gemi 0.4.102 → 0.4.103

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. package/dist/{chunk-83f822c222295a62.js → chunk-087e1dd06f85d588.js} +2 -2
  2. package/dist/{chunk-83f822c222295a62.js.map → chunk-087e1dd06f85d588.js.map} +1 -1
  3. package/dist/{chunk-225a2ac22f559ca4.js → chunk-0a78bb530df845c9.js} +2 -2
  4. package/dist/{chunk-225a2ac22f559ca4.js.map → chunk-0a78bb530df845c9.js.map} +1 -1
  5. package/dist/{chunk-b2c75658070c9da8.js → chunk-0bc8cb0a7994c85d.js} +2 -2
  6. package/dist/{chunk-b2c75658070c9da8.js.map → chunk-0bc8cb0a7994c85d.js.map} +1 -1
  7. package/dist/chunk-17c3f49735b660d5.js +3 -0
  8. package/dist/chunk-17c3f49735b660d5.js.map +17 -0
  9. package/dist/{chunk-3840523c97bd28e4.js → chunk-28edd25587946042.js} +2 -2
  10. package/dist/{chunk-3840523c97bd28e4.js.map → chunk-28edd25587946042.js.map} +1 -1
  11. package/dist/chunk-4b2790e55056a146.js +4 -0
  12. package/dist/{chunk-76ab9cb416bb617d.js.map → chunk-4b2790e55056a146.js.map} +2 -2
  13. package/dist/chunk-4bda8e5e6ea82011.js +4 -0
  14. package/dist/{chunk-c69698325e61e6cf.js.map → chunk-4bda8e5e6ea82011.js.map} +2 -2
  15. package/dist/{chunk-f5707f3bdba77464.js → chunk-643d1c40e2a0f67f.js} +2 -2
  16. package/dist/{chunk-f5707f3bdba77464.js.map → chunk-643d1c40e2a0f67f.js.map} +1 -1
  17. package/dist/chunk-79168b7162a45077.js +3 -0
  18. package/dist/{chunk-4e3d8823a08776e9.js.map → chunk-79168b7162a45077.js.map} +4 -4
  19. package/dist/{chunk-9fefc0c4a022180f.js → chunk-7bf700c2348ef918.js} +2 -2
  20. package/dist/{chunk-9fefc0c4a022180f.js.map → chunk-7bf700c2348ef918.js.map} +1 -1
  21. package/dist/{chunk-89e42f2de63525a8.js → chunk-9037f8f927d4caff.js} +2 -2
  22. package/dist/{chunk-89e42f2de63525a8.js.map → chunk-9037f8f927d4caff.js.map} +1 -1
  23. package/dist/chunk-c4a5b4177603f458.js +8 -0
  24. package/dist/{chunk-056c4bd9d2ac239c.js.map → chunk-c4a5b4177603f458.js.map} +2 -2
  25. package/dist/chunk-ce40ec049b04e1d1.js +4 -0
  26. package/dist/{chunk-fea6a8b61878c7b7.js.map → chunk-ce40ec049b04e1d1.js.map} +2 -2
  27. package/dist/chunk-d8d25380b8f0c36e.js +18 -0
  28. package/dist/{chunk-de8906c4ce089607.js.map → chunk-d8d25380b8f0c36e.js.map} +15 -31
  29. package/dist/{chunk-7c5cdd2ff0c5a588.js → chunk-e3363367fe4893a2.js} +3 -3
  30. package/dist/{chunk-7c5cdd2ff0c5a588.js.map → chunk-e3363367fe4893a2.js.map} +1 -1
  31. package/dist/chunk-ebc6b30a0275d2f7.js +7 -0
  32. package/dist/chunk-ebc6b30a0275d2f7.js.map +65 -0
  33. package/dist/{chunk-8d48861243d49671.js → chunk-f53ed6a7a3dad8ec.js} +2 -2
  34. package/dist/{chunk-8d48861243d49671.js.map → chunk-f53ed6a7a3dad8ec.js.map} +1 -1
  35. package/dist/http/index.js +2 -2
  36. package/dist/http/index.js.map +3 -3
  37. package/dist/kernel/index.js +1 -1
  38. package/dist/services/index.js +2 -11
  39. package/dist/services/index.js.map +4 -15
  40. package/package.json +1 -1
  41. package/dist/chunk-056c4bd9d2ac239c.js +0 -8
  42. package/dist/chunk-1c2835b8ab6601e6.js +0 -5
  43. package/dist/chunk-1c2835b8ab6601e6.js.map +0 -64
  44. package/dist/chunk-4e3d8823a08776e9.js +0 -3
  45. package/dist/chunk-76ab9cb416bb617d.js +0 -4
  46. package/dist/chunk-7f095ebadaafbe12.js +0 -4
  47. package/dist/chunk-7f095ebadaafbe12.js.map +0 -10
  48. package/dist/chunk-c69698325e61e6cf.js +0 -4
  49. package/dist/chunk-de8906c4ce089607.js +0 -20
  50. package/dist/chunk-fea6a8b61878c7b7.js +0 -4
@@ -1,4 +1,4 @@
1
1
  // @bun
2
- import"./chunk-c83dcc500d5fefe3.js";import"./chunk-7f095ebadaafbe12.js";import{Fb as y,Gb as K,Hb as E,Kb as C,Lb as N} from"./chunk-4e3d8823a08776e9.js";import{Nb as i,Ob as f} from"./chunk-89e42f2de63525a8.js";var F=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var L=300000,_="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var I={},M=async(e)=>{const{SSOOIDCClient:r}=await import("./chunk-fea6a8b61878c7b7.js");if(I[e])return I[e];const s=new r({region:e});return I[e]=s,s};var H=async(e,r)=>{const{CreateTokenCommand:s}=await import("./chunk-fea6a8b61878c7b7.js");return(await M(r)).send(new s({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var v=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new f(`Token is expired. ${_}`,!1)};var m=(e,r,s=!1)=>{if(typeof r==="undefined")throw new f(`Value not present for '${e}' in SSO Token${s?". Cannot refresh":""}. ${_}`,!1)};import{promises as W} from"fs";var{writeFile:j}=W,b=(e,r)=>{const s=K(e),t=JSON.stringify(r,null,2);return j(s,t)};var G=new Date(0),U=(e={})=>async()=>{e.logger?.debug("@aws-sdk/token-providers - fromSso");const r=await N(e),s=y(e),t=r[s];if(!t)throw new f(`Profile '${s}' could not be found in shared credentials file.`,!1);else if(!t.sso_session)throw new f(`Profile '${s}' is missing required property 'sso_session'.`);const a=t.sso_session,c=(await C(e))[a];if(!c)throw new f(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!c[n])throw new f(`Sso session '${a}' is missing required property '${n}'.`,!1);const{sso_start_url:p,sso_region:S}=c;let o;try{o=await E(a)}catch(n){throw new f(`The SSO session token associated with profile=${s} was not found or is invalid. ${_}`,!1)}m("accessToken",o.accessToken),m("expiresAt",o.expiresAt);const{accessToken:x,expiresAt:u}=o,l={token:x,expiration:new Date(u)};if(l.expiration.getTime()-Date.now()>L)return l;if(Date.now()-G.getTime()<30000)return v(l),l;m("clientId",o.clientId,!0),m("clientSecret",o.clientSecret,!0),m("refreshToken",o.refreshToken,!0);try{G.setTime(Date.now());const n=await H(o,S);m("accessToken",n.accessToken),m("expiresIn",n.expiresIn);const h=new Date(Date.now()+n.expiresIn*1000);try{await b(a,{...o,accessToken:n.accessToken,expiresAt:h.toISOString(),refreshToken:n.refreshToken})}catch(O){}return{token:n.accessToken,expiration:h}}catch(n){return v(l),l}};var T=!1,P=async({ssoStartUrl:e,ssoSession:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoClient:d,clientConfig:c,profile:p,logger:S})=>{let o;const x="To refresh this SSO session run aws sso login with the corresponding profile.";if(r)try{const g=await U({profile:p})();o={accessToken:g.token,expiresAt:new Date(g.expiration).toISOString()}}catch(g){throw new i(g.message,{tryNextLink:T,logger:S})}else try{o=await E(e)}catch(g){throw new i("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:T,logger:S})}if(new Date(o.expiresAt).getTime()-Date.now()<=0)throw new i("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:T,logger:S});const{accessToken:u}=o,{SSOClient:l,GetRoleCredentialsCommand:n}=await import("./chunk-76ab9cb416bb617d.js"),h=d||new l(Object.assign({},c??{},{region:c?.region??t}));let O;try{O=await h.send(new n({accountId:s,roleName:a,accessToken:u}))}catch(g){throw new i(g,{tryNextLink:T,logger:S})}const{roleCredentials:{accessKeyId:w,secretAccessKey:k,sessionToken:R,expiration:D,credentialScope:A,accountId:$}={}}=O;if(!w||!k||!R||!D)throw new i("SSO returns an invalid temporary credential.",{tryNextLink:T,logger:S});return{accessKeyId:w,secretAccessKey:k,sessionToken:R,expiration:new Date(D),...A&&{credentialScope:A},...$&&{accountId:$}}};var q=(e,r)=>{const{sso_start_url:s,sso_account_id:t,sso_region:a,sso_role_name:d}=e;if(!s||!t||!a||!d)throw new i('Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", '+`"sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:r});return e};var Ee=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");const{ssoStartUrl:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,p=y(e);if(!r&&!s&&!t&&!a&&!d){const o=(await N(e))[p];if(!o)throw new i(`Profile ${p} was not found.`,{logger:e.logger});if(!F(o))throw new i(`Profile ${p} is not configured with SSO credentials.`,{logger:e.logger});if(o?.sso_session){const w=(await C(e))[o.sso_session],k=` configurations in profile ${p} and sso-session ${o.sso_session}`;if(t&&t!==w.sso_region)throw new i("Conflicting SSO region"+k,{tryNextLink:!1,logger:e.logger});if(r&&r!==w.sso_start_url)throw new i("Conflicting SSO start_url"+k,{tryNextLink:!1,logger:e.logger});o.sso_region=w.sso_region,o.sso_start_url=w.sso_start_url}const{sso_start_url:x,sso_account_id:u,sso_region:l,sso_role_name:n,sso_session:h}=q(o,e.logger);return P({ssoStartUrl:x,ssoSession:h,ssoAccountId:u,ssoRegion:l,ssoRoleName:n,ssoClient:c,clientConfig:e.clientConfig,profile:p})}else if(!r||!s||!t||!a)throw new i('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return P({ssoStartUrl:r,ssoSession:d,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,profile:p})};export{q as validateSsoProfile,F as isSsoProfile,Ee as fromSSO};
2
+ import"./chunk-c83dcc500d5fefe3.js";import"./chunk-17c3f49735b660d5.js";import{Jb as y,Kb as K,Lb as E,Ob as C,Pb as N} from"./chunk-79168b7162a45077.js";import{Rb as i,Sb as f} from"./chunk-9037f8f927d4caff.js";var F=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var L=300000,_="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var I={},M=async(e)=>{const{SSOOIDCClient:r}=await import("./chunk-ce40ec049b04e1d1.js");if(I[e])return I[e];const s=new r({region:e});return I[e]=s,s};var H=async(e,r)=>{const{CreateTokenCommand:s}=await import("./chunk-ce40ec049b04e1d1.js");return(await M(r)).send(new s({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var v=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new f(`Token is expired. ${_}`,!1)};var m=(e,r,s=!1)=>{if(typeof r==="undefined")throw new f(`Value not present for '${e}' in SSO Token${s?". Cannot refresh":""}. ${_}`,!1)};import{promises as W} from"fs";var{writeFile:j}=W,b=(e,r)=>{const s=K(e),t=JSON.stringify(r,null,2);return j(s,t)};var G=new Date(0),U=(e={})=>async()=>{e.logger?.debug("@aws-sdk/token-providers - fromSso");const r=await N(e),s=y(e),t=r[s];if(!t)throw new f(`Profile '${s}' could not be found in shared credentials file.`,!1);else if(!t.sso_session)throw new f(`Profile '${s}' is missing required property 'sso_session'.`);const a=t.sso_session,c=(await C(e))[a];if(!c)throw new f(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!c[n])throw new f(`Sso session '${a}' is missing required property '${n}'.`,!1);const{sso_start_url:p,sso_region:S}=c;let o;try{o=await E(a)}catch(n){throw new f(`The SSO session token associated with profile=${s} was not found or is invalid. ${_}`,!1)}m("accessToken",o.accessToken),m("expiresAt",o.expiresAt);const{accessToken:x,expiresAt:u}=o,l={token:x,expiration:new Date(u)};if(l.expiration.getTime()-Date.now()>L)return l;if(Date.now()-G.getTime()<30000)return v(l),l;m("clientId",o.clientId,!0),m("clientSecret",o.clientSecret,!0),m("refreshToken",o.refreshToken,!0);try{G.setTime(Date.now());const n=await H(o,S);m("accessToken",n.accessToken),m("expiresIn",n.expiresIn);const h=new Date(Date.now()+n.expiresIn*1000);try{await b(a,{...o,accessToken:n.accessToken,expiresAt:h.toISOString(),refreshToken:n.refreshToken})}catch(O){}return{token:n.accessToken,expiration:h}}catch(n){return v(l),l}};var T=!1,P=async({ssoStartUrl:e,ssoSession:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoClient:d,clientConfig:c,profile:p,logger:S})=>{let o;const x="To refresh this SSO session run aws sso login with the corresponding profile.";if(r)try{const g=await U({profile:p})();o={accessToken:g.token,expiresAt:new Date(g.expiration).toISOString()}}catch(g){throw new i(g.message,{tryNextLink:T,logger:S})}else try{o=await E(e)}catch(g){throw new i("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:T,logger:S})}if(new Date(o.expiresAt).getTime()-Date.now()<=0)throw new i("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:T,logger:S});const{accessToken:u}=o,{SSOClient:l,GetRoleCredentialsCommand:n}=await import("./chunk-4b2790e55056a146.js"),h=d||new l(Object.assign({},c??{},{region:c?.region??t}));let O;try{O=await h.send(new n({accountId:s,roleName:a,accessToken:u}))}catch(g){throw new i(g,{tryNextLink:T,logger:S})}const{roleCredentials:{accessKeyId:w,secretAccessKey:k,sessionToken:R,expiration:D,credentialScope:A,accountId:$}={}}=O;if(!w||!k||!R||!D)throw new i("SSO returns an invalid temporary credential.",{tryNextLink:T,logger:S});return{accessKeyId:w,secretAccessKey:k,sessionToken:R,expiration:new Date(D),...A&&{credentialScope:A},...$&&{accountId:$}}};var q=(e,r)=>{const{sso_start_url:s,sso_account_id:t,sso_region:a,sso_role_name:d}=e;if(!s||!t||!a||!d)throw new i('Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", '+`"sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:r});return e};var Ee=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");const{ssoStartUrl:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,p=y(e);if(!r&&!s&&!t&&!a&&!d){const o=(await N(e))[p];if(!o)throw new i(`Profile ${p} was not found.`,{logger:e.logger});if(!F(o))throw new i(`Profile ${p} is not configured with SSO credentials.`,{logger:e.logger});if(o?.sso_session){const w=(await C(e))[o.sso_session],k=` configurations in profile ${p} and sso-session ${o.sso_session}`;if(t&&t!==w.sso_region)throw new i("Conflicting SSO region"+k,{tryNextLink:!1,logger:e.logger});if(r&&r!==w.sso_start_url)throw new i("Conflicting SSO start_url"+k,{tryNextLink:!1,logger:e.logger});o.sso_region=w.sso_region,o.sso_start_url=w.sso_start_url}const{sso_start_url:x,sso_account_id:u,sso_region:l,sso_role_name:n,sso_session:h}=q(o,e.logger);return P({ssoStartUrl:x,ssoSession:h,ssoAccountId:u,ssoRegion:l,ssoRoleName:n,ssoClient:c,clientConfig:e.clientConfig,profile:p})}else if(!r||!s||!t||!a)throw new i('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return P({ssoStartUrl:r,ssoSession:d,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,profile:p})};export{q as validateSsoProfile,F as isSsoProfile,Ee as fromSSO};
3
3
 
4
- //# debugId=83F822C222295A6264756e2164756e21
4
+ //# debugId=087E1DD06F85D58864756e2164756e21
@@ -15,6 +15,6 @@
15
15
  "import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName, loadSsoSessionData, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { isSsoProfile } from \"./isSsoProfile\";\nimport { resolveSSOCredentials } from \"./resolveSSOCredentials\";\nimport { validateSsoProfile } from \"./validateSsoProfile\";\nexport const fromSSO = (init = {}) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-sso - fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n const { ssoClient } = init;\n const profileName = getProfileName(init);\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n const profiles = await parseKnownFiles(init);\n const profile = profiles[profileName];\n if (!profile) {\n throw new CredentialsProviderError(`Profile ${profileName} was not found.`, { logger: init.logger });\n }\n if (!isSsoProfile(profile)) {\n throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`, {\n logger: init.logger,\n });\n }\n if (profile?.sso_session) {\n const ssoSessions = await loadSsoSessionData(init);\n const session = ssoSessions[profile.sso_session];\n const conflictMsg = ` configurations in profile ${profileName} and sso-session ${profile.sso_session}`;\n if (ssoRegion && ssoRegion !== session.sso_region) {\n throw new CredentialsProviderError(`Conflicting SSO region` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n if (ssoStartUrl && ssoStartUrl !== session.sso_start_url) {\n throw new CredentialsProviderError(`Conflicting SSO start_url` + conflictMsg, {\n tryNextLink: false,\n logger: init.logger,\n });\n }\n profile.sso_region = session.sso_region;\n profile.sso_start_url = session.sso_start_url;\n }\n const { sso_start_url, sso_account_id, sso_region, sso_role_name, sso_session } = validateSsoProfile(profile, init.logger);\n return resolveSSOCredentials({\n ssoStartUrl: sso_start_url,\n ssoSession: sso_session,\n ssoAccountId: sso_account_id,\n ssoRegion: sso_region,\n ssoRoleName: sso_role_name,\n ssoClient: ssoClient,\n clientConfig: init.clientConfig,\n profile: profileName,\n });\n }\n else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n throw new CredentialsProviderError(\"Incomplete configuration. The fromSSO() argument hash must include \" +\n '\"ssoStartUrl\", \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"', { tryNextLink: false, logger: init.logger });\n }\n else {\n return resolveSSOCredentials({\n ssoStartUrl,\n ssoSession,\n ssoAccountId,\n ssoRegion,\n ssoRoleName,\n ssoClient,\n clientConfig: init.clientConfig,\n profile: profileName,\n });\n }\n};\n"
16
16
  ],
17
17
  "mappings": ";8MAAO,MAAM,IAAe,GAAC,IAAQ,WACzB,EAAI,gBAAkB,iBACnB,EAAI,iBAAmB,iBACvB,EAAI,cAAgB,iBACpB,EAAI,aAAe,iBACnB,EAAI,gBAAkB,UCL9B,IAAM,EAAmB,OACnB,EAAkB,kFCD/B,IAAM,EAAqB,CAAC,EACf,EAAmB,MAAO,IAAc,CACjD,MAAQ,iBAAkB,KAAa,uCACvC,GAAI,EAAmB,GACnB,OAAO,EAAmB,GAE9B,MAAM,EAAgB,IAAI,EAAc,CAAE,OAAQ,CAAU,CAAC,EAE7D,OADA,EAAmB,GAAa,EACzB,GCPJ,IAAM,EAAqB,MAAO,EAAU,IAAc,CAC7D,MAAQ,sBAAuB,KAAa,uCAE5C,OADsB,MAAM,EAAiB,CAAS,GACjC,KAAK,IAAI,EAAmB,CAC7C,SAAU,EAAS,SACnB,aAAc,EAAS,aACvB,aAAc,EAAS,aACvB,UAAW,eACf,CAAC,CAAC,GCPC,IAAM,EAAsB,CAAC,IAAU,CAC1C,GAAI,EAAM,YAAc,EAAM,WAAW,QAAQ,EAAI,KAAK,IAAI,EAC1D,MAAM,IAAI,EAAmB,qBAAqB,IAAmB,EAAK,GCF3E,IAAM,EAAmB,CAAC,EAAK,EAAO,EAAa,KAAU,CAChE,UAAW,IAAU,YACjB,MAAM,IAAI,EAAmB,0BAA0B,kBAAoB,EAAa,mBAAqB,OAAO,IAAmB,EAAK,GCHpJ,mBAAS,YACT,IAAQ,aAAc,EACT,EAAsB,CAAC,EAAI,IAAa,CACjD,MAAM,EAAgB,EAAoB,CAAE,EACtC,EAAc,KAAK,UAAU,EAAU,KAAM,CAAC,EACpD,OAAO,EAAU,EAAe,CAAW,GCC/C,IAAM,EAAyB,IAAI,KAAK,CAAC,EAC5B,EAAU,CAAC,EAAO,CAAC,IAAM,SAAY,CAC9C,EAAK,QAAQ,MAAM,oCAAoC,EACvD,MAAM,EAAW,MAAM,EAAgB,CAAI,EACrC,EAAc,EAAe,CAAI,EACjC,EAAU,EAAS,GACzB,IAAK,EACD,MAAM,IAAI,EAAmB,YAAY,oDAA+D,EAAK,WAEvG,EAAQ,YACd,MAAM,IAAI,EAAmB,YAAY,gDAA0D,EAEvG,MAAM,EAAiB,EAAQ,YAEzB,GADc,MAAM,EAAmB,CAAI,GAClB,GAC/B,IAAK,EACD,MAAM,IAAI,EAAmB,gBAAgB,oDAAkE,EAAK,EAExH,QAAW,IAAyB,CAAC,gBAAiB,YAAY,EAC9D,IAAK,EAAW,GACZ,MAAM,IAAI,EAAmB,gBAAgB,oCAAiD,MAA2B,EAAK,EAGtI,MAA+B,cAAzB,EACuB,WAAvB,GAAY,EAClB,IAAI,EACJ,GAAI,CACA,EAAW,MAAM,EAAoB,CAAc,QAEhD,EAAP,CACI,MAAM,IAAI,EAAmB,iDAAiD,kCAA4C,IAAmB,EAAK,EAEtJ,EAAiB,cAAe,EAAS,WAAW,EACpD,EAAiB,YAAa,EAAS,SAAS,EAChD,MAAQ,cAAa,aAAc,EAC7B,EAAgB,CAAE,MAAO,EAAa,WAAY,IAAI,KAAK,CAAS,CAAE,EAC5E,GAAI,EAAc,WAAW,QAAQ,EAAI,KAAK,IAAI,EAAI,EAClD,OAAO,EAEX,GAAI,KAAK,IAAI,EAAI,EAAuB,QAAQ,EAAI,MAEhD,OADA,EAAoB,CAAa,EAC1B,EAEX,EAAiB,WAAY,EAAS,SAAU,EAAI,EACpD,EAAiB,eAAgB,EAAS,aAAc,EAAI,EAC5D,EAAiB,eAAgB,EAAS,aAAc,EAAI,EAC5D,GAAI,CACA,EAAuB,QAAQ,KAAK,IAAI,CAAC,EACzC,MAAM,EAAkB,MAAM,EAAmB,EAAU,CAAS,EACpE,EAAiB,cAAe,EAAgB,WAAW,EAC3D,EAAiB,YAAa,EAAgB,SAAS,EACvD,MAAM,EAAqB,IAAI,KAAK,KAAK,IAAI,EAAI,EAAgB,UAAY,IAAI,EACjF,GAAI,CACA,MAAM,EAAoB,EAAgB,IACnC,EACH,YAAa,EAAgB,YAC7B,UAAW,EAAmB,YAAY,EAC1C,aAAc,EAAgB,YAClC,CAAC,QAEE,EAAP,EAEA,MAAO,CACH,MAAO,EAAgB,YACvB,WAAY,CAChB,QAEG,EAAP,CAEI,OADA,EAAoB,CAAa,EAC1B,ICzEf,IAAM,EAA+B,GACxB,EAAwB,OAAS,cAAa,aAAY,eAAc,YAAW,cAAa,YAAW,eAAc,UAAS,YAAc,CACzJ,IAAI,EACJ,MAAM,EAAiB,gFACvB,GAAI,EACA,GAAI,CACA,MAAM,EAAS,MAAM,EAAoB,CAAE,SAAQ,CAAC,EAAE,EACtD,EAAQ,CACJ,YAAa,EAAO,MACpB,UAAW,IAAI,KAAK,EAAO,UAAU,EAAE,YAAY,CACvD,QAEG,EAAP,CACI,MAAM,IAAI,EAAyB,EAAE,QAAS,CAC1C,YAAa,EACb,QACJ,CAAC,MAIL,IAAI,CACA,EAAQ,MAAM,EAAoB,CAAW,QAE1C,EAAP,CACI,MAAM,IAAI,EAAyB,yIAA8E,CAC7G,YAAa,EACb,QACJ,CAAC,EAGT,GAAI,IAAI,KAAK,EAAM,SAAS,EAAE,QAAQ,EAAI,KAAK,IAAI,GAAK,EACpD,MAAM,IAAI,EAAyB,0IAA+E,CAC9G,YAAa,EACb,QACJ,CAAC,EAEL,MAAQ,eAAgB,GAChB,YAAW,6BAA8B,KAAa,uCACxD,EAAM,GACR,IAAI,EAAU,OAAO,OAAO,CAAC,EAAG,GAAgB,CAAC,EAAG,CAChD,OAAQ,GAAc,QAAU,CACpC,CAAC,CAAC,EACN,IAAI,EACJ,GAAI,CACA,EAAU,MAAM,EAAI,KAAK,IAAI,EAA0B,CACnD,UAAW,EACX,SAAU,EACV,aACJ,CAAC,CAAC,QAEC,EAAP,CACI,MAAM,IAAI,EAAyB,EAAG,CAClC,YAAa,EACb,QACJ,CAAC,EAEL,MAAQ,iBAAmB,cAAa,kBAAiB,eAAc,aAAY,kBAAiB,aAAc,CAAC,GAAO,EAC1H,IAAK,IAAgB,IAAoB,IAAiB,EACtD,MAAM,IAAI,EAAyB,+CAAgD,CAC/E,YAAa,EACb,QACJ,CAAC,EAEL,MAAO,CACH,cACA,kBACA,eACA,WAAY,IAAI,KAAK,CAAU,KAC3B,GAAmB,CAAE,iBAAgB,KACrC,GAAa,CAAE,WAAU,CACjC,GCxEG,IAAM,EAAqB,CAAC,EAAS,IAAW,CACnD,MAAQ,gBAAe,iBAAgB,aAAY,iBAAkB,EACrE,IAAK,IAAkB,IAAmB,IAAe,EACrD,MAAM,IAAI,EAAyB,6FAC/B,uDAAuD,OAAO,KAAK,CAAO,EAAE,KAAK,IAAI,wFAAyF,CAAE,YAAa,GAAO,QAAO,CAAC,EAEpN,OAAO,GCFJ,IAAM,GAAU,CAAC,EAAO,CAAC,IAAM,SAAY,CAC9C,EAAK,QAAQ,MAAM,4CAA4C,EAC/D,MAAQ,cAAa,eAAc,YAAW,cAAa,cAAe,GAClE,aAAc,EAChB,EAAc,EAAe,CAAI,EACvC,IAAK,IAAgB,IAAiB,IAAc,IAAgB,EAAY,CAE5E,MAAM,GADW,MAAM,EAAgB,CAAI,GAClB,GACzB,IAAK,EACD,MAAM,IAAI,EAAyB,WAAW,mBAA8B,CAAE,OAAQ,EAAK,MAAO,CAAC,EAEvG,IAAK,EAAa,CAAO,EACrB,MAAM,IAAI,EAAyB,WAAW,4CAAuD,CACjG,OAAQ,EAAK,MACjB,CAAC,EAEL,GAAI,GAAS,YAAa,CAEtB,MAAM,GADc,MAAM,EAAmB,CAAI,GACrB,EAAQ,aAC9B,EAAc,8BAA8B,qBAA+B,EAAQ,cACzF,GAAI,GAAa,IAAc,EAAQ,WACnC,MAAM,IAAI,EAAyB,yBAA2B,EAAa,CACvE,YAAa,GACb,OAAQ,EAAK,MACjB,CAAC,EAEL,GAAI,GAAe,IAAgB,EAAQ,cACvC,MAAM,IAAI,EAAyB,4BAA8B,EAAa,CAC1E,YAAa,GACb,OAAQ,EAAK,MACjB,CAAC,EAEL,EAAQ,WAAa,EAAQ,WAC7B,EAAQ,cAAgB,EAAQ,cAEpC,MAAQ,gBAAe,iBAAgB,aAAY,gBAAe,eAAgB,EAAmB,EAAS,EAAK,MAAM,EACzH,OAAO,EAAsB,CACzB,YAAa,EACb,WAAY,EACZ,aAAc,EACd,UAAW,EACX,YAAa,EACb,UAAW,EACX,aAAc,EAAK,aACnB,QAAS,CACb,CAAC,WAEK,IAAgB,IAAiB,IAAc,EACrD,MAAM,IAAI,EAAyB,+HAC8B,CAAE,YAAa,GAAO,OAAQ,EAAK,MAAO,CAAC,MAG5G,QAAO,EAAsB,CACzB,cACA,aACA,eACA,YACA,cACA,YACA,aAAc,EAAK,aACnB,QAAS,CACb,CAAC",
18
- "debugId": "83F822C222295A6264756e2164756e21",
18
+ "debugId": "087E1DD06F85D58864756e2164756e21",
19
19
  "names": []
20
20
  }
@@ -1,3 +1,3 @@
1
- import{J as g} from"./chunk-c83dcc500d5fefe3.js";import{Fb as Z,Jb as b} from"./chunk-4e3d8823a08776e9.js";import{Nb as h,Pb as L,Qb as H,Rb as V} from"./chunk-89e42f2de63525a8.js";var T=g((a,S)=>{var G=function(c){const i={};if(c=c.replace(/^\?/,""),c)for(let n of c.split("&")){let[F,f=null]=n.split("=");if(F=decodeURIComponent(F),f)f=decodeURIComponent(f);if(!(F in i))i[F]=f;else if(Array.isArray(i[F]))i[F].push(f);else i[F]=[i[F],f]}return i},o=Object.defineProperty,Y=Object.getOwnPropertyDescriptor,D=Object.getOwnPropertyNames,M=Object.prototype.hasOwnProperty,Q=(c,i)=>o(c,"name",{value:i,configurable:!0}),U=(c,i)=>{for(var n in i)o(c,n,{get:i[n],enumerable:!0})},O=(c,i,n,F)=>{if(i&&typeof i==="object"||typeof i==="function"){for(let f of D(i))if(!M.call(c,f)&&f!==n)o(c,f,{get:()=>i[f],enumerable:!(F=Y(i,f))||F.enumerable})}return c},d=(c)=>O(o({},"__esModule",{value:!0}),c),A={};U(A,{parseQueryString:()=>G});S.exports=d(A);Q(G,"parseQueryString")});var q=g((u,z)=>{var{defineProperty:w,getOwnPropertyDescriptor:v,getOwnPropertyNames:J}=Object,x=Object.prototype.hasOwnProperty,P=(c,i)=>w(c,"name",{value:i,configurable:!0}),s=(c,i)=>{for(var n in i)w(c,n,{get:i[n],enumerable:!0})},l=(c,i,n,F)=>{if(i&&typeof i==="object"||typeof i==="function"){for(let f of J(i))if(!x.call(c,f)&&f!==n)w(c,f,{get:()=>i[f],enumerable:!(F=v(i,f))||F.enumerable})}return c},m=(c)=>l(w({},"__esModule",{value:!0}),c),j={};s(j,{parseUrl:()=>t});z.exports=m(j);var k=T(),t=P((c)=>{if(typeof c==="string")return t(new URL(c));const{hostname:i,pathname:n,port:F,protocol:f,search:E}=c;let N;if(E)N=k.parseQueryString(E);return{hostname:i,port:F?parseInt(F):void 0,protocol:f,path:n,query:N}},"parseUrl")});function C(c){try{const i=new Set(Array.from(c.match(/([A-Z_]){3,}/g)??[]));return i.delete("CONFIG"),i.delete("CONFIG_PREFIX_SEPARATOR"),i.delete("ENV"),[...i].join(", ")}catch(i){return c}}var X=(c,i)=>async()=>{try{const n=c(process.env);if(n===void 0)throw new Error;return n}catch(n){throw new h(n.message||`Not found in ENV: ${C(c.toString())}`,{logger:i})}};var B=(c,{preferredFile:i="config",...n}={})=>async()=>{const F=Z(n),{configFile:f,credentialsFile:E}=await b(n),N=E[F]||{},I=f[F]||{},W=i==="config"?{...N,...I}:{...I,...N};try{const $=c(W,i==="config"?f:E);if($===void 0)throw new Error;return $}catch(R){throw new h(R.message||`Not found in config files w/ profile [${F}]: ${C(c.toString())}`,{logger:n.logger})}};var p=(c)=>typeof c==="function",K=(c)=>p(c)?async()=>await c():H(c);var hi=({environmentVariableSelector:c,configFileSelector:i,default:n},F={})=>V(L(X(c),B(i,F),K(n)));export{q as Ab,hi as Bb};
1
+ import{J as g} from"./chunk-c83dcc500d5fefe3.js";import{Jb as Z,Nb as b} from"./chunk-79168b7162a45077.js";import{Rb as h,Tb as L,Ub as H,Vb as V} from"./chunk-9037f8f927d4caff.js";var T=g((a,S)=>{var G=function(c){const i={};if(c=c.replace(/^\?/,""),c)for(let n of c.split("&")){let[F,f=null]=n.split("=");if(F=decodeURIComponent(F),f)f=decodeURIComponent(f);if(!(F in i))i[F]=f;else if(Array.isArray(i[F]))i[F].push(f);else i[F]=[i[F],f]}return i},o=Object.defineProperty,Y=Object.getOwnPropertyDescriptor,D=Object.getOwnPropertyNames,M=Object.prototype.hasOwnProperty,Q=(c,i)=>o(c,"name",{value:i,configurable:!0}),U=(c,i)=>{for(var n in i)o(c,n,{get:i[n],enumerable:!0})},O=(c,i,n,F)=>{if(i&&typeof i==="object"||typeof i==="function"){for(let f of D(i))if(!M.call(c,f)&&f!==n)o(c,f,{get:()=>i[f],enumerable:!(F=Y(i,f))||F.enumerable})}return c},d=(c)=>O(o({},"__esModule",{value:!0}),c),A={};U(A,{parseQueryString:()=>G});S.exports=d(A);Q(G,"parseQueryString")});var q=g((u,z)=>{var{defineProperty:w,getOwnPropertyDescriptor:v,getOwnPropertyNames:J}=Object,x=Object.prototype.hasOwnProperty,P=(c,i)=>w(c,"name",{value:i,configurable:!0}),s=(c,i)=>{for(var n in i)w(c,n,{get:i[n],enumerable:!0})},l=(c,i,n,F)=>{if(i&&typeof i==="object"||typeof i==="function"){for(let f of J(i))if(!x.call(c,f)&&f!==n)w(c,f,{get:()=>i[f],enumerable:!(F=v(i,f))||F.enumerable})}return c},m=(c)=>l(w({},"__esModule",{value:!0}),c),j={};s(j,{parseUrl:()=>t});z.exports=m(j);var k=T(),t=P((c)=>{if(typeof c==="string")return t(new URL(c));const{hostname:i,pathname:n,port:F,protocol:f,search:E}=c;let N;if(E)N=k.parseQueryString(E);return{hostname:i,port:F?parseInt(F):void 0,protocol:f,path:n,query:N}},"parseUrl")});function C(c){try{const i=new Set(Array.from(c.match(/([A-Z_]){3,}/g)??[]));return i.delete("CONFIG"),i.delete("CONFIG_PREFIX_SEPARATOR"),i.delete("ENV"),[...i].join(", ")}catch(i){return c}}var X=(c,i)=>async()=>{try{const n=c(process.env);if(n===void 0)throw new Error;return n}catch(n){throw new h(n.message||`Not found in ENV: ${C(c.toString())}`,{logger:i})}};var B=(c,{preferredFile:i="config",...n}={})=>async()=>{const F=Z(n),{configFile:f,credentialsFile:E}=await b(n),N=E[F]||{},I=f[F]||{},W=i==="config"?{...N,...I}:{...I,...N};try{const $=c(W,i==="config"?f:E);if($===void 0)throw new Error;return $}catch(R){throw new h(R.message||`Not found in config files w/ profile [${F}]: ${C(c.toString())}`,{logger:n.logger})}};var p=(c)=>typeof c==="function",K=(c)=>p(c)?async()=>await c():H(c);var hi=({environmentVariableSelector:c,configFileSelector:i,default:n},F={})=>V(L(X(c),B(i,F),K(n)));export{q as Bb,hi as Cb};
2
2
 
3
- //# debugId=225A2AC22F559CA464756e2164756e21
3
+ //# debugId=0A78BB530DF845C964756e2164756e21
@@ -11,6 +11,6 @@
11
11
  "import { chain, memoize } from \"@smithy/property-provider\";\nimport { fromEnv } from \"./fromEnv\";\nimport { fromSharedConfigFiles } from \"./fromSharedConfigFiles\";\nimport { fromStatic } from \"./fromStatic\";\nexport const loadConfig = ({ environmentVariableSelector, configFileSelector, default: defaultValue }, configuration = {}) => memoize(chain(fromEnv(environmentVariableSelector), fromSharedConfigFiles(configFileSelector, configuration), fromStatic(defaultValue)));\n"
12
12
  ],
13
13
  "mappings": "iMAyBA,MAAS,YAAgB,CAAC,EAAa,CACrC,MAAM,EAAQ,CAAC,EAEf,GADA,EAAc,EAAY,QAAQ,MAAO,EAAE,EACvC,EACF,QAAW,KAAQ,EAAY,MAAM,GAAG,EAAG,CACzC,IAAK,EAAK,EAAQ,MAAQ,EAAK,MAAM,GAAG,EAExC,GADA,EAAM,mBAAmB,CAAG,EACxB,EACF,EAAQ,mBAAmB,CAAK,EAElC,KAAM,KAAO,GACX,EAAM,GAAO,UACJ,MAAM,QAAQ,EAAM,EAAI,EACjC,EAAM,GAAK,KAAK,CAAK,MAErB,GAAM,GAAO,CAAC,EAAM,GAAM,CAAK,EAIrC,OAAO,GA5CL,EAAY,OAAO,eACnB,EAAmB,OAAO,yBAC1B,EAAoB,OAAO,oBAC3B,EAAe,OAAO,UAAU,eAChC,EAAS,CAAC,EAAQ,IAAU,EAAU,EAAQ,OAAQ,CAAE,QAAO,aAAc,EAAK,CAAC,EACnF,EAAW,CAAC,EAAQ,IAAQ,CAC9B,QAAS,KAAQ,EACf,EAAU,EAAQ,EAAM,CAAE,IAAK,EAAI,GAAO,WAAY,EAAK,CAAC,GAE5D,EAAc,CAAC,EAAI,EAAM,EAAQ,IAAS,CAC5C,GAAI,UAAe,IAAS,iBAAmB,IAAS,YACtD,QAAS,KAAO,EAAkB,CAAI,EACpC,IAAK,EAAa,KAAK,EAAI,CAAG,GAAK,IAAQ,EACzC,EAAU,EAAI,EAAK,CAAE,IAAK,IAAM,EAAK,GAAM,aAAc,EAAO,EAAiB,EAAM,CAAG,IAAM,EAAK,UAAW,CAAC,EAEvH,OAAO,GAEL,EAAe,CAAC,IAAQ,EAAY,EAAU,CAAC,EAAG,aAAc,CAAE,MAAO,EAAK,CAAC,EAAG,CAAG,EAGrF,EAAc,CAAC,EACnB,EAAS,EAAa,CACpB,iBAAkB,IAAM,CAC1B,CAAC,EACD,EAAO,QAAU,EAAa,CAAW,EAsBzC,EAAO,EAAkB,kBAAkB,oBC9C3C,IAAuB,eAAnB,EAC0B,yBAA1B,EAC2B,oBAA3B,GADmB,OAEnB,EAAe,OAAO,UAAU,eAChC,EAAS,CAAC,EAAQ,IAAU,EAAU,EAAQ,OAAQ,CAAE,QAAO,aAAc,EAAK,CAAC,EACnF,EAAW,CAAC,EAAQ,IAAQ,CAC9B,QAAS,KAAQ,EACf,EAAU,EAAQ,EAAM,CAAE,IAAK,EAAI,GAAO,WAAY,EAAK,CAAC,GAE5D,EAAc,CAAC,EAAI,EAAM,EAAQ,IAAS,CAC5C,GAAI,UAAe,IAAS,iBAAmB,IAAS,YACtD,QAAS,KAAO,EAAkB,CAAI,EACpC,IAAK,EAAa,KAAK,EAAI,CAAG,GAAK,IAAQ,EACzC,EAAU,EAAI,EAAK,CAAE,IAAK,IAAM,EAAK,GAAM,aAAc,EAAO,EAAiB,EAAM,CAAG,IAAM,EAAK,UAAW,CAAC,EAEvH,OAAO,GAEL,EAAe,CAAC,IAAQ,EAAY,EAAU,CAAC,EAAG,aAAc,CAAE,MAAO,EAAK,CAAC,EAAG,CAAG,EAGrF,EAAc,CAAC,EACnB,EAAS,EAAa,CACpB,SAAU,IAAM,CAClB,CAAC,EACD,EAAO,QAAU,EAAa,CAAW,EACzC,IAAI,MACA,EAA2B,EAAO,CAAC,IAAQ,CAC7C,UAAW,IAAQ,SACjB,OAAO,EAAS,IAAI,IAAI,CAAG,CAAC,EAE9B,MAAQ,WAAU,WAAU,OAAM,WAAU,UAAW,EACvD,IAAI,EACJ,GAAI,EACF,EAAY,EAA0B,iBAAkB,CAAM,EAEhE,MAAO,CACL,WACA,KAAM,EAAO,SAAS,CAAI,EAAS,OACnC,WACA,KAAM,EACN,OACF,GACC,UAAU,IC1CN,SAAS,CAAe,CAAC,EAAgB,CAC5C,GAAI,CACA,MAAM,EAAY,IAAI,IAAI,MAAM,KAAK,EAAe,MAAM,eAAe,GAAK,CAAC,CAAC,CAAC,EAIjF,OAHA,EAAU,OAAO,QAAQ,EACzB,EAAU,OAAO,yBAAyB,EAC1C,EAAU,OAAO,KAAK,EACf,CAAC,GAAG,CAAS,EAAE,KAAK,IAAI,QAE5B,EAAP,CACI,OAAO,GCPR,IAAM,EAAU,CAAC,EAAgB,IAAW,SAAY,CAC3D,GAAI,CACA,MAAM,EAAS,EAAe,QAAQ,GAAG,EACzC,GAAI,IAAW,OACX,MAAM,IAAI,MAEd,OAAO,QAEJ,EAAP,CACI,MAAM,IAAI,EAAyB,EAAE,SAAW,qBAAqB,EAAgB,EAAe,SAAS,CAAC,IAAK,CAAE,QAAO,CAAC,ICR9H,IAAM,EAAwB,CAAC,GAAkB,gBAAgB,YAAa,GAAS,CAAC,IAAM,SAAY,CAC7G,MAAM,EAAU,EAAe,CAAI,GAC3B,aAAY,mBAAoB,MAAM,EAAsB,CAAI,EAClE,EAAyB,EAAgB,IAAY,CAAC,EACtD,EAAoB,EAAW,IAAY,CAAC,EAC5C,EAAgB,IAAkB,SAClC,IAAK,KAA2B,CAAkB,EAClD,IAAK,KAAsB,CAAuB,EACxD,GAAI,CAEA,MAAM,EAAc,EAAe,EADnB,IAAkB,SAAW,EAAa,CACD,EACzD,GAAI,IAAgB,OAChB,MAAM,IAAI,MAEd,OAAO,QAEJ,EAAP,CACI,MAAM,IAAI,EAAyB,EAAE,SAAW,yCAAyC,OAAa,EAAgB,EAAe,SAAS,CAAC,IAAK,CAAE,OAAQ,EAAK,MAAO,CAAC,ICnBnL,IAAM,EAAa,CAAC,WAAgB,IAAS,WAChC,EAAa,CAAC,IAAiB,EAAW,CAAY,EAAI,SAAY,MAAM,EAAa,EAAI,EAAkB,CAAY,ECEjI,IAAM,GAAa,EAAG,8BAA6B,qBAAoB,QAAS,GAAgB,EAAgB,CAAC,IAAM,EAAQ,EAAM,EAAQ,CAA2B,EAAG,EAAsB,EAAoB,CAAa,EAAG,EAAW,CAAY,CAAC,CAAC",
14
- "debugId": "225A2AC22F559CA464756e2164756e21",
14
+ "debugId": "0A78BB530DF845C964756e2164756e21",
15
15
  "names": []
16
16
  }
@@ -1,4 +1,4 @@
1
1
  // @bun
2
- import"./chunk-c83dcc500d5fefe3.js";import"./chunk-7f095ebadaafbe12.js";import{Fb as K,Lb as X} from"./chunk-4e3d8823a08776e9.js";import{Nb as I,Pb as $} from"./chunk-89e42f2de63525a8.js";var q=(y,c,_)=>{const b={EcsContainer:async(x)=>{const{fromHttp:w}=await import("./chunk-056c4bd9d2ac239c.js"),{fromContainerMetadata:C}=await import("./chunk-3840523c97bd28e4.js");return _?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),$(w(x??{}),C(x))},Ec2InstanceMetadata:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");const{fromInstanceMetadata:w}=await import("./chunk-3840523c97bd28e4.js");return w(x)},Environment:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");const{fromEnv:w}=await import("./chunk-f5707f3bdba77464.js");return w(x)}};if(y in b)return b[y];else throw new I(`Unsupported credential source in profile ${c}. Got ${y}, `+"expected EcsContainer or Ec2InstanceMetadata or Environment.",{logger:_})};var A=(y,{profile:c="default",logger:_}={})=>{return Boolean(y)&&typeof y==="object"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1&&["undefined","string"].indexOf(typeof y.external_id)>-1&&["undefined","string"].indexOf(typeof y.mfa_serial)>-1&&(Z(y,{profile:c,logger:_})||E(y,{profile:c,logger:_}))},Z=(y,{profile:c,logger:_})=>{const b=typeof y.source_profile==="string"&&typeof y.credential_source==="undefined";if(b)_?.debug?.(` ${c} isAssumeRoleWithSourceProfile source_profile=${y.source_profile}`);return b},E=(y,{profile:c,logger:_})=>{const b=typeof y.credential_source==="string"&&typeof y.source_profile==="undefined";if(b)_?.debug?.(` ${c} isCredentialSourceProfile credential_source=${y.credential_source}`);return b},G=async(y,c,_,b={})=>{_.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");const x=c[y];if(!_.roleAssumer){const{getDefaultRoleAssumer:k}=await import("./chunk-c69698325e61e6cf.js");_.roleAssumer=k({..._.clientConfig,credentialProviderLogger:_.logger,parentClientConfig:_?.parentClientConfig},_.clientPlugins)}const{source_profile:w}=x;if(w&&w in b)throw new I("Detected a cycle attempting to resolve credentials for profile"+` ${K(_)}. Profiles visited: `+Object.keys(b).join(", "),{logger:_.logger});_.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${w?`source_profile=[${w}]`:`profile=[${y}]`}`);const C=w?j(w,c,_,{...b,[w]:!0},z(c[w]??{})):(await q(x.credential_source,y,_.logger)(_))();if(z(x))return C;else{const k={RoleArn:x.role_arn,RoleSessionName:x.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:x.external_id,DurationSeconds:parseInt(x.duration_seconds||"3600",10)},{mfa_serial:O}=x;if(O){if(!_.mfaCodeProvider)throw new I(`Profile ${y} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:_.logger,tryNextLink:!1});k.SerialNumber=O,k.TokenCode=await _.mfaCodeProvider(O)}const Y=await C;return _.roleAssumer(Y,k)}},z=(y)=>{return!y.role_arn&&!!y.credential_source};var J=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.credential_process==="string",L=async(y,c)=>import("./chunk-8d48861243d49671.js").then(({fromProcess:_})=>_({...y,profile:c})());var Q=async(y,c={})=>{const{fromSSO:_}=await import("./chunk-83f822c222295a62.js");return _({profile:y,logger:c.logger})()},U=(y)=>y&&(typeof y.sso_start_url==="string"||typeof y.sso_account_id==="string"||typeof y.sso_session==="string"||typeof y.sso_region==="string"||typeof y.sso_role_name==="string");var B=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.aws_access_key_id==="string"&&typeof y.aws_secret_access_key==="string"&&["undefined","string"].indexOf(typeof y.aws_session_token)>-1&&["undefined","string"].indexOf(typeof y.aws_account_id)>-1,D=(y,c)=>{return c?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials"),Promise.resolve({accessKeyId:y.aws_access_key_id,secretAccessKey:y.aws_secret_access_key,sessionToken:y.aws_session_token,...y.aws_credential_scope&&{credentialScope:y.aws_credential_scope},...y.aws_account_id&&{accountId:y.aws_account_id}})};var V=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.web_identity_token_file==="string"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1,W=async(y,c)=>import("./chunk-9fefc0c4a022180f.js").then(({fromTokenFile:_})=>_({webIdentityTokenFile:y.web_identity_token_file,roleArn:y.role_arn,roleSessionName:y.role_session_name,roleAssumerWithWebIdentity:c.roleAssumerWithWebIdentity,logger:c.logger,parentClientConfig:c.parentClientConfig})());var j=async(y,c,_,b={},x=!1)=>{const w=c[y];if(Object.keys(b).length>0&&B(w))return D(w,_);if(x||A(w,{profile:y,logger:_.logger}))return G(y,c,_,b);if(B(w))return D(w,_);if(V(w))return W(w,_);if(J(w))return L(_,y);if(U(w))return await Q(y,_);throw new I(`Could not resolve credentials using profile: [${y}] in configuration/credentials file(s).`,{logger:_.logger})};var a=(y={})=>async()=>{y.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");const c=await X(y);return j(K(y),c,y)};export{a as fromIni};
2
+ import"./chunk-c83dcc500d5fefe3.js";import"./chunk-17c3f49735b660d5.js";import{Jb as K,Pb as X} from"./chunk-79168b7162a45077.js";import{Rb as I,Tb as $} from"./chunk-9037f8f927d4caff.js";var q=(y,c,_)=>{const b={EcsContainer:async(x)=>{const{fromHttp:w}=await import("./chunk-c4a5b4177603f458.js"),{fromContainerMetadata:C}=await import("./chunk-28edd25587946042.js");return _?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),$(w(x??{}),C(x))},Ec2InstanceMetadata:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");const{fromInstanceMetadata:w}=await import("./chunk-28edd25587946042.js");return w(x)},Environment:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");const{fromEnv:w}=await import("./chunk-643d1c40e2a0f67f.js");return w(x)}};if(y in b)return b[y];else throw new I(`Unsupported credential source in profile ${c}. Got ${y}, `+"expected EcsContainer or Ec2InstanceMetadata or Environment.",{logger:_})};var A=(y,{profile:c="default",logger:_}={})=>{return Boolean(y)&&typeof y==="object"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1&&["undefined","string"].indexOf(typeof y.external_id)>-1&&["undefined","string"].indexOf(typeof y.mfa_serial)>-1&&(Z(y,{profile:c,logger:_})||E(y,{profile:c,logger:_}))},Z=(y,{profile:c,logger:_})=>{const b=typeof y.source_profile==="string"&&typeof y.credential_source==="undefined";if(b)_?.debug?.(` ${c} isAssumeRoleWithSourceProfile source_profile=${y.source_profile}`);return b},E=(y,{profile:c,logger:_})=>{const b=typeof y.credential_source==="string"&&typeof y.source_profile==="undefined";if(b)_?.debug?.(` ${c} isCredentialSourceProfile credential_source=${y.credential_source}`);return b},G=async(y,c,_,b={})=>{_.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");const x=c[y];if(!_.roleAssumer){const{getDefaultRoleAssumer:k}=await import("./chunk-4bda8e5e6ea82011.js");_.roleAssumer=k({..._.clientConfig,credentialProviderLogger:_.logger,parentClientConfig:_?.parentClientConfig},_.clientPlugins)}const{source_profile:w}=x;if(w&&w in b)throw new I("Detected a cycle attempting to resolve credentials for profile"+` ${K(_)}. Profiles visited: `+Object.keys(b).join(", "),{logger:_.logger});_.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${w?`source_profile=[${w}]`:`profile=[${y}]`}`);const C=w?j(w,c,_,{...b,[w]:!0},z(c[w]??{})):(await q(x.credential_source,y,_.logger)(_))();if(z(x))return C;else{const k={RoleArn:x.role_arn,RoleSessionName:x.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:x.external_id,DurationSeconds:parseInt(x.duration_seconds||"3600",10)},{mfa_serial:O}=x;if(O){if(!_.mfaCodeProvider)throw new I(`Profile ${y} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:_.logger,tryNextLink:!1});k.SerialNumber=O,k.TokenCode=await _.mfaCodeProvider(O)}const Y=await C;return _.roleAssumer(Y,k)}},z=(y)=>{return!y.role_arn&&!!y.credential_source};var J=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.credential_process==="string",L=async(y,c)=>import("./chunk-f53ed6a7a3dad8ec.js").then(({fromProcess:_})=>_({...y,profile:c})());var Q=async(y,c={})=>{const{fromSSO:_}=await import("./chunk-087e1dd06f85d588.js");return _({profile:y,logger:c.logger})()},U=(y)=>y&&(typeof y.sso_start_url==="string"||typeof y.sso_account_id==="string"||typeof y.sso_session==="string"||typeof y.sso_region==="string"||typeof y.sso_role_name==="string");var B=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.aws_access_key_id==="string"&&typeof y.aws_secret_access_key==="string"&&["undefined","string"].indexOf(typeof y.aws_session_token)>-1&&["undefined","string"].indexOf(typeof y.aws_account_id)>-1,D=(y,c)=>{return c?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials"),Promise.resolve({accessKeyId:y.aws_access_key_id,secretAccessKey:y.aws_secret_access_key,sessionToken:y.aws_session_token,...y.aws_credential_scope&&{credentialScope:y.aws_credential_scope},...y.aws_account_id&&{accountId:y.aws_account_id}})};var V=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.web_identity_token_file==="string"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1,W=async(y,c)=>import("./chunk-7bf700c2348ef918.js").then(({fromTokenFile:_})=>_({webIdentityTokenFile:y.web_identity_token_file,roleArn:y.role_arn,roleSessionName:y.role_session_name,roleAssumerWithWebIdentity:c.roleAssumerWithWebIdentity,logger:c.logger,parentClientConfig:c.parentClientConfig})());var j=async(y,c,_,b={},x=!1)=>{const w=c[y];if(Object.keys(b).length>0&&B(w))return D(w,_);if(x||A(w,{profile:y,logger:_.logger}))return G(y,c,_,b);if(B(w))return D(w,_);if(V(w))return W(w,_);if(J(w))return L(_,y);if(U(w))return await Q(y,_);throw new I(`Could not resolve credentials using profile: [${y}] in configuration/credentials file(s).`,{logger:_.logger})};var a=(y={})=>async()=>{y.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");const c=await X(y);return j(K(y),c,y)};export{a as fromIni};
3
3
 
4
- //# debugId=B2C75658070C9DA864756e2164756e21
4
+ //# debugId=0BC8CB0A7994C85D64756e2164756e21
@@ -12,6 +12,6 @@
12
12
  "import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (init = {}) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName(init), profiles, init);\n};\n"
13
13
  ],
14
14
  "mappings": ";sLACO,MAAM,IAA0B,GAAC,EAAkB,EAAa,IAAW,CAC9E,MAAM,EAAqB,CACvB,aAAc,MAAO,IAAY,CAC7B,MAAQ,YAAa,KAAa,wCAC1B,yBAA0B,KAAa,uCAE/C,OADA,GAAQ,MAAM,sEAAsE,EAC7E,EAAM,EAAS,GAAW,CAAC,CAAC,EAAG,EAAsB,CAAO,CAAC,GAExE,oBAAqB,MAAO,IAAY,CACpC,GAAQ,MAAM,6EAA6E,EAC3F,MAAQ,wBAAyB,KAAa,uCAC9C,OAAO,EAAqB,CAAO,GAEvC,YAAa,MAAO,IAAY,CAC5B,GAAQ,MAAM,qEAAqE,EACnF,MAAQ,WAAY,KAAa,uCACjC,OAAO,EAAQ,CAAO,EAE9B,EACA,GAAI,KAAoB,EACpB,OAAO,EAAmB,OAG1B,OAAM,IAAI,EAAyB,4CAA4C,UAAoB,MAC/F,+DAAgE,CAAE,QAAO,CAAC,GCrB/E,IAAM,EAAsB,CAAC,GAAO,UAAU,UAAW,UAAW,CAAC,IAAM,CAC9E,OAAQ,QAAQ,CAAG,UACR,IAAQ,iBACR,EAAI,WAAa,UACxB,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,iBAAiB,GAAI,GAChE,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,WAAW,GAAI,GAC1D,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,UAAU,GAAI,IACxD,EAA8B,EAAK,CAAE,UAAS,QAAO,CAAC,GAAK,EAA0B,EAAK,CAAE,UAAS,QAAO,CAAC,IAEhH,EAAgC,CAAC,GAAO,UAAS,YAAa,CAChE,MAAM,SAA2B,EAAI,iBAAmB,iBAAmB,EAAI,oBAAsB,YACrG,GAAI,EACA,GAAQ,QAAQ,OAAO,kDAAwD,EAAI,gBAAgB,EAEvG,OAAO,GAEL,EAA4B,CAAC,GAAO,UAAS,YAAa,CAC5D,MAAM,SAA6B,EAAI,oBAAsB,iBAAmB,EAAI,iBAAmB,YACvG,GAAI,EACA,GAAQ,QAAQ,OAAO,iDAAuD,EAAI,mBAAmB,EAEzG,OAAO,GAEE,EAA+B,MAAO,EAAa,EAAU,EAAS,EAAkB,CAAC,IAAM,CACxG,EAAQ,QAAQ,MAAM,uEAAuE,EAC7F,MAAM,EAAO,EAAS,GACtB,IAAK,EAAQ,YAAa,CACtB,MAAQ,yBAA0B,KAAa,uCAC/C,EAAQ,YAAc,EAAsB,IACrC,EAAQ,aACX,yBAA0B,EAAQ,OAClC,mBAAoB,GAAS,kBACjC,EAAG,EAAQ,aAAa,EAE5B,MAAQ,kBAAmB,EAC3B,GAAI,GAAkB,KAAkB,EACpC,MAAM,IAAI,EAAyB,iEAC/B,IAAI,EAAe,CAAO,wBAC1B,OAAO,KAAK,CAAe,EAAE,KAAK,IAAI,EAAG,CAAE,OAAQ,EAAQ,MAAO,CAAC,EAE3E,EAAQ,QAAQ,MAAM,wEAAwE,EAAiB,mBAAmB,KAAoB,YAAY,MAAgB,EAClL,MAAM,EAAsB,EACtB,EAAmB,EAAgB,EAAU,EAAS,IACjD,GACF,GAAiB,EACtB,EAAG,EAAiC,EAAS,IAAmB,CAAC,CAAC,CAAC,GAChE,MAAM,EAAwB,EAAK,kBAAmB,EAAa,EAAQ,MAAM,EAAE,CAAO,GAAG,EACpG,GAAI,EAAiC,CAAI,EACrC,OAAO,MAEN,CACD,MAAM,EAAS,CACX,QAAS,EAAK,SACd,gBAAiB,EAAK,mBAAqB,cAAc,KAAK,IAAI,IAClE,WAAY,EAAK,YACjB,gBAAiB,SAAS,EAAK,kBAAoB,OAAQ,EAAE,CACjE,GACQ,cAAe,EACvB,GAAI,EAAY,CACZ,IAAK,EAAQ,gBACT,MAAM,IAAI,EAAyB,WAAW,iFAA4F,CAAE,OAAQ,EAAQ,OAAQ,YAAa,EAAM,CAAC,EAE5L,EAAO,aAAe,EACtB,EAAO,UAAY,MAAM,EAAQ,gBAAgB,CAAU,EAE/D,MAAM,EAAc,MAAM,EAC1B,OAAO,EAAQ,YAAY,EAAa,CAAM,IAGhD,EAAmC,CAAC,IAAY,CAClD,OAAQ,EAAQ,YAAc,EAAQ,mBC1EnC,IAAM,EAAmB,CAAC,IAAQ,QAAQ,CAAG,UAAY,IAAQ,iBAAmB,EAAI,qBAAuB,SACzG,EAA4B,MAAO,EAAS,IAAmB,sCAAwC,KAAK,EAAG,iBAAkB,EAAY,IACnJ,EACH,SACJ,CAAC,EAAE,CAAC,ECJG,IAAM,EAAwB,MAAO,EAAS,EAAU,CAAC,IAAM,CAClE,MAAQ,WAAY,KAAa,uCACjC,OAAO,EAAQ,CACX,UACA,OAAQ,EAAQ,MACpB,CAAC,EAAE,GAEM,EAAe,CAAC,IAAQ,WACzB,EAAI,gBAAkB,iBACnB,EAAI,iBAAmB,iBACvB,EAAI,cAAgB,iBACpB,EAAI,aAAe,iBACnB,EAAI,gBAAkB,UCZ9B,IAAM,EAAuB,CAAC,IAAQ,QAAQ,CAAG,UAC7C,IAAQ,iBACR,EAAI,oBAAsB,iBAC1B,EAAI,wBAA0B,UACrC,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,iBAAiB,GAAI,GAChE,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,cAAc,GAAI,EACpD,EAA2B,CAAC,EAAS,IAAY,CAE1D,OADA,GAAS,QAAQ,MAAM,6DAA6D,EAC7E,QAAQ,QAAQ,CACnB,YAAa,EAAQ,kBACrB,gBAAiB,EAAQ,sBACzB,aAAc,EAAQ,qBAClB,EAAQ,sBAAwB,CAAE,gBAAiB,EAAQ,oBAAqB,KAChF,EAAQ,gBAAkB,CAAE,UAAW,EAAQ,cAAe,CACtE,CAAC,GCdE,IAAM,EAAuB,CAAC,IAAQ,QAAQ,CAAG,UAC7C,IAAQ,iBACR,EAAI,0BAA4B,iBAChC,EAAI,WAAa,UACxB,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,iBAAiB,GAAI,EACvD,EAAgC,MAAO,EAAS,IAAmB,sCAA6C,KAAK,EAAG,mBAAoB,EAAc,CACnK,qBAAsB,EAAQ,wBAC9B,QAAS,EAAQ,SACjB,gBAAiB,EAAQ,kBACzB,2BAA4B,EAAQ,2BACpC,OAAQ,EAAQ,OAChB,mBAAoB,EAAQ,kBAChC,CAAC,EAAE,CAAC,ECNG,IAAM,EAAqB,MAAO,EAAa,EAAU,EAAS,EAAkB,CAAC,EAAG,EAA4B,KAAU,CACjI,MAAM,EAAO,EAAS,GACtB,GAAI,OAAO,KAAK,CAAe,EAAE,OAAS,GAAK,EAAqB,CAAI,EACpE,OAAO,EAAyB,EAAM,CAAO,EAEjD,GAAI,GAA6B,EAAoB,EAAM,CAAE,QAAS,EAAa,OAAQ,EAAQ,MAAO,CAAC,EACvG,OAAO,EAA6B,EAAa,EAAU,EAAS,CAAe,EAEvF,GAAI,EAAqB,CAAI,EACzB,OAAO,EAAyB,EAAM,CAAO,EAEjD,GAAI,EAAqB,CAAI,EACzB,OAAO,EAA8B,EAAM,CAAO,EAEtD,GAAI,EAAiB,CAAI,EACrB,OAAO,EAA0B,EAAS,CAAW,EAEzD,GAAI,EAAa,CAAI,EACjB,OAAO,MAAM,EAAsB,EAAa,CAAO,EAE3D,MAAM,IAAI,EAAyB,iDAAiD,2CAAsD,CAAE,OAAQ,EAAQ,MAAO,CAAC,GCxBjK,IAAM,EAAU,CAAC,EAAO,CAAC,IAAM,SAAY,CAC9C,EAAK,QAAQ,MAAM,4CAA4C,EAC/D,MAAM,EAAW,MAAM,EAAgB,CAAI,EAC3C,OAAO,EAAmB,EAAe,CAAI,EAAG,EAAU,CAAI",
15
- "debugId": "B2C75658070C9DA864756e2164756e21",
15
+ "debugId": "0BC8CB0A7994C85D64756e2164756e21",
16
16
  "names": []
17
17
  }
@@ -0,0 +1,3 @@
1
+ var c="__smithy_context";var t;(function(r){r.HEADER="header",r.QUERY="query"})(t||(t={}));var e;(function(r){r.HEADER="header",r.QUERY="query"})(e||(e={}));var p;(function(r){r.HTTP="http",r.HTTPS="https"})(p||(p={}));var o;(function(r){r.MD5="md5",r.CRC32="crc32",r.CRC32C="crc32c",r.SHA1="sha1",r.SHA256="sha256"})(o||(o={}));var x;(function(r){r[r.HEADER=0]="HEADER",r[r.TRAILER=1]="TRAILER"})(x||(x={}));var m;(function(r){r.PROFILE="profile",r.SSO_SESSION="sso-session",r.SERVICES="services"})(m||(m={}));var s;(function(r){r.HTTP_0_9="http/0.9",r.HTTP_1_0="http/1.0",r.TDS_8_0="tds/8.0"})(s||(s={}));export{p as Db,o as Eb,c as Fb,m as Gb};
2
+
3
+ //# debugId=17C3F49735B660D564756e2164756e21
@@ -0,0 +1,17 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../node_modules/@smithy/types/dist-es/middleware.js", "../../../node_modules/@smithy/types/dist-es/auth/auth.js", "../../../node_modules/@smithy/types/dist-es/auth/HttpApiKeyAuth.js", "../../../node_modules/@smithy/types/dist-es/endpoint.js", "../../../node_modules/@smithy/types/dist-es/extensions/checksum.js", "../../../node_modules/@smithy/types/dist-es/http.js", "../../../node_modules/@smithy/types/dist-es/profile.js", "../../../node_modules/@smithy/types/dist-es/transfer.js"],
4
+ "sourcesContent": [
5
+ "export const SMITHY_CONTEXT_KEY = \"__smithy_context\";\n",
6
+ "export var HttpAuthLocation;\n(function (HttpAuthLocation) {\n HttpAuthLocation[\"HEADER\"] = \"header\";\n HttpAuthLocation[\"QUERY\"] = \"query\";\n})(HttpAuthLocation || (HttpAuthLocation = {}));\n",
7
+ "export var HttpApiKeyAuthLocation;\n(function (HttpApiKeyAuthLocation) {\n HttpApiKeyAuthLocation[\"HEADER\"] = \"header\";\n HttpApiKeyAuthLocation[\"QUERY\"] = \"query\";\n})(HttpApiKeyAuthLocation || (HttpApiKeyAuthLocation = {}));\n",
8
+ "export var EndpointURLScheme;\n(function (EndpointURLScheme) {\n EndpointURLScheme[\"HTTP\"] = \"http\";\n EndpointURLScheme[\"HTTPS\"] = \"https\";\n})(EndpointURLScheme || (EndpointURLScheme = {}));\n",
9
+ "export var AlgorithmId;\n(function (AlgorithmId) {\n AlgorithmId[\"MD5\"] = \"md5\";\n AlgorithmId[\"CRC32\"] = \"crc32\";\n AlgorithmId[\"CRC32C\"] = \"crc32c\";\n AlgorithmId[\"SHA1\"] = \"sha1\";\n AlgorithmId[\"SHA256\"] = \"sha256\";\n})(AlgorithmId || (AlgorithmId = {}));\nexport const getChecksumConfiguration = (runtimeConfig) => {\n const checksumAlgorithms = [];\n if (runtimeConfig.sha256 !== undefined) {\n checksumAlgorithms.push({\n algorithmId: () => AlgorithmId.SHA256,\n checksumConstructor: () => runtimeConfig.sha256,\n });\n }\n if (runtimeConfig.md5 != undefined) {\n checksumAlgorithms.push({\n algorithmId: () => AlgorithmId.MD5,\n checksumConstructor: () => runtimeConfig.md5,\n });\n }\n return {\n _checksumAlgorithms: checksumAlgorithms,\n addChecksumAlgorithm(algo) {\n this._checksumAlgorithms.push(algo);\n },\n checksumAlgorithms() {\n return this._checksumAlgorithms;\n },\n };\n};\nexport const resolveChecksumRuntimeConfig = (clientConfig) => {\n const runtimeConfig = {};\n clientConfig.checksumAlgorithms().forEach((checksumAlgorithm) => {\n runtimeConfig[checksumAlgorithm.algorithmId()] = checksumAlgorithm.checksumConstructor();\n });\n return runtimeConfig;\n};\n",
10
+ "export var FieldPosition;\n(function (FieldPosition) {\n FieldPosition[FieldPosition[\"HEADER\"] = 0] = \"HEADER\";\n FieldPosition[FieldPosition[\"TRAILER\"] = 1] = \"TRAILER\";\n})(FieldPosition || (FieldPosition = {}));\n",
11
+ "export var IniSectionType;\n(function (IniSectionType) {\n IniSectionType[\"PROFILE\"] = \"profile\";\n IniSectionType[\"SSO_SESSION\"] = \"sso-session\";\n IniSectionType[\"SERVICES\"] = \"services\";\n})(IniSectionType || (IniSectionType = {}));\n",
12
+ "export var RequestHandlerProtocol;\n(function (RequestHandlerProtocol) {\n RequestHandlerProtocol[\"HTTP_0_9\"] = \"http/0.9\";\n RequestHandlerProtocol[\"HTTP_1_0\"] = \"http/1.0\";\n RequestHandlerProtocol[\"TDS_8_0\"] = \"tds/8.0\";\n})(RequestHandlerProtocol || (RequestHandlerProtocol = {}));\n"
13
+ ],
14
+ "mappings": "AAAO,IAAM,EAAqB,mBCA3B,IAAI,EACX,SAAU,CAAC,EAAkB,CACzB,EAAiB,OAAY,SAC7B,EAAiB,MAAW,UAC7B,IAAqB,EAAmB,CAAC,EAAE,ECJvC,IAAI,EACX,SAAU,CAAC,EAAwB,CAC/B,EAAuB,OAAY,SACnC,EAAuB,MAAW,UACnC,IAA2B,EAAyB,CAAC,EAAE,ECJnD,IAAI,EACX,SAAU,CAAC,EAAmB,CAC1B,EAAkB,KAAU,OAC5B,EAAkB,MAAW,UAC9B,IAAsB,EAAoB,CAAC,EAAE,ECJzC,IAAI,EACX,SAAU,CAAC,EAAa,CACpB,EAAY,IAAS,MACrB,EAAY,MAAW,QACvB,EAAY,OAAY,SACxB,EAAY,KAAU,OACtB,EAAY,OAAY,WACzB,IAAgB,EAAc,CAAC,EAAE,ECP7B,IAAI,EACX,SAAU,CAAC,EAAe,CACtB,EAAc,EAAc,OAAY,GAAK,SAC7C,EAAc,EAAc,QAAa,GAAK,YAC/C,IAAkB,EAAgB,CAAC,EAAE,ECJjC,IAAI,EACX,SAAU,CAAC,EAAgB,CACvB,EAAe,QAAa,UAC5B,EAAe,YAAiB,cAChC,EAAe,SAAc,aAC9B,IAAmB,EAAiB,CAAC,EAAE,ECLnC,IAAI,EACX,SAAU,CAAC,EAAwB,CAC/B,EAAuB,SAAc,WACrC,EAAuB,SAAc,WACrC,EAAuB,QAAa,YACrC,IAA2B,EAAyB,CAAC,EAAE",
15
+ "debugId": "17C3F49735B660D564756e2164756e21",
16
+ "names": []
17
+ }
@@ -1,4 +1,4 @@
1
1
  // @bun
2
- import{I as r} from"./chunk-c83dcc500d5fefe3.js";import{Ab as d,Bb as v} from"./chunk-225a2ac22f559ca4.js";import"./chunk-7f095ebadaafbe12.js";import"./chunk-4e3d8823a08776e9.js";import{Mb as z,Nb as y} from"./chunk-89e42f2de63525a8.js";import{parse as p} from"url";import{Buffer as M} from"buffer";import{request as k} from"http";function u(c){return new Promise((I,x)=>{const T=k({method:"GET",...c,hostname:c.hostname?.replace(/^\[(.+)\]$/,"$1")});T.on("error",(N)=>{x(Object.assign(new z("Unable to connect to instance metadata service"),N)),T.destroy()}),T.on("timeout",()=>{x(new z("TimeoutError from instance metadata service")),T.destroy()}),T.on("response",(N)=>{const{statusCode:O=400}=N;if(O<200||300<=O)x(Object.assign(new z("Error response received from instance metadata service"),{statusCode:O})),T.destroy();const E=[];N.on("data",(w)=>{E.push(w)}),N.on("end",()=>{I(M.concat(E)),T.destroy()})}),T.end()})}var K=(c)=>Boolean(c)&&typeof c==="object"&&typeof c.AccessKeyId==="string"&&typeof c.SecretAccessKey==="string"&&typeof c.Token==="string"&&typeof c.Expiration==="string",_=(c)=>({accessKeyId:c.AccessKeyId,secretAccessKey:c.SecretAccessKey,sessionToken:c.Token,expiration:new Date(c.Expiration),...c.AccountId&&{accountId:c.AccountId}});var Sc=1000,fc=0,D=({maxRetries:c=0,timeout:I=1000})=>({maxRetries:c,timeout:I});var m=(c,I)=>{let x=c();for(let T=0;T<I;T++)x=x.catch(c);return x};var Q="AWS_CONTAINER_CREDENTIALS_FULL_URI",X="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",b="AWS_CONTAINER_AUTHORIZATION_TOKEN",zc=(c={})=>{const{timeout:I,maxRetries:x}=D(c);return()=>m(async()=>{const T=await s({logger:c.logger}),N=JSON.parse(await C(I,T));if(!K(N))throw new y("Invalid response received from instance metadata service.",{logger:c.logger});return _(N)},x)},C=async(c,I)=>{if(process.env[b])I.headers={...I.headers,Authorization:process.env[b]};return(await u({...I,timeout:c})).toString()},a="169.254.170.2",n={localhost:!0,"127.0.0.1":!0},o={"http:":!0,"https:":!0},s=async({logger:c})=>{if(process.env[X])return{hostname:a,path:process.env[X]};if(process.env[Q]){const I=p(process.env[Q]);if(!I.hostname||!(I.hostname in n))throw new y(`${I.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:c});if(!I.protocol||!(I.protocol in o))throw new y(`${I.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:c});return{...I,port:I.port?parseInt(I.port,10):void 0}}throw new y("The container metadata credential provider cannot be used unless"+` the ${X} or ${Q} environment`+" variable is set",{tryNextLink:!1,logger:c})};class G extends y{constructor(c,I=!0){super(c,I);this.tryNextLink=I,this.name="InstanceMetadataV1FallbackError",Object.setPrototypeOf(this,G.prototype)}}var B=r(d(),1);var A;(function(c){c.IPv4="http://169.254.169.254",c.IPv6="http://[fd00:ec2::254]"})(A||(A={}));var H={environmentVariableSelector:(c)=>c["AWS_EC2_METADATA_SERVICE_ENDPOINT"],configFileSelector:(c)=>c["ec2_metadata_service_endpoint"],default:void 0};var f;(function(c){c.IPv4="IPv4",c.IPv6="IPv6"})(f||(f={}));var g="AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE",l="ec2_metadata_service_endpoint_mode",q={environmentVariableSelector:(c)=>c[g],configFileSelector:(c)=>c[l],default:f.IPv4};var Z=async()=>B.parseUrl(await e()||await i()),e=async()=>v(H)(),i=async()=>{const c=await v(q)();switch(c){case f.IPv4:return A.IPv4;case f.IPv6:return A.IPv6;default:throw new Error(`Unsupported endpoint mode: ${c}.`+` Select from ${Object.values(f)}`)}};var L=(c,I)=>{const x=300+Math.floor(Math.random()*300),T=new Date(Date.now()+x*1000);I.warn("Attempting credential expiration extension due to a credential service availability issue. A refresh of these "+`credentials will be attempted after ${new Date(T)}.\nFor more information, please visit: `+"https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html");const N=c.originalExpiration??c.expiration;return{...c,...N?{originalExpiration:N}:{},expiration:T}};var U=(c,I={})=>{const x=I?.logger||console;let T;return async()=>{let N;try{if(N=await c(),N.expiration&&N.expiration.getTime()<Date.now())N=L(N,x)}catch(O){if(T)x.warn("Credential renew failed: ",O),N=L(T,x);else throw O}return T=N,N}};var P="/latest/meta-data/iam/security-credentials/",cc="/latest/api/token",W="AWS_EC2_METADATA_V1_DISABLED",t="ec2_metadata_v1_disabled",F="x-aws-ec2-metadata-token",sc=(c={})=>U(Ic(c),{logger:c.logger}),Ic=(c={})=>{let I=!1;const{logger:x,profile:T}=c,{timeout:N,maxRetries:O}=D(c),E=async(w,$)=>{if(I||$.headers?.[F]==null){let h=!1,Y=!1;const R=await v({environmentVariableSelector:(S)=>{const j=S[W];if(Y=!!j&&j!=="false",j===void 0)throw new y(`${W} not set in env, checking config file next.`,{logger:c.logger});return Y},configFileSelector:(S)=>{const j=S[t];return h=!!j&&j!=="false",h},default:!1},{profile:T})();if(c.ec2MetadataV1Disabled||R){const S=[];if(c.ec2MetadataV1Disabled)S.push("credential provider initialization (runtime option ec2MetadataV1Disabled)");if(h)S.push(`config file profile (${t})`);if(Y)S.push(`process environment variable (${W})`);throw new G(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${S.join(", ")}].`)}}const V=(await m(async()=>{let h;try{h=await Nc($)}catch(Y){if(Y.statusCode===401)I=!1;throw Y}return h},w)).trim();return m(async()=>{let h;try{h=await xc(V,$,c)}catch(Y){if(Y.statusCode===401)I=!1;throw Y}return h},w)};return async()=>{const w=await Z();if(I)return x?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),E(O,{...w,timeout:N});else{let $;try{$=(await Tc({...w,timeout:N})).toString()}catch(J){if(J?.statusCode===400)throw Object.assign(J,{message:"EC2 Metadata token request returned error"});else if(J.message==="TimeoutError"||[403,404,405].includes(J.statusCode))I=!0;return x?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),E(O,{...w,timeout:N})}return E(O,{...w,headers:{[F]:$},timeout:N})}}},Tc=async(c)=>u({...c,path:cc,method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),Nc=async(c)=>(await u({...c,path:P})).toString(),xc=async(c,I,x)=>{const T=JSON.parse((await u({...I,path:P+c})).toString());if(!K(T))throw new y("Invalid response received from instance metadata service.",{logger:x.logger});return _(T)};export{D as providerConfigFromInit,u as httpRequest,Z as getInstanceMetadataEndpoint,sc as fromInstanceMetadata,zc as fromContainerMetadata,A as Endpoint,X as ENV_CMDS_RELATIVE_URI,Q as ENV_CMDS_FULL_URI,b as ENV_CMDS_AUTH_TOKEN,Sc as DEFAULT_TIMEOUT,fc as DEFAULT_MAX_RETRIES};
2
+ import{I as r} from"./chunk-c83dcc500d5fefe3.js";import{Bb as d,Cb as v} from"./chunk-0a78bb530df845c9.js";import"./chunk-17c3f49735b660d5.js";import"./chunk-79168b7162a45077.js";import{Qb as z,Rb as y} from"./chunk-9037f8f927d4caff.js";import{parse as p} from"url";import{Buffer as M} from"buffer";import{request as k} from"http";function u(c){return new Promise((I,x)=>{const T=k({method:"GET",...c,hostname:c.hostname?.replace(/^\[(.+)\]$/,"$1")});T.on("error",(N)=>{x(Object.assign(new z("Unable to connect to instance metadata service"),N)),T.destroy()}),T.on("timeout",()=>{x(new z("TimeoutError from instance metadata service")),T.destroy()}),T.on("response",(N)=>{const{statusCode:O=400}=N;if(O<200||300<=O)x(Object.assign(new z("Error response received from instance metadata service"),{statusCode:O})),T.destroy();const E=[];N.on("data",(w)=>{E.push(w)}),N.on("end",()=>{I(M.concat(E)),T.destroy()})}),T.end()})}var K=(c)=>Boolean(c)&&typeof c==="object"&&typeof c.AccessKeyId==="string"&&typeof c.SecretAccessKey==="string"&&typeof c.Token==="string"&&typeof c.Expiration==="string",_=(c)=>({accessKeyId:c.AccessKeyId,secretAccessKey:c.SecretAccessKey,sessionToken:c.Token,expiration:new Date(c.Expiration),...c.AccountId&&{accountId:c.AccountId}});var Sc=1000,fc=0,D=({maxRetries:c=0,timeout:I=1000})=>({maxRetries:c,timeout:I});var m=(c,I)=>{let x=c();for(let T=0;T<I;T++)x=x.catch(c);return x};var Q="AWS_CONTAINER_CREDENTIALS_FULL_URI",X="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",b="AWS_CONTAINER_AUTHORIZATION_TOKEN",zc=(c={})=>{const{timeout:I,maxRetries:x}=D(c);return()=>m(async()=>{const T=await s({logger:c.logger}),N=JSON.parse(await C(I,T));if(!K(N))throw new y("Invalid response received from instance metadata service.",{logger:c.logger});return _(N)},x)},C=async(c,I)=>{if(process.env[b])I.headers={...I.headers,Authorization:process.env[b]};return(await u({...I,timeout:c})).toString()},a="169.254.170.2",n={localhost:!0,"127.0.0.1":!0},o={"http:":!0,"https:":!0},s=async({logger:c})=>{if(process.env[X])return{hostname:a,path:process.env[X]};if(process.env[Q]){const I=p(process.env[Q]);if(!I.hostname||!(I.hostname in n))throw new y(`${I.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:c});if(!I.protocol||!(I.protocol in o))throw new y(`${I.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:c});return{...I,port:I.port?parseInt(I.port,10):void 0}}throw new y("The container metadata credential provider cannot be used unless"+` the ${X} or ${Q} environment`+" variable is set",{tryNextLink:!1,logger:c})};class G extends y{constructor(c,I=!0){super(c,I);this.tryNextLink=I,this.name="InstanceMetadataV1FallbackError",Object.setPrototypeOf(this,G.prototype)}}var B=r(d(),1);var A;(function(c){c.IPv4="http://169.254.169.254",c.IPv6="http://[fd00:ec2::254]"})(A||(A={}));var H={environmentVariableSelector:(c)=>c["AWS_EC2_METADATA_SERVICE_ENDPOINT"],configFileSelector:(c)=>c["ec2_metadata_service_endpoint"],default:void 0};var f;(function(c){c.IPv4="IPv4",c.IPv6="IPv6"})(f||(f={}));var g="AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE",l="ec2_metadata_service_endpoint_mode",q={environmentVariableSelector:(c)=>c[g],configFileSelector:(c)=>c[l],default:f.IPv4};var Z=async()=>B.parseUrl(await e()||await i()),e=async()=>v(H)(),i=async()=>{const c=await v(q)();switch(c){case f.IPv4:return A.IPv4;case f.IPv6:return A.IPv6;default:throw new Error(`Unsupported endpoint mode: ${c}.`+` Select from ${Object.values(f)}`)}};var L=(c,I)=>{const x=300+Math.floor(Math.random()*300),T=new Date(Date.now()+x*1000);I.warn("Attempting credential expiration extension due to a credential service availability issue. A refresh of these "+`credentials will be attempted after ${new Date(T)}.\nFor more information, please visit: `+"https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html");const N=c.originalExpiration??c.expiration;return{...c,...N?{originalExpiration:N}:{},expiration:T}};var U=(c,I={})=>{const x=I?.logger||console;let T;return async()=>{let N;try{if(N=await c(),N.expiration&&N.expiration.getTime()<Date.now())N=L(N,x)}catch(O){if(T)x.warn("Credential renew failed: ",O),N=L(T,x);else throw O}return T=N,N}};var P="/latest/meta-data/iam/security-credentials/",cc="/latest/api/token",W="AWS_EC2_METADATA_V1_DISABLED",t="ec2_metadata_v1_disabled",F="x-aws-ec2-metadata-token",sc=(c={})=>U(Ic(c),{logger:c.logger}),Ic=(c={})=>{let I=!1;const{logger:x,profile:T}=c,{timeout:N,maxRetries:O}=D(c),E=async(w,$)=>{if(I||$.headers?.[F]==null){let h=!1,Y=!1;const R=await v({environmentVariableSelector:(S)=>{const j=S[W];if(Y=!!j&&j!=="false",j===void 0)throw new y(`${W} not set in env, checking config file next.`,{logger:c.logger});return Y},configFileSelector:(S)=>{const j=S[t];return h=!!j&&j!=="false",h},default:!1},{profile:T})();if(c.ec2MetadataV1Disabled||R){const S=[];if(c.ec2MetadataV1Disabled)S.push("credential provider initialization (runtime option ec2MetadataV1Disabled)");if(h)S.push(`config file profile (${t})`);if(Y)S.push(`process environment variable (${W})`);throw new G(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${S.join(", ")}].`)}}const V=(await m(async()=>{let h;try{h=await Nc($)}catch(Y){if(Y.statusCode===401)I=!1;throw Y}return h},w)).trim();return m(async()=>{let h;try{h=await xc(V,$,c)}catch(Y){if(Y.statusCode===401)I=!1;throw Y}return h},w)};return async()=>{const w=await Z();if(I)return x?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),E(O,{...w,timeout:N});else{let $;try{$=(await Tc({...w,timeout:N})).toString()}catch(J){if(J?.statusCode===400)throw Object.assign(J,{message:"EC2 Metadata token request returned error"});else if(J.message==="TimeoutError"||[403,404,405].includes(J.statusCode))I=!0;return x?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),E(O,{...w,timeout:N})}return E(O,{...w,headers:{[F]:$},timeout:N})}}},Tc=async(c)=>u({...c,path:cc,method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),Nc=async(c)=>(await u({...c,path:P})).toString(),xc=async(c,I,x)=>{const T=JSON.parse((await u({...I,path:P+c})).toString());if(!K(T))throw new y("Invalid response received from instance metadata service.",{logger:x.logger});return _(T)};export{D as providerConfigFromInit,u as httpRequest,Z as getInstanceMetadataEndpoint,sc as fromInstanceMetadata,zc as fromContainerMetadata,A as Endpoint,X as ENV_CMDS_RELATIVE_URI,Q as ENV_CMDS_FULL_URI,b as ENV_CMDS_AUTH_TOKEN,Sc as DEFAULT_TIMEOUT,fc as DEFAULT_MAX_RETRIES};
3
3
 
4
- //# debugId=3840523C97BD28E464756e2164756e21
4
+ //# debugId=28EDD2558794604264756e2164756e21
@@ -18,6 +18,6 @@
18
18
  "import { loadConfig } from \"@smithy/node-config-provider\";\nimport { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { InstanceMetadataV1FallbackError } from \"./error/InstanceMetadataV1FallbackError\";\nimport { httpRequest } from \"./remoteProvider/httpRequest\";\nimport { fromImdsCredentials, isImdsCredentials } from \"./remoteProvider/ImdsCredentials\";\nimport { providerConfigFromInit } from \"./remoteProvider/RemoteProviderInit\";\nimport { retry } from \"./remoteProvider/retry\";\nimport { getInstanceMetadataEndpoint } from \"./utils/getInstanceMetadataEndpoint\";\nimport { staticStabilityProvider } from \"./utils/staticStabilityProvider\";\nconst IMDS_PATH = \"/latest/meta-data/iam/security-credentials/\";\nconst IMDS_TOKEN_PATH = \"/latest/api/token\";\nconst AWS_EC2_METADATA_V1_DISABLED = \"AWS_EC2_METADATA_V1_DISABLED\";\nconst PROFILE_AWS_EC2_METADATA_V1_DISABLED = \"ec2_metadata_v1_disabled\";\nconst X_AWS_EC2_METADATA_TOKEN = \"x-aws-ec2-metadata-token\";\nexport const fromInstanceMetadata = (init = {}) => staticStabilityProvider(getInstanceMetadataProvider(init), { logger: init.logger });\nconst getInstanceMetadataProvider = (init = {}) => {\n let disableFetchToken = false;\n const { logger, profile } = init;\n const { timeout, maxRetries } = providerConfigFromInit(init);\n const getCredentials = async (maxRetries, options) => {\n const isImdsV1Fallback = disableFetchToken || options.headers?.[X_AWS_EC2_METADATA_TOKEN] == null;\n if (isImdsV1Fallback) {\n let fallbackBlockedFromProfile = false;\n let fallbackBlockedFromProcessEnv = false;\n const configValue = await loadConfig({\n environmentVariableSelector: (env) => {\n const envValue = env[AWS_EC2_METADATA_V1_DISABLED];\n fallbackBlockedFromProcessEnv = !!envValue && envValue !== \"false\";\n if (envValue === undefined) {\n throw new CredentialsProviderError(`${AWS_EC2_METADATA_V1_DISABLED} not set in env, checking config file next.`, { logger: init.logger });\n }\n return fallbackBlockedFromProcessEnv;\n },\n configFileSelector: (profile) => {\n const profileValue = profile[PROFILE_AWS_EC2_METADATA_V1_DISABLED];\n fallbackBlockedFromProfile = !!profileValue && profileValue !== \"false\";\n return fallbackBlockedFromProfile;\n },\n default: false,\n }, {\n profile,\n })();\n if (init.ec2MetadataV1Disabled || configValue) {\n const causes = [];\n if (init.ec2MetadataV1Disabled)\n causes.push(\"credential provider initialization (runtime option ec2MetadataV1Disabled)\");\n if (fallbackBlockedFromProfile)\n causes.push(`config file profile (${PROFILE_AWS_EC2_METADATA_V1_DISABLED})`);\n if (fallbackBlockedFromProcessEnv)\n causes.push(`process environment variable (${AWS_EC2_METADATA_V1_DISABLED})`);\n throw new InstanceMetadataV1FallbackError(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${causes.join(\", \")}].`);\n }\n }\n const imdsProfile = (await retry(async () => {\n let profile;\n try {\n profile = await getProfile(options);\n }\n catch (err) {\n if (err.statusCode === 401) {\n disableFetchToken = false;\n }\n throw err;\n }\n return profile;\n }, maxRetries)).trim();\n return retry(async () => {\n let creds;\n try {\n creds = await getCredentialsFromProfile(imdsProfile, options, init);\n }\n catch (err) {\n if (err.statusCode === 401) {\n disableFetchToken = false;\n }\n throw err;\n }\n return creds;\n }, maxRetries);\n };\n return async () => {\n const endpoint = await getInstanceMetadataEndpoint();\n if (disableFetchToken) {\n logger?.debug(\"AWS SDK Instance Metadata\", \"using v1 fallback (no token fetch)\");\n return getCredentials(maxRetries, { ...endpoint, timeout });\n }\n else {\n let token;\n try {\n token = (await getMetadataToken({ ...endpoint, timeout })).toString();\n }\n catch (error) {\n if (error?.statusCode === 400) {\n throw Object.assign(error, {\n message: \"EC2 Metadata token request returned error\",\n });\n }\n else if (error.message === \"TimeoutError\" || [403, 404, 405].includes(error.statusCode)) {\n disableFetchToken = true;\n }\n logger?.debug(\"AWS SDK Instance Metadata\", \"using v1 fallback (initial)\");\n return getCredentials(maxRetries, { ...endpoint, timeout });\n }\n return getCredentials(maxRetries, {\n ...endpoint,\n headers: {\n [X_AWS_EC2_METADATA_TOKEN]: token,\n },\n timeout,\n });\n }\n };\n};\nconst getMetadataToken = async (options) => httpRequest({\n ...options,\n path: IMDS_TOKEN_PATH,\n method: \"PUT\",\n headers: {\n \"x-aws-ec2-metadata-token-ttl-seconds\": \"21600\",\n },\n});\nconst getProfile = async (options) => (await httpRequest({ ...options, path: IMDS_PATH })).toString();\nconst getCredentialsFromProfile = async (profile, options, init) => {\n const credentialsResponse = JSON.parse((await httpRequest({\n ...options,\n path: IMDS_PATH + profile,\n })).toString());\n if (!isImdsCredentials(credentialsResponse)) {\n throw new CredentialsProviderError(\"Invalid response received from instance metadata service.\", {\n logger: init.logger,\n });\n }\n return fromImdsCredentials(credentialsResponse);\n};\n"
19
19
  ],
20
20
  "mappings": ";qOACA,kBAAS,eCAT,mBAAS,kBACT,kBAAS,cACF,SAAS,CAAW,CAAC,EAAS,CACjC,OAAO,IAAI,QAAQ,CAAC,EAAS,IAAW,CACpC,MAAM,EAAM,EAAQ,CAChB,OAAQ,SACL,EACH,SAAU,EAAQ,UAAU,QAAQ,aAAc,IAAI,CAC1D,CAAC,EACD,EAAI,GAAG,QAAS,CAAC,IAAQ,CACrB,EAAO,OAAO,OAAO,IAAI,EAAc,gDAAgD,EAAG,CAAG,CAAC,EAC9F,EAAI,QAAQ,EACf,EACD,EAAI,GAAG,UAAW,IAAM,CACpB,EAAO,IAAI,EAAc,6CAA6C,CAAC,EACvE,EAAI,QAAQ,EACf,EACD,EAAI,GAAG,WAAY,CAAC,IAAQ,CACxB,MAAQ,aAAa,KAAQ,EAC7B,GAAI,EAAa,KAAO,KAAO,EAC3B,EAAO,OAAO,OAAO,IAAI,EAAc,wDAAwD,EAAG,CAAE,YAAW,CAAC,CAAC,EACjH,EAAI,QAAQ,EAEhB,MAAM,EAAS,CAAC,EAChB,EAAI,GAAG,OAAQ,CAAC,IAAU,CACtB,EAAO,KAAK,CAAK,EACpB,EACD,EAAI,GAAG,MAAO,IAAM,CAChB,EAAQ,EAAO,OAAO,CAAM,CAAC,EAC7B,EAAI,QAAQ,EACf,EACJ,EACD,EAAI,IAAI,EACX,EClCE,IAAM,EAAoB,CAAC,IAAQ,QAAQ,CAAG,UAC1C,IAAQ,iBACR,EAAI,cAAgB,iBACpB,EAAI,kBAAoB,iBACxB,EAAI,QAAU,iBACd,EAAI,aAAe,SACjB,EAAsB,CAAC,KAAW,CAC3C,YAAa,EAAM,YACnB,gBAAiB,EAAM,gBACvB,aAAc,EAAM,MACpB,WAAY,IAAI,KAAK,EAAM,UAAU,KACjC,EAAM,WAAa,CAAE,UAAW,EAAM,SAAU,CACxD,GCZO,IAAM,GAAkB,KAClB,GAAsB,EACtB,EAAyB,EAAG,aADN,EACwC,UAF5C,SAE8E,CAAE,aAAY,SAAQ,GCF5H,IAAM,EAAQ,CAAC,EAAS,IAAe,CAC1C,IAAI,EAAU,EAAQ,EACtB,QAAS,EAAI,EAAG,EAAI,EAAY,IAC5B,EAAU,EAAQ,MAAM,CAAO,EAEnC,OAAO,GJCJ,IAAM,EAAoB,qCACpB,EAAwB,yCACxB,EAAsB,oCACtB,GAAwB,CAAC,EAAO,CAAC,IAAM,CAChD,MAAQ,UAAS,cAAe,EAAuB,CAAI,EAC3D,MAAO,IAAM,EAAM,SAAY,CAC3B,MAAM,EAAiB,MAAM,EAAW,CAAE,OAAQ,EAAK,MAAO,CAAC,EACzD,EAAgB,KAAK,MAAM,MAAM,EAAmB,EAAS,CAAc,CAAC,EAClF,IAAK,EAAkB,CAAa,EAChC,MAAM,IAAI,EAAyB,4DAA6D,CAC5F,OAAQ,EAAK,MACjB,CAAC,EAEL,OAAO,EAAoB,CAAa,GACzC,CAAU,GAEX,EAAqB,MAAO,EAAS,IAAY,CACnD,GAAI,QAAQ,IAAI,GACZ,EAAQ,QAAU,IACX,EAAQ,QACX,cAAe,QAAQ,IAAI,EAC/B,EAMJ,OAJe,MAAM,EAAY,IAC1B,EACH,SACJ,CAAC,GACa,SAAS,GAErB,EAAU,gBACV,EAAmB,CACrB,UAAW,GACX,YAAa,EACjB,EACM,EAAuB,CACzB,QAAS,GACT,SAAU,EACd,EACM,EAAa,OAAS,YAAa,CACrC,GAAI,QAAQ,IAAI,GACZ,MAAO,CACH,SAAU,EACV,KAAM,QAAQ,IAAI,EACtB,EAEJ,GAAI,QAAQ,IAAI,GAAoB,CAChC,MAAM,EAAS,EAAM,QAAQ,IAAI,EAAkB,EACnD,IAAK,EAAO,YAAc,EAAO,YAAY,GACzC,MAAM,IAAI,EAAyB,GAAG,EAAO,8DAA+D,CACxG,YAAa,GACb,QACJ,CAAC,EAEL,IAAK,EAAO,YAAc,EAAO,YAAY,GACzC,MAAM,IAAI,EAAyB,GAAG,EAAO,8DAA+D,CACxG,YAAa,GACb,QACJ,CAAC,EAEL,MAAO,IACA,EACH,KAAM,EAAO,KAAO,SAAS,EAAO,KAAM,EAAE,EAAI,MACpD,EAEJ,MAAM,IAAI,EAAyB,mEAC/B,QAAQ,QAA4B,gBACpC,mBAAoB,CACpB,YAAa,GACb,QACJ,CAAC,GK1EE,MAAM,UAAwC,CAAyB,CAC1E,WAAW,CAAC,EAAS,EAAc,GAAM,CACrC,MAAM,EAAS,CAAW,EAC1B,KAAK,YAAc,EACnB,KAAK,KAAO,kCACZ,OAAO,eAAe,KAAM,EAAgC,SAAS,EAE7E,CCPA,eCDO,IAAI,EACX,SAAU,CAAC,EAAU,CACjB,EAAS,KAAU,yBACnB,EAAS,KAAU,2BACpB,IAAa,EAAW,CAAC,EAAE,ECFvB,IAAM,EAA0B,CACnC,4BAA6B,CAAC,IAAQ,EAHT,qCAI7B,mBAAoB,CAAC,IAAY,EAHD,iCAIhC,QAAS,MACb,ECNO,IAAI,EACX,SAAU,CAAC,EAAc,CACrB,EAAa,KAAU,OACvB,EAAa,KAAU,SACxB,IAAiB,EAAe,CAAC,EAAE,ECH/B,IAAM,EAAyB,yCACzB,EAA4B,qCAC5B,EAA+B,CACxC,4BAA6B,CAAC,IAAQ,EAAI,GAC1C,mBAAoB,CAAC,IAAY,EAAQ,GACzC,QAAS,EAAa,IAC1B,EJDO,IAAM,EAA8B,SAAY,WAAU,MAAM,EAAsB,GAAO,MAAM,EAA0B,CAAE,EAChI,EAAwB,SAAY,EAAW,CAAuB,EAAE,EACxE,EAA4B,SAAY,CAC1C,MAAM,EAAe,MAAM,EAAW,CAA4B,EAAE,EACpE,OAAQ,QACC,EAAa,KACd,OAAO,EAAyB,UAC/B,EAAa,KACd,OAAO,EAAyB,aAEhC,MAAM,IAAI,MAAM,8BAA8B,KAAkB,gBAAgB,OAAO,OAAO,CAAY,GAAG,IKblH,IAAM,EAAyC,CAAC,EAAa,IAAW,CAC3E,MAAM,EAJwC,IAK1C,KAAK,MAAM,KAAK,OAAO,EAJiC,GAI0B,EAChF,EAAgB,IAAI,KAAK,KAAK,IAAI,EAAI,EAAkB,IAAI,EAClE,EAAO,KAAK,iHACR,uCAAuC,IAAI,KAAK,CAAa,2CANpC,iFAOD,EAC5B,MAAM,EAAqB,EAAY,oBAAsB,EAAY,WACzE,MAAO,IACA,KACC,EAAqB,CAAE,oBAAmB,EAAI,CAAC,EACnD,WAAY,CAChB,GCdG,IAAM,EAA0B,CAAC,EAAU,EAAU,CAAC,IAAM,CAC/D,MAAM,EAAS,GAAS,QAAU,QAClC,IAAI,EACJ,MAAO,UAAY,CACf,IAAI,EACJ,GAAI,CAEA,GADA,EAAc,MAAM,EAAS,EACzB,EAAY,YAAc,EAAY,WAAW,QAAQ,EAAI,KAAK,IAAI,EACtE,EAAc,EAAuC,EAAa,CAAM,QAGzE,EAAP,CACI,GAAI,EACA,EAAO,KAAK,4BAA6B,CAAC,EAC1C,EAAc,EAAuC,EAAiB,CAAM,MAG5E,OAAM,EAId,OADA,EAAkB,EACX,ICbf,IAAM,EAAY,8CACZ,GAAkB,oBAClB,EAA+B,+BAC/B,EAAuC,2BACvC,EAA2B,2BACpB,GAAuB,CAAC,EAAO,CAAC,IAAM,EAAwB,GAA4B,CAAI,EAAG,CAAE,OAAQ,EAAK,MAAO,CAAC,EAC/H,GAA8B,CAAC,EAAO,CAAC,IAAM,CAC/C,IAAI,EAAoB,GACxB,MAAQ,SAAQ,WAAY,GACpB,UAAS,cAAe,EAAuB,CAAI,EACrD,EAAiB,MAAO,EAAY,IAAY,CAElD,GADyB,GAAqB,EAAQ,UAAU,IAA6B,KACvE,CAClB,IAAI,EAA6B,GAC7B,EAAgC,GACpC,MAAM,EAAc,MAAM,EAAW,CACjC,4BAA6B,CAAC,IAAQ,CAClC,MAAM,EAAW,EAAI,GAErB,GADA,IAAkC,GAAY,IAAa,QACvD,IAAa,OACb,MAAM,IAAI,EAAyB,GAAG,+CAA2E,CAAE,OAAQ,EAAK,MAAO,CAAC,EAE5I,OAAO,GAEX,mBAAoB,CAAC,IAAY,CAC7B,MAAM,EAAe,EAAQ,GAE7B,OADA,IAA+B,GAAgB,IAAiB,QACzD,GAEX,QAAS,EACb,EAAG,CACC,SACJ,CAAC,EAAE,EACH,GAAI,EAAK,uBAAyB,EAAa,CAC3C,MAAM,EAAS,CAAC,EAChB,GAAI,EAAK,sBACL,EAAO,KAAK,2EAA2E,EAC3F,GAAI,EACA,EAAO,KAAK,wBAAwB,IAAuC,EAC/E,GAAI,EACA,EAAO,KAAK,iCAAiC,IAA+B,EAChF,MAAM,IAAI,EAAgC,6FAA6F,EAAO,KAAK,IAAI,KAAK,GAGpK,MAAM,GAAe,MAAM,EAAM,SAAY,CACzC,IAAI,EACJ,GAAI,CACA,EAAU,MAAM,GAAW,CAAO,QAE/B,EAAP,CACI,GAAI,EAAI,aAAe,IACnB,EAAoB,GAExB,MAAM,EAEV,OAAO,GACR,CAAU,GAAG,KAAK,EACrB,OAAO,EAAM,SAAY,CACrB,IAAI,EACJ,GAAI,CACA,EAAQ,MAAM,GAA0B,EAAa,EAAS,CAAI,QAE/D,EAAP,CACI,GAAI,EAAI,aAAe,IACnB,EAAoB,GAExB,MAAM,EAEV,OAAO,GACR,CAAU,GAEjB,MAAO,UAAY,CACf,MAAM,EAAW,MAAM,EAA4B,EACnD,GAAI,EAEA,OADA,GAAQ,MAAM,4BAA6B,oCAAoC,EACxE,EAAe,EAAY,IAAK,EAAU,SAAQ,CAAC,MAEzD,CACD,IAAI,EACJ,GAAI,CACA,GAAS,MAAM,GAAiB,IAAK,EAAU,SAAQ,CAAC,GAAG,SAAS,QAEjE,EAAP,CACI,GAAI,GAAO,aAAe,IACtB,MAAM,OAAO,OAAO,EAAO,CACvB,QAAS,2CACb,CAAC,UAEI,EAAM,UAAY,gBAAkB,CAAC,IAAK,IAAK,GAAG,EAAE,SAAS,EAAM,UAAU,EAClF,EAAoB,GAGxB,OADA,GAAQ,MAAM,4BAA6B,6BAA6B,EACjE,EAAe,EAAY,IAAK,EAAU,SAAQ,CAAC,EAE9D,OAAO,EAAe,EAAY,IAC3B,EACH,QAAS,EACJ,GAA2B,CAChC,EACA,SACJ,CAAC,KAIP,GAAmB,MAAO,IAAY,EAAY,IACjD,EACH,KAAM,GACN,OAAQ,MACR,QAAS,CACL,uCAAwC,OAC5C,CACJ,CAAC,EACK,GAAa,MAAO,KAAa,MAAM,EAAY,IAAK,EAAS,KAAM,CAAU,CAAC,GAAG,SAAS,EAC9F,GAA4B,MAAO,EAAS,EAAS,IAAS,CAChE,MAAM,EAAsB,KAAK,OAAO,MAAM,EAAY,IACnD,EACH,KAAM,EAAY,CACtB,CAAC,GAAG,SAAS,CAAC,EACd,IAAK,EAAkB,CAAmB,EACtC,MAAM,IAAI,EAAyB,4DAA6D,CAC5F,OAAQ,EAAK,MACjB,CAAC,EAEL,OAAO,EAAoB,CAAmB",
21
- "debugId": "3840523C97BD28E464756e2164756e21",
21
+ "debugId": "28EDD2558794604264756e2164756e21",
22
22
  "names": []
23
23
  }
@@ -0,0 +1,4 @@
1
+ // @bun
2
+ import{I as o} from"./chunk-c83dcc500d5fefe3.js";import"./chunk-9e77cade8671df8d.js";import{$ as Ce,Aa as we,Ba as Te,Ca as x,Da as ve,Ea as ke,Fa as Re,Ga as re,Ha as ae,Ia as Ee,Ja as Pe,Ka as Je,X as ee,Z as se,_ as cs,aa as Le,ba as Me,ca as We,ga as hs,ha as F,ia as Ke,ja as G,ka as V,la as N,ma as f,na as Qe,oa as pe,pa as ye,qa as me,ra as he,sa as Xe,ta as Ye,va as rs,wa as as,xa as Ze,ya as ue,za as je} from"./chunk-d8d25380b8f0c36e.js";import{$a as R,Ab as xe,La as Fe,Ma as Ue,Qa as te,Sa as Ae,_a as ts,eb as D,fb as Ve,gb as h,nb as He,ob as u,pb as Ne,qb as ie,rb as le,sb as _e,tb as $e,vb as i,wb as y,yb as fe,zb as be} from"./chunk-ebc6b30a0275d2f7.js";import{Bb as ms,Cb as l} from"./chunk-0a78bb530df845c9.js";import"./chunk-17c3f49735b660d5.js";import"./chunk-79168b7162a45077.js";import"./chunk-9037f8f927d4caff.js";var p=o(F(),1);var _=o(x(),1),v=o(cs(),1),is=function(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(s,t)=>({signingProperties:{config:s,context:t}})}},b=function(e){return{schemeId:"smithy.api#noAuth"}},$=async(e,s,t)=>{return{operation:v.getSmithyContext(s).operation,region:await v.normalizeProvider(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}},P=(e)=>{const s=[];switch(e.operation){case"GetRoleCredentials":{s.push(b(e));break}case"ListAccountRoles":{s.push(b(e));break}case"ListAccounts":{s.push(b(e));break}case"Logout":{s.push(b(e));break}default:s.push(is(e))}return s},J=(e)=>{return{..._.resolveAwsSdkSigV4Config(e)}};var I=(e)=>{return{...e,useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}},C={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var L={name:"@aws-sdk/client-sso",description:"AWS SDK for JavaScript Sso Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sso","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sso"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sso",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sso"}};var qe=o(x(),1);var Se=o(hs(),1);var ne=o(x(),1),de=o(F(),1);var oe=o(ms(),1);var M={["required"]:!1,type:"String"},W={["required"]:!0,default:!1,type:"Boolean"},A={["ref"]:"Endpoint"},j={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseFIPS"},!0]},T={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseDualStack"},!0]},d={},K={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},H={["ref"]:"PartitionResult"},Q={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[H,"supportsDualStack"]}]},X=[j],Y=[T],Z=[{["ref"]:"Region"}],ps={version:"1.0",parameters:{Region:M,UseDualStack:W,UseFIPS:W,Endpoint:M},rules:[{conditions:[{["fn"]:"isSet",["argv"]:[A]}],rules:[{conditions:X,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:"error"},{conditions:Y,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:"error"},{endpoint:{url:A,properties:d,headers:d},type:"endpoint"}],type:"tree"},{conditions:[{["fn"]:"isSet",["argv"]:Z}],rules:[{conditions:[{["fn"]:"aws.partition",["argv"]:Z,assign:"PartitionResult"}],rules:[{conditions:[j,T],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,K]},Q],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:"error"}],type:"tree"},{conditions:X,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[K,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[H,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:d,headers:d},type:"endpoint"},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",type:"error"}],type:"tree"},{conditions:Y,rules:[{conditions:[Q],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",type:"error"}],type:"tree"},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"}],type:"tree"},{error:"Invalid Configuration: Missing Region",type:"error"}]},O=ps;var ys=new G({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),g=(e,s={})=>{return ys.get(e,()=>N(O,{endpointParams:e,logger:s.logger}))};V.aws=f;var ce=(e)=>{return{apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??re,base64Encoder:e?.base64Encoder??ae,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??g,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??P,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(s)=>s.getIdentityProvider("aws.auth#sigv4"),signer:new ne.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(s)=>s.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new de.NoAuthSigner}],logger:e?.logger??new te,serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??oe.parseUrl,utf8Decoder:e?.utf8Decoder??ee,utf8Encoder:e?.utf8Encoder??se}};var ze=(e)=>{le(process.version);const s=Ee(e),t=()=>s().then(ie),r=ce(e);return qe.emitWarningIfUnsupportedVersion(process.version),{...r,...e,runtime:"node",defaultsMode:s,bodyLengthChecker:e?.bodyLengthChecker??Re,defaultUserAgentProvider:e?.defaultUserAgentProvider??ve({serviceId:r.serviceId,clientVersion:L.version}),maxAttempts:e?.maxAttempts??l(ue),region:e?.region??l(me,he),requestHandler:be.create(e?.requestHandler??t),retryMode:e?.retryMode??l({...we,default:async()=>(await t()).retryMode||Se.DEFAULT_RETRY_MODE}),sha256:e?.sha256??ke.bind(null,"sha256"),streamCollector:e?.streamCollector??xe,useDualstackEndpoint:e?.useDualstackEndpoint??l(pe),useFipsEndpoint:e?.useFipsEndpoint??l(ye)}};var De=(e)=>{const s=e.httpAuthSchemes;let{httpAuthSchemeProvider:t,credentials:r}=e;return{setHttpAuthScheme(a){const n=s.findIndex((B)=>B.schemeId===a.schemeId);if(n===-1)s.push(a);else s.splice(n,1,a)},httpAuthSchemes(){return s},setHttpAuthSchemeProvider(a){t=a},httpAuthSchemeProvider(){return t},setCredentials(a){r=a},credentials(){return r}}},Be=(e)=>{return{httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}};var k=(e)=>e,Ie=(e,s)=>{const t={...k(Pe(e)),...k(_e(e)),...k(Fe(e)),...k(De(e))};return s.forEach((r)=>r.configure(t)),{...e,...Je(t),...$e(t),...Ue(t),...Be(t)}};class us extends Ae{constructor(...[e]){const s=ze(e||{}),t=I(s),r=Ke(t),a=je(r),n=Xe(a),B=Ce(n),ns=Ze(B),ds=J(ns),U=Ie(ds,e?.extensions||[]);super(U);this.config=U,this.middlewareStack.use(Qe(this.config)),this.middlewareStack.use(Te(this.config)),this.middlewareStack.use(Ye(this.config)),this.middlewareStack.use(Le(this.config)),this.middlewareStack.use(Me(this.config)),this.middlewareStack.use(We(this.config)),this.middlewareStack.use(p.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:$,identityProviderConfigProvider:async(os)=>new p.DefaultIdentityProviderConfig({"aws.auth#sigv4":os.credentials})})),this.middlewareStack.use(p.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class c extends He{constructor(e){super(e);Object.setPrototypeOf(this,c.prototype)}}class E extends c{constructor(e){super({name:"InvalidRequestException",$fault:"client",...e});this.name="InvalidRequestException",this.$fault="client",Object.setPrototypeOf(this,E.prototype)}}class q extends c{constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e});this.name="ResourceNotFoundException",this.$fault="client",Object.setPrototypeOf(this,q.prototype)}}class S extends c{constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e});this.name="TooManyRequestsException",this.$fault="client",Object.setPrototypeOf(this,S.prototype)}}class z extends c{constructor(e){super({name:"UnauthorizedException",$fault:"client",...e});this.name="UnauthorizedException",this.$fault="client",Object.setPrototypeOf(this,z.prototype)}}var Oe=(e)=>({...e,...e.accessToken&&{accessToken:R}}),ws=(e)=>({...e,...e.secretAccessKey&&{secretAccessKey:R},...e.sessionToken&&{sessionToken:R}}),Ge=(e)=>({...e,...e.roleCredentials&&{roleCredentials:ws(e.roleCredentials)}});var m=o(x(),1),ge=o(F(),1);var es=async(e,s)=>{const t=ge.requestBuilder(e,s),r=i({},qs,{[Us]:e[zs]});t.bp("/federation/credentials");const a=i({[Fs]:[,D(e[Bs],"roleName")],[Ds]:[,D(e[Ss],"accountId")]});let n;return t.m("GET").h(r).q(a).b(n),t.build()};var ss=async(e,s)=>{if(e.statusCode!==200&&e.statusCode>=300)return bs(e,s);const t=i({$metadata:w(e)}),r=D(Ve(await m.parseJsonBody(e.body,s)),"body"),a=y(r,{roleCredentials:fe});return Object.assign(t,a),t};var bs=async(e,s)=>{const t={...e,body:await m.parseJsonErrorBody(e.body,s)},r=m.loadRestJsonErrorCode(e,t.body);switch(r){case"InvalidRequestException":case"com.amazonaws.sso#InvalidRequestException":throw await vs(t,s);case"ResourceNotFoundException":case"com.amazonaws.sso#ResourceNotFoundException":throw await ks(t,s);case"TooManyRequestsException":case"com.amazonaws.sso#TooManyRequestsException":throw await Rs(t,s);case"UnauthorizedException":case"com.amazonaws.sso#UnauthorizedException":throw await Es(t,s);default:const a=t.body;return xs({output:e,parsedBody:a,errorCode:r})}},xs=Ne(c),vs=async(e,s)=>{const t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);const n=new E({$metadata:w(e),...t});return u(n,e.body)},ks=async(e,s)=>{const t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);const n=new q({$metadata:w(e),...t});return u(n,e.body)},Rs=async(e,s)=>{const t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);const n=new S({$metadata:w(e),...t});return u(n,e.body)},Es=async(e,s)=>{const t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);const n=new z({$metadata:w(e),...t});return u(n,e.body)},w=(e)=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]});var qs=(e)=>e!==void 0&&e!==null&&e!==""&&(!Object.getOwnPropertyNames(e).includes("length")||e.length!=0)&&(!Object.getOwnPropertyNames(e).includes("size")||e.size!=0),Ss="accountId",zs="accessToken",Ds="account_id";var Bs="roleName",Fs="role_name",Us="x-amz-sso_bearer_token";class _s extends ts.classBuilder().ep(C).m(function(e,s,t,r){return[rs(t,this.serialize,this.deserialize),as(t,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").f(Oe,Ge).ser(es).de(ss).build(){}export{us as SSOClient,_s as GetRoleCredentialsCommand};
3
+
4
+ //# debugId=4B2790E55056A14664756e2164756e21
@@ -16,7 +16,7 @@
16
16
  "import { loadRestJsonErrorCode, parseJsonBody as parseBody, parseJsonErrorBody as parseErrorBody } from \"@aws-sdk/core\";\nimport { requestBuilder as rb } from \"@smithy/core\";\nimport { _json, collectBody, decorateServiceException as __decorateServiceException, expectNonNull as __expectNonNull, expectObject as __expectObject, expectString as __expectString, map, take, withBaseException, } from \"@smithy/smithy-client\";\nimport { InvalidRequestException, ResourceNotFoundException, TooManyRequestsException, UnauthorizedException, } from \"../models/models_0\";\nimport { SSOServiceException as __BaseException } from \"../models/SSOServiceException\";\nexport const se_GetRoleCredentialsCommand = async (input, context) => {\n const b = rb(input, context);\n const headers = map({}, isSerializableHeaderValue, {\n [_xasbt]: input[_aT],\n });\n b.bp(\"/federation/credentials\");\n const query = map({\n [_rn]: [, __expectNonNull(input[_rN], `roleName`)],\n [_ai]: [, __expectNonNull(input[_aI], `accountId`)],\n });\n let body;\n b.m(\"GET\").h(headers).q(query).b(body);\n return b.build();\n};\nexport const se_ListAccountRolesCommand = async (input, context) => {\n const b = rb(input, context);\n const headers = map({}, isSerializableHeaderValue, {\n [_xasbt]: input[_aT],\n });\n b.bp(\"/assignment/roles\");\n const query = map({\n [_nt]: [, input[_nT]],\n [_mr]: [() => input.maxResults !== void 0, () => input[_mR].toString()],\n [_ai]: [, __expectNonNull(input[_aI], `accountId`)],\n });\n let body;\n b.m(\"GET\").h(headers).q(query).b(body);\n return b.build();\n};\nexport const se_ListAccountsCommand = async (input, context) => {\n const b = rb(input, context);\n const headers = map({}, isSerializableHeaderValue, {\n [_xasbt]: input[_aT],\n });\n b.bp(\"/assignment/accounts\");\n const query = map({\n [_nt]: [, input[_nT]],\n [_mr]: [() => input.maxResults !== void 0, () => input[_mR].toString()],\n });\n let body;\n b.m(\"GET\").h(headers).q(query).b(body);\n return b.build();\n};\nexport const se_LogoutCommand = async (input, context) => {\n const b = rb(input, context);\n const headers = map({}, isSerializableHeaderValue, {\n [_xasbt]: input[_aT],\n });\n b.bp(\"/logout\");\n let body;\n b.m(\"POST\").h(headers).b(body);\n return b.build();\n};\nexport const de_GetRoleCredentialsCommand = async (output, context) => {\n if (output.statusCode !== 200 && output.statusCode >= 300) {\n return de_CommandError(output, context);\n }\n const contents = map({\n $metadata: deserializeMetadata(output),\n });\n const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), \"body\");\n const doc = take(data, {\n roleCredentials: _json,\n });\n Object.assign(contents, doc);\n return contents;\n};\nexport const de_ListAccountRolesCommand = async (output, context) => {\n if (output.statusCode !== 200 && output.statusCode >= 300) {\n return de_CommandError(output, context);\n }\n const contents = map({\n $metadata: deserializeMetadata(output),\n });\n const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), \"body\");\n const doc = take(data, {\n nextToken: __expectString,\n roleList: _json,\n });\n Object.assign(contents, doc);\n return contents;\n};\nexport const de_ListAccountsCommand = async (output, context) => {\n if (output.statusCode !== 200 && output.statusCode >= 300) {\n return de_CommandError(output, context);\n }\n const contents = map({\n $metadata: deserializeMetadata(output),\n });\n const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), \"body\");\n const doc = take(data, {\n accountList: _json,\n nextToken: __expectString,\n });\n Object.assign(contents, doc);\n return contents;\n};\nexport const de_LogoutCommand = async (output, context) => {\n if (output.statusCode !== 200 && output.statusCode >= 300) {\n return de_CommandError(output, context);\n }\n const contents = map({\n $metadata: deserializeMetadata(output),\n });\n await collectBody(output.body, context);\n return contents;\n};\nconst de_CommandError = async (output, context) => {\n const parsedOutput = {\n ...output,\n body: await parseErrorBody(output.body, context),\n };\n const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);\n switch (errorCode) {\n case \"InvalidRequestException\":\n case \"com.amazonaws.sso#InvalidRequestException\":\n throw await de_InvalidRequestExceptionRes(parsedOutput, context);\n case \"ResourceNotFoundException\":\n case \"com.amazonaws.sso#ResourceNotFoundException\":\n throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);\n case \"TooManyRequestsException\":\n case \"com.amazonaws.sso#TooManyRequestsException\":\n throw await de_TooManyRequestsExceptionRes(parsedOutput, context);\n case \"UnauthorizedException\":\n case \"com.amazonaws.sso#UnauthorizedException\":\n throw await de_UnauthorizedExceptionRes(parsedOutput, context);\n default:\n const parsedBody = parsedOutput.body;\n return throwDefaultError({\n output,\n parsedBody,\n errorCode,\n });\n }\n};\nconst throwDefaultError = withBaseException(__BaseException);\nconst de_InvalidRequestExceptionRes = async (parsedOutput, context) => {\n const contents = map({});\n const data = parsedOutput.body;\n const doc = take(data, {\n message: __expectString,\n });\n Object.assign(contents, doc);\n const exception = new InvalidRequestException({\n $metadata: deserializeMetadata(parsedOutput),\n ...contents,\n });\n return __decorateServiceException(exception, parsedOutput.body);\n};\nconst de_ResourceNotFoundExceptionRes = async (parsedOutput, context) => {\n const contents = map({});\n const data = parsedOutput.body;\n const doc = take(data, {\n message: __expectString,\n });\n Object.assign(contents, doc);\n const exception = new ResourceNotFoundException({\n $metadata: deserializeMetadata(parsedOutput),\n ...contents,\n });\n return __decorateServiceException(exception, parsedOutput.body);\n};\nconst de_TooManyRequestsExceptionRes = async (parsedOutput, context) => {\n const contents = map({});\n const data = parsedOutput.body;\n const doc = take(data, {\n message: __expectString,\n });\n Object.assign(contents, doc);\n const exception = new TooManyRequestsException({\n $metadata: deserializeMetadata(parsedOutput),\n ...contents,\n });\n return __decorateServiceException(exception, parsedOutput.body);\n};\nconst de_UnauthorizedExceptionRes = async (parsedOutput, context) => {\n const contents = map({});\n const data = parsedOutput.body;\n const doc = take(data, {\n message: __expectString,\n });\n Object.assign(contents, doc);\n const exception = new UnauthorizedException({\n $metadata: deserializeMetadata(parsedOutput),\n ...contents,\n });\n return __decorateServiceException(exception, parsedOutput.body);\n};\nconst deserializeMetadata = (output) => ({\n httpStatusCode: output.statusCode,\n requestId: output.headers[\"x-amzn-requestid\"] ?? output.headers[\"x-amzn-request-id\"] ?? output.headers[\"x-amz-request-id\"],\n extendedRequestId: output.headers[\"x-amz-id-2\"],\n cfId: output.headers[\"x-amz-cf-id\"],\n});\nconst collectBodyString = (streamBody, context) => collectBody(streamBody, context).then((body) => context.utf8Encoder(body));\nconst isSerializableHeaderValue = (value) => value !== undefined &&\n value !== null &&\n value !== \"\" &&\n (!Object.getOwnPropertyNames(value).includes(\"length\") || value.length != 0) &&\n (!Object.getOwnPropertyNames(value).includes(\"size\") || value.size != 0);\nconst _aI = \"accountId\";\nconst _aT = \"accessToken\";\nconst _ai = \"account_id\";\nconst _mR = \"maxResults\";\nconst _mr = \"max_result\";\nconst _nT = \"nextToken\";\nconst _nt = \"next_token\";\nconst _rN = \"roleName\";\nconst _rn = \"role_name\";\nconst _xasbt = \"x-amz-sso_bearer_token\";\n",
17
17
  "import { getEndpointPlugin } from \"@smithy/middleware-endpoint\";\nimport { getSerdePlugin } from \"@smithy/middleware-serde\";\nimport { Command as $Command } from \"@smithy/smithy-client\";\nimport { commonParams } from \"../endpoint/EndpointParameters\";\nimport { GetRoleCredentialsRequestFilterSensitiveLog, GetRoleCredentialsResponseFilterSensitiveLog, } from \"../models/models_0\";\nimport { de_GetRoleCredentialsCommand, se_GetRoleCredentialsCommand } from \"../protocols/Aws_restJson1\";\nexport { $Command };\nexport class GetRoleCredentialsCommand extends $Command\n .classBuilder()\n .ep(commonParams)\n .m(function (Command, cs, config, o) {\n return [\n getSerdePlugin(config, this.serialize, this.deserialize),\n getEndpointPlugin(config, Command.getEndpointParameterInstructions()),\n ];\n})\n .s(\"SWBPortalService\", \"GetRoleCredentials\", {})\n .n(\"SSOClient\", \"GetRoleCredentialsCommand\")\n .f(GetRoleCredentialsRequestFilterSensitiveLog, GetRoleCredentialsResponseFilterSensitiveLog)\n .ser(se_GetRoleCredentialsCommand)\n .de(de_GetRoleCredentialsCommand)\n .build() {\n}\n"
18
18
  ],
19
- "mappings": ";2zBAKA,iBCLA,iBACA,cAUS,aAAgC,GAAC,IAAgB,GACtD,MAAO,CACH,SAAU,iBACV,kBAAmB,CACf,KAAM,eACN,OAAQ,EAAe,MAC3B,EACA,oBAAqB,CAAC,EAAQ,KAAa,CACvC,kBAAmB,CACf,SACA,SACJ,CACJ,EACJ,GAEK,UAAmC,CAAC,EAAgB,CACzD,MAAO,CACH,SAAU,mBACd,GA3BS,EAA6C,MAAO,EAAQ,EAAS,IAAU,CACxF,MAAO,CACH,UAAW,mBAAiB,CAAO,EAAE,UACrC,OAAS,MAAM,oBAAkB,EAAO,MAAM,EAAE,IAC3C,IAAM,CACH,MAAM,IAAI,MAAM,yDAAyD,IAC1E,CACX,GAsBS,EAAmC,CAAC,IAAmB,CAChE,MAAM,EAAU,CAAC,EACjB,OAAQ,EAAe,eACd,qBAAsB,CACvB,EAAQ,KAAK,EAAoC,CAAc,CAAC,EAChE,KACJ,KACK,mBAAoB,CACrB,EAAQ,KAAK,EAAoC,CAAc,CAAC,EAChE,KACJ,KACK,eAAgB,CACjB,EAAQ,KAAK,EAAoC,CAAc,CAAC,EAChE,KACJ,KACK,SAAU,CACX,EAAQ,KAAK,EAAoC,CAAc,CAAC,EAChE,KACJ,SAEI,EAAQ,KAAK,GAAiC,CAAc,CAAC,EAGrE,OAAO,GAEE,EAA8B,CAAC,IAAW,CAEnD,MAAO,IADU,2BAAyB,CAAM,CAGhD,GC5DG,IAAM,EAAkC,CAAC,IAAY,CACxD,MAAO,IACA,EACH,qBAAsB,EAAQ,sBAAwB,GACtD,gBAAiB,EAAQ,iBAAmB,GAC5C,mBAAoB,cACxB,GAES,EAAe,CACxB,QAAS,CAAE,KAAM,gBAAiB,KAAM,iBAAkB,EAC1D,SAAU,CAAE,KAAM,gBAAiB,KAAM,UAAW,EACpD,OAAQ,CAAE,KAAM,gBAAiB,KAAM,QAAS,EAChD,aAAc,CAAE,KAAM,gBAAiB,KAAM,sBAAuB,CACxE,8zFCZA,gBCDA,gBACA,YAEA,iBCFA,IAAiI,EAAI,EAD3H,YACkI,GAAO,KAAQ,QAAS,EAAG,EAAI,EADjK,YACwK,GAAM,QAAW,GAAO,KAAQ,SAAU,EAAG,EAAI,EADnL,OAC0L,UAAW,EAAG,EAAI,EADlO,MACO,iBADG,QACuO,CAAC,EAD5N,OACmO,SAAU,EAAG,EAAI,CAAE,EAAG,EAAI,EADnR,MACO,iBADG,QACwR,CAAC,EAD7Q,OACoR,cAAe,EAAG,EAAI,CAAE,EAAG,EAAI,CAAC,EAAG,EAAI,EADjV,MAC4F,WADlF,QACsV,CAAC,EAD3U,OAC+C,iBAAqS,EAAG,cAAc,CAAE,EAAG,EAAI,EAD9W,OAC+C,iBAAwU,EAAG,EAAI,EADpZ,MACO,iBADG,QACyZ,CAAC,GAAM,EAD1a,MAC4F,WADlF,QAC+a,CAAC,EAAG,mBAAmB,CAAE,CAAC,CAAE,EAAG,EAAI,CAAC,CAAC,EAAG,EAAI,CAAC,CAAC,EAAG,EAAI,CAAC,EADzd,OACge,QAAS,CAAC,EACphB,GAAQ,CAAE,QAAS,MAAO,WAAY,CAAE,OAAQ,EAAG,aAAc,EAAG,QAAS,EAAG,SAAU,CAAE,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAFlG,MACN,SADgB,QAEuG,CAAC,CAAC,CAAE,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,EAAG,MAAO,oEAAqE,KADlM,OAC0M,EAAG,CAAE,WAAY,EAAG,MAAO,yEAA0E,KAD/S,OACuT,EAAG,CAAE,SAAU,CAAE,IAAK,EAAG,WAAY,EAAG,QAAS,CAAE,EAAG,KADhW,UACwW,CAAC,EAAG,KAD5V,MACoW,EAAG,CAAE,WAAY,CAAC,EAF/a,MACN,SADgB,QAEob,CAAE,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAF3d,MAEke,iBAFxd,QAE8e,EAAG,OADtb,iBACgc,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAG,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAF9jB,MACO,iBADG,QAEmkB,CAD7lB,GACimB,CAAC,CAAE,EAAG,CAAC,EAAG,MAAO,CAAC,CAAE,SAAU,CAAE,IAAK,wEAAyE,WAAY,EAAG,QAAS,CAAE,EAAG,KADnrB,UAC2rB,CAAC,EAAG,KAD/qB,MACurB,EAAG,CAAE,MAAO,kFAAmF,KADnzB,OAC2zB,CAAC,EAAG,KADlyB,MAC0yB,EAAG,CAAE,WAAY,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAF94B,MACO,iBADG,QAEm5B,CAAC,EAD96B,EACk7B,CAAE,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAF/7B,MAEs8B,gBAF57B,QAEi9B,CAAC,EAF59B,MAC4F,WADlF,QAEi+B,CAAC,EAAG,MAAM,CAAE,EAAG,YAAY,CAAE,CAAC,EAAG,SAAU,CAAE,IAAK,4CAA6C,WAAY,EAAG,QAAS,CAAE,EAAG,KAD9jC,UACskC,EAAG,CAAE,SAAU,CAAE,IAAK,+DAAgE,WAAY,EAAG,QAAS,CAAE,EAAG,KADzrC,UACisC,CAAC,EAAG,KADrrC,MAC6rC,EAAG,CAAE,MAAO,2DAA4D,KADlyC,OAC0yC,CAAC,EAAG,KADjxC,MACyxC,EAAG,CAAE,WAAY,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,CAAC,EAAG,MAAO,CAAC,CAAE,SAAU,CAAE,IAAK,mEAAoE,WAAY,EAAG,QAAS,CAAE,EAAG,KADp9C,UAC49C,CAAC,EAAG,KADh9C,MACw9C,EAAG,CAAE,MAAO,qEAAsE,KADvkD,OAC+kD,CAAC,EAAG,KADtjD,MAC8jD,EAAG,CAAE,SAAU,CAAE,IAAK,0DAA2D,WAAY,EAAG,QAAS,CAAE,EAAG,KAD5rD,UACosD,CAAC,EAAG,KADxrD,MACgsD,CAAC,EAAG,KADpsD,MAC4sD,EAAG,CAAE,MAAO,wCAAyC,KAD9xD,OACsyD,CAAC,CAAE,EACl1D,EAAU,GCAvB,IAAM,GAAQ,IAAI,EAAc,CAC5B,KAAM,GACN,OAAQ,CAAC,WAAY,SAAU,eAAgB,SAAS,CAC5D,CAAC,EACY,EAA0B,CAAC,EAAgB,EAAU,CAAC,IAAM,CACrE,OAAO,GAAM,IAAI,EAAgB,IAAM,EAAgB,EAAS,CAC5D,eAAgB,EAChB,OAAQ,EAAQ,MACpB,CAAC,CAAC,GAEN,EAAwB,IAAM,EFLvB,IAAM,GAAmB,CAAC,IAAW,CACxC,MAAO,CACH,WAAY,aACZ,cAAe,GAAQ,eAAiB,GACxC,cAAe,GAAQ,eAAiB,GACxC,kBAAmB,GAAQ,mBAAqB,GAChD,iBAAkB,GAAQ,kBAAoB,EAC9C,WAAY,GAAQ,YAAc,CAAC,EACnC,uBAAwB,GAAQ,wBAA0B,EAC1D,gBAAiB,GAAQ,iBAAmB,CACxC,CACI,SAAU,iBACV,iBAAkB,CAAC,IAAQ,EAAI,oBAAoB,gBAAgB,EACnE,OAAQ,IAAI,oBAChB,EACA,CACI,SAAU,oBACV,iBAAkB,CAAC,IAAQ,EAAI,oBAAoB,mBAAmB,IAAM,UAAa,CAAC,IAC1F,OAAQ,IAAI,eAChB,CACJ,EACA,OAAQ,GAAQ,QAAU,IAAI,GAC9B,UAAW,GAAQ,WAAa,MAChC,UAAW,GAAQ,WAAa,YAChC,YAAa,GAAQ,aAAe,GACpC,YAAa,GAAQ,aAAe,EACxC,GDpBG,IAAM,GAAmB,CAAC,IAAW,CACxC,GAAgC,QAAQ,OAAO,EAC/C,MAAM,EAAe,GAA0B,CAAM,EAC/C,EAAwB,IAAM,EAAa,EAAE,KAAK,EAAyB,EAC3E,EAAqB,GAAuB,CAAM,EAExD,OADA,mCAAgB,QAAQ,OAAO,EACxB,IACA,KACA,EACH,QAAS,OACT,eACA,kBAAmB,GAAQ,mBAAqB,GAChD,yBAA0B,GAAQ,0BAC9B,GAAiB,CAAE,UAAW,EAAmB,UAAW,cAAe,EAAY,OAAQ,CAAC,EACpG,YAAa,GAAQ,aAAe,EAAe,EAA+B,EAClF,OAAQ,GAAQ,QAAU,EAAe,GAA4B,EAA+B,EACpG,eAAgB,GAAe,OAAO,GAAQ,gBAAkB,CAAqB,EACrF,UAAW,GAAQ,WACf,EAAe,IACR,GACH,QAAS,UAAa,MAAM,EAAsB,GAAG,WAAa,EACtE,CAAC,EACL,OAAQ,GAAQ,QAAU,GAAK,KAAK,KAAM,QAAQ,EAClD,gBAAiB,GAAQ,iBAAmB,GAC5C,qBAAsB,GAAQ,sBAAwB,EAAe,EAA0C,EAC/G,gBAAiB,GAAQ,iBAAmB,EAAe,EAAqC,CACpG,GIxCG,IAAM,GAAoC,CAAC,IAAkB,CAChE,MAAM,EAAmB,EAAc,gBACvC,IAA4C,uBAAxC,EAC6B,YAA7B,GAAe,EACnB,MAAO,CACH,iBAAiB,CAAC,EAAgB,CAC9B,MAAM,EAAQ,EAAiB,UAAU,CAAC,IAAW,EAAO,WAAa,EAAe,QAAQ,EAChG,GAAI,KAAU,EACV,EAAiB,KAAK,CAAc,MAGpC,GAAiB,OAAO,EAAO,EAAG,CAAc,GAGxD,eAAe,EAAG,CACd,OAAO,GAEX,yBAAyB,CAAC,EAAwB,CAC9C,EAA0B,GAE9B,sBAAsB,EAAG,CACrB,OAAO,GAEX,cAAc,CAAC,EAAa,CACxB,EAAe,GAEnB,WAAW,EAAG,CACV,OAAO,EAEf,GAES,GAA+B,CAAC,IAAW,CACpD,MAAO,CACH,gBAAiB,EAAO,gBAAgB,EACxC,uBAAwB,EAAO,uBAAuB,EACtD,YAAa,EAAO,YAAY,CACpC,GChCJ,IAAM,EAAY,CAAC,IAAM,EACZ,GAA2B,CAAC,EAAe,IAAe,CACnE,MAAM,EAAyB,IACxB,EAAU,GAAmC,CAAa,CAAC,KAC3D,EAAU,GAAiC,CAAa,CAAC,KACzD,EAAU,GAAqC,CAAa,CAAC,KAC7D,EAAU,GAAkC,CAAa,CAAC,CACjE,EAEA,OADA,EAAW,QAAQ,CAAC,IAAc,EAAU,UAAU,CAAsB,CAAC,EACtE,IACA,KACA,GAAuC,CAAsB,KAC7D,GAA4B,CAAsB,KAClD,GAAgC,CAAsB,KACtD,GAA6B,CAAsB,CAC1D,GRJG,MAAM,WAAkB,EAAS,CACpC,WAAW,KAAK,GAAgB,CAC5B,MAAM,EAAY,GAAmB,GAAiB,CAAC,CAAC,EAClD,EAAY,EAAgC,CAAS,EACrD,EAAY,GAAuB,CAAS,EAC5C,EAAY,GAAmB,CAAS,EACxC,EAAY,GAAoB,CAAS,EACzC,EAAY,GAAwB,CAAS,EAC7C,GAAY,GAAsB,CAAS,EAC3C,GAAY,EAA4B,EAAS,EACjD,EAAY,GAAyB,GAAW,GAAe,YAAc,CAAC,CAAC,EACrF,MAAM,CAAS,EACf,KAAK,OAAS,EACd,KAAK,gBAAgB,IAAI,GAAmB,KAAK,MAAM,CAAC,EACxD,KAAK,gBAAgB,IAAI,GAAe,KAAK,MAAM,CAAC,EACpD,KAAK,gBAAgB,IAAI,GAAuB,KAAK,MAAM,CAAC,EAC5D,KAAK,gBAAgB,IAAI,GAAoB,KAAK,MAAM,CAAC,EACzD,KAAK,gBAAgB,IAAI,GAAgB,KAAK,MAAM,CAAC,EACrD,KAAK,gBAAgB,IAAI,GAA4B,KAAK,MAAM,CAAC,EACjE,KAAK,gBAAgB,IAAI,yCAAuC,KAAK,OAAQ,CACzE,iCAAkC,EAClC,+BAAgC,MAAO,KAAW,IAAI,gCAA8B,CAChF,iBAAkB,GAAO,WAC7B,CAAC,CACL,CAAC,CAAC,EACF,KAAK,gBAAgB,IAAI,uBAAqB,KAAK,MAAM,CAAC,EAE9D,OAAO,EAAG,CACN,MAAM,QAAQ,EAEtB,CS3CO,MAAM,UAA4B,EAAmB,CACxD,WAAW,CAAC,EAAS,CACjB,MAAM,CAAO,EACb,OAAO,eAAe,KAAM,EAAoB,SAAS,EAEjE,CCLO,MAAM,UAAgC,CAAgB,CACzD,WAAW,CAAC,EAAM,CACd,MAAM,CACF,KAAM,0BACN,OAAQ,YACL,CACP,CAAC,EACD,KAAK,KAAO,0BACZ,KAAK,OAAS,SACd,OAAO,eAAe,KAAM,EAAwB,SAAS,EAErE,CACO,MAAM,UAAkC,CAAgB,CAC3D,WAAW,CAAC,EAAM,CACd,MAAM,CACF,KAAM,4BACN,OAAQ,YACL,CACP,CAAC,EACD,KAAK,KAAO,4BACZ,KAAK,OAAS,SACd,OAAO,eAAe,KAAM,EAA0B,SAAS,EAEvE,CACO,MAAM,UAAiC,CAAgB,CAC1D,WAAW,CAAC,EAAM,CACd,MAAM,CACF,KAAM,2BACN,OAAQ,YACL,CACP,CAAC,EACD,KAAK,KAAO,2BACZ,KAAK,OAAS,SACd,OAAO,eAAe,KAAM,EAAyB,SAAS,EAEtE,CACO,MAAM,UAA8B,CAAgB,CACvD,WAAW,CAAC,EAAM,CACd,MAAM,CACF,KAAM,wBACN,OAAQ,YACL,CACP,CAAC,EACD,KAAK,KAAO,wBACZ,KAAK,OAAS,SACd,OAAO,eAAe,KAAM,EAAsB,SAAS,EAEnE,CACO,IAAM,GAA8C,CAAC,KAAS,IAC9D,KACC,EAAI,aAAe,CAAE,YAAa,CAAiB,CAC3D,GACa,GAAoC,CAAC,KAAS,IACpD,KACC,EAAI,iBAAmB,CAAE,gBAAiB,CAAiB,KAC3D,EAAI,cAAgB,CAAE,aAAc,CAAiB,CAC7D,GACa,GAA+C,CAAC,KAAS,IAC/D,KACC,EAAI,iBAAmB,CAAE,gBAAiB,GAAkC,EAAI,eAAe,CAAE,CACzG,GC9DA,eACA,YAIO,IAAM,GAA+B,MAAO,EAAO,IAAY,CAClE,MAAM,EAAI,kBAAG,EAAO,CAAO,EACrB,EAAU,EAAI,CAAC,EAAG,GAA2B,EAC9C,IAAS,EAAM,GACpB,CAAC,EACD,EAAE,GAAG,yBAAyB,EAC9B,MAAM,EAAQ,EAAI,EACb,IAAM,EAAG,EAAgB,EAAM,IAAM,UAAU,CAAC,GAChD,IAAM,EAAG,EAAgB,EAAM,IAAM,WAAW,CAAC,CACtD,CAAC,EACD,IAAI,EAEJ,OADA,EAAE,EAAE,KAAK,EAAE,EAAE,CAAO,EAAE,EAAE,CAAK,EAAE,EAAE,CAAI,EAC9B,EAAE,MAAM,GAyCZ,IAAM,GAA+B,MAAO,EAAQ,IAAY,CACnE,GAAI,EAAO,aAAe,KAAO,EAAO,YAAc,IAClD,OAAO,GAAgB,EAAQ,CAAO,EAE1C,MAAM,EAAW,EAAI,CACjB,UAAW,EAAoB,CAAM,CACzC,CAAC,EACK,EAAO,EAAgB,GAAe,MAAM,gBAAU,EAAO,KAAM,CAAO,CAAC,EAAG,MAAM,EACpF,EAAM,EAAK,EAAM,CACnB,gBAAiB,EACrB,CAAC,EAED,OADA,OAAO,OAAO,EAAU,CAAG,EACpB,GA0CX,IAAM,GAAkB,MAAO,EAAQ,IAAY,CAC/C,MAAM,EAAe,IACd,EACH,KAAM,MAAM,qBAAe,EAAO,KAAM,CAAO,CACnD,EACM,EAAY,wBAAsB,EAAQ,EAAa,IAAI,EACjE,OAAQ,OACC,8BACA,4CACD,MAAM,MAAM,GAA8B,EAAc,CAAO,MAC9D,gCACA,8CACD,MAAM,MAAM,GAAgC,EAAc,CAAO,MAChE,+BACA,6CACD,MAAM,MAAM,GAA+B,EAAc,CAAO,MAC/D,4BACA,0CACD,MAAM,MAAM,GAA4B,EAAc,CAAO,UAE7D,MAAM,EAAa,EAAa,KAChC,OAAO,GAAkB,CACrB,SACA,aACA,WACJ,CAAC,IAGP,GAAoB,GAAkB,CAAe,EACrD,GAAgC,MAAO,EAAc,IAAY,CACnE,MAAM,EAAW,EAAI,CAAC,CAAC,EACjB,EAAO,EAAa,KACpB,EAAM,EAAK,EAAM,CACnB,QAAS,CACb,CAAC,EACD,OAAO,OAAO,EAAU,CAAG,EAC3B,MAAM,EAAY,IAAI,EAAwB,CAC1C,UAAW,EAAoB,CAAY,KACxC,CACP,CAAC,EACD,OAAO,EAA2B,EAAW,EAAa,IAAI,GAE5D,GAAkC,MAAO,EAAc,IAAY,CACrE,MAAM,EAAW,EAAI,CAAC,CAAC,EACjB,EAAO,EAAa,KACpB,EAAM,EAAK,EAAM,CACnB,QAAS,CACb,CAAC,EACD,OAAO,OAAO,EAAU,CAAG,EAC3B,MAAM,EAAY,IAAI,EAA0B,CAC5C,UAAW,EAAoB,CAAY,KACxC,CACP,CAAC,EACD,OAAO,EAA2B,EAAW,EAAa,IAAI,GAE5D,GAAiC,MAAO,EAAc,IAAY,CACpE,MAAM,EAAW,EAAI,CAAC,CAAC,EACjB,EAAO,EAAa,KACpB,EAAM,EAAK,EAAM,CACnB,QAAS,CACb,CAAC,EACD,OAAO,OAAO,EAAU,CAAG,EAC3B,MAAM,EAAY,IAAI,EAAyB,CAC3C,UAAW,EAAoB,CAAY,KACxC,CACP,CAAC,EACD,OAAO,EAA2B,EAAW,EAAa,IAAI,GAE5D,GAA8B,MAAO,EAAc,IAAY,CACjE,MAAM,EAAW,EAAI,CAAC,CAAC,EACjB,EAAO,EAAa,KACpB,EAAM,EAAK,EAAM,CACnB,QAAS,CACb,CAAC,EACD,OAAO,OAAO,EAAU,CAAG,EAC3B,MAAM,EAAY,IAAI,EAAsB,CACxC,UAAW,EAAoB,CAAY,KACxC,CACP,CAAC,EACD,OAAO,EAA2B,EAAW,EAAa,IAAI,GAE5D,EAAsB,CAAC,KAAY,CACrC,eAAgB,EAAO,WACvB,UAAW,EAAO,QAAQ,qBAAuB,EAAO,QAAQ,sBAAwB,EAAO,QAAQ,oBACvG,kBAAmB,EAAO,QAAQ,cAClC,KAAM,EAAO,QAAQ,cACzB,GAEA,IAAM,GAA4B,CAAC,IAAU,IAAU,QACnD,IAAU,MACV,IAAU,MACR,OAAO,oBAAoB,CAAK,EAAE,SAAS,QAAQ,GAAK,EAAM,QAAU,MACxE,OAAO,oBAAoB,CAAK,EAAE,SAAS,MAAM,GAAK,EAAM,MAAQ,GACpE,GAAM,YACN,GAAM,cACN,GAAM,aAKZ,IAAM,GAAM,WACN,GAAM,YACN,GAAS,yBC/MR,MAAM,WAAkC,GAC1C,aAAa,EACb,GAAG,CAAY,EACf,UAAW,CAAC,EAAS,EAAI,EAAQ,EAAG,CACrC,MAAO,CACH,GAAe,EAAQ,KAAK,UAAW,KAAK,WAAW,EACvD,GAAkB,EAAQ,EAAQ,iCAAiC,CAAC,CACxE,EACH,EACI,EAAE,mBAAoB,qBAAsB,CAAC,CAAC,EAC9C,EAAE,YAAa,2BAA2B,EAC1C,EAAE,GAA6C,EAA4C,EAC3F,IAAI,EAA4B,EAChC,GAAG,EAA4B,EAC/B,MAAM,CAAE,CACb",
20
- "debugId": "76AB9CB416BB617D64756e2164756e21",
19
+ "mappings": ";4zBAKA,iBCLA,iBACA,cAUS,aAAgC,GAAC,IAAgB,GACtD,MAAO,CACH,SAAU,iBACV,kBAAmB,CACf,KAAM,eACN,OAAQ,EAAe,MAC3B,EACA,oBAAqB,CAAC,EAAQ,KAAa,CACvC,kBAAmB,CACf,SACA,SACJ,CACJ,EACJ,GAEK,UAAmC,CAAC,EAAgB,CACzD,MAAO,CACH,SAAU,mBACd,GA3BS,EAA6C,MAAO,EAAQ,EAAS,IAAU,CACxF,MAAO,CACH,UAAW,mBAAiB,CAAO,EAAE,UACrC,OAAS,MAAM,oBAAkB,EAAO,MAAM,EAAE,IAC3C,IAAM,CACH,MAAM,IAAI,MAAM,yDAAyD,IAC1E,CACX,GAsBS,EAAmC,CAAC,IAAmB,CAChE,MAAM,EAAU,CAAC,EACjB,OAAQ,EAAe,eACd,qBAAsB,CACvB,EAAQ,KAAK,EAAoC,CAAc,CAAC,EAChE,KACJ,KACK,mBAAoB,CACrB,EAAQ,KAAK,EAAoC,CAAc,CAAC,EAChE,KACJ,KACK,eAAgB,CACjB,EAAQ,KAAK,EAAoC,CAAc,CAAC,EAChE,KACJ,KACK,SAAU,CACX,EAAQ,KAAK,EAAoC,CAAc,CAAC,EAChE,KACJ,SAEI,EAAQ,KAAK,GAAiC,CAAc,CAAC,EAGrE,OAAO,GAEE,EAA8B,CAAC,IAAW,CAEnD,MAAO,IADU,2BAAyB,CAAM,CAGhD,GC5DG,IAAM,EAAkC,CAAC,IAAY,CACxD,MAAO,IACA,EACH,qBAAsB,EAAQ,sBAAwB,GACtD,gBAAiB,EAAQ,iBAAmB,GAC5C,mBAAoB,cACxB,GAES,EAAe,CACxB,QAAS,CAAE,KAAM,gBAAiB,KAAM,iBAAkB,EAC1D,SAAU,CAAE,KAAM,gBAAiB,KAAM,UAAW,EACpD,OAAQ,CAAE,KAAM,gBAAiB,KAAM,QAAS,EAChD,aAAc,CAAE,KAAM,gBAAiB,KAAM,sBAAuB,CACxE,8zFCZA,gBAQA,iBCTA,gBACA,YAEA,iBCFA,IAAiI,EAAI,EAD3H,YACkI,GAAO,KAAQ,QAAS,EAAG,EAAI,EADjK,YACwK,GAAM,QAAW,GAAO,KAAQ,SAAU,EAAG,EAAI,EADnL,OAC0L,UAAW,EAAG,EAAI,EADlO,MACO,iBADG,QACuO,CAAC,EAD5N,OACmO,SAAU,EAAG,EAAI,CAAE,EAAG,EAAI,EADnR,MACO,iBADG,QACwR,CAAC,EAD7Q,OACoR,cAAe,EAAG,EAAI,CAAE,EAAG,EAAI,CAAC,EAAG,EAAI,EADjV,MAC4F,WADlF,QACsV,CAAC,EAD3U,OAC+C,iBAAqS,EAAG,cAAc,CAAE,EAAG,EAAI,EAD9W,OAC+C,iBAAwU,EAAG,EAAI,EADpZ,MACO,iBADG,QACyZ,CAAC,GAAM,EAD1a,MAC4F,WADlF,QAC+a,CAAC,EAAG,mBAAmB,CAAE,CAAC,CAAE,EAAG,EAAI,CAAC,CAAC,EAAG,EAAI,CAAC,CAAC,EAAG,EAAI,CAAC,EADzd,OACge,QAAS,CAAC,EACphB,GAAQ,CAAE,QAAS,MAAO,WAAY,CAAE,OAAQ,EAAG,aAAc,EAAG,QAAS,EAAG,SAAU,CAAE,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAFlG,MACN,SADgB,QAEuG,CAAC,CAAC,CAAE,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,EAAG,MAAO,oEAAqE,KADlM,OAC0M,EAAG,CAAE,WAAY,EAAG,MAAO,yEAA0E,KAD/S,OACuT,EAAG,CAAE,SAAU,CAAE,IAAK,EAAG,WAAY,EAAG,QAAS,CAAE,EAAG,KADhW,UACwW,CAAC,EAAG,KAD5V,MACoW,EAAG,CAAE,WAAY,CAAC,EAF/a,MACN,SADgB,QAEob,CAAE,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAF3d,MAEke,iBAFxd,QAE8e,EAAG,OADtb,iBACgc,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAAG,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAF9jB,MACO,iBADG,QAEmkB,CAD7lB,GACimB,CAAC,CAAE,EAAG,CAAC,EAAG,MAAO,CAAC,CAAE,SAAU,CAAE,IAAK,wEAAyE,WAAY,EAAG,QAAS,CAAE,EAAG,KADnrB,UAC2rB,CAAC,EAAG,KAD/qB,MACurB,EAAG,CAAE,MAAO,kFAAmF,KADnzB,OAC2zB,CAAC,EAAG,KADlyB,MAC0yB,EAAG,CAAE,WAAY,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAF94B,MACO,iBADG,QAEm5B,CAAC,EAD96B,EACk7B,CAAE,CAAC,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,EAF/7B,MAEs8B,gBAF57B,QAEi9B,CAAC,EAF59B,MAC4F,WADlF,QAEi+B,CAAC,EAAG,MAAM,CAAE,EAAG,YAAY,CAAE,CAAC,EAAG,SAAU,CAAE,IAAK,4CAA6C,WAAY,EAAG,QAAS,CAAE,EAAG,KAD9jC,UACskC,EAAG,CAAE,SAAU,CAAE,IAAK,+DAAgE,WAAY,EAAG,QAAS,CAAE,EAAG,KADzrC,UACisC,CAAC,EAAG,KADrrC,MAC6rC,EAAG,CAAE,MAAO,2DAA4D,KADlyC,OAC0yC,CAAC,EAAG,KADjxC,MACyxC,EAAG,CAAE,WAAY,EAAG,MAAO,CAAC,CAAE,WAAY,CAAC,CAAC,EAAG,MAAO,CAAC,CAAE,SAAU,CAAE,IAAK,mEAAoE,WAAY,EAAG,QAAS,CAAE,EAAG,KADp9C,UAC49C,CAAC,EAAG,KADh9C,MACw9C,EAAG,CAAE,MAAO,qEAAsE,KADvkD,OAC+kD,CAAC,EAAG,KADtjD,MAC8jD,EAAG,CAAE,SAAU,CAAE,IAAK,0DAA2D,WAAY,EAAG,QAAS,CAAE,EAAG,KAD5rD,UACosD,CAAC,EAAG,KADxrD,MACgsD,CAAC,EAAG,KADpsD,MAC4sD,EAAG,CAAE,MAAO,wCAAyC,KAD9xD,OACsyD,CAAC,CAAE,EACl1D,EAAU,GCAvB,IAAM,GAAQ,IAAI,EAAc,CAC5B,KAAM,GACN,OAAQ,CAAC,WAAY,SAAU,eAAgB,SAAS,CAC5D,CAAC,EACY,EAA0B,CAAC,EAAgB,EAAU,CAAC,IAAM,CACrE,OAAO,GAAM,IAAI,EAAgB,IAAM,EAAgB,EAAS,CAC5D,eAAgB,EAChB,OAAQ,EAAQ,MACpB,CAAC,CAAC,GAEN,EAAwB,IAAM,EFLvB,IAAM,GAAmB,CAAC,IAAW,CACxC,MAAO,CACH,WAAY,aACZ,cAAe,GAAQ,eAAiB,GACxC,cAAe,GAAQ,eAAiB,GACxC,kBAAmB,GAAQ,mBAAqB,GAChD,iBAAkB,GAAQ,kBAAoB,EAC9C,WAAY,GAAQ,YAAc,CAAC,EACnC,uBAAwB,GAAQ,wBAA0B,EAC1D,gBAAiB,GAAQ,iBAAmB,CACxC,CACI,SAAU,iBACV,iBAAkB,CAAC,IAAQ,EAAI,oBAAoB,gBAAgB,EACnE,OAAQ,IAAI,oBAChB,EACA,CACI,SAAU,oBACV,iBAAkB,CAAC,IAAQ,EAAI,oBAAoB,mBAAmB,IAAM,UAAa,CAAC,IAC1F,OAAQ,IAAI,eAChB,CACJ,EACA,OAAQ,GAAQ,QAAU,IAAI,GAC9B,UAAW,GAAQ,WAAa,MAChC,UAAW,GAAQ,WAAa,YAChC,YAAa,GAAQ,aAAe,GACpC,YAAa,GAAQ,aAAe,EACxC,GDpBG,IAAM,GAAmB,CAAC,IAAW,CACxC,GAAgC,QAAQ,OAAO,EAC/C,MAAM,EAAe,GAA0B,CAAM,EAC/C,EAAwB,IAAM,EAAa,EAAE,KAAK,EAAyB,EAC3E,EAAqB,GAAuB,CAAM,EAExD,OADA,mCAAgB,QAAQ,OAAO,EACxB,IACA,KACA,EACH,QAAS,OACT,eACA,kBAAmB,GAAQ,mBAAqB,GAChD,yBAA0B,GAAQ,0BAC9B,GAAiB,CAAE,UAAW,EAAmB,UAAW,cAAe,EAAY,OAAQ,CAAC,EACpG,YAAa,GAAQ,aAAe,EAAe,EAA+B,EAClF,OAAQ,GAAQ,QAAU,EAAe,GAA4B,EAA+B,EACpG,eAAgB,GAAe,OAAO,GAAQ,gBAAkB,CAAqB,EACrF,UAAW,GAAQ,WACf,EAAe,IACR,GACH,QAAS,UAAa,MAAM,EAAsB,GAAG,WAAa,qBACtE,CAAC,EACL,OAAQ,GAAQ,QAAU,GAAK,KAAK,KAAM,QAAQ,EAClD,gBAAiB,GAAQ,iBAAmB,GAC5C,qBAAsB,GAAQ,sBAAwB,EAAe,EAA0C,EAC/G,gBAAiB,GAAQ,iBAAmB,EAAe,EAAqC,CACpG,GIxCG,IAAM,GAAoC,CAAC,IAAkB,CAChE,MAAM,EAAmB,EAAc,gBACvC,IAA4C,uBAAxC,EAC6B,YAA7B,GAAe,EACnB,MAAO,CACH,iBAAiB,CAAC,EAAgB,CAC9B,MAAM,EAAQ,EAAiB,UAAU,CAAC,IAAW,EAAO,WAAa,EAAe,QAAQ,EAChG,GAAI,KAAU,EACV,EAAiB,KAAK,CAAc,MAGpC,GAAiB,OAAO,EAAO,EAAG,CAAc,GAGxD,eAAe,EAAG,CACd,OAAO,GAEX,yBAAyB,CAAC,EAAwB,CAC9C,EAA0B,GAE9B,sBAAsB,EAAG,CACrB,OAAO,GAEX,cAAc,CAAC,EAAa,CACxB,EAAe,GAEnB,WAAW,EAAG,CACV,OAAO,EAEf,GAES,GAA+B,CAAC,IAAW,CACpD,MAAO,CACH,gBAAiB,EAAO,gBAAgB,EACxC,uBAAwB,EAAO,uBAAuB,EACtD,YAAa,EAAO,YAAY,CACpC,GChCJ,IAAM,EAAY,CAAC,IAAM,EACZ,GAA2B,CAAC,EAAe,IAAe,CACnE,MAAM,EAAyB,IACxB,EAAU,GAAmC,CAAa,CAAC,KAC3D,EAAU,GAAiC,CAAa,CAAC,KACzD,EAAU,GAAqC,CAAa,CAAC,KAC7D,EAAU,GAAkC,CAAa,CAAC,CACjE,EAEA,OADA,EAAW,QAAQ,CAAC,IAAc,EAAU,UAAU,CAAsB,CAAC,EACtE,IACA,KACA,GAAuC,CAAsB,KAC7D,GAA4B,CAAsB,KAClD,GAAgC,CAAsB,KACtD,GAA6B,CAAsB,CAC1D,GRJG,MAAM,WAAkB,EAAS,CACpC,WAAW,KAAK,GAAgB,CAC5B,MAAM,EAAY,GAAmB,GAAiB,CAAC,CAAC,EAClD,EAAY,EAAgC,CAAS,EACrD,EAAY,GAAuB,CAAS,EAC5C,EAAY,GAAmB,CAAS,EACxC,EAAY,GAAoB,CAAS,EACzC,EAAY,GAAwB,CAAS,EAC7C,GAAY,GAAsB,CAAS,EAC3C,GAAY,EAA4B,EAAS,EACjD,EAAY,GAAyB,GAAW,GAAe,YAAc,CAAC,CAAC,EACrF,MAAM,CAAS,EACf,KAAK,OAAS,EACd,KAAK,gBAAgB,IAAI,GAAmB,KAAK,MAAM,CAAC,EACxD,KAAK,gBAAgB,IAAI,GAAe,KAAK,MAAM,CAAC,EACpD,KAAK,gBAAgB,IAAI,GAAuB,KAAK,MAAM,CAAC,EAC5D,KAAK,gBAAgB,IAAI,GAAoB,KAAK,MAAM,CAAC,EACzD,KAAK,gBAAgB,IAAI,GAAgB,KAAK,MAAM,CAAC,EACrD,KAAK,gBAAgB,IAAI,GAA4B,KAAK,MAAM,CAAC,EACjE,KAAK,gBAAgB,IAAI,yCAAuC,KAAK,OAAQ,CACzE,iCAAkC,EAClC,+BAAgC,MAAO,KAAW,IAAI,gCAA8B,CAChF,iBAAkB,GAAO,WAC7B,CAAC,CACL,CAAC,CAAC,EACF,KAAK,gBAAgB,IAAI,uBAAqB,KAAK,MAAM,CAAC,EAE9D,OAAO,EAAG,CACN,MAAM,QAAQ,EAEtB,CS3CO,MAAM,UAA4B,EAAmB,CACxD,WAAW,CAAC,EAAS,CACjB,MAAM,CAAO,EACb,OAAO,eAAe,KAAM,EAAoB,SAAS,EAEjE,CCLO,MAAM,UAAgC,CAAgB,CACzD,WAAW,CAAC,EAAM,CACd,MAAM,CACF,KAAM,0BACN,OAAQ,YACL,CACP,CAAC,EACD,KAAK,KAAO,0BACZ,KAAK,OAAS,SACd,OAAO,eAAe,KAAM,EAAwB,SAAS,EAErE,CACO,MAAM,UAAkC,CAAgB,CAC3D,WAAW,CAAC,EAAM,CACd,MAAM,CACF,KAAM,4BACN,OAAQ,YACL,CACP,CAAC,EACD,KAAK,KAAO,4BACZ,KAAK,OAAS,SACd,OAAO,eAAe,KAAM,EAA0B,SAAS,EAEvE,CACO,MAAM,UAAiC,CAAgB,CAC1D,WAAW,CAAC,EAAM,CACd,MAAM,CACF,KAAM,2BACN,OAAQ,YACL,CACP,CAAC,EACD,KAAK,KAAO,2BACZ,KAAK,OAAS,SACd,OAAO,eAAe,KAAM,EAAyB,SAAS,EAEtE,CACO,MAAM,UAA8B,CAAgB,CACvD,WAAW,CAAC,EAAM,CACd,MAAM,CACF,KAAM,wBACN,OAAQ,YACL,CACP,CAAC,EACD,KAAK,KAAO,wBACZ,KAAK,OAAS,SACd,OAAO,eAAe,KAAM,EAAsB,SAAS,EAEnE,CACO,IAAM,GAA8C,CAAC,KAAS,IAC9D,KACC,EAAI,aAAe,CAAE,YAAa,CAAiB,CAC3D,GACa,GAAoC,CAAC,KAAS,IACpD,KACC,EAAI,iBAAmB,CAAE,gBAAiB,CAAiB,KAC3D,EAAI,cAAgB,CAAE,aAAc,CAAiB,CAC7D,GACa,GAA+C,CAAC,KAAS,IAC/D,KACC,EAAI,iBAAmB,CAAE,gBAAiB,GAAkC,EAAI,eAAe,CAAE,CACzG,GC9DA,eACA,YAIO,IAAM,GAA+B,MAAO,EAAO,IAAY,CAClE,MAAM,EAAI,kBAAG,EAAO,CAAO,EACrB,EAAU,EAAI,CAAC,EAAG,GAA2B,EAC9C,IAAS,EAAM,GACpB,CAAC,EACD,EAAE,GAAG,yBAAyB,EAC9B,MAAM,EAAQ,EAAI,EACb,IAAM,EAAG,EAAgB,EAAM,IAAM,UAAU,CAAC,GAChD,IAAM,EAAG,EAAgB,EAAM,IAAM,WAAW,CAAC,CACtD,CAAC,EACD,IAAI,EAEJ,OADA,EAAE,EAAE,KAAK,EAAE,EAAE,CAAO,EAAE,EAAE,CAAK,EAAE,EAAE,CAAI,EAC9B,EAAE,MAAM,GAyCZ,IAAM,GAA+B,MAAO,EAAQ,IAAY,CACnE,GAAI,EAAO,aAAe,KAAO,EAAO,YAAc,IAClD,OAAO,GAAgB,EAAQ,CAAO,EAE1C,MAAM,EAAW,EAAI,CACjB,UAAW,EAAoB,CAAM,CACzC,CAAC,EACK,EAAO,EAAgB,GAAe,MAAM,gBAAU,EAAO,KAAM,CAAO,CAAC,EAAG,MAAM,EACpF,EAAM,EAAK,EAAM,CACnB,gBAAiB,EACrB,CAAC,EAED,OADA,OAAO,OAAO,EAAU,CAAG,EACpB,GA0CX,IAAM,GAAkB,MAAO,EAAQ,IAAY,CAC/C,MAAM,EAAe,IACd,EACH,KAAM,MAAM,qBAAe,EAAO,KAAM,CAAO,CACnD,EACM,EAAY,wBAAsB,EAAQ,EAAa,IAAI,EACjE,OAAQ,OACC,8BACA,4CACD,MAAM,MAAM,GAA8B,EAAc,CAAO,MAC9D,gCACA,8CACD,MAAM,MAAM,GAAgC,EAAc,CAAO,MAChE,+BACA,6CACD,MAAM,MAAM,GAA+B,EAAc,CAAO,MAC/D,4BACA,0CACD,MAAM,MAAM,GAA4B,EAAc,CAAO,UAE7D,MAAM,EAAa,EAAa,KAChC,OAAO,GAAkB,CACrB,SACA,aACA,WACJ,CAAC,IAGP,GAAoB,GAAkB,CAAe,EACrD,GAAgC,MAAO,EAAc,IAAY,CACnE,MAAM,EAAW,EAAI,CAAC,CAAC,EACjB,EAAO,EAAa,KACpB,EAAM,EAAK,EAAM,CACnB,QAAS,CACb,CAAC,EACD,OAAO,OAAO,EAAU,CAAG,EAC3B,MAAM,EAAY,IAAI,EAAwB,CAC1C,UAAW,EAAoB,CAAY,KACxC,CACP,CAAC,EACD,OAAO,EAA2B,EAAW,EAAa,IAAI,GAE5D,GAAkC,MAAO,EAAc,IAAY,CACrE,MAAM,EAAW,EAAI,CAAC,CAAC,EACjB,EAAO,EAAa,KACpB,EAAM,EAAK,EAAM,CACnB,QAAS,CACb,CAAC,EACD,OAAO,OAAO,EAAU,CAAG,EAC3B,MAAM,EAAY,IAAI,EAA0B,CAC5C,UAAW,EAAoB,CAAY,KACxC,CACP,CAAC,EACD,OAAO,EAA2B,EAAW,EAAa,IAAI,GAE5D,GAAiC,MAAO,EAAc,IAAY,CACpE,MAAM,EAAW,EAAI,CAAC,CAAC,EACjB,EAAO,EAAa,KACpB,EAAM,EAAK,EAAM,CACnB,QAAS,CACb,CAAC,EACD,OAAO,OAAO,EAAU,CAAG,EAC3B,MAAM,EAAY,IAAI,EAAyB,CAC3C,UAAW,EAAoB,CAAY,KACxC,CACP,CAAC,EACD,OAAO,EAA2B,EAAW,EAAa,IAAI,GAE5D,GAA8B,MAAO,EAAc,IAAY,CACjE,MAAM,EAAW,EAAI,CAAC,CAAC,EACjB,EAAO,EAAa,KACpB,EAAM,EAAK,EAAM,CACnB,QAAS,CACb,CAAC,EACD,OAAO,OAAO,EAAU,CAAG,EAC3B,MAAM,EAAY,IAAI,EAAsB,CACxC,UAAW,EAAoB,CAAY,KACxC,CACP,CAAC,EACD,OAAO,EAA2B,EAAW,EAAa,IAAI,GAE5D,EAAsB,CAAC,KAAY,CACrC,eAAgB,EAAO,WACvB,UAAW,EAAO,QAAQ,qBAAuB,EAAO,QAAQ,sBAAwB,EAAO,QAAQ,oBACvG,kBAAmB,EAAO,QAAQ,cAClC,KAAM,EAAO,QAAQ,cACzB,GAEA,IAAM,GAA4B,CAAC,IAAU,IAAU,QACnD,IAAU,MACV,IAAU,MACR,OAAO,oBAAoB,CAAK,EAAE,SAAS,QAAQ,GAAK,EAAM,QAAU,MACxE,OAAO,oBAAoB,CAAK,EAAE,SAAS,MAAM,GAAK,EAAM,MAAQ,GACpE,GAAM,YACN,GAAM,cACN,GAAM,aAKZ,IAAM,GAAM,WACN,GAAM,YACN,GAAS,yBC/MR,MAAM,WAAkC,GAC1C,aAAa,EACb,GAAG,CAAY,EACf,UAAW,CAAC,EAAS,EAAI,EAAQ,EAAG,CACrC,MAAO,CACH,GAAe,EAAQ,KAAK,UAAW,KAAK,WAAW,EACvD,GAAkB,EAAQ,EAAQ,iCAAiC,CAAC,CACxE,EACH,EACI,EAAE,mBAAoB,qBAAsB,CAAC,CAAC,EAC9C,EAAE,YAAa,2BAA2B,EAC1C,EAAE,GAA6C,EAA4C,EAC3F,IAAI,EAA4B,EAChC,GAAG,EAA4B,EAC/B,MAAM,CAAE,CACb",
20
+ "debugId": "4B2790E55056A14664756e2164756e21",
21
21
  "names": []
22
22
  }
@@ -0,0 +1,4 @@
1
+ // @bun
2
+ import"./chunk-643d1c40e2a0f67f.js";import{I as M} from"./chunk-c83dcc500d5fefe3.js";import"./chunk-9e77cade8671df8d.js";import{$ as k0,Aa as cl,Ba as V0,Ca as Gh,Da as nl,Ea as ol,Fa as ul,Ga as Rl,Ha as jl,Ia as tl,Ja as J0,Ka as D0,X as Tl,Z as Al,_ as Dw,aa as K0,ba as F0,ca as B0,ga as yw,ha as Xh,ia as y0,ja as ql,ka as zl,la as Ml,ma as Nl,na as Q0,oa as Cl,pa as Ol,qa as gl,ra as xl,sa as X0,ta as Y0,va as F,wa as B,xa as Z0,ya as il,za as $0} from"./chunk-d8d25380b8f0c36e.js";import{$a as Hh,Ab as pl,La as I0,Ma as S0,Na as A0,Qa as Ll,Sa as U0,_a as K,ab as t0,eb as L0,gb as H,ib as u,lb as R0,nb as P0,ob as A,pb as j0,qb as bl,rb as fl,sb as H0,tb as m0,ub as ph,zb as el} from"./chunk-ebc6b30a0275d2f7.js";import{Bb as Uw,Cb as f} from"./chunk-0a78bb530df845c9.js";import"./chunk-17c3f49735b660d5.js";import{Hb as Yh} from"./chunk-e3363367fe4893a2.js";import"./chunk-79168b7162a45077.js";import"./chunk-9037f8f927d4caff.js";var C=M(Xh(),1);var dl=M(Gh(),1),dh=M(Dw(),1);var Ew=function(h){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:h.region},propertiesExtractor:(w,l)=>({signingProperties:{config:w,context:l}})}},Gl=function(h){return{schemeId:"smithy.api#noAuth"}},Il=async(h,w,l)=>{return{operation:dh.getSmithyContext(w).operation,region:await dh.normalizeProvider(h.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}},Sl=(h)=>{const w=[];switch(h.operation){case"AssumeRoleWithSAML":{w.push(Gl(h));break}case"AssumeRoleWithWebIdentity":{w.push(Gl(h));break}default:w.push(Ew(h))}return w},kw=(h)=>({...h,stsClientCtor:L}),Hl=(h)=>{const w=kw(h);return{...dl.resolveAwsSdkSigV4Config(w)}};var ml=(h)=>{return{...h,useDualstackEndpoint:h.useDualstackEndpoint??!1,useFipsEndpoint:h.useFipsEndpoint??!1,useGlobalEndpoint:h.useGlobalEndpoint??!1,defaultSigningName:"sts"}},D={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var Jl={name:"@aws-sdk/client-sts",description:"AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sts","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"rimraf ./dist-types tsconfig.types.tsbuildinfo && tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sts",test:"yarn test:unit","test:unit":"jest"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/client-sso-oidc":"3.654.0","@aws-sdk/core":"3.654.0","@aws-sdk/credential-provider-node":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sts",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sts"}};var Ih=M(Gh(),1);var h0=M(Xh(),1);var l0=M(yw(),1);var al=M(Gh(),1),sl=M(Xh(),1);var rl=M(Uw(),1);var Dl={["required"]:!1,["type"]:"String"},Qh={["required"]:!0,default:!1,["type"]:"Boolean"},Xl={["ref"]:"Endpoint"},El={["fn"]:"isSet",["argv"]:[{["ref"]:"Region"}]},J={["ref"]:"Region"},kl={["fn"]:"aws.partition",["argv"]:[J],assign:"PartitionResult"},Yl={["ref"]:"UseFIPS"},Zl={["ref"]:"UseDualStack"},E={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"us-east-1"}]},headers:{}},X={},Kl={conditions:[{["fn"]:"stringEquals",["argv"]:[J,"aws-global"]}],["endpoint"]:E,["type"]:"endpoint"},$l={["fn"]:"booleanEquals",["argv"]:[Yl,!0]},Vl={["fn"]:"booleanEquals",["argv"]:[Zl,!0]},Fl={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},Pl={["ref"]:"PartitionResult"},Bl={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[Pl,"supportsDualStack"]}]},Ul=[{["fn"]:"isSet",["argv"]:[Xl]}],yl=[$l],Ql=[Vl],Fw={version:"1.0",parameters:{Region:Dl,UseDualStack:Qh,UseFIPS:Qh,Endpoint:Dl,UseGlobalEndpoint:Qh},rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseGlobalEndpoint"},!0]},{["fn"]:"not",["argv"]:Ul},El,kl,{["fn"]:"booleanEquals",["argv"]:[Yl,!1]},{["fn"]:"booleanEquals",["argv"]:[Zl,!1]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-northeast-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-south-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-southeast-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-southeast-2"]}],endpoint:E,["type"]:"endpoint"},Kl,{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ca-central-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-central-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-north-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-2"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-3"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"sa-east-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-east-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-east-2"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-west-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-west-2"]}],endpoint:E,["type"]:"endpoint"},{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"{Region}"}]},headers:X},["type"]:"endpoint"}],["type"]:"tree"},{conditions:Ul,rules:[{conditions:yl,error:"Invalid Configuration: FIPS and custom endpoint are not supported",["type"]:"error"},{conditions:Ql,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",["type"]:"error"},{endpoint:{url:Xl,properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{conditions:[El],rules:[{conditions:[kl],rules:[{conditions:[$l,Vl],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,Fl]},Bl],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",["type"]:"error"}],["type"]:"tree"},{conditions:yl,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[Fl,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[Pl,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:X,headers:X},["type"]:"endpoint"},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",["type"]:"error"}],["type"]:"tree"},{conditions:Ql,rules:[{conditions:[Bl],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",["type"]:"error"}],["type"]:"tree"},Kl,{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"}],["type"]:"tree"},{error:"Invalid Configuration: Missing Region",["type"]:"error"}]},vl=Fw;var Bw=new ql({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),Wl=(h,w={})=>{return Bw.get(h,()=>Ml(vl,{endpointParams:h,logger:w.logger}))};zl.aws=Nl;var _l=(h)=>{return{apiVersion:"2011-06-15",base64Decoder:h?.base64Decoder??Rl,base64Encoder:h?.base64Encoder??jl,disableHostPrefix:h?.disableHostPrefix??!1,endpointProvider:h?.endpointProvider??Wl,extensions:h?.extensions??[],httpAuthSchemeProvider:h?.httpAuthSchemeProvider??Sl,httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(w)=>w.getIdentityProvider("aws.auth#sigv4"),signer:new al.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(w)=>w.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new sl.NoAuthSigner}],logger:h?.logger??new Ll,serviceId:h?.serviceId??"STS",urlParser:h?.urlParser??rl.parseUrl,utf8Decoder:h?.utf8Decoder??Tl,utf8Encoder:h?.utf8Encoder??Al}};var w0=(h)=>{fl(process.version);const w=tl(h),l=()=>w().then(bl),G=_l(h);return Ih.emitWarningIfUnsupportedVersion(process.version),{...G,...h,runtime:"node",defaultsMode:w,bodyLengthChecker:h?.bodyLengthChecker??ul,credentialDefaultProvider:h?.credentialDefaultProvider??Yh,defaultUserAgentProvider:h?.defaultUserAgentProvider??nl({serviceId:G.serviceId,clientVersion:Jl.version}),httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(d)=>d.getIdentityProvider("aws.auth#sigv4")||(async(S)=>await Yh(S?.__config||{})()),signer:new Ih.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(d)=>d.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new h0.NoAuthSigner}],maxAttempts:h?.maxAttempts??f(il),region:h?.region??f(gl,xl),requestHandler:el.create(h?.requestHandler??l),retryMode:h?.retryMode??f({...cl,default:async()=>(await l()).retryMode||l0.DEFAULT_RETRY_MODE}),sha256:h?.sha256??ol.bind(null,"sha256"),streamCollector:h?.streamCollector??pl,useDualstackEndpoint:h?.useDualstackEndpoint??f(Cl),useFipsEndpoint:h?.useFipsEndpoint??f(Ol)}};var G0=(h)=>{const w=h.httpAuthSchemes;let{httpAuthSchemeProvider:l,credentials:G}=h;return{setHttpAuthScheme(d){const S=w.findIndex((I)=>I.schemeId===d.schemeId);if(S===-1)w.push(d);else w.splice(S,1,d)},httpAuthSchemes(){return w},setHttpAuthSchemeProvider(d){l=d},httpAuthSchemeProvider(){return l},setCredentials(d){G=d},credentials(){return G}}},d0=(h)=>{return{httpAuthSchemes:h.httpAuthSchemes(),httpAuthSchemeProvider:h.httpAuthSchemeProvider(),credentials:h.credentials()}};var Sh=(h)=>h,E0=(h,w)=>{const l={...Sh(J0(h)),...Sh(H0(h)),...Sh(I0(h)),...Sh(G0(h))};return w.forEach((G)=>G.configure(l)),{...h,...D0(l),...m0(l),...S0(l),...d0(l)}};class L extends U0{constructor(...[h]){const w=w0(h||{}),l=ml(w),G=y0(l),d=$0(G),S=X0(d),I=k0(S),Q=Z0(I),z=Hl(Q),v=E0(z,h?.extensions||[]);super(v);this.config=v,this.middlewareStack.use(Q0(this.config)),this.middlewareStack.use(V0(this.config)),this.middlewareStack.use(Y0(this.config)),this.middlewareStack.use(K0(this.config)),this.middlewareStack.use(F0(this.config)),this.middlewareStack.use(B0(this.config)),this.middlewareStack.use(C.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Il,identityProviderConfigProvider:async(n)=>new C.DefaultIdentityProviderConfig({"aws.auth#sigv4":n.credentials})})),this.middlewareStack.use(C.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class Y extends P0{constructor(h){super(h);Object.setPrototypeOf(this,Y.prototype)}}class mh extends Y{constructor(h){super({name:"ExpiredTokenException",$fault:"client",...h});this.name="ExpiredTokenException",this.$fault="client",Object.setPrototypeOf(this,mh.prototype)}}class Jh extends Y{constructor(h){super({name:"MalformedPolicyDocumentException",$fault:"client",...h});this.name="MalformedPolicyDocumentException",this.$fault="client",Object.setPrototypeOf(this,Jh.prototype)}}class Dh extends Y{constructor(h){super({name:"PackedPolicyTooLargeException",$fault:"client",...h});this.name="PackedPolicyTooLargeException",this.$fault="client",Object.setPrototypeOf(this,Dh.prototype)}}class Eh extends Y{constructor(h){super({name:"RegionDisabledException",$fault:"client",...h});this.name="RegionDisabledException",this.$fault="client",Object.setPrototypeOf(this,Eh.prototype)}}class kh extends Y{constructor(h){super({name:"IDPRejectedClaimException",$fault:"client",...h});this.name="IDPRejectedClaimException",this.$fault="client",Object.setPrototypeOf(this,kh.prototype)}}class Kh extends Y{constructor(h){super({name:"InvalidIdentityTokenException",$fault:"client",...h});this.name="InvalidIdentityTokenException",this.$fault="client",Object.setPrototypeOf(this,Kh.prototype)}}class Fh extends Y{constructor(h){super({name:"IDPCommunicationErrorException",$fault:"client",...h});this.name="IDPCommunicationErrorException",this.$fault="client",Object.setPrototypeOf(this,Fh.prototype)}}class Bh extends Y{constructor(h){super({name:"InvalidAuthorizationMessageException",$fault:"client",...h});this.name="InvalidAuthorizationMessageException",this.$fault="client",Object.setPrototypeOf(this,Bh.prototype)}}var o=(h)=>({...h,...h.SecretAccessKey&&{SecretAccessKey:Hh}}),v0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),q0=(h)=>({...h,...h.SAMLAssertion&&{SAMLAssertion:Hh}}),z0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),M0=(h)=>({...h,...h.WebIdentityToken&&{WebIdentityToken:Hh}}),N0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),W0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),T0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}});var q=M(Gh(),1);var a0=async(h,w)=>{const l=a;let G;return G=b({...qw(h,w),[r]:GG,[_]:s}),j(w,l,"/",void 0,G)},s0=async(h,w)=>{const l=a;let G;return G=b({...zw(h,w),[r]:dG,[_]:s}),j(w,l,"/",void 0,G)},r0=async(h,w)=>{const l=a;let G;return G=b({...Mw(h,w),[r]:IG,[_]:s}),j(w,l,"/",void 0,G)},_0=async(h,w)=>{const l=a;let G;return G=b({...Nw(h,w),[r]:SG,[_]:s}),j(w,l,"/",void 0,G)},b0=async(h,w)=>{const l=a;let G;return G=b({...Ww(h,w),[r]:HG,[_]:s}),j(w,l,"/",void 0,G)},f0=async(h,w)=>{const l=a;let G;return G=b({...Tw(h,w),[r]:mG,[_]:s}),j(w,l,"/",void 0,G)},C0=async(h,w)=>{const l=a;let G;return G=b({...Aw(h,w),[r]:JG,[_]:s}),j(w,l,"/",void 0,G)},O0=async(h,w)=>{const l=a;let G;return G=b({...Lw(h,w),[r]:DG,[_]:s}),j(w,l,"/",void 0,G)},g0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=_w(l.AssumeRoleResult,w),{$metadata:k(h),...G}},x0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=bw(l.AssumeRoleWithSAMLResult,w),{$metadata:k(h),...G}},i0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=fw(l.AssumeRoleWithWebIdentityResult,w),{$metadata:k(h),...G}},c0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=Cw(l.DecodeAuthorizationMessageResult,w),{$metadata:k(h),...G}},e0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=xw(l.GetAccessKeyInfoResult,w),{$metadata:k(h),...G}},p0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=iw(l.GetCallerIdentityResult,w),{$metadata:k(h),...G}},n0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=cw(l.GetFederationTokenResult,w),{$metadata:k(h),...G}},o0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=ew(l.GetSessionTokenResult,w),{$metadata:k(h),...G}},R=async(h,w)=>{const l={...h,body:await q.parseXmlErrorBody(h.body,w)},G=EG(h,l.body);switch(G){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await Qw(l,w);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await Vw(l,w);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await Pw(l,w);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await vw(l,w);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await Yw(l,w);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await $w(l,w);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await Xw(l,w);case"InvalidAuthorizationMessageException":case"com.amazonaws.sts#InvalidAuthorizationMessageException":throw await Zw(l,w);default:const d=l.body;return wG({output:h,parsedBody:d.Error,errorCode:G})}},Qw=async(h,w)=>{const l=h.body,G=Ow(l.Error,w),d=new mh({$metadata:k(h),...G});return A(d,l)},Xw=async(h,w)=>{const l=h.body,G=pw(l.Error,w),d=new Fh({$metadata:k(h),...G});return A(d,l)},Yw=async(h,w)=>{const l=h.body,G=nw(l.Error,w),d=new kh({$metadata:k(h),...G});return A(d,l)},Zw=async(h,w)=>{const l=h.body,G=ow(l.Error,w),d=new Bh({$metadata:k(h),...G});return A(d,l)},$w=async(h,w)=>{const l=h.body,G=uw(l.Error,w),d=new Kh({$metadata:k(h),...G});return A(d,l)},Vw=async(h,w)=>{const l=h.body,G=tw(l.Error,w),d=new Jh({$metadata:k(h),...G});return A(d,l)},Pw=async(h,w)=>{const l=h.body,G=hG(l.Error,w),d=new Dh({$metadata:k(h),...G});return A(d,l)},vw=async(h,w)=>{const l=h.body,G=lG(l.Error,w),d=new Eh({$metadata:k(h),...G});return A(d,l)},qw=(h,w)=>{const l={};if(h[T]!=null)l[T]=h[T];if(h[i]!=null)l[i]=h[i];if(h[$]!=null){const G=Uh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([d,S])=>{const I=`PolicyArns.${d}`;l[I]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];if(h[e]!=null){const G=u0(h[e],w);if(h[e]?.length===0)l.Tags=[];Object.entries(G).forEach(([d,S])=>{const I=`Tags.${d}`;l[I]=S})}if(h[gh]!=null){const G=rw(h[gh],w);if(h[gh]?.length===0)l.TransitiveTagKeys=[];Object.entries(G).forEach(([d,S])=>{const I=`TransitiveTagKeys.${d}`;l[I]=S})}if(h[vh]!=null)l[vh]=h[vh];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];if(h[P]!=null)l[P]=h[P];if(h[jh]!=null){const G=aw(h[jh],w);if(h[jh]?.length===0)l.ProvidedContexts=[];Object.entries(G).forEach(([d,S])=>{const I=`ProvidedContexts.${d}`;l[I]=S})}return l},zw=(h,w)=>{const l={};if(h[T]!=null)l[T]=h[T];if(h[Lh]!=null)l[Lh]=h[Lh];if(h[bh]!=null)l[bh]=h[bh];if(h[$]!=null){const G=Uh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([d,S])=>{const I=`PolicyArns.${d}`;l[I]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},Mw=(h,w)=>{const l={};if(h[T]!=null)l[T]=h[T];if(h[i]!=null)l[i]=h[i];if(h[ch]!=null)l[ch]=h[ch];if(h[ah]!=null)l[ah]=h[ah];if(h[$]!=null){const G=Uh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([d,S])=>{const I=`PolicyArns.${d}`;l[I]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},Nw=(h,w)=>{const l={};if(h[qh]!=null)l[qh]=h[qh];return l},Ww=(h,w)=>{const l={};if(h[O]!=null)l[O]=h[O];return l},Tw=(h,w)=>{return{}},Aw=(h,w)=>{const l={};if(h[Th]!=null)l[Th]=h[Th];if(h[Z]!=null)l[Z]=h[Z];if(h[$]!=null){const G=Uh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([d,S])=>{const I=`PolicyArns.${d}`;l[I]=S})}if(h[y]!=null)l[y]=h[y];if(h[e]!=null){const G=u0(h[e],w);if(h[e]?.length===0)l.Tags=[];Object.entries(G).forEach(([d,S])=>{const I=`Tags.${d}`;l[I]=S})}return l},Lw=(h,w)=>{const l={};if(h[y]!=null)l[y]=h[y];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];return l},Uh=(h,w)=>{const l={};let G=1;for(let d of h){if(d===null)continue;const S=Rw(d,w);Object.entries(S).forEach(([I,Q])=>{l[`member.${G}.${I}`]=Q}),G++}return l},Rw=(h,w)=>{const l={};if(h[eh]!=null)l[eh]=h[eh];return l},jw=(h,w)=>{const l={};if(h[Rh]!=null)l[Rh]=h[Rh];if(h[$h]!=null)l[$h]=h[$h];return l},aw=(h,w)=>{const l={};let G=1;for(let d of h){if(d===null)continue;const S=jw(d,w);Object.entries(S).forEach(([I,Q])=>{l[`member.${G}.${I}`]=Q}),G++}return l},sw=(h,w)=>{const l={};if(h[Wh]!=null)l[Wh]=h[Wh];if(h[ih]!=null)l[ih]=h[ih];return l},rw=(h,w)=>{const l={};let G=1;for(let d of h){if(d===null)continue;l[`member.${G}`]=d,G++}return l},u0=(h,w)=>{const l={};let G=1;for(let d of h){if(d===null)continue;const S=sw(d,w);Object.entries(S).forEach(([I,Q])=>{l[`member.${G}.${I}`]=Q}),G++}return l},nh=(h,w)=>{const l={};if(h[Zh]!=null)l[Zh]=H(h[Zh]);if(h[W]!=null)l[W]=H(h[W]);return l},_w=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[N]!=null)l[N]=nh(h[N],w);if(h[V]!=null)l[V]=u(h[V]);if(h[P]!=null)l[P]=H(h[P]);return l},bw=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[N]!=null)l[N]=nh(h[N],w);if(h[V]!=null)l[V]=u(h[V]);if(h[rh]!=null)l[rh]=H(h[rh]);if(h[Ch]!=null)l[Ch]=H(h[Ch]);if(h[Nh]!=null)l[Nh]=H(h[Nh]);if(h[x]!=null)l[x]=H(h[x]);if(h[Ah]!=null)l[Ah]=H(h[Ah]);if(h[P]!=null)l[P]=H(h[P]);return l},fw=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[fh]!=null)l[fh]=H(h[fh]);if(h[N]!=null)l[N]=nh(h[N],w);if(h[V]!=null)l[V]=u(h[V]);if(h[sh]!=null)l[sh]=H(h[sh]);if(h[x]!=null)l[x]=H(h[x]);if(h[P]!=null)l[P]=H(h[P]);return l},t=(h,w)=>{const l={};if(h[O]!=null)l[O]=H(h[O]);if(h[_h]!=null)l[_h]=H(h[_h]);if(h[Oh]!=null)l[Oh]=H(h[Oh]);if(h[Ph]!=null)l[Ph]=L0(R0(h[Ph]));return l},Cw=(h,w)=>{const l={};if(h[Vh]!=null)l[Vh]=H(h[Vh]);return l},Ow=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},gw=(h,w)=>{const l={};if(h[Mh]!=null)l[Mh]=H(h[Mh]);if(h[W]!=null)l[W]=H(h[W]);return l},xw=(h,w)=>{const l={};if(h[g]!=null)l[g]=H(h[g]);return l},iw=(h,w)=>{const l={};if(h[xh]!=null)l[xh]=H(h[xh]);if(h[g]!=null)l[g]=H(h[g]);if(h[W]!=null)l[W]=H(h[W]);return l},cw=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[zh]!=null)l[zh]=gw(h[zh],w);if(h[V]!=null)l[V]=u(h[V]);return l},ew=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);return l},pw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},nw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},ow=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},uw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},tw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},hG=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},lG=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},k=(h)=>({httpStatusCode:h.statusCode,requestId:h.headers["x-amzn-requestid"]??h.headers["x-amzn-request-id"]??h.headers["x-amz-request-id"],extendedRequestId:h.headers["x-amz-id-2"],cfId:h.headers["x-amz-cf-id"]});var wG=j0(Y),j=async(h,w,l,G,d)=>{const{hostname:S,protocol:I="https",port:Q,path:z}=await h.endpoint(),v={protocol:I,hostname:S,port:Q,method:"POST",path:z.endsWith("/")?z.slice(0,-1)+l:z+l,headers:w};if(G!==void 0)v.hostname=G;if(d!==void 0)v.body=d;return new A0(v)},a={"content-type":"application/x-www-form-urlencoded"},s="2011-06-15",r="Action",O="AccessKeyId",GG="AssumeRole",Zh="AssumedRoleId",N="AssumedRoleUser",dG="AssumeRoleWithSAML",IG="AssumeRoleWithWebIdentity",g="Account",W="Arn",x="Audience",U="Credentials",$h="ContextAssertion",SG="DecodeAuthorizationMessage",Vh="DecodedMessage",y="DurationSeconds",Ph="Expiration",vh="ExternalId",qh="EncodedMessage",zh="FederatedUser",Mh="FederatedUserId",HG="GetAccessKeyInfo",mG="GetCallerIdentity",JG="GetFederationToken",DG="GetSessionToken",Nh="Issuer",Wh="Key",Th="Name",Ah="NameQualifier",Z="Policy",$="PolicyArns",Lh="PrincipalArn",Rh="ProviderArn",jh="ProvidedContexts",ah="ProviderId",V="PackedPolicySize",sh="Provider",T="RoleArn",i="RoleSessionName",rh="Subject",_h="SecretAccessKey",bh="SAMLAssertion",fh="SubjectFromWebIdentityToken",P="SourceIdentity",c="SerialNumber",Ch="SubjectType",Oh="SessionToken",e="Tags",p="TokenCode",gh="TransitiveTagKeys",xh="UserId",_="Version",ih="Value",ch="WebIdentityToken",eh="arn",m="message",b=(h)=>Object.entries(h).map(([w,l])=>ph(w)+"="+ph(l)).join("&"),EG=(h,w)=>{if(w.Error?.Code!==void 0)return w.Error.Code;if(h.statusCode==404)return"NotFound"};class hh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,v0).ser(a0).de(g0).build(){}class oh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithSAML",{}).n("STSClient","AssumeRoleWithSAMLCommand").f(q0,z0).ser(s0).de(x0).build(){}class lh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(M0,N0).ser(r0).de(i0).build(){}class uh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","DecodeAuthorizationMessage",{}).n("STSClient","DecodeAuthorizationMessageCommand").f(void 0,void 0).ser(_0).de(c0).build(){}class th extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetAccessKeyInfo",{}).n("STSClient","GetAccessKeyInfoCommand").f(void 0,void 0).ser(b0).de(e0).build(){}class hl extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetCallerIdentity",{}).n("STSClient","GetCallerIdentityCommand").f(void 0,void 0).ser(f0).de(p0).build(){}class ll extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetFederationToken",{}).n("STSClient","GetFederationTokenCommand").f(void 0,W0).ser(C0).de(n0).build(){}class wl extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetSessionToken",{}).n("STSClient","GetSessionTokenCommand").f(void 0,T0).ser(O0).de(o0).build(){}var kG={AssumeRoleCommand:hh,AssumeRoleWithSAMLCommand:oh,AssumeRoleWithWebIdentityCommand:lh,DecodeAuthorizationMessageCommand:uh,GetAccessKeyInfoCommand:th,GetCallerIdentityCommand:hl,GetFederationTokenCommand:ll,GetSessionTokenCommand:wl};class hw extends L{}t0(kG,hw);var lw="us-east-1",ww=(h)=>{if(typeof h?.Arn==="string"){const w=h.Arn.split(":");if(w.length>4&&w[4]!=="")return w[4]}return},Gw=async(h,w,l)=>{const G=typeof h==="function"?await h():h,d=typeof w==="function"?await w():w;return l?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${G} (provider)`,`${d} (parent client)`,`${lw} (STS default)`),G??d??lw},dw=(h,w)=>{let l,G;return async(d,S)=>{if(G=d,!l){const{logger:v=h?.parentClientConfig?.logger,region:n,requestHandler:wh=h?.parentClientConfig?.requestHandler,credentialProviderLogger:yh}=h,mw=await Gw(n,h?.parentClientConfig?.region,yh),Jw=!Sw(wh);l=new w({credentialDefaultProvider:()=>async()=>G,region:mw,requestHandler:Jw?wh:void 0,logger:v})}const{Credentials:I,AssumedRoleUser:Q}=await l.send(new hh(S));if(!I||!I.AccessKeyId||!I.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${S.RoleArn}`);const z=ww(Q);return{accessKeyId:I.AccessKeyId,secretAccessKey:I.SecretAccessKey,sessionToken:I.SessionToken,expiration:I.Expiration,...I.CredentialScope&&{credentialScope:I.CredentialScope},...z&&{accountId:z}}}},Iw=(h,w)=>{let l;return async(G)=>{if(!l){const{logger:Q=h?.parentClientConfig?.logger,region:z,requestHandler:v=h?.parentClientConfig?.requestHandler,credentialProviderLogger:n}=h,wh=await Gw(z,h?.parentClientConfig?.region,n),yh=!Sw(v);l=new w({region:wh,requestHandler:yh?v:void 0,logger:Q})}const{Credentials:d,AssumedRoleUser:S}=await l.send(new lh(G));if(!d||!d.AccessKeyId||!d.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${G.RoleArn}`);const I=ww(S);return{accessKeyId:d.AccessKeyId,secretAccessKey:d.SecretAccessKey,sessionToken:d.SessionToken,expiration:d.Expiration,...d.CredentialScope&&{credentialScope:d.CredentialScope},...I&&{accountId:I}}}};var Sw=(h)=>{return h?.metadata?.handlerProtocol==="h2"};var Hw=(h,w)=>{if(!w)return h;else return class l extends h{constructor(G){super(G);for(let d of w)this.middlewareStack.use(d)}}},KG=(h={},w)=>dw(h,Hw(L,w)),FG=(h={},w)=>Iw(h,Hw(L,w)),aI=(h)=>(w)=>h({roleAssumer:KG(w),roleAssumerWithWebIdentity:FG(w),...w});export{FG as getDefaultRoleAssumerWithWebIdentity,KG as getDefaultRoleAssumer,aI as decorateDefaultCredentialProvider,U0 as __Client,Y as STSServiceException,L as STSClient,hw as STS,Eh as RegionDisabledException,Dh as PackedPolicyTooLargeException,Jh as MalformedPolicyDocumentException,Kh as InvalidIdentityTokenException,Bh as InvalidAuthorizationMessageException,kh as IDPRejectedClaimException,Fh as IDPCommunicationErrorException,T0 as GetSessionTokenResponseFilterSensitiveLog,wl as GetSessionTokenCommand,W0 as GetFederationTokenResponseFilterSensitiveLog,ll as GetFederationTokenCommand,hl as GetCallerIdentityCommand,th as GetAccessKeyInfoCommand,mh as ExpiredTokenException,uh as DecodeAuthorizationMessageCommand,o as CredentialsFilterSensitiveLog,N0 as AssumeRoleWithWebIdentityResponseFilterSensitiveLog,M0 as AssumeRoleWithWebIdentityRequestFilterSensitiveLog,lh as AssumeRoleWithWebIdentityCommand,z0 as AssumeRoleWithSAMLResponseFilterSensitiveLog,q0 as AssumeRoleWithSAMLRequestFilterSensitiveLog,oh as AssumeRoleWithSAMLCommand,v0 as AssumeRoleResponseFilterSensitiveLog,hh as AssumeRoleCommand,K as $Command};
3
+
4
+ //# debugId=4BDA8E5E6EA8201164756e2164756e21