replicas-cli 0.2.122 → 0.2.124

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (27) hide show
  1. package/dist/{chunk-NH63C5BC.mjs → chunk-4KZFIKR3.mjs} +1077 -1230
  2. package/dist/{chunk-HDHAEUVR.mjs → chunk-6E4PAXC5.mjs} +1 -1
  3. package/dist/{chunk-OMR2FLSI.mjs → chunk-AEKGTTWT.mjs} +2 -2
  4. package/dist/{chunk-R7VCWGZ2.mjs → chunk-CEE3Y7RM.mjs} +1 -1
  5. package/dist/{chunk-H7SOGPWV.mjs → chunk-H57WOA7R.mjs} +309 -22
  6. package/dist/{chunk-43COQWMG.mjs → chunk-HMKFI7SL.mjs} +19 -19
  7. package/dist/{chunk-G3M3ZN6T.mjs → chunk-K7B6G3FP.mjs} +6 -6
  8. package/dist/{chunk-EHHAQWN3.mjs → chunk-KHHYAMUK.mjs} +12 -12
  9. package/dist/{chunk-BY7XUH2G.mjs → chunk-R2544D2G.mjs} +162 -157
  10. package/dist/{chunk-ENRF2K6M.mjs → chunk-W27BU2E4.mjs} +72 -355
  11. package/dist/{chunk-PNVVO6MW.mjs → chunk-YZ62XZX5.mjs} +2 -2
  12. package/dist/{dist-es-XKOZULQT.mjs → dist-es-76ZS5ZGX.mjs} +19 -19
  13. package/dist/{dist-es-HC7MGS4M.mjs → dist-es-DRC4RUDF.mjs} +18 -18
  14. package/dist/{dist-es-VFOQQKFA.mjs → dist-es-FTV27CJE.mjs} +3 -3
  15. package/dist/{dist-es-WSBAYZQI.mjs → dist-es-MVWFIO2N.mjs} +7 -7
  16. package/dist/{dist-es-DZIRR447.mjs → dist-es-PGBT2GSM.mjs} +27 -27
  17. package/dist/{dist-es-URIWYPPF.mjs → dist-es-TKQAVPOM.mjs} +12 -14
  18. package/dist/{dist-es-I6P57CZS.mjs → dist-es-X7XEFTLU.mjs} +7 -7
  19. package/dist/index.mjs +3 -3
  20. package/dist/{interactive-OHZFZVXH.mjs → interactive-7BC3ZOP6.mjs} +1 -1
  21. package/dist/{loadSso-WA3733QO.mjs → loadSso-PADWQIUG.mjs} +109 -148
  22. package/dist/{signin-QNS25VI4.mjs → signin-4DZRTUJH.mjs} +123 -177
  23. package/dist/{sso-oidc-KJ5X6WUQ.mjs → sso-oidc-VICR4TNH.mjs} +111 -150
  24. package/dist/{sts-7OF5CJSW.mjs → sts-WJPOT3CH.mjs} +2853 -660
  25. package/package.json +1 -1
  26. package/dist/chunk-GXZPN42X.mjs +0 -178
  27. package/dist/event-streams-T3U3ZQLC.mjs +0 -247
@@ -2,21 +2,21 @@
2
2
  import {
3
3
  loadConfig,
4
4
  parseUrl
5
- } from "./chunk-EHHAQWN3.mjs";
6
- import "./chunk-PNVVO6MW.mjs";
7
- import "./chunk-43COQWMG.mjs";
5
+ } from "./chunk-KHHYAMUK.mjs";
6
+ import "./chunk-YZ62XZX5.mjs";
7
+ import "./chunk-HMKFI7SL.mjs";
8
8
  import {
9
9
  CredentialsProviderError,
10
10
  ProviderError
11
- } from "./chunk-OMR2FLSI.mjs";
11
+ } from "./chunk-AEKGTTWT.mjs";
12
12
  import {
13
13
  __publicField
14
14
  } from "./chunk-FFDYI4OH.mjs";
15
15
 
16
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
16
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
17
17
  import { parse } from "url";
18
18
 
19
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/httpRequest.js
19
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/httpRequest.js
20
20
  import { Buffer } from "buffer";
21
21
  import { request } from "http";
22
22
  function httpRequest(options) {
@@ -53,7 +53,7 @@ function httpRequest(options) {
53
53
  });
54
54
  }
55
55
 
56
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/ImdsCredentials.js
56
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/ImdsCredentials.js
57
57
  var isImdsCredentials = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.AccessKeyId === "string" && typeof arg.SecretAccessKey === "string" && typeof arg.Token === "string" && typeof arg.Expiration === "string";
58
58
  var fromImdsCredentials = (creds) => ({
59
59
  accessKeyId: creds.AccessKeyId,
@@ -63,12 +63,12 @@ var fromImdsCredentials = (creds) => ({
63
63
  ...creds.AccountId && { accountId: creds.AccountId }
64
64
  });
65
65
 
66
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/RemoteProviderInit.js
66
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/RemoteProviderInit.js
67
67
  var DEFAULT_TIMEOUT = 1e3;
68
68
  var DEFAULT_MAX_RETRIES = 0;
69
69
  var providerConfigFromInit = ({ maxRetries = DEFAULT_MAX_RETRIES, timeout = DEFAULT_TIMEOUT }) => ({ maxRetries, timeout });
70
70
 
71
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/retry.js
71
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/retry.js
72
72
  var retry = (toRetry, maxRetries) => {
73
73
  let promise = toRetry();
74
74
  for (let i = 0; i < maxRetries; i++) {
@@ -77,7 +77,7 @@ var retry = (toRetry, maxRetries) => {
77
77
  return promise;
78
78
  };
79
79
 
80
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
80
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
81
81
  var ENV_CMDS_FULL_URI = "AWS_CONTAINER_CREDENTIALS_FULL_URI";
82
82
  var ENV_CMDS_RELATIVE_URI = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI";
83
83
  var ENV_CMDS_AUTH_TOKEN = "AWS_CONTAINER_AUTHORIZATION_TOKEN";
@@ -148,7 +148,7 @@ var getCmdsUri = async ({ logger }) => {
148
148
  });
149
149
  };
150
150
 
151
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/error/InstanceMetadataV1FallbackError.js
151
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/error/InstanceMetadataV1FallbackError.js
152
152
  var InstanceMetadataV1FallbackError = class _InstanceMetadataV1FallbackError extends CredentialsProviderError {
153
153
  constructor(message, tryNextLink = true) {
154
154
  super(message, tryNextLink);
@@ -159,14 +159,14 @@ var InstanceMetadataV1FallbackError = class _InstanceMetadataV1FallbackError ext
159
159
  }
160
160
  };
161
161
 
162
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/config/Endpoint.js
162
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/Endpoint.js
163
163
  var Endpoint;
164
164
  (function(Endpoint2) {
165
165
  Endpoint2["IPv4"] = "http://169.254.169.254";
166
166
  Endpoint2["IPv6"] = "http://[fd00:ec2::254]";
167
167
  })(Endpoint || (Endpoint = {}));
168
168
 
169
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointConfigOptions.js
169
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointConfigOptions.js
170
170
  var ENV_ENDPOINT_NAME = "AWS_EC2_METADATA_SERVICE_ENDPOINT";
171
171
  var CONFIG_ENDPOINT_NAME = "ec2_metadata_service_endpoint";
172
172
  var ENDPOINT_CONFIG_OPTIONS = {
@@ -175,14 +175,14 @@ var ENDPOINT_CONFIG_OPTIONS = {
175
175
  default: void 0
176
176
  };
177
177
 
178
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointMode.js
178
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointMode.js
179
179
  var EndpointMode;
180
180
  (function(EndpointMode2) {
181
181
  EndpointMode2["IPv4"] = "IPv4";
182
182
  EndpointMode2["IPv6"] = "IPv6";
183
183
  })(EndpointMode || (EndpointMode = {}));
184
184
 
185
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointModeConfigOptions.js
185
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointModeConfigOptions.js
186
186
  var ENV_ENDPOINT_MODE_NAME = "AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE";
187
187
  var CONFIG_ENDPOINT_MODE_NAME = "ec2_metadata_service_endpoint_mode";
188
188
  var ENDPOINT_MODE_CONFIG_OPTIONS = {
@@ -191,7 +191,7 @@ var ENDPOINT_MODE_CONFIG_OPTIONS = {
191
191
  default: EndpointMode.IPv4
192
192
  };
193
193
 
194
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/utils/getInstanceMetadataEndpoint.js
194
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/getInstanceMetadataEndpoint.js
195
195
  var getInstanceMetadataEndpoint = async () => parseUrl(await getFromEndpointConfig() || await getFromEndpointModeConfig());
196
196
  var getFromEndpointConfig = async () => loadConfig(ENDPOINT_CONFIG_OPTIONS)();
197
197
  var getFromEndpointModeConfig = async () => {
@@ -206,7 +206,7 @@ var getFromEndpointModeConfig = async () => {
206
206
  }
207
207
  };
208
208
 
209
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/utils/getExtendedInstanceMetadataCredentials.js
209
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/getExtendedInstanceMetadataCredentials.js
210
210
  var STATIC_STABILITY_REFRESH_INTERVAL_SECONDS = 5 * 60;
211
211
  var STATIC_STABILITY_REFRESH_INTERVAL_JITTER_WINDOW_SECONDS = 5 * 60;
212
212
  var STATIC_STABILITY_DOC_URL = "https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html";
@@ -223,7 +223,7 @@ For more information, please visit: ` + STATIC_STABILITY_DOC_URL);
223
223
  };
224
224
  };
225
225
 
226
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/utils/staticStabilityProvider.js
226
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/staticStabilityProvider.js
227
227
  var staticStabilityProvider = (provider, options = {}) => {
228
228
  const logger = options?.logger || console;
229
229
  let pastCredentials;
@@ -247,7 +247,7 @@ var staticStabilityProvider = (provider, options = {}) => {
247
247
  };
248
248
  };
249
249
 
250
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/fromInstanceMetadata.js
250
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromInstanceMetadata.js
251
251
  var IMDS_PATH = "/latest/meta-data/iam/security-credentials/";
252
252
  var IMDS_TOKEN_PATH = "/latest/api/token";
253
253
  var AWS_EC2_METADATA_V1_DISABLED = "AWS_EC2_METADATA_V1_DISABLED";
@@ -5,19 +5,19 @@ import {
5
5
  getSSOTokenFromFile,
6
6
  loadSsoSessionData,
7
7
  parseKnownFiles
8
- } from "./chunk-43COQWMG.mjs";
8
+ } from "./chunk-HMKFI7SL.mjs";
9
9
  import {
10
10
  setCredentialFeature
11
- } from "./chunk-R7VCWGZ2.mjs";
11
+ } from "./chunk-CEE3Y7RM.mjs";
12
12
  import {
13
13
  CredentialsProviderError,
14
14
  ProviderError
15
- } from "./chunk-OMR2FLSI.mjs";
15
+ } from "./chunk-AEKGTTWT.mjs";
16
16
  import {
17
17
  __publicField
18
18
  } from "./chunk-FFDYI4OH.mjs";
19
19
 
20
- // ../node_modules/.bun/@smithy+property-provider@4.2.12/node_modules/@smithy/property-provider/dist-es/TokenProviderError.js
20
+ // ../node_modules/.bun/@smithy+property-provider@4.2.14/node_modules/@smithy/property-provider/dist-es/TokenProviderError.js
21
21
  var TokenProviderError = class _TokenProviderError extends ProviderError {
22
22
  constructor(message, options = true) {
23
23
  super(message, options);
@@ -26,16 +26,16 @@ var TokenProviderError = class _TokenProviderError extends ProviderError {
26
26
  }
27
27
  };
28
28
 
29
- // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.28/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
29
+ // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
30
30
  var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
31
31
 
32
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
32
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
33
33
  var EXPIRE_WINDOW_MS = 5 * 60 * 1e3;
34
34
  var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
35
35
 
36
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
36
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
37
37
  var getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
38
- const { SSOOIDCClient } = await import("./sso-oidc-KJ5X6WUQ.mjs");
38
+ const { SSOOIDCClient } = await import("./sso-oidc-VICR4TNH.mjs");
39
39
  const coalesce = (prop) => init.clientConfig?.[prop] ?? init.parentClientConfig?.[prop] ?? callerClientConfig?.[prop];
40
40
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
41
41
  region: ssoRegion ?? init.clientConfig?.region,
@@ -45,9 +45,9 @@ var getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
45
45
  return ssoOidcClient;
46
46
  };
47
47
 
48
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
48
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
49
49
  var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConfig) => {
50
- const { CreateTokenCommand } = await import("./sso-oidc-KJ5X6WUQ.mjs");
50
+ const { CreateTokenCommand } = await import("./sso-oidc-VICR4TNH.mjs");
51
51
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init, callerClientConfig);
52
52
  return ssoOidcClient.send(new CreateTokenCommand({
53
53
  clientId: ssoToken.clientId,
@@ -57,21 +57,21 @@ var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConf
57
57
  }));
58
58
  };
59
59
 
60
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
60
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
61
61
  var validateTokenExpiry = (token) => {
62
62
  if (token.expiration && token.expiration.getTime() < Date.now()) {
63
63
  throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);
64
64
  }
65
65
  };
66
66
 
67
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
67
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
68
68
  var validateTokenKey = (key, value, forRefresh = false) => {
69
69
  if (typeof value === "undefined") {
70
70
  throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${REFRESH_MESSAGE}`, false);
71
71
  }
72
72
  };
73
73
 
74
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js
74
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js
75
75
  import { promises as fsPromises } from "fs";
76
76
  var { writeFile } = fsPromises;
77
77
  var writeSSOTokenToFile = (id, ssoToken) => {
@@ -80,7 +80,7 @@ var writeSSOTokenToFile = (id, ssoToken) => {
80
80
  return writeFile(tokenFilepath, tokenString);
81
81
  };
82
82
 
83
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
83
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
84
84
  var lastRefreshAttemptTime = /* @__PURE__ */ new Date(0);
85
85
  var fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
86
86
  init.logger?.debug("@aws-sdk/token-providers - fromSso");
@@ -152,7 +152,7 @@ var fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
152
152
  }
153
153
  };
154
154
 
155
- // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.28/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
155
+ // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
156
156
  var SHOULD_FAIL_CREDENTIAL_CHAIN = false;
157
157
  var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger }) => {
158
158
  let token;
@@ -192,7 +192,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
192
192
  });
193
193
  }
194
194
  const { accessToken } = token;
195
- const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-WA3733QO.mjs");
195
+ const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-PADWQIUG.mjs");
196
196
  const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
197
197
  logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
198
198
  region: clientConfig?.region ?? ssoRegion,
@@ -234,7 +234,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
234
234
  return credentials;
235
235
  };
236
236
 
237
- // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.28/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
237
+ // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
238
238
  var validateSsoProfile = (profile, logger) => {
239
239
  const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
240
240
  if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
@@ -244,7 +244,7 @@ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.ht
244
244
  return profile;
245
245
  };
246
246
 
247
- // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.28/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
247
+ // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
248
248
  var fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
249
249
  init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
250
250
  const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
@@ -1,13 +1,13 @@
1
1
  #!/usr/bin/env bun
2
2
  import {
3
3
  setCredentialFeature
4
- } from "./chunk-R7VCWGZ2.mjs";
4
+ } from "./chunk-CEE3Y7RM.mjs";
5
5
  import {
6
6
  CredentialsProviderError
7
- } from "./chunk-OMR2FLSI.mjs";
7
+ } from "./chunk-AEKGTTWT.mjs";
8
8
  import "./chunk-FFDYI4OH.mjs";
9
9
 
10
- // ../node_modules/.bun/@aws-sdk+credential-provider-env@3.972.24/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js
10
+ // ../node_modules/.bun/@aws-sdk+credential-provider-env@3.972.34/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js
11
11
  var ENV_KEY = "AWS_ACCESS_KEY_ID";
12
12
  var ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
13
13
  var ENV_SESSION = "AWS_SESSION_TOKEN";
@@ -1,25 +1,25 @@
1
1
  #!/usr/bin/env bun
2
2
  import {
3
3
  externalDataInterceptor
4
- } from "./chunk-43COQWMG.mjs";
4
+ } from "./chunk-HMKFI7SL.mjs";
5
5
  import {
6
6
  setCredentialFeature
7
- } from "./chunk-R7VCWGZ2.mjs";
7
+ } from "./chunk-CEE3Y7RM.mjs";
8
8
  import {
9
9
  CredentialsProviderError
10
- } from "./chunk-OMR2FLSI.mjs";
10
+ } from "./chunk-AEKGTTWT.mjs";
11
11
  import "./chunk-FFDYI4OH.mjs";
12
12
 
13
- // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.28/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
13
+ // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
14
14
  import { readFileSync } from "fs";
15
15
 
16
- // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.28/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js
16
+ // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js
17
17
  var fromWebToken = (init) => async (awsIdentityProperties) => {
18
18
  init.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");
19
19
  const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
20
20
  let { roleAssumerWithWebIdentity } = init;
21
21
  if (!roleAssumerWithWebIdentity) {
22
- const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-7OF5CJSW.mjs");
22
+ const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-WJPOT3CH.mjs");
23
23
  roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
24
24
  ...init.clientConfig,
25
25
  credentialProviderLogger: init.logger,
@@ -40,7 +40,7 @@ var fromWebToken = (init) => async (awsIdentityProperties) => {
40
40
  });
41
41
  };
42
42
 
43
- // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.28/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
43
+ // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
44
44
  var ENV_TOKEN_FILE = "AWS_WEB_IDENTITY_TOKEN_FILE";
45
45
  var ENV_ROLE_ARN = "AWS_ROLE_ARN";
46
46
  var ENV_ROLE_SESSION_NAME = "AWS_ROLE_SESSION_NAME";
@@ -1,42 +1,42 @@
1
1
  #!/usr/bin/env bun
2
2
  import {
3
3
  chain
4
- } from "./chunk-PNVVO6MW.mjs";
4
+ } from "./chunk-YZ62XZX5.mjs";
5
+ import {
6
+ HttpRequest
7
+ } from "./chunk-6E4PAXC5.mjs";
5
8
  import {
6
9
  getProfileName,
7
10
  parseKnownFiles,
8
11
  readFile
9
- } from "./chunk-43COQWMG.mjs";
10
- import {
11
- HttpRequest
12
- } from "./chunk-HDHAEUVR.mjs";
12
+ } from "./chunk-HMKFI7SL.mjs";
13
13
  import {
14
14
  setCredentialFeature
15
- } from "./chunk-R7VCWGZ2.mjs";
15
+ } from "./chunk-CEE3Y7RM.mjs";
16
16
  import {
17
17
  CredentialsProviderError
18
- } from "./chunk-OMR2FLSI.mjs";
18
+ } from "./chunk-AEKGTTWT.mjs";
19
19
  import {
20
20
  __publicField
21
21
  } from "./chunk-FFDYI4OH.mjs";
22
22
 
23
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
23
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
24
24
  var resolveCredentialSource = (credentialSource, profileName, logger) => {
25
25
  const sourceProvidersMap = {
26
26
  EcsContainer: async (options) => {
27
- const { fromHttp } = await import("./dist-es-URIWYPPF.mjs");
28
- const { fromContainerMetadata } = await import("./dist-es-XKOZULQT.mjs");
27
+ const { fromHttp } = await import("./dist-es-TKQAVPOM.mjs");
28
+ const { fromContainerMetadata } = await import("./dist-es-76ZS5ZGX.mjs");
29
29
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
30
30
  return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
31
31
  },
32
32
  Ec2InstanceMetadata: async (options) => {
33
33
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
34
- const { fromInstanceMetadata } = await import("./dist-es-XKOZULQT.mjs");
34
+ const { fromInstanceMetadata } = await import("./dist-es-76ZS5ZGX.mjs");
35
35
  return async () => fromInstanceMetadata(options)().then(setNamedProvider);
36
36
  },
37
37
  Environment: async (options) => {
38
38
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
39
- const { fromEnv } = await import("./dist-es-VFOQQKFA.mjs");
39
+ const { fromEnv } = await import("./dist-es-FTV27CJE.mjs");
40
40
  return async () => fromEnv(options)().then(setNamedProvider);
41
41
  }
42
42
  };
@@ -48,7 +48,7 @@ var resolveCredentialSource = (credentialSource, profileName, logger) => {
48
48
  };
49
49
  var setNamedProvider = (creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p");
50
50
 
51
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
51
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
52
52
  var isAssumeRoleProfile = (arg, { profile = "default", logger } = {}) => {
53
53
  return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger }));
54
54
  };
@@ -71,7 +71,7 @@ var resolveAssumeRoleCredentials = async (profileName, profiles, options, caller
71
71
  const profileData = profiles[profileName];
72
72
  const { source_profile, region } = profileData;
73
73
  if (!options.roleAssumer) {
74
- const { getDefaultRoleAssumer } = await import("./sts-7OF5CJSW.mjs");
74
+ const { getDefaultRoleAssumer } = await import("./sts-WJPOT3CH.mjs");
75
75
  options.roleAssumer = getDefaultRoleAssumer({
76
76
  ...options.clientConfig,
77
77
  credentialProviderLogger: options.logger,
@@ -115,7 +115,7 @@ var isCredentialSourceWithoutRoleArn = (section) => {
115
115
  return !section.role_arn && !!section.credential_source;
116
116
  };
117
117
 
118
- // ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.28/node_modules/@aws-sdk/credential-provider-login/dist-es/LoginCredentialsFetcher.js
118
+ // ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.38/node_modules/@aws-sdk/credential-provider-login/dist-es/LoginCredentialsFetcher.js
119
119
  import { createHash, createPrivateKey, createPublicKey, sign } from "crypto";
120
120
  import { promises as fs } from "fs";
121
121
  import { homedir } from "os";
@@ -156,7 +156,7 @@ var _LoginCredentialsFetcher = class _LoginCredentialsFetcher {
156
156
  return this.profileData.login_session;
157
157
  }
158
158
  async refresh(token) {
159
- const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-QNS25VI4.mjs");
159
+ const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-4DZRTUJH.mjs");
160
160
  const { logger, userAgentAppId } = this.callerClientConfig ?? {};
161
161
  const isH2 = (requestHandler2) => {
162
162
  return requestHandler2?.metadata?.handlerProtocol === "h2";
@@ -368,7 +368,7 @@ var _LoginCredentialsFetcher = class _LoginCredentialsFetcher {
368
368
  __publicField(_LoginCredentialsFetcher, "REFRESH_THRESHOLD", 5 * 60 * 1e3);
369
369
  var LoginCredentialsFetcher = _LoginCredentialsFetcher;
370
370
 
371
- // ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.28/node_modules/@aws-sdk/credential-provider-login/dist-es/fromLoginCredentials.js
371
+ // ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.38/node_modules/@aws-sdk/credential-provider-login/dist-es/fromLoginCredentials.js
372
372
  var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
373
373
  init?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");
374
374
  const profiles = await parseKnownFiles(init || {});
@@ -387,7 +387,7 @@ var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
387
387
  return setCredentialFeature(credentials, "CREDENTIALS_LOGIN", "AD");
388
388
  };
389
389
 
390
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveLoginCredentials.js
390
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveLoginCredentials.js
391
391
  var isLoginProfile = (data) => {
392
392
  return Boolean(data && data.login_session);
393
393
  };
@@ -399,16 +399,16 @@ var resolveLoginCredentials = async (profileName, options, callerClientConfig) =
399
399
  return setCredentialFeature(credentials, "CREDENTIALS_PROFILE_LOGIN", "AC");
400
400
  };
401
401
 
402
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
402
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
403
403
  var isProcessProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string";
404
- var resolveProcessCredentials = async (options, profile) => import("./dist-es-I6P57CZS.mjs").then(({ fromProcess }) => fromProcess({
404
+ var resolveProcessCredentials = async (options, profile) => import("./dist-es-X7XEFTLU.mjs").then(({ fromProcess }) => fromProcess({
405
405
  ...options,
406
406
  profile
407
407
  })().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v")));
408
408
 
409
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
409
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
410
410
  var resolveSsoCredentials = async (profile, profileData, options = {}, callerClientConfig) => {
411
- const { fromSSO } = await import("./dist-es-HC7MGS4M.mjs");
411
+ const { fromSSO } = await import("./dist-es-DRC4RUDF.mjs");
412
412
  return fromSSO({
413
413
  profile,
414
414
  logger: options.logger,
@@ -426,7 +426,7 @@ var resolveSsoCredentials = async (profile, profileData, options = {}, callerCli
426
426
  };
427
427
  var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
428
428
 
429
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
429
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
430
430
  var isStaticCredsProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1 && ["undefined", "string"].indexOf(typeof arg.aws_account_id) > -1;
431
431
  var resolveStaticCredentials = async (profile, options) => {
432
432
  options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
@@ -440,9 +440,9 @@ var resolveStaticCredentials = async (profile, options) => {
440
440
  return setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
441
441
  };
442
442
 
443
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
443
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
444
444
  var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
445
- var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-WSBAYZQI.mjs").then(({ fromTokenFile }) => fromTokenFile({
445
+ var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-MVWFIO2N.mjs").then(({ fromTokenFile }) => fromTokenFile({
446
446
  webIdentityTokenFile: profile.web_identity_token_file,
447
447
  roleArn: profile.role_arn,
448
448
  roleSessionName: profile.role_session_name,
@@ -453,7 +453,7 @@ var resolveWebIdentityCredentials = async (profile, options, callerClientConfig)
453
453
  callerClientConfig
454
454
  }).then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q")));
455
455
 
456
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
456
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
457
457
  var resolveProfileData = async (profileName, profiles, options, callerClientConfig, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
458
458
  const data = profiles[profileName];
459
459
  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
@@ -480,7 +480,7 @@ var resolveProfileData = async (profileName, profiles, options, callerClientConf
480
480
  throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });
481
481
  };
482
482
 
483
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
483
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
484
484
  var fromIni = (init = {}) => async ({ callerClientConfig } = {}) => {
485
485
  init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
486
486
  const profiles = await parseKnownFiles(init);
@@ -1,29 +1,27 @@
1
1
  #!/usr/bin/env bun
2
- import {
3
- parseRfc3339DateTime
4
- } from "./chunk-GXZPN42X.mjs";
5
2
  import {
6
3
  sdkStreamMixin
7
- } from "./chunk-G3M3ZN6T.mjs";
4
+ } from "./chunk-K7B6G3FP.mjs";
8
5
  import {
9
- NodeHttpHandler
10
- } from "./chunk-H7SOGPWV.mjs";
6
+ NodeHttpHandler,
7
+ parseRfc3339DateTime
8
+ } from "./chunk-H57WOA7R.mjs";
11
9
  import {
12
10
  HttpRequest
13
- } from "./chunk-HDHAEUVR.mjs";
11
+ } from "./chunk-6E4PAXC5.mjs";
14
12
  import "./chunk-S6VA5TIO.mjs";
15
13
  import {
16
14
  setCredentialFeature
17
- } from "./chunk-R7VCWGZ2.mjs";
15
+ } from "./chunk-CEE3Y7RM.mjs";
18
16
  import {
19
17
  CredentialsProviderError
20
- } from "./chunk-OMR2FLSI.mjs";
18
+ } from "./chunk-AEKGTTWT.mjs";
21
19
  import "./chunk-FFDYI4OH.mjs";
22
20
 
23
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
21
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
24
22
  import fs from "fs/promises";
25
23
 
26
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/checkUrl.js
24
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/checkUrl.js
27
25
  var ECS_CONTAINER_HOST = "169.254.170.2";
28
26
  var EKS_CONTAINER_HOST_IPv4 = "169.254.170.23";
29
27
  var EKS_CONTAINER_HOST_IPv6 = "[fd00:ec2::23]";
@@ -57,7 +55,7 @@ var checkUrl = (url, logger) => {
57
55
  - EKS container host 169.254.170.23 or [fd00:ec2::23]`, { logger });
58
56
  };
59
57
 
60
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js
58
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js
61
59
  function createGetRequest(url) {
62
60
  return new HttpRequest({
63
61
  protocol: url.protocol,
@@ -100,7 +98,7 @@ async function getCredentials(response, logger) {
100
98
  throw new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger });
101
99
  }
102
100
 
103
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/retry-wrapper.js
101
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/retry-wrapper.js
104
102
  var retryWrapper = (toRetry, maxRetries, delayMs) => {
105
103
  return async () => {
106
104
  for (let i = 0; i < maxRetries; ++i) {
@@ -114,7 +112,7 @@ var retryWrapper = (toRetry, maxRetries, delayMs) => {
114
112
  };
115
113
  };
116
114
 
117
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
115
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
118
116
  var AWS_CONTAINER_CREDENTIALS_RELATIVE_URI = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI";
119
117
  var DEFAULT_LINK_LOCAL_HOST = "http://169.254.170.2";
120
118
  var AWS_CONTAINER_CREDENTIALS_FULL_URI = "AWS_CONTAINER_CREDENTIALS_FULL_URI";
@@ -3,20 +3,20 @@ import {
3
3
  externalDataInterceptor,
4
4
  getProfileName,
5
5
  parseKnownFiles
6
- } from "./chunk-43COQWMG.mjs";
6
+ } from "./chunk-HMKFI7SL.mjs";
7
7
  import {
8
8
  setCredentialFeature
9
- } from "./chunk-R7VCWGZ2.mjs";
9
+ } from "./chunk-CEE3Y7RM.mjs";
10
10
  import {
11
11
  CredentialsProviderError
12
- } from "./chunk-OMR2FLSI.mjs";
12
+ } from "./chunk-AEKGTTWT.mjs";
13
13
  import "./chunk-FFDYI4OH.mjs";
14
14
 
15
- // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.24/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
15
+ // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
16
16
  import { exec } from "child_process";
17
17
  import { promisify } from "util";
18
18
 
19
- // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.24/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js
19
+ // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js
20
20
  var getValidatedProcessCredentials = (profileName, data, profiles) => {
21
21
  if (data.Version !== 1) {
22
22
  throw Error(`Profile ${profileName} credential_process did not return Version 1.`);
@@ -47,7 +47,7 @@ var getValidatedProcessCredentials = (profileName, data, profiles) => {
47
47
  return credentials;
48
48
  };
49
49
 
50
- // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.24/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
50
+ // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
51
51
  var resolveProcessCredentials = async (profileName, profiles, logger) => {
52
52
  const profile = profiles[profileName];
53
53
  if (profiles[profileName]) {
@@ -76,7 +76,7 @@ var resolveProcessCredentials = async (profileName, profiles, logger) => {
76
76
  }
77
77
  };
78
78
 
79
- // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.24/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js
79
+ // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js
80
80
  var fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {
81
81
  init.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");
82
82
  const profiles = await parseKnownFiles(init);
package/dist/index.mjs CHANGED
@@ -19,7 +19,7 @@ import {
19
19
  setIdeCommand,
20
20
  setOrganizationId,
21
21
  writeConfig
22
- } from "./chunk-BY7XUH2G.mjs";
22
+ } from "./chunk-R2544D2G.mjs";
23
23
  import "./chunk-FFDYI4OH.mjs";
24
24
 
25
25
  // src/index.ts
@@ -2497,12 +2497,12 @@ async function interactiveCommand() {
2497
2497
  );
2498
2498
  }
2499
2499
  console.log(chalk18.gray("Starting interactive mode..."));
2500
- const { launchInteractive } = await import("./interactive-OHZFZVXH.mjs");
2500
+ const { launchInteractive } = await import("./interactive-7BC3ZOP6.mjs");
2501
2501
  await launchInteractive();
2502
2502
  }
2503
2503
 
2504
2504
  // src/index.ts
2505
- var CLI_VERSION = "0.2.122";
2505
+ var CLI_VERSION = "0.2.124";
2506
2506
  var program = new Command();
2507
2507
  program.name("replicas").description("CLI for managing Replicas workspaces").version(CLI_VERSION);
2508
2508
  program.command("login").description("Authenticate with your Replicas account").action(async () => {