gemi 0.7.0 → 0.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (122) hide show
  1. package/dist/app/App.d.ts.map +1 -1
  2. package/dist/app/index.js +2 -2
  3. package/dist/app/index.js.map +3 -3
  4. package/dist/auth/AuthenticationServiceProvider.d.ts +42 -9
  5. package/dist/auth/AuthenticationServiceProvider.d.ts.map +1 -1
  6. package/dist/auth/adapters/prisma.d.ts +11 -0
  7. package/dist/auth/adapters/prisma.d.ts.map +1 -1
  8. package/dist/auth/adapters/types.d.ts +16 -1
  9. package/dist/auth/adapters/types.d.ts.map +1 -1
  10. package/dist/auth/oauth/GoogleOAuthProvider.d.ts +24 -0
  11. package/dist/auth/oauth/GoogleOAuthProvider.d.ts.map +1 -0
  12. package/dist/auth/oauth/OAuthProvider.d.ts +9 -0
  13. package/dist/auth/oauth/OAuthProvider.d.ts.map +1 -0
  14. package/dist/broadcasting/index.js +1 -1
  15. package/dist/{chunk-jwx1ymkq.js → chunk-3ka55ht6.js} +2 -2
  16. package/dist/{chunk-jwx1ymkq.js.map → chunk-3ka55ht6.js.map} +1 -1
  17. package/dist/chunk-46zqc1dj.js +4 -0
  18. package/dist/{chunk-ye2x38qd.js.map → chunk-46zqc1dj.js.map} +6 -6
  19. package/dist/chunk-4ds09wjj.js +4 -0
  20. package/dist/{chunk-2xa4pbxq.js.map → chunk-4ds09wjj.js.map} +2 -2
  21. package/dist/chunk-4qrchw7p.js +4 -0
  22. package/dist/{chunk-jjkvret2.js.map → chunk-4qrchw7p.js.map} +4 -4
  23. package/dist/chunk-5rzrkn57.js +20 -0
  24. package/dist/{chunk-59v5dnya.js.map → chunk-5rzrkn57.js.map} +10 -11
  25. package/dist/{chunk-x1ry5x7k.js → chunk-641dtrzq.js} +2 -2
  26. package/dist/{chunk-x1ry5x7k.js.map → chunk-641dtrzq.js.map} +1 -1
  27. package/dist/{chunk-ampttx61.js → chunk-8p80f3ra.js} +3 -3
  28. package/dist/{chunk-ampttx61.js.map → chunk-8p80f3ra.js.map} +1 -1
  29. package/dist/chunk-8xtjnqf2.js +4 -0
  30. package/dist/{chunk-h65yyskz.js.map → chunk-8xtjnqf2.js.map} +5 -5
  31. package/dist/chunk-90fcdyz4.js +4 -0
  32. package/dist/{chunk-1qr49psp.js.map → chunk-90fcdyz4.js.map} +2 -2
  33. package/dist/{chunk-hydta8h3.js → chunk-9et2d2s9.js} +2 -2
  34. package/dist/{chunk-hydta8h3.js.map → chunk-9et2d2s9.js.map} +1 -1
  35. package/dist/chunk-c3pzf596.js +4 -0
  36. package/dist/{chunk-bpqd0d4g.js.map → chunk-c3pzf596.js.map} +2 -2
  37. package/dist/chunk-ccpvv87n.js +11 -0
  38. package/dist/{chunk-74c59y5c.js.map → chunk-ccpvv87n.js.map} +5 -5
  39. package/dist/chunk-cxaw7teb.js +4 -0
  40. package/dist/{chunk-qe8pzmx4.js.map → chunk-cxaw7teb.js.map} +4 -4
  41. package/dist/chunk-ek3cpkdw.js +4 -0
  42. package/dist/{chunk-d7s659wd.js.map → chunk-ek3cpkdw.js.map} +5 -5
  43. package/dist/chunk-fdkjq0j6.js +8 -0
  44. package/dist/{chunk-q30kam3c.js.map → chunk-fdkjq0j6.js.map} +2 -2
  45. package/dist/chunk-h1y6c12m.js +4 -0
  46. package/dist/chunk-h1y6c12m.js.map +11 -0
  47. package/dist/chunk-hr4bwnh0.js +3 -0
  48. package/dist/{chunk-rvge2dbd.js.map → chunk-hr4bwnh0.js.map} +6 -6
  49. package/dist/{chunk-79cfd363.js → chunk-hzy2d896.js} +3 -3
  50. package/dist/{chunk-79cfd363.js.map → chunk-hzy2d896.js.map} +1 -1
  51. package/dist/chunk-nj0kb781.js +4 -0
  52. package/dist/chunk-nj0kb781.js.map +14 -0
  53. package/dist/chunk-p1gkxsp7.js +4 -0
  54. package/dist/{chunk-qsj2vhhs.js.map → chunk-p1gkxsp7.js.map} +1 -1
  55. package/dist/{chunk-7jhdg3q5.js → chunk-ssk7m89s.js} +3 -3
  56. package/dist/{chunk-7jhdg3q5.js.map → chunk-ssk7m89s.js.map} +1 -1
  57. package/dist/chunk-tq1skawf.js +5 -0
  58. package/dist/{chunk-0q2mxfke.js.map → chunk-tq1skawf.js.map} +8 -7
  59. package/dist/{chunk-djfe1w23.js → chunk-vz2bzrg6.js} +3 -3
  60. package/dist/{chunk-djfe1w23.js.map → chunk-vz2bzrg6.js.map} +1 -1
  61. package/dist/{chunk-s6redhaf.js → chunk-w1dra4n6.js} +2 -2
  62. package/dist/{chunk-s6redhaf.js.map → chunk-w1dra4n6.js.map} +1 -1
  63. package/dist/chunk-wh3j7xcz.js +4 -0
  64. package/dist/chunk-wh3j7xcz.js.map +10 -0
  65. package/dist/chunk-yt9bxsbr.js +4 -0
  66. package/dist/{chunk-zg1wzdnw.js.map → chunk-yt9bxsbr.js.map} +4 -4
  67. package/dist/{chunk-exvtvmb6.js → chunk-ztzjxjjj.js} +2 -2
  68. package/dist/{chunk-exvtvmb6.js.map → chunk-ztzjxjjj.js.map} +1 -1
  69. package/dist/client/ClientRouterContext.d.ts.map +1 -1
  70. package/dist/client/HttpClientContext.d.ts +1 -1
  71. package/dist/client/HttpClientContext.d.ts.map +1 -1
  72. package/dist/client/Redirect.d.ts +6 -0
  73. package/dist/client/Redirect.d.ts.map +1 -0
  74. package/dist/client/index.d.ts +1 -0
  75. package/dist/client/index.d.ts.map +1 -1
  76. package/dist/client/index.js +21 -9
  77. package/dist/client/index.js.map +1 -1
  78. package/dist/email/index.js +2 -2
  79. package/dist/email/index.js.map +1 -1
  80. package/dist/facades/Redirect.d.ts +1 -1
  81. package/dist/facades/Redirect.d.ts.map +1 -1
  82. package/dist/facades/index.js +2 -2
  83. package/dist/facades/index.js.map +46 -5
  84. package/dist/http/index.js +2 -2
  85. package/dist/http/index.js.map +4 -3
  86. package/dist/kernel/index.js +2 -2
  87. package/dist/kernel/index.js.map +3 -3
  88. package/dist/server/index.js +2 -2
  89. package/dist/server/index.js.map +1 -1
  90. package/dist/services/ServiceContainer.d.ts.map +1 -1
  91. package/dist/services/index.d.ts +2 -0
  92. package/dist/services/index.d.ts.map +1 -1
  93. package/dist/services/index.js +6 -6
  94. package/dist/services/index.js.map +9 -8
  95. package/dist/services/router/ViewRouterServiceContainer.d.ts.map +1 -1
  96. package/dist/services/router/createComponentTree.d.ts.map +1 -1
  97. package/package.json +1 -1
  98. package/dist/chunk-0q2mxfke.js +0 -5
  99. package/dist/chunk-0ykbtpxc.js +0 -4
  100. package/dist/chunk-0ykbtpxc.js.map +0 -10
  101. package/dist/chunk-1qr49psp.js +0 -4
  102. package/dist/chunk-2xa4pbxq.js +0 -4
  103. package/dist/chunk-59v5dnya.js +0 -20
  104. package/dist/chunk-74c59y5c.js +0 -11
  105. package/dist/chunk-7pwzsfq2.js +0 -3
  106. package/dist/chunk-7pwzsfq2.js.map +0 -15
  107. package/dist/chunk-bpqd0d4g.js +0 -4
  108. package/dist/chunk-d7s659wd.js +0 -4
  109. package/dist/chunk-g3838fme.js +0 -4
  110. package/dist/chunk-g3838fme.js.map +0 -11
  111. package/dist/chunk-gpx46fk2.js +0 -4
  112. package/dist/chunk-gpx46fk2.js.map +0 -50
  113. package/dist/chunk-h65yyskz.js +0 -4
  114. package/dist/chunk-jjkvret2.js +0 -4
  115. package/dist/chunk-ns0xv46h.js +0 -4
  116. package/dist/chunk-ns0xv46h.js.map +0 -14
  117. package/dist/chunk-q30kam3c.js +0 -8
  118. package/dist/chunk-qe8pzmx4.js +0 -4
  119. package/dist/chunk-qsj2vhhs.js +0 -4
  120. package/dist/chunk-rvge2dbd.js +0 -3
  121. package/dist/chunk-ye2x38qd.js +0 -4
  122. package/dist/chunk-zg1wzdnw.js +0 -4
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{Ab as Y,ub as j}from"./chunk-s6redhaf.js";import"./chunk-7jhdg3q5.js";import{Gb as k,Ib as q}from"./chunk-7pwzsfq2.js";import{Tb as I}from"./chunk-exvtvmb6.js";var z=(y,c,_)=>{let b={EcsContainer:async(x)=>{let{fromHttp:w}=await import("./chunk-q30kam3c.js"),{fromContainerMetadata:K}=await import("./chunk-d7s659wd.js");return _?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer"),q(w(x??{}),K(x))},Ec2InstanceMetadata:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");let{fromInstanceMetadata:w}=await import("./chunk-d7s659wd.js");return w(x)},Environment:async(x)=>{_?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");let{fromEnv:w}=await import("./chunk-bpqd0d4g.js");return w(x)}};if(y in b)return b[y];else throw new k(`Unsupported credential source in profile ${c}. Got ${y}, expected EcsContainer or Ec2InstanceMetadata or Environment.`,{logger:_})};var G=(y,{profile:c="default",logger:_}={})=>{return Boolean(y)&&typeof y==="object"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1&&["undefined","string"].indexOf(typeof y.external_id)>-1&&["undefined","string"].indexOf(typeof y.mfa_serial)>-1&&(E(y,{profile:c,logger:_})||F(y,{profile:c,logger:_}))},E=(y,{profile:c,logger:_})=>{let b=typeof y.source_profile==="string"&&typeof y.credential_source==="undefined";if(b)_?.debug?.(` ${c} isAssumeRoleWithSourceProfile source_profile=${y.source_profile}`);return b},F=(y,{profile:c,logger:_})=>{let b=typeof y.credential_source==="string"&&typeof y.source_profile==="undefined";if(b)_?.debug?.(` ${c} isCredentialSourceProfile credential_source=${y.credential_source}`);return b},J=async(y,c,_,b={})=>{_.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");let x=c[y];if(!_.roleAssumer){let{getDefaultRoleAssumer:C}=await import("./chunk-jjkvret2.js");_.roleAssumer=C({..._.clientConfig,credentialProviderLogger:_.logger,parentClientConfig:_?.parentClientConfig},_.clientPlugins)}let{source_profile:w}=x;if(w&&w in b)throw new k(`Detected a cycle attempting to resolve credentials for profile ${j(_)}. Profiles visited: `+Object.keys(b).join(", "),{logger:_.logger});_.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${w?`source_profile=[${w}]`:`profile=[${y}]`}`);let K=w?O(w,c,_,{...b,[w]:!0},A(c[w]??{})):(await z(x.credential_source,y,_.logger)(_))();if(A(x))return K;else{let C={RoleArn:x.role_arn,RoleSessionName:x.role_session_name||`aws-sdk-js-${Date.now()}`,ExternalId:x.external_id,DurationSeconds:parseInt(x.duration_seconds||"3600",10)},{mfa_serial:B}=x;if(B){if(!_.mfaCodeProvider)throw new k(`Profile ${y} requires multi-factor authentication, but no MFA code callback was provided.`,{logger:_.logger,tryNextLink:!1});C.SerialNumber=B,C.TokenCode=await _.mfaCodeProvider(B)}let Z=await K;return _.roleAssumer(Z,C)}},A=(y)=>{return!y.role_arn&&!!y.credential_source};var L=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.credential_process==="string",Q=async(y,c)=>import("./chunk-2xa4pbxq.js").then(({fromProcess:_})=>_({...y,profile:c})());var U=async(y,c={})=>{let{fromSSO:_}=await import("./chunk-ye2x38qd.js");return _({profile:y,logger:c.logger})()},V=(y)=>y&&(typeof y.sso_start_url==="string"||typeof y.sso_account_id==="string"||typeof y.sso_session==="string"||typeof y.sso_region==="string"||typeof y.sso_role_name==="string");var D=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.aws_access_key_id==="string"&&typeof y.aws_secret_access_key==="string"&&["undefined","string"].indexOf(typeof y.aws_session_token)>-1&&["undefined","string"].indexOf(typeof y.aws_account_id)>-1,$=(y,c)=>{return c?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials"),Promise.resolve({accessKeyId:y.aws_access_key_id,secretAccessKey:y.aws_secret_access_key,sessionToken:y.aws_session_token,...y.aws_credential_scope&&{credentialScope:y.aws_credential_scope},...y.aws_account_id&&{accountId:y.aws_account_id}})};var W=(y)=>Boolean(y)&&typeof y==="object"&&typeof y.web_identity_token_file==="string"&&typeof y.role_arn==="string"&&["undefined","string"].indexOf(typeof y.role_session_name)>-1,X=async(y,c)=>import("./chunk-1qr49psp.js").then(({fromTokenFile:_})=>_({webIdentityTokenFile:y.web_identity_token_file,roleArn:y.role_arn,roleSessionName:y.role_session_name,roleAssumerWithWebIdentity:c.roleAssumerWithWebIdentity,logger:c.logger,parentClientConfig:c.parentClientConfig})());var O=async(y,c,_,b={},x=!1)=>{let w=c[y];if(Object.keys(b).length>0&&D(w))return $(w,_);if(x||G(w,{profile:y,logger:_.logger}))return J(y,c,_,b);if(D(w))return $(w,_);if(W(w))return X(w,_);if(L(w))return Q(_,y);if(V(w))return await U(y,_);throw new k(`Could not resolve credentials using profile: [${y}] in configuration/credentials file(s).`,{logger:_.logger})};var p=(y={})=>async()=>{y.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");let c=await Y(y);return O(j(y),c,y)};export{p as fromIni};
3
-
4
- //# debugId=64E2A29146A9CAE264756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{O as Zh}from"./chunk-74c59y5c.js";import{$ as Wl,P as Dw,Q as k0,R as K0,S as F0,T as B0,W as Yh,X as y0,Y as Ml,Z as zl,_ as Nl,aa as Q0,ba as xl,ca as il,da as cl,ea as el,fa as X0,ga as Y0,ia as F,ja as B,ka as Z0,la as pl,ma as nl,na as $0,oa as ol,pa as V0,qa as Gh,ra as ul,sa as tl,ta as h0,ua as l0,va as J0,wa as D0}from"./chunk-59v5dnya.js";import{xa as Uw,ya as f}from"./chunk-rvge2dbd.js";import{$a as H,Da as Al,Fa as Ll,Ga as Rl,Ha as U0,Ia as jl,Ja as al,Ma as fl,Na as Cl,Ta as K,Ua as mh,Va as t0,Za as A0,bb as u,eb as L0,gb as P0,hb as A,ib as R0,jb as Ol,kb as gl,lb as H0,mb as m0,nb as nh,za as S0}from"./chunk-0q2mxfke.js";import"./chunk-s6redhaf.js";import"./chunk-7jhdg3q5.js";import"./chunk-bpqd0d4g.js";import"./chunk-7pwzsfq2.js";import"./chunk-79cfd363.js";import"./chunk-djfe1w23.js";import{Tb as v}from"./chunk-exvtvmb6.js";var C=v(Yh(),1);var dl=v(Gh(),1),Ih=v(Dw(),1);var Sl=async(h,w,l)=>{return{operation:Ih.getSmithyContext(w).operation,region:await Ih.normalizeProvider(h.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};function Ew(h){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sts",region:h.region},propertiesExtractor:(w,l)=>({signingProperties:{config:w,context:l}})}}function Il(h){return{schemeId:"smithy.api#noAuth"}}var Hl=(h)=>{let w=[];switch(h.operation){case"AssumeRoleWithSAML":{w.push(Il(h));break}case"AssumeRoleWithWebIdentity":{w.push(Il(h));break}default:w.push(Ew(h))}return w},kw=(h)=>({...h,stsClientCtor:L}),ml=(h)=>{let w=kw(h);return{...dl.resolveAwsSdkSigV4Config(w)}};var Jl=(h)=>{return{...h,useDualstackEndpoint:h.useDualstackEndpoint??!1,useFipsEndpoint:h.useFipsEndpoint??!1,useGlobalEndpoint:h.useGlobalEndpoint??!1,defaultSigningName:"sts"}},D={UseGlobalEndpoint:{type:"builtInParams",name:"useGlobalEndpoint"},UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var Dl={name:"@aws-sdk/client-sts",description:"AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sts","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"rimraf ./dist-types tsconfig.types.tsbuildinfo && tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sts",test:"yarn test:unit","test:unit":"jest"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/client-sso-oidc":"3.654.0","@aws-sdk/core":"3.654.0","@aws-sdk/credential-provider-node":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sts",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sts"}};var dh=v(Gh(),1);var w0=v(Yh(),1);var sl=v(Gh(),1),rl=v(Yh(),1);var _l=v(Uw(),1);var El={["required"]:!1,["type"]:"String"},Xh={["required"]:!0,default:!1,["type"]:"Boolean"},Yl={["ref"]:"Endpoint"},kl={["fn"]:"isSet",["argv"]:[{["ref"]:"Region"}]},J={["ref"]:"Region"},Kl={["fn"]:"aws.partition",["argv"]:[J],assign:"PartitionResult"},Zl={["ref"]:"UseFIPS"},$l={["ref"]:"UseDualStack"},E={url:"https://sts.amazonaws.com",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"us-east-1"}]},headers:{}},Y={},Fl={conditions:[{["fn"]:"stringEquals",["argv"]:[J,"aws-global"]}],["endpoint"]:E,["type"]:"endpoint"},Vl={["fn"]:"booleanEquals",["argv"]:[Zl,!0]},Pl={["fn"]:"booleanEquals",["argv"]:[$l,!0]},Bl={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},ql={["ref"]:"PartitionResult"},Ul={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[ql,"supportsDualStack"]}]},yl=[{["fn"]:"isSet",["argv"]:[Yl]}],Ql=[Vl],Xl=[Pl],Fw={version:"1.0",parameters:{Region:El,UseDualStack:Xh,UseFIPS:Xh,Endpoint:El,UseGlobalEndpoint:Xh},rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseGlobalEndpoint"},!0]},{["fn"]:"not",["argv"]:yl},kl,Kl,{["fn"]:"booleanEquals",["argv"]:[Zl,!1]},{["fn"]:"booleanEquals",["argv"]:[$l,!1]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-northeast-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-south-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-southeast-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ap-southeast-2"]}],endpoint:E,["type"]:"endpoint"},Fl,{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"ca-central-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-central-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-north-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-2"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"eu-west-3"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"sa-east-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-east-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-east-2"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-west-1"]}],endpoint:E,["type"]:"endpoint"},{conditions:[{["fn"]:"stringEquals",["argv"]:[J,"us-west-2"]}],endpoint:E,["type"]:"endpoint"},{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:{authSchemes:[{name:"sigv4",signingName:"sts",signingRegion:"{Region}"}]},headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{conditions:yl,rules:[{conditions:Ql,error:"Invalid Configuration: FIPS and custom endpoint are not supported",["type"]:"error"},{conditions:Xl,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",["type"]:"error"},{endpoint:{url:Yl,properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{conditions:[kl],rules:[{conditions:[Kl],rules:[{conditions:[Vl,Pl],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,Bl]},Ul],rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",["type"]:"error"}],["type"]:"tree"},{conditions:Ql,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[Bl,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[ql,"name"]},"aws-us-gov"]}],endpoint:{url:"https://sts.{Region}.amazonaws.com",properties:Y,headers:Y},["type"]:"endpoint"},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",["type"]:"error"}],["type"]:"tree"},{conditions:Xl,rules:[{conditions:[Ul],rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",["type"]:"error"}],["type"]:"tree"},Fl,{endpoint:{url:"https://sts.{Region}.{PartitionResult#dnsSuffix}",properties:Y,headers:Y},["type"]:"endpoint"}],["type"]:"tree"}],["type"]:"tree"},{error:"Invalid Configuration: Missing Region",["type"]:"error"}]},vl=Fw;var Bw=new Ml({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS","UseGlobalEndpoint"]}),Tl=(h,w={})=>{return Bw.get(h,()=>Nl(vl,{endpointParams:h,logger:w.logger}))};zl.aws=Wl;var bl=(h)=>{return{apiVersion:"2011-06-15",base64Decoder:h?.base64Decoder??jl,base64Encoder:h?.base64Encoder??al,disableHostPrefix:h?.disableHostPrefix??!1,endpointProvider:h?.endpointProvider??Tl,extensions:h?.extensions??[],httpAuthSchemeProvider:h?.httpAuthSchemeProvider??Hl,httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(w)=>w.getIdentityProvider("aws.auth#sigv4"),signer:new sl.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(w)=>w.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new rl.NoAuthSigner}],logger:h?.logger??new Rl,serviceId:h?.serviceId??"STS",urlParser:h?.urlParser??_l.parseUrl,utf8Decoder:h?.utf8Decoder??Al,utf8Encoder:h?.utf8Encoder??Ll}};var G0=(h)=>{gl(process.version);let w=l0(h),l=()=>w().then(Ol),G=bl(h);return dh.emitWarningIfUnsupportedVersion(process.version),{...G,...h,runtime:"node",defaultsMode:w,bodyLengthChecker:h?.bodyLengthChecker??h0,credentialDefaultProvider:h?.credentialDefaultProvider??Zh,defaultUserAgentProvider:h?.defaultUserAgentProvider??ul({serviceId:G.serviceId,clientVersion:Dl.version}),httpAuthSchemes:h?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(I)=>I.getIdentityProvider("aws.auth#sigv4")||(async(S)=>await Zh(S?.__config||{})()),signer:new dh.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(I)=>I.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new w0.NoAuthSigner}],maxAttempts:h?.maxAttempts??f(nl),region:h?.region??f(cl,el),requestHandler:fl.create(h?.requestHandler??l),retryMode:h?.retryMode??f({...ol,default:async()=>(await l()).retryMode||pl}),sha256:h?.sha256??tl.bind(null,"sha256"),streamCollector:h?.streamCollector??Cl,useDualstackEndpoint:h?.useDualstackEndpoint??f(xl),useFipsEndpoint:h?.useFipsEndpoint??f(il)}};var Hh=v(S0(),1);var I0=(h)=>{let{httpAuthSchemes:w,httpAuthSchemeProvider:l,credentials:G}=h;return{setHttpAuthScheme(I){let S=w.findIndex((d)=>d.schemeId===I.schemeId);if(S===-1)w.push(I);else w.splice(S,1,I)},httpAuthSchemes(){return w},setHttpAuthSchemeProvider(I){l=I},httpAuthSchemeProvider(){return l},setCredentials(I){G=I},credentials(){return G}}},d0=(h)=>{return{httpAuthSchemes:h.httpAuthSchemes(),httpAuthSchemeProvider:h.httpAuthSchemeProvider(),credentials:h.credentials()}};var Sh=(h)=>h,E0=(h,w)=>{let l={...Sh(J0(h)),...Sh(H0(h)),...Sh(Hh.getHttpHandlerExtensionConfiguration(h)),...Sh(I0(h))};return w.forEach((G)=>G.configure(l)),{...h,...D0(l),...m0(l),...Hh.resolveHttpHandlerRuntimeConfig(l),...d0(l)}};class L extends U0{constructor(...[h]){let w=G0(h||{}),l=Jl(w),G=y0(l),I=$0(G),S=X0(I),d=k0(S),X=Z0(d),z=ml(X),q=E0(z,h?.extensions||[]);super(q);this.config=q,this.middlewareStack.use(Q0(this.config)),this.middlewareStack.use(V0(this.config)),this.middlewareStack.use(Y0(this.config)),this.middlewareStack.use(K0(this.config)),this.middlewareStack.use(F0(this.config)),this.middlewareStack.use(B0(this.config)),this.middlewareStack.use(C.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:Sl,identityProviderConfigProvider:async(n)=>new C.DefaultIdentityProviderConfig({"aws.auth#sigv4":n.credentials})})),this.middlewareStack.use(C.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class Q extends P0{constructor(h){super(h);Object.setPrototypeOf(this,Q.prototype)}}class Jh extends Q{constructor(h){super({name:"ExpiredTokenException",$fault:"client",...h});this.name="ExpiredTokenException",this.$fault="client",Object.setPrototypeOf(this,Jh.prototype)}}class Dh extends Q{constructor(h){super({name:"MalformedPolicyDocumentException",$fault:"client",...h});this.name="MalformedPolicyDocumentException",this.$fault="client",Object.setPrototypeOf(this,Dh.prototype)}}class Eh extends Q{constructor(h){super({name:"PackedPolicyTooLargeException",$fault:"client",...h});this.name="PackedPolicyTooLargeException",this.$fault="client",Object.setPrototypeOf(this,Eh.prototype)}}class kh extends Q{constructor(h){super({name:"RegionDisabledException",$fault:"client",...h});this.name="RegionDisabledException",this.$fault="client",Object.setPrototypeOf(this,kh.prototype)}}class Kh extends Q{constructor(h){super({name:"IDPRejectedClaimException",$fault:"client",...h});this.name="IDPRejectedClaimException",this.$fault="client",Object.setPrototypeOf(this,Kh.prototype)}}class Fh extends Q{constructor(h){super({name:"InvalidIdentityTokenException",$fault:"client",...h});this.name="InvalidIdentityTokenException",this.$fault="client",Object.setPrototypeOf(this,Fh.prototype)}}class Bh extends Q{constructor(h){super({name:"IDPCommunicationErrorException",$fault:"client",...h});this.name="IDPCommunicationErrorException",this.$fault="client",Object.setPrototypeOf(this,Bh.prototype)}}class Uh extends Q{constructor(h){super({name:"InvalidAuthorizationMessageException",$fault:"client",...h});this.name="InvalidAuthorizationMessageException",this.$fault="client",Object.setPrototypeOf(this,Uh.prototype)}}var o=(h)=>({...h,...h.SecretAccessKey&&{SecretAccessKey:mh}}),q0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),v0=(h)=>({...h,...h.SAMLAssertion&&{SAMLAssertion:mh}}),M0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),z0=(h)=>({...h,...h.WebIdentityToken&&{WebIdentityToken:mh}}),N0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),W0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}}),T0=(h)=>({...h,...h.Credentials&&{Credentials:o(h.Credentials)}});var M=v(Gh(),1),j0=v(S0(),1);var a0=async(h,w)=>{let l=a,G;return G=b({...qw(h,w),[r]:wG,[_]:s}),j(w,l,"/",void 0,G)},s0=async(h,w)=>{let l=a,G;return G=b({...vw(h,w),[r]:GG,[_]:s}),j(w,l,"/",void 0,G)},r0=async(h,w)=>{let l=a,G;return G=b({...Mw(h,w),[r]:IG,[_]:s}),j(w,l,"/",void 0,G)},_0=async(h,w)=>{let l=a,G;return G=b({...zw(h,w),[r]:dG,[_]:s}),j(w,l,"/",void 0,G)},b0=async(h,w)=>{let l=a,G;return G=b({...Nw(h,w),[r]:SG,[_]:s}),j(w,l,"/",void 0,G)},f0=async(h,w)=>{let l=a,G;return G=b({...Ww(h,w),[r]:HG,[_]:s}),j(w,l,"/",void 0,G)},C0=async(h,w)=>{let l=a,G;return G=b({...Tw(h,w),[r]:mG,[_]:s}),j(w,l,"/",void 0,G)},O0=async(h,w)=>{let l=a,G;return G=b({...Aw(h,w),[r]:JG,[_]:s}),j(w,l,"/",void 0,G)},g0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);let l=await M.parseXmlBody(h.body,w),G={};return G=rw(l.AssumeRoleResult,w),{$metadata:k(h),...G}},x0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);let l=await M.parseXmlBody(h.body,w),G={};return G=_w(l.AssumeRoleWithSAMLResult,w),{$metadata:k(h),...G}},i0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);let l=await M.parseXmlBody(h.body,w),G={};return G=bw(l.AssumeRoleWithWebIdentityResult,w),{$metadata:k(h),...G}},c0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);let l=await M.parseXmlBody(h.body,w),G={};return G=fw(l.DecodeAuthorizationMessageResult,w),{$metadata:k(h),...G}},e0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);let l=await M.parseXmlBody(h.body,w),G={};return G=gw(l.GetAccessKeyInfoResult,w),{$metadata:k(h),...G}},p0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);let l=await M.parseXmlBody(h.body,w),G={};return G=xw(l.GetCallerIdentityResult,w),{$metadata:k(h),...G}},n0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);let l=await M.parseXmlBody(h.body,w),G={};return G=iw(l.GetFederationTokenResult,w),{$metadata:k(h),...G}},o0=async(h,w)=>{if(h.statusCode>=300)return R(h,w);let l=await M.parseXmlBody(h.body,w),G={};return G=cw(l.GetSessionTokenResult,w),{$metadata:k(h),...G}},R=async(h,w)=>{let l={...h,body:await M.parseXmlErrorBody(h.body,w)},G=DG(h,l.body);switch(G){case"ExpiredTokenException":case"com.amazonaws.sts#ExpiredTokenException":throw await yw(l,w);case"MalformedPolicyDocument":case"com.amazonaws.sts#MalformedPolicyDocumentException":throw await $w(l,w);case"PackedPolicyTooLarge":case"com.amazonaws.sts#PackedPolicyTooLargeException":throw await Vw(l,w);case"RegionDisabledException":case"com.amazonaws.sts#RegionDisabledException":throw await Pw(l,w);case"IDPRejectedClaim":case"com.amazonaws.sts#IDPRejectedClaimException":throw await Xw(l,w);case"InvalidIdentityToken":case"com.amazonaws.sts#InvalidIdentityTokenException":throw await Zw(l,w);case"IDPCommunicationError":case"com.amazonaws.sts#IDPCommunicationErrorException":throw await Qw(l,w);case"InvalidAuthorizationMessageException":case"com.amazonaws.sts#InvalidAuthorizationMessageException":throw await Yw(l,w);default:let I=l.body;return lG({output:h,parsedBody:I.Error,errorCode:G})}},yw=async(h,w)=>{let l=h.body,G=Cw(l.Error,w),I=new Jh({$metadata:k(h),...G});return A(I,l)},Qw=async(h,w)=>{let l=h.body,G=ew(l.Error,w),I=new Bh({$metadata:k(h),...G});return A(I,l)},Xw=async(h,w)=>{let l=h.body,G=pw(l.Error,w),I=new Kh({$metadata:k(h),...G});return A(I,l)},Yw=async(h,w)=>{let l=h.body,G=nw(l.Error,w),I=new Uh({$metadata:k(h),...G});return A(I,l)},Zw=async(h,w)=>{let l=h.body,G=ow(l.Error,w),I=new Fh({$metadata:k(h),...G});return A(I,l)},$w=async(h,w)=>{let l=h.body,G=uw(l.Error,w),I=new Dh({$metadata:k(h),...G});return A(I,l)},Vw=async(h,w)=>{let l=h.body,G=tw(l.Error,w),I=new Eh({$metadata:k(h),...G});return A(I,l)},Pw=async(h,w)=>{let l=h.body,G=hG(l.Error,w),I=new kh({$metadata:k(h),...G});return A(I,l)},qw=(h,w)=>{let l={};if(h[T]!=null)l[T]=h[T];if(h[i]!=null)l[i]=h[i];if(h[$]!=null){let G=yh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([I,S])=>{let d=`PolicyArns.${I}`;l[d]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];if(h[e]!=null){let G=u0(h[e],w);if(h[e]?.length===0)l.Tags=[];Object.entries(G).forEach(([I,S])=>{let d=`Tags.${I}`;l[d]=S})}if(h[xh]!=null){let G=sw(h[xh],w);if(h[xh]?.length===0)l.TransitiveTagKeys=[];Object.entries(G).forEach(([I,S])=>{let d=`TransitiveTagKeys.${I}`;l[d]=S})}if(h[vh]!=null)l[vh]=h[vh];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];if(h[P]!=null)l[P]=h[P];if(h[ah]!=null){let G=jw(h[ah],w);if(h[ah]?.length===0)l.ProvidedContexts=[];Object.entries(G).forEach(([I,S])=>{let d=`ProvidedContexts.${I}`;l[d]=S})}return l},vw=(h,w)=>{let l={};if(h[T]!=null)l[T]=h[T];if(h[Rh]!=null)l[Rh]=h[Rh];if(h[fh]!=null)l[fh]=h[fh];if(h[$]!=null){let G=yh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([I,S])=>{let d=`PolicyArns.${I}`;l[d]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},Mw=(h,w)=>{let l={};if(h[T]!=null)l[T]=h[T];if(h[i]!=null)l[i]=h[i];if(h[eh]!=null)l[eh]=h[eh];if(h[sh]!=null)l[sh]=h[sh];if(h[$]!=null){let G=yh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([I,S])=>{let d=`PolicyArns.${I}`;l[d]=S})}if(h[Z]!=null)l[Z]=h[Z];if(h[y]!=null)l[y]=h[y];return l},zw=(h,w)=>{let l={};if(h[Mh]!=null)l[Mh]=h[Mh];return l},Nw=(h,w)=>{let l={};if(h[O]!=null)l[O]=h[O];return l},Ww=(h,w)=>{return{}},Tw=(h,w)=>{let l={};if(h[Ah]!=null)l[Ah]=h[Ah];if(h[Z]!=null)l[Z]=h[Z];if(h[$]!=null){let G=yh(h[$],w);if(h[$]?.length===0)l.PolicyArns=[];Object.entries(G).forEach(([I,S])=>{let d=`PolicyArns.${I}`;l[d]=S})}if(h[y]!=null)l[y]=h[y];if(h[e]!=null){let G=u0(h[e],w);if(h[e]?.length===0)l.Tags=[];Object.entries(G).forEach(([I,S])=>{let d=`Tags.${I}`;l[d]=S})}return l},Aw=(h,w)=>{let l={};if(h[y]!=null)l[y]=h[y];if(h[c]!=null)l[c]=h[c];if(h[p]!=null)l[p]=h[p];return l},yh=(h,w)=>{let l={},G=1;for(let I of h){if(I===null)continue;let S=Lw(I,w);Object.entries(S).forEach(([d,X])=>{l[`member.${G}.${d}`]=X}),G++}return l},Lw=(h,w)=>{let l={};if(h[ph]!=null)l[ph]=h[ph];return l},Rw=(h,w)=>{let l={};if(h[jh]!=null)l[jh]=h[jh];if(h[Vh]!=null)l[Vh]=h[Vh];return l},jw=(h,w)=>{let l={},G=1;for(let I of h){if(I===null)continue;let S=Rw(I,w);Object.entries(S).forEach(([d,X])=>{l[`member.${G}.${d}`]=X}),G++}return l},aw=(h,w)=>{let l={};if(h[Th]!=null)l[Th]=h[Th];if(h[ch]!=null)l[ch]=h[ch];return l},sw=(h,w)=>{let l={},G=1;for(let I of h){if(I===null)continue;l[`member.${G}`]=I,G++}return l},u0=(h,w)=>{let l={},G=1;for(let I of h){if(I===null)continue;let S=aw(I,w);Object.entries(S).forEach(([d,X])=>{l[`member.${G}.${d}`]=X}),G++}return l},oh=(h,w)=>{let l={};if(h[$h]!=null)l[$h]=H(h[$h]);if(h[W]!=null)l[W]=H(h[W]);return l},rw=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[N]!=null)l[N]=oh(h[N],w);if(h[V]!=null)l[V]=u(h[V]);if(h[P]!=null)l[P]=H(h[P]);return l},_w=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[N]!=null)l[N]=oh(h[N],w);if(h[V]!=null)l[V]=u(h[V]);if(h[_h]!=null)l[_h]=H(h[_h]);if(h[Oh]!=null)l[Oh]=H(h[Oh]);if(h[Wh]!=null)l[Wh]=H(h[Wh]);if(h[x]!=null)l[x]=H(h[x]);if(h[Lh]!=null)l[Lh]=H(h[Lh]);if(h[P]!=null)l[P]=H(h[P]);return l},bw=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[Ch]!=null)l[Ch]=H(h[Ch]);if(h[N]!=null)l[N]=oh(h[N],w);if(h[V]!=null)l[V]=u(h[V]);if(h[rh]!=null)l[rh]=H(h[rh]);if(h[x]!=null)l[x]=H(h[x]);if(h[P]!=null)l[P]=H(h[P]);return l},t=(h,w)=>{let l={};if(h[O]!=null)l[O]=H(h[O]);if(h[bh]!=null)l[bh]=H(h[bh]);if(h[gh]!=null)l[gh]=H(h[gh]);if(h[qh]!=null)l[qh]=A0(L0(h[qh]));return l},fw=(h,w)=>{let l={};if(h[Ph]!=null)l[Ph]=H(h[Ph]);return l},Cw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},Ow=(h,w)=>{let l={};if(h[Nh]!=null)l[Nh]=H(h[Nh]);if(h[W]!=null)l[W]=H(h[W]);return l},gw=(h,w)=>{let l={};if(h[g]!=null)l[g]=H(h[g]);return l},xw=(h,w)=>{let l={};if(h[ih]!=null)l[ih]=H(h[ih]);if(h[g]!=null)l[g]=H(h[g]);if(h[W]!=null)l[W]=H(h[W]);return l},iw=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);if(h[zh]!=null)l[zh]=Ow(h[zh],w);if(h[V]!=null)l[V]=u(h[V]);return l},cw=(h,w)=>{let l={};if(h[U]!=null)l[U]=t(h[U],w);return l},ew=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},pw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},nw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},ow=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},uw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},tw=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},hG=(h,w)=>{let l={};if(h[m]!=null)l[m]=H(h[m]);return l},k=(h)=>({httpStatusCode:h.statusCode,requestId:h.headers["x-amzn-requestid"]??h.headers["x-amzn-request-id"]??h.headers["x-amz-request-id"],extendedRequestId:h.headers["x-amz-id-2"],cfId:h.headers["x-amz-cf-id"]});var lG=R0(Q),j=async(h,w,l,G,I)=>{let{hostname:S,protocol:d="https",port:X,path:z}=await h.endpoint(),q={protocol:d,hostname:S,port:X,method:"POST",path:z.endsWith("/")?z.slice(0,-1)+l:z+l,headers:w};if(G!==void 0)q.hostname=G;if(I!==void 0)q.body=I;return new j0.HttpRequest(q)},a={"content-type":"application/x-www-form-urlencoded"},s="2011-06-15",r="Action",O="AccessKeyId",wG="AssumeRole",$h="AssumedRoleId",N="AssumedRoleUser",GG="AssumeRoleWithSAML",IG="AssumeRoleWithWebIdentity",g="Account",W="Arn",x="Audience",U="Credentials",Vh="ContextAssertion",dG="DecodeAuthorizationMessage",Ph="DecodedMessage",y="DurationSeconds",qh="Expiration",vh="ExternalId",Mh="EncodedMessage",zh="FederatedUser",Nh="FederatedUserId",SG="GetAccessKeyInfo",HG="GetCallerIdentity",mG="GetFederationToken",JG="GetSessionToken",Wh="Issuer",Th="Key",Ah="Name",Lh="NameQualifier",Z="Policy",$="PolicyArns",Rh="PrincipalArn",jh="ProviderArn",ah="ProvidedContexts",sh="ProviderId",V="PackedPolicySize",rh="Provider",T="RoleArn",i="RoleSessionName",_h="Subject",bh="SecretAccessKey",fh="SAMLAssertion",Ch="SubjectFromWebIdentityToken",P="SourceIdentity",c="SerialNumber",Oh="SubjectType",gh="SessionToken",e="Tags",p="TokenCode",xh="TransitiveTagKeys",ih="UserId",_="Version",ch="Value",eh="WebIdentityToken",ph="arn",m="message",b=(h)=>Object.entries(h).map(([w,l])=>nh(w)+"="+nh(l)).join("&"),DG=(h,w)=>{if(w.Error?.Code!==void 0)return w.Error.Code;if(h.statusCode==404)return"NotFound"};class hh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRole",{}).n("STSClient","AssumeRoleCommand").f(void 0,q0).ser(a0).de(g0).build(){}class uh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithSAML",{}).n("STSClient","AssumeRoleWithSAMLCommand").f(v0,M0).ser(s0).de(x0).build(){}class lh extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","AssumeRoleWithWebIdentity",{}).n("STSClient","AssumeRoleWithWebIdentityCommand").f(z0,N0).ser(r0).de(i0).build(){}class th extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","DecodeAuthorizationMessage",{}).n("STSClient","DecodeAuthorizationMessageCommand").f(void 0,void 0).ser(_0).de(c0).build(){}class hl extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetAccessKeyInfo",{}).n("STSClient","GetAccessKeyInfoCommand").f(void 0,void 0).ser(b0).de(e0).build(){}class ll extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetCallerIdentity",{}).n("STSClient","GetCallerIdentityCommand").f(void 0,void 0).ser(f0).de(p0).build(){}class wl extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetFederationToken",{}).n("STSClient","GetFederationTokenCommand").f(void 0,W0).ser(C0).de(n0).build(){}class Gl extends K.classBuilder().ep(D).m(function(h,w,l,G){return[F(l,this.serialize,this.deserialize),B(l,h.getEndpointParameterInstructions())]}).s("AWSSecurityTokenServiceV20110615","GetSessionToken",{}).n("STSClient","GetSessionTokenCommand").f(void 0,T0).ser(O0).de(o0).build(){}var EG={AssumeRoleCommand:hh,AssumeRoleWithSAMLCommand:uh,AssumeRoleWithWebIdentityCommand:lh,DecodeAuthorizationMessageCommand:th,GetAccessKeyInfoCommand:hl,GetCallerIdentityCommand:ll,GetFederationTokenCommand:wl,GetSessionTokenCommand:Gl};class hw extends L{}t0(EG,hw);var lw="us-east-1",ww=(h)=>{if(typeof h?.Arn==="string"){let w=h.Arn.split(":");if(w.length>4&&w[4]!=="")return w[4]}return},Gw=async(h,w,l)=>{let G=typeof h==="function"?await h():h,I=typeof w==="function"?await w():w;return l?.debug?.("@aws-sdk/client-sts::resolveRegion","accepting first of:",`${G} (provider)`,`${I} (parent client)`,`${lw} (STS default)`),G??I??lw},Iw=(h,w)=>{let l,G;return async(I,S)=>{if(G=I,!l){let{logger:q=h?.parentClientConfig?.logger,region:n,requestHandler:wh=h?.parentClientConfig?.requestHandler,credentialProviderLogger:Qh}=h,mw=await Gw(n,h?.parentClientConfig?.region,Qh),Jw=!Sw(wh);l=new w({credentialDefaultProvider:()=>async()=>G,region:mw,requestHandler:Jw?wh:void 0,logger:q})}let{Credentials:d,AssumedRoleUser:X}=await l.send(new hh(S));if(!d||!d.AccessKeyId||!d.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRole call with role ${S.RoleArn}`);let z=ww(X);return{accessKeyId:d.AccessKeyId,secretAccessKey:d.SecretAccessKey,sessionToken:d.SessionToken,expiration:d.Expiration,...d.CredentialScope&&{credentialScope:d.CredentialScope},...z&&{accountId:z}}}},dw=(h,w)=>{let l;return async(G)=>{if(!l){let{logger:X=h?.parentClientConfig?.logger,region:z,requestHandler:q=h?.parentClientConfig?.requestHandler,credentialProviderLogger:n}=h,wh=await Gw(z,h?.parentClientConfig?.region,n),Qh=!Sw(q);l=new w({region:wh,requestHandler:Qh?q:void 0,logger:X})}let{Credentials:I,AssumedRoleUser:S}=await l.send(new lh(G));if(!I||!I.AccessKeyId||!I.SecretAccessKey)throw new Error(`Invalid response from STS.assumeRoleWithWebIdentity call with role ${G.RoleArn}`);let d=ww(S);return{accessKeyId:I.AccessKeyId,secretAccessKey:I.SecretAccessKey,sessionToken:I.SessionToken,expiration:I.Expiration,...I.CredentialScope&&{credentialScope:I.CredentialScope},...d&&{accountId:d}}}};var Sw=(h)=>{return h?.metadata?.handlerProtocol==="h2"};var Hw=(h,w)=>{if(!w)return h;else return class l extends h{constructor(G){super(G);for(let I of w)this.middlewareStack.use(I)}}},kG=(h={},w)=>Iw(h,Hw(L,w)),KG=(h={},w)=>dw(h,Hw(L,w)),Rd=(h)=>(w)=>h({roleAssumer:kG(w),roleAssumerWithWebIdentity:KG(w),...w});export{KG as getDefaultRoleAssumerWithWebIdentity,kG as getDefaultRoleAssumer,Rd as decorateDefaultCredentialProvider,U0 as __Client,Q as STSServiceException,L as STSClient,hw as STS,kh as RegionDisabledException,Eh as PackedPolicyTooLargeException,Dh as MalformedPolicyDocumentException,Fh as InvalidIdentityTokenException,Uh as InvalidAuthorizationMessageException,Kh as IDPRejectedClaimException,Bh as IDPCommunicationErrorException,T0 as GetSessionTokenResponseFilterSensitiveLog,Gl as GetSessionTokenCommand,W0 as GetFederationTokenResponseFilterSensitiveLog,wl as GetFederationTokenCommand,ll as GetCallerIdentityCommand,hl as GetAccessKeyInfoCommand,Jh as ExpiredTokenException,th as DecodeAuthorizationMessageCommand,o as CredentialsFilterSensitiveLog,N0 as AssumeRoleWithWebIdentityResponseFilterSensitiveLog,z0 as AssumeRoleWithWebIdentityRequestFilterSensitiveLog,lh as AssumeRoleWithWebIdentityCommand,M0 as AssumeRoleWithSAMLResponseFilterSensitiveLog,v0 as AssumeRoleWithSAMLRequestFilterSensitiveLog,uh as AssumeRoleWithSAMLCommand,q0 as AssumeRoleResponseFilterSensitiveLog,hh as AssumeRoleCommand,K as $Command};
3
-
4
- //# debugId=358ED62999836ED964756E2164756E21
@@ -1,4 +0,0 @@
1
- import{g as K,j as P,m as Q}from"./facades/index.js";import{s as G,v as W,w as X}from"./http/index.js";import{E as T}from"./chunk-x1ry5x7k.js";import{Nb as A}from"./chunk-79cfd363.js";import{Rb as H}from"./chunk-g3838fme.js";function h(f){let n={};for(let[o,i]of Object.entries(f))if("run"in i){let t=i;if("children"in t){let p=new t.children,c=h(p.routes);for(let[V,{exec:s,middleware:y}]of Object.entries(c)){let u=o==="/"?V:`${o}${V}`,j=V==="/"&&o!=="/"?o:u;n[j]={exec:[t.run.bind(t),...s],middleware:[...t.middlewares,...y]}}}else n[o]={exec:[t.run.bind(t)],middleware:t.middlewares}}else{let t=new i,p=h(t.routes);for(let[c,{exec:V,middleware:s}]of Object.entries(p)){let y=o==="/"?c:`${o}${c}`,u=c==="/"&&o!=="/"?o:y;n[u]={exec:V,middleware:[...t.middlewares,...s]}}}return Object.fromEntries(Object.entries(n).sort(([o],[i])=>{let t=o.split("/").length+o.split(":").length,p=i.split("/").length+i.split(":").length;return t-p}))}import{renderToReadableStream as N}from"react-dom/server.browser";import{createElement as Z,Fragment as v}from"react";function e(f){let n={};for(let[o,i]of Object.entries(f))if("run"in i){let t=i.viewPath;if("children"in i)n[o]=[t];if("children"in i){let p=new i.children,c=e(p.routes);for(let[V,s]of Object.entries(c)){let y=o==="/"?V:`${o}${V}`,u=V==="/"&&o!=="/"?o:y;n[u]=[t,...s]}}else n[o]=[t]}else{let t=new i,p=e(t.routes);for(let[c,V]of Object.entries(p)){let s=o==="/"?c:`${o}${c}`,y=c==="/"&&o!=="/"?o:s;n[y]=V}}return n}function m(f){let n=[];for(let[o,i]of Object.entries(f))if("run"in i){let t=i.viewPath;if("children"in i){let p=new i.children,c=m(p.routes);n.push([t,c])}else n.push([t,[]])}else{let t=new i,p=m(t.routes);n.push(...p)}return n}function J(f){let n=[];for(let[o,i]of f)n.push(o,...J(i).flat());return Array.from(new Set(n))}import{randomBytes as S,createHmac as r}from"crypto";class q extends H{f;static _name="ViewRouterServiceContainer";flatViewRoutes={};routeManifest={};componentTree=[];flatComponentTree=[];root=null;constructor(f){super();this.service=f;let n={"/":f.rootRouter};this.flatViewRoutes=h(n),this.routeManifest=e(n),this.componentTree=m(n),this.flatComponentTree=J(this.componentTree),this.root=f.root}boot(){}generateCSRFTokenWithHmac(){let f=Buffer.from(process.env.SECRET,"utf8"),o=S(21).toString("base64"),i=r("sha256",f);i.update(o);let t=i.digest();return{csrfToken:o,csrfTokenHMAC:t}}async onRequestEnd(f){if(!f.cookies.has("session_id"))f.ctx().setCookie("session_id",A(),{httpOnly:!0,secure:!0,sameSite:"Strict",expires:new Date(Date.now()+31536000000)});return await this.service.onRequestEnd(f)}async handleViewRequest(f){let n=new URL(f.url),o=n.searchParams.get("json"),i=[],t=[],p=null,c={};try{for(let[s,y]of Object.entries(this.flatViewRoutes)){let u=new T({pathname:s});if(u.test({pathname:n.pathname})){p=s,c=u.exec({pathname:n.pathname})?.pathname.groups,i=y.exec,t=y.middleware;break}}}catch(s){throw s}let V=new X(f,c,"view",p);return await W.run(V,async()=>{let s=null,y=W.getStore(),u=y.req;try{await Q.use().runMiddleware(t);let j=await Promise.all([...i.map((w)=>w(u)),...Array.from(y.prefetchPromiseQueue).map((w)=>w())]),l=y.cookies,b=y.headers,_=y.prefetchedResources;s={data:j,cookies:l,headers:b,user:y.user,prefetchedData:Object.fromEntries(_.entries()),currentPathName:u.routePath,params:u.params};let{params:x,currentPathName:O,user:B}=s,Y=j.reduce((w,$)=>{return{...w,...$}},{}),g=K.use(),L=g.isEnabled,F={};if(L){let w=g.detectLocale(new X(f,x)),$=g.getPageTranslations(w,O);F={supportedLocales:g.supportedLocales,currentLocale:w,dictionary:{[w]:$}}}if(o)return b.set("Content-Type","application/json"),l.forEach((w)=>b.append("Set-Cookie",w.toString())),await this.service.onRequestEnd(u),new Response(JSON.stringify({data:{[n.pathname]:Y},prefetchedData:s.prefetchedData,i18n:F,is404:!O}),{headers:b});b.set("Content-Type","text/html"),l.forEach((w)=>b.append("Set-Cookie",w.toString()));let{csrfToken:U,csrfTokenHMAC:k}=this.generateCSRFTokenWithHmac();b.append("Set-Cookie",`csrf_token=${U}; HttpOnly; Secure; SameSite=Strict; Expires=${new Date(Date.now()+86400000).toUTCString()}`);let z={kind:"view",data:{pageData:{[n.pathname]:Y},__csrf:k.toString("base64"),prefetchedData:s.prefetchedData,i18n:F,auth:{user:B},routeManifest:this.routeManifest,router:{pathname:O,params:x,currentPath:n.pathname,searchParams:n.search,is404:!O?!0:!1},componentTree:[["404",[]],...this.componentTree]},head:{}};try{await this.onRequestEnd(u)}catch(w){P.error(w?.message??'Error in "onRequestEnd" event handler',{err:JSON.stringify(w)})}let I=this.root,R=this.routeManifest[O];return async(w)=>{let{bootstrapModules:$,loaders:d,getStyles:C,viewImportMap:E,cssManifest:M}=w;z.data.cssManifest=M;let D=await N(Z(v,{children:[await C(R),Z(I,{data:z.data,viewImportMap:E})]}),{bootstrapScriptContent:`window.__GEMI_DATA__ = ${JSON.stringify(z.data)}; window.loaders=${d}`,bootstrapModules:$});return new Response(D,{status:!O?404:200,headers:b})}}catch(j){if(j.kind===G)if(o){let{status:l=400,data:b,directive:_,headers:x}=j.payload.api;return new Response(JSON.stringify({data:b,directive:_}),{headers:x,status:l})}else{let{status:l=400,error:b}=j.payload.view;return new Response(b?.message,{...j.payload.view,status:l})}else throw this.service.onRequestFail(u,j),j}})}}
2
- export{q as e};
3
-
4
- //# debugId=BBAFFE5383E488B464756E2164756E21
@@ -1,14 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../services/router/createFlatViewRoutes.ts", "../services/router/ViewRouterServiceContainer.ts", "../services/router/createRouteManifest.ts", "../services/router/createComponentTree.ts", "../client/helpers/flattenComponentTree.ts"],
4
- "sourcesContent": [
5
- "import { HttpRequest } from \"../../http\";\nimport type { ViewRoutes } from \"../../http/ViewRouter\";\n\nexport type ViewRouteExec = (req: HttpRequest<any, any>) => any; // TODO: fix type\n\nexport type FlatViewRoutes = Record<\n string,\n { exec: ViewRouteExec[]; middleware: (string | any)[] }\n>;\n\nexport function createFlatViewRoutes(routes: ViewRoutes) {\n const flatRoutes: FlatViewRoutes = {};\n\n for (const [routePath, viewConfigOrViewRouter] of Object.entries(routes)) {\n if (\"run\" in viewConfigOrViewRouter) {\n const route = viewConfigOrViewRouter;\n\n if (\"children\" in route) {\n const children = new route.children();\n const result = createFlatViewRoutes(children.routes);\n\n for (const [path, { exec, middleware }] of Object.entries(result)) {\n const key = routePath === \"/\" ? path : `${routePath}${path}`;\n const _key = path === \"/\" && routePath !== \"/\" ? routePath : key;\n\n flatRoutes[_key] = {\n exec: [route.run.bind(route), ...exec],\n middleware: [...route.middlewares, ...middleware],\n };\n }\n } else {\n flatRoutes[routePath] = {\n exec: [route.run.bind(route)],\n middleware: route.middlewares,\n };\n }\n } else {\n const router = new viewConfigOrViewRouter();\n const result = createFlatViewRoutes(router.routes);\n for (const [path, { exec, middleware }] of Object.entries(result)) {\n const key = routePath === \"/\" ? path : `${routePath}${path}`;\n const _key = path === \"/\" && routePath !== \"/\" ? routePath : key;\n flatRoutes[_key] = {\n exec,\n middleware: [...router.middlewares, ...middleware],\n };\n }\n }\n }\n\n return Object.fromEntries(\n Object.entries(flatRoutes).sort(([a], [b]) => {\n const x = a.split(\"/\").length + a.split(\":\").length;\n const y = b.split(\"/\").length + b.split(\":\").length;\n return x - y;\n }),\n );\n}\n",
6
- "import { HttpRequest } from \"../../http\";\nimport { Cookie } from \"../../http/Cookie\";\nimport { GEMI_REQUEST_BREAKER_ERROR } from \"../../http/Error\";\nimport { RequestContext } from \"../../http/requestContext\";\nimport type { RouterMiddleware } from \"../../http/Router\";\nimport {\n createFlatViewRoutes,\n FlatViewRoutes,\n type ViewRouteExec,\n} from \"./createFlatViewRoutes\";\nimport { ViewRouterServiceProvider } from \"./ViewRouterServiceProvider\";\n// @ts-ignore\nimport { renderToReadableStream } from \"react-dom/server.browser\";\nimport { createElement, Fragment } from \"react\";\n\n// @ts-ignore\nimport { URLPattern } from \"urlpattern-polyfill/urlpattern\";\nimport { ServiceContainer } from \"../ServiceContainer\";\nimport type { ViewRoutes } from \"../../http/ViewRouter\";\nimport { createRouteManifest } from \"./createRouteManifest\";\nimport { createComponentTree } from \"./createComponentTree\";\nimport { flattenComponentTree } from \"../../client/helpers/flattenComponentTree\";\nimport type { ComponentTree } from \"../../client/types\";\nimport { I18nServiceContainer } from \"../../http/I18nServiceContainer\";\nimport { MiddlewareServiceContainer } from \"../middleware/MiddlewareServiceContainer\";\nimport { Log } from \"../../facades\";\nimport { v4 } from \"uuid\";\nimport { randomBytes, createHmac, timingSafeEqual } from \"crypto\";\n\nexport class ViewRouterServiceContainer extends ServiceContainer {\n static _name = \"ViewRouterServiceContainer\";\n\n flatViewRoutes: FlatViewRoutes = {};\n routeManifest: Record<string, string[]> = {};\n componentTree: ComponentTree = [];\n flatComponentTree: string[] = [];\n root: any = null;\n\n constructor(public service: ViewRouterServiceProvider) {\n super();\n const routes: ViewRoutes = {\n \"/\": service.rootRouter,\n };\n this.flatViewRoutes = createFlatViewRoutes(routes);\n this.routeManifest = createRouteManifest(routes);\n this.componentTree = createComponentTree(routes);\n this.flatComponentTree = flattenComponentTree(this.componentTree);\n this.root = service.root;\n }\n\n boot() {}\n\n private generateCSRFTokenWithHmac() {\n const secret = Buffer.from(process.env.SECRET, \"utf8\");\n const buffer = randomBytes(21);\n const csrfToken = buffer.toString(\"base64\");\n const mac = createHmac(\"sha256\", secret);\n mac.update(csrfToken);\n const csrfTokenHMAC = mac.digest();\n\n return { csrfToken, csrfTokenHMAC };\n }\n\n async onRequestEnd(req: HttpRequest) {\n if (!req.cookies.has(\"session_id\")) {\n req.ctx().setCookie(\"session_id\", v4(), {\n httpOnly: true,\n secure: process.env.NODE_ENV === \"production\",\n sameSite: \"Strict\",\n expires: new Date(Date.now() + 1000 * 60 * 60 * 24 * 365),\n });\n }\n\n return await this.service.onRequestEnd(req);\n }\n\n async handleViewRequest(req: Request) {\n const url = new URL(req.url);\n const isViewDataRequest = url.searchParams.get(\"json\");\n\n let handlers: ViewRouteExec[] = [];\n let middlewares: (RouterMiddleware | string)[] = [];\n let currentPathName: null | string = null;\n let params: Record<string, any> = {};\n\n try {\n for (const [pathname, handler] of Object.entries(this.flatViewRoutes)) {\n const pattern = new URLPattern({ pathname });\n if (pattern.test({ pathname: url.pathname })) {\n currentPathName = pathname;\n params = pattern.exec({ pathname: url.pathname })?.pathname.groups!;\n handlers = handler.exec;\n middlewares = handler.middleware;\n break;\n }\n }\n } catch (err) {\n // TODO: Handle this\n throw err;\n }\n\n const httpRequest = new HttpRequest(req, params, \"view\", currentPathName);\n return await RequestContext.run(httpRequest, async () => {\n let pageData: {\n cookies: Set<Cookie>;\n headers: Headers;\n currentPathName: string;\n data: Record<string, any>;\n prefetchedData: Record<string, any>;\n user: any; // TODO: fix type\n params: Record<string, any>;\n } | null = null;\n const ctx = RequestContext.getStore();\n\n const httpRequest = ctx.req;\n\n try {\n await MiddlewareServiceContainer.use().runMiddleware(middlewares);\n\n const data = await Promise.all([\n ...handlers.map((fn) => fn(httpRequest as any)),\n ...Array.from(ctx.prefetchPromiseQueue).map((fn) => fn()),\n ]);\n\n const cookies = ctx.cookies;\n const headers = ctx.headers;\n const prefetchedResources = ctx.prefetchedResources;\n\n pageData = {\n data,\n cookies,\n headers,\n user: ctx.user,\n prefetchedData: Object.fromEntries(prefetchedResources.entries()),\n currentPathName: httpRequest.routePath,\n params: httpRequest.params,\n };\n const { params, currentPathName, user } = pageData;\n\n const viewData = data.reduce((acc, data) => {\n return {\n ...acc,\n ...data,\n };\n }, {});\n\n const i18nServiceContainer = I18nServiceContainer.use();\n const isI18nEnabled = i18nServiceContainer.isEnabled;\n let i18n: Record<string, any> = {};\n if (isI18nEnabled) {\n const locale = i18nServiceContainer.detectLocale(\n new HttpRequest(req, params as any),\n );\n const translations = i18nServiceContainer.getPageTranslations(\n locale,\n currentPathName,\n );\n\n i18n = {\n supportedLocales: i18nServiceContainer.supportedLocales,\n currentLocale: locale,\n dictionary: {\n [locale]: translations,\n },\n };\n }\n\n if (isViewDataRequest) {\n headers.set(\"Content-Type\", \"application/json\");\n\n cookies.forEach((cookie) =>\n headers.append(\"Set-Cookie\", cookie.toString()),\n );\n\n await this.service.onRequestEnd(httpRequest);\n\n return new Response(\n JSON.stringify({\n data: {\n [url.pathname]: viewData,\n },\n prefetchedData: pageData.prefetchedData,\n i18n,\n is404: !currentPathName,\n }),\n {\n headers,\n },\n );\n }\n\n headers.set(\"Content-Type\", \"text/html\");\n\n cookies.forEach((cookie) =>\n headers.append(\"Set-Cookie\", cookie.toString()),\n );\n\n const { csrfToken, csrfTokenHMAC } = this.generateCSRFTokenWithHmac();\n headers.append(\n \"Set-Cookie\",\n `csrf_token=${csrfToken}; HttpOnly; Secure; SameSite=Strict; Expires=${new Date(Date.now() + 1000 * 60 * 60 * 24).toUTCString()}`,\n );\n\n const result = {\n kind: \"view\",\n data: {\n pageData: {\n [url.pathname]: viewData,\n },\n __csrf: csrfTokenHMAC.toString(\"base64\"),\n prefetchedData: pageData.prefetchedData,\n i18n,\n auth: { user },\n routeManifest: this.routeManifest,\n router: {\n pathname: currentPathName,\n params,\n currentPath: url.pathname,\n searchParams: url.search,\n is404: !currentPathName ? true : false,\n },\n componentTree: [[\"404\", []], ...this.componentTree],\n },\n head: {},\n };\n\n try {\n await this.onRequestEnd(httpRequest);\n } catch (err) {\n Log.error(err?.message ?? 'Error in \"onRequestEnd\" event handler', {\n err: JSON.stringify(err),\n });\n }\n\n const Root = this.root;\n const currentViews = this.routeManifest[currentPathName];\n return async (params: {\n getStyles: (p: string[]) => Promise<any[]>;\n viewImportMap: any;\n bootstrapModules: string[];\n loaders: string;\n cssManifest: Record<string, string[]>;\n }) => {\n const {\n bootstrapModules,\n loaders,\n getStyles,\n viewImportMap,\n cssManifest,\n } = params;\n\n result.data[\"cssManifest\"] = cssManifest;\n const stream = await renderToReadableStream(\n createElement(Fragment, {\n children: [\n await getStyles(currentViews),\n createElement(Root, {\n data: result.data,\n viewImportMap,\n }),\n ],\n }),\n {\n bootstrapScriptContent: `window.__GEMI_DATA__ = ${JSON.stringify(result.data)}; window.loaders=${loaders}`,\n bootstrapModules,\n },\n );\n\n return new Response(stream, {\n status: !currentPathName ? 404 : 200,\n headers,\n });\n };\n } catch (err) {\n if (err.kind === GEMI_REQUEST_BREAKER_ERROR) {\n if (isViewDataRequest) {\n const { status = 400, data, directive, headers } = err.payload.api;\n return new Response(JSON.stringify({ data, directive }), {\n headers,\n status,\n });\n } else {\n const { status = 400, error } = err.payload.view;\n return new Response(error?.message, {\n ...err.payload.view,\n status,\n });\n }\n } else {\n this.service.onRequestFail(httpRequest, err);\n throw err;\n }\n }\n });\n }\n}\n",
7
- "import type { ViewRoutes } from \"../../http/ViewRouter\";\n\nexport function createRouteManifest(routes: ViewRoutes) {\n const routeManifest: Record<string, string[]> = {};\n for (const [routePath, routeHandler] of Object.entries(routes)) {\n if (\"run\" in routeHandler) {\n const viewPath = routeHandler.viewPath;\n\n if (\"children\" in routeHandler) {\n routeManifest[routePath] = [viewPath];\n }\n\n if (\"children\" in routeHandler) {\n const children = new routeHandler.children();\n const manifest = createRouteManifest(children.routes);\n for (const [path, viewPaths] of Object.entries(manifest)) {\n const key = routePath === \"/\" ? path : `${routePath}${path}`;\n const _key = path === \"/\" && routePath !== \"/\" ? routePath : key;\n routeManifest[_key] = [viewPath, ...viewPaths];\n }\n } else {\n routeManifest[routePath] = [viewPath];\n }\n } else {\n const router = new routeHandler();\n\n const manifest = createRouteManifest(router.routes);\n for (const [path, viewPaths] of Object.entries(manifest)) {\n const key = routePath === \"/\" ? path : `${routePath}${path}`;\n const _key = path === \"/\" && routePath !== \"/\" ? routePath : key;\n routeManifest[_key] = viewPaths;\n }\n }\n }\n\n return routeManifest;\n}\n",
8
- "import type { ComponentTree } from \"../../client/types\";\nimport type { ViewRoutes } from \"../../http/ViewRouter\";\n\nexport function createComponentTree(routes: ViewRoutes): ComponentTree {\n const componentTree: ComponentTree = [];\n\n for (const [_, routeHandler] of Object.entries(routes)) {\n if (\"run\" in routeHandler) {\n const viewPath = routeHandler.viewPath;\n if (\"children\" in routeHandler) {\n const router = new routeHandler.children();\n const branch = createComponentTree(router.routes);\n componentTree.push([viewPath, branch]);\n } else {\n componentTree.push([viewPath, []]);\n }\n } else {\n const router = new routeHandler();\n const branch = createComponentTree(router.routes);\n componentTree.push(...branch);\n }\n }\n\n return componentTree;\n}\n",
9
- "import type { ComponentTree } from \"../types\";\n\nexport function flattenComponentTree(componentTree: ComponentTree): string[] {\n let out: string[] = [];\n for (const [root, branches] of componentTree) {\n out.push(root, ...flattenComponentTree(branches).flat());\n }\n return Array.from(new Set(out));\n}\n"
10
- ],
11
- "mappings": "6PAUO,DAAS,LAAoB,LAAC,JAAoB,CACvD,IAAM,EAA6B,CAAC,EAEpC,QAAY,EAAW,KAA2B,OAAO,QAAQ,CAAM,EACrE,GAAI,QAAS,EAAwB,CACnC,IAAM,EAAQ,EAEd,GAAI,aAAc,EAAO,CACvB,IAAM,EAAW,IAAI,EAAM,SACrB,EAAS,EAAqB,EAAS,MAAM,EAEnD,QAAY,GAAQ,OAAM,iBAAiB,OAAO,QAAQ,CAAM,EAAG,CACjE,IAAM,EAAM,IAAc,IAAM,EAAO,GAAG,IAAY,IAChD,EAAO,IAAS,KAAO,IAAc,IAAM,EAAY,EAE7D,EAAW,GAAQ,CACjB,KAAM,CAAC,EAAM,IAAI,KAAK,CAAK,EAAG,GAAG,CAAI,EACrC,WAAY,CAAC,GAAG,EAAM,YAAa,GAAG,CAAU,CAClD,OAGF,GAAW,GAAa,CACtB,KAAM,CAAC,EAAM,IAAI,KAAK,CAAK,CAAC,EAC5B,WAAY,EAAM,WACpB,MAEG,CACL,IAAM,EAAS,IAAI,EACb,EAAS,EAAqB,EAAO,MAAM,EACjD,QAAY,GAAQ,OAAM,iBAAiB,OAAO,QAAQ,CAAM,EAAG,CACjE,IAAM,EAAM,IAAc,IAAM,EAAO,GAAG,IAAY,IAChD,EAAO,IAAS,KAAO,IAAc,IAAM,EAAY,EAC7D,EAAW,GAAQ,CACjB,OACA,WAAY,CAAC,GAAG,EAAO,YAAa,GAAG,CAAU,CACnD,GAKN,OAAO,OAAO,YACZ,OAAO,QAAQ,CAAU,EAAE,KAAK,EAAE,IAAK,KAAO,CAC5C,IAAM,EAAI,EAAE,MAAM,GAAG,EAAE,OAAS,EAAE,MAAM,GAAG,EAAE,OACvC,EAAI,EAAE,MAAM,GAAG,EAAE,OAAS,EAAE,MAAM,GAAG,EAAE,OAC7C,OAAO,EAAI,EACZ,CACH,EC5CF,iCAAS,iCACT,wBAAS,cAAe,cCXjB,SAAS,CAAmB,CAAC,EAAoB,CACtD,IAAM,EAA0C,CAAC,EACjD,QAAY,EAAW,KAAiB,OAAO,QAAQ,CAAM,EAC3D,GAAI,QAAS,EAAc,CACzB,IAAM,EAAW,EAAa,SAE9B,GAAI,aAAc,EAChB,EAAc,GAAa,CAAC,CAAQ,EAGtC,GAAI,aAAc,EAAc,CAC9B,IAAM,EAAW,IAAI,EAAa,SAC5B,EAAW,EAAoB,EAAS,MAAM,EACpD,QAAY,EAAM,KAAc,OAAO,QAAQ,CAAQ,EAAG,CACxD,IAAM,EAAM,IAAc,IAAM,EAAO,GAAG,IAAY,IAChD,EAAO,IAAS,KAAO,IAAc,IAAM,EAAY,EAC7D,EAAc,GAAQ,CAAC,EAAU,GAAG,CAAS,OAG/C,GAAc,GAAa,CAAC,CAAQ,MAEjC,CACL,IAAM,EAAS,IAAI,EAEb,EAAW,EAAoB,EAAO,MAAM,EAClD,QAAY,EAAM,KAAc,OAAO,QAAQ,CAAQ,EAAG,CACxD,IAAM,EAAM,IAAc,IAAM,EAAO,GAAG,IAAY,IAChD,EAAO,IAAS,KAAO,IAAc,IAAM,EAAY,EAC7D,EAAc,GAAQ,GAK5B,OAAO,EChCF,SAAS,CAAmB,CAAC,EAAmC,CACrE,IAAM,EAA+B,CAAC,EAEtC,QAAY,EAAG,KAAiB,OAAO,QAAQ,CAAM,EACnD,GAAI,QAAS,EAAc,CACzB,IAAM,EAAW,EAAa,SAC9B,GAAI,aAAc,EAAc,CAC9B,IAAM,EAAS,IAAI,EAAa,SAC1B,EAAS,EAAoB,EAAO,MAAM,EAChD,EAAc,KAAK,CAAC,EAAU,CAAM,CAAC,MAErC,GAAc,KAAK,CAAC,EAAU,CAAC,CAAC,CAAC,MAE9B,CACL,IAAM,EAAS,IAAI,EACb,EAAS,EAAoB,EAAO,MAAM,EAChD,EAAc,KAAK,GAAG,CAAM,EAIhC,OAAO,ECrBF,SAAS,CAAoB,CAAC,EAAwC,CAC3E,IAAI,EAAgB,CAAC,EACrB,QAAY,EAAM,KAAa,EAC7B,EAAI,KAAK,EAAM,GAAG,EAAqB,CAAQ,EAAE,KAAK,CAAC,EAEzD,OAAO,MAAM,KAAK,IAAI,IAAI,CAAG,CAAC,EHoBhC,sBAAS,gBAAa,eAEf,MAAM,UAAmC,CAAiB,CAS5C,QARZ,OAAQ,6BAEf,eAAiC,CAAC,EAClC,cAA0C,CAAC,EAC3C,cAA+B,CAAC,EAChC,kBAA8B,CAAC,EAC/B,KAAY,KAEZ,WAAW,CAAQ,EAAoC,CACrD,MAAM,EADW,eAEjB,IAAM,EAAqB,CACzB,IAAK,EAAQ,UACf,EACA,KAAK,eAAiB,EAAqB,CAAM,EACjD,KAAK,cAAgB,EAAoB,CAAM,EAC/C,KAAK,cAAgB,EAAoB,CAAM,EAC/C,KAAK,kBAAoB,EAAqB,KAAK,aAAa,EAChE,KAAK,KAAO,EAAQ,KAGtB,IAAI,EAAG,EAEC,yBAAyB,EAAG,CAClC,IAAM,EAAS,OAAO,KAAK,QAAQ,IAAI,OAAQ,MAAM,EAE/C,EADS,EAAY,EAAE,EACJ,SAAS,QAAQ,EACpC,EAAM,EAAW,SAAU,CAAM,EACvC,EAAI,OAAO,CAAS,EACpB,IAAM,EAAgB,EAAI,OAAO,EAEjC,MAAO,CAAE,YAAW,eAAc,OAG9B,aAAY,CAAC,EAAkB,CACnC,IAAK,EAAI,QAAQ,IAAI,YAAY,EAC/B,EAAI,IAAI,EAAE,UAAU,aAAc,EAAG,EAAG,CACtC,SAAU,GACV,OAAQ,GACR,SAAU,SACV,QAAS,IAAI,KAAK,KAAK,IAAI,EAAI,WAAyB,CAC1D,CAAC,EAGH,OAAO,MAAM,KAAK,QAAQ,aAAa,CAAG,OAGtC,kBAAiB,CAAC,EAAc,CACpC,IAAM,EAAM,IAAI,IAAI,EAAI,GAAG,EACrB,EAAoB,EAAI,aAAa,IAAI,MAAM,EAEjD,EAA4B,CAAC,EAC7B,EAA6C,CAAC,EAC9C,EAAiC,KACjC,EAA8B,CAAC,EAEnC,GAAI,CACF,QAAY,EAAU,KAAY,OAAO,QAAQ,KAAK,cAAc,EAAG,CACrE,IAAM,EAAU,IAAI,EAAW,CAAE,UAAS,CAAC,EAC3C,GAAI,EAAQ,KAAK,CAAE,SAAU,EAAI,QAAS,CAAC,EAAG,CAC5C,EAAkB,EAClB,EAAS,EAAQ,KAAK,CAAE,SAAU,EAAI,QAAS,CAAC,GAAG,SAAS,OAC5D,EAAW,EAAQ,KACnB,EAAc,EAAQ,WACtB,cAGG,EAAP,CAEA,MAAM,EAGR,IAAM,EAAc,IAAI,EAAY,EAAK,EAAQ,OAAQ,CAAe,EACxE,OAAO,MAAM,EAAe,IAAI,EAAa,SAAY,CACvD,IAAI,EAQO,KACL,EAAM,EAAe,SAAS,EAE9B,EAAc,EAAI,IAExB,GAAI,CACF,MAAM,EAA2B,IAAI,EAAE,cAAc,CAAW,EAEhE,IAAM,EAAO,MAAM,QAAQ,IAAI,CAC7B,GAAG,EAAS,IAAI,CAAC,IAAO,EAAG,CAAkB,CAAC,EAC9C,GAAG,MAAM,KAAK,EAAI,oBAAoB,EAAE,IAAI,CAAC,IAAO,EAAG,CAAC,CAC1D,CAAC,EAEK,EAAU,EAAI,QACd,EAAU,EAAI,QACd,EAAsB,EAAI,oBAEhC,EAAW,CACT,OACA,UACA,UACA,KAAM,EAAI,KACV,eAAgB,OAAO,YAAY,EAAoB,QAAQ,CAAC,EAChE,gBAAiB,EAAY,UAC7B,OAAQ,EAAY,MACtB,EACA,IAAQ,SAAQ,kBAAiB,QAAS,EAEpC,EAAW,EAAK,OAAO,CAAC,EAAK,IAAS,CAC1C,MAAO,IACF,KACA,CACL,GACC,CAAC,CAAC,EAEC,EAAuB,EAAqB,IAAI,EAChD,EAAgB,EAAqB,UACvC,EAA4B,CAAC,EACjC,GAAI,EAAe,CACjB,IAAM,EAAS,EAAqB,aAClC,IAAI,EAAY,EAAK,CAAa,CACpC,EACM,EAAe,EAAqB,oBACxC,EACA,CACF,EAEA,EAAO,CACL,iBAAkB,EAAqB,iBACvC,cAAe,EACf,WAAY,EACT,GAAS,CACZ,CACF,EAGF,GAAI,EASF,OARA,EAAQ,IAAI,eAAgB,kBAAkB,EAE9C,EAAQ,QAAQ,CAAC,IACf,EAAQ,OAAO,aAAc,EAAO,SAAS,CAAC,CAChD,EAEA,MAAM,KAAK,QAAQ,aAAa,CAAW,EAEpC,IAAI,SACT,KAAK,UAAU,CACb,KAAM,EACH,EAAI,UAAW,CAClB,EACA,eAAgB,EAAS,eACzB,OACA,OAAQ,CACV,CAAC,EACD,CACE,SACF,CACF,EAGF,EAAQ,IAAI,eAAgB,WAAW,EAEvC,EAAQ,QAAQ,CAAC,IACf,EAAQ,OAAO,aAAc,EAAO,SAAS,CAAC,CAChD,EAEA,IAAQ,YAAW,iBAAkB,KAAK,0BAA0B,EACpE,EAAQ,OACN,aACA,cAAc,iDAAyD,IAAI,KAAK,KAAK,IAAI,EAAI,QAAmB,EAAE,YAAY,GAChI,EAEA,IAAM,EAAS,CACb,KAAM,OACN,KAAM,CACJ,SAAU,EACP,EAAI,UAAW,CAClB,EACA,OAAQ,EAAc,SAAS,QAAQ,EACvC,eAAgB,EAAS,eACzB,OACA,KAAM,CAAE,MAAK,EACb,cAAe,KAAK,cACpB,OAAQ,CACN,SAAU,EACV,SACA,YAAa,EAAI,SACjB,aAAc,EAAI,OAClB,OAAQ,EAAkB,GAAO,EACnC,EACA,cAAe,CAAC,CAAC,MAAO,CAAC,CAAC,EAAG,GAAG,KAAK,aAAa,CACpD,EACA,KAAM,CAAC,CACT,EAEA,GAAI,CACF,MAAM,KAAK,aAAa,CAAW,QAC5B,EAAP,CACA,EAAI,MAAM,GAAK,SAAW,wCAAyC,CACjE,IAAK,KAAK,UAAU,CAAG,CACzB,CAAC,EAGH,IAAM,EAAO,KAAK,KACZ,EAAe,KAAK,cAAc,GACxC,MAAO,OAAO,IAMR,CACJ,IACE,mBACA,UACA,YACA,gBACA,eACE,EAEJ,EAAO,KAAK,YAAiB,EAC7B,IAAM,EAAS,MAAM,EACnB,EAAc,EAAU,CACtB,SAAU,CACR,MAAM,EAAU,CAAY,EAC5B,EAAc,EAAM,CAClB,KAAM,EAAO,KACb,eACF,CAAC,CACH,CACF,CAAC,EACD,CACE,uBAAwB,0BAA0B,KAAK,UAAU,EAAO,IAAI,qBAAqB,IACjG,kBACF,CACF,EAEA,OAAO,IAAI,SAAS,EAAQ,CAC1B,QAAS,EAAkB,IAAM,IACjC,SACF,CAAC,SAEI,EAAP,CACA,GAAI,EAAI,OAAS,EACf,GAAI,EAAmB,CACrB,IAAQ,SAAS,IAAK,OAAM,YAAW,WAAY,EAAI,QAAQ,IAC/D,OAAO,IAAI,SAAS,KAAK,UAAU,CAAE,OAAM,WAAU,CAAC,EAAG,CACvD,UACA,QACF,CAAC,MACI,CACL,IAAQ,SAAS,IAAK,SAAU,EAAI,QAAQ,KAC5C,OAAO,IAAI,SAAS,GAAO,QAAS,IAC/B,EAAI,QAAQ,KACf,QACF,CAAC,MAIH,OADA,KAAK,QAAQ,cAAc,EAAa,CAAG,EACrC,GAGX,EAEL",
12
- "debugId": "BBAFFE5383E488B464756E2164756E21",
13
- "names": []
14
- }
@@ -1,8 +0,0 @@
1
- // @bun
2
- import{Ma as I,Pa as i,db as y,za as E}from"./chunk-0q2mxfke.js";import"./chunk-7jhdg3q5.js";import{Gb as n}from"./chunk-7pwzsfq2.js";import{Tb as u}from"./chunk-exvtvmb6.js";import R from"fs/promises";var T="169.254.170.2",x="169.254.170.23",P="[fd00:ec2::23]",d=(e,c)=>{if(e.protocol==="https:")return;if(e.hostname===T||e.hostname===x||e.hostname===P)return;if(e.hostname.includes("[")){if(e.hostname==="[::1]"||e.hostname==="[0000:0000:0000:0000:0000:0000:0000:0001]")return}else{if(e.hostname==="localhost")return;let a=e.hostname.split("."),r=(t)=>{let s=parseInt(t,10);return 0<=s&&s<=255};if(a[0]==="127"&&r(a[1])&&r(a[2])&&r(a[3])&&a.length===4)return}throw new n(`URL not accepted. It must either be HTTPS or match one of the following:
3
- - loopback CIDR 127.0.0.0/8 or [::1/128]
4
- - ECS container host 169.254.170.2
5
- - EKS container host 169.254.170.23 or [fd00:ec2::23]`,{logger:c})};var C=u(E(),1);function S(e){return new C.HttpRequest({protocol:e.protocol,hostname:e.hostname,port:Number(e.port),path:e.pathname,query:Array.from(e.searchParams.entries()).reduce((c,[a,r])=>{return c[a]=r,c},{}),fragment:e.hash})}async function g(e,c){let r=await i(e.body).transformToString();if(e.statusCode===200){let t=JSON.parse(r);if(typeof t.AccessKeyId!=="string"||typeof t.SecretAccessKey!=="string"||typeof t.Token!=="string"||typeof t.Expiration!=="string")throw new n("HTTP credential provider response not of the required format, an object matching: { AccessKeyId: string, SecretAccessKey: string, Token: string, Expiration: string(rfc3339) }",{logger:c});return{accessKeyId:t.AccessKeyId,secretAccessKey:t.SecretAccessKey,sessionToken:t.Token,expiration:y(t.Expiration)}}if(e.statusCode>=400&&e.statusCode<500){let t={};try{t=JSON.parse(r)}catch(s){}throw Object.assign(new n(`Server responded with status: ${e.statusCode}`,{logger:c}),{Code:t.Code,Message:t.Message})}throw new n(`Server responded with status: ${e.statusCode}`,{logger:c})}var w=(e,c,a)=>{return async()=>{for(let r=0;r<c;++r)try{return await e()}catch(t){await new Promise((s)=>setTimeout(s,a))}return await e()}};var p="AWS_CONTAINER_CREDENTIALS_RELATIVE_URI",A="http://169.254.170.2",O="AWS_CONTAINER_CREDENTIALS_FULL_URI",b="AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE",_="AWS_CONTAINER_AUTHORIZATION_TOKEN",v=(e={})=>{e.logger?.debug("@aws-sdk/credential-provider-http - fromHttp");let c,a=e.awsContainerCredentialsRelativeUri??process.env[p],r=e.awsContainerCredentialsFullUri??process.env[O],t=e.awsContainerAuthorizationToken??process.env[_],s=e.awsContainerAuthorizationTokenFile??process.env[b],m=e.logger?.constructor?.name==="NoOpLogger"||!e.logger?console.warn:e.logger.warn;if(a&&r)m("@aws-sdk/credential-provider-http: you have set both awsContainerCredentialsRelativeUri and awsContainerCredentialsFullUri."),m("awsContainerCredentialsFullUri will take precedence.");if(t&&s)m("@aws-sdk/credential-provider-http: you have set both awsContainerAuthorizationToken and awsContainerAuthorizationTokenFile."),m("awsContainerAuthorizationToken will take precedence.");if(r)c=r;else if(a)c=`${A}${a}`;else throw new n(`No HTTP credential provider host provided.
6
- Set AWS_CONTAINER_CREDENTIALS_FULL_URI or AWS_CONTAINER_CREDENTIALS_RELATIVE_URI.`,{logger:e.logger});let h=new URL(c);d(h,e.logger);let K=new I({requestTimeout:e.timeout??1000,connectionTimeout:e.timeout??1000});return w(async()=>{let o=S(h);if(t)o.headers.Authorization=t;else if(s)o.headers.Authorization=(await R.readFile(s)).toString();try{let f=await K.handle(o);return g(f.response)}catch(f){throw new n(String(f),{logger:e.logger})}},e.maxRetries??3,e.timeout??1000)};export{v as fromHttp};
7
-
8
- //# debugId=B3F7020F18DBC6C864756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{$ as g,P as is,Q as Ie,R as Ce,S as Le,T as Me,W as U,X as Ae,Y as V,Z as N,_ as f,aa as Ke,ba as he,ca as ue,da as we,ea as be,fa as Qe,ga as Xe,ia as rs,ja as as,ka as Ye,la as xe,ma as ve,na as Ze,oa as ke,pa as je,qa as x,ra as Re,sa as Ee,ta as qe,ua as Se,va as $e,wa as Pe}from"./chunk-59v5dnya.js";import{xa as hs,ya as l}from"./chunk-rvge2dbd.js";import{$a as h,Da as se,Fa as te,Ga as re,Ha as We,Ia as ae,Ja as ne,Ma as le,Na as pe,Ta as ts,Ua as E,Za as B,_a as Ve,gb as He,hb as u,ib as Ne,jb as ye,kb as me,lb as Ue,mb as _e,pb as i,qb as y,sb as fe,za as us}from"./chunk-0q2mxfke.js";import"./chunk-s6redhaf.js";import"./chunk-7jhdg3q5.js";import"./chunk-7pwzsfq2.js";import"./chunk-79cfd363.js";import"./chunk-djfe1w23.js";import{Tb as o}from"./chunk-exvtvmb6.js";var p=o(U(),1);var $=o(x(),1),v=o(is(),1),P=async(e,s,t)=>{return{operation:v.getSmithyContext(s).operation,region:await v.normalizeProvider(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};function ls(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"awsssoportal",region:e.region},propertiesExtractor:(s,t)=>({signingProperties:{config:s,context:t}})}}function b(e){return{schemeId:"smithy.api#noAuth"}}var J=(e)=>{let s=[];switch(e.operation){case"GetRoleCredentials":{s.push(b(e));break}case"ListAccountRoles":{s.push(b(e));break}case"ListAccounts":{s.push(b(e));break}case"Logout":{s.push(b(e));break}default:s.push(ls(e))}return s},I=(e)=>{return{...$.resolveAwsSdkSigV4Config(e)}};var C=(e)=>{return{...e,useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"awsssoportal"}},L={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var M={name:"@aws-sdk/client-sso",description:"AWS SDK for JavaScript Sso Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sso","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sso"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sso",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sso"}};var ze=o(x(),1);var de=o(x(),1),oe=o(U(),1);var ce=o(hs(),1);var W={["required"]:!1,type:"String"},A={["required"]:!0,default:!1,type:"Boolean"},K={["ref"]:"Endpoint"},T={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseFIPS"},!0]},H={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseDualStack"},!0]},d={},Q={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},O={["ref"]:"PartitionResult"},X={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[O,"supportsDualStack"]}]},Y=[T],Z=[H],j=[{["ref"]:"Region"}],ys={version:"1.0",parameters:{Region:W,UseDualStack:A,UseFIPS:A,Endpoint:W},rules:[{conditions:[{["fn"]:"isSet",["argv"]:[K]}],rules:[{conditions:Y,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:"error"},{conditions:Z,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:"error"},{endpoint:{url:K,properties:d,headers:d},type:"endpoint"}],type:"tree"},{conditions:[{["fn"]:"isSet",["argv"]:j}],rules:[{conditions:[{["fn"]:"aws.partition",["argv"]:j,assign:"PartitionResult"}],rules:[{conditions:[T,H],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,Q]},X],rules:[{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:"error"}],type:"tree"},{conditions:Y,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[Q,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[O,"name"]},"aws-us-gov"]}],endpoint:{url:"https://portal.sso.{Region}.amazonaws.com",properties:d,headers:d},type:"endpoint"},{endpoint:{url:"https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",type:"error"}],type:"tree"},{conditions:Z,rules:[{conditions:[X],rules:[{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",type:"error"}],type:"tree"},{endpoint:{url:"https://portal.sso.{Region}.{PartitionResult#dnsSuffix}",properties:d,headers:d},type:"endpoint"}],type:"tree"}],type:"tree"},{error:"Invalid Configuration: Missing Region",type:"error"}]},G=ys;var ms=new V({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ee=(e,s={})=>{return ms.get(e,()=>f(G,{endpointParams:e,logger:s.logger}))};N.aws=g;var ie=(e)=>{return{apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??ae,base64Encoder:e?.base64Encoder??ne,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??ee,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??J,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(s)=>s.getIdentityProvider("aws.auth#sigv4"),signer:new de.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(s)=>s.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new oe.NoAuthSigner}],logger:e?.logger??new re,serviceId:e?.serviceId??"SSO",urlParser:e?.urlParser??ce.parseUrl,utf8Decoder:e?.utf8Decoder??se,utf8Encoder:e?.utf8Encoder??te}};var De=(e)=>{me(process.version);let s=Se(e),t=()=>s().then(ye),r=ie(e);return ze.emitWarningIfUnsupportedVersion(process.version),{...r,...e,runtime:"node",defaultsMode:s,bodyLengthChecker:e?.bodyLengthChecker??qe,defaultUserAgentProvider:e?.defaultUserAgentProvider??Re({serviceId:r.serviceId,clientVersion:M.version}),maxAttempts:e?.maxAttempts??l(ve),region:e?.region??l(we,be),requestHandler:le.create(e?.requestHandler??t),retryMode:e?.retryMode??l({...ke,default:async()=>(await t()).retryMode||xe}),sha256:e?.sha256??Ee.bind(null,"sha256"),streamCollector:e?.streamCollector??pe,useDualstackEndpoint:e?.useDualstackEndpoint??l(he),useFipsEndpoint:e?.useFipsEndpoint??l(ue)}};var R=o(us(),1);var Be=(e)=>{let{httpAuthSchemes:s,httpAuthSchemeProvider:t,credentials:r}=e;return{setHttpAuthScheme(a){let n=s.findIndex((F)=>F.schemeId===a.schemeId);if(n===-1)s.push(a);else s.splice(n,1,a)},httpAuthSchemes(){return s},setHttpAuthSchemeProvider(a){t=a},httpAuthSchemeProvider(){return t},setCredentials(a){r=a},credentials(){return r}}},Fe=(e)=>{return{httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}};var k=(e)=>e,Je=(e,s)=>{let t={...k($e(e)),...k(Ue(e)),...k(R.getHttpHandlerExtensionConfiguration(e)),...k(Be(e))};return s.forEach((r)=>r.configure(t)),{...e,...Pe(t),..._e(t),...R.resolveHttpHandlerRuntimeConfig(t),...Fe(t)}};class Te extends We{constructor(...[e]){let s=De(e||{}),t=C(s),r=Ae(t),a=Ze(r),n=Qe(a),F=Ie(n),ds=Ye(F),os=I(ds),_=Je(os,e?.extensions||[]);super(_);this.config=_,this.middlewareStack.use(Ke(this.config)),this.middlewareStack.use(je(this.config)),this.middlewareStack.use(Xe(this.config)),this.middlewareStack.use(Ce(this.config)),this.middlewareStack.use(Le(this.config)),this.middlewareStack.use(Me(this.config)),this.middlewareStack.use(p.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:P,identityProviderConfigProvider:async(cs)=>new p.DefaultIdentityProviderConfig({"aws.auth#sigv4":cs.credentials})})),this.middlewareStack.use(p.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class c extends He{constructor(e){super(e);Object.setPrototypeOf(this,c.prototype)}}class q extends c{constructor(e){super({name:"InvalidRequestException",$fault:"client",...e});this.name="InvalidRequestException",this.$fault="client",Object.setPrototypeOf(this,q.prototype)}}class S extends c{constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e});this.name="ResourceNotFoundException",this.$fault="client",Object.setPrototypeOf(this,S.prototype)}}class z extends c{constructor(e){super({name:"TooManyRequestsException",$fault:"client",...e});this.name="TooManyRequestsException",this.$fault="client",Object.setPrototypeOf(this,z.prototype)}}class D extends c{constructor(e){super({name:"UnauthorizedException",$fault:"client",...e});this.name="UnauthorizedException",this.$fault="client",Object.setPrototypeOf(this,D.prototype)}}var Oe=(e)=>({...e,...e.accessToken&&{accessToken:E}}),ws=(e)=>({...e,...e.secretAccessKey&&{secretAccessKey:E},...e.sessionToken&&{sessionToken:E}}),Ge=(e)=>({...e,...e.roleCredentials&&{roleCredentials:ws(e.roleCredentials)}});var m=o(x(),1),ge=o(U(),1);var es=async(e,s)=>{let t=ge.requestBuilder(e,s),r=i({},qs,{[Us]:e[zs]});t.bp("/federation/credentials");let a=i({[Fs]:[,B(e[Bs],"roleName")],[Ds]:[,B(e[Ss],"accountId")]}),n;return t.m("GET").h(r).q(a).b(n),t.build()};var ss=async(e,s)=>{if(e.statusCode!==200&&e.statusCode>=300)return bs(e,s);let t=i({$metadata:w(e)}),r=B(Ve(await m.parseJsonBody(e.body,s)),"body"),a=y(r,{roleCredentials:fe});return Object.assign(t,a),t};var bs=async(e,s)=>{let t={...e,body:await m.parseJsonErrorBody(e.body,s)},r=m.loadRestJsonErrorCode(e,t.body);switch(r){case"InvalidRequestException":case"com.amazonaws.sso#InvalidRequestException":throw await vs(t,s);case"ResourceNotFoundException":case"com.amazonaws.sso#ResourceNotFoundException":throw await ks(t,s);case"TooManyRequestsException":case"com.amazonaws.sso#TooManyRequestsException":throw await Rs(t,s);case"UnauthorizedException":case"com.amazonaws.sso#UnauthorizedException":throw await Es(t,s);default:let a=t.body;return xs({output:e,parsedBody:a,errorCode:r})}},xs=Ne(c),vs=async(e,s)=>{let t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);let n=new q({$metadata:w(e),...t});return u(n,e.body)},ks=async(e,s)=>{let t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);let n=new S({$metadata:w(e),...t});return u(n,e.body)},Rs=async(e,s)=>{let t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);let n=new z({$metadata:w(e),...t});return u(n,e.body)},Es=async(e,s)=>{let t=i({}),r=e.body,a=y(r,{message:h});Object.assign(t,a);let n=new D({$metadata:w(e),...t});return u(n,e.body)},w=(e)=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]});var qs=(e)=>e!==void 0&&e!==null&&e!==""&&(!Object.getOwnPropertyNames(e).includes("length")||e.length!=0)&&(!Object.getOwnPropertyNames(e).includes("size")||e.size!=0),Ss="accountId",zs="accessToken",Ds="account_id";var Bs="roleName",Fs="role_name",Us="x-amz-sso_bearer_token";class ns extends ts.classBuilder().ep(L).m(function(e,s,t,r){return[rs(t,this.serialize,this.deserialize),as(t,e.getEndpointParameterInstructions())]}).s("SWBPortalService","GetRoleCredentials",{}).n("SSOClient","GetRoleCredentialsCommand").f(Oe,Ge).ser(es).de(ss).build(){}export{Te as SSOClient,ns as GetRoleCredentialsCommand};
3
-
4
- //# debugId=90DE7FC152A97A9F64756E2164756E21
@@ -1,4 +0,0 @@
1
- import{Rb as e}from"./chunk-g3838fme.js";class r extends e{i;static _name="EmailServiceContainer";constructor(i){super();this.service=i}}
2
- export{r as D};
3
-
4
- //# debugId=A05AA746D49AB01064756E2164756E21
@@ -1,3 +0,0 @@
1
- import{ub as Z,yb as b}from"./chunk-s6redhaf.js";import{Gb as h,Ib as L,Jb as H,Kb as V}from"./chunk-7pwzsfq2.js";import{Ub as g}from"./chunk-exvtvmb6.js";var T=g((a,S)=>{var{defineProperty:o,getOwnPropertyDescriptor:Y,getOwnPropertyNames:D}=Object,M=Object.prototype.hasOwnProperty,Q=(c,i)=>o(c,"name",{value:i,configurable:!0}),U=(c,i)=>{for(var n in i)o(c,n,{get:i[n],enumerable:!0})},O=(c,i,n,F)=>{if(i&&typeof i==="object"||typeof i==="function"){for(let f of D(i))if(!M.call(c,f)&&f!==n)o(c,f,{get:()=>i[f],enumerable:!(F=Y(i,f))||F.enumerable})}return c},d=(c)=>O(o({},"__esModule",{value:!0}),c),A={};U(A,{parseQueryString:()=>G});S.exports=d(A);function G(c){let i={};if(c=c.replace(/^\?/,""),c)for(let n of c.split("&")){let[F,f=null]=n.split("=");if(F=decodeURIComponent(F),f)f=decodeURIComponent(f);if(!(F in i))i[F]=f;else if(Array.isArray(i[F]))i[F].push(f);else i[F]=[i[F],f]}return i}Q(G,"parseQueryString")});var q=g((u,z)=>{var{defineProperty:w,getOwnPropertyDescriptor:v,getOwnPropertyNames:J}=Object,x=Object.prototype.hasOwnProperty,P=(c,i)=>w(c,"name",{value:i,configurable:!0}),s=(c,i)=>{for(var n in i)w(c,n,{get:i[n],enumerable:!0})},l=(c,i,n,F)=>{if(i&&typeof i==="object"||typeof i==="function"){for(let f of J(i))if(!x.call(c,f)&&f!==n)w(c,f,{get:()=>i[f],enumerable:!(F=v(i,f))||F.enumerable})}return c},m=(c)=>l(w({},"__esModule",{value:!0}),c),j={};s(j,{parseUrl:()=>t});z.exports=m(j);var k=T(),t=P((c)=>{if(typeof c==="string")return t(new URL(c));let{hostname:i,pathname:n,port:F,protocol:f,search:E}=c,N;if(E)N=k.parseQueryString(E);return{hostname:i,port:F?parseInt(F):void 0,protocol:f,path:n,query:N}},"parseUrl")});function C(c){try{let i=new Set(Array.from(c.match(/([A-Z_]){3,}/g)??[]));return i.delete("CONFIG"),i.delete("CONFIG_PREFIX_SEPARATOR"),i.delete("ENV"),[...i].join(", ")}catch(i){return c}}var X=(c,i)=>async()=>{try{let n=c(process.env);if(n===void 0)throw new Error;return n}catch(n){throw new h(n.message||`Not found in ENV: ${C(c.toString())}`,{logger:i})}};var B=(c,{preferredFile:i="config",...n}={})=>async()=>{let F=Z(n),{configFile:f,credentialsFile:E}=await b(n),N=E[F]||{},I=f[F]||{},W=i==="config"?{...N,...I}:{...I,...N};try{let $=c(W,i==="config"?f:E);if($===void 0)throw new Error;return $}catch(R){throw new h(R.message||`Not found in config files w/ profile [${F}]: ${C(c.toString())}`,{logger:n.logger})}};var p=(c)=>typeof c==="function",K=(c)=>p(c)?async()=>await c():H(c);var hi=({environmentVariableSelector:c,configFileSelector:i,default:n},F={})=>V(L(X(c),B(i,F),K(n)));export{q as xa,hi as ya};
2
-
3
- //# debugId=FB70E4A725504D3764756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{Ab as N,ub as y,vb as b,wb as E,zb as C}from"./chunk-s6redhaf.js";import"./chunk-7jhdg3q5.js";import{Gb as i,Hb as f}from"./chunk-7pwzsfq2.js";import{Tb as v}from"./chunk-exvtvmb6.js";var L=(e)=>e&&(typeof e.sso_start_url==="string"||typeof e.sso_account_id==="string"||typeof e.sso_session==="string"||typeof e.sso_region==="string"||typeof e.sso_role_name==="string");var M=300000,_="To refresh this SSO session run 'aws sso login' with the corresponding profile.";var I={},H=async(e)=>{let{SSOOIDCClient:r}=await import("./chunk-zg1wzdnw.js");if(I[e])return I[e];let s=new r({region:e});return I[e]=s,s};var K=async(e,r)=>{let{CreateTokenCommand:s}=await import("./chunk-zg1wzdnw.js");return(await H(r)).send(new s({clientId:e.clientId,clientSecret:e.clientSecret,refreshToken:e.refreshToken,grantType:"refresh_token"}))};var P=(e)=>{if(e.expiration&&e.expiration.getTime()<Date.now())throw new f(`Token is expired. ${_}`,!1)};var m=(e,r,s=!1)=>{if(typeof r==="undefined")throw new f(`Value not present for '${e}' in SSO Token${s?". Cannot refresh":""}. ${_}`,!1)};import{promises as j}from"fs";var{writeFile:X}=j,G=(e,r)=>{let s=b(e),t=JSON.stringify(r,null,2);return X(s,t)};var U=new Date(0),q=(e={})=>async()=>{e.logger?.debug("@aws-sdk/token-providers - fromSso");let r=await N(e),s=y(e),t=r[s];if(!t)throw new f(`Profile '${s}' could not be found in shared credentials file.`,!1);else if(!t.sso_session)throw new f(`Profile '${s}' is missing required property 'sso_session'.`);let a=t.sso_session,c=(await C(e))[a];if(!c)throw new f(`Sso session '${a}' could not be found in shared credentials file.`,!1);for(let n of["sso_start_url","sso_region"])if(!c[n])throw new f(`Sso session '${a}' is missing required property '${n}'.`,!1);let{sso_start_url:p,sso_region:S}=c,o;try{o=await E(a)}catch(n){throw new f(`The SSO session token associated with profile=${s} was not found or is invalid. ${_}`,!1)}m("accessToken",o.accessToken),m("expiresAt",o.expiresAt);let{accessToken:x,expiresAt:u}=o,l={token:x,expiration:new Date(u)};if(l.expiration.getTime()-Date.now()>M)return l;if(Date.now()-U.getTime()<30000)return P(l),l;m("clientId",o.clientId,!0),m("clientSecret",o.clientSecret,!0),m("refreshToken",o.refreshToken,!0);try{U.setTime(Date.now());let n=await K(o,S);m("accessToken",n.accessToken),m("expiresIn",n.expiresIn);let h=new Date(Date.now()+n.expiresIn*1000);try{await G(a,{...o,accessToken:n.accessToken,expiresAt:h.toISOString(),refreshToken:n.refreshToken})}catch(O){}return{token:n.accessToken,expiration:h}}catch(n){return P(l),l}};var T=!1,R=async({ssoStartUrl:e,ssoSession:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoClient:d,clientConfig:c,profile:p,logger:S})=>{let o,x="To refresh this SSO session run aws sso login with the corresponding profile.";if(r)try{let g=await q({profile:p})();o={accessToken:g.token,expiresAt:new Date(g.expiration).toISOString()}}catch(g){throw new i(g.message,{tryNextLink:T,logger:S})}else try{o=await E(e)}catch(g){throw new i("The SSO session associated with this profile is invalid. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:T,logger:S})}if(new Date(o.expiresAt).getTime()-Date.now()<=0)throw new i("The SSO session associated with this profile has expired. To refresh this SSO session run aws sso login with the corresponding profile.",{tryNextLink:T,logger:S});let{accessToken:u}=o,{SSOClient:l,GetRoleCredentialsCommand:n}=await import("./chunk-qe8pzmx4.js"),h=d||new l(Object.assign({},c??{},{region:c?.region??t})),O;try{O=await h.send(new n({accountId:s,roleName:a,accessToken:u}))}catch(g){throw new i(g,{tryNextLink:T,logger:S})}let{roleCredentials:{accessKeyId:w,secretAccessKey:k,sessionToken:D,expiration:A,credentialScope:$,accountId:F}={}}=O;if(!w||!k||!D||!A)throw new i("SSO returns an invalid temporary credential.",{tryNextLink:T,logger:S});return{accessKeyId:w,secretAccessKey:k,sessionToken:D,expiration:new Date(A),...$&&{credentialScope:$},...F&&{accountId:F}}};var W=(e,r)=>{let{sso_start_url:s,sso_account_id:t,sso_region:a,sso_role_name:d}=e;if(!s||!t||!a||!d)throw new i(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", "sso_role_name", "sso_start_url". Got ${Object.keys(e).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,{tryNextLink:!1,logger:r});return e};var Ce=(e={})=>async()=>{e.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");let{ssoStartUrl:r,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoSession:d}=e,{ssoClient:c}=e,p=y(e);if(!r&&!s&&!t&&!a&&!d){let o=(await N(e))[p];if(!o)throw new i(`Profile ${p} was not found.`,{logger:e.logger});if(!L(o))throw new i(`Profile ${p} is not configured with SSO credentials.`,{logger:e.logger});if(o?.sso_session){let w=(await C(e))[o.sso_session],k=` configurations in profile ${p} and sso-session ${o.sso_session}`;if(t&&t!==w.sso_region)throw new i("Conflicting SSO region"+k,{tryNextLink:!1,logger:e.logger});if(r&&r!==w.sso_start_url)throw new i("Conflicting SSO start_url"+k,{tryNextLink:!1,logger:e.logger});o.sso_region=w.sso_region,o.sso_start_url=w.sso_start_url}let{sso_start_url:x,sso_account_id:u,sso_region:l,sso_role_name:n,sso_session:h}=W(o,e.logger);return R({ssoStartUrl:x,ssoSession:h,ssoAccountId:u,ssoRegion:l,ssoRoleName:n,ssoClient:c,clientConfig:e.clientConfig,profile:p})}else if(!r||!s||!t||!a)throw new i('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"',{tryNextLink:!1,logger:e.logger});else return R({ssoStartUrl:r,ssoSession:d,ssoAccountId:s,ssoRegion:t,ssoRoleName:a,ssoClient:c,clientConfig:e.clientConfig,profile:p})};export{W as validateSsoProfile,L as isSsoProfile,Ce as fromSSO};
3
-
4
- //# debugId=0BD3366BD4F1913764756E2164756E21
@@ -1,4 +0,0 @@
1
- // @bun
2
- import{O as ge}from"./chunk-74c59y5c.js";import{$ as Te,P as Kr,Q as hr,R as nr,S as or,T as dr,W as _,X as yr,Y as Ie,Z as Re,_ as Pe,aa as tr,ba as Ke,ca as Me,da as Be,ea as Le,fa as ar,ga as mr,ia as S,ja as $,ka as wr,la as Qe,ma as Xe,na as kr,oa as Ye,pa as vr,qa as U,ra as Ze,sa as He,ta as Ne,ua as _e,va as sr,wa as ir}from"./chunk-59v5dnya.js";import{xa as Xr,ya as R}from"./chunk-rvge2dbd.js";import{$a as h,Da as je,Fa as Fe,Ga as De,Ha as cr,Ia as Ue,Ja as qe,Ma as Ve,Na as We,Ta as E,Ua as t,Va as Jr,Xa as C,Ya as b,Za as j,_a as F,gb as Er,hb as a,ib as br,jb as fe,kb as Ae,lb as er,mb as rr,pb as c,qb as o,sb as I,za as Yr}from"./chunk-0q2mxfke.js";import"./chunk-s6redhaf.js";import"./chunk-7jhdg3q5.js";import"./chunk-bpqd0d4g.js";import"./chunk-7pwzsfq2.js";import"./chunk-79cfd363.js";import"./chunk-djfe1w23.js";import{Tb as w}from"./chunk-exvtvmb6.js";var P=w(_(),1);var se=w(U(),1),q=w(Kr(),1),ie=async(e,s,r)=>{return{operation:q.getSmithyContext(s).operation,region:await q.normalizeProvider(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}};function Mr(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"sso-oauth",region:e.region},propertiesExtractor:(s,r)=>({signingProperties:{config:s,context:r}})}}function N(e){return{schemeId:"smithy.api#noAuth"}}var le=(e)=>{let s=[];switch(e.operation){case"CreateToken":{s.push(N(e));break}case"RegisterClient":{s.push(N(e));break}case"StartDeviceAuthorization":{s.push(N(e));break}default:s.push(Mr(e))}return s},he=(e)=>{return{...se.resolveAwsSdkSigV4Config(e)}};var ne=(e)=>{return{...e,useDualstackEndpoint:e.useDualstackEndpoint??!1,useFipsEndpoint:e.useFipsEndpoint??!1,defaultSigningName:"sso-oauth"}},v={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var oe={name:"@aws-sdk/client-sso-oidc",description:"AWS SDK for JavaScript Sso Oidc Client for Node.js, Browser and React Native",version:"3.654.0",scripts:{build:"concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'","build:cjs":"node ../../scripts/compilation/inline client-sso-oidc","build:es":"tsc -p tsconfig.es.json","build:include:deps":"lerna run --scope $npm_package_name --include-dependencies build","build:types":"tsc -p tsconfig.types.json","build:types:downlevel":"downlevel-dts dist-types dist-types/ts3.4",clean:"rimraf ./dist-* && rimraf *.tsbuildinfo","extract:docs":"api-extractor run --local","generate:client":"node ../../scripts/generate-clients/single-service --solo sso-oidc"},main:"./dist-cjs/index.js",types:"./dist-types/index.d.ts",module:"./dist-es/index.js",sideEffects:!1,dependencies:{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"3.654.0","@aws-sdk/credential-provider-node":"3.654.0","@aws-sdk/middleware-host-header":"3.654.0","@aws-sdk/middleware-logger":"3.654.0","@aws-sdk/middleware-recursion-detection":"3.654.0","@aws-sdk/middleware-user-agent":"3.654.0","@aws-sdk/region-config-resolver":"3.654.0","@aws-sdk/types":"3.654.0","@aws-sdk/util-endpoints":"3.654.0","@aws-sdk/util-user-agent-browser":"3.654.0","@aws-sdk/util-user-agent-node":"3.654.0","@smithy/config-resolver":"^3.0.8","@smithy/core":"^2.4.3","@smithy/fetch-http-handler":"^3.2.7","@smithy/hash-node":"^3.0.6","@smithy/invalid-dependency":"^3.0.6","@smithy/middleware-content-length":"^3.0.8","@smithy/middleware-endpoint":"^3.1.3","@smithy/middleware-retry":"^3.0.18","@smithy/middleware-serde":"^3.0.6","@smithy/middleware-stack":"^3.0.6","@smithy/node-config-provider":"^3.1.7","@smithy/node-http-handler":"^3.2.2","@smithy/protocol-http":"^4.1.3","@smithy/smithy-client":"^3.3.2","@smithy/types":"^3.4.2","@smithy/url-parser":"^3.0.6","@smithy/util-base64":"^3.0.0","@smithy/util-body-length-browser":"^3.0.0","@smithy/util-body-length-node":"^3.0.0","@smithy/util-defaults-mode-browser":"^3.0.18","@smithy/util-defaults-mode-node":"^3.0.18","@smithy/util-endpoints":"^2.1.2","@smithy/util-middleware":"^3.0.6","@smithy/util-retry":"^3.0.6","@smithy/util-utf8":"^3.0.0",tslib:"^2.6.2"},devDependencies:{"@tsconfig/node16":"16.1.3","@types/node":"^16.18.96",concurrently:"7.0.0","downlevel-dts":"0.10.1",rimraf:"3.0.2",typescript:"~4.9.5"},engines:{node:">=16.0.0"},typesVersions:{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},files:["dist-*/**"],author:{name:"AWS SDK for JavaScript Team",url:"https://aws.amazon.com/javascript/"},license:"Apache-2.0",peerDependencies:{"@aws-sdk/client-sts":"^3.654.0"},browser:{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.browser"},"react-native":{"./dist-es/runtimeConfig":"./dist-es/runtimeConfig.native"},homepage:"https://github.com/aws/aws-sdk-js-v3/tree/main/clients/client-sso-oidc",repository:{type:"git",url:"https://github.com/aws/aws-sdk-js-v3.git",directory:"clients/client-sso-oidc"}};var pe=w(U(),1);var xe=w(U(),1),ze=w(_(),1);var Ge=w(Xr(),1);var de={["required"]:!1,type:"String"},ce={["required"]:!0,default:!1,type:"Boolean"},ye={["ref"]:"Endpoint"},ve={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseFIPS"},!0]},Ee={["fn"]:"booleanEquals",["argv"]:[{["ref"]:"UseDualStack"},!0]},m={},te={["fn"]:"getAttr",["argv"]:[{["ref"]:"PartitionResult"},"supportsFIPS"]},Se={["ref"]:"PartitionResult"},ae={["fn"]:"booleanEquals",["argv"]:[!0,{["fn"]:"getAttr",["argv"]:[Se,"supportsDualStack"]}]},me=[ve],we=[Ee],ke=[{["ref"]:"Region"}],Lr={version:"1.0",parameters:{Region:de,UseDualStack:ce,UseFIPS:ce,Endpoint:de},rules:[{conditions:[{["fn"]:"isSet",["argv"]:[ye]}],rules:[{conditions:me,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:"error"},{conditions:we,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:"error"},{endpoint:{url:ye,properties:m,headers:m},type:"endpoint"}],type:"tree"},{conditions:[{["fn"]:"isSet",["argv"]:ke}],rules:[{conditions:[{["fn"]:"aws.partition",["argv"]:ke,assign:"PartitionResult"}],rules:[{conditions:[ve,Ee],rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[!0,te]},ae],rules:[{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:m,headers:m},type:"endpoint"}],type:"tree"},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:"error"}],type:"tree"},{conditions:me,rules:[{conditions:[{["fn"]:"booleanEquals",["argv"]:[te,!0]}],rules:[{conditions:[{["fn"]:"stringEquals",["argv"]:[{["fn"]:"getAttr",["argv"]:[Se,"name"]},"aws-us-gov"]}],endpoint:{url:"https://oidc.{Region}.amazonaws.com",properties:m,headers:m},type:"endpoint"},{endpoint:{url:"https://oidc-fips.{Region}.{PartitionResult#dnsSuffix}",properties:m,headers:m},type:"endpoint"}],type:"tree"},{error:"FIPS is enabled but this partition does not support FIPS",type:"error"}],type:"tree"},{conditions:we,rules:[{conditions:[ae],rules:[{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dualStackDnsSuffix}",properties:m,headers:m},type:"endpoint"}],type:"tree"},{error:"DualStack is enabled but this partition does not support DualStack",type:"error"}],type:"tree"},{endpoint:{url:"https://oidc.{Region}.{PartitionResult#dnsSuffix}",properties:m,headers:m},type:"endpoint"}],type:"tree"}],type:"tree"},{error:"Invalid Configuration: Missing Region",type:"error"}]},$e=Lr;var Qr=new Ie({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),be=(e,s={})=>{return Qr.get(e,()=>Pe($e,{endpointParams:e,logger:s.logger}))};Re.aws=Te;var Je=(e)=>{return{apiVersion:"2019-06-10",base64Decoder:e?.base64Decoder??Ue,base64Encoder:e?.base64Encoder??qe,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??be,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??le,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:(s)=>s.getIdentityProvider("aws.auth#sigv4"),signer:new xe.AwsSdkSigV4Signer},{schemeId:"smithy.api#noAuth",identityProvider:(s)=>s.getIdentityProvider("smithy.api#noAuth")||(async()=>({})),signer:new ze.NoAuthSigner}],logger:e?.logger??new De,serviceId:e?.serviceId??"SSO OIDC",urlParser:e?.urlParser??Ge.parseUrl,utf8Decoder:e?.utf8Decoder??je,utf8Encoder:e?.utf8Encoder??Fe}};var Ce=(e)=>{Ae(process.version);let s=_e(e),r=()=>s().then(fe),i=Je(e);return pe.emitWarningIfUnsupportedVersion(process.version),{...i,...e,runtime:"node",defaultsMode:s,bodyLengthChecker:e?.bodyLengthChecker??Ne,credentialDefaultProvider:e?.credentialDefaultProvider??ge,defaultUserAgentProvider:e?.defaultUserAgentProvider??Ze({serviceId:i.serviceId,clientVersion:oe.version}),maxAttempts:e?.maxAttempts??R(Xe),region:e?.region??R(Be,Le),requestHandler:Ve.create(e?.requestHandler??r),retryMode:e?.retryMode??R({...Ye,default:async()=>(await r()).retryMode||Qe}),sha256:e?.sha256??He.bind(null,"sha256"),streamCollector:e?.streamCollector??We,useDualstackEndpoint:e?.useDualstackEndpoint??R(Ke),useFipsEndpoint:e?.useFipsEndpoint??R(Me)}};var z=w(Yr(),1);var Oe=(e)=>{let{httpAuthSchemes:s,httpAuthSchemeProvider:r,credentials:i}=e;return{setHttpAuthScheme(l){let n=s.findIndex((T)=>T.schemeId===l.schemeId);if(n===-1)s.push(l);else s.splice(n,1,l)},httpAuthSchemes(){return s},setHttpAuthSchemeProvider(l){r=l},httpAuthSchemeProvider(){return r},setCredentials(l){i=l},credentials(){return i}}},ue=(e)=>{return{httpAuthSchemes:e.httpAuthSchemes(),httpAuthSchemeProvider:e.httpAuthSchemeProvider(),credentials:e.credentials()}};var x=(e)=>e,lr=(e,s)=>{let r={...x(sr(e)),...x(er(e)),...x(z.getHttpHandlerExtensionConfiguration(e)),...x(Oe(e))};return s.forEach((i)=>i.configure(r)),{...e,...ir(r),...rr(r),...z.resolveHttpHandlerRuntimeConfig(r),...ue(r)}};class p extends cr{constructor(...[e]){let s=Ce(e||{}),r=ne(s),i=yr(r),l=kr(i),n=ar(l),T=hr(n),Wr=wr(T),fr=he(Wr),re=lr(fr,e?.extensions||[]);super(re);this.config=re,this.middlewareStack.use(tr(this.config)),this.middlewareStack.use(vr(this.config)),this.middlewareStack.use(mr(this.config)),this.middlewareStack.use(nr(this.config)),this.middlewareStack.use(or(this.config)),this.middlewareStack.use(dr(this.config)),this.middlewareStack.use(P.getHttpAuthSchemeEndpointRuleSetPlugin(this.config,{httpAuthSchemeParametersProvider:ie,identityProviderConfigProvider:async(Ar)=>new P.DefaultIdentityProviderConfig({"aws.auth#sigv4":Ar.credentials})})),this.middlewareStack.use(P.getHttpSigningPlugin(this.config))}destroy(){super.destroy()}}class d extends Er{constructor(e){super(e);Object.setPrototypeOf(this,d.prototype)}}class G extends d{constructor(e){super({name:"AccessDeniedException",$fault:"client",...e});this.name="AccessDeniedException",this.$fault="client",Object.setPrototypeOf(this,G.prototype),this.error=e.error,this.error_description=e.error_description}}class J extends d{constructor(e){super({name:"AuthorizationPendingException",$fault:"client",...e});this.name="AuthorizationPendingException",this.$fault="client",Object.setPrototypeOf(this,J.prototype),this.error=e.error,this.error_description=e.error_description}}class V extends d{constructor(e){super({name:"ExpiredTokenException",$fault:"client",...e});this.name="ExpiredTokenException",this.$fault="client",Object.setPrototypeOf(this,V.prototype),this.error=e.error,this.error_description=e.error_description}}class W extends d{constructor(e){super({name:"InternalServerException",$fault:"server",...e});this.name="InternalServerException",this.$fault="server",Object.setPrototypeOf(this,W.prototype),this.error=e.error,this.error_description=e.error_description}}class f extends d{constructor(e){super({name:"InvalidClientException",$fault:"client",...e});this.name="InvalidClientException",this.$fault="client",Object.setPrototypeOf(this,f.prototype),this.error=e.error,this.error_description=e.error_description}}class A extends d{constructor(e){super({name:"InvalidGrantException",$fault:"client",...e});this.name="InvalidGrantException",this.$fault="client",Object.setPrototypeOf(this,A.prototype),this.error=e.error,this.error_description=e.error_description}}class K extends d{constructor(e){super({name:"InvalidRequestException",$fault:"client",...e});this.name="InvalidRequestException",this.$fault="client",Object.setPrototypeOf(this,K.prototype),this.error=e.error,this.error_description=e.error_description}}class M extends d{constructor(e){super({name:"InvalidScopeException",$fault:"client",...e});this.name="InvalidScopeException",this.$fault="client",Object.setPrototypeOf(this,M.prototype),this.error=e.error,this.error_description=e.error_description}}class B extends d{constructor(e){super({name:"SlowDownException",$fault:"client",...e});this.name="SlowDownException",this.$fault="client",Object.setPrototypeOf(this,B.prototype),this.error=e.error,this.error_description=e.error_description}}class L extends d{constructor(e){super({name:"UnauthorizedClientException",$fault:"client",...e});this.name="UnauthorizedClientException",this.$fault="client",Object.setPrototypeOf(this,L.prototype),this.error=e.error,this.error_description=e.error_description}}class Q extends d{constructor(e){super({name:"UnsupportedGrantTypeException",$fault:"client",...e});this.name="UnsupportedGrantTypeException",this.$fault="client",Object.setPrototypeOf(this,Q.prototype),this.error=e.error,this.error_description=e.error_description}}class X extends d{constructor(e){super({name:"InvalidRequestRegionException",$fault:"client",...e});this.name="InvalidRequestRegionException",this.$fault="client",Object.setPrototypeOf(this,X.prototype),this.error=e.error,this.error_description=e.error_description,this.endpoint=e.endpoint,this.region=e.region}}class Y extends d{constructor(e){super({name:"InvalidClientMetadataException",$fault:"client",...e});this.name="InvalidClientMetadataException",this.$fault="client",Object.setPrototypeOf(this,Y.prototype),this.error=e.error,this.error_description=e.error_description}}class Z extends d{constructor(e){super({name:"InvalidRedirectUriException",$fault:"client",...e});this.name="InvalidRedirectUriException",this.$fault="client",Object.setPrototypeOf(this,Z.prototype),this.error=e.error,this.error_description=e.error_description}}var Sr=(e)=>({...e,...e.clientSecret&&{clientSecret:t},...e.refreshToken&&{refreshToken:t},...e.codeVerifier&&{codeVerifier:t}}),$r=(e)=>({...e,...e.accessToken&&{accessToken:t},...e.refreshToken&&{refreshToken:t},...e.idToken&&{idToken:t}}),Ir=(e)=>({...e,...e.refreshToken&&{refreshToken:t},...e.assertion&&{assertion:t},...e.subjectToken&&{subjectToken:t},...e.codeVerifier&&{codeVerifier:t}}),Rr=(e)=>({...e,...e.accessToken&&{accessToken:t},...e.refreshToken&&{refreshToken:t},...e.idToken&&{idToken:t}}),Pr=(e)=>({...e,...e.clientSecret&&{clientSecret:t}}),Tr=(e)=>({...e,...e.clientSecret&&{clientSecret:t}});var k=w(U(),1),D=w(_(),1);var jr=async(e,s)=>{let r=D.requestBuilder(e,s),i={"content-type":"application/json"};r.bp("/token");let l;return l=JSON.stringify(o(e,{clientId:[],clientSecret:[],code:[],codeVerifier:[],deviceCode:[],grantType:[],redirectUri:[],refreshToken:[],scope:(n)=>I(n)})),r.m("POST").h(i).b(l),r.build()},Fr=async(e,s)=>{let r=D.requestBuilder(e,s),i={"content-type":"application/json"};r.bp("/token");let l=c({[ns]:[,"t"]}),n;return n=JSON.stringify(o(e,{assertion:[],clientId:[],code:[],codeVerifier:[],grantType:[],redirectUri:[],refreshToken:[],requestedTokenType:[],scope:(T)=>I(T),subjectToken:[],subjectTokenType:[]})),r.m("POST").h(i).q(l).b(n),r.build()},Dr=async(e,s)=>{let r=D.requestBuilder(e,s),i={"content-type":"application/json"};r.bp("/client/register");let l;return l=JSON.stringify(o(e,{clientName:[],clientType:[],entitledApplicationArn:[],grantTypes:(n)=>I(n),issuerUrl:[],redirectUris:(n)=>I(n),scopes:(n)=>I(n)})),r.m("POST").h(i).b(l),r.build()},Ur=async(e,s)=>{let r=D.requestBuilder(e,s),i={"content-type":"application/json"};r.bp("/device_authorization");let l;return l=JSON.stringify(o(e,{clientId:[],clientSecret:[],startUrl:[]})),r.m("POST").h(i).b(l),r.build()},qr=async(e,s)=>{if(e.statusCode!==200&&e.statusCode>=300)return H(e,s);let r=c({$metadata:y(e)}),i=j(F(await k.parseJsonBody(e.body,s)),"body"),l=o(i,{accessToken:h,expiresIn:b,idToken:h,refreshToken:h,tokenType:h});return Object.assign(r,l),r},xr=async(e,s)=>{if(e.statusCode!==200&&e.statusCode>=300)return H(e,s);let r=c({$metadata:y(e)}),i=j(F(await k.parseJsonBody(e.body,s)),"body"),l=o(i,{accessToken:h,expiresIn:b,idToken:h,issuedTokenType:h,refreshToken:h,scope:I,tokenType:h});return Object.assign(r,l),r},zr=async(e,s)=>{if(e.statusCode!==200&&e.statusCode>=300)return H(e,s);let r=c({$metadata:y(e)}),i=j(F(await k.parseJsonBody(e.body,s)),"body"),l=o(i,{authorizationEndpoint:h,clientId:h,clientIdIssuedAt:C,clientSecret:h,clientSecretExpiresAt:C,tokenEndpoint:h});return Object.assign(r,l),r},Gr=async(e,s)=>{if(e.statusCode!==200&&e.statusCode>=300)return H(e,s);let r=c({$metadata:y(e)}),i=j(F(await k.parseJsonBody(e.body,s)),"body"),l=o(i,{deviceCode:h,expiresIn:b,interval:b,userCode:h,verificationUri:h,verificationUriComplete:h});return Object.assign(r,l),r},H=async(e,s)=>{let r={...e,body:await k.parseJsonErrorBody(e.body,s)},i=k.loadRestJsonErrorCode(e,r.body);switch(i){case"AccessDeniedException":case"com.amazonaws.ssooidc#AccessDeniedException":throw await Hr(r,s);case"AuthorizationPendingException":case"com.amazonaws.ssooidc#AuthorizationPendingException":throw await Nr(r,s);case"ExpiredTokenException":case"com.amazonaws.ssooidc#ExpiredTokenException":throw await _r(r,s);case"InternalServerException":case"com.amazonaws.ssooidc#InternalServerException":throw await pr(r,s);case"InvalidClientException":case"com.amazonaws.ssooidc#InvalidClientException":throw await Cr(r,s);case"InvalidGrantException":case"com.amazonaws.ssooidc#InvalidGrantException":throw await Or(r,s);case"InvalidRequestException":case"com.amazonaws.ssooidc#InvalidRequestException":throw await es(r,s);case"InvalidScopeException":case"com.amazonaws.ssooidc#InvalidScopeException":throw await ss(r,s);case"SlowDownException":case"com.amazonaws.ssooidc#SlowDownException":throw await is(r,s);case"UnauthorizedClientException":case"com.amazonaws.ssooidc#UnauthorizedClientException":throw await ls(r,s);case"UnsupportedGrantTypeException":case"com.amazonaws.ssooidc#UnsupportedGrantTypeException":throw await hs(r,s);case"InvalidRequestRegionException":case"com.amazonaws.ssooidc#InvalidRequestRegionException":throw await rs(r,s);case"InvalidClientMetadataException":case"com.amazonaws.ssooidc#InvalidClientMetadataException":throw await gr(r,s);case"InvalidRedirectUriException":case"com.amazonaws.ssooidc#InvalidRedirectUriException":throw await ur(r,s);default:let l=r.body;return Zr({output:e,parsedBody:l,errorCode:i})}},Zr=br(d),Hr=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new G({$metadata:y(e),...r});return a(n,e.body)},Nr=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new J({$metadata:y(e),...r});return a(n,e.body)},_r=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new V({$metadata:y(e),...r});return a(n,e.body)},pr=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new W({$metadata:y(e),...r});return a(n,e.body)},Cr=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new f({$metadata:y(e),...r});return a(n,e.body)},gr=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new Y({$metadata:y(e),...r});return a(n,e.body)},Or=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new A({$metadata:y(e),...r});return a(n,e.body)},ur=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new Z({$metadata:y(e),...r});return a(n,e.body)},es=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new K({$metadata:y(e),...r});return a(n,e.body)},rs=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{endpoint:h,error:h,error_description:h,region:h});Object.assign(r,l);let n=new X({$metadata:y(e),...r});return a(n,e.body)},ss=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new M({$metadata:y(e),...r});return a(n,e.body)},is=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new B({$metadata:y(e),...r});return a(n,e.body)},ls=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new L({$metadata:y(e),...r});return a(n,e.body)},hs=async(e,s)=>{let r=c({}),i=e.body,l=o(i,{error:h,error_description:h});Object.assign(r,l);let n=new Q({$metadata:y(e),...r});return a(n,e.body)},y=(e)=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]});var ns="aws_iam";class g extends E.classBuilder().ep(v).m(function(e,s,r,i){return[S(r,this.serialize,this.deserialize),$(r,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateToken",{}).n("SSOOIDCClient","CreateTokenCommand").f(Sr,$r).ser(jr).de(qr).build(){}class O extends E.classBuilder().ep(v).m(function(e,s,r,i){return[S(r,this.serialize,this.deserialize),$(r,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","CreateTokenWithIAM",{}).n("SSOOIDCClient","CreateTokenWithIAMCommand").f(Ir,Rr).ser(Fr).de(xr).build(){}class u extends E.classBuilder().ep(v).m(function(e,s,r,i){return[S(r,this.serialize,this.deserialize),$(r,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","RegisterClient",{}).n("SSOOIDCClient","RegisterClientCommand").f(void 0,Pr).ser(Dr).de(zr).build(){}class ee extends E.classBuilder().ep(v).m(function(e,s,r,i){return[S(r,this.serialize,this.deserialize),$(r,e.getEndpointParameterInstructions())]}).s("AWSSSOOIDCService","StartDeviceAuthorization",{}).n("SSOOIDCClient","StartDeviceAuthorizationCommand").f(Tr,void 0).ser(Ur).de(Gr).build(){}var os={CreateTokenCommand:g,CreateTokenWithIAMCommand:O,RegisterClientCommand:u,StartDeviceAuthorizationCommand:ee};class Vr extends p{}Jr(os,Vr);export{cr as __Client,Q as UnsupportedGrantTypeException,L as UnauthorizedClientException,Tr as StartDeviceAuthorizationRequestFilterSensitiveLog,ee as StartDeviceAuthorizationCommand,B as SlowDownException,d as SSOOIDCServiceException,p as SSOOIDCClient,Vr as SSOOIDC,Pr as RegisterClientResponseFilterSensitiveLog,u as RegisterClientCommand,M as InvalidScopeException,X as InvalidRequestRegionException,K as InvalidRequestException,Z as InvalidRedirectUriException,A as InvalidGrantException,Y as InvalidClientMetadataException,f as InvalidClientException,W as InternalServerException,V as ExpiredTokenException,Rr as CreateTokenWithIAMResponseFilterSensitiveLog,Ir as CreateTokenWithIAMRequestFilterSensitiveLog,O as CreateTokenWithIAMCommand,$r as CreateTokenResponseFilterSensitiveLog,Sr as CreateTokenRequestFilterSensitiveLog,g as CreateTokenCommand,J as AuthorizationPendingException,G as AccessDeniedException,E as $Command};
3
-
4
- //# debugId=193957111E9EB4BE64756E2164756E21