gemi 0.4.93 → 0.4.95

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (131) hide show
  1. package/dist/app/App.d.ts +2 -11
  2. package/dist/app/App.d.ts.map +1 -1
  3. package/dist/app/index.js +3 -1
  4. package/dist/app/index.js.map +13 -0
  5. package/dist/auth/AuthenticationServiceContainer.d.ts +3 -1
  6. package/dist/auth/AuthenticationServiceContainer.d.ts.map +1 -1
  7. package/dist/auth/AuthenticationServiceProvider.d.ts +3 -5
  8. package/dist/auth/AuthenticationServiceProvider.d.ts.map +1 -1
  9. package/dist/bin/index.js +3 -0
  10. package/dist/broadcasting/index.js +3 -1
  11. package/dist/broadcasting/index.js.map +10 -0
  12. package/dist/{chunk-d09948245f5b426d.js → chunk-07f44e411ae4ea5e.js} +3 -1
  13. package/dist/chunk-07f44e411ae4ea5e.js.map +11 -0
  14. package/dist/{chunk-7ce930fe69575c87.js → chunk-0d97333b6af9fc45.js} +3 -1
  15. package/dist/chunk-0d97333b6af9fc45.js.map +9 -0
  16. package/dist/{chunk-e76c7e3bf2d698af.js → chunk-11de5b0adccef35c.js} +3 -1
  17. package/dist/chunk-11de5b0adccef35c.js.map +17 -0
  18. package/dist/{chunk-1770e9abf10029e0.js → chunk-18a59fffad60f059.js} +3 -1
  19. package/dist/chunk-18a59fffad60f059.js.map +12 -0
  20. package/dist/{chunk-8fec55214eb03a61.js → chunk-201c5005a90452fa.js} +4 -2
  21. package/dist/chunk-201c5005a90452fa.js.map +11 -0
  22. package/dist/{chunk-cfb8c5b12b0e5378.js → chunk-23d3df5f8342ecc6.js} +4 -2
  23. package/dist/chunk-23d3df5f8342ecc6.js.map +54 -0
  24. package/dist/chunk-278677330e53423b.js +4 -0
  25. package/dist/chunk-278677330e53423b.js.map +26 -0
  26. package/dist/{chunk-e1929f0f7003fbdf.js → chunk-28ec4c2b20e69deb.js} +4 -2
  27. package/dist/chunk-28ec4c2b20e69deb.js.map +10 -0
  28. package/dist/chunk-2f8cf8372320b622.js +4 -0
  29. package/dist/chunk-2f8cf8372320b622.js.map +11 -0
  30. package/dist/{chunk-ef791082443c0cbd.js → chunk-53b0fab00d83f47e.js} +3 -1
  31. package/dist/chunk-53b0fab00d83f47e.js.map +13 -0
  32. package/dist/chunk-57ba59dd008d6e0e.js +4 -0
  33. package/dist/chunk-57ba59dd008d6e0e.js.map +32 -0
  34. package/dist/chunk-642b04056dab5d64.js +4 -0
  35. package/dist/chunk-642b04056dab5d64.js.map +11 -0
  36. package/dist/{chunk-dfb863d471bf3b18.js → chunk-643529c2ad120db7.js} +4 -2
  37. package/dist/chunk-643529c2ad120db7.js.map +50 -0
  38. package/dist/{chunk-b6fb088270ea6584.js → chunk-683905a55f8da1ad.js} +4 -2
  39. package/dist/chunk-683905a55f8da1ad.js.map +64 -0
  40. package/dist/{chunk-035e233acf299392.js → chunk-90436b32a64fc784.js} +4 -2
  41. package/dist/chunk-90436b32a64fc784.js.map +53 -0
  42. package/dist/chunk-99c32e4d937131e0.js +4 -0
  43. package/dist/chunk-99c32e4d937131e0.js.map +10 -0
  44. package/dist/{chunk-d7525516b1305ba3.js → chunk-9be25fac5f76b2f7.js} +3 -1
  45. package/dist/chunk-9be25fac5f76b2f7.js.map +13 -0
  46. package/dist/{chunk-f10ba402aaacfc12.js → chunk-9f9e21f9fd0d6af1.js} +4 -2
  47. package/dist/chunk-9f9e21f9fd0d6af1.js.map +10 -0
  48. package/dist/chunk-9ff3d7096b6de8eb.js +4 -0
  49. package/dist/chunk-9ff3d7096b6de8eb.js.map +22 -0
  50. package/dist/{chunk-cfbe2cbcadcb1ac1.js → chunk-a7d87b5d6d789781.js} +3 -1
  51. package/dist/chunk-a7d87b5d6d789781.js.map +23 -0
  52. package/dist/chunk-b84d011a2972c7d1.js +4 -0
  53. package/dist/chunk-b84d011a2972c7d1.js.map +10 -0
  54. package/dist/{chunk-2f8839f406606d63.js → chunk-bace428bfab523c4.js} +3 -1
  55. package/dist/chunk-bace428bfab523c4.js.map +23 -0
  56. package/dist/{chunk-494de321e3423d54.js → chunk-bd708d3c982948aa.js} +4 -2
  57. package/dist/chunk-bd708d3c982948aa.js.map +16 -0
  58. package/dist/{chunk-496c32676431beab.js → chunk-c8c4a1285a266c51.js} +4 -2
  59. package/dist/chunk-c8c4a1285a266c51.js.map +169 -0
  60. package/dist/{chunk-eabfa03c809e14df.js → chunk-cd4bfdd46ec4cbb8.js} +4 -2
  61. package/dist/chunk-cd4bfdd46ec4cbb8.js.map +10 -0
  62. package/dist/{chunk-0f0add364d3ea615.js → chunk-cd9c5e8a6c80384f.js} +3 -1
  63. package/dist/chunk-cd9c5e8a6c80384f.js.map +20 -0
  64. package/dist/{chunk-04f04986e53516f0.js → chunk-d5b8023c223e3a60.js} +3 -1
  65. package/dist/chunk-d5b8023c223e3a60.js.map +10 -0
  66. package/dist/chunk-e4961d79807acd3d.js +4 -0
  67. package/dist/chunk-e4961d79807acd3d.js.map +33 -0
  68. package/dist/client/ClientRouterContext.d.ts.map +1 -1
  69. package/dist/client/HttpReload.d.ts.map +1 -1
  70. package/dist/email/index.js +3 -1
  71. package/dist/email/index.js.map +11 -0
  72. package/dist/facades/Auth.d.ts.map +1 -1
  73. package/dist/facades/Broadcast.d.ts.map +1 -1
  74. package/dist/facades/FileStorage.d.ts.map +1 -1
  75. package/dist/facades/I18n.d.ts.map +1 -1
  76. package/dist/facades/Prefetch.d.ts.map +1 -1
  77. package/dist/facades/index.js +3 -1
  78. package/dist/facades/index.js.map +28 -0
  79. package/dist/http/AuthenticationMiddlware.d.ts.map +1 -1
  80. package/dist/http/I18nServiceContainer.d.ts +6 -9
  81. package/dist/http/I18nServiceContainer.d.ts.map +1 -1
  82. package/dist/http/I18nServiceProvider.d.ts +3 -1
  83. package/dist/http/I18nServiceProvider.d.ts.map +1 -1
  84. package/dist/http/MiddlewareServiceProvider.d.ts +3 -1
  85. package/dist/http/MiddlewareServiceProvider.d.ts.map +1 -1
  86. package/dist/http/RateLimitMiddleware.d.ts.map +1 -1
  87. package/dist/http/index.js +3 -1
  88. package/dist/http/index.js.map +29 -0
  89. package/dist/kernel/Kernel.d.ts +4 -32
  90. package/dist/kernel/Kernel.d.ts.map +1 -1
  91. package/dist/kernel/KernelContext.d.ts +1 -1
  92. package/dist/kernel/KernelContext.d.ts.map +1 -1
  93. package/dist/kernel/context.d.ts +1 -21
  94. package/dist/kernel/context.d.ts.map +1 -1
  95. package/dist/kernel/index.js +3 -1
  96. package/dist/kernel/index.js.map +11 -0
  97. package/dist/server/index.js +6 -4
  98. package/dist/server/index.js.map +17 -0
  99. package/dist/services/ServiceContainer.d.ts +2 -2
  100. package/dist/services/ServiceContainer.d.ts.map +1 -1
  101. package/dist/services/email/EmailServiceContainer.d.ts +1 -1
  102. package/dist/services/email/EmailServiceContainer.d.ts.map +1 -1
  103. package/dist/services/file-storage/FileStorageServiceContainer.d.ts +3 -1
  104. package/dist/services/file-storage/FileStorageServiceContainer.d.ts.map +1 -1
  105. package/dist/services/file-storage/FileStorageServiceProvider.d.ts +3 -1
  106. package/dist/services/file-storage/FileStorageServiceProvider.d.ts.map +1 -1
  107. package/dist/services/index.d.ts +2 -0
  108. package/dist/services/index.d.ts.map +1 -1
  109. package/dist/services/index.js +12 -1
  110. package/dist/services/index.js.map +121 -0
  111. package/dist/services/middleware/MiddlewareServiceContainer.d.ts +3 -1
  112. package/dist/services/middleware/MiddlewareServiceContainer.d.ts.map +1 -1
  113. package/dist/services/rate-limiter/RateLimiterServiceContainer.d.ts +3 -1
  114. package/dist/services/rate-limiter/RateLimiterServiceContainer.d.ts.map +1 -1
  115. package/dist/services/rate-limiter/RateLimiterServiceProvider.d.ts +3 -1
  116. package/dist/services/rate-limiter/RateLimiterServiceProvider.d.ts.map +1 -1
  117. package/dist/services/router/ApiRouterServiceContainer.d.ts +5 -1
  118. package/dist/services/router/ApiRouterServiceContainer.d.ts.map +1 -1
  119. package/dist/services/router/ApiRouterServiceProvider.d.ts +3 -4
  120. package/dist/services/router/ApiRouterServiceProvider.d.ts.map +1 -1
  121. package/dist/services/router/ViewRouterServiceContainer.d.ts +11 -1
  122. package/dist/services/router/ViewRouterServiceContainer.d.ts.map +1 -1
  123. package/dist/services/router/ViewRouterServiceProvider.d.ts +4 -9
  124. package/dist/services/router/ViewRouterServiceProvider.d.ts.map +1 -1
  125. package/package.json +2 -2
  126. package/dist/chunk-0fd23409fff0376b.js +0 -2
  127. package/dist/chunk-2573b2361de4a370.js +0 -2
  128. package/dist/chunk-33abc8f4f7df6791.js +0 -2
  129. package/dist/chunk-6286081da32e2feb.js +0 -2
  130. package/dist/chunk-9a9d43e4b919c267.js +0 -2
  131. package/dist/chunk-c459f3e37965c22f.js +0 -2
@@ -1,2 +1,4 @@
1
1
  // @bun
2
- import"../chunk-7ce930fe69575c87.js";class n{async subscribe(r){return!0}publish(r){return{}}}export{n as BroadcastingChannel};
2
+ import"../chunk-0d97333b6af9fc45.js";class n{async subscribe(r){return!0}publish(r){return{}}}export{n as BroadcastingChannel};
3
+
4
+ //# debugId=B90CEFD24F3076EE64756e2164756e21
@@ -0,0 +1,10 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../broadcasting/BroadcastingChannel.ts"],
4
+ "sourcesContent": [
5
+ "export class BroadcastingChannel {\n async subscribe(user: any): Promise<boolean> {\n return true;\n }\n\n publish(input: any): any {\n return {};\n }\n}\n"
6
+ ],
7
+ "mappings": ";qCAAO,MAAM,CAAoB,MACzB,UAAS,CAAC,EAA6B,CAC3C,MAAO,GAGT,OAAO,CAAC,EAAiB,CACvB,MAAO,CAAC,EAEZ",
8
+ "debugId": "B90CEFD24F3076EE64756e2164756e21",
9
+ "names": []
10
+ }
@@ -1,2 +1,4 @@
1
1
  // @bun
2
- import{y as l} from"./chunk-7ce930fe69575c87.js";import{vb as m} from"./chunk-eabfa03c809e14df.js";var E=l(m(),1);import{readFileSync as S} from"fs";var t=(e)=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");const{roleArn:o,roleSessionName:r,webIdentityToken:n,providerId:c,policyArns:i,policy:_,durationSeconds:N}=e;let{roleAssumerWithWebIdentity:s}=e;if(!s){const{getDefaultRoleAssumerWithWebIdentity:d}=await import("./chunk-c459f3e37965c22f.js");s=d({...e.clientConfig,credentialProviderLogger:e.logger,parentClientConfig:e.parentClientConfig},e.clientPlugins)}return s({RoleArn:o,RoleSessionName:r??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:n,ProviderId:c,PolicyArns:i,Policy:_,DurationSeconds:N})};var p="AWS_WEB_IDENTITY_TOKEN_FILE",f="AWS_ROLE_ARN",T="AWS_ROLE_SESSION_NAME",I=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");const o=e?.webIdentityTokenFile??process.env[p],r=e?.roleArn??process.env[f],n=e?.roleSessionName??process.env[T];if(!o||!r)throw new E.CredentialsProviderError("Web identity configuration not specified",{logger:e.logger});return t({...e,webIdentityToken:S(o,{encoding:"ascii"}),roleArn:r,roleSessionName:n})()};export{t as fromWebToken,I as fromTokenFile};
2
+ import{J as l} from"./chunk-0d97333b6af9fc45.js";import{Fb as m} from"./chunk-cd4bfdd46ec4cbb8.js";var E=l(m(),1);import{readFileSync as S} from"fs";var t=(e)=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");const{roleArn:o,roleSessionName:r,webIdentityToken:n,providerId:c,policyArns:i,policy:_,durationSeconds:N}=e;let{roleAssumerWithWebIdentity:s}=e;if(!s){const{getDefaultRoleAssumerWithWebIdentity:d}=await import("./chunk-57ba59dd008d6e0e.js");s=d({...e.clientConfig,credentialProviderLogger:e.logger,parentClientConfig:e.parentClientConfig},e.clientPlugins)}return s({RoleArn:o,RoleSessionName:r??`aws-sdk-js-session-${Date.now()}`,WebIdentityToken:n,ProviderId:c,PolicyArns:i,Policy:_,DurationSeconds:N})};var p="AWS_WEB_IDENTITY_TOKEN_FILE",f="AWS_ROLE_ARN",T="AWS_ROLE_SESSION_NAME",I=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");const o=e?.webIdentityTokenFile??process.env[p],r=e?.roleArn??process.env[f],n=e?.roleSessionName??process.env[T];if(!o||!r)throw new E.CredentialsProviderError("Web identity configuration not specified",{logger:e.logger});return t({...e,webIdentityToken:S(o,{encoding:"ascii"}),roleArn:r,roleSessionName:n})()};export{t as fromWebToken,I as fromTokenFile};
3
+
4
+ //# debugId=07F44E411AE4EA5E64756e2164756e21
@@ -0,0 +1,11 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js", "../../../node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js"],
4
+ "sourcesContent": [
5
+ "import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { readFileSync } from \"fs\";\nimport { fromWebToken } from \"./fromWebToken\";\nconst ENV_TOKEN_FILE = \"AWS_WEB_IDENTITY_TOKEN_FILE\";\nconst ENV_ROLE_ARN = \"AWS_ROLE_ARN\";\nconst ENV_ROLE_SESSION_NAME = \"AWS_ROLE_SESSION_NAME\";\nexport const fromTokenFile = (init = {}) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-web-identity - fromTokenFile\");\n const webIdentityTokenFile = init?.webIdentityTokenFile ?? process.env[ENV_TOKEN_FILE];\n const roleArn = init?.roleArn ?? process.env[ENV_ROLE_ARN];\n const roleSessionName = init?.roleSessionName ?? process.env[ENV_ROLE_SESSION_NAME];\n if (!webIdentityTokenFile || !roleArn) {\n throw new CredentialsProviderError(\"Web identity configuration not specified\", {\n logger: init.logger,\n });\n }\n return fromWebToken({\n ...init,\n webIdentityToken: readFileSync(webIdentityTokenFile, { encoding: \"ascii\" }),\n roleArn,\n roleSessionName,\n })();\n};\n",
6
+ "export const fromWebToken = (init) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-web-identity - fromWebToken\");\n const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;\n let { roleAssumerWithWebIdentity } = init;\n if (!roleAssumerWithWebIdentity) {\n const { getDefaultRoleAssumerWithWebIdentity } = await import(\"@aws-sdk/client-sts\");\n roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({\n ...init.clientConfig,\n credentialProviderLogger: init.logger,\n parentClientConfig: init.parentClientConfig,\n }, init.clientPlugins);\n }\n return roleAssumerWithWebIdentity({\n RoleArn: roleArn,\n RoleSessionName: roleSessionName ?? `aws-sdk-js-session-${Date.now()}`,\n WebIdentityToken: webIdentityToken,\n ProviderId: providerId,\n PolicyArns: policyArns,\n Policy: policy,\n DurationSeconds: durationSeconds,\n });\n};\n"
7
+ ],
8
+ "mappings": ";iGAAA,iBACA,uBAAS,YCDF,IAAM,EAAe,CAAC,IAAS,SAAY,CAC9C,EAAK,QAAQ,MAAM,0DAA0D,EAC7E,MAAQ,UAAS,kBAAiB,mBAAkB,aAAY,aAAY,SAAQ,mBAAoB,EACxG,IAAM,8BAA+B,EACrC,IAAK,EAA4B,CAC7B,MAAQ,wCAAyC,KAAa,uCAC9D,EAA6B,EAAqC,IAC3D,EAAK,aACR,yBAA0B,EAAK,OAC/B,mBAAoB,EAAK,kBAC7B,EAAG,EAAK,aAAa,EAEzB,OAAO,EAA2B,CAC9B,QAAS,EACT,gBAAiB,GAAmB,sBAAsB,KAAK,IAAI,IACnE,iBAAkB,EAClB,WAAY,EACZ,WAAY,EACZ,OAAQ,EACR,gBAAiB,CACrB,CAAC,GDjBL,IAAM,EAAiB,8BACjB,EAAe,eACf,EAAwB,wBACjB,EAAgB,CAAC,EAAO,CAAC,IAAM,SAAY,CACpD,EAAK,QAAQ,MAAM,2DAA2D,EAC9E,MAAM,EAAuB,GAAM,sBAAwB,QAAQ,IAAI,GACjE,EAAU,GAAM,SAAW,QAAQ,IAAI,GACvC,EAAkB,GAAM,iBAAmB,QAAQ,IAAI,GAC7D,IAAK,IAAyB,EAC1B,MAAM,IAAI,2BAAyB,2CAA4C,CAC3E,OAAQ,EAAK,MACjB,CAAC,EAEL,OAAO,EAAa,IACb,EACH,iBAAkB,EAAa,EAAsB,CAAE,SAAU,OAAQ,CAAC,EAC1E,UACA,iBACJ,CAAC,EAAE",
9
+ "debugId": "07F44E411AE4EA5E64756e2164756e21",
10
+ "names": []
11
+ }
@@ -1,2 +1,4 @@
1
1
  var g=Object.create;var{defineProperty:f,getPrototypeOf:h,getOwnPropertyNames:i}=Object;var j=Object.prototype.hasOwnProperty;var k=(a,b,c)=>{c=a!=null?g(h(a)):{};const d=b||!a||!a.__esModule?f(c,"default",{value:a,enumerable:!0}):c;for(let e of i(a))if(!j.call(d,e))f(d,e,{get:()=>a[e],enumerable:!0});return d};var l=(a,b)=>()=>(b||a((b={exports:{}}).exports,b),b.exports);
2
- export{k as y,l as z};
2
+ export{k as J,l as K};
3
+
4
+ //# debugId=0D97333B6AF9FC4564756e2164756e21
@@ -0,0 +1,9 @@
1
+ {
2
+ "version": 3,
3
+ "sources": [],
4
+ "sourcesContent": [
5
+ ],
6
+ "mappings": "",
7
+ "debugId": "0D97333B6AF9FC4564756e2164756e21",
8
+ "names": []
9
+ }
@@ -1,2 +1,4 @@
1
1
  // @bun
2
- import{y as B} from"./chunk-7ce930fe69575c87.js";import"./chunk-f10ba402aaacfc12.js";import{vb as D} from"./chunk-eabfa03c809e14df.js";import{Eb as E,yb as K} from"./chunk-2f8839f406606d63.js";var Z=B(D(),1);var $=B(D(),1);var C=B(D(),1),A=(y,c,_)=>{const b={EcsContainer:async(x)=>{const{fromHttp:w}=await import("./chunk-d7525516b1305ba3.js"),{fromContainerMetadata:k}=await import("./chunk-cfbe2cbcadcb1ac1.js");return _?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),C.chain(w(x??{}),k(x))},Ec2InstanceMetadata:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");const{fromInstanceMetadata:w}=await import("./chunk-cfbe2cbcadcb1ac1.js");return w(x)},Environment:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");const{fromEnv:w}=await import("./chunk-04f04986e53516f0.js");return w(x)}};if(y in b)return b[y];else throw new C.CredentialsProviderError(`Unsupported credential source in profile ${c}. Got ${y}, `+"expected EcsContainer or Ec2InstanceMetadata or Environment.",{logger:_})};var J=(y,{profile:c="default",logger:_}={})=>{return Boolean(y)&&typeof y==="object"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1&&["undefined","string"].indexOf(typeof y.external_id)>-1&&["undefined","string"].indexOf(typeof y.mfa_serial)>-1&&(H(y,{profile:c,logger:_})||R(y,{profile:c,logger:_}))},H=(y,{profile:c,logger:_})=>{const b=typeof y.source_profile==="string"&&typeof y.credential_source==="undefined";if(b)_?.debug?.(` ${c} isAssumeRoleWithSourceProfile source_profile=${y.source_profile}`);return b},R=(y,{profile:c,logger:_})=>{const b=typeof y.credential_source==="string"&&typeof y.source_profile==="undefined";if(b)_?.debug?.(` ${c} isCredentialSourceProfile credential_source=${y.credential_source}`);return b},L=async(y,c,_,b={})=>{_.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");const x=c[y];if(!_.roleAssumer){const{getDefaultRoleAssumer:I}=await import("./chunk-c459f3e37965c22f.js");_.roleAssumer=I({..._.clientConfig,credentialProviderLogger:_.logger,parentClientConfig:_?.parentClientConfig},_.clientPlugins)}const{source_profile:w}=x;if(w&&w in b)throw new $.CredentialsProviderError("Detected a cycle attempting to resolve credentials for profile"+` ${K(_)}. Profiles visited: `+Object.keys(b).join(", "),{logger:_.logger});_.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${w?`source_profile=[${w}]`:`profile=[${y}]`}`);const k=w?j(w,c,_,{...b,[w]:!0},G(c[w]??{})):(await A(x.credential_source,y,_.logger)(_))();if(G(x))return k;else{const I={RoleArn:x.role_arn,RoleSessionName:x.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:x.external_id,DurationSeconds:parseInt(x.duration_seconds||"3600",10)},{mfa_serial:O}=x;if(O){if(!_.mfaCodeProvider)throw new $.CredentialsProviderError(`Profile ${y} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:_.logger,tryNextLink:!1});I.SerialNumber=O,I.TokenCode=await _.mfaCodeProvider(O)}const F=await k;return _.roleAssumer(F,I)}},G=(y)=>{return!y.role_arn&&!!y.credential_source};var Q=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.credential_process==="string",U=async(y,c)=>import("./chunk-1770e9abf10029e0.js").then(({fromProcess:_})=>_({...y,profile:c})());var V=async(y,c={})=>{const{fromSSO:_}=await import("./chunk-0f0add364d3ea615.js");return _({profile:y,logger:c.logger})()},W=(y)=>y&&(typeof y.sso_start_url==="string"||typeof y.sso_account_id==="string"||typeof y.sso_session==="string"||typeof y.sso_region==="string"||typeof y.sso_role_name==="string");var q=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.aws_access_key_id==="string"&&typeof y.aws_secret_access_key==="string"&&["undefined","string"].indexOf(typeof y.aws_session_token)>-1&&["undefined","string"].indexOf(typeof y.aws_account_id)>-1,z=(y,c)=>{return c?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials"),Promise.resolve({accessKeyId:y.aws_access_key_id,secretAccessKey:y.aws_secret_access_key,sessionToken:y.aws_session_token,...y.aws_credential_scope&&{credentialScope:y.aws_credential_scope},...y.aws_account_id&&{accountId:y.aws_account_id}})};var X=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.web_identity_token_file==="string"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1,Y=async(y,c)=>import("./chunk-d09948245f5b426d.js").then(({fromTokenFile:_})=>_({webIdentityTokenFile:y.web_identity_token_file,roleArn:y.role_arn,roleSessionName:y.role_session_name,roleAssumerWithWebIdentity:c.roleAssumerWithWebIdentity,logger:c.logger,parentClientConfig:c.parentClientConfig})());var j=async(y,c,_,b={},x=!1)=>{const w=c[y];if(Object.keys(b).length>0&&q(w))return z(w,_);if(x||J(w,{profile:y,logger:_.logger}))return L(y,c,_,b);if(q(w))return z(w,_);if(X(w))return Y(w,_);if(Q(w))return U(_,y);if(W(w))return await V(y,_);throw new Z.CredentialsProviderError(`Could not resolve credentials using profile: [${y}] in configuration/credentials file(s).`,{logger:_.logger})};var a=(y={})=>async()=>{y.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");const c=await E(y);return j(K(y),c,y)};export{a as fromIni};
2
+ import{J as B} from"./chunk-0d97333b6af9fc45.js";import"./chunk-9f9e21f9fd0d6af1.js";import{Fb as D} from"./chunk-cd4bfdd46ec4cbb8.js";import{Ib as K,Ob as E} from"./chunk-bace428bfab523c4.js";var Z=B(D(),1);var $=B(D(),1);var C=B(D(),1),A=(y,c,_)=>{const b={EcsContainer:async(x)=>{const{fromHttp:w}=await import("./chunk-9be25fac5f76b2f7.js"),{fromContainerMetadata:k}=await import("./chunk-a7d87b5d6d789781.js");return _?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),C.chain(w(x??{}),k(x))},Ec2InstanceMetadata:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");const{fromInstanceMetadata:w}=await import("./chunk-a7d87b5d6d789781.js");return w(x)},Environment:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");const{fromEnv:w}=await import("./chunk-d5b8023c223e3a60.js");return w(x)}};if(y in b)return b[y];else throw new C.CredentialsProviderError(`Unsupported credential source in profile ${c}. Got ${y}, `+"expected EcsContainer or Ec2InstanceMetadata or Environment.",{logger:_})};var J=(y,{profile:c="default",logger:_}={})=>{return Boolean(y)&&typeof y==="object"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1&&["undefined","string"].indexOf(typeof y.external_id)>-1&&["undefined","string"].indexOf(typeof y.mfa_serial)>-1&&(H(y,{profile:c,logger:_})||R(y,{profile:c,logger:_}))},H=(y,{profile:c,logger:_})=>{const b=typeof y.source_profile==="string"&&typeof y.credential_source==="undefined";if(b)_?.debug?.(` ${c} isAssumeRoleWithSourceProfile source_profile=${y.source_profile}`);return b},R=(y,{profile:c,logger:_})=>{const b=typeof y.credential_source==="string"&&typeof y.source_profile==="undefined";if(b)_?.debug?.(` ${c} isCredentialSourceProfile credential_source=${y.credential_source}`);return b},L=async(y,c,_,b={})=>{_.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");const x=c[y];if(!_.roleAssumer){const{getDefaultRoleAssumer:I}=await import("./chunk-57ba59dd008d6e0e.js");_.roleAssumer=I({..._.clientConfig,credentialProviderLogger:_.logger,parentClientConfig:_?.parentClientConfig},_.clientPlugins)}const{source_profile:w}=x;if(w&&w in b)throw new $.CredentialsProviderError("Detected a cycle attempting to resolve credentials for profile"+` ${K(_)}. Profiles visited: `+Object.keys(b).join(", "),{logger:_.logger});_.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${w?`source_profile=[${w}]`:`profile=[${y}]`}`);const k=w?j(w,c,_,{...b,[w]:!0},G(c[w]??{})):(await A(x.credential_source,y,_.logger)(_))();if(G(x))return k;else{const I={RoleArn:x.role_arn,RoleSessionName:x.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:x.external_id,DurationSeconds:parseInt(x.duration_seconds||"3600",10)},{mfa_serial:O}=x;if(O){if(!_.mfaCodeProvider)throw new $.CredentialsProviderError(`Profile ${y} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:_.logger,tryNextLink:!1});I.SerialNumber=O,I.TokenCode=await _.mfaCodeProvider(O)}const F=await k;return _.roleAssumer(F,I)}},G=(y)=>{return!y.role_arn&&!!y.credential_source};var Q=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.credential_process==="string",U=async(y,c)=>import("./chunk-18a59fffad60f059.js").then(({fromProcess:_})=>_({...y,profile:c})());var V=async(y,c={})=>{const{fromSSO:_}=await import("./chunk-cd9c5e8a6c80384f.js");return _({profile:y,logger:c.logger})()},W=(y)=>y&&(typeof y.sso_start_url==="string"||typeof y.sso_account_id==="string"||typeof y.sso_session==="string"||typeof y.sso_region==="string"||typeof y.sso_role_name==="string");var q=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.aws_access_key_id==="string"&&typeof y.aws_secret_access_key==="string"&&["undefined","string"].indexOf(typeof y.aws_session_token)>-1&&["undefined","string"].indexOf(typeof y.aws_account_id)>-1,z=(y,c)=>{return c?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials"),Promise.resolve({accessKeyId:y.aws_access_key_id,secretAccessKey:y.aws_secret_access_key,sessionToken:y.aws_session_token,...y.aws_credential_scope&&{credentialScope:y.aws_credential_scope},...y.aws_account_id&&{accountId:y.aws_account_id}})};var X=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.web_identity_token_file==="string"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1,Y=async(y,c)=>import("./chunk-07f44e411ae4ea5e.js").then(({fromTokenFile:_})=>_({webIdentityTokenFile:y.web_identity_token_file,roleArn:y.role_arn,roleSessionName:y.role_session_name,roleAssumerWithWebIdentity:c.roleAssumerWithWebIdentity,logger:c.logger,parentClientConfig:c.parentClientConfig})());var j=async(y,c,_,b={},x=!1)=>{const w=c[y];if(Object.keys(b).length>0&&q(w))return z(w,_);if(x||J(w,{profile:y,logger:_.logger}))return L(y,c,_,b);if(q(w))return z(w,_);if(X(w))return Y(w,_);if(Q(w))return U(_,y);if(W(w))return await V(y,_);throw new Z.CredentialsProviderError(`Could not resolve credentials using profile: [${y}] in configuration/credentials file(s).`,{logger:_.logger})};var a=(y={})=>async()=>{y.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");const c=await E(y);return j(K(y),c,y)};export{a as fromIni};
3
+
4
+ //# debugId=11DE5B0ADCCEF35C64756e2164756e21
@@ -0,0 +1,17 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js", "../../../node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js", "../../../node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js", "../../../node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js", "../../../node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js", "../../../node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js", "../../../node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js", "../../../node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js"],
4
+ "sourcesContent": [
5
+ "import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { isAssumeRoleProfile, resolveAssumeRoleCredentials } from \"./resolveAssumeRoleCredentials\";\nimport { isProcessProfile, resolveProcessCredentials } from \"./resolveProcessCredentials\";\nimport { isSsoProfile, resolveSsoCredentials } from \"./resolveSsoCredentials\";\nimport { isStaticCredsProfile, resolveStaticCredentials } from \"./resolveStaticCredentials\";\nimport { isWebIdentityProfile, resolveWebIdentityCredentials } from \"./resolveWebIdentityCredentials\";\nexport const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {\n const data = profiles[profileName];\n if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isAssumeRoleRecursiveCall || isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {\n return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);\n }\n if (isStaticCredsProfile(data)) {\n return resolveStaticCredentials(data, options);\n }\n if (isWebIdentityProfile(data)) {\n return resolveWebIdentityCredentials(data, options);\n }\n if (isProcessProfile(data)) {\n return resolveProcessCredentials(options, profileName);\n }\n if (isSsoProfile(data)) {\n return await resolveSsoCredentials(profileName, options);\n }\n throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });\n};\n",
6
+ "import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { getProfileName } from \"@smithy/shared-ini-file-loader\";\nimport { resolveCredentialSource } from \"./resolveCredentialSource\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const isAssumeRoleProfile = (arg, { profile = \"default\", logger } = {}) => {\n return (Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1 &&\n (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));\n};\nconst isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {\n const withSourceProfile = typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n if (withSourceProfile) {\n logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);\n }\n return withSourceProfile;\n};\nconst isCredentialSourceProfile = (arg, { profile, logger }) => {\n const withProviderProfile = typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n if (withProviderProfile) {\n logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);\n }\n return withProviderProfile;\n};\nexport const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {\n options.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)\");\n const data = profiles[profileName];\n if (!options.roleAssumer) {\n const { getDefaultRoleAssumer } = await import(\"@aws-sdk/client-sts\");\n options.roleAssumer = getDefaultRoleAssumer({\n ...options.clientConfig,\n credentialProviderLogger: options.logger,\n parentClientConfig: options?.parentClientConfig,\n }, options.clientPlugins);\n }\n const { source_profile } = data;\n if (source_profile && source_profile in visitedProfiles) {\n throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +\n ` ${getProfileName(options)}. Profiles visited: ` +\n Object.keys(visitedProfiles).join(\", \"), { logger: options.logger });\n }\n options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);\n const sourceCredsProvider = source_profile\n ? resolveProfileData(source_profile, profiles, options, {\n ...visitedProfiles,\n [source_profile]: true,\n }, isCredentialSourceWithoutRoleArn(profiles[source_profile] ?? {}))\n : (await resolveCredentialSource(data.credential_source, profileName, options.logger)(options))();\n if (isCredentialSourceWithoutRoleArn(data)) {\n return sourceCredsProvider;\n }\n else {\n const params = {\n RoleArn: data.role_arn,\n RoleSessionName: data.role_session_name || `aws-sdk-js-${Date.now()}`,\n ExternalId: data.external_id,\n DurationSeconds: parseInt(data.duration_seconds || \"3600\", 10),\n };\n const { mfa_serial } = data;\n if (mfa_serial) {\n if (!options.mfaCodeProvider) {\n throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });\n }\n params.SerialNumber = mfa_serial;\n params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n }\n const sourceCreds = await sourceCredsProvider;\n return options.roleAssumer(sourceCreds, params);\n }\n};\nconst isCredentialSourceWithoutRoleArn = (section) => {\n return !section.role_arn && !!section.credential_source;\n};\n",
7
+ "import { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const resolveCredentialSource = (credentialSource, profileName, logger) => {\n const sourceProvidersMap = {\n EcsContainer: async (options) => {\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n const { fromContainerMetadata } = await import(\"@smithy/credential-provider-imds\");\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is EcsContainer\");\n return chain(fromHttp(options ?? {}), fromContainerMetadata(options));\n },\n Ec2InstanceMetadata: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata\");\n const { fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n return fromInstanceMetadata(options);\n },\n Environment: async (options) => {\n logger?.debug(\"@aws-sdk/credential-provider-ini - credential_source is Environment\");\n const { fromEnv } = await import(\"@aws-sdk/credential-provider-env\");\n return fromEnv(options);\n },\n };\n if (credentialSource in sourceProvidersMap) {\n return sourceProvidersMap[credentialSource];\n }\n else {\n throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });\n }\n};\n",
8
+ "export const isProcessProfile = (arg) => Boolean(arg) && typeof arg === \"object\" && typeof arg.credential_process === \"string\";\nexport const resolveProcessCredentials = async (options, profile) => import(\"@aws-sdk/credential-provider-process\").then(({ fromProcess }) => fromProcess({\n ...options,\n profile,\n})());\n",
9
+ "export const resolveSsoCredentials = async (profile, options = {}) => {\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO({\n profile,\n logger: options.logger,\n })();\n};\nexport const isSsoProfile = (arg) => arg &&\n (typeof arg.sso_start_url === \"string\" ||\n typeof arg.sso_account_id === \"string\" ||\n typeof arg.sso_session === \"string\" ||\n typeof arg.sso_region === \"string\" ||\n typeof arg.sso_role_name === \"string\");\n",
10
+ "export const isStaticCredsProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.aws_access_key_id === \"string\" &&\n typeof arg.aws_secret_access_key === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1 &&\n [\"undefined\", \"string\"].indexOf(typeof arg.aws_account_id) > -1;\nexport const resolveStaticCredentials = (profile, options) => {\n options?.logger?.debug(\"@aws-sdk/credential-provider-ini - resolveStaticCredentials\");\n return Promise.resolve({\n accessKeyId: profile.aws_access_key_id,\n secretAccessKey: profile.aws_secret_access_key,\n sessionToken: profile.aws_session_token,\n ...(profile.aws_credential_scope && { credentialScope: profile.aws_credential_scope }),\n ...(profile.aws_account_id && { accountId: profile.aws_account_id }),\n });\n};\n",
11
+ "export const isWebIdentityProfile = (arg) => Boolean(arg) &&\n typeof arg === \"object\" &&\n typeof arg.web_identity_token_file === \"string\" &&\n typeof arg.role_arn === \"string\" &&\n [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\nexport const resolveWebIdentityCredentials = async (profile, options) => import(\"@aws-sdk/credential-provider-web-identity\").then(({ fromTokenFile }) => fromTokenFile({\n webIdentityTokenFile: profile.web_identity_token_file,\n roleArn: profile.role_arn,\n roleSessionName: profile.role_session_name,\n roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n logger: options.logger,\n parentClientConfig: options.parentClientConfig,\n})());\n",
12
+ "import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProfileData } from \"./resolveProfileData\";\nexport const fromIni = (init = {}) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-ini - fromIni\");\n const profiles = await parseKnownFiles(init);\n return resolveProfileData(getProfileName(init), profiles, init);\n};\n"
13
+ ],
14
+ "mappings": ";2LAAA,iBCAA,iBCAA,iBACa,EAA0B,CAAC,EAAkB,EAAa,IAAW,CAC9E,MAAM,EAAqB,CACvB,aAAc,MAAO,IAAY,CAC7B,MAAQ,YAAa,KAAa,wCAC1B,yBAA0B,KAAa,uCAE/C,OADA,GAAQ,MAAM,sEAAsE,EAC7E,QAAM,EAAS,GAAW,CAAC,CAAC,EAAG,EAAsB,CAAO,CAAC,GAExE,oBAAqB,MAAO,IAAY,CACpC,GAAQ,MAAM,6EAA6E,EAC3F,MAAQ,wBAAyB,KAAa,uCAC9C,OAAO,EAAqB,CAAO,GAEvC,YAAa,MAAO,IAAY,CAC5B,GAAQ,MAAM,qEAAqE,EACnF,MAAQ,WAAY,KAAa,uCACjC,OAAO,EAAQ,CAAO,EAE9B,EACA,GAAI,KAAoB,EACpB,OAAO,EAAmB,OAG1B,OAAM,IAAI,2BAAyB,4CAA4C,UAAoB,MAC/F,+DAAgE,CAAE,QAAO,CAAC,GDrB/E,IAAM,EAAsB,CAAC,GAAO,UAAU,UAAW,UAAW,CAAC,IAAM,CAC9E,OAAQ,QAAQ,CAAG,UACR,IAAQ,iBACR,EAAI,WAAa,UACxB,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,iBAAiB,GAAI,GAChE,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,WAAW,GAAI,GAC1D,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,UAAU,GAAI,IACxD,EAA8B,EAAK,CAAE,UAAS,QAAO,CAAC,GAAK,EAA0B,EAAK,CAAE,UAAS,QAAO,CAAC,IAEhH,EAAgC,CAAC,GAAO,UAAS,YAAa,CAChE,MAAM,SAA2B,EAAI,iBAAmB,iBAAmB,EAAI,oBAAsB,YACrG,GAAI,EACA,GAAQ,QAAQ,OAAO,kDAAwD,EAAI,gBAAgB,EAEvG,OAAO,GAEL,EAA4B,CAAC,GAAO,UAAS,YAAa,CAC5D,MAAM,SAA6B,EAAI,oBAAsB,iBAAmB,EAAI,iBAAmB,YACvG,GAAI,EACA,GAAQ,QAAQ,OAAO,iDAAuD,EAAI,mBAAmB,EAEzG,OAAO,GAEE,EAA+B,MAAO,EAAa,EAAU,EAAS,EAAkB,CAAC,IAAM,CACxG,EAAQ,QAAQ,MAAM,uEAAuE,EAC7F,MAAM,EAAO,EAAS,GACtB,IAAK,EAAQ,YAAa,CACtB,MAAQ,yBAA0B,KAAa,uCAC/C,EAAQ,YAAc,EAAsB,IACrC,EAAQ,aACX,yBAA0B,EAAQ,OAClC,mBAAoB,GAAS,kBACjC,EAAG,EAAQ,aAAa,EAE5B,MAAQ,kBAAmB,EAC3B,GAAI,GAAkB,KAAkB,EACpC,MAAM,IAAI,2BAAyB,iEAC/B,IAAI,EAAe,CAAO,wBAC1B,OAAO,KAAK,CAAe,EAAE,KAAK,IAAI,EAAG,CAAE,OAAQ,EAAQ,MAAO,CAAC,EAE3E,EAAQ,QAAQ,MAAM,wEAAwE,EAAiB,mBAAmB,KAAoB,YAAY,MAAgB,EAClL,MAAM,EAAsB,EACtB,EAAmB,EAAgB,EAAU,EAAS,IACjD,GACF,GAAiB,EACtB,EAAG,EAAiC,EAAS,IAAmB,CAAC,CAAC,CAAC,GAChE,MAAM,EAAwB,EAAK,kBAAmB,EAAa,EAAQ,MAAM,EAAE,CAAO,GAAG,EACpG,GAAI,EAAiC,CAAI,EACrC,OAAO,MAEN,CACD,MAAM,EAAS,CACX,QAAS,EAAK,SACd,gBAAiB,EAAK,mBAAqB,cAAc,KAAK,IAAI,IAClE,WAAY,EAAK,YACjB,gBAAiB,SAAS,EAAK,kBAAoB,OAAQ,EAAE,CACjE,GACQ,cAAe,EACvB,GAAI,EAAY,CACZ,IAAK,EAAQ,gBACT,MAAM,IAAI,2BAAyB,WAAW,iFAA4F,CAAE,OAAQ,EAAQ,OAAQ,YAAa,EAAM,CAAC,EAE5L,EAAO,aAAe,EACtB,EAAO,UAAY,MAAM,EAAQ,gBAAgB,CAAU,EAE/D,MAAM,EAAc,MAAM,EAC1B,OAAO,EAAQ,YAAY,EAAa,CAAM,IAGhD,EAAmC,CAAC,IAAY,CAClD,OAAQ,EAAQ,YAAc,EAAQ,mBE1EnC,IAAM,EAAmB,CAAC,IAAQ,QAAQ,CAAG,UAAY,IAAQ,iBAAmB,EAAI,qBAAuB,SACzG,EAA4B,MAAO,EAAS,IAAmB,sCAAwC,KAAK,EAAG,iBAAkB,EAAY,IACnJ,EACH,SACJ,CAAC,EAAE,CAAC,ECJG,IAAM,EAAwB,MAAO,EAAS,EAAU,CAAC,IAAM,CAClE,MAAQ,WAAY,KAAa,uCACjC,OAAO,EAAQ,CACX,UACA,OAAQ,EAAQ,MACpB,CAAC,EAAE,GAEM,EAAe,CAAC,IAAQ,WACzB,EAAI,gBAAkB,iBACnB,EAAI,iBAAmB,iBACvB,EAAI,cAAgB,iBACpB,EAAI,aAAe,iBACnB,EAAI,gBAAkB,UCZ9B,IAAM,EAAuB,CAAC,IAAQ,QAAQ,CAAG,UAC7C,IAAQ,iBACR,EAAI,oBAAsB,iBAC1B,EAAI,wBAA0B,UACrC,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,iBAAiB,GAAI,GAChE,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,cAAc,GAAI,EACpD,EAA2B,CAAC,EAAS,IAAY,CAE1D,OADA,GAAS,QAAQ,MAAM,6DAA6D,EAC7E,QAAQ,QAAQ,CACnB,YAAa,EAAQ,kBACrB,gBAAiB,EAAQ,sBACzB,aAAc,EAAQ,qBAClB,EAAQ,sBAAwB,CAAE,gBAAiB,EAAQ,oBAAqB,KAChF,EAAQ,gBAAkB,CAAE,UAAW,EAAQ,cAAe,CACtE,CAAC,GCdE,IAAM,EAAuB,CAAC,IAAQ,QAAQ,CAAG,UAC7C,IAAQ,iBACR,EAAI,0BAA4B,iBAChC,EAAI,WAAa,UACxB,CAAC,YAAa,QAAQ,EAAE,eAAe,EAAI,iBAAiB,GAAI,EACvD,EAAgC,MAAO,EAAS,IAAmB,sCAA6C,KAAK,EAAG,mBAAoB,EAAc,CACnK,qBAAsB,EAAQ,wBAC9B,QAAS,EAAQ,SACjB,gBAAiB,EAAQ,kBACzB,2BAA4B,EAAQ,2BACpC,OAAQ,EAAQ,OAChB,mBAAoB,EAAQ,kBAChC,CAAC,EAAE,CAAC,ENNG,IAAM,EAAqB,MAAO,EAAa,EAAU,EAAS,EAAkB,CAAC,EAAG,EAA4B,KAAU,CACjI,MAAM,EAAO,EAAS,GACtB,GAAI,OAAO,KAAK,CAAe,EAAE,OAAS,GAAK,EAAqB,CAAI,EACpE,OAAO,EAAyB,EAAM,CAAO,EAEjD,GAAI,GAA6B,EAAoB,EAAM,CAAE,QAAS,EAAa,OAAQ,EAAQ,MAAO,CAAC,EACvG,OAAO,EAA6B,EAAa,EAAU,EAAS,CAAe,EAEvF,GAAI,EAAqB,CAAI,EACzB,OAAO,EAAyB,EAAM,CAAO,EAEjD,GAAI,EAAqB,CAAI,EACzB,OAAO,EAA8B,EAAM,CAAO,EAEtD,GAAI,EAAiB,CAAI,EACrB,OAAO,EAA0B,EAAS,CAAW,EAEzD,GAAI,EAAa,CAAI,EACjB,OAAO,MAAM,EAAsB,EAAa,CAAO,EAE3D,MAAM,IAAI,2BAAyB,iDAAiD,2CAAsD,CAAE,OAAQ,EAAQ,MAAO,CAAC,GOxBjK,IAAM,EAAU,CAAC,EAAO,CAAC,IAAM,SAAY,CAC9C,EAAK,QAAQ,MAAM,4CAA4C,EAC/D,MAAM,EAAW,MAAM,EAAgB,CAAI,EAC3C,OAAO,EAAmB,EAAe,CAAI,EAAG,EAAU,CAAI",
15
+ "debugId": "11DE5B0ADCCEF35C64756e2164756e21",
16
+ "names": []
17
+ }
@@ -1,2 +1,4 @@
1
1
  // @bun
2
- import{y as _} from"./chunk-7ce930fe69575c87.js";import"./chunk-f10ba402aaacfc12.js";import{vb as y} from"./chunk-eabfa03c809e14df.js";import{Eb as S,yb as K} from"./chunk-2f8839f406606d63.js";var o=_(y(),1);import{exec as A} from"child_process";import{promisify as T} from"util";var i=(c,n,s)=>{if(n.Version!==1)throw Error(`Profile ${c} credential_process did not return Version 1.`);if(n.AccessKeyId===void 0||n.SecretAccessKey===void 0)throw Error(`Profile ${c} credential_process returned invalid credentials.`);if(n.Expiration){const t=new Date;if(new Date(n.Expiration)<t)throw Error(`Profile ${c} credential_process returned expired credentials.`)}let e=n.AccountId;if(!e&&s?.[c]?.aws_account_id)e=s[c].aws_account_id;return{accessKeyId:n.AccessKeyId,secretAccessKey:n.SecretAccessKey,...n.SessionToken&&{sessionToken:n.SessionToken},...n.Expiration&&{expiration:new Date(n.Expiration)},...n.CredentialScope&&{credentialScope:n.CredentialScope},...e&&{accountId:e}}};var x=async(c,n,s)=>{const e=n[c];if(n[c]){const t=e.credential_process;if(t!==void 0){const u=T(A);try{const{stdout:r}=await u(t);let w;try{w=JSON.parse(r.trim())}catch{throw Error(`Profile ${c} credential_process returned invalid JSON.`)}return i(c,w,n)}catch(r){throw new o.CredentialsProviderError(r.message,{logger:s})}}else throw new o.CredentialsProviderError(`Profile ${c} did not contain credential_process.`,{logger:s})}else throw new o.CredentialsProviderError(`Profile ${c} could not be found in shared credentials file.`,{logger:s})};var b=(c={})=>async()=>{c.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");const n=await S(c);return x(K(c),n,c.logger)};export{b as fromProcess};
2
+ import{J as _} from"./chunk-0d97333b6af9fc45.js";import"./chunk-9f9e21f9fd0d6af1.js";import{Fb as y} from"./chunk-cd4bfdd46ec4cbb8.js";import{Ib as K,Ob as S} from"./chunk-bace428bfab523c4.js";var o=_(y(),1);import{exec as A} from"child_process";import{promisify as T} from"util";var i=(c,n,s)=>{if(n.Version!==1)throw Error(`Profile ${c} credential_process did not return Version 1.`);if(n.AccessKeyId===void 0||n.SecretAccessKey===void 0)throw Error(`Profile ${c} credential_process returned invalid credentials.`);if(n.Expiration){const t=new Date;if(new Date(n.Expiration)<t)throw Error(`Profile ${c} credential_process returned expired credentials.`)}let e=n.AccountId;if(!e&&s?.[c]?.aws_account_id)e=s[c].aws_account_id;return{accessKeyId:n.AccessKeyId,secretAccessKey:n.SecretAccessKey,...n.SessionToken&&{sessionToken:n.SessionToken},...n.Expiration&&{expiration:new Date(n.Expiration)},...n.CredentialScope&&{credentialScope:n.CredentialScope},...e&&{accountId:e}}};var x=async(c,n,s)=>{const e=n[c];if(n[c]){const t=e.credential_process;if(t!==void 0){const u=T(A);try{const{stdout:r}=await u(t);let w;try{w=JSON.parse(r.trim())}catch{throw Error(`Profile ${c} credential_process returned invalid JSON.`)}return i(c,w,n)}catch(r){throw new o.CredentialsProviderError(r.message,{logger:s})}}else throw new o.CredentialsProviderError(`Profile ${c} did not contain credential_process.`,{logger:s})}else throw new o.CredentialsProviderError(`Profile ${c} could not be found in shared credentials file.`,{logger:s})};var b=(c={})=>async()=>{c.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");const n=await S(c);return x(K(c),n,c.logger)};export{b as fromProcess};
3
+
4
+ //# debugId=18A59FFFAD60F05964756e2164756e21
@@ -0,0 +1,12 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js", "../../../node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js", "../../../node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js"],
4
+ "sourcesContent": [
5
+ "import { CredentialsProviderError } from \"@smithy/property-provider\";\nimport { exec } from \"child_process\";\nimport { promisify } from \"util\";\nimport { getValidatedProcessCredentials } from \"./getValidatedProcessCredentials\";\nexport const resolveProcessCredentials = async (profileName, profiles, logger) => {\n const profile = profiles[profileName];\n if (profiles[profileName]) {\n const credentialProcess = profile[\"credential_process\"];\n if (credentialProcess !== undefined) {\n const execPromise = promisify(exec);\n try {\n const { stdout } = await execPromise(credentialProcess);\n let data;\n try {\n data = JSON.parse(stdout.trim());\n }\n catch {\n throw Error(`Profile ${profileName} credential_process returned invalid JSON.`);\n }\n return getValidatedProcessCredentials(profileName, data, profiles);\n }\n catch (error) {\n throw new CredentialsProviderError(error.message, { logger });\n }\n }\n else {\n throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });\n }\n }\n else {\n throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {\n logger,\n });\n }\n};\n",
6
+ "export const getValidatedProcessCredentials = (profileName, data, profiles) => {\n if (data.Version !== 1) {\n throw Error(`Profile ${profileName} credential_process did not return Version 1.`);\n }\n if (data.AccessKeyId === undefined || data.SecretAccessKey === undefined) {\n throw Error(`Profile ${profileName} credential_process returned invalid credentials.`);\n }\n if (data.Expiration) {\n const currentTime = new Date();\n const expireTime = new Date(data.Expiration);\n if (expireTime < currentTime) {\n throw Error(`Profile ${profileName} credential_process returned expired credentials.`);\n }\n }\n let accountId = data.AccountId;\n if (!accountId && profiles?.[profileName]?.aws_account_id) {\n accountId = profiles[profileName].aws_account_id;\n }\n return {\n accessKeyId: data.AccessKeyId,\n secretAccessKey: data.SecretAccessKey,\n ...(data.SessionToken && { sessionToken: data.SessionToken }),\n ...(data.Expiration && { expiration: new Date(data.Expiration) }),\n ...(data.CredentialScope && { credentialScope: data.CredentialScope }),\n ...(accountId && { accountId }),\n };\n};\n",
7
+ "import { getProfileName, parseKnownFiles } from \"@smithy/shared-ini-file-loader\";\nimport { resolveProcessCredentials } from \"./resolveProcessCredentials\";\nexport const fromProcess = (init = {}) => async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-process - fromProcess\");\n const profiles = await parseKnownFiles(init);\n return resolveProcessCredentials(getProfileName(init), profiles, init.logger);\n};\n"
8
+ ],
9
+ "mappings": ";2LAAA,iBACA,iBAAS,yBACT,oBAAS,cCFF,IAAM,EAAiC,CAAC,EAAa,EAAM,IAAa,CAC3E,GAAI,EAAK,UAAY,EACjB,MAAM,MAAM,WAAW,gDAA0D,EAErF,GAAI,EAAK,cAAgB,QAAa,EAAK,kBAAoB,OAC3D,MAAM,MAAM,WAAW,oDAA8D,EAEzF,GAAI,EAAK,WAAY,CACjB,MAAM,EAAc,IAAI,KAExB,GADmB,IAAI,KAAK,EAAK,UAAU,EAC1B,EACb,MAAM,MAAM,WAAW,oDAA8D,EAG7F,IAAI,EAAY,EAAK,UACrB,IAAK,GAAa,IAAW,IAAc,eACvC,EAAY,EAAS,GAAa,eAEtC,MAAO,CACH,YAAa,EAAK,YAClB,gBAAiB,EAAK,mBAClB,EAAK,cAAgB,CAAE,aAAc,EAAK,YAAa,KACvD,EAAK,YAAc,CAAE,WAAY,IAAI,KAAK,EAAK,UAAU,CAAE,KAC3D,EAAK,iBAAmB,CAAE,gBAAiB,EAAK,eAAgB,KAChE,GAAa,CAAE,WAAU,CACjC,GDrBG,IAAM,EAA4B,MAAO,EAAa,EAAU,IAAW,CAC9E,MAAM,EAAU,EAAS,GACzB,GAAI,EAAS,GAAc,CACvB,MAAM,EAAoB,EAAQ,mBAClC,GAAI,IAAsB,OAAW,CACjC,MAAM,EAAc,EAAU,CAAI,EAClC,GAAI,CACA,MAAQ,UAAW,MAAM,EAAY,CAAiB,EACtD,IAAI,EACJ,GAAI,CACA,EAAO,KAAK,MAAM,EAAO,KAAK,CAAC,OAEnC,CACI,MAAM,MAAM,WAAW,6CAAuD,EAElF,OAAO,EAA+B,EAAa,EAAM,CAAQ,QAE9D,EAAP,CACI,MAAM,IAAI,2BAAyB,EAAM,QAAS,CAAE,QAAO,CAAC,OAIhE,OAAM,IAAI,2BAAyB,WAAW,wCAAmD,CAAE,QAAO,CAAC,MAI/G,OAAM,IAAI,2BAAyB,WAAW,mDAA8D,CACxG,QACJ,CAAC,GE9BF,IAAM,EAAc,CAAC,EAAO,CAAC,IAAM,SAAY,CAClD,EAAK,QAAQ,MAAM,oDAAoD,EACvE,MAAM,EAAW,MAAM,EAAgB,CAAI,EAC3C,OAAO,EAA0B,EAAe,CAAI,EAAG,EAAU,EAAK,MAAM",
10
+ "debugId": "18A59FFFAD60F05964756e2164756e21",
11
+ "names": []
12
+ }
@@ -1,4 +1,4 @@
1
- import{t as w,u as z,v as B} from"./chunk-04f04986e53516f0.js";import{y as Q} from"./chunk-7ce930fe69575c87.js";import{vb as X} from"./chunk-eabfa03c809e14df.js";import{xb as $} from"./chunk-2f8839f406606d63.js";var q=Q(X(),1);var G=Q(X(),1),k="AWS_EC2_METADATA_DISABLED",Y=async(b)=>{const{ENV_CMDS_FULL_URI:j,ENV_CMDS_RELATIVE_URI:x,fromContainerMetadata:y,fromInstanceMetadata:J}=await import("./chunk-cfbe2cbcadcb1ac1.js");if(process.env[x]||process.env[j]){b.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");const{fromHttp:K}=await import("./chunk-d7525516b1305ba3.js");return G.chain(K(b),y(b))}if(process.env[k])return async()=>{throw new G.CredentialsProviderError("EC2 Instance Metadata Service access disabled",{logger:b.logger})};return b.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata"),J(b)};var Z=!1,T=(b={})=>q.memoize(q.chain(async()=>{if(b.profile??process.env[$]){if(process.env[w]&&process.env[z]){if(!Z)(b.logger?.warn&&b.logger?.constructor?.name!=="NoOpLogger"?b.logger.warn:console.warn)(`@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:
1
+ import{D as w,E as z,F as B} from"./chunk-d5b8023c223e3a60.js";import{J as Q} from"./chunk-0d97333b6af9fc45.js";import{Fb as X} from"./chunk-cd4bfdd46ec4cbb8.js";import{Hb as $} from"./chunk-bace428bfab523c4.js";var q=Q(X(),1);var G=Q(X(),1),k="AWS_EC2_METADATA_DISABLED",Y=async(b)=>{const{ENV_CMDS_FULL_URI:j,ENV_CMDS_RELATIVE_URI:x,fromContainerMetadata:y,fromInstanceMetadata:J}=await import("./chunk-a7d87b5d6d789781.js");if(process.env[x]||process.env[j]){b.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");const{fromHttp:K}=await import("./chunk-9be25fac5f76b2f7.js");return G.chain(K(b),y(b))}if(process.env[k])return async()=>{throw new G.CredentialsProviderError("EC2 Instance Metadata Service access disabled",{logger:b.logger})};return b.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata"),J(b)};var Z=!1,T=(b={})=>q.memoize(q.chain(async()=>{if(b.profile??process.env[$]){if(process.env[w]&&process.env[z]){if(!Z)(b.logger?.warn&&b.logger?.constructor?.name!=="NoOpLogger"?b.logger.warn:console.warn)(`@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:
2
2
  Multiple credential sources detected:
3
3
  Both AWS_PROFILE and the pair AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY static credentials are set.
4
4
  This SDK will proceed with the AWS_PROFILE value.
@@ -6,4 +6,6 @@ import{t as w,u as z,v as B} from"./chunk-04f04986e53516f0.js";import{y as Q} fr
6
6
  However, a future version may change this behavior to prefer the ENV static credentials.
7
7
  Please ensure that your environment only sets either the AWS_PROFILE or the
8
8
  AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.
9
- `),Z=!0}throw new q.CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.",{logger:b.logger,tryNextLink:!0})}return b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv"),B(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");const{ssoStartUrl:j,ssoAccountId:x,ssoRegion:y,ssoRoleName:J,ssoSession:K}=b;if(!j&&!x&&!y&&!J&&!K)throw new q.CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).",{logger:b.logger});const{fromSSO:H}=await import("./chunk-0f0add364d3ea615.js");return H(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");const{fromIni:j}=await import("./chunk-e76c7e3bf2d698af.js");return j(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");const{fromProcess:j}=await import("./chunk-1770e9abf10029e0.js");return j(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");const{fromTokenFile:j}=await import("./chunk-d09948245f5b426d.js");return j(b)()},async()=>{return b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider"),(await Y(b))()},async()=>{throw new q.CredentialsProviderError("Could not load credentials from any providers",{tryNextLink:!1,logger:b.logger})}),O,v),v=(b)=>b?.expiration!==void 0,O=(b)=>b?.expiration!==void 0&&b.expiration.getTime()-Date.now()<300000;export{T as wb};
9
+ `),Z=!0}throw new q.CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.",{logger:b.logger,tryNextLink:!0})}return b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv"),B(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");const{ssoStartUrl:j,ssoAccountId:x,ssoRegion:y,ssoRoleName:J,ssoSession:K}=b;if(!j&&!x&&!y&&!J&&!K)throw new q.CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).",{logger:b.logger});const{fromSSO:H}=await import("./chunk-cd9c5e8a6c80384f.js");return H(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");const{fromIni:j}=await import("./chunk-11de5b0adccef35c.js");return j(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");const{fromProcess:j}=await import("./chunk-18a59fffad60f059.js");return j(b)()},async()=>{b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");const{fromTokenFile:j}=await import("./chunk-07f44e411ae4ea5e.js");return j(b)()},async()=>{return b.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider"),(await Y(b))()},async()=>{throw new q.CredentialsProviderError("Could not load credentials from any providers",{tryNextLink:!1,logger:b.logger})}),O,v),v=(b)=>b?.expiration!==void 0,O=(b)=>b?.expiration!==void 0&&b.expiration.getTime()-Date.now()<300000;export{T as Gb};
10
+
11
+ //# debugId=201C5005A90452FA64756e2164756e21
@@ -0,0 +1,11 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../node_modules/@aws-sdk/credential-provider-node/dist-es/defaultProvider.js", "../../../node_modules/@aws-sdk/credential-provider-node/dist-es/remoteProvider.js"],
4
+ "sourcesContent": [
5
+ "import { ENV_KEY, ENV_SECRET, fromEnv } from \"@aws-sdk/credential-provider-env\";\nimport { chain, CredentialsProviderError, memoize } from \"@smithy/property-provider\";\nimport { ENV_PROFILE } from \"@smithy/shared-ini-file-loader\";\nimport { remoteProvider } from \"./remoteProvider\";\nlet multipleCredentialSourceWarningEmitted = false;\nexport const defaultProvider = (init = {}) => memoize(chain(async () => {\n const profile = init.profile ?? process.env[ENV_PROFILE];\n if (profile) {\n const envStaticCredentialsAreSet = process.env[ENV_KEY] && process.env[ENV_SECRET];\n if (envStaticCredentialsAreSet) {\n if (!multipleCredentialSourceWarningEmitted) {\n const warnFn = init.logger?.warn && init.logger?.constructor?.name !== \"NoOpLogger\" ? init.logger.warn : console.warn;\n warnFn(`@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:\n Multiple credential sources detected: \n Both AWS_PROFILE and the pair AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY static credentials are set.\n This SDK will proceed with the AWS_PROFILE value.\n \n However, a future version may change this behavior to prefer the ENV static credentials.\n Please ensure that your environment only sets either the AWS_PROFILE or the\n AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.\n`);\n multipleCredentialSourceWarningEmitted = true;\n }\n }\n throw new CredentialsProviderError(\"AWS_PROFILE is set, skipping fromEnv provider.\", {\n logger: init.logger,\n tryNextLink: true,\n });\n }\n init.logger?.debug(\"@aws-sdk/credential-provider-node - defaultProvider::fromEnv\");\n return fromEnv(init)();\n}, async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-node - defaultProvider::fromSSO\");\n const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;\n if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {\n throw new CredentialsProviderError(\"Skipping SSO provider in default chain (inputs do not include SSO fields).\", { logger: init.logger });\n }\n const { fromSSO } = await import(\"@aws-sdk/credential-provider-sso\");\n return fromSSO(init)();\n}, async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-node - defaultProvider::fromIni\");\n const { fromIni } = await import(\"@aws-sdk/credential-provider-ini\");\n return fromIni(init)();\n}, async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-node - defaultProvider::fromProcess\");\n const { fromProcess } = await import(\"@aws-sdk/credential-provider-process\");\n return fromProcess(init)();\n}, async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile\");\n const { fromTokenFile } = await import(\"@aws-sdk/credential-provider-web-identity\");\n return fromTokenFile(init)();\n}, async () => {\n init.logger?.debug(\"@aws-sdk/credential-provider-node - defaultProvider::remoteProvider\");\n return (await remoteProvider(init))();\n}, async () => {\n throw new CredentialsProviderError(\"Could not load credentials from any providers\", {\n tryNextLink: false,\n logger: init.logger,\n });\n}), credentialsTreatedAsExpired, credentialsWillNeedRefresh);\nexport const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;\nexport const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;\n",
6
+ "import { chain, CredentialsProviderError } from \"@smithy/property-provider\";\nexport const ENV_IMDS_DISABLED = \"AWS_EC2_METADATA_DISABLED\";\nexport const remoteProvider = async (init) => {\n const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import(\"@smithy/credential-provider-imds\");\n if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {\n init.logger?.debug(\"@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata\");\n const { fromHttp } = await import(\"@aws-sdk/credential-provider-http\");\n return chain(fromHttp(init), fromContainerMetadata(init));\n }\n if (process.env[ENV_IMDS_DISABLED]) {\n return async () => {\n throw new CredentialsProviderError(\"EC2 Instance Metadata Service access disabled\", { logger: init.logger });\n };\n }\n init.logger?.debug(\"@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata\");\n return fromInstanceMetadata(init);\n};\n"
7
+ ],
8
+ "mappings": "8MACA,iBCDA,iBACa,IAAoB,4BACpB,EAAiB,MAAO,IAAS,CAC1C,MAAQ,oBAAmB,wBAAuB,wBAAuB,wBAAyB,KAAa,uCAC/G,GAAI,QAAQ,IAAI,IAA0B,QAAQ,IAAI,GAAoB,CACtE,EAAK,QAAQ,MAAM,oFAAoF,EACvG,MAAQ,YAAa,KAAa,uCAClC,OAAO,QAAM,EAAS,CAAI,EAAG,EAAsB,CAAI,CAAC,EAE5D,GAAI,QAAQ,IAAI,GACZ,MAAO,UAAY,CACf,MAAM,IAAI,2BAAyB,gDAAiD,CAAE,OAAQ,EAAK,MAAO,CAAC,GAInH,OADA,EAAK,QAAQ,MAAM,0EAA0E,EACtF,EAAqB,CAAI,GDXpC,IAAI,EAAyC,GAChC,EAAkB,CAAC,EAAO,CAAC,IAAM,UAAQ,QAAM,SAAY,CAEpE,GADgB,EAAK,SAAW,QAAQ,IAAI,GAC/B,CAET,GADmC,QAAQ,IAAI,IAAY,QAAQ,IAAI,IAEnE,IAAK,EAED,CADe,EAAK,QAAQ,MAAQ,EAAK,QAAQ,aAAa,OAAS,aAAe,EAAK,OAAO,KAAO,QAAQ,MAC1G;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,CAQtB,EACe,EAAyC,GAGjD,MAAM,IAAI,2BAAyB,iDAAkD,CACjF,OAAQ,EAAK,OACb,YAAa,EACjB,CAAC,EAGL,OADA,EAAK,QAAQ,MAAM,8DAA8D,EAC1E,EAAQ,CAAI,EAAE,GACtB,SAAY,CACX,EAAK,QAAQ,MAAM,8DAA8D,EACjF,MAAQ,cAAa,eAAc,YAAW,cAAa,cAAe,EAC1E,IAAK,IAAgB,IAAiB,IAAc,IAAgB,EAChE,MAAM,IAAI,2BAAyB,6EAA8E,CAAE,OAAQ,EAAK,MAAO,CAAC,EAE5I,MAAQ,WAAY,KAAa,uCACjC,OAAO,EAAQ,CAAI,EAAE,GACtB,SAAY,CACX,EAAK,QAAQ,MAAM,8DAA8D,EACjF,MAAQ,WAAY,KAAa,uCACjC,OAAO,EAAQ,CAAI,EAAE,GACtB,SAAY,CACX,EAAK,QAAQ,MAAM,kEAAkE,EACrF,MAAQ,eAAgB,KAAa,uCACrC,OAAO,EAAY,CAAI,EAAE,GAC1B,SAAY,CACX,EAAK,QAAQ,MAAM,oEAAoE,EACvF,MAAQ,iBAAkB,KAAa,uCACvC,OAAO,EAAc,CAAI,EAAE,GAC5B,SAAY,CAEX,OADA,EAAK,QAAQ,MAAM,qEAAqE,GAChF,MAAM,EAAe,CAAI,GAAG,GACrC,SAAY,CACX,MAAM,IAAI,2BAAyB,gDAAiD,CAChF,YAAa,GACb,OAAQ,EAAK,MACjB,CAAC,EACJ,EAAG,EAA6B,CAA0B,EAC9C,EAA6B,CAAC,IAAgB,GAAa,aAAe,OAC1E,EAA8B,CAAC,IAAgB,GAAa,aAAe,QAAa,EAAY,WAAW,QAAQ,EAAI,KAAK,IAAI,EAAI",
9
+ "debugId": "201C5005A90452FA64756e2164756e21",
10
+ "names": []
11
+ }