeout:N})).toString()}catch(J){if(J?.statusCode===400)throw Object.assign(J,{message:"EC2 Metadata token request returned error"});else if(J.message==="TimeoutError"||[403,404,405].includes(J.statusCode))I=!0;return x?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),E(O,{...y,timeout:N})}return E(O,{...y,headers:{[M]:$},timeout:N})}}},xc=async(c)=>u({...c,path:Tc,method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),Oc=async(c)=>(await u({...c,path:k})).toString(),yc=async(c,I,x)=>{let T=JSON.parse((await u({...I,path:k+c})).toString());if(!G(T))throw new q.CredentialsProviderError("Invalid response received from instance metadata service.",{logger:x.logger});return Q(T)};export{X as providerConfigFromInit,u as httpRequest,W as getInstanceMetadataEndpoint,oc as fromInstanceMetadata,Kc as fromContainerMetadata,A as Endpoint,L as ENV_CMDS_RELATIVE_URI,v as ENV_CMDS_FULL_URI,B as ENV_CMDS_AUTH_TOKEN,uc as DEFAULT_TIMEOUT,Ec as DEFAULT_MAX_RETRIES};
4
-
5
- //# debugId=B92173FF99A5AE4F64756E2164756E21
@@ -1,4 +0,0 @@
1
- import{$a as u,db as w}from"./chunk-qsz6b41a.js";import{nc as m}from"./chunk-eznd0gdt.js";import{xc as s}from"./chunk-fmwhbymf.js";var a=s(m(),1);var g=s(m(),1);function c(o){try{let r=new Set(Array.from(o.match(/([A-Z_]){3,}/g)??[]));return r.delete("CONFIG"),r.delete("CONFIG_PREFIX_SEPARATOR"),r.delete("ENV"),[...r].join(", ")}catch(r){return o}}var h=(o,r)=>async()=>{try{let t=o(process.env);if(t===void 0)throw new Error;return t}catch(t){throw new g.CredentialsProviderError(t.message||`Not found in ENV: ${c(o.toString())}`,{logger:r})}};var y=s(m(),1);var C=(o,{preferredFile:r="config",...t}={})=>async()=>{let e=u(t),{configFile:n,credentialsFile:i}=await w(t),f=i[e]||{},p=n[e]||{},N=r==="config"?{...f,...p}:{...p,...f};try{let d=o(N,r==="config"?n:i);if(d===void 0)throw new Error;return d}catch(l){throw new y.CredentialsProviderError(l.message||`Not found in config files w/ profile [${e}]: ${c(o.toString())}`,{logger:t.logger})}};var F=s(m(),1),x=(o)=>typeof o==="function",S=(o)=>x(o)?async()=>await o():F.fromStatic(o);var T=({environmentVariableSelector:o,configFileSelector:r,default:t},e={})=>a.memoize(a.chain(h(o),C(r,e),S(t)));function E(o){let r={};if(o=o.replace(/^\?/,""),o)for(let t of o.split("&")){let[e,n=null]=t.split("=");if(e=decodeURIComponent(e),n)n=decodeURIComponent(n);if(!(e in r))r[e]=n;else if(Array.isArray(r[e]))r[e].push(n);else r[e]=[r[e],n]}return r}var v=(o)=>{if(typeof o==="string")return v(new URL(o));let{hostname:r,pathname:t,port:e,protocol:n,search:i}=o,f;if(i)f=E(i);return{hostname:r,port:e?parseInt(e):void 0,protocol:n,path:t,query:f}};
2
- export{T as Ya,v as Za};
3
-
4
- //# debugId=F514EE774B45CB7064756E2164756E21
@@ -1,5 +0,0 @@
1
- // @bun
2
- import{$a as I,ab as z,bb as R,eb as v,fb as A}from"./chunk-qsz6b41a.js";import{lc as oe}from"./chunk-ppdzh5mp.js";import"./chunk-cq0rr00v.js";import{nc as u}from"./chunk-eznd0gdt.js";import{xc as S,zc as D}from"./chunk-fmwhbymf.js";var T=S(u(),1);var H=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var F=S(oe(),1);var x=S(u(),1);var U=300000,h="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var q=async(e,s={})=>{let{SSOOIDCClient:o}=await import("./chunk-3fsjzd51.js");return new o(Object.assign({},s.clientConfig??{},{region:e??s.clientConfig?.region,logger:s.clientConfig?.logger??s.parentClientConfig?.logger}))};var W=async(e,s,o={})=>{let{CreateTokenCommand:i}=await import("./chunk-3fsjzd51.js");return(await q(s,o)).send(new i({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var j=S(u(),1);var $=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new j.TokenProviderError(`Token is expired. ${h}`,!1)};var X=S(u(),1);var g=(e,s,o=!1)=>{if(typeof s==="undefined")throw new X.TokenProviderError(`Value not present for '${e}' in SSO Token${o?". Cannot refresh":""}. ${h}`,!1)};import{promises as Z}from"fs";var{writeFile:ee}=Z,J=(e,s)=>{let o=z(e),i=JSON.stringify(s,null,2);return ee(o,i)};var V=new Date(0),Y=(e={})=>async({callerClientConfig:s}={})=>{let o={...e,parentClientConfig:{...s,...e.parentClientConfig}};o.logger?.debug("@aws-sdk/token-providers - fromSso");let i=await A(o),r=I({profile:o.profile??s?.profile}),f=i[r];if(!f)throw new x.TokenProviderError(`Profile '${r}' could not be found in shared credentials file.`,!1);else if(!f.sso_session)throw new x.TokenProviderError(`Profile '${r}' is missing required property 'sso_session'.`);let l=f.sso_session,a=(await v(o))[l];if(!a)throw new x.TokenProviderError(`Sso session '${l}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!a[n])throw new x.TokenProviderError(`Sso session '${l}' is missing required property '${n}'.`,!1);let{sso_start_url:w,sso_region:t}=a,c;try{c=await R(l)}catch(n){throw new x.TokenProviderError(`The SSO session token associated with profile=${r} was not found or is invalid. ${h}`,!1)}g("accessToken",c.accessToken),g("expiresAt",c.expiresAt);let{accessToken:E,expiresAt:O}=c,p={token:E,expiration:new Date(O)};if(p.expiration.getTime()-Date.now()>U)return p;if(Date.now()-V.getTime()<30000)return $(p),p;g("clientId",c.clientId,!0),g("clientSecret",c.clientSecret,!0),g("refreshToken",c.refreshToken,!0);try{V.setTime(Date.now());let n=await W(c,t,o);g("accessToken",n.accessToken),g("expiresIn",n.expiresIn);let _=new Date(Date.now()+n.expiresIn*1000);try{await J(l,{...c,accessToken:n.accessToken,expiresAt:_.toISOString(),refreshToken:n.refreshToken})}catch(m){}return{token:n.accessToken,expiration:_}}catch(n){return $(p),p}};var k=S(u(),1);var N=!1,L=async({ssoStartUrl:e,ssoSession:s,ssoAccountId:o,ssoRegion:i,ssoRoleName:r,ssoClient:f,clientConfig:l,parentClientConfig:y,profile:a,logger:w})=>{let t,c="To refresh this SSO session run aws sso login with the corresponding profile.";if(s)try{let d=await Y({profile:a})();t={accessToken:d.token,expiresAt:new Date(d.expiration).toISOString()}}catch(d){throw new k.CredentialsProviderError(d.message,{tryNextLink:N,logger:w})}else try{t=await R(e)}catch(d){throw new k.CredentialsProviderError("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:N,logger:w})}if(new Date(t.expiresAt).getTime()-Date.now()<=0)throw new k.CredentialsProviderError("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:N,logger:w});let{accessToken:E}=t,{SSOClient:O,GetRoleCredentialsCommand:p}=await import("./chunk-6j49em7j.js"),n=f||new O(Object.assign({},l??{},{logger:l?.logger??y?.logger,region:l?.region??i})),_;try{_=await n.send(new p({accountId:o,roleName:r,accessToken:E}))}catch(d){throw new k.CredentialsProviderError(d,{tryNextLink:N,logger:w})}let{roleCredentials:{accessKeyId:m,secretAccessKey:C,sessionToken:M,expiration:G,credentialScope:K,accountId:b}={}}=_;if(!m||!C||!M||!G)throw new k.CredentialsProviderError("SSO returns an invalid temporary credential.",{tryNextLink:N,logger:w});let P={accessKeyId:m,secretAccessKey:C,sessionToken:M,expiration:new Date(G),...K&&{credentialScope:K},...b&&{accountId:b}};if(s)F.setCredentialFeature(P,"CREDENTIALS_SSO","s");else F.setCredentialFeature(P,"CREDENTIALS_SSO_LEGACY","u");return P};var B=S(u(),1),Q=(e,s)=>{let{sso_start_url:o,sso_account_id:i,sso_region:r,sso_role_name:f}=e;if(!o||!i||!r||!f)throw new B.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}
3
- Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:s});return e};var Re=(e={})=>async({callerClientConfig:s}={})=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:o,ssoAccountId:i,ssoRegion:r,ssoRoleName:f,ssoSession:l}=e,{ssoClient:y}=e,a=I({profile:e.profile??s?.profile});if(!o&&!i&&!r&&!f&&!l){let t=(await A(e))[a];if(!t)throw new T.CredentialsProviderError(`Profile ${a} was not found.`,{logger:e.logger});if(!H(t))throw new T.CredentialsProviderError(`Profile ${a} is not configured with SSO credentials.`,{logger:e.logger});if(t?.sso_session){let m=(await v(e))[t.sso_session],C=` configurations in profile ${a} and sso-session ${t.sso_session}`;if(r&&r!==m.sso_region)throw new T.CredentialsProviderError("Conflicting SSO region"+C,{tryNextLink:!1,logger:e.logger});if(o&&o!==m.sso_start_url)throw new T.CredentialsProviderError("Conflicting SSO start_url"+C,{tryNextLink:!1,logger:e.logger});t.sso_region=m.sso_region,t.sso_start_url=m.sso_start_url}let{sso_start_url:c,sso_account_id:E,sso_region:O,sso_role_name:p,sso_session:n}=Q(t,e.logger);return L({ssoStartUrl:c,ssoSession:n,ssoAccountId:E,ssoRegion:O,ssoRoleName:p,ssoClient:y,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,profile:a})}else if(!o||!i||!r||!f)throw new T.CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return L({ssoStartUrl:o,ssoSession:l,ssoAccountId:i,ssoRegion:r,ssoRoleName:f,ssoClient:y,clientConfig:e.clientConfig,parentClientConfig:e.parentClientConfig,profile:a})};export{Q as validateSsoProfile,H as isSsoProfile,Re as fromSSO};
4
-
5
- //# debugId=3CEC9B05CC32C29A64756E2164756E21