replicas-cli 0.2.122 → 0.2.123
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-NH63C5BC.mjs → chunk-4KZFIKR3.mjs} +1077 -1230
- package/dist/{chunk-HDHAEUVR.mjs → chunk-6E4PAXC5.mjs} +1 -1
- package/dist/{chunk-OMR2FLSI.mjs → chunk-AEKGTTWT.mjs} +2 -2
- package/dist/{chunk-R7VCWGZ2.mjs → chunk-CEE3Y7RM.mjs} +1 -1
- package/dist/{chunk-BY7XUH2G.mjs → chunk-F3ZHQCAZ.mjs} +162 -157
- package/dist/{chunk-H7SOGPWV.mjs → chunk-H57WOA7R.mjs} +309 -22
- package/dist/{chunk-43COQWMG.mjs → chunk-HMKFI7SL.mjs} +19 -19
- package/dist/{chunk-G3M3ZN6T.mjs → chunk-K7B6G3FP.mjs} +6 -6
- package/dist/{chunk-EHHAQWN3.mjs → chunk-KHHYAMUK.mjs} +12 -12
- package/dist/{chunk-ENRF2K6M.mjs → chunk-W27BU2E4.mjs} +72 -355
- package/dist/{chunk-PNVVO6MW.mjs → chunk-YZ62XZX5.mjs} +2 -2
- package/dist/{dist-es-XKOZULQT.mjs → dist-es-76ZS5ZGX.mjs} +19 -19
- package/dist/{dist-es-HC7MGS4M.mjs → dist-es-DRC4RUDF.mjs} +18 -18
- package/dist/{dist-es-VFOQQKFA.mjs → dist-es-FTV27CJE.mjs} +3 -3
- package/dist/{dist-es-WSBAYZQI.mjs → dist-es-MVWFIO2N.mjs} +7 -7
- package/dist/{dist-es-DZIRR447.mjs → dist-es-PGBT2GSM.mjs} +27 -27
- package/dist/{dist-es-URIWYPPF.mjs → dist-es-TKQAVPOM.mjs} +12 -14
- package/dist/{dist-es-I6P57CZS.mjs → dist-es-X7XEFTLU.mjs} +7 -7
- package/dist/index.mjs +3 -3
- package/dist/{interactive-OHZFZVXH.mjs → interactive-TRUNJWJL.mjs} +1 -1
- package/dist/{loadSso-WA3733QO.mjs → loadSso-PADWQIUG.mjs} +109 -148
- package/dist/{signin-QNS25VI4.mjs → signin-4DZRTUJH.mjs} +123 -177
- package/dist/{sso-oidc-KJ5X6WUQ.mjs → sso-oidc-VICR4TNH.mjs} +111 -150
- package/dist/{sts-7OF5CJSW.mjs → sts-WJPOT3CH.mjs} +2853 -660
- package/package.json +1 -1
- package/dist/chunk-GXZPN42X.mjs +0 -178
- package/dist/event-streams-T3U3ZQLC.mjs +0 -247
|
@@ -2,21 +2,21 @@
|
|
|
2
2
|
import {
|
|
3
3
|
loadConfig,
|
|
4
4
|
parseUrl
|
|
5
|
-
} from "./chunk-
|
|
6
|
-
import "./chunk-
|
|
7
|
-
import "./chunk-
|
|
5
|
+
} from "./chunk-KHHYAMUK.mjs";
|
|
6
|
+
import "./chunk-YZ62XZX5.mjs";
|
|
7
|
+
import "./chunk-HMKFI7SL.mjs";
|
|
8
8
|
import {
|
|
9
9
|
CredentialsProviderError,
|
|
10
10
|
ProviderError
|
|
11
|
-
} from "./chunk-
|
|
11
|
+
} from "./chunk-AEKGTTWT.mjs";
|
|
12
12
|
import {
|
|
13
13
|
__publicField
|
|
14
14
|
} from "./chunk-FFDYI4OH.mjs";
|
|
15
15
|
|
|
16
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
16
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
|
|
17
17
|
import { parse } from "url";
|
|
18
18
|
|
|
19
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
19
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/httpRequest.js
|
|
20
20
|
import { Buffer } from "buffer";
|
|
21
21
|
import { request } from "http";
|
|
22
22
|
function httpRequest(options) {
|
|
@@ -53,7 +53,7 @@ function httpRequest(options) {
|
|
|
53
53
|
});
|
|
54
54
|
}
|
|
55
55
|
|
|
56
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
56
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/ImdsCredentials.js
|
|
57
57
|
var isImdsCredentials = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.AccessKeyId === "string" && typeof arg.SecretAccessKey === "string" && typeof arg.Token === "string" && typeof arg.Expiration === "string";
|
|
58
58
|
var fromImdsCredentials = (creds) => ({
|
|
59
59
|
accessKeyId: creds.AccessKeyId,
|
|
@@ -63,12 +63,12 @@ var fromImdsCredentials = (creds) => ({
|
|
|
63
63
|
...creds.AccountId && { accountId: creds.AccountId }
|
|
64
64
|
});
|
|
65
65
|
|
|
66
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
66
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/RemoteProviderInit.js
|
|
67
67
|
var DEFAULT_TIMEOUT = 1e3;
|
|
68
68
|
var DEFAULT_MAX_RETRIES = 0;
|
|
69
69
|
var providerConfigFromInit = ({ maxRetries = DEFAULT_MAX_RETRIES, timeout = DEFAULT_TIMEOUT }) => ({ maxRetries, timeout });
|
|
70
70
|
|
|
71
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
71
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/retry.js
|
|
72
72
|
var retry = (toRetry, maxRetries) => {
|
|
73
73
|
let promise = toRetry();
|
|
74
74
|
for (let i = 0; i < maxRetries; i++) {
|
|
@@ -77,7 +77,7 @@ var retry = (toRetry, maxRetries) => {
|
|
|
77
77
|
return promise;
|
|
78
78
|
};
|
|
79
79
|
|
|
80
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
80
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
|
|
81
81
|
var ENV_CMDS_FULL_URI = "AWS_CONTAINER_CREDENTIALS_FULL_URI";
|
|
82
82
|
var ENV_CMDS_RELATIVE_URI = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI";
|
|
83
83
|
var ENV_CMDS_AUTH_TOKEN = "AWS_CONTAINER_AUTHORIZATION_TOKEN";
|
|
@@ -148,7 +148,7 @@ var getCmdsUri = async ({ logger }) => {
|
|
|
148
148
|
});
|
|
149
149
|
};
|
|
150
150
|
|
|
151
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
151
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/error/InstanceMetadataV1FallbackError.js
|
|
152
152
|
var InstanceMetadataV1FallbackError = class _InstanceMetadataV1FallbackError extends CredentialsProviderError {
|
|
153
153
|
constructor(message, tryNextLink = true) {
|
|
154
154
|
super(message, tryNextLink);
|
|
@@ -159,14 +159,14 @@ var InstanceMetadataV1FallbackError = class _InstanceMetadataV1FallbackError ext
|
|
|
159
159
|
}
|
|
160
160
|
};
|
|
161
161
|
|
|
162
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
162
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/Endpoint.js
|
|
163
163
|
var Endpoint;
|
|
164
164
|
(function(Endpoint2) {
|
|
165
165
|
Endpoint2["IPv4"] = "http://169.254.169.254";
|
|
166
166
|
Endpoint2["IPv6"] = "http://[fd00:ec2::254]";
|
|
167
167
|
})(Endpoint || (Endpoint = {}));
|
|
168
168
|
|
|
169
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
169
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointConfigOptions.js
|
|
170
170
|
var ENV_ENDPOINT_NAME = "AWS_EC2_METADATA_SERVICE_ENDPOINT";
|
|
171
171
|
var CONFIG_ENDPOINT_NAME = "ec2_metadata_service_endpoint";
|
|
172
172
|
var ENDPOINT_CONFIG_OPTIONS = {
|
|
@@ -175,14 +175,14 @@ var ENDPOINT_CONFIG_OPTIONS = {
|
|
|
175
175
|
default: void 0
|
|
176
176
|
};
|
|
177
177
|
|
|
178
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
178
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointMode.js
|
|
179
179
|
var EndpointMode;
|
|
180
180
|
(function(EndpointMode2) {
|
|
181
181
|
EndpointMode2["IPv4"] = "IPv4";
|
|
182
182
|
EndpointMode2["IPv6"] = "IPv6";
|
|
183
183
|
})(EndpointMode || (EndpointMode = {}));
|
|
184
184
|
|
|
185
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
185
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointModeConfigOptions.js
|
|
186
186
|
var ENV_ENDPOINT_MODE_NAME = "AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE";
|
|
187
187
|
var CONFIG_ENDPOINT_MODE_NAME = "ec2_metadata_service_endpoint_mode";
|
|
188
188
|
var ENDPOINT_MODE_CONFIG_OPTIONS = {
|
|
@@ -191,7 +191,7 @@ var ENDPOINT_MODE_CONFIG_OPTIONS = {
|
|
|
191
191
|
default: EndpointMode.IPv4
|
|
192
192
|
};
|
|
193
193
|
|
|
194
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
194
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/getInstanceMetadataEndpoint.js
|
|
195
195
|
var getInstanceMetadataEndpoint = async () => parseUrl(await getFromEndpointConfig() || await getFromEndpointModeConfig());
|
|
196
196
|
var getFromEndpointConfig = async () => loadConfig(ENDPOINT_CONFIG_OPTIONS)();
|
|
197
197
|
var getFromEndpointModeConfig = async () => {
|
|
@@ -206,7 +206,7 @@ var getFromEndpointModeConfig = async () => {
|
|
|
206
206
|
}
|
|
207
207
|
};
|
|
208
208
|
|
|
209
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
209
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/getExtendedInstanceMetadataCredentials.js
|
|
210
210
|
var STATIC_STABILITY_REFRESH_INTERVAL_SECONDS = 5 * 60;
|
|
211
211
|
var STATIC_STABILITY_REFRESH_INTERVAL_JITTER_WINDOW_SECONDS = 5 * 60;
|
|
212
212
|
var STATIC_STABILITY_DOC_URL = "https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html";
|
|
@@ -223,7 +223,7 @@ For more information, please visit: ` + STATIC_STABILITY_DOC_URL);
|
|
|
223
223
|
};
|
|
224
224
|
};
|
|
225
225
|
|
|
226
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
226
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/staticStabilityProvider.js
|
|
227
227
|
var staticStabilityProvider = (provider, options = {}) => {
|
|
228
228
|
const logger = options?.logger || console;
|
|
229
229
|
let pastCredentials;
|
|
@@ -247,7 +247,7 @@ var staticStabilityProvider = (provider, options = {}) => {
|
|
|
247
247
|
};
|
|
248
248
|
};
|
|
249
249
|
|
|
250
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
250
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromInstanceMetadata.js
|
|
251
251
|
var IMDS_PATH = "/latest/meta-data/iam/security-credentials/";
|
|
252
252
|
var IMDS_TOKEN_PATH = "/latest/api/token";
|
|
253
253
|
var AWS_EC2_METADATA_V1_DISABLED = "AWS_EC2_METADATA_V1_DISABLED";
|
|
@@ -5,19 +5,19 @@ import {
|
|
|
5
5
|
getSSOTokenFromFile,
|
|
6
6
|
loadSsoSessionData,
|
|
7
7
|
parseKnownFiles
|
|
8
|
-
} from "./chunk-
|
|
8
|
+
} from "./chunk-HMKFI7SL.mjs";
|
|
9
9
|
import {
|
|
10
10
|
setCredentialFeature
|
|
11
|
-
} from "./chunk-
|
|
11
|
+
} from "./chunk-CEE3Y7RM.mjs";
|
|
12
12
|
import {
|
|
13
13
|
CredentialsProviderError,
|
|
14
14
|
ProviderError
|
|
15
|
-
} from "./chunk-
|
|
15
|
+
} from "./chunk-AEKGTTWT.mjs";
|
|
16
16
|
import {
|
|
17
17
|
__publicField
|
|
18
18
|
} from "./chunk-FFDYI4OH.mjs";
|
|
19
19
|
|
|
20
|
-
// ../node_modules/.bun/@smithy+property-provider@4.2.
|
|
20
|
+
// ../node_modules/.bun/@smithy+property-provider@4.2.14/node_modules/@smithy/property-provider/dist-es/TokenProviderError.js
|
|
21
21
|
var TokenProviderError = class _TokenProviderError extends ProviderError {
|
|
22
22
|
constructor(message, options = true) {
|
|
23
23
|
super(message, options);
|
|
@@ -26,16 +26,16 @@ var TokenProviderError = class _TokenProviderError extends ProviderError {
|
|
|
26
26
|
}
|
|
27
27
|
};
|
|
28
28
|
|
|
29
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.
|
|
29
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
|
|
30
30
|
var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
|
|
31
31
|
|
|
32
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
32
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
|
|
33
33
|
var EXPIRE_WINDOW_MS = 5 * 60 * 1e3;
|
|
34
34
|
var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
|
|
35
35
|
|
|
36
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
36
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
|
|
37
37
|
var getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
|
|
38
|
-
const { SSOOIDCClient } = await import("./sso-oidc-
|
|
38
|
+
const { SSOOIDCClient } = await import("./sso-oidc-VICR4TNH.mjs");
|
|
39
39
|
const coalesce = (prop) => init.clientConfig?.[prop] ?? init.parentClientConfig?.[prop] ?? callerClientConfig?.[prop];
|
|
40
40
|
const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
|
|
41
41
|
region: ssoRegion ?? init.clientConfig?.region,
|
|
@@ -45,9 +45,9 @@ var getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
|
|
|
45
45
|
return ssoOidcClient;
|
|
46
46
|
};
|
|
47
47
|
|
|
48
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
48
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
|
|
49
49
|
var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConfig) => {
|
|
50
|
-
const { CreateTokenCommand } = await import("./sso-oidc-
|
|
50
|
+
const { CreateTokenCommand } = await import("./sso-oidc-VICR4TNH.mjs");
|
|
51
51
|
const ssoOidcClient = await getSsoOidcClient(ssoRegion, init, callerClientConfig);
|
|
52
52
|
return ssoOidcClient.send(new CreateTokenCommand({
|
|
53
53
|
clientId: ssoToken.clientId,
|
|
@@ -57,21 +57,21 @@ var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConf
|
|
|
57
57
|
}));
|
|
58
58
|
};
|
|
59
59
|
|
|
60
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
60
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
|
|
61
61
|
var validateTokenExpiry = (token) => {
|
|
62
62
|
if (token.expiration && token.expiration.getTime() < Date.now()) {
|
|
63
63
|
throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);
|
|
64
64
|
}
|
|
65
65
|
};
|
|
66
66
|
|
|
67
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
67
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
|
|
68
68
|
var validateTokenKey = (key, value, forRefresh = false) => {
|
|
69
69
|
if (typeof value === "undefined") {
|
|
70
70
|
throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${REFRESH_MESSAGE}`, false);
|
|
71
71
|
}
|
|
72
72
|
};
|
|
73
73
|
|
|
74
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
74
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js
|
|
75
75
|
import { promises as fsPromises } from "fs";
|
|
76
76
|
var { writeFile } = fsPromises;
|
|
77
77
|
var writeSSOTokenToFile = (id, ssoToken) => {
|
|
@@ -80,7 +80,7 @@ var writeSSOTokenToFile = (id, ssoToken) => {
|
|
|
80
80
|
return writeFile(tokenFilepath, tokenString);
|
|
81
81
|
};
|
|
82
82
|
|
|
83
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
83
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
|
|
84
84
|
var lastRefreshAttemptTime = /* @__PURE__ */ new Date(0);
|
|
85
85
|
var fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
86
86
|
init.logger?.debug("@aws-sdk/token-providers - fromSso");
|
|
@@ -152,7 +152,7 @@ var fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
|
152
152
|
}
|
|
153
153
|
};
|
|
154
154
|
|
|
155
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.
|
|
155
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
|
|
156
156
|
var SHOULD_FAIL_CREDENTIAL_CHAIN = false;
|
|
157
157
|
var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger }) => {
|
|
158
158
|
let token;
|
|
@@ -192,7 +192,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
|
|
|
192
192
|
});
|
|
193
193
|
}
|
|
194
194
|
const { accessToken } = token;
|
|
195
|
-
const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-
|
|
195
|
+
const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-PADWQIUG.mjs");
|
|
196
196
|
const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
|
|
197
197
|
logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
|
|
198
198
|
region: clientConfig?.region ?? ssoRegion,
|
|
@@ -234,7 +234,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
|
|
|
234
234
|
return credentials;
|
|
235
235
|
};
|
|
236
236
|
|
|
237
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.
|
|
237
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
|
|
238
238
|
var validateSsoProfile = (profile, logger) => {
|
|
239
239
|
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
|
|
240
240
|
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
|
|
@@ -244,7 +244,7 @@ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.ht
|
|
|
244
244
|
return profile;
|
|
245
245
|
};
|
|
246
246
|
|
|
247
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.
|
|
247
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
|
|
248
248
|
var fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
249
249
|
init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
|
|
250
250
|
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
#!/usr/bin/env bun
|
|
2
2
|
import {
|
|
3
3
|
setCredentialFeature
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-CEE3Y7RM.mjs";
|
|
5
5
|
import {
|
|
6
6
|
CredentialsProviderError
|
|
7
|
-
} from "./chunk-
|
|
7
|
+
} from "./chunk-AEKGTTWT.mjs";
|
|
8
8
|
import "./chunk-FFDYI4OH.mjs";
|
|
9
9
|
|
|
10
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-env@3.972.
|
|
10
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-env@3.972.34/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js
|
|
11
11
|
var ENV_KEY = "AWS_ACCESS_KEY_ID";
|
|
12
12
|
var ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
|
|
13
13
|
var ENV_SESSION = "AWS_SESSION_TOKEN";
|
|
@@ -1,25 +1,25 @@
|
|
|
1
1
|
#!/usr/bin/env bun
|
|
2
2
|
import {
|
|
3
3
|
externalDataInterceptor
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-HMKFI7SL.mjs";
|
|
5
5
|
import {
|
|
6
6
|
setCredentialFeature
|
|
7
|
-
} from "./chunk-
|
|
7
|
+
} from "./chunk-CEE3Y7RM.mjs";
|
|
8
8
|
import {
|
|
9
9
|
CredentialsProviderError
|
|
10
|
-
} from "./chunk-
|
|
10
|
+
} from "./chunk-AEKGTTWT.mjs";
|
|
11
11
|
import "./chunk-FFDYI4OH.mjs";
|
|
12
12
|
|
|
13
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.
|
|
13
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
|
|
14
14
|
import { readFileSync } from "fs";
|
|
15
15
|
|
|
16
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.
|
|
16
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js
|
|
17
17
|
var fromWebToken = (init) => async (awsIdentityProperties) => {
|
|
18
18
|
init.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");
|
|
19
19
|
const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
|
|
20
20
|
let { roleAssumerWithWebIdentity } = init;
|
|
21
21
|
if (!roleAssumerWithWebIdentity) {
|
|
22
|
-
const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-
|
|
22
|
+
const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-WJPOT3CH.mjs");
|
|
23
23
|
roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
|
|
24
24
|
...init.clientConfig,
|
|
25
25
|
credentialProviderLogger: init.logger,
|
|
@@ -40,7 +40,7 @@ var fromWebToken = (init) => async (awsIdentityProperties) => {
|
|
|
40
40
|
});
|
|
41
41
|
};
|
|
42
42
|
|
|
43
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.
|
|
43
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
|
|
44
44
|
var ENV_TOKEN_FILE = "AWS_WEB_IDENTITY_TOKEN_FILE";
|
|
45
45
|
var ENV_ROLE_ARN = "AWS_ROLE_ARN";
|
|
46
46
|
var ENV_ROLE_SESSION_NAME = "AWS_ROLE_SESSION_NAME";
|
|
@@ -1,42 +1,42 @@
|
|
|
1
1
|
#!/usr/bin/env bun
|
|
2
2
|
import {
|
|
3
3
|
chain
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-YZ62XZX5.mjs";
|
|
5
|
+
import {
|
|
6
|
+
HttpRequest
|
|
7
|
+
} from "./chunk-6E4PAXC5.mjs";
|
|
5
8
|
import {
|
|
6
9
|
getProfileName,
|
|
7
10
|
parseKnownFiles,
|
|
8
11
|
readFile
|
|
9
|
-
} from "./chunk-
|
|
10
|
-
import {
|
|
11
|
-
HttpRequest
|
|
12
|
-
} from "./chunk-HDHAEUVR.mjs";
|
|
12
|
+
} from "./chunk-HMKFI7SL.mjs";
|
|
13
13
|
import {
|
|
14
14
|
setCredentialFeature
|
|
15
|
-
} from "./chunk-
|
|
15
|
+
} from "./chunk-CEE3Y7RM.mjs";
|
|
16
16
|
import {
|
|
17
17
|
CredentialsProviderError
|
|
18
|
-
} from "./chunk-
|
|
18
|
+
} from "./chunk-AEKGTTWT.mjs";
|
|
19
19
|
import {
|
|
20
20
|
__publicField
|
|
21
21
|
} from "./chunk-FFDYI4OH.mjs";
|
|
22
22
|
|
|
23
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
23
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
|
|
24
24
|
var resolveCredentialSource = (credentialSource, profileName, logger) => {
|
|
25
25
|
const sourceProvidersMap = {
|
|
26
26
|
EcsContainer: async (options) => {
|
|
27
|
-
const { fromHttp } = await import("./dist-es-
|
|
28
|
-
const { fromContainerMetadata } = await import("./dist-es-
|
|
27
|
+
const { fromHttp } = await import("./dist-es-TKQAVPOM.mjs");
|
|
28
|
+
const { fromContainerMetadata } = await import("./dist-es-76ZS5ZGX.mjs");
|
|
29
29
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
|
|
30
30
|
return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
|
|
31
31
|
},
|
|
32
32
|
Ec2InstanceMetadata: async (options) => {
|
|
33
33
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
|
|
34
|
-
const { fromInstanceMetadata } = await import("./dist-es-
|
|
34
|
+
const { fromInstanceMetadata } = await import("./dist-es-76ZS5ZGX.mjs");
|
|
35
35
|
return async () => fromInstanceMetadata(options)().then(setNamedProvider);
|
|
36
36
|
},
|
|
37
37
|
Environment: async (options) => {
|
|
38
38
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
|
|
39
|
-
const { fromEnv } = await import("./dist-es-
|
|
39
|
+
const { fromEnv } = await import("./dist-es-FTV27CJE.mjs");
|
|
40
40
|
return async () => fromEnv(options)().then(setNamedProvider);
|
|
41
41
|
}
|
|
42
42
|
};
|
|
@@ -48,7 +48,7 @@ var resolveCredentialSource = (credentialSource, profileName, logger) => {
|
|
|
48
48
|
};
|
|
49
49
|
var setNamedProvider = (creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p");
|
|
50
50
|
|
|
51
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
51
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
|
|
52
52
|
var isAssumeRoleProfile = (arg, { profile = "default", logger } = {}) => {
|
|
53
53
|
return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger }));
|
|
54
54
|
};
|
|
@@ -71,7 +71,7 @@ var resolveAssumeRoleCredentials = async (profileName, profiles, options, caller
|
|
|
71
71
|
const profileData = profiles[profileName];
|
|
72
72
|
const { source_profile, region } = profileData;
|
|
73
73
|
if (!options.roleAssumer) {
|
|
74
|
-
const { getDefaultRoleAssumer } = await import("./sts-
|
|
74
|
+
const { getDefaultRoleAssumer } = await import("./sts-WJPOT3CH.mjs");
|
|
75
75
|
options.roleAssumer = getDefaultRoleAssumer({
|
|
76
76
|
...options.clientConfig,
|
|
77
77
|
credentialProviderLogger: options.logger,
|
|
@@ -115,7 +115,7 @@ var isCredentialSourceWithoutRoleArn = (section) => {
|
|
|
115
115
|
return !section.role_arn && !!section.credential_source;
|
|
116
116
|
};
|
|
117
117
|
|
|
118
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.
|
|
118
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.38/node_modules/@aws-sdk/credential-provider-login/dist-es/LoginCredentialsFetcher.js
|
|
119
119
|
import { createHash, createPrivateKey, createPublicKey, sign } from "crypto";
|
|
120
120
|
import { promises as fs } from "fs";
|
|
121
121
|
import { homedir } from "os";
|
|
@@ -156,7 +156,7 @@ var _LoginCredentialsFetcher = class _LoginCredentialsFetcher {
|
|
|
156
156
|
return this.profileData.login_session;
|
|
157
157
|
}
|
|
158
158
|
async refresh(token) {
|
|
159
|
-
const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-
|
|
159
|
+
const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-4DZRTUJH.mjs");
|
|
160
160
|
const { logger, userAgentAppId } = this.callerClientConfig ?? {};
|
|
161
161
|
const isH2 = (requestHandler2) => {
|
|
162
162
|
return requestHandler2?.metadata?.handlerProtocol === "h2";
|
|
@@ -368,7 +368,7 @@ var _LoginCredentialsFetcher = class _LoginCredentialsFetcher {
|
|
|
368
368
|
__publicField(_LoginCredentialsFetcher, "REFRESH_THRESHOLD", 5 * 60 * 1e3);
|
|
369
369
|
var LoginCredentialsFetcher = _LoginCredentialsFetcher;
|
|
370
370
|
|
|
371
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.
|
|
371
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.38/node_modules/@aws-sdk/credential-provider-login/dist-es/fromLoginCredentials.js
|
|
372
372
|
var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
|
|
373
373
|
init?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");
|
|
374
374
|
const profiles = await parseKnownFiles(init || {});
|
|
@@ -387,7 +387,7 @@ var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
|
|
|
387
387
|
return setCredentialFeature(credentials, "CREDENTIALS_LOGIN", "AD");
|
|
388
388
|
};
|
|
389
389
|
|
|
390
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
390
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveLoginCredentials.js
|
|
391
391
|
var isLoginProfile = (data) => {
|
|
392
392
|
return Boolean(data && data.login_session);
|
|
393
393
|
};
|
|
@@ -399,16 +399,16 @@ var resolveLoginCredentials = async (profileName, options, callerClientConfig) =
|
|
|
399
399
|
return setCredentialFeature(credentials, "CREDENTIALS_PROFILE_LOGIN", "AC");
|
|
400
400
|
};
|
|
401
401
|
|
|
402
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
402
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
|
|
403
403
|
var isProcessProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string";
|
|
404
|
-
var resolveProcessCredentials = async (options, profile) => import("./dist-es-
|
|
404
|
+
var resolveProcessCredentials = async (options, profile) => import("./dist-es-X7XEFTLU.mjs").then(({ fromProcess }) => fromProcess({
|
|
405
405
|
...options,
|
|
406
406
|
profile
|
|
407
407
|
})().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v")));
|
|
408
408
|
|
|
409
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
409
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
|
|
410
410
|
var resolveSsoCredentials = async (profile, profileData, options = {}, callerClientConfig) => {
|
|
411
|
-
const { fromSSO } = await import("./dist-es-
|
|
411
|
+
const { fromSSO } = await import("./dist-es-DRC4RUDF.mjs");
|
|
412
412
|
return fromSSO({
|
|
413
413
|
profile,
|
|
414
414
|
logger: options.logger,
|
|
@@ -426,7 +426,7 @@ var resolveSsoCredentials = async (profile, profileData, options = {}, callerCli
|
|
|
426
426
|
};
|
|
427
427
|
var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
|
|
428
428
|
|
|
429
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
429
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
|
|
430
430
|
var isStaticCredsProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1 && ["undefined", "string"].indexOf(typeof arg.aws_account_id) > -1;
|
|
431
431
|
var resolveStaticCredentials = async (profile, options) => {
|
|
432
432
|
options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
|
|
@@ -440,9 +440,9 @@ var resolveStaticCredentials = async (profile, options) => {
|
|
|
440
440
|
return setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
|
|
441
441
|
};
|
|
442
442
|
|
|
443
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
443
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
|
|
444
444
|
var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
445
|
-
var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-
|
|
445
|
+
var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-MVWFIO2N.mjs").then(({ fromTokenFile }) => fromTokenFile({
|
|
446
446
|
webIdentityTokenFile: profile.web_identity_token_file,
|
|
447
447
|
roleArn: profile.role_arn,
|
|
448
448
|
roleSessionName: profile.role_session_name,
|
|
@@ -453,7 +453,7 @@ var resolveWebIdentityCredentials = async (profile, options, callerClientConfig)
|
|
|
453
453
|
callerClientConfig
|
|
454
454
|
}).then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q")));
|
|
455
455
|
|
|
456
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
456
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
|
|
457
457
|
var resolveProfileData = async (profileName, profiles, options, callerClientConfig, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
|
|
458
458
|
const data = profiles[profileName];
|
|
459
459
|
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
@@ -480,7 +480,7 @@ var resolveProfileData = async (profileName, profiles, options, callerClientConf
|
|
|
480
480
|
throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });
|
|
481
481
|
};
|
|
482
482
|
|
|
483
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
483
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
|
|
484
484
|
var fromIni = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
485
485
|
init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
|
|
486
486
|
const profiles = await parseKnownFiles(init);
|
|
@@ -1,29 +1,27 @@
|
|
|
1
1
|
#!/usr/bin/env bun
|
|
2
|
-
import {
|
|
3
|
-
parseRfc3339DateTime
|
|
4
|
-
} from "./chunk-GXZPN42X.mjs";
|
|
5
2
|
import {
|
|
6
3
|
sdkStreamMixin
|
|
7
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-K7B6G3FP.mjs";
|
|
8
5
|
import {
|
|
9
|
-
NodeHttpHandler
|
|
10
|
-
|
|
6
|
+
NodeHttpHandler,
|
|
7
|
+
parseRfc3339DateTime
|
|
8
|
+
} from "./chunk-H57WOA7R.mjs";
|
|
11
9
|
import {
|
|
12
10
|
HttpRequest
|
|
13
|
-
} from "./chunk-
|
|
11
|
+
} from "./chunk-6E4PAXC5.mjs";
|
|
14
12
|
import "./chunk-S6VA5TIO.mjs";
|
|
15
13
|
import {
|
|
16
14
|
setCredentialFeature
|
|
17
|
-
} from "./chunk-
|
|
15
|
+
} from "./chunk-CEE3Y7RM.mjs";
|
|
18
16
|
import {
|
|
19
17
|
CredentialsProviderError
|
|
20
|
-
} from "./chunk-
|
|
18
|
+
} from "./chunk-AEKGTTWT.mjs";
|
|
21
19
|
import "./chunk-FFDYI4OH.mjs";
|
|
22
20
|
|
|
23
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
21
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
|
|
24
22
|
import fs from "fs/promises";
|
|
25
23
|
|
|
26
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
24
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/checkUrl.js
|
|
27
25
|
var ECS_CONTAINER_HOST = "169.254.170.2";
|
|
28
26
|
var EKS_CONTAINER_HOST_IPv4 = "169.254.170.23";
|
|
29
27
|
var EKS_CONTAINER_HOST_IPv6 = "[fd00:ec2::23]";
|
|
@@ -57,7 +55,7 @@ var checkUrl = (url, logger) => {
|
|
|
57
55
|
- EKS container host 169.254.170.23 or [fd00:ec2::23]`, { logger });
|
|
58
56
|
};
|
|
59
57
|
|
|
60
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
58
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js
|
|
61
59
|
function createGetRequest(url) {
|
|
62
60
|
return new HttpRequest({
|
|
63
61
|
protocol: url.protocol,
|
|
@@ -100,7 +98,7 @@ async function getCredentials(response, logger) {
|
|
|
100
98
|
throw new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger });
|
|
101
99
|
}
|
|
102
100
|
|
|
103
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
101
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/retry-wrapper.js
|
|
104
102
|
var retryWrapper = (toRetry, maxRetries, delayMs) => {
|
|
105
103
|
return async () => {
|
|
106
104
|
for (let i = 0; i < maxRetries; ++i) {
|
|
@@ -114,7 +112,7 @@ var retryWrapper = (toRetry, maxRetries, delayMs) => {
|
|
|
114
112
|
};
|
|
115
113
|
};
|
|
116
114
|
|
|
117
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
115
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
|
|
118
116
|
var AWS_CONTAINER_CREDENTIALS_RELATIVE_URI = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI";
|
|
119
117
|
var DEFAULT_LINK_LOCAL_HOST = "http://169.254.170.2";
|
|
120
118
|
var AWS_CONTAINER_CREDENTIALS_FULL_URI = "AWS_CONTAINER_CREDENTIALS_FULL_URI";
|
|
@@ -3,20 +3,20 @@ import {
|
|
|
3
3
|
externalDataInterceptor,
|
|
4
4
|
getProfileName,
|
|
5
5
|
parseKnownFiles
|
|
6
|
-
} from "./chunk-
|
|
6
|
+
} from "./chunk-HMKFI7SL.mjs";
|
|
7
7
|
import {
|
|
8
8
|
setCredentialFeature
|
|
9
|
-
} from "./chunk-
|
|
9
|
+
} from "./chunk-CEE3Y7RM.mjs";
|
|
10
10
|
import {
|
|
11
11
|
CredentialsProviderError
|
|
12
|
-
} from "./chunk-
|
|
12
|
+
} from "./chunk-AEKGTTWT.mjs";
|
|
13
13
|
import "./chunk-FFDYI4OH.mjs";
|
|
14
14
|
|
|
15
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.
|
|
15
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
|
|
16
16
|
import { exec } from "child_process";
|
|
17
17
|
import { promisify } from "util";
|
|
18
18
|
|
|
19
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.
|
|
19
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js
|
|
20
20
|
var getValidatedProcessCredentials = (profileName, data, profiles) => {
|
|
21
21
|
if (data.Version !== 1) {
|
|
22
22
|
throw Error(`Profile ${profileName} credential_process did not return Version 1.`);
|
|
@@ -47,7 +47,7 @@ var getValidatedProcessCredentials = (profileName, data, profiles) => {
|
|
|
47
47
|
return credentials;
|
|
48
48
|
};
|
|
49
49
|
|
|
50
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.
|
|
50
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
|
|
51
51
|
var resolveProcessCredentials = async (profileName, profiles, logger) => {
|
|
52
52
|
const profile = profiles[profileName];
|
|
53
53
|
if (profiles[profileName]) {
|
|
@@ -76,7 +76,7 @@ var resolveProcessCredentials = async (profileName, profiles, logger) => {
|
|
|
76
76
|
}
|
|
77
77
|
};
|
|
78
78
|
|
|
79
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.
|
|
79
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js
|
|
80
80
|
var fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
81
81
|
init.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");
|
|
82
82
|
const profiles = await parseKnownFiles(init);
|
package/dist/index.mjs
CHANGED
|
@@ -19,7 +19,7 @@ import {
|
|
|
19
19
|
setIdeCommand,
|
|
20
20
|
setOrganizationId,
|
|
21
21
|
writeConfig
|
|
22
|
-
} from "./chunk-
|
|
22
|
+
} from "./chunk-F3ZHQCAZ.mjs";
|
|
23
23
|
import "./chunk-FFDYI4OH.mjs";
|
|
24
24
|
|
|
25
25
|
// src/index.ts
|
|
@@ -2497,12 +2497,12 @@ async function interactiveCommand() {
|
|
|
2497
2497
|
);
|
|
2498
2498
|
}
|
|
2499
2499
|
console.log(chalk18.gray("Starting interactive mode..."));
|
|
2500
|
-
const { launchInteractive } = await import("./interactive-
|
|
2500
|
+
const { launchInteractive } = await import("./interactive-TRUNJWJL.mjs");
|
|
2501
2501
|
await launchInteractive();
|
|
2502
2502
|
}
|
|
2503
2503
|
|
|
2504
2504
|
// src/index.ts
|
|
2505
|
-
var CLI_VERSION = "0.2.
|
|
2505
|
+
var CLI_VERSION = "0.2.123";
|
|
2506
2506
|
var program = new Command();
|
|
2507
2507
|
program.name("replicas").description("CLI for managing Replicas workspaces").version(CLI_VERSION);
|
|
2508
2508
|
program.command("login").description("Authenticate with your Replicas account").action(async () => {
|