replicas-engine 0.1.143 → 0.1.145
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/src/{chunk-XCFRYWEV.js → chunk-2Y7PD56W.js} +12 -12
- package/dist/src/{chunk-JFXVYYQY.js → chunk-5VUQ55WW.js} +19 -19
- package/dist/src/{chunk-NPXMDMPW.js → chunk-AAVVX4U5.js} +6 -6
- package/dist/src/{chunk-J3WZZOOL.js → chunk-BUG7ZAQW.js} +72 -355
- package/dist/src/{chunk-TY2FR253.js → chunk-SGITM26Q.js} +309 -22
- package/dist/src/{chunk-YDW6RZI2.js → chunk-ST5JVROM.js} +2 -2
- package/dist/src/{chunk-WCAERHFE.js → chunk-SWX24AGM.js} +1 -1
- package/dist/src/{chunk-7RS3TOFT.js → chunk-TU2SAX7Z.js} +1072 -1228
- package/dist/src/{chunk-MCYTXPBZ.js → chunk-WPAL27HA.js} +2 -2
- package/dist/src/{chunk-N2BGF5AZ.js → chunk-ZNARSMJG.js} +1 -1
- package/dist/src/{dist-es-UV765YRF.js → dist-es-BUG4C6LP.js} +18 -18
- package/dist/src/{dist-es-3LYC7DO3.js → dist-es-F6RG3S4O.js} +12 -14
- package/dist/src/{dist-es-KHBICPEM.js → dist-es-GGHPJZ3K.js} +19 -19
- package/dist/src/{dist-es-7DTYZ3KD.js → dist-es-GZBSW2H3.js} +27 -27
- package/dist/src/{dist-es-YWO2URNL.js → dist-es-JIV2SPEM.js} +7 -7
- package/dist/src/{dist-es-BNJQGHZR.js → dist-es-Q3YZVSCP.js} +7 -7
- package/dist/src/{dist-es-EVINFDC2.js → dist-es-YKS4LXBO.js} +3 -3
- package/dist/src/index.js +4 -109
- package/dist/src/{loadSso-ZRFAKENS.js → loadSso-3WFGTQV7.js} +109 -148
- package/dist/src/{signin-PNR24U2H.js → signin-RSKKVVIS.js} +123 -177
- package/dist/src/{sso-oidc-O55BGCVQ.js → sso-oidc-LBVW2ORP.js} +111 -150
- package/dist/src/{sts-MRC7OH6Z.js → sts-DKGAU6YE.js} +2911 -718
- package/package.json +1 -1
- package/dist/src/chunk-5V5ZNFZK.js +0 -178
- package/dist/src/event-streams-IFAW3KBX.js +0 -244
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
import {
|
|
3
3
|
ProviderError
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-ST5JVROM.js";
|
|
5
5
|
|
|
6
|
-
// ../node_modules/.bun/@smithy+property-provider@4.2.
|
|
6
|
+
// ../node_modules/.bun/@smithy+property-provider@4.2.14/node_modules/@smithy/property-provider/dist-es/chain.js
|
|
7
7
|
var chain = (...providers) => async () => {
|
|
8
8
|
if (providers.length === 0) {
|
|
9
9
|
throw new ProviderError("No providers in chain");
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
|
|
3
|
-
// ../node_modules/.bun/@aws-sdk+core@3.
|
|
3
|
+
// ../node_modules/.bun/@aws-sdk+core@3.974.8/node_modules/@aws-sdk/core/dist-es/submodules/client/setCredentialFeature.js
|
|
4
4
|
function setCredentialFeature(credentials, feature, value) {
|
|
5
5
|
if (!credentials.$source) {
|
|
6
6
|
credentials.$source = {};
|
|
@@ -5,16 +5,16 @@ import {
|
|
|
5
5
|
getSSOTokenFromFile,
|
|
6
6
|
loadSsoSessionData,
|
|
7
7
|
parseKnownFiles
|
|
8
|
-
} from "./chunk-
|
|
8
|
+
} from "./chunk-5VUQ55WW.js";
|
|
9
9
|
import {
|
|
10
10
|
setCredentialFeature
|
|
11
|
-
} from "./chunk-
|
|
11
|
+
} from "./chunk-ZNARSMJG.js";
|
|
12
12
|
import {
|
|
13
13
|
CredentialsProviderError,
|
|
14
14
|
ProviderError
|
|
15
|
-
} from "./chunk-
|
|
15
|
+
} from "./chunk-ST5JVROM.js";
|
|
16
16
|
|
|
17
|
-
// ../node_modules/.bun/@smithy+property-provider@4.2.
|
|
17
|
+
// ../node_modules/.bun/@smithy+property-provider@4.2.14/node_modules/@smithy/property-provider/dist-es/TokenProviderError.js
|
|
18
18
|
var TokenProviderError = class _TokenProviderError extends ProviderError {
|
|
19
19
|
name = "TokenProviderError";
|
|
20
20
|
constructor(message, options = true) {
|
|
@@ -23,16 +23,16 @@ var TokenProviderError = class _TokenProviderError extends ProviderError {
|
|
|
23
23
|
}
|
|
24
24
|
};
|
|
25
25
|
|
|
26
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.
|
|
26
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/isSsoProfile.js
|
|
27
27
|
var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
|
|
28
28
|
|
|
29
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
29
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/constants.js
|
|
30
30
|
var EXPIRE_WINDOW_MS = 5 * 60 * 1e3;
|
|
31
31
|
var REFRESH_MESSAGE = `To refresh this SSO session run 'aws sso login' with the corresponding profile.`;
|
|
32
32
|
|
|
33
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
33
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/getSsoOidcClient.js
|
|
34
34
|
var getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
|
|
35
|
-
const { SSOOIDCClient } = await import("./sso-oidc-
|
|
35
|
+
const { SSOOIDCClient } = await import("./sso-oidc-LBVW2ORP.js");
|
|
36
36
|
const coalesce = (prop) => init.clientConfig?.[prop] ?? init.parentClientConfig?.[prop] ?? callerClientConfig?.[prop];
|
|
37
37
|
const ssoOidcClient = new SSOOIDCClient(Object.assign({}, init.clientConfig ?? {}, {
|
|
38
38
|
region: ssoRegion ?? init.clientConfig?.region,
|
|
@@ -42,9 +42,9 @@ var getSsoOidcClient = async (ssoRegion, init = {}, callerClientConfig) => {
|
|
|
42
42
|
return ssoOidcClient;
|
|
43
43
|
};
|
|
44
44
|
|
|
45
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
45
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/getNewSsoOidcToken.js
|
|
46
46
|
var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConfig) => {
|
|
47
|
-
const { CreateTokenCommand } = await import("./sso-oidc-
|
|
47
|
+
const { CreateTokenCommand } = await import("./sso-oidc-LBVW2ORP.js");
|
|
48
48
|
const ssoOidcClient = await getSsoOidcClient(ssoRegion, init, callerClientConfig);
|
|
49
49
|
return ssoOidcClient.send(new CreateTokenCommand({
|
|
50
50
|
clientId: ssoToken.clientId,
|
|
@@ -54,21 +54,21 @@ var getNewSsoOidcToken = async (ssoToken, ssoRegion, init = {}, callerClientConf
|
|
|
54
54
|
}));
|
|
55
55
|
};
|
|
56
56
|
|
|
57
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
57
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenExpiry.js
|
|
58
58
|
var validateTokenExpiry = (token) => {
|
|
59
59
|
if (token.expiration && token.expiration.getTime() < Date.now()) {
|
|
60
60
|
throw new TokenProviderError(`Token is expired. ${REFRESH_MESSAGE}`, false);
|
|
61
61
|
}
|
|
62
62
|
};
|
|
63
63
|
|
|
64
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
64
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/validateTokenKey.js
|
|
65
65
|
var validateTokenKey = (key, value, forRefresh = false) => {
|
|
66
66
|
if (typeof value === "undefined") {
|
|
67
67
|
throw new TokenProviderError(`Value not present for '${key}' in SSO Token${forRefresh ? ". Cannot refresh" : ""}. ${REFRESH_MESSAGE}`, false);
|
|
68
68
|
}
|
|
69
69
|
};
|
|
70
70
|
|
|
71
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
71
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/writeSSOTokenToFile.js
|
|
72
72
|
import { promises as fsPromises } from "fs";
|
|
73
73
|
var { writeFile } = fsPromises;
|
|
74
74
|
var writeSSOTokenToFile = (id, ssoToken) => {
|
|
@@ -77,7 +77,7 @@ var writeSSOTokenToFile = (id, ssoToken) => {
|
|
|
77
77
|
return writeFile(tokenFilepath, tokenString);
|
|
78
78
|
};
|
|
79
79
|
|
|
80
|
-
// ../node_modules/.bun/@aws-sdk+token-providers@3.
|
|
80
|
+
// ../node_modules/.bun/@aws-sdk+token-providers@3.1041.0/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js
|
|
81
81
|
var lastRefreshAttemptTime = /* @__PURE__ */ new Date(0);
|
|
82
82
|
var fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
83
83
|
init.logger?.debug("@aws-sdk/token-providers - fromSso");
|
|
@@ -149,7 +149,7 @@ var fromSso = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
|
149
149
|
}
|
|
150
150
|
};
|
|
151
151
|
|
|
152
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.
|
|
152
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js
|
|
153
153
|
var SHOULD_FAIL_CREDENTIAL_CHAIN = false;
|
|
154
154
|
var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, callerClientConfig, profile, filepath, configFilepath, ignoreCache, logger }) => {
|
|
155
155
|
let token;
|
|
@@ -189,7 +189,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
|
|
|
189
189
|
});
|
|
190
190
|
}
|
|
191
191
|
const { accessToken } = token;
|
|
192
|
-
const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-
|
|
192
|
+
const { SSOClient, GetRoleCredentialsCommand } = await import("./loadSso-3WFGTQV7.js");
|
|
193
193
|
const sso = ssoClient || new SSOClient(Object.assign({}, clientConfig ?? {}, {
|
|
194
194
|
logger: clientConfig?.logger ?? callerClientConfig?.logger ?? parentClientConfig?.logger,
|
|
195
195
|
region: clientConfig?.region ?? ssoRegion,
|
|
@@ -231,7 +231,7 @@ var resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoR
|
|
|
231
231
|
return credentials;
|
|
232
232
|
};
|
|
233
233
|
|
|
234
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.
|
|
234
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js
|
|
235
235
|
var validateSsoProfile = (profile, logger) => {
|
|
236
236
|
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
|
|
237
237
|
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
|
|
@@ -241,7 +241,7 @@ Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.ht
|
|
|
241
241
|
return profile;
|
|
242
242
|
};
|
|
243
243
|
|
|
244
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.
|
|
244
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-sso@3.972.38/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js
|
|
245
245
|
var fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
246
246
|
init.logger?.debug("@aws-sdk/credential-provider-sso - fromSSO");
|
|
247
247
|
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
@@ -1,28 +1,26 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
|
-
import {
|
|
3
|
-
parseRfc3339DateTime
|
|
4
|
-
} from "./chunk-5V5ZNFZK.js";
|
|
5
2
|
import {
|
|
6
3
|
sdkStreamMixin
|
|
7
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-AAVVX4U5.js";
|
|
8
5
|
import {
|
|
9
|
-
NodeHttpHandler
|
|
10
|
-
|
|
6
|
+
NodeHttpHandler,
|
|
7
|
+
parseRfc3339DateTime
|
|
8
|
+
} from "./chunk-SGITM26Q.js";
|
|
11
9
|
import {
|
|
12
10
|
HttpRequest
|
|
13
|
-
} from "./chunk-
|
|
11
|
+
} from "./chunk-SWX24AGM.js";
|
|
14
12
|
import "./chunk-ERL3EC7G.js";
|
|
15
13
|
import {
|
|
16
14
|
setCredentialFeature
|
|
17
|
-
} from "./chunk-
|
|
15
|
+
} from "./chunk-ZNARSMJG.js";
|
|
18
16
|
import {
|
|
19
17
|
CredentialsProviderError
|
|
20
|
-
} from "./chunk-
|
|
18
|
+
} from "./chunk-ST5JVROM.js";
|
|
21
19
|
|
|
22
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
20
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
|
|
23
21
|
import fs from "fs/promises";
|
|
24
22
|
|
|
25
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
23
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/checkUrl.js
|
|
26
24
|
var ECS_CONTAINER_HOST = "169.254.170.2";
|
|
27
25
|
var EKS_CONTAINER_HOST_IPv4 = "169.254.170.23";
|
|
28
26
|
var EKS_CONTAINER_HOST_IPv6 = "[fd00:ec2::23]";
|
|
@@ -56,7 +54,7 @@ var checkUrl = (url, logger) => {
|
|
|
56
54
|
- EKS container host 169.254.170.23 or [fd00:ec2::23]`, { logger });
|
|
57
55
|
};
|
|
58
56
|
|
|
59
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
57
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js
|
|
60
58
|
function createGetRequest(url) {
|
|
61
59
|
return new HttpRequest({
|
|
62
60
|
protocol: url.protocol,
|
|
@@ -99,7 +97,7 @@ async function getCredentials(response, logger) {
|
|
|
99
97
|
throw new CredentialsProviderError(`Server responded with status: ${response.statusCode}`, { logger });
|
|
100
98
|
}
|
|
101
99
|
|
|
102
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
100
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/retry-wrapper.js
|
|
103
101
|
var retryWrapper = (toRetry, maxRetries, delayMs) => {
|
|
104
102
|
return async () => {
|
|
105
103
|
for (let i = 0; i < maxRetries; ++i) {
|
|
@@ -113,7 +111,7 @@ var retryWrapper = (toRetry, maxRetries, delayMs) => {
|
|
|
113
111
|
};
|
|
114
112
|
};
|
|
115
113
|
|
|
116
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.
|
|
114
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-http@3.972.36/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js
|
|
117
115
|
var AWS_CONTAINER_CREDENTIALS_RELATIVE_URI = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI";
|
|
118
116
|
var DEFAULT_LINK_LOCAL_HOST = "http://169.254.170.2";
|
|
119
117
|
var AWS_CONTAINER_CREDENTIALS_FULL_URI = "AWS_CONTAINER_CREDENTIALS_FULL_URI";
|
|
@@ -2,18 +2,18 @@
|
|
|
2
2
|
import {
|
|
3
3
|
loadConfig,
|
|
4
4
|
parseUrl
|
|
5
|
-
} from "./chunk-
|
|
6
|
-
import "./chunk-
|
|
7
|
-
import "./chunk-
|
|
5
|
+
} from "./chunk-2Y7PD56W.js";
|
|
6
|
+
import "./chunk-WPAL27HA.js";
|
|
7
|
+
import "./chunk-5VUQ55WW.js";
|
|
8
8
|
import {
|
|
9
9
|
CredentialsProviderError,
|
|
10
10
|
ProviderError
|
|
11
|
-
} from "./chunk-
|
|
11
|
+
} from "./chunk-ST5JVROM.js";
|
|
12
12
|
|
|
13
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
13
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
|
|
14
14
|
import { parse } from "url";
|
|
15
15
|
|
|
16
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
16
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/httpRequest.js
|
|
17
17
|
import { Buffer } from "buffer";
|
|
18
18
|
import { request } from "http";
|
|
19
19
|
function httpRequest(options) {
|
|
@@ -50,7 +50,7 @@ function httpRequest(options) {
|
|
|
50
50
|
});
|
|
51
51
|
}
|
|
52
52
|
|
|
53
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
53
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/ImdsCredentials.js
|
|
54
54
|
var isImdsCredentials = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.AccessKeyId === "string" && typeof arg.SecretAccessKey === "string" && typeof arg.Token === "string" && typeof arg.Expiration === "string";
|
|
55
55
|
var fromImdsCredentials = (creds) => ({
|
|
56
56
|
accessKeyId: creds.AccessKeyId,
|
|
@@ -60,12 +60,12 @@ var fromImdsCredentials = (creds) => ({
|
|
|
60
60
|
...creds.AccountId && { accountId: creds.AccountId }
|
|
61
61
|
});
|
|
62
62
|
|
|
63
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
63
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/RemoteProviderInit.js
|
|
64
64
|
var DEFAULT_TIMEOUT = 1e3;
|
|
65
65
|
var DEFAULT_MAX_RETRIES = 0;
|
|
66
66
|
var providerConfigFromInit = ({ maxRetries = DEFAULT_MAX_RETRIES, timeout = DEFAULT_TIMEOUT }) => ({ maxRetries, timeout });
|
|
67
67
|
|
|
68
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
68
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/remoteProvider/retry.js
|
|
69
69
|
var retry = (toRetry, maxRetries) => {
|
|
70
70
|
let promise = toRetry();
|
|
71
71
|
for (let i = 0; i < maxRetries; i++) {
|
|
@@ -74,7 +74,7 @@ var retry = (toRetry, maxRetries) => {
|
|
|
74
74
|
return promise;
|
|
75
75
|
};
|
|
76
76
|
|
|
77
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
77
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js
|
|
78
78
|
var ENV_CMDS_FULL_URI = "AWS_CONTAINER_CREDENTIALS_FULL_URI";
|
|
79
79
|
var ENV_CMDS_RELATIVE_URI = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI";
|
|
80
80
|
var ENV_CMDS_AUTH_TOKEN = "AWS_CONTAINER_AUTHORIZATION_TOKEN";
|
|
@@ -145,7 +145,7 @@ var getCmdsUri = async ({ logger }) => {
|
|
|
145
145
|
});
|
|
146
146
|
};
|
|
147
147
|
|
|
148
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
148
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/error/InstanceMetadataV1FallbackError.js
|
|
149
149
|
var InstanceMetadataV1FallbackError = class _InstanceMetadataV1FallbackError extends CredentialsProviderError {
|
|
150
150
|
tryNextLink;
|
|
151
151
|
name = "InstanceMetadataV1FallbackError";
|
|
@@ -156,14 +156,14 @@ var InstanceMetadataV1FallbackError = class _InstanceMetadataV1FallbackError ext
|
|
|
156
156
|
}
|
|
157
157
|
};
|
|
158
158
|
|
|
159
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
159
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/Endpoint.js
|
|
160
160
|
var Endpoint;
|
|
161
161
|
(function(Endpoint2) {
|
|
162
162
|
Endpoint2["IPv4"] = "http://169.254.169.254";
|
|
163
163
|
Endpoint2["IPv6"] = "http://[fd00:ec2::254]";
|
|
164
164
|
})(Endpoint || (Endpoint = {}));
|
|
165
165
|
|
|
166
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
166
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointConfigOptions.js
|
|
167
167
|
var ENV_ENDPOINT_NAME = "AWS_EC2_METADATA_SERVICE_ENDPOINT";
|
|
168
168
|
var CONFIG_ENDPOINT_NAME = "ec2_metadata_service_endpoint";
|
|
169
169
|
var ENDPOINT_CONFIG_OPTIONS = {
|
|
@@ -172,14 +172,14 @@ var ENDPOINT_CONFIG_OPTIONS = {
|
|
|
172
172
|
default: void 0
|
|
173
173
|
};
|
|
174
174
|
|
|
175
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
175
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointMode.js
|
|
176
176
|
var EndpointMode;
|
|
177
177
|
(function(EndpointMode2) {
|
|
178
178
|
EndpointMode2["IPv4"] = "IPv4";
|
|
179
179
|
EndpointMode2["IPv6"] = "IPv6";
|
|
180
180
|
})(EndpointMode || (EndpointMode = {}));
|
|
181
181
|
|
|
182
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
182
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/config/EndpointModeConfigOptions.js
|
|
183
183
|
var ENV_ENDPOINT_MODE_NAME = "AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE";
|
|
184
184
|
var CONFIG_ENDPOINT_MODE_NAME = "ec2_metadata_service_endpoint_mode";
|
|
185
185
|
var ENDPOINT_MODE_CONFIG_OPTIONS = {
|
|
@@ -188,7 +188,7 @@ var ENDPOINT_MODE_CONFIG_OPTIONS = {
|
|
|
188
188
|
default: EndpointMode.IPv4
|
|
189
189
|
};
|
|
190
190
|
|
|
191
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
191
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/getInstanceMetadataEndpoint.js
|
|
192
192
|
var getInstanceMetadataEndpoint = async () => parseUrl(await getFromEndpointConfig() || await getFromEndpointModeConfig());
|
|
193
193
|
var getFromEndpointConfig = async () => loadConfig(ENDPOINT_CONFIG_OPTIONS)();
|
|
194
194
|
var getFromEndpointModeConfig = async () => {
|
|
@@ -203,7 +203,7 @@ var getFromEndpointModeConfig = async () => {
|
|
|
203
203
|
}
|
|
204
204
|
};
|
|
205
205
|
|
|
206
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
206
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/getExtendedInstanceMetadataCredentials.js
|
|
207
207
|
var STATIC_STABILITY_REFRESH_INTERVAL_SECONDS = 5 * 60;
|
|
208
208
|
var STATIC_STABILITY_REFRESH_INTERVAL_JITTER_WINDOW_SECONDS = 5 * 60;
|
|
209
209
|
var STATIC_STABILITY_DOC_URL = "https://docs.aws.amazon.com/sdkref/latest/guide/feature-static-credentials.html";
|
|
@@ -220,7 +220,7 @@ For more information, please visit: ` + STATIC_STABILITY_DOC_URL);
|
|
|
220
220
|
};
|
|
221
221
|
};
|
|
222
222
|
|
|
223
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
223
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/utils/staticStabilityProvider.js
|
|
224
224
|
var staticStabilityProvider = (provider, options = {}) => {
|
|
225
225
|
const logger = options?.logger || console;
|
|
226
226
|
let pastCredentials;
|
|
@@ -244,7 +244,7 @@ var staticStabilityProvider = (provider, options = {}) => {
|
|
|
244
244
|
};
|
|
245
245
|
};
|
|
246
246
|
|
|
247
|
-
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.
|
|
247
|
+
// ../node_modules/.bun/@smithy+credential-provider-imds@4.2.14/node_modules/@smithy/credential-provider-imds/dist-es/fromInstanceMetadata.js
|
|
248
248
|
var IMDS_PATH = "/latest/meta-data/iam/security-credentials/";
|
|
249
249
|
var IMDS_TOKEN_PATH = "/latest/api/token";
|
|
250
250
|
var AWS_EC2_METADATA_V1_DISABLED = "AWS_EC2_METADATA_V1_DISABLED";
|
|
@@ -1,39 +1,39 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
import {
|
|
3
3
|
chain
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-WPAL27HA.js";
|
|
5
|
+
import {
|
|
6
|
+
HttpRequest
|
|
7
|
+
} from "./chunk-SWX24AGM.js";
|
|
5
8
|
import {
|
|
6
9
|
getProfileName,
|
|
7
10
|
parseKnownFiles,
|
|
8
11
|
readFile
|
|
9
|
-
} from "./chunk-
|
|
10
|
-
import {
|
|
11
|
-
HttpRequest
|
|
12
|
-
} from "./chunk-WCAERHFE.js";
|
|
12
|
+
} from "./chunk-5VUQ55WW.js";
|
|
13
13
|
import {
|
|
14
14
|
setCredentialFeature
|
|
15
|
-
} from "./chunk-
|
|
15
|
+
} from "./chunk-ZNARSMJG.js";
|
|
16
16
|
import {
|
|
17
17
|
CredentialsProviderError
|
|
18
|
-
} from "./chunk-
|
|
18
|
+
} from "./chunk-ST5JVROM.js";
|
|
19
19
|
|
|
20
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
20
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js
|
|
21
21
|
var resolveCredentialSource = (credentialSource, profileName, logger) => {
|
|
22
22
|
const sourceProvidersMap = {
|
|
23
23
|
EcsContainer: async (options) => {
|
|
24
|
-
const { fromHttp } = await import("./dist-es-
|
|
25
|
-
const { fromContainerMetadata } = await import("./dist-es-
|
|
24
|
+
const { fromHttp } = await import("./dist-es-F6RG3S4O.js");
|
|
25
|
+
const { fromContainerMetadata } = await import("./dist-es-GGHPJZ3K.js");
|
|
26
26
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
|
|
27
27
|
return async () => chain(fromHttp(options ?? {}), fromContainerMetadata(options))().then(setNamedProvider);
|
|
28
28
|
},
|
|
29
29
|
Ec2InstanceMetadata: async (options) => {
|
|
30
30
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
|
|
31
|
-
const { fromInstanceMetadata } = await import("./dist-es-
|
|
31
|
+
const { fromInstanceMetadata } = await import("./dist-es-GGHPJZ3K.js");
|
|
32
32
|
return async () => fromInstanceMetadata(options)().then(setNamedProvider);
|
|
33
33
|
},
|
|
34
34
|
Environment: async (options) => {
|
|
35
35
|
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
|
|
36
|
-
const { fromEnv } = await import("./dist-es-
|
|
36
|
+
const { fromEnv } = await import("./dist-es-YKS4LXBO.js");
|
|
37
37
|
return async () => fromEnv(options)().then(setNamedProvider);
|
|
38
38
|
}
|
|
39
39
|
};
|
|
@@ -45,7 +45,7 @@ var resolveCredentialSource = (credentialSource, profileName, logger) => {
|
|
|
45
45
|
};
|
|
46
46
|
var setNamedProvider = (creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_NAMED_PROVIDER", "p");
|
|
47
47
|
|
|
48
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
48
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
|
|
49
49
|
var isAssumeRoleProfile = (arg, { profile = "default", logger } = {}) => {
|
|
50
50
|
return Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger }));
|
|
51
51
|
};
|
|
@@ -68,7 +68,7 @@ var resolveAssumeRoleCredentials = async (profileName, profiles, options, caller
|
|
|
68
68
|
const profileData = profiles[profileName];
|
|
69
69
|
const { source_profile, region } = profileData;
|
|
70
70
|
if (!options.roleAssumer) {
|
|
71
|
-
const { getDefaultRoleAssumer } = await import("./sts-
|
|
71
|
+
const { getDefaultRoleAssumer } = await import("./sts-DKGAU6YE.js");
|
|
72
72
|
options.roleAssumer = getDefaultRoleAssumer({
|
|
73
73
|
...options.clientConfig,
|
|
74
74
|
credentialProviderLogger: options.logger,
|
|
@@ -112,7 +112,7 @@ var isCredentialSourceWithoutRoleArn = (section) => {
|
|
|
112
112
|
return !section.role_arn && !!section.credential_source;
|
|
113
113
|
};
|
|
114
114
|
|
|
115
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.
|
|
115
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.38/node_modules/@aws-sdk/credential-provider-login/dist-es/LoginCredentialsFetcher.js
|
|
116
116
|
import { createHash, createPrivateKey, createPublicKey, sign } from "crypto";
|
|
117
117
|
import { promises as fs } from "fs";
|
|
118
118
|
import { homedir } from "os";
|
|
@@ -154,7 +154,7 @@ var LoginCredentialsFetcher = class _LoginCredentialsFetcher {
|
|
|
154
154
|
return this.profileData.login_session;
|
|
155
155
|
}
|
|
156
156
|
async refresh(token) {
|
|
157
|
-
const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-
|
|
157
|
+
const { SigninClient, CreateOAuth2TokenCommand } = await import("./signin-RSKKVVIS.js");
|
|
158
158
|
const { logger, userAgentAppId } = this.callerClientConfig ?? {};
|
|
159
159
|
const isH2 = (requestHandler2) => {
|
|
160
160
|
return requestHandler2?.metadata?.handlerProtocol === "h2";
|
|
@@ -364,7 +364,7 @@ var LoginCredentialsFetcher = class _LoginCredentialsFetcher {
|
|
|
364
364
|
}
|
|
365
365
|
};
|
|
366
366
|
|
|
367
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.
|
|
367
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-login@3.972.38/node_modules/@aws-sdk/credential-provider-login/dist-es/fromLoginCredentials.js
|
|
368
368
|
var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
|
|
369
369
|
init?.logger?.debug?.("@aws-sdk/credential-providers - fromLoginCredentials");
|
|
370
370
|
const profiles = await parseKnownFiles(init || {});
|
|
@@ -383,7 +383,7 @@ var fromLoginCredentials = (init) => async ({ callerClientConfig } = {}) => {
|
|
|
383
383
|
return setCredentialFeature(credentials, "CREDENTIALS_LOGIN", "AD");
|
|
384
384
|
};
|
|
385
385
|
|
|
386
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
386
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveLoginCredentials.js
|
|
387
387
|
var isLoginProfile = (data) => {
|
|
388
388
|
return Boolean(data && data.login_session);
|
|
389
389
|
};
|
|
@@ -395,16 +395,16 @@ var resolveLoginCredentials = async (profileName, options, callerClientConfig) =
|
|
|
395
395
|
return setCredentialFeature(credentials, "CREDENTIALS_PROFILE_LOGIN", "AC");
|
|
396
396
|
};
|
|
397
397
|
|
|
398
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
398
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProcessCredentials.js
|
|
399
399
|
var isProcessProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string";
|
|
400
|
-
var resolveProcessCredentials = async (options, profile) => import("./dist-es-
|
|
400
|
+
var resolveProcessCredentials = async (options, profile) => import("./dist-es-Q3YZVSCP.js").then(({ fromProcess }) => fromProcess({
|
|
401
401
|
...options,
|
|
402
402
|
profile
|
|
403
403
|
})().then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_PROCESS", "v")));
|
|
404
404
|
|
|
405
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
405
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveSsoCredentials.js
|
|
406
406
|
var resolveSsoCredentials = async (profile, profileData, options = {}, callerClientConfig) => {
|
|
407
|
-
const { fromSSO } = await import("./dist-es-
|
|
407
|
+
const { fromSSO } = await import("./dist-es-BUG4C6LP.js");
|
|
408
408
|
return fromSSO({
|
|
409
409
|
profile,
|
|
410
410
|
logger: options.logger,
|
|
@@ -422,7 +422,7 @@ var resolveSsoCredentials = async (profile, profileData, options = {}, callerCli
|
|
|
422
422
|
};
|
|
423
423
|
var isSsoProfile = (arg) => arg && (typeof arg.sso_start_url === "string" || typeof arg.sso_account_id === "string" || typeof arg.sso_session === "string" || typeof arg.sso_region === "string" || typeof arg.sso_role_name === "string");
|
|
424
424
|
|
|
425
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
425
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js
|
|
426
426
|
var isStaticCredsProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1 && ["undefined", "string"].indexOf(typeof arg.aws_account_id) > -1;
|
|
427
427
|
var resolveStaticCredentials = async (profile, options) => {
|
|
428
428
|
options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
|
|
@@ -436,9 +436,9 @@ var resolveStaticCredentials = async (profile, options) => {
|
|
|
436
436
|
return setCredentialFeature(credentials, "CREDENTIALS_PROFILE", "n");
|
|
437
437
|
};
|
|
438
438
|
|
|
439
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
439
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveWebIdentityCredentials.js
|
|
440
440
|
var isWebIdentityProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
441
|
-
var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-
|
|
441
|
+
var resolveWebIdentityCredentials = async (profile, options, callerClientConfig) => import("./dist-es-JIV2SPEM.js").then(({ fromTokenFile }) => fromTokenFile({
|
|
442
442
|
webIdentityTokenFile: profile.web_identity_token_file,
|
|
443
443
|
roleArn: profile.role_arn,
|
|
444
444
|
roleSessionName: profile.role_session_name,
|
|
@@ -449,7 +449,7 @@ var resolveWebIdentityCredentials = async (profile, options, callerClientConfig)
|
|
|
449
449
|
callerClientConfig
|
|
450
450
|
}).then((creds) => setCredentialFeature(creds, "CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN", "q")));
|
|
451
451
|
|
|
452
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
452
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js
|
|
453
453
|
var resolveProfileData = async (profileName, profiles, options, callerClientConfig, visitedProfiles = {}, isAssumeRoleRecursiveCall = false) => {
|
|
454
454
|
const data = profiles[profileName];
|
|
455
455
|
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
@@ -476,7 +476,7 @@ var resolveProfileData = async (profileName, profiles, options, callerClientConf
|
|
|
476
476
|
throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });
|
|
477
477
|
};
|
|
478
478
|
|
|
479
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.
|
|
479
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-ini@3.972.38/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js
|
|
480
480
|
var fromIni = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
481
481
|
init.logger?.debug("@aws-sdk/credential-provider-ini - fromIni");
|
|
482
482
|
const profiles = await parseKnownFiles(init);
|
|
@@ -1,24 +1,24 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
import {
|
|
3
3
|
externalDataInterceptor
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-5VUQ55WW.js";
|
|
5
5
|
import {
|
|
6
6
|
setCredentialFeature
|
|
7
|
-
} from "./chunk-
|
|
7
|
+
} from "./chunk-ZNARSMJG.js";
|
|
8
8
|
import {
|
|
9
9
|
CredentialsProviderError
|
|
10
|
-
} from "./chunk-
|
|
10
|
+
} from "./chunk-ST5JVROM.js";
|
|
11
11
|
|
|
12
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.
|
|
12
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
|
|
13
13
|
import { readFileSync } from "fs";
|
|
14
14
|
|
|
15
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.
|
|
15
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js
|
|
16
16
|
var fromWebToken = (init) => async (awsIdentityProperties) => {
|
|
17
17
|
init.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");
|
|
18
18
|
const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
|
|
19
19
|
let { roleAssumerWithWebIdentity } = init;
|
|
20
20
|
if (!roleAssumerWithWebIdentity) {
|
|
21
|
-
const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-
|
|
21
|
+
const { getDefaultRoleAssumerWithWebIdentity } = await import("./sts-DKGAU6YE.js");
|
|
22
22
|
roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
|
|
23
23
|
...init.clientConfig,
|
|
24
24
|
credentialProviderLogger: init.logger,
|
|
@@ -39,7 +39,7 @@ var fromWebToken = (init) => async (awsIdentityProperties) => {
|
|
|
39
39
|
});
|
|
40
40
|
};
|
|
41
41
|
|
|
42
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.
|
|
42
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-web-identity@3.972.38/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
|
|
43
43
|
var ENV_TOKEN_FILE = "AWS_WEB_IDENTITY_TOKEN_FILE";
|
|
44
44
|
var ENV_ROLE_ARN = "AWS_ROLE_ARN";
|
|
45
45
|
var ENV_ROLE_SESSION_NAME = "AWS_ROLE_SESSION_NAME";
|
|
@@ -3,19 +3,19 @@ import {
|
|
|
3
3
|
externalDataInterceptor,
|
|
4
4
|
getProfileName,
|
|
5
5
|
parseKnownFiles
|
|
6
|
-
} from "./chunk-
|
|
6
|
+
} from "./chunk-5VUQ55WW.js";
|
|
7
7
|
import {
|
|
8
8
|
setCredentialFeature
|
|
9
|
-
} from "./chunk-
|
|
9
|
+
} from "./chunk-ZNARSMJG.js";
|
|
10
10
|
import {
|
|
11
11
|
CredentialsProviderError
|
|
12
|
-
} from "./chunk-
|
|
12
|
+
} from "./chunk-ST5JVROM.js";
|
|
13
13
|
|
|
14
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.
|
|
14
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
|
|
15
15
|
import { exec } from "child_process";
|
|
16
16
|
import { promisify } from "util";
|
|
17
17
|
|
|
18
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.
|
|
18
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/getValidatedProcessCredentials.js
|
|
19
19
|
var getValidatedProcessCredentials = (profileName, data, profiles) => {
|
|
20
20
|
if (data.Version !== 1) {
|
|
21
21
|
throw Error(`Profile ${profileName} credential_process did not return Version 1.`);
|
|
@@ -46,7 +46,7 @@ var getValidatedProcessCredentials = (profileName, data, profiles) => {
|
|
|
46
46
|
return credentials;
|
|
47
47
|
};
|
|
48
48
|
|
|
49
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.
|
|
49
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
|
|
50
50
|
var resolveProcessCredentials = async (profileName, profiles, logger) => {
|
|
51
51
|
const profile = profiles[profileName];
|
|
52
52
|
if (profiles[profileName]) {
|
|
@@ -75,7 +75,7 @@ var resolveProcessCredentials = async (profileName, profiles, logger) => {
|
|
|
75
75
|
}
|
|
76
76
|
};
|
|
77
77
|
|
|
78
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.
|
|
78
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-process@3.972.34/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js
|
|
79
79
|
var fromProcess = (init = {}) => async ({ callerClientConfig } = {}) => {
|
|
80
80
|
init.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");
|
|
81
81
|
const profiles = await parseKnownFiles(init);
|
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
2
|
import {
|
|
3
3
|
setCredentialFeature
|
|
4
|
-
} from "./chunk-
|
|
4
|
+
} from "./chunk-ZNARSMJG.js";
|
|
5
5
|
import {
|
|
6
6
|
CredentialsProviderError
|
|
7
|
-
} from "./chunk-
|
|
7
|
+
} from "./chunk-ST5JVROM.js";
|
|
8
8
|
|
|
9
|
-
// ../node_modules/.bun/@aws-sdk+credential-provider-env@3.972.
|
|
9
|
+
// ../node_modules/.bun/@aws-sdk+credential-provider-env@3.972.34/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js
|
|
10
10
|
var ENV_KEY = "AWS_ACCESS_KEY_ID";
|
|
11
11
|
var ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
|
|
12
12
|
var ENV_SESSION = "AWS_SESSION_TOKEN";
|