gemi 0.4.51 → 0.4.52

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"file":"App.d.ts","sourceRoot":"","sources":["../../app/App.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AACnD,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAIhD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAGrD,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,UAAU,CAAC;AACvC,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAGrD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,KAAK,CAAC;AAa3C,OAAO,EAAE,aAAa,EAA2B,MAAM,OAAO,CAAC;AAI/D,OAAO,EAAE,MAAM,EAAE,MAAM,WAAW,CAAC;AAKnC,UAAU,YAAY;IACpB,MAAM,EAAE,MAAM,EAAE,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IAC9B,cAAc,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IACpC,gBAAgB,CAAC,EAAE,MAAM,EAAE,CAAC;CAC7B;AAED,UAAU,SAAS;IACjB,UAAU,EAAE,UAAU,UAAU,CAAC;IACjC,SAAS,EAAE,UAAU,SAAS,CAAC;IAC/B,OAAO,CAAC,EAAE,CAAC,UAAU,MAAM,CAAC,EAAE,CAAC;IAC/B,iBAAiB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,UAAU,UAAU,CAAC,CAAC;IACzD,IAAI,EAAE,aAAa,CAAC;IACpB,MAAM,EAAE,UAAU,MAAM,CAAC;CAC1B;AAED,qBAAa,GAAG;IACd,OAAO,CAAC,YAAY,CAKlB;IACF,OAAO,CAAC,cAAc,CAGf;IACP,OAAO,CAAC,aAAa,CASd;IACP,OAAO,CAAC,aAAa,CAAgC;IAC9C,IAAI,SAAS;IACpB,OAAO,CAAC,KAAK,CAAS;IACtB,OAAO,CAAC,aAAa,CAAgB;IAC9B,iBAAiB,EAAE,MAAM,CAAC,MAAM,EAAE,UAAU,UAAU,CAAC,CAAM;IAC7D,UAAU,SAAK;IACtB,OAAO,CAAC,MAAM,CAAY;IAC1B,OAAO,CAAC,SAAS,CAAsB;IACvC,OAAO,CAAC,UAAU,CAAuB;IACzC,OAAO,CAAC,IAAI,CAAgB;IAC5B,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,oBAAoB,CAAuB;gBAEvC,MAAM,EAAE,SAAS;IAc7B,OAAO,CAAC,OAAO;IAwCR,gBAAgB;IAIhB,eAAe,CAAC,MAAM,EAAE,YAAY;IAI3C,OAAO,CAAC,aAAa;IAsCf,gBAAgB,CAAC,GAAG,EAAE,OAAO;IA6F7B,iBAAiB,CAAC,GAAG,EAAE,OAAO;IAoN9B,KAAK,CAAC,GAAG,EAAE,OAAO,GAAG,OAAO,CAAC,QAAQ,CAAC;IAc5C,OAAO,CAAC,sBAAsB,CAGtB;IACR,OAAO,CAAC,mBAAmB,CAEzB;IACF,OAAO,CAAC,oBAAoB,CAM1B;IAEF,SAAS;sBAdH,eAAe,WACV,MAAM,GAAG,MAAM;mBAES,eAAe;oBAI5C,eAAe,QACb,MAAM,UACJ,MAAM;MASd;CACH"}
1
+ {"version":3,"file":"App.d.ts","sourceRoot":"","sources":["../../app/App.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AACnD,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAIhD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAGrD,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,UAAU,CAAC;AACvC,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAGrD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,KAAK,CAAC;AAa3C,OAAO,EAAE,aAAa,EAA2B,MAAM,OAAO,CAAC;AAI/D,OAAO,EAAE,MAAM,EAAE,MAAM,WAAW,CAAC;AAKnC,UAAU,YAAY;IACpB,MAAM,EAAE,MAAM,EAAE,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IAC9B,cAAc,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IACpC,gBAAgB,CAAC,EAAE,MAAM,EAAE,CAAC;CAC7B;AAED,UAAU,SAAS;IACjB,UAAU,EAAE,UAAU,UAAU,CAAC;IACjC,SAAS,EAAE,UAAU,SAAS,CAAC;IAC/B,OAAO,CAAC,EAAE,CAAC,UAAU,MAAM,CAAC,EAAE,CAAC;IAC/B,iBAAiB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,UAAU,UAAU,CAAC,CAAC;IACzD,IAAI,EAAE,aAAa,CAAC;IACpB,MAAM,EAAE,UAAU,MAAM,CAAC;CAC1B;AAED,qBAAa,GAAG;IACd,OAAO,CAAC,YAAY,CAKlB;IACF,OAAO,CAAC,cAAc,CAGf;IACP,OAAO,CAAC,aAAa,CASd;IACP,OAAO,CAAC,aAAa,CAAgC;IAC9C,IAAI,SAAS;IACpB,OAAO,CAAC,KAAK,CAAS;IACtB,OAAO,CAAC,aAAa,CAAgB;IAC9B,iBAAiB,EAAE,MAAM,CAAC,MAAM,EAAE,UAAU,UAAU,CAAC,CAAM;IAC7D,UAAU,SAAK;IACtB,OAAO,CAAC,MAAM,CAAY;IAC1B,OAAO,CAAC,SAAS,CAAsB;IACvC,OAAO,CAAC,UAAU,CAAuB;IACzC,OAAO,CAAC,IAAI,CAAgB;IAC5B,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,oBAAoB,CAAuB;gBAEvC,MAAM,EAAE,SAAS;IAc7B,OAAO,CAAC,OAAO;IAwCR,gBAAgB;IAIhB,eAAe,CAAC,MAAM,EAAE,YAAY;IAI3C,OAAO,CAAC,aAAa;IAsCf,gBAAgB,CAAC,GAAG,EAAE,OAAO;IAiG7B,iBAAiB,CAAC,GAAG,EAAE,OAAO;IAoN9B,KAAK,CAAC,GAAG,EAAE,OAAO,GAAG,OAAO,CAAC,QAAQ,CAAC;IAc5C,OAAO,CAAC,sBAAsB,CAGtB;IACR,OAAO,CAAC,mBAAmB,CAEzB;IACF,OAAO,CAAC,oBAAoB,CAM1B;IAEF,SAAS;sBAdH,eAAe,WACV,MAAM,GAAG,MAAM;mBAES,eAAe;oBAI5C,eAAe,QACb,MAAM,UACJ,MAAM;MASd;CACH"}
package/dist/app/index.js CHANGED
@@ -139,4 +139,4 @@ decimal.js/decimal.mjs:
139
139
  * Copyright (c) 2022 Michael Mclaughlin <M8ch88l@gmail.com>
140
140
  * MIT Licence
141
141
  *)
142
- */});var n6=s1((z4)=>{var __dirname="/Users/enes.tuefekci/personal/projects/gemi/node_modules/.prisma/client";Object.defineProperty(z4,"__esModule",{value:!0});var{PrismaClientKnownRequestError:wX,PrismaClientUnknownRequestError:HX,PrismaClientRustPanicError:AX,PrismaClientInitializationError:XX,PrismaClientValidationError:VX,NotFoundError:WX,getPrismaClient:$X,sqltag:JX,empty:YX,join:ZX,raw:KX,Decimal:jX,Debug:AW,objectEnumValues:a0,makeStrictEnum:zX,Extensions:i6,warnOnce:XW,defineDmmfProperty:BX,Public:FX,getRuntime:VW}=j4(),d={};z4.Prisma=d;z4.$Enums={};d.prismaVersion={client:"5.14.0",engine:"34ace0eb2704183d2c05b60b52fba5c43c13f303"};d.PrismaClientKnownRequestError=wX;d.PrismaClientUnknownRequestError=HX;d.PrismaClientRustPanicError=AX;d.PrismaClientInitializationError=XX;d.PrismaClientValidationError=VX;d.NotFoundError=WX;d.Decimal=jX;d.sql=JX;d.empty=YX;d.join=ZX;d.raw=KX;d.validator=FX.validator;d.getExtensionContext=i6.getExtensionContext;d.defineExtension=i6.defineExtension;d.DbNull=a0.instances.DbNull;d.JsonNull=a0.instances.JsonNull;d.AnyNull=a0.instances.AnyNull;d.NullTypes={DbNull:a0.classes.DbNull,JsonNull:a0.classes.JsonNull,AnyNull:a0.classes.AnyNull};var x0=import.meta.require("path");z4.Prisma.TransactionIsolationLevel=zX({Serializable:"Serializable"});z4.Prisma.UserScalarFieldEnum={id:"id",email:"email",name:"name"};z4.Prisma.PostScalarFieldEnum={id:"id",publicId:"publicId",title:"title",content:"content",published:"published",authorId:"authorId"};z4.Prisma.SortOrder={asc:"asc",desc:"desc"};z4.Prisma.NullsOrder={first:"first",last:"last"};z4.Prisma.ModelName={User:"User",Post:"Post"};var w0={generator:{name:"client",provider:{fromEnvVar:null,value:"prisma-client-js"},output:{value:"/Users/enes.tuefekci/personal/projects/gemi/node_modules/@prisma/client",fromEnvVar:null},config:{engineType:"library"},binaryTargets:[{fromEnvVar:null,value:"darwin-arm64",native:!0}],previewFeatures:["driverAdapters"],sourceFilePath:"/Users/enes.tuefekci/personal/projects/gemi/templates/saas-starter/prisma/schema.prisma"},relativeEnvPaths:{rootEnvPath:null,schemaEnvPath:"../../../templates/saas-starter/.env"},relativePath:"../../../templates/saas-starter/prisma",clientVersion:"5.14.0",engineVersion:"34ace0eb2704183d2c05b60b52fba5c43c13f303",datasourceNames:["db"],activeProvider:"sqlite",postinstall:!1,inlineDatasources:{db:{url:{fromEnvVar:"DATABASE_URL",value:null}}},inlineSchema:"// This is your Prisma schema file,\n// learn more about it in the docs: https://pris.ly/d/prisma-schema\n\ngenerator client {\n provider = \"prisma-client-js\"\n previewFeatures = [\"driverAdapters\"]\n}\n\ndatasource db {\n provider = \"sqlite\"\n url = env(\"DATABASE_URL\")\n}\n\nmodel User {\n id Int @id @default(autoincrement())\n email String @unique\n name String?\n posts Post[]\n}\n\nmodel Post {\n id Int @id @default(autoincrement())\n publicId String @unique @default(cuid())\n title String\n content String?\n published Boolean @default(false)\n author User? @relation(fields: [authorId], references: [id])\n authorId Int?\n}\n",inlineSchemaHash:"0fdc645180adab0c748b9fa16f9aca5de0687497c0b03b12504201d9f6937ff9",copyEngine:!0},o6=import.meta.require("fs");w0.dirname=__dirname;if(!o6.existsSync(x0.join(__dirname,"schema.prisma"))){const w=["../../node_modules/.prisma/client","../node_modules/.prisma/client"],H=w.find((A)=>{return o6.existsSync(x0.join(process.cwd(),A,"schema.prisma"))})??w[0];w0.dirname=x0.join(process.cwd(),H),w0.isBundled=!0}w0.runtimeDataModel=JSON.parse("{\"models\":{\"User\":{\"dbName\":null,\"fields\":[{\"name\":\"id\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":false,\"isId\":true,\"isReadOnly\":false,\"hasDefaultValue\":true,\"type\":\"Int\",\"default\":{\"name\":\"autoincrement\",\"args\":[]},\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"email\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":true,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"String\",\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"name\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":false,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"String\",\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"posts\",\"kind\":\"object\",\"isList\":true,\"isRequired\":true,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"Post\",\"relationName\":\"PostToUser\",\"relationFromFields\":[],\"relationToFields\":[],\"isGenerated\":false,\"isUpdatedAt\":false}],\"primaryKey\":null,\"uniqueFields\":[],\"uniqueIndexes\":[],\"isGenerated\":false},\"Post\":{\"dbName\":null,\"fields\":[{\"name\":\"id\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":false,\"isId\":true,\"isReadOnly\":false,\"hasDefaultValue\":true,\"type\":\"Int\",\"default\":{\"name\":\"autoincrement\",\"args\":[]},\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"publicId\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":true,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":true,\"type\":\"String\",\"default\":{\"name\":\"cuid\",\"args\":[]},\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"title\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"String\",\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"content\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":false,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"String\",\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"published\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":true,\"type\":\"Boolean\",\"default\":false,\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"author\",\"kind\":\"object\",\"isList\":false,\"isRequired\":false,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"User\",\"relationName\":\"PostToUser\",\"relationFromFields\":[\"authorId\"],\"relationToFields\":[\"id\"],\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"authorId\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":false,\"isUnique\":false,\"isId\":false,\"isReadOnly\":true,\"hasDefaultValue\":false,\"type\":\"Int\",\"isGenerated\":false,\"isUpdatedAt\":false}],\"primaryKey\":null,\"uniqueFields\":[],\"uniqueIndexes\":[],\"isGenerated\":false}},\"enums\":{},\"types\":{}}");BX(z4.Prisma,w0.runtimeDataModel);w0.engineWasm=void 0;var{warnEnvConflicts:GX}=j4();GX({rootEnvPath:w0.relativeEnvPaths.rootEnvPath&&x0.resolve(w0.dirname,w0.relativeEnvPaths.rootEnvPath),schemaEnvPath:w0.relativeEnvPaths.schemaEnvPath&&x0.resolve(w0.dirname,w0.relativeEnvPaths.schemaEnvPath)});var OX=$X(w0);z4.PrismaClient=OX;Object.assign(z4,d);x0.join(__dirname,"libquery_engine-darwin-arm64.dylib.node");x0.join(process.cwd(),"../../node_modules/.prisma/client/libquery_engine-darwin-arm64.dylib.node");x0.join(__dirname,"schema.prisma");x0.join(process.cwd(),"../../node_modules/.prisma/client/schema.prisma")});var t6=s1(($W,r6)=>{r6.exports={...n6()}});var w7=s1((JW,e6)=>{e6.exports={...t6()}});function $3(w){let H=[];for(let[A,X]of w)H.push(A,...$3(X).flat());return Array.from(new Set(H))}function Q1(w){const H=[];for(let[A,X]of Object.entries(w))if("run"in X){const V=X.viewPath;if("children"in X){const W=new X.children,$=Q1(W.routes);H.push([V,$])}else H.push([V,[]])}else{const V=new X,W=Q1(V.routes);H.push(...W)}return H}function U1(w){const H={};for(let[A,X]of Object.entries(w))if("run"in X){const V=X;if("children"in V){const W=new V.children,$=U1(W.routes);for(let[J,{exec:Y,middleware:Z}]of Object.entries($)){const K=A==="/"?J:`${A}${J}`,j=J==="/"&&A!=="/"?A:K;H[j]={exec:[V.run.bind(V),...Y],middleware:[...V.middlewares,...Z]}}}else H[A]={exec:[V.run.bind(V)],middleware:V.middlewares}}else{const V=new X,W=U1(V.routes);for(let[$,{exec:J,middleware:Y}]of Object.entries(W)){const Z=A==="/"?$:`${A}${$}`,K=$==="/"&&A!=="/"?A:Z;H[K]={exec:J,middleware:[...V.middlewares,...Y]}}}return Object.fromEntries(Object.entries(H).sort(([A],[X])=>{const V=A.split("/").length+A.split(":").length,W=X.split("/").length+X.split(":").length;return V-W}))}function x1(w){const H={};for(let[A,X]of Object.entries(w))if("run"in X){const V=X.viewPath;if("children"in X)H[A]=[V];if("children"in X){const W=new X.children,$=x1(W.routes);for(let[J,Y]of Object.entries($)){const Z=A==="/"?J:`${A}${J}`,K=J==="/"&&A!=="/"?A:Z;H[K]=[V,...Y]}}else H[A]=[V]}else{const V=new X,W=x1(V.routes);for(let[$,J]of Object.entries(W)){const Y=A==="/"?$:`${A}${$}`,Z=$==="/"&&A!=="/"?A:Y;H[Z]=J}}return H}var W7=function(w){return D1(w)};function J3(w){const H={};for(let[A,X]of Object.entries(w))if("run"in X){const V=X;if(!H[A])H[A]={};const{method:W,middlewares:$}=V,J=V.run.bind(V);H[A][W]={exec:J,middleware:[...$,...V.middlewares]}}else if(W7(X)){const V=new X,W=J3(V.routes);for(let[$,J]of Object.entries(W)){const Y=$==="/"?"":$,Z=A==="/"?"":A,K=`${Z}${Y}`===""?"/":`${Z}${Y}`;if(!H[K])H[K]={};for(let[j,z]of Object.entries(J))H[K][j]={exec:z.exec,middleware:[V.middleware,...V.middlewares,...z.middleware]}}}else for(let V of Object.values(X)){if(!H[A])H[A]={};const{method:W,middlewares:$}=V,J=V.run.bind(V);H[A][W]={exec:J,middleware:$}}return Object.fromEntries(Object.entries(H).sort(([A],[X])=>{const V=A.split("/").length+A.split(":").length,W=X.split("/").length+X.split(":").length;return V-W}))}import{renderToReadableStream as $7} from"react-dom/server.browser";import{createElement as B4,Fragment as J7} from"react";class G4{renderParams={styles:[],manifest:{},serverManifest:{},bootstrapModules:[]};flatViewRoutes={};flatApiRoutes={};routeManifest={};name="APP";appId;componentTree;middlewareAliases={};devVersion=0;params;apiRouter;viewRouter;Root;kernel;i18nServiceContainer;constructor(w){this.params=w,this.apiRouter=w.apiRouter,this.viewRouter=w.viewRouter,this.Root=w.root,this.kernel=new w.kernel,this.prepare(),this.appId=F4(Date.now()),this.i18nServiceContainer=this.kernel.getServices().i18nServiceContainer,this.i18nServiceContainer.boot()}prepare(){const w=this.params;this.middlewareAliases=w.middlewareAliases??{};const H=this.kernel.getServices(),A=H.authenticationServiceProvider.basePath;let X={"/":this.viewRouter,[A]:H.authenticationServiceProvider.routers.view},V={"/":this.apiRouter,[A]:H.authenticationServiceProvider.routers.api,"/__gemi__/services/i18n":H.i18nServiceContainer.routers.api};for(let W of w.plugins??[]){const $=new W;if($.viewRouter)X={...X,[$.viewRoutesBasePath]:$.viewRouter};if($.apiRouter)V={...V,[$.apiRoutesBasePath]:$.apiRouter}}this.flatViewRoutes=U1(X),this.componentTree=Q1(X),this.routeManifest=x1(X),this.flatApiRoutes=J3(V)}getComponentTree(){return this.componentTree}setRenderParams(w){this.renderParams=w}runMiddleware(w){return w.map((H)=>{if(typeof H==="string"){const A=H,V=this.kernel.getServices().middlewareServiceProvider.aliases[A];if(V)return new V().run}else{if(D1(H))return new H().run;return H}}).filter(Boolean).reduce((H,A)=>{return async(X,V)=>{return{...await H(X,V),...await A(X,V)}}},(H)=>Promise.resolve({}))}async handleApiRequest(w){const A=new URL(w.url).pathname.replace("/api","");let X,V={};for(let[Y]of Object.entries(this.flatApiRoutes)){const Z=new Y3({pathname:Y});if(Z.test({pathname:A})){X=this.flatApiRoutes[Y],V=Z.exec({pathname:A})?.pathname.groups;break}}if(!X||!X[w.method])return new Response(JSON.stringify({error:{message:"Not found"}}),{status:404});const W=X[w.method].exec,$=X[w.method].middleware,J=this.runMiddleware($);return await i0.run(async()=>{const Y=new R1(w,V),Z=i0.getStore();Z.setRequest(Y);let K=W?()=>W(Y,V):()=>Promise.resolve({});try{await J(Y)}catch(B){if(B.kind===I1){const{status:O=400,data:G,headers:U}=B.payload.api;return new Response(JSON.stringify(G),{status:O,headers:{"Content-Type":"application/json",...U}})}else throw console.error(B),B}let j={};try{j=await K()}catch(B){if(B.kind===I1){const{status:O=400,data:G,headers:U}=B.payload.api;return new Response(JSON.stringify(G),{status:O,headers:{"Content-Type":"application/json",...U}})}else throw console.error(B),B}if(j instanceof Response)return j;const z=Z.headers;return z.append("Content-Type","application/json"),Z.cookies.forEach((B)=>z.append("Set-Cookie",B.toString())),new Response(JSON.stringify(j),{headers:z})})}async handleViewRequest(w){const H=new URL(w.url);let A=null;try{let T=[],k=[],m=null,l={};for(let[g,M]of Object.entries(this.flatViewRoutes)){const W3=new Y3({pathname:g});if(W3.test({pathname:H.pathname})){m=g,l=W3.exec({pathname:H.pathname})?.pathname.groups,T=M.exec,k=M.middleware;break}}const p=this.runMiddleware(k),{data:D0,cookies:d0,user:o0}=await i0.run(async()=>{const g=new R1(w,l),M=i0.getStore();return M.setRequest(g),await p(g),{data:await Promise.all(T.map((V7)=>V7(g))),cookies:M.cookies,user:M.user}});A={data:D0,currentPathName:m,user:o0,params:l,cookies:d0}}catch(T){if(T.kind===I1)return new Response(null,{...T.payload.view});else throw T}const{data:X,params:V,currentPathName:W,user:$,cookies:J}=A,Y=X.reduce((T,k)=>{return{...T,...k}},{}),Z=this.i18nServiceContainer.isEnabled;let K={};if(Z){const T=this.i18nServiceContainer.detectLocale(new R1(w,V)),k=this.i18nServiceContainer.getPageTranslations(T,W);K={[T]:k}}if(H.searchParams.get("json")){const T=new Headers;return T.set("Content-Type","application/json"),J.forEach((k)=>T.append("Set-Cookie",k.toString())),T.append("Cache-Control",$?"private, max-age=1200, must-revalidate":"public, max-age=864000, must-revalidate"),new Response(JSON.stringify({data:{[H.pathname]:Y},i18n:K,is404:!W}),{headers:T})}const{styles:j,manifest:z,serverManifest:B,bootstrapModules:O}=this.renderParams,G={};let U=null;const R=(T,k)=>`"${T}": () => import("${k}")`,_=[];for(let T of["404",...$3(this.componentTree)])if(!z){U=`${process.env.APP_DIR}`;const k=await import(`${U}/views/${T}.tsx`);G[T]=k.default,_.push(R(T,`${U}/views/${T}.tsx`))}else{const k=B[`app/views/${T}.tsx`],m=await import(`${process.env.DIST_DIR}/server/${k?.file}`);G[T]=m.default;const l=z[`app/views/${T}.tsx`];if(l)_.push(R(T,`/${l?.file}`))}const D=`{${_.join(",")}}`,b=new Headers;b.set("Content-Type","text/html"),b.set("Cache-Control",$?"private, no-cache, no-store, max-age=0, must-revalidate":"public, max-age=864000, must-revalidate"),b.set("ETag",this.appId),A.cookies.forEach((T)=>b.append("Set-Cookie",T.toString()));const r={kind:"view",data:{pageData:{[H.pathname]:Y},i18n:K,auth:{user:$},routeManifest:this.routeManifest,router:{pathname:W,params:V,currentPath:H.pathname,searchParams:H.search,is404:!W?!0:!1},componentTree:[["404",[]],...this.componentTree]},head:{}},N=await $7(B4(J7,{children:[j,B4(this.Root,{data:r.data,viewImportMap:G})]}),{bootstrapScriptContent:`window.__GEMI_DATA__ = ${JSON.stringify(r.data)}; window.loaders=${D}`,bootstrapModules:O});return new Response(N,{status:!W?404:200,headers:b})}async fetch(w){const H=new URL(w.url);return this.kernel.run.bind(this.kernel)(async()=>{if(H.pathname.startsWith("/api"))return await this.handleApiRequest(w);else return await this.handleViewRequest(w)})}handleWebSocketMessage=(w,H)=>{};handleWebSocketOpen=(w)=>{console.log("socket opened")};handleWebSocketClose=(w,H,A)=>{console.log("socket closed")};websocket={message:this.handleWebSocketMessage,open:this.handleWebSocketOpen,close:this.handleWebSocketClose}}var X7=QX(w7(),1);var UX=X7.Prisma.defineExtension({name:"Gemi Policies",query:{async $allOperations({args:w,operation:H,query:A,model:X}){const W=H7.getStore().policiesServiceProvider.policiesList[`${X}Policies`];if(!W)return await A(w);if(!await W.all.call(W,H,w))throw new A7;return await A(w)}}});export{UX as prismaExtension,G4 as App};
142
+ */});var n6=s1((z4)=>{var __dirname="/Users/enes.tuefekci/personal/projects/gemi/node_modules/.prisma/client";Object.defineProperty(z4,"__esModule",{value:!0});var{PrismaClientKnownRequestError:wX,PrismaClientUnknownRequestError:HX,PrismaClientRustPanicError:AX,PrismaClientInitializationError:XX,PrismaClientValidationError:VX,NotFoundError:WX,getPrismaClient:$X,sqltag:JX,empty:YX,join:ZX,raw:KX,Decimal:jX,Debug:AW,objectEnumValues:a0,makeStrictEnum:zX,Extensions:i6,warnOnce:XW,defineDmmfProperty:BX,Public:FX,getRuntime:VW}=j4(),d={};z4.Prisma=d;z4.$Enums={};d.prismaVersion={client:"5.14.0",engine:"34ace0eb2704183d2c05b60b52fba5c43c13f303"};d.PrismaClientKnownRequestError=wX;d.PrismaClientUnknownRequestError=HX;d.PrismaClientRustPanicError=AX;d.PrismaClientInitializationError=XX;d.PrismaClientValidationError=VX;d.NotFoundError=WX;d.Decimal=jX;d.sql=JX;d.empty=YX;d.join=ZX;d.raw=KX;d.validator=FX.validator;d.getExtensionContext=i6.getExtensionContext;d.defineExtension=i6.defineExtension;d.DbNull=a0.instances.DbNull;d.JsonNull=a0.instances.JsonNull;d.AnyNull=a0.instances.AnyNull;d.NullTypes={DbNull:a0.classes.DbNull,JsonNull:a0.classes.JsonNull,AnyNull:a0.classes.AnyNull};var x0=import.meta.require("path");z4.Prisma.TransactionIsolationLevel=zX({Serializable:"Serializable"});z4.Prisma.UserScalarFieldEnum={id:"id",email:"email",name:"name"};z4.Prisma.PostScalarFieldEnum={id:"id",publicId:"publicId",title:"title",content:"content",published:"published",authorId:"authorId"};z4.Prisma.SortOrder={asc:"asc",desc:"desc"};z4.Prisma.NullsOrder={first:"first",last:"last"};z4.Prisma.ModelName={User:"User",Post:"Post"};var w0={generator:{name:"client",provider:{fromEnvVar:null,value:"prisma-client-js"},output:{value:"/Users/enes.tuefekci/personal/projects/gemi/node_modules/@prisma/client",fromEnvVar:null},config:{engineType:"library"},binaryTargets:[{fromEnvVar:null,value:"darwin-arm64",native:!0}],previewFeatures:["driverAdapters"],sourceFilePath:"/Users/enes.tuefekci/personal/projects/gemi/templates/saas-starter/prisma/schema.prisma"},relativeEnvPaths:{rootEnvPath:null,schemaEnvPath:"../../../templates/saas-starter/.env"},relativePath:"../../../templates/saas-starter/prisma",clientVersion:"5.14.0",engineVersion:"34ace0eb2704183d2c05b60b52fba5c43c13f303",datasourceNames:["db"],activeProvider:"sqlite",postinstall:!1,inlineDatasources:{db:{url:{fromEnvVar:"DATABASE_URL",value:null}}},inlineSchema:"// This is your Prisma schema file,\n// learn more about it in the docs: https://pris.ly/d/prisma-schema\n\ngenerator client {\n provider = \"prisma-client-js\"\n previewFeatures = [\"driverAdapters\"]\n}\n\ndatasource db {\n provider = \"sqlite\"\n url = env(\"DATABASE_URL\")\n}\n\nmodel User {\n id Int @id @default(autoincrement())\n email String @unique\n name String?\n posts Post[]\n}\n\nmodel Post {\n id Int @id @default(autoincrement())\n publicId String @unique @default(cuid())\n title String\n content String?\n published Boolean @default(false)\n author User? @relation(fields: [authorId], references: [id])\n authorId Int?\n}\n",inlineSchemaHash:"0fdc645180adab0c748b9fa16f9aca5de0687497c0b03b12504201d9f6937ff9",copyEngine:!0},o6=import.meta.require("fs");w0.dirname=__dirname;if(!o6.existsSync(x0.join(__dirname,"schema.prisma"))){const w=["../../node_modules/.prisma/client","../node_modules/.prisma/client"],H=w.find((A)=>{return o6.existsSync(x0.join(process.cwd(),A,"schema.prisma"))})??w[0];w0.dirname=x0.join(process.cwd(),H),w0.isBundled=!0}w0.runtimeDataModel=JSON.parse("{\"models\":{\"User\":{\"dbName\":null,\"fields\":[{\"name\":\"id\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":false,\"isId\":true,\"isReadOnly\":false,\"hasDefaultValue\":true,\"type\":\"Int\",\"default\":{\"name\":\"autoincrement\",\"args\":[]},\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"email\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":true,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"String\",\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"name\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":false,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"String\",\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"posts\",\"kind\":\"object\",\"isList\":true,\"isRequired\":true,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"Post\",\"relationName\":\"PostToUser\",\"relationFromFields\":[],\"relationToFields\":[],\"isGenerated\":false,\"isUpdatedAt\":false}],\"primaryKey\":null,\"uniqueFields\":[],\"uniqueIndexes\":[],\"isGenerated\":false},\"Post\":{\"dbName\":null,\"fields\":[{\"name\":\"id\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":false,\"isId\":true,\"isReadOnly\":false,\"hasDefaultValue\":true,\"type\":\"Int\",\"default\":{\"name\":\"autoincrement\",\"args\":[]},\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"publicId\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":true,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":true,\"type\":\"String\",\"default\":{\"name\":\"cuid\",\"args\":[]},\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"title\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"String\",\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"content\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":false,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"String\",\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"published\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":true,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":true,\"type\":\"Boolean\",\"default\":false,\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"author\",\"kind\":\"object\",\"isList\":false,\"isRequired\":false,\"isUnique\":false,\"isId\":false,\"isReadOnly\":false,\"hasDefaultValue\":false,\"type\":\"User\",\"relationName\":\"PostToUser\",\"relationFromFields\":[\"authorId\"],\"relationToFields\":[\"id\"],\"isGenerated\":false,\"isUpdatedAt\":false},{\"name\":\"authorId\",\"kind\":\"scalar\",\"isList\":false,\"isRequired\":false,\"isUnique\":false,\"isId\":false,\"isReadOnly\":true,\"hasDefaultValue\":false,\"type\":\"Int\",\"isGenerated\":false,\"isUpdatedAt\":false}],\"primaryKey\":null,\"uniqueFields\":[],\"uniqueIndexes\":[],\"isGenerated\":false}},\"enums\":{},\"types\":{}}");BX(z4.Prisma,w0.runtimeDataModel);w0.engineWasm=void 0;var{warnEnvConflicts:GX}=j4();GX({rootEnvPath:w0.relativeEnvPaths.rootEnvPath&&x0.resolve(w0.dirname,w0.relativeEnvPaths.rootEnvPath),schemaEnvPath:w0.relativeEnvPaths.schemaEnvPath&&x0.resolve(w0.dirname,w0.relativeEnvPaths.schemaEnvPath)});var OX=$X(w0);z4.PrismaClient=OX;Object.assign(z4,d);x0.join(__dirname,"libquery_engine-darwin-arm64.dylib.node");x0.join(process.cwd(),"../../node_modules/.prisma/client/libquery_engine-darwin-arm64.dylib.node");x0.join(__dirname,"schema.prisma");x0.join(process.cwd(),"../../node_modules/.prisma/client/schema.prisma")});var t6=s1(($W,r6)=>{r6.exports={...n6()}});var w7=s1((JW,e6)=>{e6.exports={...t6()}});function $3(w){let H=[];for(let[A,X]of w)H.push(A,...$3(X).flat());return Array.from(new Set(H))}function Q1(w){const H=[];for(let[A,X]of Object.entries(w))if("run"in X){const V=X.viewPath;if("children"in X){const W=new X.children,$=Q1(W.routes);H.push([V,$])}else H.push([V,[]])}else{const V=new X,W=Q1(V.routes);H.push(...W)}return H}function U1(w){const H={};for(let[A,X]of Object.entries(w))if("run"in X){const V=X;if("children"in V){const W=new V.children,$=U1(W.routes);for(let[J,{exec:Y,middleware:Z}]of Object.entries($)){const K=A==="/"?J:`${A}${J}`,j=J==="/"&&A!=="/"?A:K;H[j]={exec:[V.run.bind(V),...Y],middleware:[...V.middlewares,...Z]}}}else H[A]={exec:[V.run.bind(V)],middleware:V.middlewares}}else{const V=new X,W=U1(V.routes);for(let[$,{exec:J,middleware:Y}]of Object.entries(W)){const Z=A==="/"?$:`${A}${$}`,K=$==="/"&&A!=="/"?A:Z;H[K]={exec:J,middleware:[...V.middlewares,...Y]}}}return Object.fromEntries(Object.entries(H).sort(([A],[X])=>{const V=A.split("/").length+A.split(":").length,W=X.split("/").length+X.split(":").length;return V-W}))}function x1(w){const H={};for(let[A,X]of Object.entries(w))if("run"in X){const V=X.viewPath;if("children"in X)H[A]=[V];if("children"in X){const W=new X.children,$=x1(W.routes);for(let[J,Y]of Object.entries($)){const Z=A==="/"?J:`${A}${J}`,K=J==="/"&&A!=="/"?A:Z;H[K]=[V,...Y]}}else H[A]=[V]}else{const V=new X,W=x1(V.routes);for(let[$,J]of Object.entries(W)){const Y=A==="/"?$:`${A}${$}`,Z=$==="/"&&A!=="/"?A:Y;H[Z]=J}}return H}var W7=function(w){return D1(w)};function J3(w){const H={};for(let[A,X]of Object.entries(w))if("run"in X){const V=X;if(!H[A])H[A]={};const{method:W,middlewares:$}=V,J=V.run.bind(V);H[A][W]={exec:J,middleware:[...$,...V.middlewares]}}else if(W7(X)){const V=new X,W=J3(V.routes);for(let[$,J]of Object.entries(W)){const Y=$==="/"?"":$,Z=A==="/"?"":A,K=`${Z}${Y}`===""?"/":`${Z}${Y}`;if(!H[K])H[K]={};for(let[j,z]of Object.entries(J))H[K][j]={exec:z.exec,middleware:[V.middleware,...V.middlewares,...z.middleware]}}}else for(let V of Object.values(X)){if(!H[A])H[A]={};const{method:W,middlewares:$}=V,J=V.run.bind(V);H[A][W]={exec:J,middleware:$}}return Object.fromEntries(Object.entries(H).sort(([A],[X])=>{const V=A.split("/").length+A.split(":").length,W=X.split("/").length+X.split(":").length;return V-W}))}import{renderToReadableStream as $7} from"react-dom/server.browser";import{createElement as B4,Fragment as J7} from"react";class G4{renderParams={styles:[],manifest:{},serverManifest:{},bootstrapModules:[]};flatViewRoutes={};flatApiRoutes={};routeManifest={};name="APP";appId;componentTree;middlewareAliases={};devVersion=0;params;apiRouter;viewRouter;Root;kernel;i18nServiceContainer;constructor(w){this.params=w,this.apiRouter=w.apiRouter,this.viewRouter=w.viewRouter,this.Root=w.root,this.kernel=new w.kernel,this.prepare(),this.appId=F4(Date.now()),this.i18nServiceContainer=this.kernel.getServices().i18nServiceContainer,this.i18nServiceContainer.boot()}prepare(){const w=this.params;this.middlewareAliases=w.middlewareAliases??{};const H=this.kernel.getServices(),A=H.authenticationServiceProvider.basePath;let X={"/":this.viewRouter,[A]:H.authenticationServiceProvider.routers.view},V={"/":this.apiRouter,[A]:H.authenticationServiceProvider.routers.api,"/__gemi__/services/i18n":H.i18nServiceContainer.routers.api};for(let W of w.plugins??[]){const $=new W;if($.viewRouter)X={...X,[$.viewRoutesBasePath]:$.viewRouter};if($.apiRouter)V={...V,[$.apiRoutesBasePath]:$.apiRouter}}this.flatViewRoutes=U1(X),this.componentTree=Q1(X),this.routeManifest=x1(X),this.flatApiRoutes=J3(V)}getComponentTree(){return this.componentTree}setRenderParams(w){this.renderParams=w}runMiddleware(w){return w.map((H)=>{if(typeof H==="string"){const A=H,V=this.kernel.getServices().middlewareServiceProvider.aliases[A];if(V)return new V().run}else{if(D1(H))return new H().run;return H}}).filter(Boolean).reduce((H,A)=>{return async(X,V)=>{return{...await H(X,V),...await A(X,V)}}},(H)=>Promise.resolve({}))}async handleApiRequest(w){const A=new URL(w.url).pathname.replace("/api","");let X,V={};for(let[Y]of Object.entries(this.flatApiRoutes))try{const Z=new Y3({pathname:Y});if(Z.test({pathname:A})){X=this.flatApiRoutes[Y],V=Z.exec({pathname:A})?.pathname.groups;break}}catch(Z){}if(!X||!X[w.method])return new Response(JSON.stringify({error:{message:"Not found"}}),{status:404});const W=X[w.method].exec,$=X[w.method].middleware,J=this.runMiddleware($);return await i0.run(async()=>{const Y=new R1(w,V),Z=i0.getStore();Z.setRequest(Y);let K=W?()=>W(Y,V):()=>Promise.resolve({});try{await J(Y)}catch(B){if(B.kind===I1){const{status:O=400,data:G,headers:U}=B.payload.api;return new Response(JSON.stringify(G),{status:O,headers:{"Content-Type":"application/json",...U}})}else throw console.error(B),B}let j={};try{j=await K()}catch(B){if(B.kind===I1){const{status:O=400,data:G,headers:U}=B.payload.api;return new Response(JSON.stringify(G),{status:O,headers:{"Content-Type":"application/json",...U}})}else throw console.error(B),B}if(j instanceof Response)return j;const z=Z.headers;return z.append("Content-Type","application/json"),Z.cookies.forEach((B)=>z.append("Set-Cookie",B.toString())),new Response(JSON.stringify(j),{headers:z})})}async handleViewRequest(w){const H=new URL(w.url);let A=null;try{let T=[],k=[],m=null,l={};for(let[g,M]of Object.entries(this.flatViewRoutes)){const W3=new Y3({pathname:g});if(W3.test({pathname:H.pathname})){m=g,l=W3.exec({pathname:H.pathname})?.pathname.groups,T=M.exec,k=M.middleware;break}}const p=this.runMiddleware(k),{data:D0,cookies:d0,user:o0}=await i0.run(async()=>{const g=new R1(w,l),M=i0.getStore();return M.setRequest(g),await p(g),{data:await Promise.all(T.map((V7)=>V7(g))),cookies:M.cookies,user:M.user}});A={data:D0,currentPathName:m,user:o0,params:l,cookies:d0}}catch(T){if(T.kind===I1)return new Response(null,{...T.payload.view});else throw T}const{data:X,params:V,currentPathName:W,user:$,cookies:J}=A,Y=X.reduce((T,k)=>{return{...T,...k}},{}),Z=this.i18nServiceContainer.isEnabled;let K={};if(Z){const T=this.i18nServiceContainer.detectLocale(new R1(w,V)),k=this.i18nServiceContainer.getPageTranslations(T,W);K={[T]:k}}if(H.searchParams.get("json")){const T=new Headers;return T.set("Content-Type","application/json"),J.forEach((k)=>T.append("Set-Cookie",k.toString())),T.append("Cache-Control",$?"private, no-cache, no-store, max-age=0, must-revalidate":"public, max-age=864000, must-revalidate"),new Response(JSON.stringify({data:{[H.pathname]:Y},i18n:K,is404:!W}),{headers:T})}const{styles:j,manifest:z,serverManifest:B,bootstrapModules:O}=this.renderParams,G={};let U=null;const R=(T,k)=>`"${T}": () => import("${k}")`,_=[];for(let T of["404",...$3(this.componentTree)])if(!z){U=`${process.env.APP_DIR}`;const k=await import(`${U}/views/${T}.tsx`);G[T]=k.default,_.push(R(T,`${U}/views/${T}.tsx`))}else{const k=B[`app/views/${T}.tsx`],m=await import(`${process.env.DIST_DIR}/server/${k?.file}`);G[T]=m.default;const l=z[`app/views/${T}.tsx`];if(l)_.push(R(T,`/${l?.file}`))}const D=`{${_.join(",")}}`,b=new Headers;b.set("Content-Type","text/html"),b.set("Cache-Control",$?"private, no-cache, no-store, max-age=0, must-revalidate":"public, max-age=864000, must-revalidate"),b.set("ETag",this.appId),A.cookies.forEach((T)=>b.append("Set-Cookie",T.toString()));const r={kind:"view",data:{pageData:{[H.pathname]:Y},i18n:K,auth:{user:$},routeManifest:this.routeManifest,router:{pathname:W,params:V,currentPath:H.pathname,searchParams:H.search,is404:!W?!0:!1},componentTree:[["404",[]],...this.componentTree]},head:{}},N=await $7(B4(J7,{children:[j,B4(this.Root,{data:r.data,viewImportMap:G})]}),{bootstrapScriptContent:`window.__GEMI_DATA__ = ${JSON.stringify(r.data)}; window.loaders=${D}`,bootstrapModules:O});return new Response(N,{status:!W?404:200,headers:b})}async fetch(w){const H=new URL(w.url);return this.kernel.run.bind(this.kernel)(async()=>{if(H.pathname.startsWith("/api"))return await this.handleApiRequest(w);else return await this.handleViewRequest(w)})}handleWebSocketMessage=(w,H)=>{};handleWebSocketOpen=(w)=>{console.log("socket opened")};handleWebSocketClose=(w,H,A)=>{console.log("socket closed")};websocket={message:this.handleWebSocketMessage,open:this.handleWebSocketOpen,close:this.handleWebSocketClose}}var X7=QX(w7(),1);var UX=X7.Prisma.defineExtension({name:"Gemi Policies",query:{async $allOperations({args:w,operation:H,query:A,model:X}){const W=H7.getStore().policiesServiceProvider.policiesList[`${X}Policies`];if(!W)return await A(w);if(!await W.all.call(W,H,w))throw new A7;return await A(w)}}});export{UX as prismaExtension,G4 as App};
@@ -0,0 +1,6 @@
1
+ // @bun
2
+ import{y as h} from"./chunk-7ce930fe69575c87.js";import{C as g,R as P,U as w,ia as I} from"./chunk-f34a78d9e3a62c43.js";import"./chunk-a0003b7feea6fae6.js";import{kb as d} from"./chunk-3cbc1c9cdc091b43.js";var i=h(d(),1);import A from"fs/promises";var C=h(d(),1);var E="169.254.170.2",R="169.254.170.23",p="[fd00:ec2::23]",S=(e,c)=>{if(e.protocol==="https:")return;if(e.hostname===E||e.hostname===R||e.hostname===p)return;if(e.hostname.includes("[")){if(e.hostname==="[::1]"||e.hostname==="[0000:0000:0000:0000:0000:0000:0000:0001]")return}else{if(e.hostname==="localhost")return;const a=e.hostname.split("."),r=(t)=>{const s=parseInt(t,10);return 0<=s&&s<=255};if(a[0]==="127"&&r(a[1])&&r(a[2])&&r(a[3])&&a.length===4)return}throw new C.CredentialsProviderError(`URL not accepted. It must either be HTTPS or match one of the following:
3
+ - loopback CIDR 127.0.0.0/8 or [::1/128]
4
+ - ECS container host 169.254.170.2
5
+ - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:c})};var m=h(d(),1);function K(e){return new g({protocol:e.protocol,hostname:e.hostname,port:Number(e.port),path:e.pathname,query:Array.from(e.searchParams.entries()).reduce((c,[a,r])=>{return c[a]=r,c},{}),fragment:e.hash})}async function T(e,c){const r=await w(e.body).transformToString();if(e.statusCode===200){const t=JSON.parse(r);if(typeof t.AccessKeyId!=="string"||typeof t.SecretAccessKey!=="string"||typeof t.Token!=="string"||typeof t.Expiration!=="string")throw new m.CredentialsProviderError("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:c});return{accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,sessionToken:t.Token,expiration:I(t.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let t={};try{t=JSON.parse(r)}catch(s){}throw Object.assign(new m.CredentialsProviderError(`Server responded with status: ${e.statusCode}`,{logger:c}),{Code:t.Code,Message:t.Message})}throw new m.CredentialsProviderError(`Server responded with status: ${e.statusCode}`,{logger:c})}var x=(e,c,a)=>{return async()=>{for(let r=0;r<c;++r)try{return await e()}catch(t){await new Promise((s)=>setTimeout(s,a))}return await e()}};var O="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",b="http://169.254.170.2",_="AWS_CONTAINER_CREDENTIALS_FULL_URI",v="AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE",B="AWS_CONTAINER_AUTHORIZATION_TOKEN",D=(e={})=>{e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let c;const a=e.awsContainerCredentialsRelativeUri??process.env[O],r=e.awsContainerCredentialsFullUri??process.env[_],t=e.awsContainerAuthorizationToken??process.env[B],s=e.awsContainerAuthorizationTokenFile??process.env[v],n=e.logger?.constructor?.name==="NoOpLogger"||!e.logger?console.warn:e.logger.warn;if(a&&r)n("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),n("awsContainerCredentialsFullUri will take precedence.");if(t&&s)n("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),n("awsContainerAuthorizationToken will take precedence.");if(r)c=r;else if(a)c=`${b}${a}`;else throw new i.CredentialsProviderError(`No HTTP credential provider host provided.
6
+ Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:e.logger});const y=new URL(c);S(y,e.logger);const u=new P({requestTimeout:e.timeout??1000,connectionTimeout:e.timeout??1000});return x(async()=>{const o=K(y);if(t)o.headers.Authorization=t;else if(s)o.headers.Authorization=(await A.readFile(s)).toString();try{const f=await u.handle(o);return T(f.response)}catch(f){throw new i.CredentialsProviderError(String(f),{logger:e.logger})}},e.maxRetries??3,e.timeout??1000)};export{D as fromHttp};
@@ -1,2 +1,2 @@
1
1
  // @bun
2
- import{y as h} from"./chunk-7ce930fe69575c87.js";import"./chunk-a0003b7feea6fae6.js";import{kb as _} from"./chunk-3cbc1c9cdc091b43.js";import{nb as N,ob as W,pb as I,sb as v,tb as P} from"./chunk-934ebff128f86ef1.js";var T=h(_(),1);var H=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var u=h(_(),1);var K=300000,g="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var R={},b=async(e)=>{const{SSOOIDCClient:r}=await import("./chunk-3bedef94ef8dba4a.js");if(R[e])return R[e];const s=new r({region:e});return R[e]=s,s};var G=async(e,r)=>{const{CreateTokenCommand:s}=await import("./chunk-3bedef94ef8dba4a.js");return(await b(r)).send(new s({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var U=h(_(),1);var D=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new U.TokenProviderError(`Token is expired. ${g}`,!1)};var q=h(_(),1);var p=(e,r,s=!1)=>{if(typeof r==="undefined")throw new q.TokenProviderError(`Value not present for '${e}' in SSO Token${s?". Cannot refresh":""}. ${g}`,!1)};import{promises as B} from"fs";var{writeFile:Q}=B,j=(e,r)=>{const s=W(e),t=JSON.stringify(r,null,2);return Q(s,t)};var X=new Date(0),z=(e={})=>async()=>{e.logger?.debug("@aws-sdk/token-providers - fromSso");const r=await P(e),s=N(e),t=r[s];if(!t)throw new u.TokenProviderError(`Profile '${s}' could not be found in shared credentials file.`,!1);else if(!t.sso_session)throw new u.TokenProviderError(`Profile '${s}' is missing required property 'sso_session'.`);const i=t.sso_session,a=(await v(e))[i];if(!a)throw new u.TokenProviderError(`Sso session '${i}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!a[n])throw new u.TokenProviderError(`Sso session '${i}' is missing required property '${n}'.`,!1);const{sso_start_url:l,sso_region:f}=a;let o;try{o=await I(i)}catch(n){throw new u.TokenProviderError(`The SSO session token associated with profile=${s} was not found or is invalid. ${g}`,!1)}p("accessToken",o.accessToken),p("expiresAt",o.expiresAt);const{accessToken:E,expiresAt:x}=o,c={token:E,expiration:new Date(x)};if(c.expiration.getTime()-Date.now()>K)return c;if(Date.now()-X.getTime()<30000)return D(c),c;p("clientId",o.clientId,!0),p("clientSecret",o.clientSecret,!0),p("refreshToken",o.refreshToken,!0);try{X.setTime(Date.now());const n=await G(o,f);p("accessToken",n.accessToken),p("expiresIn",n.expiresIn);const w=new Date(Date.now()+n.expiresIn*1000);try{await j(i,{...o,accessToken:n.accessToken,expiresAt:w.toISOString(),refreshToken:n.refreshToken})}catch(C){}return{token:n.accessToken,expiration:w}}catch(n){return D(c),c}};var k=h(_(),1);var y=!1,A=async({ssoStartUrl:e,ssoSession:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:i,ssoClient:S,clientConfig:a,profile:l,logger:f})=>{let o;const E="To refresh this SSO session run aws sso login with the corresponding profile.";if(r)try{const d=await z({profile:l})();o={accessToken:d.token,expiresAt:new Date(d.expiration).toISOString()}}catch(d){throw new k.CredentialsProviderError(d.message,{tryNextLink:y,logger:f})}else try{o=await I(e)}catch(d){throw new k.CredentialsProviderError("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:y,logger:f})}if(new Date(o.expiresAt).getTime()-Date.now()<=0)throw new k.CredentialsProviderError("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:y,logger:f});const{accessToken:x}=o,{SSOClient:c,GetRoleCredentialsCommand:n}=await import("./chunk-2a328e3beda74e4f.js"),w=S||new c(Object.assign({},a??{},{region:a?.region??t}));let C;try{C=await w.send(new n({accountId:s,roleName:i,accessToken:x}))}catch(d){throw new k.CredentialsProviderError(d,{tryNextLink:y,logger:f})}const{roleCredentials:{accessKeyId:m,secretAccessKey:O,sessionToken:$,expiration:F,credentialScope:L,accountId:M}={}}=C;if(!m||!O||!$||!F)throw new k.CredentialsProviderError("SSO returns an invalid temporary credential.",{tryNextLink:y,logger:f});return{accessKeyId:m,secretAccessKey:O,sessionToken:$,expiration:new Date(F),...L&&{credentialScope:L},...M&&{accountId:M}}};var J=h(_(),1),V=(e,r)=>{const{sso_start_url:s,sso_account_id:t,sso_region:i,sso_role_name:S}=e;if(!s||!t||!i||!S)throw new J.CredentialsProviderError('Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", '+`"sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:r});return e};var Ee=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");const{ssoStartUrl:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:i,ssoSession:S}=e,{ssoClient:a}=e,l=N(e);if(!r&&!s&&!t&&!i&&!S){const o=(await P(e))[l];if(!o)throw new T.CredentialsProviderError(`Profile ${l} was not found.`,{logger:e.logger});if(!H(o))throw new T.CredentialsProviderError(`Profile ${l} is not configured with SSO credentials.`,{logger:e.logger});if(o?.sso_session){const m=(await v(e))[o.sso_session],O=` configurations in profile ${l} and sso-session ${o.sso_session}`;if(t&&t!==m.sso_region)throw new T.CredentialsProviderError("Conflicting SSO region"+O,{tryNextLink:!1,logger:e.logger});if(r&&r!==m.sso_start_url)throw new T.CredentialsProviderError("Conflicting SSO start_url"+O,{tryNextLink:!1,logger:e.logger});o.sso_region=m.sso_region,o.sso_start_url=m.sso_start_url}const{sso_start_url:E,sso_account_id:x,sso_region:c,sso_role_name:n,sso_session:w}=V(o,e.logger);return A({ssoStartUrl:E,ssoSession:w,ssoAccountId:x,ssoRegion:c,ssoRoleName:n,ssoClient:a,clientConfig:e.clientConfig,profile:l})}else if(!r||!s||!t||!i)throw new T.CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return A({ssoStartUrl:r,ssoSession:S,ssoAccountId:s,ssoRegion:t,ssoRoleName:i,ssoClient:a,clientConfig:e.clientConfig,profile:l})};export{V as validateSsoProfile,H as isSsoProfile,Ee as fromSSO};
2
+ import{y as h} from"./chunk-7ce930fe69575c87.js";import"./chunk-a0003b7feea6fae6.js";import{kb as _} from"./chunk-3cbc1c9cdc091b43.js";import{nb as N,ob as W,pb as I,sb as v,tb as P} from"./chunk-934ebff128f86ef1.js";var T=h(_(),1);var H=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var u=h(_(),1);var K=300000,g="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var R={},b=async(e)=>{const{SSOOIDCClient:r}=await import("./chunk-78534576cf359780.js");if(R[e])return R[e];const s=new r({region:e});return R[e]=s,s};var G=async(e,r)=>{const{CreateTokenCommand:s}=await import("./chunk-78534576cf359780.js");return(await b(r)).send(new s({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var U=h(_(),1);var D=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new U.TokenProviderError(`Token is expired. ${g}`,!1)};var q=h(_(),1);var p=(e,r,s=!1)=>{if(typeof r==="undefined")throw new q.TokenProviderError(`Value not present for '${e}' in SSO Token${s?". Cannot refresh":""}. ${g}`,!1)};import{promises as B} from"fs";var{writeFile:Q}=B,j=(e,r)=>{const s=W(e),t=JSON.stringify(r,null,2);return Q(s,t)};var X=new Date(0),z=(e={})=>async()=>{e.logger?.debug("@aws-sdk/token-providers - fromSso");const r=await P(e),s=N(e),t=r[s];if(!t)throw new u.TokenProviderError(`Profile '${s}' could not be found in shared credentials file.`,!1);else if(!t.sso_session)throw new u.TokenProviderError(`Profile '${s}' is missing required property 'sso_session'.`);const i=t.sso_session,a=(await v(e))[i];if(!a)throw new u.TokenProviderError(`Sso session '${i}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!a[n])throw new u.TokenProviderError(`Sso session '${i}' is missing required property '${n}'.`,!1);const{sso_start_url:l,sso_region:f}=a;let o;try{o=await I(i)}catch(n){throw new u.TokenProviderError(`The SSO session token associated with profile=${s} was not found or is invalid. ${g}`,!1)}p("accessToken",o.accessToken),p("expiresAt",o.expiresAt);const{accessToken:E,expiresAt:x}=o,c={token:E,expiration:new Date(x)};if(c.expiration.getTime()-Date.now()>K)return c;if(Date.now()-X.getTime()<30000)return D(c),c;p("clientId",o.clientId,!0),p("clientSecret",o.clientSecret,!0),p("refreshToken",o.refreshToken,!0);try{X.setTime(Date.now());const n=await G(o,f);p("accessToken",n.accessToken),p("expiresIn",n.expiresIn);const w=new Date(Date.now()+n.expiresIn*1000);try{await j(i,{...o,accessToken:n.accessToken,expiresAt:w.toISOString(),refreshToken:n.refreshToken})}catch(C){}return{token:n.accessToken,expiration:w}}catch(n){return D(c),c}};var k=h(_(),1);var y=!1,A=async({ssoStartUrl:e,ssoSession:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:i,ssoClient:S,clientConfig:a,profile:l,logger:f})=>{let o;const E="To refresh this SSO session run aws sso login with the corresponding profile.";if(r)try{const d=await z({profile:l})();o={accessToken:d.token,expiresAt:new Date(d.expiration).toISOString()}}catch(d){throw new k.CredentialsProviderError(d.message,{tryNextLink:y,logger:f})}else try{o=await I(e)}catch(d){throw new k.CredentialsProviderError("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:y,logger:f})}if(new Date(o.expiresAt).getTime()-Date.now()<=0)throw new k.CredentialsProviderError("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:y,logger:f});const{accessToken:x}=o,{SSOClient:c,GetRoleCredentialsCommand:n}=await import("./chunk-aef3f1c1429e6058.js"),w=S||new c(Object.assign({},a??{},{region:a?.region??t}));let C;try{C=await w.send(new n({accountId:s,roleName:i,accessToken:x}))}catch(d){throw new k.CredentialsProviderError(d,{tryNextLink:y,logger:f})}const{roleCredentials:{accessKeyId:m,secretAccessKey:O,sessionToken:$,expiration:F,credentialScope:L,accountId:M}={}}=C;if(!m||!O||!$||!F)throw new k.CredentialsProviderError("SSO returns an invalid temporary credential.",{tryNextLink:y,logger:f});return{accessKeyId:m,secretAccessKey:O,sessionToken:$,expiration:new Date(F),...L&&{credentialScope:L},...M&&{accountId:M}}};var J=h(_(),1),V=(e,r)=>{const{sso_start_url:s,sso_account_id:t,sso_region:i,sso_role_name:S}=e;if(!s||!t||!i||!S)throw new J.CredentialsProviderError('Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", '+`"sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:r});return e};var Ee=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");const{ssoStartUrl:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:i,ssoSession:S}=e,{ssoClient:a}=e,l=N(e);if(!r&&!s&&!t&&!i&&!S){const o=(await P(e))[l];if(!o)throw new T.CredentialsProviderError(`Profile ${l} was not found.`,{logger:e.logger});if(!H(o))throw new T.CredentialsProviderError(`Profile ${l} is not configured with SSO credentials.`,{logger:e.logger});if(o?.sso_session){const m=(await v(e))[o.sso_session],O=` configurations in profile ${l} and sso-session ${o.sso_session}`;if(t&&t!==m.sso_region)throw new T.CredentialsProviderError("Conflicting SSO region"+O,{tryNextLink:!1,logger:e.logger});if(r&&r!==m.sso_start_url)throw new T.CredentialsProviderError("Conflicting SSO start_url"+O,{tryNextLink:!1,logger:e.logger});o.sso_region=m.sso_region,o.sso_start_url=m.sso_start_url}const{sso_start_url:E,sso_account_id:x,sso_region:c,sso_role_name:n,sso_session:w}=V(o,e.logger);return A({ssoStartUrl:E,ssoSession:w,ssoAccountId:x,ssoRegion:c,ssoRoleName:n,ssoClient:a,clientConfig:e.clientConfig,profile:l})}else if(!r||!s||!t||!i)throw new T.CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return A({ssoStartUrl:r,ssoSession:S,ssoAccountId:s,ssoRegion:t,ssoRoleName:i,ssoClient:a,clientConfig:e.clientConfig,profile:l})};export{V as validateSsoProfile,H as isSsoProfile,Ee as fromSSO};
@@ -0,0 +1,2 @@
1
+ // @bun
2
+ import"./chunk-81f5123a24c19089.js";import{y as J} from"./chunk-7ce930fe69575c87.js";import{A as w0,B as G0,C as W0,E as Nl,G as F0,K as Wl,L as Tl,N as Al,O as Rl,R as sl,S as _l,Y as F,Z as Hh,_ as Id,ca as T0,ea as S,ga as u,ja as A0,la as $0,ma as T,na as R0,oa as bl,pa as fl,qa as I0,ra as H0,sa as eh} from"./chunk-f34a78d9e3a62c43.js";import{Aa as k0,Ba as K0,Ca as Bd,Fa as b,Ga as Qh,Ha as B0,Ia as Pl,Ja as vl,Ka as Ml,La as q0,Ma as Cl,Na as Ol,Oa as gl,Pa as xl,Qa as y0,Ra as Q0,Ta as B,Ua as X0,Va as il,Xa as cl,Ya as Y0,Za as el,_a as Z0,ab as dh,bb as pl,cb as nl,db as ol,eb as ul,fb as S0,gb as m0,ya as D0,za as E0} from"./chunk-1c439804a4c5f8e7.js";import"./chunk-a0003b7feea6fae6.js";import{ib as Yd,jb as f} from"./chunk-7195a8718fcd8215.js";import"./chunk-3cbc1c9cdc091b43.js";import{lb as Xh} from"./chunk-b9f4c1fce7152fc8.js";import"./chunk-934ebff128f86ef1.js";var C=J(Qh(),1);var wl=J(dh(),1),wh=J(Bd(),1);var qd=function(h){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:h.region},propertiesExtractor:(d,l)=>({signingProperties:{config:d,context:l}})}},dl=function(h){return{schemeId:"smithy.api#noAuth"}},Gl=async(h,d,l)=>{return{operation:wh.getSmithyContext(d).operation,region:await wh.normalizeProvider(h.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}},Il=(h)=>{const d=[];switch(h.operation){case"AssumeRoleWithSAML":{d.push(dl(h));break}case"AssumeRoleWithWebIdentity":{d.push(dl(h));break}default:d.push(qd(h))}return d},yd=(h)=>({...h,stsClientCtor:A}),Hl=(h)=>{const d=yd(h);return{...wl.resolveAwsSdkSigV4Config(d)}};var Sl=(h)=>{return{...h,useDualstackEndpoint:h.useDualstackEndpoint??!1,useFipsEndpoint:h.useFipsEndpoint??!1,useGlobalEndpoint:h.useGlobalEndpoint??!1,defaultSigningName:"sts"}},E={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var ml={name:"@aws-sdk/client-sts",description:"AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",version:"3.629.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sts","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"rimraf ./dist-types tsconfig.types.tsbuildinfo && tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sts",test:"yarn test:unit","test:unit":"jest"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/client-sso-oidc":"3.629.0","@aws-sdk/core":"3.629.0","@aws-sdk/credential-provider-node":"3.629.0","@aws-sdk/middleware-host-header":"3.620.0","@aws-sdk/middleware-logger":"3.609.0","@aws-sdk/middleware-recursion-detection":"3.620.0","@aws-sdk/middleware-user-agent":"3.620.0","@aws-sdk/region-config-resolver":"3.614.0","@aws-sdk/types":"3.609.0","@aws-sdk/util-endpoints":"3.614.0","@aws-sdk/util-user-agent-browser":"3.609.0","@aws-sdk/util-user-agent-node":"3.614.0","@smithy/config-resolver":"^3.0.5","@smithy/core":"^2.3.2","@smithy/fetch-http-handler":"^3.2.4","@smithy/hash-node":"^3.0.3","@smithy/invalid-dependency":"^3.0.3","@smithy/middleware-content-length":"^3.0.5","@smithy/middleware-endpoint":"^3.1.0","@smithy/middleware-retry":"^3.0.14","@smithy/middleware-serde":"^3.0.3","@smithy/middleware-stack":"^3.0.3","@smithy/node-config-provider":"^3.1.4","@smithy/node-http-handler":"^3.1.4","@smithy/protocol-http":"^4.1.0","@smithy/smithy-client":"^3.1.12","@smithy/types":"^3.3.0","@smithy/url-parser":"^3.0.3","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.14","@smithy/util-defaults-mode-node":"^3.0.14","@smithy/util-endpoints":"^2.0.5","@smithy/util-middleware":"^3.0.3","@smithy/util-retry":"^3.0.3","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sts",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sts"}};var Gh=J(dh(),1);var tl=J(Qh(),1);var Ll=J(dh(),1),jl=J(Qh(),1);var al=J(Yd(),1);var Jl={["required"]:!1,["type"]:"String"},yh={["required"]:!0,default:!1,["type"]:"Boolean"},Ql={["ref"]:"Endpoint"},Dl={["fn"]:"isSet",["argv"]:[{["ref"]:"Region"}]},D={["ref"]:"Region"},El={["fn"]:"aws.partition",["argv"]:[D],assign:"PartitionResult"},Xl={["ref"]:"UseFIPS"},Yl={["ref"]:"UseDualStack"},k={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"us-east-1"}]},headers:{}},X={},kl={conditions:[{["fn"]:"stringEquals",["argv"]:[D,"aws-global"]}],["endpoint"]:k,["type"]:"endpoint"},Zl={["fn"]:"booleanEquals",["argv"]:[Xl,!0]},$l={["fn"]:"booleanEquals",["argv"]:[Yl,!0]},Kl={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},Ul={["ref"]:"PartitionResult"},Fl={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[Ul,"supportsDualStack"]}]},Bl=[{["fn"]:"isSet",["argv"]:[Ql]}],ql=[Zl],yl=[$l],Xd={version:"1.0",parameters:{Region:Jl,UseDualStack:yh,UseFIPS:yh,Endpoint:Jl,UseGlobalEndpoint:yh},rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseGlobalEndpoint"},!0]},{["fn"]:"not",["argv"]:Bl},Dl,El,{["fn"]:"booleanEquals",["argv"]:[Xl,!1]},{["fn"]:"booleanEquals",["argv"]:[Yl,!1]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"ap-northeast-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"ap-south-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"ap-southeast-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"ap-southeast-2"]}],endpoint:k,["type"]:"endpoint"},kl,{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"ca-central-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"eu-central-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"eu-north-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"eu-west-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"eu-west-2"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"eu-west-3"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"sa-east-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"us-east-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"us-east-2"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"us-west-1"]}],endpoint:k,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[D,"us-west-2"]}],endpoint:k,["type"]:"endpoint"},{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"{Region}"}]},headers:X},["type"]:"endpoint"}],["type"]:"tree"},{conditions:Bl,rules:[{conditions:ql,error:"Invalid Configuration: FIPS and custom endpoint are not supported",["type"]:"error"},{conditions:yl,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",["type"]:"error"},{endpoint:{url:Ql,properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{conditions:[Dl],rules:[{conditions:[El],rules:[{conditions:[Zl,$l],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,Kl]},Fl],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",["type"]:"error"}],["type"]:"tree"},{conditions:ql,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[Kl,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[Ul,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:X,headers:X},["type"]:"endpoint"},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",["type"]:"error"}],["type"]:"tree"},{conditions:yl,rules:[{conditions:[Fl],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",["type"]:"error"}],["type"]:"tree"},kl,{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"}],["type"]:"tree"},{error:"Invalid Configuration: Missing Region",["type"]:"error"}]},Vl=Xd;var zl=(h,d={})=>{return vl(Vl,{endpointParams:h,logger:d.logger})};Pl.aws=Ml;var rl=(h)=>{return{apiVersion:"2011-06-15",base64Decoder:h?.base64Decoder??Wl,base64Encoder:h?.base64Encoder??Rl,disableHostPrefix:h?.disableHostPrefix??!1,endpointProvider:h?.endpointProvider??zl,extensions:h?.extensions??[],httpAuthSchemeProvider:h?.httpAuthSchemeProvider??Il,httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(d)=>d.getIdentityProvider("aws.auth#sigv4"),signer:new Ll.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(d)=>d.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new jl.NoAuthSigner}],logger:h?.logger??new Nl,serviceId:h?.serviceId??"STS",urlParser:h?.urlParser??al.parseUrl,utf8Decoder:h?.utf8Decoder??Tl,utf8Encoder:h?.utf8Encoder??Al}};var h0=(h)=>{fl(process.version);const d=ul(h),l=()=>d().then(bl),w=rl(h);return Gh.emitWarningIfUnsupportedVersion(process.version),{...w,...h,runtime:"node",defaultsMode:d,bodyLengthChecker:h?.bodyLengthChecker??ol,credentialDefaultProvider:h?.credentialDefaultProvider??Xh,defaultUserAgentProvider:h?.defaultUserAgentProvider??pl({serviceId:w.serviceId,clientVersion:ml.version}),httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(G)=>G.getIdentityProvider("aws.auth#sigv4")||(async(H)=>await Xh(H?.__config||{})()),signer:new Gh.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(G)=>G.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new tl.NoAuthSigner}],maxAttempts:h?.maxAttempts??f(cl),region:h?.region??f(gl,xl),requestHandler:sl.create(h?.requestHandler??l),retryMode:h?.retryMode??f({...el,default:async()=>(await l()).retryMode||il}),sha256:h?.sha256??nl.bind(null,"sha256"),streamCollector:h?.streamCollector??_l,useDualstackEndpoint:h?.useDualstackEndpoint??f(Cl),useFipsEndpoint:h?.useFipsEndpoint??f(Ol)}};var l0=(h)=>{const d=h.httpAuthSchemes;let{httpAuthSchemeProvider:l,credentials:w}=h;return{setHttpAuthScheme(G){const H=d.findIndex((I)=>I.schemeId===G.schemeId);if(H===-1)d.push(G);else d.splice(H,1,G)},httpAuthSchemes(){return d},setHttpAuthSchemeProvider(G){l=G},httpAuthSchemeProvider(){return l},setCredentials(G){w=G},credentials(){return w}}},d0=(h)=>{return{httpAuthSchemes:h.httpAuthSchemes(),httpAuthSchemeProvider:h.httpAuthSchemeProvider(),credentials:h.credentials()}};var Ih=(h)=>h,J0=(h,d)=>{const l={...Ih(S0(h)),...Ih(I0(h)),...Ih(w0(h)),...Ih(l0(h))};return d.forEach((w)=>w.configure(l)),{...h,...m0(l),...H0(l),...G0(l),...d0(l)}};class A extends F0{constructor(...[h]){const d=h0(h||{}),l=Sl(d),w=B0(l),G=Y0(w),H=y0(G),I=D0(H),Q=X0(I),v=Hl(Q),M=J0(v,h?.extensions||[]);super(M);this.config=M,this.middlewareStack.use(q0(this.config)),this.middlewareStack.use(Z0(this.config)),this.middlewareStack.use(Q0(this.config)),this.middlewareStack.use(E0(this.config)),this.middlewareStack.use(k0(this.config)),this.middlewareStack.use(K0(this.config)),this.middlewareStack.use(C.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Gl,identityProviderConfigProvider:async(n)=>new C.DefaultIdentityProviderConfig({"aws.auth#sigv4":n.credentials})})),this.middlewareStack.use(C.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}var o0=J(b(),1);class Y extends $0{constructor(h){super(h);Object.setPrototypeOf(this,Y.prototype)}}class Sh extends Y{constructor(h){super({name:"ExpiredTokenException",$fault:"client",...h});this.name="ExpiredTokenException",this.$fault="client",Object.setPrototypeOf(this,Sh.prototype)}}class mh extends Y{constructor(h){super({name:"MalformedPolicyDocumentException",$fault:"client",...h});this.name="MalformedPolicyDocumentException",this.$fault="client",Object.setPrototypeOf(this,mh.prototype)}}class Jh extends Y{constructor(h){super({name:"PackedPolicyTooLargeException",$fault:"client",...h});this.name="PackedPolicyTooLargeException",this.$fault="client",Object.setPrototypeOf(this,Jh.prototype)}}class Dh extends Y{constructor(h){super({name:"RegionDisabledException",$fault:"client",...h});this.name="RegionDisabledException",this.$fault="client",Object.setPrototypeOf(this,Dh.prototype)}}class Eh extends Y{constructor(h){super({name:"IDPRejectedClaimException",$fault:"client",...h});this.name="IDPRejectedClaimException",this.$fault="client",Object.setPrototypeOf(this,Eh.prototype)}}class kh extends Y{constructor(h){super({name:"InvalidIdentityTokenException",$fault:"client",...h});this.name="InvalidIdentityTokenException",this.$fault="client",Object.setPrototypeOf(this,kh.prototype)}}class Kh extends Y{constructor(h){super({name:"IDPCommunicationErrorException",$fault:"client",...h});this.name="IDPCommunicationErrorException",this.$fault="client",Object.setPrototypeOf(this,Kh.prototype)}}class Fh extends Y{constructor(h){super({name:"InvalidAuthorizationMessageException",$fault:"client",...h});this.name="InvalidAuthorizationMessageException",this.$fault="client",Object.setPrototypeOf(this,Fh.prototype)}}var o=(h)=>({...h,...h.SecretAccessKey&&{SecretAccessKey:Hh}}),U0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),V0=(h)=>({...h,...h.SAMLAssertion&&{SAMLAssertion:Hh}}),P0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),v0=(h)=>({...h,...h.WebIdentityToken&&{WebIdentityToken:Hh}}),M0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),z0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),N0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}});var P=J(dh(),1);var L0=async(h,d)=>{const l=j;let w;return w=_({...Nd(h,d),[r]:Hw,[s]:a}),L(d,l,"/",void 0,w)},j0=async(h,d)=>{const l=j;let w;return w=_({...Wd(h,d),[r]:Sw,[s]:a}),L(d,l,"/",void 0,w)},a0=async(h,d)=>{const l=j;let w;return w=_({...Td(h,d),[r]:mw,[s]:a}),L(d,l,"/",void 0,w)},r0=async(h,d)=>{const l=j;let w;return w=_({...Ad(h,d),[r]:Jw,[s]:a}),L(d,l,"/",void 0,w)},s0=async(h,d)=>{const l=j;let w;return w=_({...Rd(h,d),[r]:Dw,[s]:a}),L(d,l,"/",void 0,w)},_0=async(h,d)=>{const l=j;let w;return w=_({...Ld(h,d),[r]:Ew,[s]:a}),L(d,l,"/",void 0,w)},b0=async(h,d)=>{const l=j;let w;return w=_({...jd(h,d),[r]:kw,[s]:a}),L(d,l,"/",void 0,w)},f0=async(h,d)=>{const l=j;let w;return w=_({...ad(h,d),[r]:Kw,[s]:a}),L(d,l,"/",void 0,w)},C0=async(h,d)=>{if(h.statusCode>=300)return R(h,d);const l=await P.parseXmlBody(h.body,d);let w={};return w=Cd(l.AssumeRoleResult,d),{$metadata:K(h),...w}},O0=async(h,d)=>{if(h.statusCode>=300)return R(h,d);const l=await P.parseXmlBody(h.body,d);let w={};return w=Od(l.AssumeRoleWithSAMLResult,d),{$metadata:K(h),...w}},g0=async(h,d)=>{if(h.statusCode>=300)return R(h,d);const l=await P.parseXmlBody(h.body,d);let w={};return w=gd(l.AssumeRoleWithWebIdentityResult,d),{$metadata:K(h),...w}},x0=async(h,d)=>{if(h.statusCode>=300)return R(h,d);const l=await P.parseXmlBody(h.body,d);let w={};return w=xd(l.DecodeAuthorizationMessageResult,d),{$metadata:K(h),...w}},i0=async(h,d)=>{if(h.statusCode>=300)return R(h,d);const l=await P.parseXmlBody(h.body,d);let w={};return w=ed(l.GetAccessKeyInfoResult,d),{$metadata:K(h),...w}},c0=async(h,d)=>{if(h.statusCode>=300)return R(h,d);const l=await P.parseXmlBody(h.body,d);let w={};return w=pd(l.GetCallerIdentityResult,d),{$metadata:K(h),...w}},e0=async(h,d)=>{if(h.statusCode>=300)return R(h,d);const l=await P.parseXmlBody(h.body,d);let w={};return w=nd(l.GetFederationTokenResult,d),{$metadata:K(h),...w}},p0=async(h,d)=>{if(h.statusCode>=300)return R(h,d);const l=await P.parseXmlBody(h.body,d);let w={};return w=od(l.GetSessionTokenResult,d),{$metadata:K(h),...w}},R=async(h,d)=>{const l={...h,body:await P.parseXmlErrorBody(h.body,d)},w=Fw(h,l.body);switch(w){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await Zd(l,d);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await vd(l,d);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await Md(l,d);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await zd(l,d);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await Ud(l,d);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await Pd(l,d);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await $d(l,d);case"InvalidAuthorizationMessageException":case"com.amazonaws.sts#InvalidAuthorizationMessageException":throw await Vd(l,d);default:const G=l.body;return Iw({output:h,parsedBody:G.Error,errorCode:w})}},Zd=async(h,d)=>{const l=h.body,w=id(l.Error,d),G=new Sh({$metadata:K(h),...w});return T(G,l)},$d=async(h,d)=>{const l=h.body,w=ud(l.Error,d),G=new Kh({$metadata:K(h),...w});return T(G,l)},Ud=async(h,d)=>{const l=h.body,w=td(l.Error,d),G=new Eh({$metadata:K(h),...w});return T(G,l)},Vd=async(h,d)=>{const l=h.body,w=hw(l.Error,d),G=new Fh({$metadata:K(h),...w});return T(G,l)},Pd=async(h,d)=>{const l=h.body,w=lw(l.Error,d),G=new kh({$metadata:K(h),...w});return T(G,l)},vd=async(h,d)=>{const l=h.body,w=dw(l.Error,d),G=new mh({$metadata:K(h),...w});return T(G,l)},Md=async(h,d)=>{const l=h.body,w=ww(l.Error,d),G=new Jh({$metadata:K(h),...w});return T(G,l)},zd=async(h,d)=>{const l=h.body,w=Gw(l.Error,d),G=new Dh({$metadata:K(h),...w});return T(G,l)},Nd=(h,d)=>{const l={};if(h[W]!=null)l[W]=h[W];if(h[i]!=null)l[i]=h[i];if(h[$]!=null){const w=Bh(h[$],d);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(w).forEach(([G,H])=>{const I=`PolicyArns.${G}`;l[I]=H})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];if(h[e]!=null){const w=n0(h[e],d);if(h[e]?.length===0)l.Tags=[];Object.entries(w).forEach(([G,H])=>{const I=`Tags.${G}`;l[I]=H})}if(h[Oh]!=null){const w=fd(h[Oh],d);if(h[Oh]?.length===0)l.TransitiveTagKeys=[];Object.entries(w).forEach(([G,H])=>{const I=`TransitiveTagKeys.${G}`;l[I]=H})}if(h[Vh]!=null)l[Vh]=h[Vh];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];if(h[V]!=null)l[V]=h[V];if(h[Lh]!=null){const w=_d(h[Lh],d);if(h[Lh]?.length===0)l.ProvidedContexts=[];Object.entries(w).forEach(([G,H])=>{const I=`ProvidedContexts.${G}`;l[I]=H})}return l},Wd=(h,d)=>{const l={};if(h[W]!=null)l[W]=h[W];if(h[Ah]!=null)l[Ah]=h[Ah];if(h[_h]!=null)l[_h]=h[_h];if(h[$]!=null){const w=Bh(h[$],d);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(w).forEach(([G,H])=>{const I=`PolicyArns.${G}`;l[I]=H})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},Td=(h,d)=>{const l={};if(h[W]!=null)l[W]=h[W];if(h[i]!=null)l[i]=h[i];if(h[ih]!=null)l[ih]=h[ih];if(h[jh]!=null)l[jh]=h[jh];if(h[$]!=null){const w=Bh(h[$],d);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(w).forEach(([G,H])=>{const I=`PolicyArns.${G}`;l[I]=H})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},Ad=(h,d)=>{const l={};if(h[Ph]!=null)l[Ph]=h[Ph];return l},Rd=(h,d)=>{const l={};if(h[O]!=null)l[O]=h[O];return l},Ld=(h,d)=>{return{}},jd=(h,d)=>{const l={};if(h[Wh]!=null)l[Wh]=h[Wh];if(h[Z]!=null)l[Z]=h[Z];if(h[$]!=null){const w=Bh(h[$],d);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(w).forEach(([G,H])=>{const I=`PolicyArns.${G}`;l[I]=H})}if(h[y]!=null)l[y]=h[y];if(h[e]!=null){const w=n0(h[e],d);if(h[e]?.length===0)l.Tags=[];Object.entries(w).forEach(([G,H])=>{const I=`Tags.${G}`;l[I]=H})}return l},ad=(h,d)=>{const l={};if(h[y]!=null)l[y]=h[y];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];return l},Bh=(h,d)=>{const l={};let w=1;for(let G of h){if(G===null)continue;const H=rd(G,d);Object.entries(H).forEach(([I,Q])=>{l[`member.${w}.${I}`]=Q}),w++}return l},rd=(h,d)=>{const l={};if(h[ch]!=null)l[ch]=h[ch];return l},sd=(h,d)=>{const l={};if(h[Rh]!=null)l[Rh]=h[Rh];if(h[Zh]!=null)l[Zh]=h[Zh];return l},_d=(h,d)=>{const l={};let w=1;for(let G of h){if(G===null)continue;const H=sd(G,d);Object.entries(H).forEach(([I,Q])=>{l[`member.${w}.${I}`]=Q}),w++}return l},bd=(h,d)=>{const l={};if(h[Nh]!=null)l[Nh]=h[Nh];if(h[xh]!=null)l[xh]=h[xh];return l},fd=(h,d)=>{const l={};let w=1;for(let G of h){if(G===null)continue;l[`member.${w}`]=G,w++}return l},n0=(h,d)=>{const l={};let w=1;for(let G of h){if(G===null)continue;const H=bd(G,d);Object.entries(H).forEach(([I,Q])=>{l[`member.${w}.${I}`]=Q}),w++}return l},ph=(h,d)=>{const l={};if(h[Yh]!=null)l[Yh]=S(h[Yh]);if(h[N]!=null)l[N]=S(h[N]);return l},Cd=(h,d)=>{const l={};if(h[q]!=null)l[q]=t(h[q],d);if(h[z]!=null)l[z]=ph(h[z],d);if(h[U]!=null)l[U]=u(h[U]);if(h[V]!=null)l[V]=S(h[V]);return l},Od=(h,d)=>{const l={};if(h[q]!=null)l[q]=t(h[q],d);if(h[z]!=null)l[z]=ph(h[z],d);if(h[U]!=null)l[U]=u(h[U]);if(h[rh]!=null)l[rh]=S(h[rh]);if(h[fh]!=null)l[fh]=S(h[fh]);if(h[zh]!=null)l[zh]=S(h[zh]);if(h[x]!=null)l[x]=S(h[x]);if(h[Th]!=null)l[Th]=S(h[Th]);if(h[V]!=null)l[V]=S(h[V]);return l},gd=(h,d)=>{const l={};if(h[q]!=null)l[q]=t(h[q],d);if(h[bh]!=null)l[bh]=S(h[bh]);if(h[z]!=null)l[z]=ph(h[z],d);if(h[U]!=null)l[U]=u(h[U]);if(h[ah]!=null)l[ah]=S(h[ah]);if(h[x]!=null)l[x]=S(h[x]);if(h[V]!=null)l[V]=S(h[V]);return l},t=(h,d)=>{const l={};if(h[O]!=null)l[O]=S(h[O]);if(h[sh]!=null)l[sh]=S(h[sh]);if(h[Ch]!=null)l[Ch]=S(h[Ch]);if(h[Uh]!=null)l[Uh]=T0(A0(h[Uh]));return l},xd=(h,d)=>{const l={};if(h[$h]!=null)l[$h]=S(h[$h]);return l},id=(h,d)=>{const l={};if(h[m]!=null)l[m]=S(h[m]);return l},cd=(h,d)=>{const l={};if(h[Mh]!=null)l[Mh]=S(h[Mh]);if(h[N]!=null)l[N]=S(h[N]);return l},ed=(h,d)=>{const l={};if(h[g]!=null)l[g]=S(h[g]);return l},pd=(h,d)=>{const l={};if(h[gh]!=null)l[gh]=S(h[gh]);if(h[g]!=null)l[g]=S(h[g]);if(h[N]!=null)l[N]=S(h[N]);return l},nd=(h,d)=>{const l={};if(h[q]!=null)l[q]=t(h[q],d);if(h[vh]!=null)l[vh]=cd(h[vh],d);if(h[U]!=null)l[U]=u(h[U]);return l},od=(h,d)=>{const l={};if(h[q]!=null)l[q]=t(h[q],d);return l},ud=(h,d)=>{const l={};if(h[m]!=null)l[m]=S(h[m]);return l},td=(h,d)=>{const l={};if(h[m]!=null)l[m]=S(h[m]);return l},hw=(h,d)=>{const l={};if(h[m]!=null)l[m]=S(h[m]);return l},lw=(h,d)=>{const l={};if(h[m]!=null)l[m]=S(h[m]);return l},dw=(h,d)=>{const l={};if(h[m]!=null)l[m]=S(h[m]);return l},ww=(h,d)=>{const l={};if(h[m]!=null)l[m]=S(h[m]);return l},Gw=(h,d)=>{const l={};if(h[m]!=null)l[m]=S(h[m]);return l},K=(h)=>({httpStatusCode:h.statusCode,requestId:h.headers["x-amzn-requestid"]??h.headers["x-amzn-request-id"]??h.headers["x-amz-request-id"],extendedRequestId:h.headers["x-amz-id-2"],cfId:h.headers["x-amz-cf-id"]});var Iw=R0(Y),L=async(h,d,l,w,G)=>{const{hostname:H,protocol:I="https",port:Q,path:v}=await h.endpoint(),M={protocol:I,hostname:H,port:Q,method:"POST",path:v.endsWith("/")?v.slice(0,-1)+l:v+l,headers:d};if(w!==void 0)M.hostname=w;if(G!==void 0)M.body=G;return new W0(M)},j={"content-type":"application/x-www-form-urlencoded"},a="2011-06-15",r="Action",O="AccessKeyId",Hw="AssumeRole",Yh="AssumedRoleId",z="AssumedRoleUser",Sw="AssumeRoleWithSAML",mw="AssumeRoleWithWebIdentity",g="Account",N="Arn",x="Audience",q="Credentials",Zh="ContextAssertion",Jw="DecodeAuthorizationMessage",$h="DecodedMessage",y="DurationSeconds",Uh="Expiration",Vh="ExternalId",Ph="EncodedMessage",vh="FederatedUser",Mh="FederatedUserId",Dw="GetAccessKeyInfo",Ew="GetCallerIdentity",kw="GetFederationToken",Kw="GetSessionToken",zh="Issuer",Nh="Key",Wh="Name",Th="NameQualifier",Z="Policy",$="PolicyArns",Ah="PrincipalArn",Rh="ProviderArn",Lh="ProvidedContexts",jh="ProviderId",U="PackedPolicySize",ah="Provider",W="RoleArn",i="RoleSessionName",rh="Subject",sh="SecretAccessKey",_h="SAMLAssertion",bh="SubjectFromWebIdentityToken",V="SourceIdentity",c="SerialNumber",fh="SubjectType",Ch="SessionToken",e="Tags",p="TokenCode",Oh="TransitiveTagKeys",gh="UserId",s="Version",xh="Value",ih="WebIdentityToken",ch="arn",m="message",_=(h)=>Object.entries(h).map(([d,l])=>eh(d)+"="+eh(l)).join("&"),Fw=(h,d)=>{if(d.Error?.Code!==void 0)return d.Error.Code;if(h.statusCode==404)return"NotFound"};class hh extends F.classBuilder().ep({...E}).m(function(h,d,l,w){return[o0.getSerdePlugin(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,U0).ser(L0).de(C0).build(){}var u0=J(b(),1);class nh extends F.classBuilder().ep({...E}).m(function(h,d,l,w){return[u0.getSerdePlugin(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithSAML",{}).n("STSClient","AssumeRoleWithSAMLCommand").f(V0,P0).ser(j0).de(O0).build(){}var t0=J(b(),1);class lh extends F.classBuilder().ep({...E}).m(function(h,d,l,w){return[t0.getSerdePlugin(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(v0,M0).ser(a0).de(g0).build(){}var hd=J(b(),1);class oh extends F.classBuilder().ep({...E}).m(function(h,d,l,w){return[hd.getSerdePlugin(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","DecodeAuthorizationMessage",{}).n("STSClient","DecodeAuthorizationMessageCommand").f(void 0,void 0).ser(r0).de(x0).build(){}var ld=J(b(),1);class uh extends F.classBuilder().ep({...E}).m(function(h,d,l,w){return[ld.getSerdePlugin(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetAccessKeyInfo",{}).n("STSClient","GetAccessKeyInfoCommand").f(void 0,void 0).ser(s0).de(i0).build(){}var dd=J(b(),1);class th extends F.classBuilder().ep({...E}).m(function(h,d,l,w){return[dd.getSerdePlugin(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetCallerIdentity",{}).n("STSClient","GetCallerIdentityCommand").f(void 0,void 0).ser(_0).de(c0).build(){}var wd=J(b(),1);class hl extends F.classBuilder().ep({...E}).m(function(h,d,l,w){return[wd.getSerdePlugin(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetFederationToken",{}).n("STSClient","GetFederationTokenCommand").f(void 0,z0).ser(b0).de(e0).build(){}var Gd=J(b(),1);class ll extends F.classBuilder().ep({...E}).m(function(h,d,l,w){return[Gd.getSerdePlugin(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetSessionToken",{}).n("STSClient","GetSessionTokenCommand").f(void 0,N0).ser(f0).de(p0).build(){}var Bw={AssumeRoleCommand:hh,AssumeRoleWithSAMLCommand:nh,AssumeRoleWithWebIdentityCommand:lh,DecodeAuthorizationMessageCommand:oh,GetAccessKeyInfoCommand:uh,GetCallerIdentityCommand:th,GetFederationTokenCommand:hl,GetSessionTokenCommand:ll};class Hd extends A{}Id(Bw,Hd);var Sd="us-east-1",md=(h)=>{if(typeof h?.Arn==="string"){const d=h.Arn.split(":");if(d.length>4&&d[4]!=="")return d[4]}return},Jd=async(h,d,l)=>{const w=typeof h==="function"?await h():h,G=typeof d==="function"?await d():d;return l?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${w} (provider)`,`${G} (parent client)`,`${Sd} (STS default)`),w??G??Sd},Dd=(h,d)=>{let l,w;return async(G,H)=>{if(w=G,!l){const{logger:M=h?.parentClientConfig?.logger,region:n,requestHandler:qh=h?.parentClientConfig?.requestHandler,credentialProviderLogger:Kd}=h,Fd=await Jd(n,h?.parentClientConfig?.region,Kd);l=new d({credentialDefaultProvider:()=>async()=>w,region:Fd,requestHandler:qh,logger:M})}const{Credentials:I,AssumedRoleUser:Q}=await l.send(new hh(H));if(!I||!I.AccessKeyId||!I.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${H.RoleArn}`);const v=md(Q);return{accessKeyId:I.AccessKeyId,secretAccessKey:I.SecretAccessKey,sessionToken:I.SessionToken,expiration:I.Expiration,...I.CredentialScope&&{credentialScope:I.CredentialScope},...v&&{accountId:v}}}},Ed=(h,d)=>{let l;return async(w)=>{if(!l){const{logger:Q=h?.parentClientConfig?.logger,region:v,requestHandler:M=h?.parentClientConfig?.requestHandler,credentialProviderLogger:n}=h,qh=await Jd(v,h?.parentClientConfig?.region,n);l=new d({region:qh,requestHandler:M,logger:Q})}const{Credentials:G,AssumedRoleUser:H}=await l.send(new lh(w));if(!G||!G.AccessKeyId||!G.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${w.RoleArn}`);const I=md(H);return{accessKeyId:G.AccessKeyId,secretAccessKey:G.SecretAccessKey,sessionToken:G.SessionToken,expiration:G.Expiration,...G.CredentialScope&&{credentialScope:G.CredentialScope},...I&&{accountId:I}}}};var kd=(h,d)=>{if(!d)return h;else return class l extends h{constructor(w){super(w);for(let G of d)this.middlewareStack.use(G)}}},qw=(h={},d)=>Dd(h,kd(A,d)),yw=(h={},d)=>Ed(h,kd(A,d)),AG=(h)=>(d)=>h({roleAssumer:qw(d),roleAssumerWithWebIdentity:yw(d),...d});export{yw as getDefaultRoleAssumerWithWebIdentity,qw as getDefaultRoleAssumer,AG as decorateDefaultCredentialProvider,F0 as __Client,Y as STSServiceException,A as STSClient,Hd as STS,Dh as RegionDisabledException,Jh as PackedPolicyTooLargeException,mh as MalformedPolicyDocumentException,kh as InvalidIdentityTokenException,Fh as InvalidAuthorizationMessageException,Eh as IDPRejectedClaimException,Kh as IDPCommunicationErrorException,N0 as GetSessionTokenResponseFilterSensitiveLog,ll as GetSessionTokenCommand,z0 as GetFederationTokenResponseFilterSensitiveLog,hl as GetFederationTokenCommand,th as GetCallerIdentityCommand,uh as GetAccessKeyInfoCommand,Sh as ExpiredTokenException,oh as DecodeAuthorizationMessageCommand,o as CredentialsFilterSensitiveLog,M0 as AssumeRoleWithWebIdentityResponseFilterSensitiveLog,v0 as AssumeRoleWithWebIdentityRequestFilterSensitiveLog,lh as AssumeRoleWithWebIdentityCommand,P0 as AssumeRoleWithSAMLResponseFilterSensitiveLog,V0 as AssumeRoleWithSAMLRequestFilterSensitiveLog,nh as AssumeRoleWithSAMLCommand,U0 as AssumeRoleResponseFilterSensitiveLog,hh as AssumeRoleCommand,F as $Command};