replicas-engine 0.1.143 → 0.1.145

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (25) hide show
  1. package/dist/src/{chunk-XCFRYWEV.js → chunk-2Y7PD56W.js} +12 -12
  2. package/dist/src/{chunk-JFXVYYQY.js → chunk-5VUQ55WW.js} +19 -19
  3. package/dist/src/{chunk-NPXMDMPW.js → chunk-AAVVX4U5.js} +6 -6
  4. package/dist/src/{chunk-J3WZZOOL.js → chunk-BUG7ZAQW.js} +72 -355
  5. package/dist/src/{chunk-TY2FR253.js → chunk-SGITM26Q.js} +309 -22
  6. package/dist/src/{chunk-YDW6RZI2.js → chunk-ST5JVROM.js} +2 -2
  7. package/dist/src/{chunk-WCAERHFE.js → chunk-SWX24AGM.js} +1 -1
  8. package/dist/src/{chunk-7RS3TOFT.js → chunk-TU2SAX7Z.js} +1072 -1228
  9. package/dist/src/{chunk-MCYTXPBZ.js → chunk-WPAL27HA.js} +2 -2
  10. package/dist/src/{chunk-N2BGF5AZ.js → chunk-ZNARSMJG.js} +1 -1
  11. package/dist/src/{dist-es-UV765YRF.js → dist-es-BUG4C6LP.js} +18 -18
  12. package/dist/src/{dist-es-3LYC7DO3.js → dist-es-F6RG3S4O.js} +12 -14
  13. package/dist/src/{dist-es-KHBICPEM.js → dist-es-GGHPJZ3K.js} +19 -19
  14. package/dist/src/{dist-es-7DTYZ3KD.js → dist-es-GZBSW2H3.js} +27 -27
  15. package/dist/src/{dist-es-YWO2URNL.js → dist-es-JIV2SPEM.js} +7 -7
  16. package/dist/src/{dist-es-BNJQGHZR.js → dist-es-Q3YZVSCP.js} +7 -7
  17. package/dist/src/{dist-es-EVINFDC2.js → dist-es-YKS4LXBO.js} +3 -3
  18. package/dist/src/index.js +4 -109
  19. package/dist/src/{loadSso-ZRFAKENS.js → loadSso-3WFGTQV7.js} +109 -148
  20. package/dist/src/{signin-PNR24U2H.js → signin-RSKKVVIS.js} +123 -177
  21. package/dist/src/{sso-oidc-O55BGCVQ.js → sso-oidc-LBVW2ORP.js} +111 -150
  22. package/dist/src/{sts-MRC7OH6Z.js → sts-DKGAU6YE.js} +2911 -718
  23. package/package.json +1 -1
  24. package/dist/src/chunk-5V5ZNFZK.js +0 -178
  25. package/dist/src/event-streams-IFAW3KBX.js +0 -244
@@ -1,9 +1,9 @@
1
1
  #!/usr/bin/env node
2
2
  import {
3
3
  ProviderError
4
- } from "./chunk-YDW6RZI2.js";
4
+ } from "./chunk-ST5JVROM.js";
5
5
 
6
- // ../node_modules/.bun/@smithy+property-provider@4.2.12/node_modules/@smithy/property-provider/dist-es/chain.js
6
+ // ../node_modules/.bun/@smithy+property-provider@4.2.14/node_modules/@smithy/property-provider/dist-es/chain.js
7
7
  var chain = (...providers) => async () => {
8
8
  if (providers.length === 0) {
9
9
  throw new ProviderError("No providers in chain");
@@ -1,6 +1,6 @@
1
1
  #!/usr/bin/env node
2
2
 
3
- // ../node_modules/.bun/@aws-sdk+core@3.973.26/node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js
3
+ // ../node_modules/.bun/@aws-sdk+core@3.974.8/node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js
4
4
  function setCredentialFeature(credentials, feature, value) {
5
5
  if (!credentials.$source) {
6
6
  credentials.$source = {};
@@ -5,16 +5,16 @@ import {
5
5
  getSSOTokenFromFile,
6
6
  loadSsoSessionData,
7
7
  parseKnownFiles
8
- } from "./chunk-JFXVYYQY.js";
8
+ } from "./chunk-5VUQ55WW.js";
9
9
  import {
10
10
  setCredentialFeature
11
- } from "./chunk-N2BGF5AZ.js";
11
+ } from "./chunk-ZNARSMJG.js";
12
12
  import {
13
13
  CredentialsProviderError,
14
14
  ProviderError
15
- } from "./chunk-YDW6RZI2.js";
15
+ } from "./chunk-ST5JVROM.js";
16
16
 
17
- // ../node_modules/.bun/@smithy+property-provider@4.2.12/node_modules/@smithy/property-provider/dist-es/TokenProviderError.js
17
+ // ../node_modules/.bun/@smithy+property-provider@4.2.14/node_modules/@smithy/property-provider/dist-es/TokenProviderError.js
18
18
  var TokenProviderError = class _TokenProviderError extends ProviderError {
19
19
  name = "TokenProviderError";
20
20
  constructor(message, options = true) {
@@ -23,16 +23,16 @@ var TokenProviderError = class _TokenProviderError extends ProviderError {
23
23
  }
24
24
  };
25
25
 
26
- // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.28/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
26
+ // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
27
27
  var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
28
28
 
29
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
29
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
30
30
  var EXPIRE_WINDOW_MS = 5 * 60 * 1e3;
31
31
  var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
32
32
 
33
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
33
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
34
34
  var getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
35
- const { SSOOIDCClient } = await import("./sso-oidc-O55BGCVQ.js");
35
+ const { SSOOIDCClient } = await import("./sso-oidc-LBVW2ORP.js");
36
36
  const coalesce = (prop) => init.clientConfig?.[prop] ?? init.parentClientConfig?.[prop] ?? callerClientConfig?.[prop];
37
37
  const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
38
38
  region: ssoRegion ?? init.clientConfig?.region,
@@ -42,9 +42,9 @@ var getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
42
42
  return ssoOidcClient;
43
43
  };
44
44
 
45
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
45
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
46
46
  var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConfig) => {
47
- const { CreateTokenCommand } = await import("./sso-oidc-O55BGCVQ.js");
47
+ const { CreateTokenCommand } = await import("./sso-oidc-LBVW2ORP.js");
48
48
  const ssoOidcClient = await getSsoOidcClient(ssoRegion, init, callerClientConfig);
49
49
  return ssoOidcClient.send(new CreateTokenCommand({
50
50
  clientId: ssoToken.clientId,
@@ -54,21 +54,21 @@ var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConf
54
54
  }));
55
55
  };
56
56
 
57
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
57
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
58
58
  var validateTokenExpiry = (token) => {
59
59
  if (token.expiration && token.expiration.getTime() < Date.now()) {
60
60
  throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);
61
61
  }
62
62
  };
63
63
 
64
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
64
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
65
65
  var validateTokenKey = (key, value, forRefresh = false) => {
66
66
  if (typeof value === "undefined") {
67
67
  throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${REFRESH_MESSAGE}`, false);
68
68
  }
69
69
  };
70
70
 
71
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js
71
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js
72
72
  import { promises as fsPromises } from "fs";
73
73
  var { writeFile } = fsPromises;
74
74
  var writeSSOTokenToFile = (id, ssoToken) => {
@@ -77,7 +77,7 @@ var writeSSOTokenToFile = (id, ssoToken) => {
77
77
  return writeFile(tokenFilepath, tokenString);
78
78
  };
79
79
 
80
- // ../node_modules/.bun/@aws-sdk+token-providers@3.1021.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
80
+ // ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
81
81
  var lastRefreshAttemptTime = /* @__PURE__ */ new Date(0);
82
82
  var fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
83
83
  init.logger?.debug("@aws-sdk/token-providers - fromSso");
@@ -149,7 +149,7 @@ var fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
149
149
  }
150
150
  };
151
151
 
152
- // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.28/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
152
+ // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
153
153
  var SHOULD_FAIL_CREDENTIAL_CHAIN = false;
154
154
  var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger }) => {
155
155
  let token;
@@ -189,7 +189,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
189
189
  });
190
190
  }
191
191
  const { accessToken } = token;
192
- const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-ZRFAKENS.js");
192
+ const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-3WFGTQV7.js");
193
193
  const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
194
194
  logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
195
195
  region: clientConfig?.region ?? ssoRegion,
@@ -231,7 +231,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
231
231
  return credentials;
232
232
  };
233
233
 
234
- // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.28/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
234
+ // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
235
235
  var validateSsoProfile = (profile, logger) => {
236
236
  const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
237
237
  if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
@@ -241,7 +241,7 @@ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.ht
241
241
  return profile;
242
242
  };
243
243
 
244
- // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.28/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
244
+ // ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
245
245
  var fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
246
246
  init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
247
247
  const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
@@ -1,28 +1,26 @@
1
1
  #!/usr/bin/env node
2
- import {
3
- parseRfc3339DateTime
4
- } from "./chunk-5V5ZNFZK.js";
5
2
  import {
6
3
  sdkStreamMixin
7
- } from "./chunk-NPXMDMPW.js";
4
+ } from "./chunk-AAVVX4U5.js";
8
5
  import {
9
- NodeHttpHandler
10
- } from "./chunk-TY2FR253.js";
6
+ NodeHttpHandler,
7
+ parseRfc3339DateTime
8
+ } from "./chunk-SGITM26Q.js";
11
9
  import {
12
10
  HttpRequest
13
- } from "./chunk-WCAERHFE.js";
11
+ } from "./chunk-SWX24AGM.js";
14
12
  import "./chunk-ERL3EC7G.js";
15
13
  import {
16
14
  setCredentialFeature
17
- } from "./chunk-N2BGF5AZ.js";
15
+ } from "./chunk-ZNARSMJG.js";
18
16
  import {
19
17
  CredentialsProviderError
20
- } from "./chunk-YDW6RZI2.js";
18
+ } from "./chunk-ST5JVROM.js";
21
19
 
22
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
20
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
23
21
  import fs from "fs/promises";
24
22
 
25
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/checkUrl.js
23
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/checkUrl.js
26
24
  var ECS_CONTAINER_HOST = "169.254.170.2";
27
25
  var EKS_CONTAINER_HOST_IPv4 = "169.254.170.23";
28
26
  var EKS_CONTAINER_HOST_IPv6 = "[fd00:ec2::23]";
@@ -56,7 +54,7 @@ var checkUrl = (url, logger) => {
56
54
  - EKS container host 169.254.170.23 or [fd00:ec2::23]`, { logger });
57
55
  };
58
56
 
59
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js
57
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js
60
58
  function createGetRequest(url) {
61
59
  return new HttpRequest({
62
60
  protocol: url.protocol,
@@ -99,7 +97,7 @@ async function getCredentials(response, logger) {
99
97
  throw new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger });
100
98
  }
101
99
 
102
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/retry-wrapper.js
100
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/retry-wrapper.js
103
101
  var retryWrapper = (toRetry, maxRetries, delayMs) => {
104
102
  return async () => {
105
103
  for (let i = 0; i < maxRetries; ++i) {
@@ -113,7 +111,7 @@ var retryWrapper = (toRetry, maxRetries, delayMs) => {
113
111
  };
114
112
  };
115
113
 
116
- // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.26/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
114
+ // ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
117
115
  var AWS_CONTAINER_CREDENTIALS_RELATIVE_URI = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI";
118
116
  var DEFAULT_LINK_LOCAL_HOST = "http://169.254.170.2";
119
117
  var AWS_CONTAINER_CREDENTIALS_FULL_URI = "AWS_CONTAINER_CREDENTIALS_FULL_URI";
@@ -2,18 +2,18 @@
2
2
  import {
3
3
  loadConfig,
4
4
  parseUrl
5
- } from "./chunk-XCFRYWEV.js";
6
- import "./chunk-MCYTXPBZ.js";
7
- import "./chunk-JFXVYYQY.js";
5
+ } from "./chunk-2Y7PD56W.js";
6
+ import "./chunk-WPAL27HA.js";
7
+ import "./chunk-5VUQ55WW.js";
8
8
  import {
9
9
  CredentialsProviderError,
10
10
  ProviderError
11
- } from "./chunk-YDW6RZI2.js";
11
+ } from "./chunk-ST5JVROM.js";
12
12
 
13
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
13
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
14
14
  import { parse } from "url";
15
15
 
16
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/httpRequest.js
16
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/httpRequest.js
17
17
  import { Buffer } from "buffer";
18
18
  import { request } from "http";
19
19
  function httpRequest(options) {
@@ -50,7 +50,7 @@ function httpRequest(options) {
50
50
  });
51
51
  }
52
52
 
53
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/ImdsCredentials.js
53
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/ImdsCredentials.js
54
54
  var isImdsCredentials = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.AccessKeyId === "string" && typeof arg.SecretAccessKey === "string" && typeof arg.Token === "string" && typeof arg.Expiration === "string";
55
55
  var fromImdsCredentials = (creds) => ({
56
56
  accessKeyId: creds.AccessKeyId,
@@ -60,12 +60,12 @@ var fromImdsCredentials = (creds) => ({
60
60
  ...creds.AccountId && { accountId: creds.AccountId }
61
61
  });
62
62
 
63
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/RemoteProviderInit.js
63
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/RemoteProviderInit.js
64
64
  var DEFAULT_TIMEOUT = 1e3;
65
65
  var DEFAULT_MAX_RETRIES = 0;
66
66
  var providerConfigFromInit = ({ maxRetries = DEFAULT_MAX_RETRIES, timeout = DEFAULT_TIMEOUT }) => ({ maxRetries, timeout });
67
67
 
68
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/retry.js
68
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/retry.js
69
69
  var retry = (toRetry, maxRetries) => {
70
70
  let promise = toRetry();
71
71
  for (let i = 0; i < maxRetries; i++) {
@@ -74,7 +74,7 @@ var retry = (toRetry, maxRetries) => {
74
74
  return promise;
75
75
  };
76
76
 
77
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
77
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
78
78
  var ENV_CMDS_FULL_URI = "AWS_CONTAINER_CREDENTIALS_FULL_URI";
79
79
  var ENV_CMDS_RELATIVE_URI = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI";
80
80
  var ENV_CMDS_AUTH_TOKEN = "AWS_CONTAINER_AUTHORIZATION_TOKEN";
@@ -145,7 +145,7 @@ var getCmdsUri = async ({ logger }) => {
145
145
  });
146
146
  };
147
147
 
148
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/error/InstanceMetadataV1FallbackError.js
148
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/error/InstanceMetadataV1FallbackError.js
149
149
  var InstanceMetadataV1FallbackError = class _InstanceMetadataV1FallbackError extends CredentialsProviderError {
150
150
  tryNextLink;
151
151
  name = "InstanceMetadataV1FallbackError";
@@ -156,14 +156,14 @@ var InstanceMetadataV1FallbackError = class _InstanceMetadataV1FallbackError ext
156
156
  }
157
157
  };
158
158
 
159
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/config/Endpoint.js
159
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/Endpoint.js
160
160
  var Endpoint;
161
161
  (function(Endpoint2) {
162
162
  Endpoint2["IPv4"] = "http://169.254.169.254";
163
163
  Endpoint2["IPv6"] = "http://[fd00:ec2::254]";
164
164
  })(Endpoint || (Endpoint = {}));
165
165
 
166
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointConfigOptions.js
166
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointConfigOptions.js
167
167
  var ENV_ENDPOINT_NAME = "AWS_EC2_METADATA_SERVICE_ENDPOINT";
168
168
  var CONFIG_ENDPOINT_NAME = "ec2_metadata_service_endpoint";
169
169
  var ENDPOINT_CONFIG_OPTIONS = {
@@ -172,14 +172,14 @@ var ENDPOINT_CONFIG_OPTIONS = {
172
172
  default: void 0
173
173
  };
174
174
 
175
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointMode.js
175
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointMode.js
176
176
  var EndpointMode;
177
177
  (function(EndpointMode2) {
178
178
  EndpointMode2["IPv4"] = "IPv4";
179
179
  EndpointMode2["IPv6"] = "IPv6";
180
180
  })(EndpointMode || (EndpointMode = {}));
181
181
 
182
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointModeConfigOptions.js
182
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointModeConfigOptions.js
183
183
  var ENV_ENDPOINT_MODE_NAME = "AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE";
184
184
  var CONFIG_ENDPOINT_MODE_NAME = "ec2_metadata_service_endpoint_mode";
185
185
  var ENDPOINT_MODE_CONFIG_OPTIONS = {
@@ -188,7 +188,7 @@ var ENDPOINT_MODE_CONFIG_OPTIONS = {
188
188
  default: EndpointMode.IPv4
189
189
  };
190
190
 
191
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/utils/getInstanceMetadataEndpoint.js
191
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/getInstanceMetadataEndpoint.js
192
192
  var getInstanceMetadataEndpoint = async () => parseUrl(await getFromEndpointConfig() || await getFromEndpointModeConfig());
193
193
  var getFromEndpointConfig = async () => loadConfig(ENDPOINT_CONFIG_OPTIONS)();
194
194
  var getFromEndpointModeConfig = async () => {
@@ -203,7 +203,7 @@ var getFromEndpointModeConfig = async () => {
203
203
  }
204
204
  };
205
205
 
206
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/utils/getExtendedInstanceMetadataCredentials.js
206
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/getExtendedInstanceMetadataCredentials.js
207
207
  var STATIC_STABILITY_REFRESH_INTERVAL_SECONDS = 5 * 60;
208
208
  var STATIC_STABILITY_REFRESH_INTERVAL_JITTER_WINDOW_SECONDS = 5 * 60;
209
209
  var STATIC_STABILITY_DOC_URL = "https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html";
@@ -220,7 +220,7 @@ For more information, please visit: ` + STATIC_STABILITY_DOC_URL);
220
220
  };
221
221
  };
222
222
 
223
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/utils/staticStabilityProvider.js
223
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/staticStabilityProvider.js
224
224
  var staticStabilityProvider = (provider, options = {}) => {
225
225
  const logger = options?.logger || console;
226
226
  let pastCredentials;
@@ -244,7 +244,7 @@ var staticStabilityProvider = (provider, options = {}) => {
244
244
  };
245
245
  };
246
246
 
247
- // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.12/node_modules/@smithy/credential-provider-imds/dist-es/fromInstanceMetadata.js
247
+ // ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromInstanceMetadata.js
248
248
  var IMDS_PATH = "/latest/meta-data/iam/security-credentials/";
249
249
  var IMDS_TOKEN_PATH = "/latest/api/token";
250
250
  var AWS_EC2_METADATA_V1_DISABLED = "AWS_EC2_METADATA_V1_DISABLED";
@@ -1,39 +1,39 @@
1
1
  #!/usr/bin/env node
2
2
  import {
3
3
  chain
4
- } from "./chunk-MCYTXPBZ.js";
4
+ } from "./chunk-WPAL27HA.js";
5
+ import {
6
+ HttpRequest
7
+ } from "./chunk-SWX24AGM.js";
5
8
  import {
6
9
  getProfileName,
7
10
  parseKnownFiles,
8
11
  readFile
9
- } from "./chunk-JFXVYYQY.js";
10
- import {
11
- HttpRequest
12
- } from "./chunk-WCAERHFE.js";
12
+ } from "./chunk-5VUQ55WW.js";
13
13
  import {
14
14
  setCredentialFeature
15
- } from "./chunk-N2BGF5AZ.js";
15
+ } from "./chunk-ZNARSMJG.js";
16
16
  import {
17
17
  CredentialsProviderError
18
- } from "./chunk-YDW6RZI2.js";
18
+ } from "./chunk-ST5JVROM.js";
19
19
 
20
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
20
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
21
21
  var resolveCredentialSource = (credentialSource, profileName, logger) => {
22
22
  const sourceProvidersMap = {
23
23
  EcsContainer: async (options) => {
24
- const { fromHttp } = await import("./dist-es-3LYC7DO3.js");
25
- const { fromContainerMetadata } = await import("./dist-es-KHBICPEM.js");
24
+ const { fromHttp } = await import("./dist-es-F6RG3S4O.js");
25
+ const { fromContainerMetadata } = await import("./dist-es-GGHPJZ3K.js");
26
26
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
27
27
  return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
28
28
  },
29
29
  Ec2InstanceMetadata: async (options) => {
30
30
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
31
- const { fromInstanceMetadata } = await import("./dist-es-KHBICPEM.js");
31
+ const { fromInstanceMetadata } = await import("./dist-es-GGHPJZ3K.js");
32
32
  return async () => fromInstanceMetadata(options)().then(setNamedProvider);
33
33
  },
34
34
  Environment: async (options) => {
35
35
  logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
36
- const { fromEnv } = await import("./dist-es-EVINFDC2.js");
36
+ const { fromEnv } = await import("./dist-es-YKS4LXBO.js");
37
37
  return async () => fromEnv(options)().then(setNamedProvider);
38
38
  }
39
39
  };
@@ -45,7 +45,7 @@ var resolveCredentialSource = (credentialSource, profileName, logger) => {
45
45
  };
46
46
  var setNamedProvider = (creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p");
47
47
 
48
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
48
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
49
49
  var isAssumeRoleProfile = (arg, { profile = "default", logger } = {}) => {
50
50
  return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger }));
51
51
  };
@@ -68,7 +68,7 @@ var resolveAssumeRoleCredentials = async (profileName, profiles, options, caller
68
68
  const profileData = profiles[profileName];
69
69
  const { source_profile, region } = profileData;
70
70
  if (!options.roleAssumer) {
71
- const { getDefaultRoleAssumer } = await import("./sts-MRC7OH6Z.js");
71
+ const { getDefaultRoleAssumer } = await import("./sts-DKGAU6YE.js");
72
72
  options.roleAssumer = getDefaultRoleAssumer({
73
73
  ...options.clientConfig,
74
74
  credentialProviderLogger: options.logger,
@@ -112,7 +112,7 @@ var isCredentialSourceWithoutRoleArn = (section) => {
112
112
  return !section.role_arn && !!section.credential_source;
113
113
  };
114
114
 
115
- // ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.28/node_modules/@aws-sdk/credential-provider-login/dist-es/LoginCredentialsFetcher.js
115
+ // ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.38/node_modules/@aws-sdk/credential-provider-login/dist-es/LoginCredentialsFetcher.js
116
116
  import { createHash, createPrivateKey, createPublicKey, sign } from "crypto";
117
117
  import { promises as fs } from "fs";
118
118
  import { homedir } from "os";
@@ -154,7 +154,7 @@ var LoginCredentialsFetcher = class _LoginCredentialsFetcher {
154
154
  return this.profileData.login_session;
155
155
  }
156
156
  async refresh(token) {
157
- const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-PNR24U2H.js");
157
+ const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-RSKKVVIS.js");
158
158
  const { logger, userAgentAppId } = this.callerClientConfig ?? {};
159
159
  const isH2 = (requestHandler2) => {
160
160
  return requestHandler2?.metadata?.handlerProtocol === "h2";
@@ -364,7 +364,7 @@ var LoginCredentialsFetcher = class _LoginCredentialsFetcher {
364
364
  }
365
365
  };
366
366
 
367
- // ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.28/node_modules/@aws-sdk/credential-provider-login/dist-es/fromLoginCredentials.js
367
+ // ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.38/node_modules/@aws-sdk/credential-provider-login/dist-es/fromLoginCredentials.js
368
368
  var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
369
369
  init?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");
370
370
  const profiles = await parseKnownFiles(init || {});
@@ -383,7 +383,7 @@ var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
383
383
  return setCredentialFeature(credentials, "CREDENTIALS_LOGIN", "AD");
384
384
  };
385
385
 
386
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveLoginCredentials.js
386
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveLoginCredentials.js
387
387
  var isLoginProfile = (data) => {
388
388
  return Boolean(data && data.login_session);
389
389
  };
@@ -395,16 +395,16 @@ var resolveLoginCredentials = async (profileName, options, callerClientConfig) =
395
395
  return setCredentialFeature(credentials, "CREDENTIALS_PROFILE_LOGIN", "AC");
396
396
  };
397
397
 
398
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
398
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
399
399
  var isProcessProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string";
400
- var resolveProcessCredentials = async (options, profile) => import("./dist-es-BNJQGHZR.js").then(({ fromProcess }) => fromProcess({
400
+ var resolveProcessCredentials = async (options, profile) => import("./dist-es-Q3YZVSCP.js").then(({ fromProcess }) => fromProcess({
401
401
  ...options,
402
402
  profile
403
403
  })().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v")));
404
404
 
405
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
405
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
406
406
  var resolveSsoCredentials = async (profile, profileData, options = {}, callerClientConfig) => {
407
- const { fromSSO } = await import("./dist-es-UV765YRF.js");
407
+ const { fromSSO } = await import("./dist-es-BUG4C6LP.js");
408
408
  return fromSSO({
409
409
  profile,
410
410
  logger: options.logger,
@@ -422,7 +422,7 @@ var resolveSsoCredentials = async (profile, profileData, options = {}, callerCli
422
422
  };
423
423
  var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
424
424
 
425
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
425
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
426
426
  var isStaticCredsProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1 && ["undefined", "string"].indexOf(typeof arg.aws_account_id) > -1;
427
427
  var resolveStaticCredentials = async (profile, options) => {
428
428
  options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
@@ -436,9 +436,9 @@ var resolveStaticCredentials = async (profile, options) => {
436
436
  return setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
437
437
  };
438
438
 
439
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
439
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
440
440
  var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
441
- var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-YWO2URNL.js").then(({ fromTokenFile }) => fromTokenFile({
441
+ var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-JIV2SPEM.js").then(({ fromTokenFile }) => fromTokenFile({
442
442
  webIdentityTokenFile: profile.web_identity_token_file,
443
443
  roleArn: profile.role_arn,
444
444
  roleSessionName: profile.role_session_name,
@@ -449,7 +449,7 @@ var resolveWebIdentityCredentials = async (profile, options, callerClientConfig)
449
449
  callerClientConfig
450
450
  }).then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q")));
451
451
 
452
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
452
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
453
453
  var resolveProfileData = async (profileName, profiles, options, callerClientConfig, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
454
454
  const data = profiles[profileName];
455
455
  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
@@ -476,7 +476,7 @@ var resolveProfileData = async (profileName, profiles, options, callerClientConf
476
476
  throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });
477
477
  };
478
478
 
479
- // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.28/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
479
+ // ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
480
480
  var fromIni = (init = {}) => async ({ callerClientConfig } = {}) => {
481
481
  init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
482
482
  const profiles = await parseKnownFiles(init);
@@ -1,24 +1,24 @@
1
1
  #!/usr/bin/env node
2
2
  import {
3
3
  externalDataInterceptor
4
- } from "./chunk-JFXVYYQY.js";
4
+ } from "./chunk-5VUQ55WW.js";
5
5
  import {
6
6
  setCredentialFeature
7
- } from "./chunk-N2BGF5AZ.js";
7
+ } from "./chunk-ZNARSMJG.js";
8
8
  import {
9
9
  CredentialsProviderError
10
- } from "./chunk-YDW6RZI2.js";
10
+ } from "./chunk-ST5JVROM.js";
11
11
 
12
- // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.28/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
12
+ // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
13
13
  import { readFileSync } from "fs";
14
14
 
15
- // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.28/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js
15
+ // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js
16
16
  var fromWebToken = (init) => async (awsIdentityProperties) => {
17
17
  init.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");
18
18
  const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
19
19
  let { roleAssumerWithWebIdentity } = init;
20
20
  if (!roleAssumerWithWebIdentity) {
21
- const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-MRC7OH6Z.js");
21
+ const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-DKGAU6YE.js");
22
22
  roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
23
23
  ...init.clientConfig,
24
24
  credentialProviderLogger: init.logger,
@@ -39,7 +39,7 @@ var fromWebToken = (init) => async (awsIdentityProperties) => {
39
39
  });
40
40
  };
41
41
 
42
- // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.28/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
42
+ // ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
43
43
  var ENV_TOKEN_FILE = "AWS_WEB_IDENTITY_TOKEN_FILE";
44
44
  var ENV_ROLE_ARN = "AWS_ROLE_ARN";
45
45
  var ENV_ROLE_SESSION_NAME = "AWS_ROLE_SESSION_NAME";
@@ -3,19 +3,19 @@ import {
3
3
  externalDataInterceptor,
4
4
  getProfileName,
5
5
  parseKnownFiles
6
- } from "./chunk-JFXVYYQY.js";
6
+ } from "./chunk-5VUQ55WW.js";
7
7
  import {
8
8
  setCredentialFeature
9
- } from "./chunk-N2BGF5AZ.js";
9
+ } from "./chunk-ZNARSMJG.js";
10
10
  import {
11
11
  CredentialsProviderError
12
- } from "./chunk-YDW6RZI2.js";
12
+ } from "./chunk-ST5JVROM.js";
13
13
 
14
- // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.24/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
14
+ // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
15
15
  import { exec } from "child_process";
16
16
  import { promisify } from "util";
17
17
 
18
- // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.24/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js
18
+ // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js
19
19
  var getValidatedProcessCredentials = (profileName, data, profiles) => {
20
20
  if (data.Version !== 1) {
21
21
  throw Error(`Profile ${profileName} credential_process did not return Version 1.`);
@@ -46,7 +46,7 @@ var getValidatedProcessCredentials = (profileName, data, profiles) => {
46
46
  return credentials;
47
47
  };
48
48
 
49
- // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.24/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
49
+ // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
50
50
  var resolveProcessCredentials = async (profileName, profiles, logger) => {
51
51
  const profile = profiles[profileName];
52
52
  if (profiles[profileName]) {
@@ -75,7 +75,7 @@ var resolveProcessCredentials = async (profileName, profiles, logger) => {
75
75
  }
76
76
  };
77
77
 
78
- // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.24/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js
78
+ // ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js
79
79
  var fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {
80
80
  init.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");
81
81
  const profiles = await parseKnownFiles(init);
@@ -1,12 +1,12 @@
1
1
  #!/usr/bin/env node
2
2
  import {
3
3
  setCredentialFeature
4
- } from "./chunk-N2BGF5AZ.js";
4
+ } from "./chunk-ZNARSMJG.js";
5
5
  import {
6
6
  CredentialsProviderError
7
- } from "./chunk-YDW6RZI2.js";
7
+ } from "./chunk-ST5JVROM.js";
8
8
 
9
- // ../node_modules/.bun/@aws-sdk+credential-provider-env@3.972.24/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js
9
+ // ../node_modules/.bun/@aws-sdk+credential-provider-env@3.972.34/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js
10
10
  var ENV_KEY = "AWS_ACCESS_KEY_ID";
11
11
  var ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
12
12
  var ENV_SESSION = "AWS_SESSION_TOKEN";