gemi 0.4.88 → 0.4.90

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/dist/app/App.d.ts.map +1 -1
  2. package/dist/app/index.js +1 -1
  3. package/dist/auth/AuthenticationServiceProvider.d.ts +4 -0
  4. package/dist/auth/AuthenticationServiceProvider.d.ts.map +1 -1
  5. package/dist/chunk-00c56e78353444bd.js +2 -0
  6. package/dist/chunk-0f500a6384fcd132.js +2 -0
  7. package/dist/chunk-1663f14acf1c15e4.js +2 -0
  8. package/dist/chunk-5bfe9d4cbecd160a.js +1 -0
  9. package/dist/chunk-631b243096f99070.js +2 -0
  10. package/dist/chunk-6b1b2297cf4e98bf.js +6 -0
  11. package/dist/chunk-73ad537019659405.js +2 -0
  12. package/dist/chunk-77f51fc60eb8f53d.js +2 -0
  13. package/dist/{chunk-79f9130d266efc8b.js → chunk-786985b106091b91.js} +1 -1
  14. package/dist/chunk-b033519a526dfb3f.js +1 -0
  15. package/dist/chunk-ce91e437af790f62.js +9 -0
  16. package/dist/chunk-d5f34554362c0fde.js +18 -0
  17. package/dist/chunk-d96668bed492732f.js +3 -0
  18. package/dist/chunk-da0be6c2c54903f4.js +2 -0
  19. package/dist/chunk-e51fe90ab8cb869b.js +2 -0
  20. package/dist/chunk-f28fe28ab592bd2a.js +2 -0
  21. package/dist/chunk-f7a2f27070c1a0cf.js +2 -0
  22. package/dist/client/index.js +1 -6
  23. package/dist/client/init.d.ts.map +1 -1
  24. package/dist/kernel/index.js +1 -1
  25. package/dist/services/index.js +1 -10
  26. package/package.json +1 -1
  27. package/dist/chunk-0441dc8e5b215b75.js +0 -2
  28. package/dist/chunk-08bf87c7e29141d3.js +0 -9
  29. package/dist/chunk-23b1faa7791ca31d.js +0 -2
  30. package/dist/chunk-36d595d02662f2fa.js +0 -2
  31. package/dist/chunk-3d4e6fdf131bae97.js +0 -2
  32. package/dist/chunk-6e20f463543eec5f.js +0 -2
  33. package/dist/chunk-75aa5e5e2f565737.js +0 -18
  34. package/dist/chunk-82b3f93a5aac2b2e.js +0 -6
  35. package/dist/chunk-8f575468b4e4754d.js +0 -2
  36. package/dist/chunk-92b7f08b6396b0fc.js +0 -2
  37. package/dist/chunk-a4330a47c3806ff1.js +0 -3
  38. package/dist/chunk-b35e7bc78a8a613f.js +0 -2
  39. package/dist/chunk-bd0308763754bf7b.js +0 -2
  40. package/dist/chunk-d5d491184ec17042.js +0 -2
  41. package/dist/chunk-dc3eae4932658400.js +0 -2
  42. package/dist/chunk-e5db92db378843ab.js +0 -2
@@ -1 +1 @@
1
- {"version":3,"file":"App.d.ts","sourceRoot":"","sources":["../../app/App.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AACnD,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAIhD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAGrD,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,UAAU,CAAC;AACvC,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAGrD,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,KAAK,CAAC;AAY5C,OAAO,EAAE,aAAa,EAA2B,MAAM,OAAO,CAAC;AAG/D,OAAO,EAAE,MAAM,EAAE,MAAM,WAAW,CAAC;AAInC,UAAU,YAAY;IACpB,MAAM,EAAE,MAAM,EAAE,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IAC9B,cAAc,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IACpC,gBAAgB,CAAC,EAAE,MAAM,EAAE,CAAC;CAC7B;AAED,UAAU,SAAS;IACjB,UAAU,EAAE,UAAU,UAAU,CAAC;IACjC,SAAS,EAAE,UAAU,SAAS,CAAC;IAC/B,OAAO,CAAC,EAAE,CAAC,UAAU,MAAM,CAAC,EAAE,CAAC;IAC/B,iBAAiB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,UAAU,UAAU,CAAC,CAAC;IACzD,IAAI,EAAE,aAAa,CAAC;IACpB,MAAM,EAAE,UAAU,MAAM,CAAC;CAC1B;AAED,qBAAa,GAAG;IACd,OAAO,CAAC,YAAY,CAKlB;IACF,OAAO,CAAC,cAAc,CAGf;IAEP,OAAO,CAAC,aAAa,CAAgC;IAC9C,IAAI,SAAS;IACpB,OAAO,CAAC,KAAK,CAAS;IACtB,OAAO,CAAC,aAAa,CAAgB;IAC9B,iBAAiB,EAAE,MAAM,CAAC,MAAM,EAAE,UAAU,UAAU,CAAC,CAAM;IAC7D,UAAU,SAAK;IACtB,OAAO,CAAC,MAAM,CAAY;IAC1B,OAAO,CAAC,SAAS,CAAsB;IACvC,OAAO,CAAC,UAAU,CAAuB;IACzC,OAAO,CAAC,IAAI,CAAgB;IAC5B,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,oBAAoB,CAAuB;IACnD,OAAO,CAAC,iBAAiB,CAAgB;gBAE7B,MAAM,EAAE,SAAS;IAc7B,OAAO,CAAC,OAAO;IA4CR,gBAAgB;IAIhB,eAAe,CAAC,MAAM,EAAE,YAAY;IAIrC,iBAAiB,CAAC,GAAG,EAAE,OAAO;IAoP9B,KAAK,CAAC,GAAG,EAAE,OAAO,GAAG,OAAO,CAAC,QAAQ,CAAC;IAgBrC,SAAS,EAAE,gBAAgB,CAAC;QAAE,OAAO,EAAE,OAAO,CAAA;KAAE,CAAC,CAoBtD;IAEK,SAAS,CACd,EAAE,EAAE,CACF,KAAK,EAAE,MAAM,EACb,IAAI,EAAE,MAAM,GAAG,eAAe,GAAG,WAAW,GAAG,iBAAiB,EAChE,QAAQ,CAAC,EAAE,OAAO,KACf,IAAI;CAIZ"}
1
+ {"version":3,"file":"App.d.ts","sourceRoot":"","sources":["../../app/App.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AACnD,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAIhD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAGrD,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,UAAU,CAAC;AACvC,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAGrD,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,KAAK,CAAC;AAY5C,OAAO,EAAE,aAAa,EAA2B,MAAM,OAAO,CAAC;AAG/D,OAAO,EAAE,MAAM,EAAE,MAAM,WAAW,CAAC;AAInC,UAAU,YAAY;IACpB,MAAM,EAAE,MAAM,EAAE,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IAC9B,cAAc,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IACpC,gBAAgB,CAAC,EAAE,MAAM,EAAE,CAAC;CAC7B;AAED,UAAU,SAAS;IACjB,UAAU,EAAE,UAAU,UAAU,CAAC;IACjC,SAAS,EAAE,UAAU,SAAS,CAAC;IAC/B,OAAO,CAAC,EAAE,CAAC,UAAU,MAAM,CAAC,EAAE,CAAC;IAC/B,iBAAiB,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,UAAU,UAAU,CAAC,CAAC;IACzD,IAAI,EAAE,aAAa,CAAC;IACpB,MAAM,EAAE,UAAU,MAAM,CAAC;CAC1B;AAED,qBAAa,GAAG;IACd,OAAO,CAAC,YAAY,CAKlB;IACF,OAAO,CAAC,cAAc,CAGf;IAEP,OAAO,CAAC,aAAa,CAAgC;IAC9C,IAAI,SAAS;IACpB,OAAO,CAAC,KAAK,CAAS;IACtB,OAAO,CAAC,aAAa,CAAgB;IAC9B,iBAAiB,EAAE,MAAM,CAAC,MAAM,EAAE,UAAU,UAAU,CAAC,CAAM;IAC7D,UAAU,SAAK;IACtB,OAAO,CAAC,MAAM,CAAY;IAC1B,OAAO,CAAC,SAAS,CAAsB;IACvC,OAAO,CAAC,UAAU,CAAuB;IACzC,OAAO,CAAC,IAAI,CAAgB;IAC5B,OAAO,CAAC,MAAM,CAAS;IACvB,OAAO,CAAC,oBAAoB,CAAuB;IACnD,OAAO,CAAC,iBAAiB,CAAgB;gBAE7B,MAAM,EAAE,SAAS;IAc7B,OAAO,CAAC,OAAO;IA4CR,gBAAgB;IAIhB,eAAe,CAAC,MAAM,EAAE,YAAY;IAIrC,iBAAiB,CAAC,GAAG,EAAE,OAAO;IA0P9B,KAAK,CAAC,GAAG,EAAE,OAAO,GAAG,OAAO,CAAC,QAAQ,CAAC;IAgBrC,SAAS,EAAE,gBAAgB,CAAC;QAAE,OAAO,EAAE,OAAO,CAAA;KAAE,CAAC,CAoBtD;IAEK,SAAS,CACd,EAAE,EAAE,CACF,KAAK,EAAE,MAAM,EACb,IAAI,EAAE,MAAM,GAAG,eAAe,GAAG,WAAW,GAAG,iBAAiB,EAChE,QAAQ,CAAC,EAAE,OAAO,KACf,IAAI;CAIZ"}
package/dist/app/index.js CHANGED
@@ -1,2 +1,2 @@
1
1
  // @bun
2
- import{e as h,h as F,i as P,l as r} from"../http/index.js";import{x as v,y as D} from"../chunk-53b7d6267c9172bc.js";import{A as L} from"../chunk-9475c6ed18013dc8.js";import{B as Jo,C as d} from"../chunk-24a86f8f5ddc0cbd.js";var _=d((qo,N)=>{var Yo=function(o){if(typeof o==="function")return o;return(n)=>n.$extends(o)},Zo=function(o){return o},S=Object.defineProperty,fo=Object.getOwnPropertyDescriptor,Vo=Object.getOwnPropertyNames,Ho=Object.prototype.hasOwnProperty,To=(o,n)=>{for(var i in n)S(o,i,{get:n[i],enumerable:!0})},zo=(o,n,i,c)=>{if(n&&typeof n==="object"||typeof n==="function"){for(let y of Vo(n))if(!Ho.call(o,y)&&y!==i)S(o,y,{get:()=>n[y],enumerable:!(c=fo(n,y))||c.enumerable})}return o},Ao=(o)=>zo(S({},"__esModule",{value:!0}),o),q={};To(q,{Prisma:()=>t,PrismaClient:()=>Xo,default:()=>Qo});N.exports=Ao(q);var Go={enginesVersion:"393aa359c9ad4a4bb28630fb5613f9c281cde053"},Lo="5.17.0",Wo=Lo,Xo=class{constructor(){throw new Error('@prisma/client did not initialize yet. Please run "prisma generate" and try to import it again.')}},t={defineExtension:Yo,getExtensionContext:Zo,prismaVersion:{client:Wo,engine:Go.enginesVersion}},Qo={Prisma:t}});var l=d((No,p)=>{p.exports={..._()}});function E(o){let n=[];for(let[i,c]of o)n.push(i,...E(c).flat());return Array.from(new Set(n))}function Q(o){const n=[];for(let[i,c]of Object.entries(o))if("run"in c){const y=c.viewPath;if("children"in c){const b=new c.children,$=Q(b.routes);n.push([y,$])}else n.push([y,[]])}else{const y=new c,b=Q(y.routes);n.push(...b)}return n}function J(o){const n={};for(let[i,c]of Object.entries(o))if("run"in c){const y=c;if("children"in y){const b=new y.children,$=J(b.routes);for(let[O,{exec:V,middleware:f}]of Object.entries($)){const A=i==="/"?O:`${i}${O}`,W=O==="/"&&i!=="/"?i:A;n[W]={exec:[y.run.bind(y),...V],middleware:[...y.middlewares,...f]}}}else n[i]={exec:[y.run.bind(y)],middleware:y.middlewares}}else{const y=new c,b=J(y.routes);for(let[$,{exec:O,middleware:V}]of Object.entries(b)){const f=i==="/"?$:`${i}${$}`,A=$==="/"&&i!=="/"?i:f;n[A]={exec:O,middleware:[...y.middlewares,...V]}}}return Object.fromEntries(Object.entries(n).sort(([i],[c])=>{const y=i.split("/").length+i.split(":").length,b=c.split("/").length+c.split(":").length;return y-b}))}function U(o){const n={};for(let[i,c]of Object.entries(o))if("run"in c){const y=c.viewPath;if("children"in c)n[i]=[y];if("children"in c){const b=new c.children,$=U(b.routes);for(let[O,V]of Object.entries($)){const f=i==="/"?O:`${i}${O}`,A=O==="/"&&i!=="/"?i:f;n[A]=[y,...V]}}else n[i]=[y]}else{const y=new c,b=U(y.routes);for(let[$,O]of Object.entries(b)){const V=i==="/"?$:`${i}${$}`,f=$==="/"&&i!=="/"?i:V;n[f]=O}}return n}import{renderToReadableStream as jo} from"react-dom/server.browser";import{createElement as g,Fragment as Oo} from"react";class R{renderParams={styles:[],manifest:{},serverManifest:{},bootstrapModules:[]};flatViewRoutes={};routeManifest={};name="APP";appId;componentTree;middlewareAliases={};devVersion=0;params;apiRouter;viewRouter;Root;kernel;i18nServiceContainer;flatComponentTree=[];constructor(o){this.params=o,this.apiRouter=o.apiRouter,this.viewRouter=o.viewRouter,this.Root=o.root,this.kernel=new o.kernel,this.prepare(),this.appId=D(Date.now()),this.i18nServiceContainer=this.kernel.getServices().i18nServiceContainer,this.i18nServiceContainer.boot()}prepare(){const o=this.params;this.middlewareAliases=o.middlewareAliases??{};const n=this.kernel.getServices(),i=n.authenticationServiceProvider.basePath;let c={"/":this.viewRouter,[i]:n.authenticationServiceProvider.routers.view},y={"/":this.apiRouter,[i]:n.authenticationServiceProvider.routers.api,"/__gemi__/services/i18n":n.i18nServiceContainer.routers.api};for(let b of o.plugins??[]){const $=new b;if($.viewRouter)c={...c,[$.viewRoutesBasePath]:$.viewRouter};if($.apiRouter)y={...y,[$.apiRoutesBasePath]:$.apiRouter}}this.kernel.getServices().apiRouterServiceContainer.service.boot(y),this.flatViewRoutes=J(c),this.componentTree=Q(c),this.flatComponentTree=E(this.componentTree),this.routeManifest=U(c)}getComponentTree(){return this.componentTree}setRenderParams(o){this.renderParams=o}async handleViewRequest(o){const n=new URL(o.url),i=n.searchParams.get("json");let c=null;try{let w=[],j=[],H=null,z={};for(let[T,Y]of Object.entries(this.flatViewRoutes)){const Z=new v({pathname:T});if(Z.test({pathname:n.pathname})){H=T,z=Z.exec({pathname:n.pathname})?.pathname.groups,w=Y.exec,j=Y.middleware;break}}const G=new P(o,z),{data:u,cookies:io,headers:co,user:yo,prefetchedData:wo}=await F.run(G,async()=>{const T=F.getStore();T.setRequest(G),await L.getStore().middlewareServiceContainer.runMiddleware(j,H);const Y=await Promise.all([...w.map((C)=>C(G)),...Array.from(T.prefetchPromiseQueue).map((C)=>C())]),Z=T.cookies,$o=T.headers,bo=T.prefetchedResources;return{data:Y,cookies:Z,headers:$o,user:T.user,prefetchedData:Object.fromEntries(bo.entries())}});c={data:u,prefetchedData:wo,currentPathName:H,user:yo,params:z,cookies:io,headers:co}}catch(w){if(w.kind===h)if(i){const{status:j=400,data:H,directive:z,headers:G}=w.payload.api;return new Response(JSON.stringify({data:H,directive:z}),{headers:G,status:j})}else{const{status:j=400,error:H}=w.payload.view;return new Response(H?.message,{...w.payload.view,status:j})}else throw w}const{data:y,params:b,currentPathName:$,user:O,cookies:V}=c,f=y.reduce((w,j)=>{return{...w,...j}},{}),A=this.i18nServiceContainer.isEnabled;let W={};if(A){const w=this.i18nServiceContainer.detectLocale(new P(o,b)),j=this.i18nServiceContainer.getPageTranslations(w,$);W={[w]:j}}if(i){const w=new Headers;return w.set("Content-Type","application/json"),V.forEach((j)=>w.append("Set-Cookie",j.toString())),w.append("Cache-Control",O?"private, no-cache, no-store, max-age=0, must-revalidate":"public, max-age=864000, must-revalidate"),new Response(JSON.stringify({data:{[n.pathname]:f},prefetchedData:c.prefetchedData,i18n:W,is404:!$}),{headers:w})}const{styles:e,manifest:M,serverManifest:x,bootstrapModules:a}=this.renderParams,B={};let K=null;const k=(w,j)=>`"${w}": () => import("${j}")`,I=[];for(let w of["404",...this.flatComponentTree])if(!M){K=`${process.env.APP_DIR}`;const j=await import(`${K}/views/${w}.tsx`);B[w]=j.default,I.push(k(w,`${K}/views/${w}.tsx`))}else{const j=x[`app/views/${w}.tsx`];if(!j?.file){console.log(`Server file not found for ${w}`),console.log(j);const G=Object.keys(x),u=`app/views/${w}.tsx`;console.log(`${u} not found in server manifest`),console.log(G)}const H=await import(`${process.env.DIST_DIR}/server/${j?.file}`);B[w]=H.default;const z=M[`app/views/${w}.tsx`];if(z)I.push(k(w,`/${z?.file}`))}const oo=`{${I.join(",")}}`,X=new Headers;X.set("Content-Type","text/html"),X.set("Cache-Control",O?"private, no-cache, no-store, max-age=0, must-revalidate":"public, max-age=864000, must-revalidate"),X.set("ETag",this.appId),c.cookies.forEach((w)=>X.append("Set-Cookie",w.toString()));const s={kind:"view",data:{pageData:{[n.pathname]:f},prefetchedData:c.prefetchedData,i18n:W,auth:{user:O},routeManifest:this.routeManifest,router:{pathname:$,params:b,currentPath:n.pathname,searchParams:n.search,is404:!$?!0:!1},componentTree:[["404",[]],...this.componentTree]},head:{}},no=await jo(g(Oo,{children:[e,g(this.Root,{data:s.data,viewImportMap:B})]}),{bootstrapScriptContent:`window.__GEMI_DATA__ = ${JSON.stringify(s.data)}; window.loaders=${oo}`,bootstrapModules:a});return new Response(no,{status:!$?404:200,headers:X})}async fetch(o){const n=new URL(o.url);return this.kernel.run.bind(this.kernel)(async()=>{if(n.pathname.startsWith("/api"))return await this.kernel.services.apiRouterServiceContainer.handleApiRequest(o);else return await this.handleViewRequest(o)})}websocket={message:(o,n)=>{this.kernel.run.bind(this.kernel)(()=>{L.getStore().broadcastingServiceContainer.run(o.data.headers,()=>{L.getStore().broadcastingServiceContainer.handleMessage(o,n)})})},open:(o)=>{},close:(o)=>{console.log("closed ws"),o.terminate()}};onPublish(o){this.kernel.services.broadcastingServiceContainer.onPublish(o)}}var m=Jo(l(),1);var Uo=m.Prisma.defineExtension({name:"Gemi Policies",query:{async $allOperations({args:o,operation:n,query:i,model:c}){const b=L.getStore().policiesServiceProvider.policiesList[`${c}Policies`];if(!b)return await i(o);if(!await b.all.call(b,n,o))throw new r;return await i(o)}}});export{Uo as prismaExtension,R as App};
2
+ import{e as h,h as F,i as P,l as r} from"../http/index.js";import{x as v,y as D} from"../chunk-53b7d6267c9172bc.js";import{A as L} from"../chunk-9475c6ed18013dc8.js";import{B as Jo,C as d} from"../chunk-24a86f8f5ddc0cbd.js";var _=d((qo,N)=>{var Yo=function(o){if(typeof o==="function")return o;return(n)=>n.$extends(o)},Zo=function(o){return o},S=Object.defineProperty,fo=Object.getOwnPropertyDescriptor,Vo=Object.getOwnPropertyNames,Ho=Object.prototype.hasOwnProperty,To=(o,n)=>{for(var i in n)S(o,i,{get:n[i],enumerable:!0})},zo=(o,n,i,c)=>{if(n&&typeof n==="object"||typeof n==="function"){for(let y of Vo(n))if(!Ho.call(o,y)&&y!==i)S(o,y,{get:()=>n[y],enumerable:!(c=fo(n,y))||c.enumerable})}return o},Ao=(o)=>zo(S({},"__esModule",{value:!0}),o),q={};To(q,{Prisma:()=>t,PrismaClient:()=>Xo,default:()=>Qo});N.exports=Ao(q);var Go={enginesVersion:"393aa359c9ad4a4bb28630fb5613f9c281cde053"},Lo="5.17.0",Wo=Lo,Xo=class{constructor(){throw new Error('@prisma/client did not initialize yet. Please run "prisma generate" and try to import it again.')}},t={defineExtension:Yo,getExtensionContext:Zo,prismaVersion:{client:Wo,engine:Go.enginesVersion}},Qo={Prisma:t}});var l=d((No,p)=>{p.exports={..._()}});function E(o){let n=[];for(let[i,c]of o)n.push(i,...E(c).flat());return Array.from(new Set(n))}function Q(o){const n=[];for(let[i,c]of Object.entries(o))if("run"in c){const y=c.viewPath;if("children"in c){const b=new c.children,$=Q(b.routes);n.push([y,$])}else n.push([y,[]])}else{const y=new c,b=Q(y.routes);n.push(...b)}return n}function J(o){const n={};for(let[i,c]of Object.entries(o))if("run"in c){const y=c;if("children"in y){const b=new y.children,$=J(b.routes);for(let[O,{exec:V,middleware:f}]of Object.entries($)){const A=i==="/"?O:`${i}${O}`,W=O==="/"&&i!=="/"?i:A;n[W]={exec:[y.run.bind(y),...V],middleware:[...y.middlewares,...f]}}}else n[i]={exec:[y.run.bind(y)],middleware:y.middlewares}}else{const y=new c,b=J(y.routes);for(let[$,{exec:O,middleware:V}]of Object.entries(b)){const f=i==="/"?$:`${i}${$}`,A=$==="/"&&i!=="/"?i:f;n[A]={exec:O,middleware:[...y.middlewares,...V]}}}return Object.fromEntries(Object.entries(n).sort(([i],[c])=>{const y=i.split("/").length+i.split(":").length,b=c.split("/").length+c.split(":").length;return y-b}))}function U(o){const n={};for(let[i,c]of Object.entries(o))if("run"in c){const y=c.viewPath;if("children"in c)n[i]=[y];if("children"in c){const b=new c.children,$=U(b.routes);for(let[O,V]of Object.entries($)){const f=i==="/"?O:`${i}${O}`,A=O==="/"&&i!=="/"?i:f;n[A]=[y,...V]}}else n[i]=[y]}else{const y=new c,b=U(y.routes);for(let[$,O]of Object.entries(b)){const V=i==="/"?$:`${i}${$}`,f=$==="/"&&i!=="/"?i:V;n[f]=O}}return n}import{renderToReadableStream as jo} from"react-dom/server.browser";import{createElement as g,Fragment as Oo} from"react";class R{renderParams={styles:[],manifest:{},serverManifest:{},bootstrapModules:[]};flatViewRoutes={};routeManifest={};name="APP";appId;componentTree;middlewareAliases={};devVersion=0;params;apiRouter;viewRouter;Root;kernel;i18nServiceContainer;flatComponentTree=[];constructor(o){this.params=o,this.apiRouter=o.apiRouter,this.viewRouter=o.viewRouter,this.Root=o.root,this.kernel=new o.kernel,this.prepare(),this.appId=D(Date.now()),this.i18nServiceContainer=this.kernel.getServices().i18nServiceContainer,this.i18nServiceContainer.boot()}prepare(){const o=this.params;this.middlewareAliases=o.middlewareAliases??{};const n=this.kernel.getServices(),i=n.authenticationServiceProvider.basePath;let c={"/":this.viewRouter,[i]:n.authenticationServiceProvider.routers.view},y={"/":this.apiRouter,[i]:n.authenticationServiceProvider.routers.api,"/__gemi__/services/i18n":n.i18nServiceContainer.routers.api};for(let b of o.plugins??[]){const $=new b;if($.viewRouter)c={...c,[$.viewRoutesBasePath]:$.viewRouter};if($.apiRouter)y={...y,[$.apiRoutesBasePath]:$.apiRouter}}this.kernel.getServices().apiRouterServiceContainer.service.boot(y),this.flatViewRoutes=J(c),this.componentTree=Q(c),this.flatComponentTree=E(this.componentTree),this.routeManifest=U(c)}getComponentTree(){return this.componentTree}setRenderParams(o){this.renderParams=o}async handleViewRequest(o){const n=new URL(o.url),i=n.searchParams.get("json");let c=null;try{let w=[],j=[],H=null,z={};for(let[T,Y]of Object.entries(this.flatViewRoutes)){const Z=new v({pathname:T});if(Z.test({pathname:n.pathname})){H=T,z=Z.exec({pathname:n.pathname})?.pathname.groups,w=Y.exec,j=Y.middleware;break}}const G=new P(o,z),{data:u,cookies:io,headers:co,user:yo,prefetchedData:wo}=await F.run(G,async()=>{const T=F.getStore();T.setRequest(G),await L.getStore().middlewareServiceContainer.runMiddleware(j,H);const Y=await Promise.all([...w.map((C)=>C(G)),...Array.from(T.prefetchPromiseQueue).map((C)=>C())]),Z=T.cookies,$o=T.headers,bo=T.prefetchedResources;return{data:Y,cookies:Z,headers:$o,user:T.user,prefetchedData:Object.fromEntries(bo.entries())}});c={data:u,prefetchedData:wo,currentPathName:H,user:yo,params:z,cookies:io,headers:co}}catch(w){if(w.kind===h)if(i){const{status:j=400,data:H,directive:z,headers:G}=w.payload.api;return new Response(JSON.stringify({data:H,directive:z}),{headers:G,status:j})}else{const{status:j=400,error:H}=w.payload.view;return new Response(H?.message,{...w.payload.view,status:j})}else throw w}const{data:y,params:b,currentPathName:$,user:O,cookies:V}=c,f=y.reduce((w,j)=>{return{...w,...j}},{}),A=this.i18nServiceContainer.isEnabled;let W={};if(A){const w=this.i18nServiceContainer.detectLocale(new P(o,b)),j=this.i18nServiceContainer.getPageTranslations(w,$);W={[w]:j}}if(i){const w=new Headers;return w.set("Content-Type","application/json"),V.forEach((j)=>w.append("Set-Cookie",j.toString())),w.append("Cache-Control",O?"private, no-cache, no-store, max-age=0, must-revalidate":"public, max-age=864000, must-revalidate"),new Response(JSON.stringify({data:{[n.pathname]:f},prefetchedData:c.prefetchedData,i18n:W,is404:!$}),{headers:w})}const{styles:e,manifest:M,serverManifest:x,bootstrapModules:a}=this.renderParams,B={};let K=null;const k=(w,j)=>`"${w}": () => import("${j}")`,I=[];for(let w of["404",...this.flatComponentTree])if(!M){K=`${process.env.APP_DIR}`;const j=await import(`${K}/views/${w}.tsx?t=${this.appId}`);B[w]=j.default,I.push(k(w,`${K}/views/${w}.tsx?t=${this.appId}`))}else{const j=x[`app/views/${w}.tsx`];if(!j?.file){console.log(`Server file not found for ${w}`),console.log(j);const G=Object.keys(x),u=`app/views/${w}.tsx`;console.log(`${u} not found in server manifest`),console.log(G)}const H=await import(`${process.env.DIST_DIR}/server/${j?.file}?t=${this.appId}`);B[w]=H.default;const z=M[`app/views/${w}.tsx`];if(z)I.push(k(w,`/${z?.file}?t=${this.appId}`))}const oo=`{${I.join(",")}}`,X=new Headers;X.set("Content-Type","text/html"),X.set("Cache-Control",O?"private, no-cache, no-store, max-age=0, must-revalidate":"public, max-age=864000, must-revalidate"),X.set("ETag",this.appId),c.cookies.forEach((w)=>X.append("Set-Cookie",w.toString()));const s={kind:"view",data:{pageData:{[n.pathname]:f},prefetchedData:c.prefetchedData,i18n:W,auth:{user:O},routeManifest:this.routeManifest,router:{pathname:$,params:b,currentPath:n.pathname,searchParams:n.search,is404:!$?!0:!1},componentTree:[["404",[]],...this.componentTree]},head:{}},no=await jo(g(Oo,{children:[e,g(this.Root,{data:s.data,viewImportMap:B})]}),{bootstrapScriptContent:`window.__GEMI_DATA__ = ${JSON.stringify(s.data)}; window.loaders=${oo}`,bootstrapModules:a});return new Response(no,{status:!$?404:200,headers:X})}async fetch(o){const n=new URL(o.url);return this.kernel.run.bind(this.kernel)(async()=>{if(n.pathname.startsWith("/api"))return await this.kernel.services.apiRouterServiceContainer.handleApiRequest(o);else return await this.handleViewRequest(o)})}websocket={message:(o,n)=>{this.kernel.run.bind(this.kernel)(()=>{L.getStore().broadcastingServiceContainer.run(o.data.headers,()=>{L.getStore().broadcastingServiceContainer.handleMessage(o,n)})})},open:(o)=>{},close:(o)=>{console.log("closed ws"),o.terminate()}};onPublish(o){this.kernel.services.broadcastingServiceContainer.onPublish(o)}}var m=Jo(l(),1);var Uo=m.Prisma.defineExtension({name:"Gemi Policies",query:{async $allOperations({args:o,operation:n,query:i,model:c}){const b=L.getStore().policiesServiceProvider.policiesList[`${c}Policies`];if(!b)return await i(o);if(!await b.all.call(b,n,o))throw new r;return await i(o)}}});export{Uo as prismaExtension,R as App};
@@ -20,6 +20,10 @@ export declare class AuthApiRouter extends ApiRouter {
20
20
  password: string;
21
21
  token: string;
22
22
  }, Promise<{}>, {}>;
23
+ "/change-password": import("../http/ApiRouter").RouteHandler<"POST", {
24
+ oldPassword: string;
25
+ newPassword: string;
26
+ }, Promise<{}>, Record<string, never>>;
23
27
  "/me": import("../http/ApiRouter").RouteHandler<"GET", import("../http/HttpRequest").Body, Promise<User>, unknown>;
24
28
  };
25
29
  }
@@ -1 +1 @@
1
- {"version":3,"file":"AuthenticationServiceProvider.d.ts","sourceRoot":"","sources":["../../auth/AuthenticationServiceProvider.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AAC9C,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAGhD,OAAO,KAAK,EAAE,sBAAsB,EAAE,IAAI,EAAE,MAAM,kBAAkB,CAAC;AA8RrE,qBAAa,aAAc,SAAQ,SAAS;IAC1C,MAAM;;mBAxRG,MAAM;sBACH,MAAM;;;kBAkBV,MAAM;mBACL,MAAM;sBACH,MAAM;;;;mBAwBT,MAAM;;;sBAcH,MAAM;mBACT,MAAM;;;MAmOb;CACH;AAED,qBAAa,cAAe,SAAQ,UAAU;IAC5C,MAAM;;;;;MAKJ;CACH;AAED,qBAAa,6BAA6B;IACxC,QAAQ,SAAW;IACnB,OAAO;;;MAGL;IAEF,qBAAqB,SAAM;IAC3B,6BAA6B,SAAc;IAG3C,OAAO,EAAE,sBAAsB,CAAsB;IAE/C,cAAc,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAIhE,YAAY,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAI/C,2BAA2B,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,MAAM,CAAC;IAM9D,QAAQ,CAAC,CAAC,SAAS,IAAI,EAAE,KAAK,EAAE,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;IACxD,QAAQ,CAAC,CAAC,SAAS,IAAI,EAAE,KAAK,EAAE,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;IACxD,SAAS,CAAC,CAAC,SAAS,IAAI,EAAE,KAAK,EAAE,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;IACzD,gBAAgB,CAAC,CAAC,SAAS,IAAI,EAC7B,KAAK,EAAE,CAAC,EACR,kBAAkB,EAAE,MAAM,GACzB,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;IACvB,eAAe,CAAC,CAAC,SAAS,IAAI,EAAE,KAAK,EAAE,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;CAChE"}
1
+ {"version":3,"file":"AuthenticationServiceProvider.d.ts","sourceRoot":"","sources":["../../auth/AuthenticationServiceProvider.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AAC9C,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAGhD,OAAO,KAAK,EAAE,sBAAsB,EAAE,IAAI,EAAE,MAAM,kBAAkB,CAAC;AA+TrE,qBAAa,aAAc,SAAQ,SAAS;IAC1C,MAAM;;mBAzTG,MAAM;sBACH,MAAM;;;kBAkBV,MAAM;mBACL,MAAM;sBACH,MAAM;;;;mBAwBT,MAAM;;;sBAcH,MAAM;mBACT,MAAM;;;yBA2NwB,MAAM;yBAAe,MAAM;;;MA0ChE;CACH;AAED,qBAAa,cAAe,SAAQ,UAAU;IAC5C,MAAM;;;;;MAKJ;CACH;AAED,qBAAa,6BAA6B;IACxC,QAAQ,SAAW;IACnB,OAAO;;;MAGL;IAEF,qBAAqB,SAAM;IAC3B,6BAA6B,SAAc;IAG3C,OAAO,EAAE,sBAAsB,CAAsB;IAE/C,cAAc,CAAC,QAAQ,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;IAIhE,YAAY,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAI/C,2BAA2B,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,CAAC,MAAM,CAAC;IAM9D,QAAQ,CAAC,CAAC,SAAS,IAAI,EAAE,KAAK,EAAE,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;IACxD,QAAQ,CAAC,CAAC,SAAS,IAAI,EAAE,KAAK,EAAE,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;IACxD,SAAS,CAAC,CAAC,SAAS,IAAI,EAAE,KAAK,EAAE,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;IACzD,gBAAgB,CAAC,CAAC,SAAS,IAAI,EAC7B,KAAK,EAAE,CAAC,EACR,kBAAkB,EAAE,MAAM,GACzB,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;IACvB,eAAe,CAAC,CAAC,SAAS,IAAI,EAAE,KAAK,EAAE,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC,GAAG,IAAI;CAChE"}
@@ -0,0 +1,2 @@
1
+ // @bun
2
+ import"./chunk-24a86f8f5ddc0cbd.js";import"./chunk-786985b106091b91.js";import{yb as o} from"./chunk-5bfe9d4cbecd160a.js";import{Fb as K,Lb as S} from"./chunk-b033519a526dfb3f.js";import{exec as _} from"child_process";import{promisify as y} from"util";var i=(c,n,s)=>{if(n.Version!==1)throw Error(`Profile ${c} credential_process did not return Version 1.`);if(n.AccessKeyId===void 0||n.SecretAccessKey===void 0)throw Error(`Profile ${c} credential_process returned invalid credentials.`);if(n.Expiration){const t=new Date;if(new Date(n.Expiration)<t)throw Error(`Profile ${c} credential_process returned expired credentials.`)}let e=n.AccountId;if(!e&&s?.[c]?.aws_account_id)e=s[c].aws_account_id;return{accessKeyId:n.AccessKeyId,secretAccessKey:n.SecretAccessKey,...n.SessionToken&&{sessionToken:n.SessionToken},...n.Expiration&&{expiration:new Date(n.Expiration)},...n.CredentialScope&&{credentialScope:n.CredentialScope},...e&&{accountId:e}}};var x=async(c,n,s)=>{const e=n[c];if(n[c]){const t=e.credential_process;if(t!==void 0){const u=y(_);try{const{stdout:r}=await u(t);let w;try{w=JSON.parse(r.trim())}catch{throw Error(`Profile ${c} credential_process returned invalid JSON.`)}return i(c,w,n)}catch(r){throw new o(r.message,{logger:s})}}else throw new o(`Profile ${c} did not contain credential_process.`,{logger:s})}else throw new o(`Profile ${c} could not be found in shared credentials file.`,{logger:s})};var $=(c={})=>async()=>{c.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");const n=await S(c);return x(K(c),n,c.logger)};export{$ as fromProcess};
@@ -0,0 +1,2 @@
1
+ // @bun
2
+ import"./chunk-24a86f8f5ddc0cbd.js";import{yb as E} from"./chunk-5bfe9d4cbecd160a.js";var _="AWS_ACCESS_KEY_ID",S="AWS_SECRET_ACCESS_KEY",p="AWS_SESSION_TOKEN",A="AWS_CREDENTIAL_EXPIRATION",C="AWS_CREDENTIAL_SCOPE",N="AWS_ACCOUNT_ID",a=(e)=>async()=>{e?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");const o=process.env[_],r=process.env[S],n=process.env[p],s=process.env[A],t=process.env[C],c=process.env[N];if(o&&r)return{accessKeyId:o,secretAccessKey:r,...n&&{sessionToken:n},...s&&{expiration:new Date(s)},...t&&{credentialScope:t},...c&&{accountId:c}};throw new E("Unable to find environment variable credentials.",{logger:e?.logger})};export{a as fromEnv,p as ENV_SESSION,S as ENV_SECRET,_ as ENV_KEY,A as ENV_EXPIRATION,C as ENV_CREDENTIAL_SCOPE,N as ENV_ACCOUNT_ID};export{_ as u,S as v,a as w};
@@ -0,0 +1,2 @@
1
+ // @bun
2
+ import{B as c} from"./chunk-24a86f8f5ddc0cbd.js";import"./chunk-28694e5e949df0ff.js";import{$ as f,O as cs,P as Ce,Q as Le,R as Me,S as We,W as F,X as Ke,Y as G,Z as V,_ as N,aa as Qe,ba as me,ca as he,da as ue,ea as we,fa as Xe,ga as Ye,ia as rs,ja as as,ka as Ze,la as be,ma as xe,na as je,oa as ve,pa as Te,qa as x,ra as ke,sa as Re,ta as Ee,ua as qe,va as Pe,wa as Je} from"./chunk-d5f34554362c0fde.js";import{$a as D,Ea as ee,Ga as se,Ha as te,Ja as Ae,Ka as re,La as ae,Oa as ie,Pa as le,Va as ts,Wa as R,ab as Ve,bb as h,ib as He,jb as u,kb as Ne,lb as pe,mb as ye,nb as _e,ob as $e,qb as i,rb as y,tb as fe,xa as Fe,ya as Ue} from"./chunk-d96668bed492732f.js";import"./chunk-786985b106091b91.js";import{vb as l,wb as ne} from"./chunk-f7a2f27070c1a0cf.js";import"./chunk-5bfe9d4cbecd160a.js";import"./chunk-b033519a526dfb3f.js";var p=c(F(),1);var _=c(x(),1),v=c(cs(),1),is=function(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(s,t)=>({signingProperties:{config:s,context:t}})}},b=function(e){return{schemeId:"smithy.api#noAuth"}},$=async(e,s,t)=>{return{operation:v.getSmithyContext(s).operation,region:await v.normalizeProvider(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}},P=(e)=>{const s=[];switch(e.operation){case"GetRoleCredentials":{s.push(b(e));break}case"ListAccountRoles":{s.push(b(e));break}case"ListAccounts":{s.push(b(e));break}case"Logout":{s.push(b(e));break}default:s.push(is(e))}return s},J=(e)=>{return{..._.resolveAwsSdkSigV4Config(e)}};var I=(e)=>{return{...e,useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}},C={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var L={name:"@aws-sdk/client-sso",description:"AWS SDK for JavaScript Sso Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sso","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sso"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sso",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sso"}};var Se=c(x(),1);var de=c(x(),1),oe=c(F(),1);var M={["required"]:!1,type:"String"},W={["required"]:!0,default:!1,type:"Boolean"},A={["ref"]:"Endpoint"},j={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseFIPS"},!0]},T={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseDualStack"},!0]},d={},K={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},H={["ref"]:"PartitionResult"},Q={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[H,"supportsDualStack"]}]},X=[j],Y=[T],Z=[{["ref"]:"Region"}],ps={version:"1.0",parameters:{Region:M,UseDualStack:W,UseFIPS:W,Endpoint:M},rules:[{conditions:[{["fn"]:"isSet",["argv"]:[A]}],rules:[{conditions:X,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:"error"},{conditions:Y,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:"error"},{endpoint:{url:A,properties:d,headers:d},type:"endpoint"}],type:"tree"},{conditions:[{["fn"]:"isSet",["argv"]:Z}],rules:[{conditions:[{["fn"]:"aws.partition",["argv"]:Z,assign:"PartitionResult"}],rules:[{conditions:[j,T],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,K]},Q],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:"error"}],type:"tree"},{conditions:X,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[K,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[H,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:d,headers:d},type:"endpoint"},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",type:"error"}],type:"tree"},{conditions:Y,rules:[{conditions:[Q],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",type:"error"}],type:"tree"},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"}],type:"tree"},{error:"Invalid Configuration: Missing Region",type:"error"}]},O=ps;var ys=new G({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),g=(e,s={})=>{return ys.get(e,()=>N(O,{endpointParams:e,logger:s.logger}))};V.aws=f;var ce=(e)=>{return{apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??re,base64Encoder:e?.base64Encoder??ae,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??g,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??P,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(s)=>s.getIdentityProvider("aws.auth#sigv4"),signer:new de.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(s)=>s.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new oe.NoAuthSigner}],logger:e?.logger??new te,serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??ne,utf8Decoder:e?.utf8Decoder??ee,utf8Encoder:e?.utf8Encoder??se}};var ze=(e)=>{ye(process.version);const s=qe(e),t=()=>s().then(pe),r=ce(e);return Se.emitWarningIfUnsupportedVersion(process.version),{...r,...e,runtime:"node",defaultsMode:s,bodyLengthChecker:e?.bodyLengthChecker??Ee,defaultUserAgentProvider:e?.defaultUserAgentProvider??ke({serviceId:r.serviceId,clientVersion:L.version}),maxAttempts:e?.maxAttempts??l(xe),region:e?.region??l(ue,we),requestHandler:ie.create(e?.requestHandler??t),retryMode:e?.retryMode??l({...ve,default:async()=>(await t()).retryMode||be}),sha256:e?.sha256??Re.bind(null,"sha256"),streamCollector:e?.streamCollector??le,useDualstackEndpoint:e?.useDualstackEndpoint??l(me),useFipsEndpoint:e?.useFipsEndpoint??l(he)}};var De=(e)=>{const s=e.httpAuthSchemes;let{httpAuthSchemeProvider:t,credentials:r}=e;return{setHttpAuthScheme(a){const n=s.findIndex((B)=>B.schemeId===a.schemeId);if(n===-1)s.push(a);else s.splice(n,1,a)},httpAuthSchemes(){return s},setHttpAuthSchemeProvider(a){t=a},httpAuthSchemeProvider(){return t},setCredentials(a){r=a},credentials(){return r}}},Be=(e)=>{return{httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}};var k=(e)=>e,Ie=(e,s)=>{const t={...k(Pe(e)),...k(_e(e)),...k(Fe(e)),...k(De(e))};return s.forEach((r)=>r.configure(t)),{...e,...Je(t),...$e(t),...Ue(t),...Be(t)}};class ms extends Ae{constructor(...[e]){const s=ze(e||{}),t=I(s),r=Ke(t),a=je(r),n=Xe(a),B=Ce(n),ns=Ze(B),ds=J(ns),U=Ie(ds,e?.extensions||[]);super(U);this.config=U,this.middlewareStack.use(Qe(this.config)),this.middlewareStack.use(Te(this.config)),this.middlewareStack.use(Ye(this.config)),this.middlewareStack.use(Le(this.config)),this.middlewareStack.use(Me(this.config)),this.middlewareStack.use(We(this.config)),this.middlewareStack.use(p.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:$,identityProviderConfigProvider:async(os)=>new p.DefaultIdentityProviderConfig({"aws.auth#sigv4":os.credentials})})),this.middlewareStack.use(p.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class o extends He{constructor(e){super(e);Object.setPrototypeOf(this,o.prototype)}}class E extends o{constructor(e){super({name:"InvalidRequestException",$fault:"client",...e});this.name="InvalidRequestException",this.$fault="client",Object.setPrototypeOf(this,E.prototype)}}class q extends o{constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e});this.name="ResourceNotFoundException",this.$fault="client",Object.setPrototypeOf(this,q.prototype)}}class S extends o{constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e});this.name="TooManyRequestsException",this.$fault="client",Object.setPrototypeOf(this,S.prototype)}}class z extends o{constructor(e){super({name:"UnauthorizedException",$fault:"client",...e});this.name="UnauthorizedException",this.$fault="client",Object.setPrototypeOf(this,z.prototype)}}var Oe=(e)=>({...e,...e.accessToken&&{accessToken:R}}),hs=(e)=>({...e,...e.secretAccessKey&&{secretAccessKey:R},...e.sessionToken&&{sessionToken:R}}),Ge=(e)=>({...e,...e.roleCredentials&&{roleCredentials:hs(e.roleCredentials)}});var m=c(x(),1),ge=c(F(),1);var es=async(e,s)=>{const t=ge.requestBuilder(e,s),r=i({},Rs,{[Bs]:e[qs]});t.bp("/federation/credentials");const a=i({[Ds]:[,D(e[zs],"roleName")],[Ss]:[,D(e[Es],"accountId")]});let n;return t.m("GET").h(r).q(a).b(n),t.build()};var ss=async(e,s)=>{if(e.statusCode!==200&&e.statusCode>=300)return us(e,s);const t=i({$metadata:w(e)}),r=D(Ve(await m.parseJsonBody(e.body,s)),"body"),a=y(r,{roleCredentials:fe});return Object.assign(t,a),t};var us=async(e,s)=>{const t={...e,body:await m.parseJsonErrorBody(e.body,s)},r=m.loadRestJsonErrorCode(e,t.body);switch(r){case"InvalidRequestException":case"com.amazonaws.sso#InvalidRequestException":throw await bs(t,s);case"ResourceNotFoundException":case"com.amazonaws.sso#ResourceNotFoundException":throw await xs(t,s);case"TooManyRequestsException":case"com.amazonaws.sso#TooManyRequestsException":throw await vs(t,s);case"UnauthorizedException":case"com.amazonaws.sso#UnauthorizedException":throw await ks(t,s);default:const a=t.body;return ws({output:e,parsedBody:a,errorCode:r})}},ws=Ne(o),bs=async(e,s)=>{const t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);const n=new E({$metadata:w(e),...t});return u(n,e.body)},xs=async(e,s)=>{const t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);const n=new q({$metadata:w(e),...t});return u(n,e.body)},vs=async(e,s)=>{const t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);const n=new S({$metadata:w(e),...t});return u(n,e.body)},ks=async(e,s)=>{const t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);const n=new z({$metadata:w(e),...t});return u(n,e.body)},w=(e)=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]});var Rs=(e)=>e!==void 0&&e!==null&&e!==""&&(!Object.getOwnPropertyNames(e).includes("length")||e.length!=0)&&(!Object.getOwnPropertyNames(e).includes("size")||e.size!=0),Es="accountId",qs="accessToken",Ss="account_id";var zs="roleName",Ds="role_name",Bs="x-amz-sso_bearer_token";class Fs extends ts.classBuilder().ep(C).m(function(e,s,t,r){return[rs(t,this.serialize,this.deserialize),as(t,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").f(Oe,Ge).ser(es).de(ss).build(){}export{ms as SSOClient,Fs as GetRoleCredentialsCommand};
@@ -0,0 +1 @@
1
+ class n extends Error{constructor(t,e=!0){let o,r=!0;if(typeof e==="boolean")o=void 0,r=e;else if(e!=null&&typeof e==="object")o=e.logger,r=e.tryNextLink??!0;super(t);this.name="ProviderError",this.tryNextLink=r,Object.setPrototypeOf(this,n.prototype),o?.debug?.(`@smithy/property-provider ${r?"->":"(!)"} ${t}`)}static from(t,e=!0){return Object.assign(new this(t.message,e),t)}}class u extends n{constructor(t,e=!0){super(t,e);this.name="CredentialsProviderError",Object.setPrototypeOf(this,u.prototype)}}class l extends n{constructor(t,e=!0){super(t,e);this.name="TokenProviderError",Object.setPrototypeOf(this,l.prototype)}}var v=(...t)=>async()=>{if(t.length===0)throw new n("No providers in chain");let e;for(let o of t)try{return await o()}catch(r){if(e=r,r?.tryNextLink)continue;throw r}throw e};var w=(t)=>()=>Promise.resolve(t);var b=(t,e,o)=>{let r,i,s,f=!1;const a=async()=>{if(!i)i=t();try{r=await i,s=!0,f=!1}finally{i=void 0}return r};if(e===void 0)return async(c)=>{if(!s||c?.forceRefresh)r=await a();return r};return async(c)=>{if(!s||c?.forceRefresh)r=await a();if(f)return r;if(o&&!o(r))return f=!0,r;if(e(r))return await a(),r;return r}};export{n as xb,u as yb,l as zb,v as Ab,w as Bb,b as Cb};
@@ -0,0 +1,2 @@
1
+ // @bun
2
+ import"./chunk-0f500a6384fcd132.js";import{B as A} from"./chunk-24a86f8f5ddc0cbd.js";import"./chunk-28694e5e949df0ff.js";import{$ as Nl,O as Dw,P as k0,Q as K0,R as F0,S as B0,W as Xh,X as y0,Y as ql,Z as zl,_ as Ml,aa as Q0,ba as gl,ca as xl,da as il,ea as cl,fa as X0,ga as Y0,ia as F,ja as B,ka as Z0,la as el,ma as pl,na as $0,oa as nl,pa as V0,qa as Gh,ra as ol,sa as ul,ta as tl,ua as h0,va as J0,wa as D0} from"./chunk-d5f34554362c0fde.js";import{$a as L0,Ea as Tl,Ga as Al,Ha as Ll,Ja as U0,Ka as Rl,La as jl,Oa as bl,Pa as fl,Va as K,Wa as Hh,Xa as t0,bb as H,db as u,gb as R0,ib as P0,jb as T,kb as j0,lb as Cl,mb as Ol,nb as H0,ob as m0,pb as ph,xa as I0,ya as S0,za as A0} from"./chunk-d96668bed492732f.js";import"./chunk-786985b106091b91.js";import{vb as f,wb as al} from"./chunk-f7a2f27070c1a0cf.js";import"./chunk-5bfe9d4cbecd160a.js";import{Db as Yh} from"./chunk-ce91e437af790f62.js";import"./chunk-b033519a526dfb3f.js";var C=A(Xh(),1);var dl=A(Gh(),1),dh=A(Dw(),1);var Ew=function(h){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:h.region},propertiesExtractor:(w,l)=>({signingProperties:{config:w,context:l}})}},Gl=function(h){return{schemeId:"smithy.api#noAuth"}},Il=async(h,w,l)=>{return{operation:dh.getSmithyContext(w).operation,region:await dh.normalizeProvider(h.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}},Sl=(h)=>{const w=[];switch(h.operation){case"AssumeRoleWithSAML":{w.push(Gl(h));break}case"AssumeRoleWithWebIdentity":{w.push(Gl(h));break}default:w.push(Ew(h))}return w},kw=(h)=>({...h,stsClientCtor:L}),Hl=(h)=>{const w=kw(h);return{...dl.resolveAwsSdkSigV4Config(w)}};var ml=(h)=>{return{...h,useDualstackEndpoint:h.useDualstackEndpoint??!1,useFipsEndpoint:h.useFipsEndpoint??!1,useGlobalEndpoint:h.useGlobalEndpoint??!1,defaultSigningName:"sts"}},D={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var Jl={name:"@aws-sdk/client-sts",description:"AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sts","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"rimraf ./dist-types tsconfig.types.tsbuildinfo && tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sts",test:"yarn test:unit","test:unit":"jest"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/client-sso-oidc":"3.654.0","@aws-sdk/core":"3.654.0","@aws-sdk/credential-provider-node":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sts",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sts"}};var Ih=A(Gh(),1);var l0=A(Xh(),1);var sl=A(Gh(),1),rl=A(Xh(),1);var Dl={["required"]:!1,["type"]:"String"},Qh={["required"]:!0,default:!1,["type"]:"Boolean"},Xl={["ref"]:"Endpoint"},El={["fn"]:"isSet",["argv"]:[{["ref"]:"Region"}]},J={["ref"]:"Region"},kl={["fn"]:"aws.partition",["argv"]:[J],assign:"PartitionResult"},Yl={["ref"]:"UseFIPS"},Zl={["ref"]:"UseDualStack"},E={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"us-east-1"}]},headers:{}},X={},Kl={conditions:[{["fn"]:"stringEquals",["argv"]:[J,"aws-global"]}],["endpoint"]:E,["type"]:"endpoint"},$l={["fn"]:"booleanEquals",["argv"]:[Yl,!0]},Vl={["fn"]:"booleanEquals",["argv"]:[Zl,!0]},Fl={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},Pl={["ref"]:"PartitionResult"},Bl={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[Pl,"supportsDualStack"]}]},Ul=[{["fn"]:"isSet",["argv"]:[Xl]}],yl=[$l],Ql=[Vl],Fw={version:"1.0",parameters:{Region:Dl,UseDualStack:Qh,UseFIPS:Qh,Endpoint:Dl,UseGlobalEndpoint:Qh},rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseGlobalEndpoint"},!0]},{["fn"]:"not",["argv"]:Ul},El,kl,{["fn"]:"booleanEquals",["argv"]:[Yl,!1]},{["fn"]:"booleanEquals",["argv"]:[Zl,!1]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-northeast-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-south-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-southeast-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-southeast-2"]}],endpoint:E,["type"]:"endpoint"},Kl,{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ca-central-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-central-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-north-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-2"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-3"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"sa-east-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-east-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-east-2"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-west-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-west-2"]}],endpoint:E,["type"]:"endpoint"},{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"{Region}"}]},headers:X},["type"]:"endpoint"}],["type"]:"tree"},{conditions:Ul,rules:[{conditions:yl,error:"Invalid Configuration: FIPS and custom endpoint are not supported",["type"]:"error"},{conditions:Ql,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",["type"]:"error"},{endpoint:{url:Xl,properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{conditions:[El],rules:[{conditions:[kl],rules:[{conditions:[$l,Vl],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,Fl]},Bl],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",["type"]:"error"}],["type"]:"tree"},{conditions:yl,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[Fl,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[Pl,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:X,headers:X},["type"]:"endpoint"},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",["type"]:"error"}],["type"]:"tree"},{conditions:Ql,rules:[{conditions:[Bl],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",["type"]:"error"}],["type"]:"tree"},Kl,{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:X,headers:X},["type"]:"endpoint"}],["type"]:"tree"}],["type"]:"tree"},{error:"Invalid Configuration: Missing Region",["type"]:"error"}]},vl=Fw;var Bw=new ql({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),Wl=(h,w={})=>{return Bw.get(h,()=>Ml(vl,{endpointParams:h,logger:w.logger}))};zl.aws=Nl;var _l=(h)=>{return{apiVersion:"2011-06-15",base64Decoder:h?.base64Decoder??Rl,base64Encoder:h?.base64Encoder??jl,disableHostPrefix:h?.disableHostPrefix??!1,endpointProvider:h?.endpointProvider??Wl,extensions:h?.extensions??[],httpAuthSchemeProvider:h?.httpAuthSchemeProvider??Sl,httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(w)=>w.getIdentityProvider("aws.auth#sigv4"),signer:new sl.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(w)=>w.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new rl.NoAuthSigner}],logger:h?.logger??new Ll,serviceId:h?.serviceId??"STS",urlParser:h?.urlParser??al,utf8Decoder:h?.utf8Decoder??Tl,utf8Encoder:h?.utf8Encoder??Al}};var w0=(h)=>{Ol(process.version);const w=h0(h),l=()=>w().then(Cl),G=_l(h);return Ih.emitWarningIfUnsupportedVersion(process.version),{...G,...h,runtime:"node",defaultsMode:w,bodyLengthChecker:h?.bodyLengthChecker??tl,credentialDefaultProvider:h?.credentialDefaultProvider??Yh,defaultUserAgentProvider:h?.defaultUserAgentProvider??ol({serviceId:G.serviceId,clientVersion:Jl.version}),httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(d)=>d.getIdentityProvider("aws.auth#sigv4")||(async(S)=>await Yh(S?.__config||{})()),signer:new Ih.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(d)=>d.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new l0.NoAuthSigner}],maxAttempts:h?.maxAttempts??f(pl),region:h?.region??f(il,cl),requestHandler:bl.create(h?.requestHandler??l),retryMode:h?.retryMode??f({...nl,default:async()=>(await l()).retryMode||el}),sha256:h?.sha256??ul.bind(null,"sha256"),streamCollector:h?.streamCollector??fl,useDualstackEndpoint:h?.useDualstackEndpoint??f(gl),useFipsEndpoint:h?.useFipsEndpoint??f(xl)}};var G0=(h)=>{const w=h.httpAuthSchemes;let{httpAuthSchemeProvider:l,credentials:G}=h;return{setHttpAuthScheme(d){const S=w.findIndex((I)=>I.schemeId===d.schemeId);if(S===-1)w.push(d);else w.splice(S,1,d)},httpAuthSchemes(){return w},setHttpAuthSchemeProvider(d){l=d},httpAuthSchemeProvider(){return l},setCredentials(d){G=d},credentials(){return G}}},d0=(h)=>{return{httpAuthSchemes:h.httpAuthSchemes(),httpAuthSchemeProvider:h.httpAuthSchemeProvider(),credentials:h.credentials()}};var Sh=(h)=>h,E0=(h,w)=>{const l={...Sh(J0(h)),...Sh(H0(h)),...Sh(I0(h)),...Sh(G0(h))};return w.forEach((G)=>G.configure(l)),{...h,...D0(l),...m0(l),...S0(l),...d0(l)}};class L extends U0{constructor(...[h]){const w=w0(h||{}),l=ml(w),G=y0(l),d=$0(G),S=X0(d),I=k0(S),Q=Z0(I),z=Hl(Q),v=E0(z,h?.extensions||[]);super(v);this.config=v,this.middlewareStack.use(Q0(this.config)),this.middlewareStack.use(V0(this.config)),this.middlewareStack.use(Y0(this.config)),this.middlewareStack.use(K0(this.config)),this.middlewareStack.use(F0(this.config)),this.middlewareStack.use(B0(this.config)),this.middlewareStack.use(C.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Il,identityProviderConfigProvider:async(n)=>new C.DefaultIdentityProviderConfig({"aws.auth#sigv4":n.credentials})})),this.middlewareStack.use(C.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class Y extends P0{constructor(h){super(h);Object.setPrototypeOf(this,Y.prototype)}}class mh extends Y{constructor(h){super({name:"ExpiredTokenException",$fault:"client",...h});this.name="ExpiredTokenException",this.$fault="client",Object.setPrototypeOf(this,mh.prototype)}}class Jh extends Y{constructor(h){super({name:"MalformedPolicyDocumentException",$fault:"client",...h});this.name="MalformedPolicyDocumentException",this.$fault="client",Object.setPrototypeOf(this,Jh.prototype)}}class Dh extends Y{constructor(h){super({name:"PackedPolicyTooLargeException",$fault:"client",...h});this.name="PackedPolicyTooLargeException",this.$fault="client",Object.setPrototypeOf(this,Dh.prototype)}}class Eh extends Y{constructor(h){super({name:"RegionDisabledException",$fault:"client",...h});this.name="RegionDisabledException",this.$fault="client",Object.setPrototypeOf(this,Eh.prototype)}}class kh extends Y{constructor(h){super({name:"IDPRejectedClaimException",$fault:"client",...h});this.name="IDPRejectedClaimException",this.$fault="client",Object.setPrototypeOf(this,kh.prototype)}}class Kh extends Y{constructor(h){super({name:"InvalidIdentityTokenException",$fault:"client",...h});this.name="InvalidIdentityTokenException",this.$fault="client",Object.setPrototypeOf(this,Kh.prototype)}}class Fh extends Y{constructor(h){super({name:"IDPCommunicationErrorException",$fault:"client",...h});this.name="IDPCommunicationErrorException",this.$fault="client",Object.setPrototypeOf(this,Fh.prototype)}}class Bh extends Y{constructor(h){super({name:"InvalidAuthorizationMessageException",$fault:"client",...h});this.name="InvalidAuthorizationMessageException",this.$fault="client",Object.setPrototypeOf(this,Bh.prototype)}}var o=(h)=>({...h,...h.SecretAccessKey&&{SecretAccessKey:Hh}}),v0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),q0=(h)=>({...h,...h.SAMLAssertion&&{SAMLAssertion:Hh}}),z0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),M0=(h)=>({...h,...h.WebIdentityToken&&{WebIdentityToken:Hh}}),N0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),W0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),T0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}});var q=A(Gh(),1);var a0=async(h,w)=>{const l=a;let G;return G=b({...Pw(h,w),[r]:lG,[_]:s}),j(w,l,"/",void 0,G)},s0=async(h,w)=>{const l=a;let G;return G=b({...vw(h,w),[r]:wG,[_]:s}),j(w,l,"/",void 0,G)},r0=async(h,w)=>{const l=a;let G;return G=b({...qw(h,w),[r]:GG,[_]:s}),j(w,l,"/",void 0,G)},_0=async(h,w)=>{const l=a;let G;return G=b({...zw(h,w),[r]:dG,[_]:s}),j(w,l,"/",void 0,G)},b0=async(h,w)=>{const l=a;let G;return G=b({...Mw(h,w),[r]:IG,[_]:s}),j(w,l,"/",void 0,G)},f0=async(h,w)=>{const l=a;let G;return G=b({...Nw(h,w),[r]:SG,[_]:s}),j(w,l,"/",void 0,G)},C0=async(h,w)=>{const l=a;let G;return G=b({...Ww(h,w),[r]:HG,[_]:s}),j(w,l,"/",void 0,G)},O0=async(h,w)=>{const l=a;let G;return G=b({...Tw(h,w),[r]:mG,[_]:s}),j(w,l,"/",void 0,G)},g0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=sw(l.AssumeRoleResult,w),{$metadata:k(h),...G}},x0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=rw(l.AssumeRoleWithSAMLResult,w),{$metadata:k(h),...G}},i0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=_w(l.AssumeRoleWithWebIdentityResult,w),{$metadata:k(h),...G}},c0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=bw(l.DecodeAuthorizationMessageResult,w),{$metadata:k(h),...G}},e0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=Ow(l.GetAccessKeyInfoResult,w),{$metadata:k(h),...G}},p0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=gw(l.GetCallerIdentityResult,w),{$metadata:k(h),...G}},n0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=xw(l.GetFederationTokenResult,w),{$metadata:k(h),...G}},o0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);const l=await q.parseXmlBody(h.body,w);let G={};return G=iw(l.GetSessionTokenResult,w),{$metadata:k(h),...G}},R=async(h,w)=>{const l={...h,body:await q.parseXmlErrorBody(h.body,w)},G=JG(h,l.body);switch(G){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await Uw(l,w);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await Zw(l,w);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await $w(l,w);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await Vw(l,w);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await Qw(l,w);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await Yw(l,w);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await yw(l,w);case"InvalidAuthorizationMessageException":case"com.amazonaws.sts#InvalidAuthorizationMessageException":throw await Xw(l,w);default:const d=l.body;return hG({output:h,parsedBody:d.Error,errorCode:G})}},Uw=async(h,w)=>{const l=h.body,G=fw(l.Error,w),d=new mh({$metadata:k(h),...G});return T(d,l)},yw=async(h,w)=>{const l=h.body,G=cw(l.Error,w),d=new Fh({$metadata:k(h),...G});return T(d,l)},Qw=async(h,w)=>{const l=h.body,G=ew(l.Error,w),d=new kh({$metadata:k(h),...G});return T(d,l)},Xw=async(h,w)=>{const l=h.body,G=pw(l.Error,w),d=new Bh({$metadata:k(h),...G});return T(d,l)},Yw=async(h,w)=>{const l=h.body,G=nw(l.Error,w),d=new Kh({$metadata:k(h),...G});return T(d,l)},Zw=async(h,w)=>{const l=h.body,G=ow(l.Error,w),d=new Jh({$metadata:k(h),...G});return T(d,l)},$w=async(h,w)=>{const l=h.body,G=uw(l.Error,w),d=new Dh({$metadata:k(h),...G});return T(d,l)},Vw=async(h,w)=>{const l=h.body,G=tw(l.Error,w),d=new Eh({$metadata:k(h),...G});return T(d,l)},Pw=(h,w)=>{const l={};if(h[W]!=null)l[W]=h[W];if(h[i]!=null)l[i]=h[i];if(h[$]!=null){const G=Uh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([d,S])=>{const I=`PolicyArns.${d}`;l[I]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];if(h[e]!=null){const G=u0(h[e],w);if(h[e]?.length===0)l.Tags=[];Object.entries(G).forEach(([d,S])=>{const I=`Tags.${d}`;l[I]=S})}if(h[gh]!=null){const G=aw(h[gh],w);if(h[gh]?.length===0)l.TransitiveTagKeys=[];Object.entries(G).forEach(([d,S])=>{const I=`TransitiveTagKeys.${d}`;l[I]=S})}if(h[vh]!=null)l[vh]=h[vh];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];if(h[P]!=null)l[P]=h[P];if(h[jh]!=null){const G=Rw(h[jh],w);if(h[jh]?.length===0)l.ProvidedContexts=[];Object.entries(G).forEach(([d,S])=>{const I=`ProvidedContexts.${d}`;l[I]=S})}return l},vw=(h,w)=>{const l={};if(h[W]!=null)l[W]=h[W];if(h[Lh]!=null)l[Lh]=h[Lh];if(h[bh]!=null)l[bh]=h[bh];if(h[$]!=null){const G=Uh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([d,S])=>{const I=`PolicyArns.${d}`;l[I]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},qw=(h,w)=>{const l={};if(h[W]!=null)l[W]=h[W];if(h[i]!=null)l[i]=h[i];if(h[ch]!=null)l[ch]=h[ch];if(h[ah]!=null)l[ah]=h[ah];if(h[$]!=null){const G=Uh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([d,S])=>{const I=`PolicyArns.${d}`;l[I]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},zw=(h,w)=>{const l={};if(h[qh]!=null)l[qh]=h[qh];return l},Mw=(h,w)=>{const l={};if(h[O]!=null)l[O]=h[O];return l},Nw=(h,w)=>{return{}},Ww=(h,w)=>{const l={};if(h[Th]!=null)l[Th]=h[Th];if(h[Z]!=null)l[Z]=h[Z];if(h[$]!=null){const G=Uh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([d,S])=>{const I=`PolicyArns.${d}`;l[I]=S})}if(h[y]!=null)l[y]=h[y];if(h[e]!=null){const G=u0(h[e],w);if(h[e]?.length===0)l.Tags=[];Object.entries(G).forEach(([d,S])=>{const I=`Tags.${d}`;l[I]=S})}return l},Tw=(h,w)=>{const l={};if(h[y]!=null)l[y]=h[y];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];return l},Uh=(h,w)=>{const l={};let G=1;for(let d of h){if(d===null)continue;const S=Aw(d,w);Object.entries(S).forEach(([I,Q])=>{l[`member.${G}.${I}`]=Q}),G++}return l},Aw=(h,w)=>{const l={};if(h[eh]!=null)l[eh]=h[eh];return l},Lw=(h,w)=>{const l={};if(h[Rh]!=null)l[Rh]=h[Rh];if(h[$h]!=null)l[$h]=h[$h];return l},Rw=(h,w)=>{const l={};let G=1;for(let d of h){if(d===null)continue;const S=Lw(d,w);Object.entries(S).forEach(([I,Q])=>{l[`member.${G}.${I}`]=Q}),G++}return l},jw=(h,w)=>{const l={};if(h[Wh]!=null)l[Wh]=h[Wh];if(h[ih]!=null)l[ih]=h[ih];return l},aw=(h,w)=>{const l={};let G=1;for(let d of h){if(d===null)continue;l[`member.${G}`]=d,G++}return l},u0=(h,w)=>{const l={};let G=1;for(let d of h){if(d===null)continue;const S=jw(d,w);Object.entries(S).forEach(([I,Q])=>{l[`member.${G}.${I}`]=Q}),G++}return l},nh=(h,w)=>{const l={};if(h[Zh]!=null)l[Zh]=H(h[Zh]);if(h[N]!=null)l[N]=H(h[N]);return l},sw=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[M]!=null)l[M]=nh(h[M],w);if(h[V]!=null)l[V]=u(h[V]);if(h[P]!=null)l[P]=H(h[P]);return l},rw=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[M]!=null)l[M]=nh(h[M],w);if(h[V]!=null)l[V]=u(h[V]);if(h[rh]!=null)l[rh]=H(h[rh]);if(h[Ch]!=null)l[Ch]=H(h[Ch]);if(h[Nh]!=null)l[Nh]=H(h[Nh]);if(h[x]!=null)l[x]=H(h[x]);if(h[Ah]!=null)l[Ah]=H(h[Ah]);if(h[P]!=null)l[P]=H(h[P]);return l},_w=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[fh]!=null)l[fh]=H(h[fh]);if(h[M]!=null)l[M]=nh(h[M],w);if(h[V]!=null)l[V]=u(h[V]);if(h[sh]!=null)l[sh]=H(h[sh]);if(h[x]!=null)l[x]=H(h[x]);if(h[P]!=null)l[P]=H(h[P]);return l},t=(h,w)=>{const l={};if(h[O]!=null)l[O]=H(h[O]);if(h[_h]!=null)l[_h]=H(h[_h]);if(h[Oh]!=null)l[Oh]=H(h[Oh]);if(h[Ph]!=null)l[Ph]=L0(R0(h[Ph]));return l},bw=(h,w)=>{const l={};if(h[Vh]!=null)l[Vh]=H(h[Vh]);return l},fw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},Cw=(h,w)=>{const l={};if(h[Mh]!=null)l[Mh]=H(h[Mh]);if(h[N]!=null)l[N]=H(h[N]);return l},Ow=(h,w)=>{const l={};if(h[g]!=null)l[g]=H(h[g]);return l},gw=(h,w)=>{const l={};if(h[xh]!=null)l[xh]=H(h[xh]);if(h[g]!=null)l[g]=H(h[g]);if(h[N]!=null)l[N]=H(h[N]);return l},xw=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[zh]!=null)l[zh]=Cw(h[zh],w);if(h[V]!=null)l[V]=u(h[V]);return l},iw=(h,w)=>{const l={};if(h[U]!=null)l[U]=t(h[U],w);return l},cw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},ew=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},pw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},nw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},ow=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},uw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},tw=(h,w)=>{const l={};if(h[m]!=null)l[m]=H(h[m]);return l},k=(h)=>({httpStatusCode:h.statusCode,requestId:h.headers["x-amzn-requestid"]??h.headers["x-amzn-request-id"]??h.headers["x-amz-request-id"],extendedRequestId:h.headers["x-amz-id-2"],cfId:h.headers["x-amz-cf-id"]});var hG=j0(Y),j=async(h,w,l,G,d)=>{const{hostname:S,protocol:I="https",port:Q,path:z}=await h.endpoint(),v={protocol:I,hostname:S,port:Q,method:"POST",path:z.endsWith("/")?z.slice(0,-1)+l:z+l,headers:w};if(G!==void 0)v.hostname=G;if(d!==void 0)v.body=d;return new A0(v)},a={"content-type":"application/x-www-form-urlencoded"},s="2011-06-15",r="Action",O="AccessKeyId",lG="AssumeRole",Zh="AssumedRoleId",M="AssumedRoleUser",wG="AssumeRoleWithSAML",GG="AssumeRoleWithWebIdentity",g="Account",N="Arn",x="Audience",U="Credentials",$h="ContextAssertion",dG="DecodeAuthorizationMessage",Vh="DecodedMessage",y="DurationSeconds",Ph="Expiration",vh="ExternalId",qh="EncodedMessage",zh="FederatedUser",Mh="FederatedUserId",IG="GetAccessKeyInfo",SG="GetCallerIdentity",HG="GetFederationToken",mG="GetSessionToken",Nh="Issuer",Wh="Key",Th="Name",Ah="NameQualifier",Z="Policy",$="PolicyArns",Lh="PrincipalArn",Rh="ProviderArn",jh="ProvidedContexts",ah="ProviderId",V="PackedPolicySize",sh="Provider",W="RoleArn",i="RoleSessionName",rh="Subject",_h="SecretAccessKey",bh="SAMLAssertion",fh="SubjectFromWebIdentityToken",P="SourceIdentity",c="SerialNumber",Ch="SubjectType",Oh="SessionToken",e="Tags",p="TokenCode",gh="TransitiveTagKeys",xh="UserId",_="Version",ih="Value",ch="WebIdentityToken",eh="arn",m="message",b=(h)=>Object.entries(h).map(([w,l])=>ph(w)+"="+ph(l)).join("&"),JG=(h,w)=>{if(w.Error?.Code!==void 0)return w.Error.Code;if(h.statusCode==404)return"NotFound"};class hh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,v0).ser(a0).de(g0).build(){}class oh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithSAML",{}).n("STSClient","AssumeRoleWithSAMLCommand").f(q0,z0).ser(s0).de(x0).build(){}class lh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(M0,N0).ser(r0).de(i0).build(){}class uh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","DecodeAuthorizationMessage",{}).n("STSClient","DecodeAuthorizationMessageCommand").f(void 0,void 0).ser(_0).de(c0).build(){}class th extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetAccessKeyInfo",{}).n("STSClient","GetAccessKeyInfoCommand").f(void 0,void 0).ser(b0).de(e0).build(){}class hl extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetCallerIdentity",{}).n("STSClient","GetCallerIdentityCommand").f(void 0,void 0).ser(f0).de(p0).build(){}class ll extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetFederationToken",{}).n("STSClient","GetFederationTokenCommand").f(void 0,W0).ser(C0).de(n0).build(){}class wl extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetSessionToken",{}).n("STSClient","GetSessionTokenCommand").f(void 0,T0).ser(O0).de(o0).build(){}var DG={AssumeRoleCommand:hh,AssumeRoleWithSAMLCommand:oh,AssumeRoleWithWebIdentityCommand:lh,DecodeAuthorizationMessageCommand:uh,GetAccessKeyInfoCommand:th,GetCallerIdentityCommand:hl,GetFederationTokenCommand:ll,GetSessionTokenCommand:wl};class hw extends L{}t0(DG,hw);var lw="us-east-1",ww=(h)=>{if(typeof h?.Arn==="string"){const w=h.Arn.split(":");if(w.length>4&&w[4]!=="")return w[4]}return},Gw=async(h,w,l)=>{const G=typeof h==="function"?await h():h,d=typeof w==="function"?await w():w;return l?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${G} (provider)`,`${d} (parent client)`,`${lw} (STS default)`),G??d??lw},dw=(h,w)=>{let l,G;return async(d,S)=>{if(G=d,!l){const{logger:v=h?.parentClientConfig?.logger,region:n,requestHandler:wh=h?.parentClientConfig?.requestHandler,credentialProviderLogger:yh}=h,mw=await Gw(n,h?.parentClientConfig?.region,yh),Jw=!Sw(wh);l=new w({credentialDefaultProvider:()=>async()=>G,region:mw,requestHandler:Jw?wh:void 0,logger:v})}const{Credentials:I,AssumedRoleUser:Q}=await l.send(new hh(S));if(!I||!I.AccessKeyId||!I.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${S.RoleArn}`);const z=ww(Q);return{accessKeyId:I.AccessKeyId,secretAccessKey:I.SecretAccessKey,sessionToken:I.SessionToken,expiration:I.Expiration,...I.CredentialScope&&{credentialScope:I.CredentialScope},...z&&{accountId:z}}}},Iw=(h,w)=>{let l;return async(G)=>{if(!l){const{logger:Q=h?.parentClientConfig?.logger,region:z,requestHandler:v=h?.parentClientConfig?.requestHandler,credentialProviderLogger:n}=h,wh=await Gw(z,h?.parentClientConfig?.region,n),yh=!Sw(v);l=new w({region:wh,requestHandler:yh?v:void 0,logger:Q})}const{Credentials:d,AssumedRoleUser:S}=await l.send(new lh(G));if(!d||!d.AccessKeyId||!d.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${G.RoleArn}`);const I=ww(S);return{accessKeyId:d.AccessKeyId,secretAccessKey:d.SecretAccessKey,sessionToken:d.SessionToken,expiration:d.Expiration,...d.CredentialScope&&{credentialScope:d.CredentialScope},...I&&{accountId:I}}}};var Sw=(h)=>{return h?.metadata?.handlerProtocol==="h2"};var Hw=(h,w)=>{if(!w)return h;else return class l extends h{constructor(G){super(G);for(let d of w)this.middlewareStack.use(d)}}},EG=(h={},w)=>dw(h,Hw(L,w)),kG=(h={},w)=>Iw(h,Hw(L,w)),aI=(h)=>(w)=>h({roleAssumer:EG(w),roleAssumerWithWebIdentity:kG(w),...w});export{kG as getDefaultRoleAssumerWithWebIdentity,EG as getDefaultRoleAssumer,aI as decorateDefaultCredentialProvider,U0 as __Client,Y as STSServiceException,L as STSClient,hw as STS,Eh as RegionDisabledException,Dh as PackedPolicyTooLargeException,Jh as MalformedPolicyDocumentException,Kh as InvalidIdentityTokenException,Bh as InvalidAuthorizationMessageException,kh as IDPRejectedClaimException,Fh as IDPCommunicationErrorException,T0 as GetSessionTokenResponseFilterSensitiveLog,wl as GetSessionTokenCommand,W0 as GetFederationTokenResponseFilterSensitiveLog,ll as GetFederationTokenCommand,hl as GetCallerIdentityCommand,th as GetAccessKeyInfoCommand,mh as ExpiredTokenException,uh as DecodeAuthorizationMessageCommand,o as CredentialsFilterSensitiveLog,N0 as AssumeRoleWithWebIdentityResponseFilterSensitiveLog,M0 as AssumeRoleWithWebIdentityRequestFilterSensitiveLog,lh as AssumeRoleWithWebIdentityCommand,z0 as AssumeRoleWithSAMLResponseFilterSensitiveLog,q0 as AssumeRoleWithSAMLRequestFilterSensitiveLog,oh as AssumeRoleWithSAMLCommand,v0 as AssumeRoleResponseFilterSensitiveLog,hh as AssumeRoleCommand,K as $Command};
@@ -0,0 +1,6 @@
1
+ // @bun
2
+ import"./chunk-24a86f8f5ddc0cbd.js";import{Oa as I,Ra as y,fb as C,za as i} from"./chunk-d96668bed492732f.js";import"./chunk-786985b106091b91.js";import{yb as n} from"./chunk-5bfe9d4cbecd160a.js";import u from"fs/promises";var T="169.254.170.2",x="169.254.170.23",P="[fd00:ec2::23]",d=(e,c)=>{if(e.protocol==="https:")return;if(e.hostname===T||e.hostname===x||e.hostname===P)return;if(e.hostname.includes("[")){if(e.hostname==="[::1]"||e.hostname==="[0000:0000:0000:0000:0000:0000:0000:0001]")return}else{if(e.hostname==="localhost")return;const a=e.hostname.split("."),r=(t)=>{const s=parseInt(t,10);return 0<=s&&s<=255};if(a[0]==="127"&&r(a[1])&&r(a[2])&&r(a[3])&&a.length===4)return}throw new n(`URL not accepted. It must either be HTTPS or match one of the following:
3
+ - loopback CIDR 127.0.0.0/8 or [::1/128]
4
+ - ECS container host 169.254.170.2
5
+ - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:c})};function S(e){return new i({protocol:e.protocol,hostname:e.hostname,port:Number(e.port),path:e.pathname,query:Array.from(e.searchParams.entries()).reduce((c,[a,r])=>{return c[a]=r,c},{}),fragment:e.hash})}async function g(e,c){const r=await y(e.body).transformToString();if(e.statusCode===200){const t=JSON.parse(r);if(typeof t.AccessKeyId!=="string"||typeof t.SecretAccessKey!=="string"||typeof t.Token!=="string"||typeof t.Expiration!=="string")throw new n("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:c});return{accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,sessionToken:t.Token,expiration:C(t.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let t={};try{t=JSON.parse(r)}catch(s){}throw Object.assign(new n(`Server responded with status: ${e.statusCode}`,{logger:c}),{Code:t.Code,Message:t.Message})}throw new n(`Server responded with status: ${e.statusCode}`,{logger:c})}var w=(e,c,a)=>{return async()=>{for(let r=0;r<c;++r)try{return await e()}catch(t){await new Promise((s)=>setTimeout(s,a))}return await e()}};var E="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",R="http://169.254.170.2",p="AWS_CONTAINER_CREDENTIALS_FULL_URI",A="AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE",O="AWS_CONTAINER_AUTHORIZATION_TOKEN",b=(e={})=>{e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let c;const a=e.awsContainerCredentialsRelativeUri??process.env[E],r=e.awsContainerCredentialsFullUri??process.env[p],t=e.awsContainerAuthorizationToken??process.env[O],s=e.awsContainerAuthorizationTokenFile??process.env[A],m=e.logger?.constructor?.name==="NoOpLogger"||!e.logger?console.warn:e.logger.warn;if(a&&r)m("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),m("awsContainerCredentialsFullUri will take precedence.");if(t&&s)m("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),m("awsContainerAuthorizationToken will take precedence.");if(r)c=r;else if(a)c=`${R}${a}`;else throw new n(`No HTTP credential provider host provided.
6
+ Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:e.logger});const h=new URL(c);d(h,e.logger);const K=new I({requestTimeout:e.timeout??1000,connectionTimeout:e.timeout??1000});return w(async()=>{const o=S(h);if(t)o.headers.Authorization=t;else if(s)o.headers.Authorization=(await u.readFile(s)).toString();try{const f=await K.handle(o);return g(f.response)}catch(f){throw new n(String(f),{logger:e.logger})}},e.maxRetries??3,e.timeout??1000)};export{b as fromHttp};
@@ -0,0 +1,2 @@
1
+ // @bun
2
+ import"./chunk-24a86f8f5ddc0cbd.js";import{yb as E} from"./chunk-5bfe9d4cbecd160a.js";import{readFileSync as l} from"fs";var t=(e)=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");const{roleArn:o,roleSessionName:r,webIdentityToken:n,providerId:c,policyArns:i,policy:_,durationSeconds:N}=e;let{roleAssumerWithWebIdentity:s}=e;if(!s){const{getDefaultRoleAssumerWithWebIdentity:d}=await import("./chunk-631b243096f99070.js");s=d({...e.clientConfig,credentialProviderLogger:e.logger,parentClientConfig:e.parentClientConfig},e.clientPlugins)}return s({RoleArn:o,RoleSessionName:r??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:n,ProviderId:c,PolicyArns:i,Policy:_,DurationSeconds:N})};var m="AWS_WEB_IDENTITY_TOKEN_FILE",S="AWS_ROLE_ARN",p="AWS_ROLE_SESSION_NAME",A=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");const o=e?.webIdentityTokenFile??process.env[m],r=e?.roleArn??process.env[S],n=e?.roleSessionName??process.env[p];if(!o||!r)throw new E("Web identity configuration not specified",{logger:e.logger});return t({...e,webIdentityToken:l(o,{encoding:"ascii"}),roleArn:r,roleSessionName:n})()};export{t as fromWebToken,A as fromTokenFile};
@@ -0,0 +1,2 @@
1
+ // @bun
2
+ import"./chunk-24a86f8f5ddc0cbd.js";import"./chunk-786985b106091b91.js";import{vb as v,wb as B} from"./chunk-f7a2f27070c1a0cf.js";import{xb as z,yb as y} from"./chunk-5bfe9d4cbecd160a.js";import"./chunk-b033519a526dfb3f.js";import{parse as p} from"url";import{Buffer as M} from"buffer";import{request as k} from"http";function u(c){return new Promise((I,x)=>{const T=k({method:"GET",...c,hostname:c.hostname?.replace(/^\[(.+)\]$/,"$1")});T.on("error",(N)=>{x(Object.assign(new z("Unable to connect to instance metadata service"),N)),T.destroy()}),T.on("timeout",()=>{x(new z("TimeoutError from instance metadata service")),T.destroy()}),T.on("response",(N)=>{const{statusCode:O=400}=N;if(O<200||300<=O)x(Object.assign(new z("Error response received from instance metadata service"),{statusCode:O})),T.destroy();const E=[];N.on("data",(w)=>{E.push(w)}),N.on("end",()=>{I(M.concat(E)),T.destroy()})}),T.end()})}var K=(c)=>Boolean(c)&&typeof c==="object"&&typeof c.AccessKeyId==="string"&&typeof c.SecretAccessKey==="string"&&typeof c.Token==="string"&&typeof c.Expiration==="string",_=(c)=>({accessKeyId:c.AccessKeyId,secretAccessKey:c.SecretAccessKey,sessionToken:c.Token,expiration:new Date(c.Expiration),...c.AccountId&&{accountId:c.AccountId}});var hc=1000,Yc=0,D=({maxRetries:c=0,timeout:I=1000})=>({maxRetries:c,timeout:I});var m=(c,I)=>{let x=c();for(let T=0;T<I;T++)x=x.catch(c);return x};var Q="AWS_CONTAINER_CREDENTIALS_FULL_URI",X="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",b="AWS_CONTAINER_AUTHORIZATION_TOKEN",mc=(c={})=>{const{timeout:I,maxRetries:x}=D(c);return()=>m(async()=>{const T=await s({logger:c.logger}),N=JSON.parse(await C(I,T));if(!K(N))throw new y("Invalid response received from instance metadata service.",{logger:c.logger});return _(N)},x)},C=async(c,I)=>{if(process.env[b])I.headers={...I.headers,Authorization:process.env[b]};return(await u({...I,timeout:c})).toString()},a="169.254.170.2",n={localhost:!0,"127.0.0.1":!0},o={"http:":!0,"https:":!0},s=async({logger:c})=>{if(process.env[X])return{hostname:a,path:process.env[X]};if(process.env[Q]){const I=p(process.env[Q]);if(!I.hostname||!(I.hostname in n))throw new y(`${I.hostname} is not a valid container metadata service hostname`,{tryNextLink:!1,logger:c});if(!I.protocol||!(I.protocol in o))throw new y(`${I.protocol} is not a valid container metadata service protocol`,{tryNextLink:!1,logger:c});return{...I,port:I.port?parseInt(I.port,10):void 0}}throw new y("The container metadata credential provider cannot be used unless"+` the ${X} or ${Q} environment`+" variable is set",{tryNextLink:!1,logger:c})};class G extends y{constructor(c,I=!0){super(c,I);this.tryNextLink=I,this.name="InstanceMetadataV1FallbackError",Object.setPrototypeOf(this,G.prototype)}}var A;(function(c){c.IPv4="http://169.254.169.254",c.IPv6="http://[fd00:ec2::254]"})(A||(A={}));var H={environmentVariableSelector:(c)=>c["AWS_EC2_METADATA_SERVICE_ENDPOINT"],configFileSelector:(c)=>c["ec2_metadata_service_endpoint"],default:void 0};var f;(function(c){c.IPv4="IPv4",c.IPv6="IPv6"})(f||(f={}));var g="AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE",l="ec2_metadata_service_endpoint_mode",q={environmentVariableSelector:(c)=>c[g],configFileSelector:(c)=>c[l],default:f.IPv4};var Z=async()=>B(await r()||await d()),r=async()=>v(H)(),d=async()=>{const c=await v(q)();switch(c){case f.IPv4:return A.IPv4;case f.IPv6:return A.IPv6;default:throw new Error(`Unsupported endpoint mode: ${c}.`+` Select from ${Object.values(f)}`)}};var L=(c,I)=>{const x=300+Math.floor(Math.random()*300),T=new Date(Date.now()+x*1000);I.warn("Attempting credential expiration extension due to a credential service availability issue. A refresh of these "+`credentials will be attempted after ${new Date(T)}.\nFor more information, please visit: `+"https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html");const N=c.originalExpiration??c.expiration;return{...c,...N?{originalExpiration:N}:{},expiration:T}};var U=(c,I={})=>{const x=I?.logger||console;let T;return async()=>{let N;try{if(N=await c(),N.expiration&&N.expiration.getTime()<Date.now())N=L(N,x)}catch(O){if(T)x.warn("Credential renew failed: ",O),N=L(T,x);else throw O}return T=N,N}};var P="/latest/meta-data/iam/security-credentials/",e="/latest/api/token",W="AWS_EC2_METADATA_V1_DISABLED",t="ec2_metadata_v1_disabled",F="x-aws-ec2-metadata-token",oc=(c={})=>U(i(c),{logger:c.logger}),i=(c={})=>{let I=!1;const{logger:x,profile:T}=c,{timeout:N,maxRetries:O}=D(c),E=async(w,$)=>{if(I||$.headers?.[F]==null){let h=!1,Y=!1;const R=await v({environmentVariableSelector:(S)=>{const j=S[W];if(Y=!!j&&j!=="false",j===void 0)throw new y(`${W} not set in env, checking config file next.`,{logger:c.logger});return Y},configFileSelector:(S)=>{const j=S[t];return h=!!j&&j!=="false",h},default:!1},{profile:T})();if(c.ec2MetadataV1Disabled||R){const S=[];if(c.ec2MetadataV1Disabled)S.push("credential provider initialization (runtime option ec2MetadataV1Disabled)");if(h)S.push(`config file profile (${t})`);if(Y)S.push(`process environment variable (${W})`);throw new G(`AWS EC2 Metadata v1 fallback has been blocked by AWS SDK configuration in the following: [${S.join(", ")}].`)}}const V=(await m(async()=>{let h;try{h=await Ic($)}catch(Y){if(Y.statusCode===401)I=!1;throw Y}return h},w)).trim();return m(async()=>{let h;try{h=await Tc(V,$,c)}catch(Y){if(Y.statusCode===401)I=!1;throw Y}return h},w)};return async()=>{const w=await Z();if(I)return x?.debug("AWS SDK Instance Metadata","using v1 fallback (no token fetch)"),E(O,{...w,timeout:N});else{let $;try{$=(await cc({...w,timeout:N})).toString()}catch(J){if(J?.statusCode===400)throw Object.assign(J,{message:"EC2 Metadata token request returned error"});else if(J.message==="TimeoutError"||[403,404,405].includes(J.statusCode))I=!0;return x?.debug("AWS SDK Instance Metadata","using v1 fallback (initial)"),E(O,{...w,timeout:N})}return E(O,{...w,headers:{[F]:$},timeout:N})}}},cc=async(c)=>u({...c,path:e,method:"PUT",headers:{"x-aws-ec2-metadata-token-ttl-seconds":"21600"}}),Ic=async(c)=>(await u({...c,path:P})).toString(),Tc=async(c,I,x)=>{const T=JSON.parse((await u({...I,path:P+c})).toString());if(!K(T))throw new y("Invalid response received from instance metadata service.",{logger:x.logger});return _(T)};export{D as providerConfigFromInit,u as httpRequest,Z as getInstanceMetadataEndpoint,oc as fromInstanceMetadata,mc as fromContainerMetadata,A as Endpoint,X as ENV_CMDS_RELATIVE_URI,Q as ENV_CMDS_FULL_URI,b as ENV_CMDS_AUTH_TOKEN,hc as DEFAULT_TIMEOUT,Yc as DEFAULT_MAX_RETRIES};
@@ -1,2 +1,2 @@
1
1
  import{C as D} from"./chunk-24a86f8f5ddc0cbd.js";var S=D((y,w)=>{var{defineProperty:G,getOwnPropertyDescriptor:v,getOwnPropertyNames:O}=Object,x=Object.prototype.hasOwnProperty,Q=(b,j)=>G(b,"name",{value:j,configurable:!0}),U=(b,j)=>{for(var z in j)G(b,z,{get:j[z],enumerable:!0})},K=(b,j,z,V)=>{if(j&&typeof j==="object"||typeof j==="function"){for(let B of O(j))if(!x.call(b,B)&&B!==z)G(b,B,{get:()=>j[B],enumerable:!(V=v(j,B))||V.enumerable})}return b},q=(b)=>K(G({},"__esModule",{value:!0}),b),W={};U(W,{AlgorithmId:()=>J,EndpointURLScheme:()=>X,FieldPosition:()=>M,HttpApiKeyAuthLocation:()=>$,HttpAuthLocation:()=>Z,IniSectionType:()=>N,RequestHandlerProtocol:()=>Y,SMITHY_CONTEXT_KEY:()=>R,getDefaultClientConfiguration:()=>T,resolveDefaultRuntimeConfig:()=>k});w.exports=q(W);var Z=((b)=>{return b.HEADER="header",b.QUERY="query",b})(Z||{}),$=((b)=>{return b.HEADER="header",b.QUERY="query",b})($||{}),X=((b)=>{return b.HTTP="http",b.HTTPS="https",b})(X||{}),J=((b)=>{return b.MD5="md5",b.CRC32="crc32",b.CRC32C="crc32c",b.SHA1="sha1",b.SHA256="sha256",b})(J||{}),E=Q((b)=>{const j=[];if(b.sha256!==void 0)j.push({algorithmId:()=>"sha256",checksumConstructor:()=>b.sha256});if(b.md5!=null)j.push({algorithmId:()=>"md5",checksumConstructor:()=>b.md5});return{_checksumAlgorithms:j,addChecksumAlgorithm(z){this._checksumAlgorithms.push(z)},checksumAlgorithms(){return this._checksumAlgorithms}}},"getChecksumConfiguration"),F=Q((b)=>{const j={};return b.checksumAlgorithms().forEach((z)=>{j[z.algorithmId()]=z.checksumConstructor()}),j},"resolveChecksumRuntimeConfig"),T=Q((b)=>{return{...E(b)}},"getDefaultClientConfiguration"),k=Q((b)=>{return{...F(b)}},"resolveDefaultRuntimeConfig"),M=((b)=>{return b[b.HEADER=0]="HEADER",b[b.TRAILER=1]="TRAILER",b})(M||{}),R="__smithy_context",N=((b)=>{return b.PROFILE="profile",b.SSO_SESSION="sso-session",b.SERVICES="services",b})(N||{}),Y=((b)=>{return b.HTTP_0_9="http/0.9",b.HTTP_1_0="http/1.0",b.TDS_8_0="tds/8.0",b})(Y||{})});
2
- export{S as Db};
2
+ export{S as ub};
@@ -0,0 +1 @@
1
+ import{B as x} from"./chunk-24a86f8f5ddc0cbd.js";import{ub as S} from"./chunk-786985b106091b91.js";var q="AWS_PROFILE";var B=(o)=>o.profile||process.env["AWS_PROFILE"]||"default";import{join as b} from"path";import{homedir as N} from"os";import{sep as L} from"path";var d={},w=()=>{if(process&&process.geteuid)return`${process.geteuid()}`;return"DEFAULT"},f=()=>{const{HOME:o,USERPROFILE:e,HOMEPATH:t,HOMEDRIVE:r=`C:${L}`}=process.env;if(o)return o;if(e)return e;if(t)return`${r}${t}`;const i=w();if(!d[i])d[i]=N();return d[i]};var v="AWS_CONFIG_FILE",g=()=>process.env[v]||b(f(),".aws","config");var D=x(S(),1);import{join as I} from"path";var h=x(S(),1);var O=(o)=>Object.entries(o).filter(([e])=>{const t=e.indexOf(c);if(t===-1)return!1;return Object.values(h.IniSectionType).includes(e.substring(0,t))}).reduce((e,[t,r])=>{const i=t.indexOf(c),s=t.substring(0,i)===h.IniSectionType.PROFILE?t.substring(i+1):t;return e[s]=r,e},{...o.default&&{default:o.default}});import{join as j} from"path";var y="AWS_SHARED_CREDENTIALS_FILE",_=()=>process.env[y]||j(f(),".aws","credentials");var C=x(S(),1);var $=/^([\w-]+)\s(["'])?([\w-@\+\.%:/]+)\2$/,G=["__proto__","profile __proto__"],a=(o)=>{const e={};let t,r;for(let i of o.split(/\r?\n/)){const s=i.split(/(^|\s)[;#]/)[0].trim();if(s[0]==="["&&s[s.length-1]==="]"){t=void 0,r=void 0;const n=s.substring(1,s.length-1),m=$.exec(n);if(m){const[,p,,F]=m;if(Object.values(C.IniSectionType).includes(p))t=[p,F].join(c)}else t=n;if(G.includes(n))throw new Error(`Found invalid profile name "${n}"`)}else if(t){const n=s.indexOf("=");if(![0,-1].includes(n)){const[m,p]=[s.substring(0,n).trim(),s.substring(n+1).trim()];if(p==="")r=m;else{if(r&&i.trimStart()===i)r=void 0;e[t]=e[t]||{};const F=r?[r,m].join(c):m;e[t][F]=p}}}}return e};import{promises as W} from"fs";var{readFile:K}=W,E={},l=(o,e)=>{if(!E[o]||e?.ignoreCache)E[o]=K(o,"utf8");return E[o]};var P=()=>({}),c=".",R=async(o={})=>{const{filepath:e=_(),configFilepath:t=g()}=o,r=f();let s=e;if(e.startsWith("~/"))s=I(r,e.slice(2));let u=t;if(t.startsWith("~/"))u=I(r,t.slice(2));const n=await Promise.all([l(u,{ignoreCache:o.ignoreCache}).then(a).then(O).catch(P),l(s,{ignoreCache:o.ignoreCache}).then(a).catch(P)]);return{configFile:n[0],credentialsFile:n[1]}};var T=(o)=>Object.entries(o).filter(([e])=>e.startsWith(D.IniSectionType.SSO_SESSION+c)).reduce((e,[t,r])=>({...e,[t.substring(t.indexOf(c)+1)]:r}),{});var V=()=>({}),Pe=async(o={})=>l(o.configFilepath??g()).then(a).then(T).catch(V);var A=(...o)=>{const e={};for(let t of o)for(let[r,i]of Object.entries(t))if(e[r]!==void 0)Object.assign(e[r],i);else e[r]=i;return e};var He=async(o)=>{const e=await R(o);return A(e.configFile,e.credentialsFile)};import{createHash as U} from"crypto";import{join as X} from"path";var H=(o)=>{const t=U("sha1").update(o).digest("hex");return X(f(),".aws","sso","cache",`${t}.json`)};import{promises as k} from"fs";var{readFile:M}=k,$e=async(o)=>{const e=H(o),t=await M(e,"utf8");return JSON.parse(t)};export{q as Eb,B as Fb,H as Gb,$e as Hb,c as Ib,R as Jb,Pe as Kb,He as Lb};
@@ -0,0 +1,9 @@
1
+ import{u as $,v as w,w as z} from"./chunk-0f500a6384fcd132.js";import{Ab as G,Cb as Y,yb as q} from"./chunk-5bfe9d4cbecd160a.js";import{Eb as Z} from"./chunk-b033519a526dfb3f.js";var H="AWS_EC2_METADATA_DISABLED",Q=async(b)=>{const{ENV_CMDS_FULL_URI:j,ENV_CMDS_RELATIVE_URI:x,fromContainerMetadata:y,fromInstanceMetadata:J}=await import("./chunk-77f51fc60eb8f53d.js");if(process.env[x]||process.env[j]){b.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");const{fromHttp:K}=await import("./chunk-6b1b2297cf4e98bf.js");return G(K(b),y(b))}if(process.env[H])return async()=>{throw new q("EC2 Instance Metadata Service access disabled",{logger:b.logger})};return b.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata"),J(b)};var X=!1,W=(b={})=>Y(G(async()=>{if(b.profile??process.env[Z]){if(process.env[$]&&process.env[w]){if(!X)(b.logger?.warn&&b.logger?.constructor?.name!=="NoOpLogger"?b.logger.warn:console.warn)(`@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:
2
+ Multiple credential sources detected:
3
+ Both AWS_PROFILE and the pair AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY static credentials are set.
4
+ This SDK will proceed with the AWS_PROFILE value.
5
+
6
+ However, a future version may change this behavior to prefer the ENV static credentials.
7
+ Please ensure that your environment only sets either the AWS_PROFILE or the
8
+ AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.
9
+ `),X=!0}throw new q("AWS_PROFILE is set, skipping fromEnv provider.",{logger:b.logger,tryNextLink:!0})}return b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv"),z(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");const{ssoStartUrl:j,ssoAccountId:x,ssoRegion:y,ssoRoleName:J,ssoSession:K}=b;if(!j&&!x&&!y&&!J&&!K)throw new q("Skipping SSO provider in default chain (inputs do not include SSO fields).",{logger:b.logger});const{fromSSO:B}=await import("./chunk-f28fe28ab592bd2a.js");return B(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");const{fromIni:j}=await import("./chunk-e51fe90ab8cb869b.js");return j(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");const{fromProcess:j}=await import("./chunk-00c56e78353444bd.js");return j(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");const{fromTokenFile:j}=await import("./chunk-73ad537019659405.js");return j(b)()},async()=>{return b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider"),(await Q(b))()},async()=>{throw new q("Could not load credentials from any providers",{tryNextLink:!1,logger:b.logger})}),v,k),k=(b)=>b?.expiration!==void 0,v=(b)=>b?.expiration!==void 0&&b.expiration.getTime()-Date.now()<300000;export{W as Db};