2026-03-01 10:29:20 +00:00
export const id = 998 ;
export const ids = [ 998 ] ;
export const modules = {
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ 7523 :
2026-01-30 14:42:57 +00:00
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
2026-03-03 17:11:57 +00:00
var protocolHttp = _ _webpack _require _ _ ( 2356 ) ;
var core = _ _webpack _require _ _ ( 402 ) ;
var propertyProvider = _ _webpack _require _ _ ( 8857 ) ;
var client = _ _webpack _require _ _ ( 5152 ) ;
var signatureV4 = _ _webpack _require _ _ ( 5118 ) ;
const getDateHeader = ( response ) => protocolHttp . HttpResponse . isInstance ( response ) ? response . headers ? . date ? ? response . headers ? . Date : undefined ;
const getSkewCorrectedDate = ( systemClockOffset ) => new Date ( Date . now ( ) + systemClockOffset ) ;
const isClockSkewed = ( clockTime , systemClockOffset ) => Math . abs ( getSkewCorrectedDate ( systemClockOffset ) . getTime ( ) - clockTime ) >= 300000 ;
const getUpdatedSystemClockOffset = ( clockTime , currentSystemClockOffset ) => {
const clockTimeInMs = Date . parse ( clockTime ) ;
if ( isClockSkewed ( clockTimeInMs , currentSystemClockOffset ) ) {
return clockTimeInMs - Date . now ( ) ;
}
return currentSystemClockOffset ;
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
const throwSigningPropertyError = ( name , property ) => {
if ( ! property ) {
throw new Error ( ` Property \` ${ name } \` is not resolved for AWS SDK SigV4Auth ` ) ;
}
return property ;
} ;
const validateSigningProperties = async ( signingProperties ) => {
const context = throwSigningPropertyError ( "context" , signingProperties . context ) ;
const config = throwSigningPropertyError ( "config" , signingProperties . config ) ;
const authScheme = context . endpointV2 ? . properties ? . authSchemes ? . [ 0 ] ;
const signerFunction = throwSigningPropertyError ( "signer" , config . signer ) ;
const signer = await signerFunction ( authScheme ) ;
const signingRegion = signingProperties ? . signingRegion ;
const signingRegionSet = signingProperties ? . signingRegionSet ;
const signingName = signingProperties ? . signingName ;
2026-01-30 14:42:57 +00:00
return {
2026-03-03 17:11:57 +00:00
config ,
signer ,
signingRegion ,
signingRegionSet ,
signingName ,
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
} ;
class AwsSdkSigV4Signer {
async sign ( httpRequest , identity , signingProperties ) {
if ( ! protocolHttp . HttpRequest . isInstance ( httpRequest ) ) {
throw new Error ( "The request is not an instance of `HttpRequest` and cannot be signed" ) ;
}
const validatedProps = await validateSigningProperties ( signingProperties ) ;
const { config , signer } = validatedProps ;
let { signingRegion , signingName } = validatedProps ;
const handlerExecutionContext = signingProperties . context ;
if ( handlerExecutionContext ? . authSchemes ? . length ? ? 0 > 1 ) {
const [ first , second ] = handlerExecutionContext . authSchemes ;
if ( first ? . name === "sigv4a" && second ? . name === "sigv4" ) {
signingRegion = second ? . signingRegion ? ? signingRegion ;
signingName = second ? . signingName ? ? signingName ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
}
const signedRequest = await signer . sign ( httpRequest , {
signingDate : getSkewCorrectedDate ( config . systemClockOffset ) ,
signingRegion : signingRegion ,
signingService : signingName ,
} ) ;
return signedRequest ;
}
errorHandler ( signingProperties ) {
return ( error ) => {
const serverTime = error . ServerTime ? ? getDateHeader ( error . $response ) ;
if ( serverTime ) {
const config = throwSigningPropertyError ( "config" , signingProperties . config ) ;
const initialSystemClockOffset = config . systemClockOffset ;
config . systemClockOffset = getUpdatedSystemClockOffset ( serverTime , config . systemClockOffset ) ;
const clockSkewCorrected = config . systemClockOffset !== initialSystemClockOffset ;
if ( clockSkewCorrected && error . $metadata ) {
error . $metadata . clockSkewCorrected = true ;
}
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
throw error ;
} ;
}
successHandler ( httpResponse , signingProperties ) {
const dateHeader = getDateHeader ( httpResponse ) ;
if ( dateHeader ) {
const config = throwSigningPropertyError ( "config" , signingProperties . config ) ;
config . systemClockOffset = getUpdatedSystemClockOffset ( dateHeader , config . systemClockOffset ) ;
2026-01-30 14:42:57 +00:00
}
}
2026-03-03 17:11:57 +00:00
}
const AWSSDKSigV4Signer = AwsSdkSigV4Signer ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
class AwsSdkSigV4ASigner extends AwsSdkSigV4Signer {
async sign ( httpRequest , identity , signingProperties ) {
if ( ! protocolHttp . HttpRequest . isInstance ( httpRequest ) ) {
throw new Error ( "The request is not an instance of `HttpRequest` and cannot be signed" ) ;
}
const { config , signer , signingRegion , signingRegionSet , signingName } = await validateSigningProperties ( signingProperties ) ;
const configResolvedSigningRegionSet = await config . sigv4aSigningRegionSet ? . ( ) ;
const multiRegionOverride = ( configResolvedSigningRegionSet ? ?
signingRegionSet ? ? [ signingRegion ] ) . join ( "," ) ;
const signedRequest = await signer . sign ( httpRequest , {
signingDate : getSkewCorrectedDate ( config . systemClockOffset ) ,
signingRegion : multiRegionOverride ,
signingService : signingName ,
} ) ;
return signedRequest ;
}
}
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
const getArrayForCommaSeparatedString = ( str ) => typeof str === "string" && str . length > 0 ? str . split ( "," ) . map ( ( item ) => item . trim ( ) ) : [ ] ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
const getBearerTokenEnvKey = ( signingName ) => ` AWS_BEARER_TOKEN_ ${ signingName . replace ( /[\s-]/g , "_" ) . toUpperCase ( ) } ` ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
const NODE _AUTH _SCHEME _PREFERENCE _ENV _KEY = "AWS_AUTH_SCHEME_PREFERENCE" ;
const NODE _AUTH _SCHEME _PREFERENCE _CONFIG _KEY = "auth_scheme_preference" ;
const NODE _AUTH _SCHEME _PREFERENCE _OPTIONS = {
environmentVariableSelector : ( env , options ) => {
if ( options ? . signingName ) {
const bearerTokenKey = getBearerTokenEnvKey ( options . signingName ) ;
if ( bearerTokenKey in env )
return [ "httpBearerAuth" ] ;
}
if ( ! ( NODE _AUTH _SCHEME _PREFERENCE _ENV _KEY in env ) )
return undefined ;
return getArrayForCommaSeparatedString ( env [ NODE _AUTH _SCHEME _PREFERENCE _ENV _KEY ] ) ;
} ,
configFileSelector : ( profile ) => {
if ( ! ( NODE _AUTH _SCHEME _PREFERENCE _CONFIG _KEY in profile ) )
return undefined ;
return getArrayForCommaSeparatedString ( profile [ NODE _AUTH _SCHEME _PREFERENCE _CONFIG _KEY ] ) ;
} ,
default : [ ] ,
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
const resolveAwsSdkSigV4AConfig = ( config ) => {
config . sigv4aSigningRegionSet = core . normalizeProvider ( config . sigv4aSigningRegionSet ) ;
return config ;
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
const NODE _SIGV4A _CONFIG _OPTIONS = {
environmentVariableSelector ( env ) {
if ( env . AWS _SIGV4A _SIGNING _REGION _SET ) {
return env . AWS _SIGV4A _SIGNING _REGION _SET . split ( "," ) . map ( ( _ ) => _ . trim ( ) ) ;
}
throw new propertyProvider . ProviderError ( "AWS_SIGV4A_SIGNING_REGION_SET not set in env." , {
tryNextLink : true ,
} ) ;
} ,
configFileSelector ( profile ) {
if ( profile . sigv4a _signing _region _set ) {
return ( profile . sigv4a _signing _region _set ? ? "" ) . split ( "," ) . map ( ( _ ) => _ . trim ( ) ) ;
}
throw new propertyProvider . ProviderError ( "sigv4a_signing_region_set not set in profile." , {
tryNextLink : true ,
} ) ;
} ,
default : undefined ,
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
const resolveAwsSdkSigV4Config = ( config ) => {
let inputCredentials = config . credentials ;
let isUserSupplied = ! ! config . credentials ;
let resolvedCredentials = undefined ;
Object . defineProperty ( config , "credentials" , {
set ( credentials ) {
if ( credentials && credentials !== inputCredentials && credentials !== resolvedCredentials ) {
isUserSupplied = true ;
}
inputCredentials = credentials ;
const memoizedProvider = normalizeCredentialProvider ( config , {
credentials : inputCredentials ,
credentialDefaultProvider : config . credentialDefaultProvider ,
} ) ;
const boundProvider = bindCallerConfig ( config , memoizedProvider ) ;
if ( isUserSupplied && ! boundProvider . attributed ) {
const isCredentialObject = typeof inputCredentials === "object" && inputCredentials !== null ;
resolvedCredentials = async ( options ) => {
const creds = await boundProvider ( options ) ;
const attributedCreds = creds ;
if ( isCredentialObject && ( ! attributedCreds . $source || Object . keys ( attributedCreds . $source ) . length === 0 ) ) {
return client . setCredentialFeature ( attributedCreds , "CREDENTIALS_CODE" , "e" ) ;
}
return attributedCreds ;
} ;
resolvedCredentials . memoized = boundProvider . memoized ;
resolvedCredentials . configBound = boundProvider . configBound ;
resolvedCredentials . attributed = true ;
2026-01-30 14:42:57 +00:00
}
else {
2026-03-03 17:11:57 +00:00
resolvedCredentials = boundProvider ;
2026-01-30 14:42:57 +00:00
}
} ,
2026-03-03 17:11:57 +00:00
get ( ) {
return resolvedCredentials ;
2026-01-30 14:42:57 +00:00
} ,
2026-03-03 17:11:57 +00:00
enumerable : true ,
configurable : true ,
} ) ;
config . credentials = inputCredentials ;
const { signingEscapePath = true , systemClockOffset = config . systemClockOffset || 0 , sha256 , } = config ;
let signer ;
if ( config . signer ) {
signer = core . normalizeProvider ( config . signer ) ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
else if ( config . regionInfoProvider ) {
signer = ( ) => core . normalizeProvider ( config . region ) ( )
. then ( async ( region ) => [
( await config . regionInfoProvider ( region , {
useFipsEndpoint : await config . useFipsEndpoint ( ) ,
useDualstackEndpoint : await config . useDualstackEndpoint ( ) ,
} ) ) || { } ,
region ,
] )
. then ( ( [ regionInfo , region ] ) => {
const { signingRegion , signingService } = regionInfo ;
config . signingRegion = config . signingRegion || signingRegion || region ;
config . signingName = config . signingName || signingService || config . serviceId ;
const params = {
... config ,
credentials : config . credentials ,
region : config . signingRegion ,
service : config . signingName ,
sha256 ,
uriEscapePath : signingEscapePath ,
} ;
const SignerCtor = config . signerConstructor || signatureV4 . SignatureV4 ;
return new SignerCtor ( params ) ;
2026-01-30 14:42:57 +00:00
} ) ;
}
2026-03-03 17:11:57 +00:00
else {
signer = async ( authScheme ) => {
authScheme = Object . assign ( { } , {
name : "sigv4" ,
signingName : config . signingName || config . defaultSigningName ,
signingRegion : await core . normalizeProvider ( config . region ) ( ) ,
properties : { } ,
} , authScheme ) ;
const signingRegion = authScheme . signingRegion ;
const signingService = authScheme . signingName ;
config . signingRegion = config . signingRegion || signingRegion ;
config . signingName = config . signingName || signingService || config . serviceId ;
const params = {
... config ,
credentials : config . credentials ,
region : config . signingRegion ,
service : config . signingName ,
sha256 ,
uriEscapePath : signingEscapePath ,
} ;
const SignerCtor = config . signerConstructor || signatureV4 . SignatureV4 ;
return new SignerCtor ( params ) ;
} ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
const resolvedConfig = Object . assign ( config , {
systemClockOffset ,
signingEscapePath ,
signer ,
} ) ;
return resolvedConfig ;
} ;
const resolveAWSSDKSigV4Config = resolveAwsSdkSigV4Config ;
function normalizeCredentialProvider ( config , { credentials , credentialDefaultProvider , } ) {
let credentialsProvider ;
if ( credentials ) {
if ( ! credentials ? . memoized ) {
credentialsProvider = core . memoizeIdentityProvider ( credentials , core . isIdentityExpired , core . doesIdentityRequireRefresh ) ;
}
else {
credentialsProvider = credentials ;
}
}
else {
if ( credentialDefaultProvider ) {
credentialsProvider = core . normalizeProvider ( credentialDefaultProvider ( Object . assign ( { } , config , {
parentClientConfig : config ,
} ) ) ) ;
}
else {
credentialsProvider = async ( ) => {
throw new Error ( "@aws-sdk/core::resolveAwsSdkSigV4Config - `credentials` not provided and no credentialDefaultProvider was configured." ) ;
} ;
}
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
credentialsProvider . memoized = true ;
return credentialsProvider ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
function bindCallerConfig ( config , credentialsProvider ) {
if ( credentialsProvider . configBound ) {
return credentialsProvider ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
const fn = async ( options ) => credentialsProvider ( { ... options , callerClientConfig : config } ) ;
fn . memoized = credentialsProvider . memoized ;
fn . configBound = true ;
return fn ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
exports . AWSSDKSigV4Signer = AWSSDKSigV4Signer ;
exports . AwsSdkSigV4ASigner = AwsSdkSigV4ASigner ;
exports . AwsSdkSigV4Signer = AwsSdkSigV4Signer ;
exports . NODE _AUTH _SCHEME _PREFERENCE _OPTIONS = NODE _AUTH _SCHEME _PREFERENCE _OPTIONS ;
exports . NODE _SIGV4A _CONFIG _OPTIONS = NODE _SIGV4A _CONFIG _OPTIONS ;
exports . getBearerTokenEnvKey = getBearerTokenEnvKey ;
exports . resolveAWSSDKSigV4Config = resolveAWSSDKSigV4Config ;
exports . resolveAwsSdkSigV4AConfig = resolveAwsSdkSigV4AConfig ;
exports . resolveAwsSdkSigV4Config = resolveAwsSdkSigV4Config ;
exports . validateSigningProperties = validateSigningProperties ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ } ) ,
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ 998 :
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
var _ _webpack _unused _export _ _ ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
var propertyProvider = _ _webpack _require _ _ ( 8857 ) ;
var sharedIniFileLoader = _ _webpack _require _ _ ( 4964 ) ;
var client = _ _webpack _require _ _ ( 5152 ) ;
var tokenProviders = _ _webpack _require _ _ ( 5433 ) ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
const isSsoProfile = ( arg ) => arg &&
( typeof arg . sso _start _url === "string" ||
typeof arg . sso _account _id === "string" ||
typeof arg . sso _session === "string" ||
typeof arg . sso _region === "string" ||
typeof arg . sso _role _name === "string" ) ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
const SHOULD _FAIL _CREDENTIAL _CHAIN = false ;
const resolveSSOCredentials = async ( { ssoStartUrl , ssoSession , ssoAccountId , ssoRegion , ssoRoleName , ssoClient , clientConfig , parentClientConfig , callerClientConfig , profile , filepath , configFilepath , ignoreCache , logger , } ) => {
let token ;
const refreshMessage = ` To refresh this SSO session run aws sso login with the corresponding profile. ` ;
if ( ssoSession ) {
try {
const _token = await tokenProviders . fromSso ( {
profile ,
filepath ,
configFilepath ,
ignoreCache ,
} ) ( ) ;
token = {
accessToken : _token . token ,
expiresAt : new Date ( _token . expiration ) . toISOString ( ) ,
} ;
}
catch ( e ) {
throw new propertyProvider . CredentialsProviderError ( e . message , {
tryNextLink : SHOULD _FAIL _CREDENTIAL _CHAIN ,
logger ,
} ) ;
}
}
else {
try {
token = await sharedIniFileLoader . getSSOTokenFromFile ( ssoStartUrl ) ;
}
catch ( e ) {
throw new propertyProvider . CredentialsProviderError ( ` The SSO session associated with this profile is invalid. ${ refreshMessage } ` , {
tryNextLink : SHOULD _FAIL _CREDENTIAL _CHAIN ,
logger ,
} ) ;
}
}
if ( new Date ( token . expiresAt ) . getTime ( ) - Date . now ( ) <= 0 ) {
throw new propertyProvider . CredentialsProviderError ( ` The SSO session associated with this profile has expired. ${ refreshMessage } ` , {
tryNextLink : SHOULD _FAIL _CREDENTIAL _CHAIN ,
logger ,
} ) ;
}
const { accessToken } = token ;
const { SSOClient , GetRoleCredentialsCommand } = await Promise . resolve ( ) . then ( function ( ) { return _ _webpack _require _ _ ( 1853 ) ; } ) ;
const sso = ssoClient ||
new SSOClient ( Object . assign ( { } , clientConfig ? ? { } , {
logger : clientConfig ? . logger ? ? callerClientConfig ? . logger ? ? parentClientConfig ? . logger ,
region : clientConfig ? . region ? ? ssoRegion ,
userAgentAppId : clientConfig ? . userAgentAppId ? ? callerClientConfig ? . userAgentAppId ? ? parentClientConfig ? . userAgentAppId ,
} ) ) ;
let ssoResp ;
try {
ssoResp = await sso . send ( new GetRoleCredentialsCommand ( {
accountId : ssoAccountId ,
roleName : ssoRoleName ,
accessToken ,
} ) ) ;
}
catch ( e ) {
throw new propertyProvider . CredentialsProviderError ( e , {
tryNextLink : SHOULD _FAIL _CREDENTIAL _CHAIN ,
logger ,
} ) ;
}
const { roleCredentials : { accessKeyId , secretAccessKey , sessionToken , expiration , credentialScope , accountId } = { } , } = ssoResp ;
if ( ! accessKeyId || ! secretAccessKey || ! sessionToken || ! expiration ) {
throw new propertyProvider . CredentialsProviderError ( "SSO returns an invalid temporary credential." , {
tryNextLink : SHOULD _FAIL _CREDENTIAL _CHAIN ,
logger ,
} ) ;
}
const credentials = {
accessKeyId ,
secretAccessKey ,
sessionToken ,
expiration : new Date ( expiration ) ,
... ( credentialScope && { credentialScope } ) ,
... ( accountId && { accountId } ) ,
} ;
if ( ssoSession ) {
client . setCredentialFeature ( credentials , "CREDENTIALS_SSO" , "s" ) ;
}
else {
client . setCredentialFeature ( credentials , "CREDENTIALS_SSO_LEGACY" , "u" ) ;
}
return credentials ;
} ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
const validateSsoProfile = ( profile , logger ) => {
const { sso _start _url , sso _account _id , sso _region , sso _role _name } = profile ;
if ( ! sso _start _url || ! sso _account _id || ! sso _region || ! sso _role _name ) {
throw new propertyProvider . CredentialsProviderError ( ` Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", ` +
` "sso_region", "sso_role_name", "sso_start_url". Got ${ Object . keys ( profile ) . join ( ", " ) } \n Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html ` , { tryNextLink : false , logger } ) ;
}
return profile ;
} ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
const fromSSO = ( init = { } ) => async ( { callerClientConfig } = { } ) => {
init . logger ? . debug ( "@aws-sdk/credential-provider-sso - fromSSO" ) ;
const { ssoStartUrl , ssoAccountId , ssoRegion , ssoRoleName , ssoSession } = init ;
const { ssoClient } = init ;
const profileName = sharedIniFileLoader . getProfileName ( {
profile : init . profile ? ? callerClientConfig ? . profile ,
} ) ;
if ( ! ssoStartUrl && ! ssoAccountId && ! ssoRegion && ! ssoRoleName && ! ssoSession ) {
const profiles = await sharedIniFileLoader . parseKnownFiles ( init ) ;
const profile = profiles [ profileName ] ;
if ( ! profile ) {
throw new propertyProvider . CredentialsProviderError ( ` Profile ${ profileName } was not found. ` , { logger : init . logger } ) ;
}
if ( ! isSsoProfile ( profile ) ) {
throw new propertyProvider . CredentialsProviderError ( ` Profile ${ profileName } is not configured with SSO credentials. ` , {
logger : init . logger ,
} ) ;
}
if ( profile ? . sso _session ) {
const ssoSessions = await sharedIniFileLoader . loadSsoSessionData ( init ) ;
const session = ssoSessions [ profile . sso _session ] ;
const conflictMsg = ` configurations in profile ${ profileName } and sso-session ${ profile . sso _session } ` ;
if ( ssoRegion && ssoRegion !== session . sso _region ) {
throw new propertyProvider . CredentialsProviderError ( ` Conflicting SSO region ` + conflictMsg , {
tryNextLink : false ,
logger : init . logger ,
} ) ;
}
if ( ssoStartUrl && ssoStartUrl !== session . sso _start _url ) {
throw new propertyProvider . CredentialsProviderError ( ` Conflicting SSO start_url ` + conflictMsg , {
tryNextLink : false ,
logger : init . logger ,
} ) ;
}
profile . sso _region = session . sso _region ;
profile . sso _start _url = session . sso _start _url ;
}
const { sso _start _url , sso _account _id , sso _region , sso _role _name , sso _session } = validateSsoProfile ( profile , init . logger ) ;
return resolveSSOCredentials ( {
ssoStartUrl : sso _start _url ,
ssoSession : sso _session ,
ssoAccountId : sso _account _id ,
ssoRegion : sso _region ,
ssoRoleName : sso _role _name ,
ssoClient : ssoClient ,
clientConfig : init . clientConfig ,
parentClientConfig : init . parentClientConfig ,
callerClientConfig : init . callerClientConfig ,
profile : profileName ,
filepath : init . filepath ,
configFilepath : init . configFilepath ,
ignoreCache : init . ignoreCache ,
logger : init . logger ,
} ) ;
}
else if ( ! ssoStartUrl || ! ssoAccountId || ! ssoRegion || ! ssoRoleName ) {
throw new propertyProvider . CredentialsProviderError ( "Incomplete configuration. The fromSSO() argument hash must include " +
'"ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"' , { tryNextLink : false , logger : init . logger } ) ;
}
else {
return resolveSSOCredentials ( {
ssoStartUrl ,
ssoSession ,
ssoAccountId ,
ssoRegion ,
ssoRoleName ,
ssoClient ,
clientConfig : init . clientConfig ,
parentClientConfig : init . parentClientConfig ,
callerClientConfig : init . callerClientConfig ,
profile : profileName ,
filepath : init . filepath ,
configFilepath : init . configFilepath ,
ignoreCache : init . ignoreCache ,
logger : init . logger ,
} ) ;
}
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
exports . fromSSO = fromSSO ;
_ _webpack _unused _export _ _ = isSsoProfile ;
_ _webpack _unused _export _ _ = validateSsoProfile ;
2026-01-30 14:42:57 +00:00
/***/ } ) ,
2026-03-03 17:11:57 +00:00
/***/ 1853 :
2026-01-30 14:42:57 +00:00
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
2026-03-03 17:11:57 +00:00
var sso = _ _webpack _require _ _ ( 2579 ) ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
exports . GetRoleCredentialsCommand = sso . GetRoleCredentialsCommand ;
exports . SSOClient = sso . SSOClient ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ } ) ,
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ 7452 :
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
Object . defineProperty ( exports , "__esModule" , ( { value : true } ) ) ;
exports . resolveHttpAuthSchemeConfig = exports . defaultSSOHttpAuthSchemeProvider = exports . defaultSSOHttpAuthSchemeParametersProvider = void 0 ;
const core _1 = _ _webpack _require _ _ ( 8704 ) ;
const util _middleware _1 = _ _webpack _require _ _ ( 6324 ) ;
const defaultSSOHttpAuthSchemeParametersProvider = async ( config , context , input ) => {
2026-01-30 14:42:57 +00:00
return {
2026-03-03 17:11:57 +00:00
operation : ( 0 , util _middleware _1 . getSmithyContext ) ( context ) . operation ,
region : ( await ( 0 , util _middleware _1 . normalizeProvider ) ( config . region ) ( ) ) ||
( ( ) => {
throw new Error ( "expected `region` to be configured for `aws.auth#sigv4`" ) ;
} ) ( ) ,
2026-01-30 14:42:57 +00:00
} ;
} ;
2026-03-03 17:11:57 +00:00
exports . defaultSSOHttpAuthSchemeParametersProvider = defaultSSOHttpAuthSchemeParametersProvider ;
function createAwsAuthSigv4HttpAuthOption ( authParameters ) {
return {
schemeId : "aws.auth#sigv4" ,
signingProperties : {
name : "awsssoportal" ,
region : authParameters . region ,
} ,
propertiesExtractor : ( config , context ) => ( {
signingProperties : {
config ,
context ,
} ,
} ) ,
} ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
function createSmithyApiNoAuthHttpAuthOption ( authParameters ) {
return {
schemeId : "smithy.api#noAuth" ,
} ;
}
const defaultSSOHttpAuthSchemeProvider = ( authParameters ) => {
const options = [ ] ;
switch ( authParameters . operation ) {
case "GetRoleCredentials" : {
options . push ( createSmithyApiNoAuthHttpAuthOption ( authParameters ) ) ;
break ;
}
default : {
options . push ( createAwsAuthSigv4HttpAuthOption ( authParameters ) ) ;
2026-01-30 14:42:57 +00:00
}
}
2026-03-03 17:11:57 +00:00
return options ;
} ;
exports . defaultSSOHttpAuthSchemeProvider = defaultSSOHttpAuthSchemeProvider ;
const resolveHttpAuthSchemeConfig = ( config ) => {
const config _0 = ( 0 , core _1 . resolveAwsSdkSigV4Config ) ( config ) ;
return Object . assign ( config _0 , {
authSchemePreference : ( 0 , util _middleware _1 . normalizeProvider ) ( config . authSchemePreference ? ? [ ] ) ,
} ) ;
} ;
exports . resolveHttpAuthSchemeConfig = resolveHttpAuthSchemeConfig ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ } ) ,
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ 5074 :
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
Object . defineProperty ( exports , "__esModule" , ( { value : true } ) ) ;
exports . defaultEndpointResolver = void 0 ;
const util _endpoints _1 = _ _webpack _require _ _ ( 3068 ) ;
const util _endpoints _2 = _ _webpack _require _ _ ( 9674 ) ;
const ruleset _1 = _ _webpack _require _ _ ( 203 ) ;
const cache = new util _endpoints _2 . EndpointCache ( {
size : 50 ,
params : [ "Endpoint" , "Region" , "UseDualStack" , "UseFIPS" ] ,
} ) ;
const defaultEndpointResolver = ( endpointParams , context = { } ) => {
return cache . get ( endpointParams , ( ) => ( 0 , util _endpoints _2 . resolveEndpoint ) ( ruleset _1 . ruleSet , {
endpointParams : endpointParams ,
logger : context . logger ,
} ) ) ;
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
exports . defaultEndpointResolver = defaultEndpointResolver ;
util _endpoints _2 . customEndpointFunctions . aws = util _endpoints _1 . awsEndpointFunctions ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ } ) ,
/***/ 203 :
/***/ ( ( _ _unused _webpack _module , exports ) => {
Object . defineProperty ( exports , "__esModule" , ( { value : true } ) ) ;
exports . ruleSet = void 0 ;
const u = "required" , v = "fn" , w = "argv" , x = "ref" ;
const a = true , b = "isSet" , c = "booleanEquals" , d = "error" , e = "endpoint" , f = "tree" , g = "PartitionResult" , h = "getAttr" , i = { [ u ] : false , type : "string" } , j = { [ u ] : true , default : false , type : "boolean" } , k = { [ x ] : "Endpoint" } , l = { [ v ] : c , [ w ] : [ { [ x ] : "UseFIPS" } , true ] } , m = { [ v ] : c , [ w ] : [ { [ x ] : "UseDualStack" } , true ] } , n = { } , o = { [ v ] : h , [ w ] : [ { [ x ] : g } , "supportsFIPS" ] } , p = { [ x ] : g } , q = { [ v ] : c , [ w ] : [ true , { [ v ] : h , [ w ] : [ p , "supportsDualStack" ] } ] } , r = [ l ] , s = [ m ] , t = [ { [ x ] : "Region" } ] ;
const _data = {
version : "1.0" ,
parameters : { Region : i , UseDualStack : j , UseFIPS : j , Endpoint : i } ,
rules : [
{
conditions : [ { [ v ] : b , [ w ] : [ k ] } ] ,
rules : [
{ conditions : r , error : "Invalid Configuration: FIPS and custom endpoint are not supported" , type : d } ,
{ conditions : s , error : "Invalid Configuration: Dualstack and custom endpoint are not supported" , type : d } ,
{ endpoint : { url : k , properties : n , headers : n } , type : e } ,
] ,
type : f ,
} ,
{
conditions : [ { [ v ] : b , [ w ] : t } ] ,
rules : [
{
conditions : [ { [ v ] : "aws.partition" , [ w ] : t , assign : g } ] ,
rules : [
{
conditions : [ l , m ] ,
rules : [
{
conditions : [ { [ v ] : c , [ w ] : [ a , o ] } , q ] ,
rules : [
{
endpoint : {
url : "https://portal.sso-fips.{Region}.{PartitionResult#dualStackDnsSuffix}" ,
properties : n ,
headers : n ,
} ,
type : e ,
} ,
] ,
type : f ,
} ,
{ error : "FIPS and DualStack are enabled, but this partition does not support one or both" , type : d } ,
] ,
type : f ,
} ,
{
conditions : r ,
rules : [
{
conditions : [ { [ v ] : c , [ w ] : [ o , a ] } ] ,
rules : [
{
conditions : [ { [ v ] : "stringEquals" , [ w ] : [ { [ v ] : h , [ w ] : [ p , "name" ] } , "aws-us-gov" ] } ] ,
endpoint : { url : "https://portal.sso.{Region}.amazonaws.com" , properties : n , headers : n } ,
type : e ,
} ,
{
endpoint : {
url : "https://portal.sso-fips.{Region}.{PartitionResult#dnsSuffix}" ,
properties : n ,
headers : n ,
} ,
type : e ,
} ,
] ,
type : f ,
} ,
{ error : "FIPS is enabled but this partition does not support FIPS" , type : d } ,
] ,
type : f ,
} ,
{
conditions : s ,
rules : [
{
conditions : [ q ] ,
rules : [
{
endpoint : {
url : "https://portal.sso.{Region}.{PartitionResult#dualStackDnsSuffix}" ,
properties : n ,
headers : n ,
} ,
type : e ,
} ,
] ,
type : f ,
} ,
{ error : "DualStack is enabled but this partition does not support DualStack" , type : d } ,
] ,
type : f ,
} ,
{
endpoint : { url : "https://portal.sso.{Region}.{PartitionResult#dnsSuffix}" , properties : n , headers : n } ,
type : e ,
} ,
] ,
type : f ,
} ,
] ,
type : f ,
} ,
{ error : "Invalid Configuration: Missing Region" , type : d } ,
] ,
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
exports . ruleSet = _data ;
/***/ } ) ,
/***/ 2579 :
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
var middlewareHostHeader = _ _webpack _require _ _ ( 2590 ) ;
var middlewareLogger = _ _webpack _require _ _ ( 5242 ) ;
var middlewareRecursionDetection = _ _webpack _require _ _ ( 1568 ) ;
var middlewareUserAgent = _ _webpack _require _ _ ( 2959 ) ;
var configResolver = _ _webpack _require _ _ ( 9316 ) ;
var core = _ _webpack _require _ _ ( 402 ) ;
var schema = _ _webpack _require _ _ ( 6890 ) ;
var middlewareContentLength = _ _webpack _require _ _ ( 7212 ) ;
var middlewareEndpoint = _ _webpack _require _ _ ( 99 ) ;
var middlewareRetry = _ _webpack _require _ _ ( 9618 ) ;
var smithyClient = _ _webpack _require _ _ ( 1411 ) ;
var httpAuthSchemeProvider = _ _webpack _require _ _ ( 7452 ) ;
var runtimeConfig = _ _webpack _require _ _ ( 5541 ) ;
var regionConfigResolver = _ _webpack _require _ _ ( 6463 ) ;
var protocolHttp = _ _webpack _require _ _ ( 2356 ) ;
var schemas _0 = _ _webpack _require _ _ ( 2167 ) ;
var errors = _ _webpack _require _ _ ( 4483 ) ;
var SSOServiceException = _ _webpack _require _ _ ( 9849 ) ;
const resolveClientEndpointParameters = ( options ) => {
return Object . assign ( options , {
useDualstackEndpoint : options . useDualstackEndpoint ? ? false ,
useFipsEndpoint : options . useFipsEndpoint ? ? false ,
defaultSigningName : "awsssoportal" ,
} ) ;
} ;
const commonParams = {
UseFIPS : { type : "builtInParams" , name : "useFipsEndpoint" } ,
Endpoint : { type : "builtInParams" , name : "endpoint" } ,
Region : { type : "builtInParams" , name : "region" } ,
UseDualStack : { type : "builtInParams" , name : "useDualstackEndpoint" } ,
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
const getHttpAuthExtensionConfiguration = ( runtimeConfig ) => {
const _httpAuthSchemes = runtimeConfig . httpAuthSchemes ;
let _httpAuthSchemeProvider = runtimeConfig . httpAuthSchemeProvider ;
let _credentials = runtimeConfig . credentials ;
return {
setHttpAuthScheme ( httpAuthScheme ) {
const index = _httpAuthSchemes . findIndex ( ( scheme ) => scheme . schemeId === httpAuthScheme . schemeId ) ;
if ( index === - 1 ) {
_httpAuthSchemes . push ( httpAuthScheme ) ;
2026-01-30 14:42:57 +00:00
}
else {
2026-03-03 17:11:57 +00:00
_httpAuthSchemes . splice ( index , 1 , httpAuthScheme ) ;
}
} ,
httpAuthSchemes ( ) {
return _httpAuthSchemes ;
} ,
setHttpAuthSchemeProvider ( httpAuthSchemeProvider ) {
_httpAuthSchemeProvider = httpAuthSchemeProvider ;
} ,
httpAuthSchemeProvider ( ) {
return _httpAuthSchemeProvider ;
} ,
setCredentials ( credentials ) {
_credentials = credentials ;
} ,
credentials ( ) {
return _credentials ;
} ,
} ;
2026-01-30 14:42:57 +00:00
} ;
2026-03-03 17:11:57 +00:00
const resolveHttpAuthRuntimeConfig = ( config ) => {
return {
httpAuthSchemes : config . httpAuthSchemes ( ) ,
httpAuthSchemeProvider : config . httpAuthSchemeProvider ( ) ,
credentials : config . credentials ( ) ,
} ;
} ;
const resolveRuntimeExtensions = ( runtimeConfig , extensions ) => {
const extensionConfiguration = Object . assign ( regionConfigResolver . getAwsRegionExtensionConfiguration ( runtimeConfig ) , smithyClient . getDefaultExtensionConfiguration ( runtimeConfig ) , protocolHttp . getHttpHandlerExtensionConfiguration ( runtimeConfig ) , getHttpAuthExtensionConfiguration ( runtimeConfig ) ) ;
extensions . forEach ( ( extension ) => extension . configure ( extensionConfiguration ) ) ;
return Object . assign ( runtimeConfig , regionConfigResolver . resolveAwsRegionExtensionConfiguration ( extensionConfiguration ) , smithyClient . resolveDefaultRuntimeConfig ( extensionConfiguration ) , protocolHttp . resolveHttpHandlerRuntimeConfig ( extensionConfiguration ) , resolveHttpAuthRuntimeConfig ( extensionConfiguration ) ) ;
} ;
class SSOClient extends smithyClient . Client {
config ;
constructor ( ... [ configuration ] ) {
const _config _0 = runtimeConfig . getRuntimeConfig ( configuration || { } ) ;
super ( _config _0 ) ;
this . initConfig = _config _0 ;
const _config _1 = resolveClientEndpointParameters ( _config _0 ) ;
const _config _2 = middlewareUserAgent . resolveUserAgentConfig ( _config _1 ) ;
const _config _3 = middlewareRetry . resolveRetryConfig ( _config _2 ) ;
const _config _4 = configResolver . resolveRegionConfig ( _config _3 ) ;
const _config _5 = middlewareHostHeader . resolveHostHeaderConfig ( _config _4 ) ;
const _config _6 = middlewareEndpoint . resolveEndpointConfig ( _config _5 ) ;
const _config _7 = httpAuthSchemeProvider . resolveHttpAuthSchemeConfig ( _config _6 ) ;
const _config _8 = resolveRuntimeExtensions ( _config _7 , configuration ? . extensions || [ ] ) ;
this . config = _config _8 ;
this . middlewareStack . use ( schema . getSchemaSerdePlugin ( this . config ) ) ;
this . middlewareStack . use ( middlewareUserAgent . getUserAgentPlugin ( this . config ) ) ;
this . middlewareStack . use ( middlewareRetry . getRetryPlugin ( this . config ) ) ;
this . middlewareStack . use ( middlewareContentLength . getContentLengthPlugin ( this . config ) ) ;
this . middlewareStack . use ( middlewareHostHeader . getHostHeaderPlugin ( this . config ) ) ;
this . middlewareStack . use ( middlewareLogger . getLoggerPlugin ( this . config ) ) ;
this . middlewareStack . use ( middlewareRecursionDetection . getRecursionDetectionPlugin ( this . config ) ) ;
this . middlewareStack . use ( core . getHttpAuthSchemeEndpointRuleSetPlugin ( this . config , {
httpAuthSchemeParametersProvider : httpAuthSchemeProvider . defaultSSOHttpAuthSchemeParametersProvider ,
identityProviderConfigProvider : async ( config ) => new core . DefaultIdentityProviderConfig ( {
"aws.auth#sigv4" : config . credentials ,
} ) ,
} ) ) ;
this . middlewareStack . use ( core . getHttpSigningPlugin ( this . config ) ) ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
destroy ( ) {
super . destroy ( ) ;
2026-01-30 14:42:57 +00:00
}
}
2026-03-03 17:11:57 +00:00
class GetRoleCredentialsCommand extends smithyClient . Command
. classBuilder ( )
. ep ( commonParams )
. m ( function ( Command , cs , config , o ) {
return [ middlewareEndpoint . getEndpointPlugin ( config , Command . getEndpointParameterInstructions ( ) ) ] ;
} )
. s ( "SWBPortalService" , "GetRoleCredentials" , { } )
. n ( "SSOClient" , "GetRoleCredentialsCommand" )
. sc ( schemas _0 . GetRoleCredentials$ )
. build ( ) {
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
const commands = {
GetRoleCredentialsCommand ,
} ;
class SSO extends SSOClient {
}
smithyClient . createAggregatedClient ( commands , SSO ) ;
exports . $Command = smithyClient . Command ;
exports . _ _Client = smithyClient . Client ;
exports . SSOServiceException = SSOServiceException . SSOServiceException ;
exports . GetRoleCredentialsCommand = GetRoleCredentialsCommand ;
exports . SSO = SSO ;
exports . SSOClient = SSOClient ;
Object . prototype . hasOwnProperty . call ( schemas _0 , '__proto__' ) &&
! Object . prototype . hasOwnProperty . call ( exports , '__proto__' ) &&
Object . defineProperty ( exports , '__proto__' , {
enumerable : true ,
value : schemas _0 [ '__proto__' ]
} ) ;
Object . keys ( schemas _0 ) . forEach ( function ( k ) {
if ( k !== 'default' && ! Object . prototype . hasOwnProperty . call ( exports , k ) ) exports [ k ] = schemas _0 [ k ] ;
} ) ;
Object . prototype . hasOwnProperty . call ( errors , '__proto__' ) &&
! Object . prototype . hasOwnProperty . call ( exports , '__proto__' ) &&
Object . defineProperty ( exports , '__proto__' , {
enumerable : true ,
value : errors [ '__proto__' ]
} ) ;
Object . keys ( errors ) . forEach ( function ( k ) {
if ( k !== 'default' && ! Object . prototype . hasOwnProperty . call ( exports , k ) ) exports [ k ] = errors [ k ] ;
} ) ;
2026-01-30 14:42:57 +00:00
/***/ } ) ,
2026-03-03 17:11:57 +00:00
/***/ 9849 :
2026-01-30 14:42:57 +00:00
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
2026-03-03 17:11:57 +00:00
Object . defineProperty ( exports , "__esModule" , ( { value : true } ) ) ;
exports . SSOServiceException = exports . _ _ServiceException = void 0 ;
const smithy _client _1 = _ _webpack _require _ _ ( 1411 ) ;
Object . defineProperty ( exports , "__ServiceException" , ( { enumerable : true , get : function ( ) { return smithy _client _1 . ServiceException ; } } ) ) ;
class SSOServiceException extends smithy _client _1 . ServiceException {
constructor ( options ) {
super ( options ) ;
Object . setPrototypeOf ( this , SSOServiceException . prototype ) ;
}
}
exports . SSOServiceException = SSOServiceException ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ } ) ,
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ 4483 :
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
Object . defineProperty ( exports , "__esModule" , ( { value : true } ) ) ;
exports . UnauthorizedException = exports . TooManyRequestsException = exports . ResourceNotFoundException = exports . InvalidRequestException = void 0 ;
const SSOServiceException _1 = _ _webpack _require _ _ ( 9849 ) ;
class InvalidRequestException extends SSOServiceException _1 . SSOServiceException {
name = "InvalidRequestException" ;
$fault = "client" ;
constructor ( opts ) {
super ( {
name : "InvalidRequestException" ,
$fault : "client" ,
... opts ,
} ) ;
Object . setPrototypeOf ( this , InvalidRequestException . prototype ) ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
}
exports . InvalidRequestException = InvalidRequestException ;
class ResourceNotFoundException extends SSOServiceException _1 . SSOServiceException {
name = "ResourceNotFoundException" ;
$fault = "client" ;
constructor ( opts ) {
super ( {
name : "ResourceNotFoundException" ,
$fault : "client" ,
... opts ,
2026-01-30 14:42:57 +00:00
} ) ;
2026-03-03 17:11:57 +00:00
Object . setPrototypeOf ( this , ResourceNotFoundException . prototype ) ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
}
exports . ResourceNotFoundException = ResourceNotFoundException ;
class TooManyRequestsException extends SSOServiceException _1 . SSOServiceException {
name = "TooManyRequestsException" ;
$fault = "client" ;
constructor ( opts ) {
super ( {
name : "TooManyRequestsException" ,
$fault : "client" ,
... opts ,
} ) ;
Object . setPrototypeOf ( this , TooManyRequestsException . prototype ) ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
}
exports . TooManyRequestsException = TooManyRequestsException ;
class UnauthorizedException extends SSOServiceException _1 . SSOServiceException {
name = "UnauthorizedException" ;
$fault = "client" ;
constructor ( opts ) {
super ( {
name : "UnauthorizedException" ,
$fault : "client" ,
... opts ,
2026-01-30 14:42:57 +00:00
} ) ;
2026-03-03 17:11:57 +00:00
Object . setPrototypeOf ( this , UnauthorizedException . prototype ) ;
2026-01-30 14:42:57 +00:00
}
2026-03-03 17:11:57 +00:00
}
exports . UnauthorizedException = UnauthorizedException ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ } ) ,
/***/ 5541 :
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
Object . defineProperty ( exports , "__esModule" , ( { value : true } ) ) ;
exports . getRuntimeConfig = void 0 ;
const tslib _1 = _ _webpack _require _ _ ( 1860 ) ;
const package _json _1 = tslib _1 . _ _importDefault ( _ _webpack _require _ _ ( 9955 ) ) ;
const core _1 = _ _webpack _require _ _ ( 8704 ) ;
const util _user _agent _node _1 = _ _webpack _require _ _ ( 1656 ) ;
const config _resolver _1 = _ _webpack _require _ _ ( 9316 ) ;
const hash _node _1 = _ _webpack _require _ _ ( 2711 ) ;
const middleware _retry _1 = _ _webpack _require _ _ ( 9618 ) ;
const node _config _provider _1 = _ _webpack _require _ _ ( 5704 ) ;
const node _http _handler _1 = _ _webpack _require _ _ ( 1279 ) ;
const smithy _client _1 = _ _webpack _require _ _ ( 1411 ) ;
const util _body _length _node _1 = _ _webpack _require _ _ ( 3638 ) ;
const util _defaults _mode _node _1 = _ _webpack _require _ _ ( 673 ) ;
const util _retry _1 = _ _webpack _require _ _ ( 5518 ) ;
const runtimeConfig _shared _1 = _ _webpack _require _ _ ( 3082 ) ;
const getRuntimeConfig = ( config ) => {
( 0 , smithy _client _1 . emitWarningIfUnsupportedVersion ) ( process . version ) ;
const defaultsMode = ( 0 , util _defaults _mode _node _1 . resolveDefaultsModeConfig ) ( config ) ;
const defaultConfigProvider = ( ) => defaultsMode ( ) . then ( smithy _client _1 . loadConfigsForDefaultMode ) ;
const clientSharedValues = ( 0 , runtimeConfig _shared _1 . getRuntimeConfig ) ( config ) ;
( 0 , core _1 . emitWarningIfUnsupportedVersion ) ( process . version ) ;
const loaderConfig = {
profile : config ? . profile ,
logger : clientSharedValues . logger ,
} ;
return {
... clientSharedValues ,
... config ,
runtime : "node" ,
defaultsMode ,
authSchemePreference : config ? . authSchemePreference ? ? ( 0 , node _config _provider _1 . loadConfig ) ( core _1 . NODE _AUTH _SCHEME _PREFERENCE _OPTIONS , loaderConfig ) ,
bodyLengthChecker : config ? . bodyLengthChecker ? ? util _body _length _node _1 . calculateBodyLength ,
defaultUserAgentProvider : config ? . defaultUserAgentProvider ? ?
( 0 , util _user _agent _node _1 . createDefaultUserAgentProvider ) ( { serviceId : clientSharedValues . serviceId , clientVersion : package _json _1 . default . version } ) ,
maxAttempts : config ? . maxAttempts ? ? ( 0 , node _config _provider _1 . loadConfig ) ( middleware _retry _1 . NODE _MAX _ATTEMPT _CONFIG _OPTIONS , config ) ,
region : config ? . region ? ?
( 0 , node _config _provider _1 . loadConfig ) ( config _resolver _1 . NODE _REGION _CONFIG _OPTIONS , { ... config _resolver _1 . NODE _REGION _CONFIG _FILE _OPTIONS , ... loaderConfig } ) ,
requestHandler : node _http _handler _1 . NodeHttpHandler . create ( config ? . requestHandler ? ? defaultConfigProvider ) ,
retryMode : config ? . retryMode ? ?
( 0 , node _config _provider _1 . loadConfig ) ( {
... middleware _retry _1 . NODE _RETRY _MODE _CONFIG _OPTIONS ,
default : async ( ) => ( await defaultConfigProvider ( ) ) . retryMode || util _retry _1 . DEFAULT _RETRY _MODE ,
} , config ) ,
sha256 : config ? . sha256 ? ? hash _node _1 . Hash . bind ( null , "sha256" ) ,
streamCollector : config ? . streamCollector ? ? node _http _handler _1 . streamCollector ,
useDualstackEndpoint : config ? . useDualstackEndpoint ? ? ( 0 , node _config _provider _1 . loadConfig ) ( config _resolver _1 . NODE _USE _DUALSTACK _ENDPOINT _CONFIG _OPTIONS , loaderConfig ) ,
useFipsEndpoint : config ? . useFipsEndpoint ? ? ( 0 , node _config _provider _1 . loadConfig ) ( config _resolver _1 . NODE _USE _FIPS _ENDPOINT _CONFIG _OPTIONS , loaderConfig ) ,
userAgentAppId : config ? . userAgentAppId ? ? ( 0 , node _config _provider _1 . loadConfig ) ( util _user _agent _node _1 . NODE _APP _ID _CONFIG _OPTIONS , loaderConfig ) ,
} ;
} ;
exports . getRuntimeConfig = getRuntimeConfig ;
2026-01-30 14:42:57 +00:00
/***/ } ) ,
2026-03-03 17:11:57 +00:00
/***/ 3082 :
2026-01-30 14:42:57 +00:00
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
2026-03-03 17:11:57 +00:00
Object . defineProperty ( exports , "__esModule" , ( { value : true } ) ) ;
exports . getRuntimeConfig = void 0 ;
const core _1 = _ _webpack _require _ _ ( 8704 ) ;
const protocols _1 = _ _webpack _require _ _ ( 7288 ) ;
const core _2 = _ _webpack _require _ _ ( 402 ) ;
const smithy _client _1 = _ _webpack _require _ _ ( 1411 ) ;
const url _parser _1 = _ _webpack _require _ _ ( 4494 ) ;
const util _base64 _1 = _ _webpack _require _ _ ( 8385 ) ;
const util _utf8 _1 = _ _webpack _require _ _ ( 1577 ) ;
const httpAuthSchemeProvider _1 = _ _webpack _require _ _ ( 7452 ) ;
const endpointResolver _1 = _ _webpack _require _ _ ( 5074 ) ;
const schemas _0 _1 = _ _webpack _require _ _ ( 2167 ) ;
const getRuntimeConfig = ( config ) => {
return {
apiVersion : "2019-06-10" ,
base64Decoder : config ? . base64Decoder ? ? util _base64 _1 . fromBase64 ,
base64Encoder : config ? . base64Encoder ? ? util _base64 _1 . toBase64 ,
disableHostPrefix : config ? . disableHostPrefix ? ? false ,
endpointProvider : config ? . endpointProvider ? ? endpointResolver _1 . defaultEndpointResolver ,
extensions : config ? . extensions ? ? [ ] ,
httpAuthSchemeProvider : config ? . httpAuthSchemeProvider ? ? httpAuthSchemeProvider _1 . defaultSSOHttpAuthSchemeProvider ,
httpAuthSchemes : config ? . httpAuthSchemes ? ? [
{
schemeId : "aws.auth#sigv4" ,
identityProvider : ( ipc ) => ipc . getIdentityProvider ( "aws.auth#sigv4" ) ,
signer : new core _1 . AwsSdkSigV4Signer ( ) ,
} ,
{
schemeId : "smithy.api#noAuth" ,
identityProvider : ( ipc ) => ipc . getIdentityProvider ( "smithy.api#noAuth" ) || ( async ( ) => ( { } ) ) ,
signer : new core _2 . NoAuthSigner ( ) ,
} ,
] ,
logger : config ? . logger ? ? new smithy _client _1 . NoOpLogger ( ) ,
protocol : config ? . protocol ? ? protocols _1 . AwsRestJsonProtocol ,
protocolSettings : config ? . protocolSettings ? ? {
defaultNamespace : "com.amazonaws.sso" ,
errorTypeRegistries : schemas _0 _1 . errorTypeRegistries ,
version : "2019-06-10" ,
serviceTarget : "SWBPortalService" ,
} ,
serviceId : config ? . serviceId ? ? "SSO" ,
urlParser : config ? . urlParser ? ? url _parser _1 . parseUrl ,
utf8Decoder : config ? . utf8Decoder ? ? util _utf8 _1 . fromUtf8 ,
utf8Encoder : config ? . utf8Encoder ? ? util _utf8 _1 . toUtf8 ,
} ;
} ;
exports . getRuntimeConfig = getRuntimeConfig ;
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ } ) ,
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
/***/ 2167 :
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
2026-01-30 14:42:57 +00:00
2026-03-03 17:11:57 +00:00
Object . defineProperty ( exports , "__esModule" , ( { value : true } ) ) ;
exports . GetRoleCredentials$ = exports . RoleCredentials$ = exports . GetRoleCredentialsResponse$ = exports . GetRoleCredentialsRequest$ = exports . errorTypeRegistries = exports . UnauthorizedException$ = exports . TooManyRequestsException$ = exports . ResourceNotFoundException$ = exports . InvalidRequestException$ = exports . SSOServiceException$ = void 0 ;
const _ATT = "AccessTokenType" ;
const _GRC = "GetRoleCredentials" ;
const _GRCR = "GetRoleCredentialsRequest" ;
const _GRCRe = "GetRoleCredentialsResponse" ;
const _IRE = "InvalidRequestException" ;
const _RC = "RoleCredentials" ;
const _RNFE = "ResourceNotFoundException" ;
const _SAKT = "SecretAccessKeyType" ;
const _STT = "SessionTokenType" ;
const _TMRE = "TooManyRequestsException" ;
const _UE = "UnauthorizedException" ;
const _aI = "accountId" ;
const _aKI = "accessKeyId" ;
const _aT = "accessToken" ;
const _ai = "account_id" ;
const _c = "client" ;
const _e = "error" ;
const _ex = "expiration" ;
const _h = "http" ;
const _hE = "httpError" ;
const _hH = "httpHeader" ;
const _hQ = "httpQuery" ;
const _m = "message" ;
const _rC = "roleCredentials" ;
const _rN = "roleName" ;
const _rn = "role_name" ;
const _s = "smithy.ts.sdk.synthetic.com.amazonaws.sso" ;
const _sAK = "secretAccessKey" ;
const _sT = "sessionToken" ;
const _xasbt = "x-amz-sso_bearer_token" ;
const n0 = "com.amazonaws.sso" ;
const schema _1 = _ _webpack _require _ _ ( 6890 ) ;
const errors _1 = _ _webpack _require _ _ ( 4483 ) ;
const SSOServiceException _1 = _ _webpack _require _ _ ( 9849 ) ;
const _s _registry = schema _1 . TypeRegistry . for ( _s ) ;
exports . SSOServiceException$ = [ - 3 , _s , "SSOServiceException" , 0 , [ ] , [ ] ] ;
_s _registry . registerError ( exports . SSOServiceException$ , SSOServiceException _1 . SSOServiceException ) ;
const n0 _registry = schema _1 . TypeRegistry . for ( n0 ) ;
exports . InvalidRequestException$ = [ - 3 , n0 , _IRE , { [ _e ] : _c , [ _hE ] : 400 } , [ _m ] , [ 0 ] ] ;
n0 _registry . registerError ( exports . InvalidRequestException$ , errors _1 . InvalidRequestException ) ;
exports . ResourceNotFoundException$ = [ - 3 , n0 , _RNFE , { [ _e ] : _c , [ _hE ] : 404 } , [ _m ] , [ 0 ] ] ;
n0 _registry . registerError ( exports . ResourceNotFoundException$ , errors _1 . ResourceNotFoundException ) ;
exports . TooManyRequestsException$ = [ - 3 , n0 , _TMRE , { [ _e ] : _c , [ _hE ] : 429 } , [ _m ] , [ 0 ] ] ;
n0 _registry . registerError ( exports . TooManyRequestsException$ , errors _1 . TooManyRequestsException ) ;
exports . UnauthorizedException$ = [ - 3 , n0 , _UE , { [ _e ] : _c , [ _hE ] : 401 } , [ _m ] , [ 0 ] ] ;
n0 _registry . registerError ( exports . UnauthorizedException$ , errors _1 . UnauthorizedException ) ;
exports . errorTypeRegistries = [ _s _registry , n0 _registry ] ;
var AccessTokenType = [ 0 , n0 , _ATT , 8 , 0 ] ;
var SecretAccessKeyType = [ 0 , n0 , _SAKT , 8 , 0 ] ;
var SessionTokenType = [ 0 , n0 , _STT , 8 , 0 ] ;
exports . GetRoleCredentialsRequest$ = [
3 ,
n0 ,
_GRCR ,
0 ,
[ _rN , _aI , _aT ] ,
[
[ 0 , { [ _hQ ] : _rn } ] ,
[ 0 , { [ _hQ ] : _ai } ] ,
[ ( ) => AccessTokenType , { [ _hH ] : _xasbt } ] ,
] ,
3 ,
] ;
exports . GetRoleCredentialsResponse$ = [
3 ,
n0 ,
_GRCRe ,
0 ,
[ _rC ] ,
[ [ ( ) => exports . RoleCredentials$ , 0 ] ] ,
] ;
exports . RoleCredentials$ = [
3 ,
n0 ,
_RC ,
0 ,
[ _aKI , _sAK , _sT , _ex ] ,
[ 0 , [ ( ) => SecretAccessKeyType , 0 ] , [ ( ) => SessionTokenType , 0 ] , 1 ] ,
] ;
exports . GetRoleCredentials$ = [
9 ,
n0 ,
_GRC ,
{ [ _h ] : [ "GET" , "/federation/credentials" , 200 ] } ,
( ) => exports . GetRoleCredentialsRequest$ ,
( ) => exports . GetRoleCredentialsResponse$ ,
] ;
2026-01-30 14:42:57 +00:00
/***/ } ) ,
2026-03-03 17:05:14 +00:00
/***/ 5433 :
2026-01-30 14:42:57 +00:00
/***/ ( ( _ _unused _webpack _module , exports , _ _webpack _require _ _ ) => {
var client = _ _webpack _require _ _ ( 5152 ) ;
2026-03-03 17:05:14 +00:00
var httpAuthSchemes = _ _webpack _require _ _ ( 7523 ) ;
var propertyProvider = _ _webpack _require _ _ ( 8857 ) ;
var sharedIniFileLoader = _ _webpack _require _ _ ( 4964 ) ;
2026-03-03 17:11:57 +00:00
var node _fs = _ _webpack _require _ _ ( 3024 ) ;
2026-01-30 14:42:57 +00:00
const fromEnvSigningName = ( { logger , signingName } = { } ) => async ( ) => {
logger ? . debug ? . ( "@aws-sdk/token-providers - fromEnvSigningName" ) ;
if ( ! signingName ) {
throw new propertyProvider . TokenProviderError ( "Please pass 'signingName' to compute environment variable key" , { logger } ) ;
}
const bearerTokenKey = httpAuthSchemes . getBearerTokenEnvKey ( signingName ) ;
if ( ! ( bearerTokenKey in process . env ) ) {
throw new propertyProvider . TokenProviderError ( ` Token not present in ' ${ bearerTokenKey } ' environment variable ` , { logger } ) ;
}
const token = { token : process . env [ bearerTokenKey ] } ;
client . setTokenFeature ( token , "BEARER_SERVICE_ENV_VARS" , "3" ) ;
return token ;
} ;
const EXPIRE _WINDOW _MS = 5 * 60 * 1000 ;
const REFRESH _MESSAGE = ` To refresh this SSO session run 'aws sso login' with the corresponding profile. ` ;
const getSsoOidcClient = async ( ssoRegion , init = { } , callerClientConfig ) => {
2026-03-03 17:11:57 +00:00
const { SSOOIDCClient } = await _ _webpack _require _ _ . e ( /* import() */ 443 ) . then ( _ _webpack _require _ _ . t . bind ( _ _webpack _require _ _ , 9443 , 23 ) ) ;
2026-01-30 14:42:57 +00:00
const coalesce = ( prop ) => init . clientConfig ? . [ prop ] ? ? init . parentClientConfig ? . [ prop ] ? ? callerClientConfig ? . [ prop ] ;
const ssoOidcClient = new SSOOIDCClient ( Object . assign ( { } , init . clientConfig ? ? { } , {
region : ssoRegion ? ? init . clientConfig ? . region ,
logger : coalesce ( "logger" ) ,
userAgentAppId : coalesce ( "userAgentAppId" ) ,
} ) ) ;
return ssoOidcClient ;
} ;
const getNewSsoOidcToken = async ( ssoToken , ssoRegion , init = { } , callerClientConfig ) => {
2026-03-03 17:11:57 +00:00
const { CreateTokenCommand } = await _ _webpack _require _ _ . e ( /* import() */ 443 ) . then ( _ _webpack _require _ _ . t . bind ( _ _webpack _require _ _ , 9443 , 23 ) ) ;
2026-01-30 14:42:57 +00:00
const ssoOidcClient = await getSsoOidcClient ( ssoRegion , init , callerClientConfig ) ;
return ssoOidcClient . send ( new CreateTokenCommand ( {
clientId : ssoToken . clientId ,
clientSecret : ssoToken . clientSecret ,
refreshToken : ssoToken . refreshToken ,
grantType : "refresh_token" ,
} ) ) ;
} ;
const validateTokenExpiry = ( token ) => {
if ( token . expiration && token . expiration . getTime ( ) < Date . now ( ) ) {
throw new propertyProvider . TokenProviderError ( ` Token is expired. ${ REFRESH _MESSAGE } ` , false ) ;
}
} ;
const validateTokenKey = ( key , value , forRefresh = false ) => {
if ( typeof value === "undefined" ) {
throw new propertyProvider . TokenProviderError ( ` Value not present for ' ${ key } ' in SSO Token ${ forRefresh ? ". Cannot refresh" : "" } . ${ REFRESH _MESSAGE } ` , false ) ;
}
} ;
2026-03-03 17:11:57 +00:00
const { writeFile } = node _fs . promises ;
2026-01-30 14:42:57 +00:00
const writeSSOTokenToFile = ( id , ssoToken ) => {
const tokenFilepath = sharedIniFileLoader . getSSOTokenFilepath ( id ) ;
const tokenString = JSON . stringify ( ssoToken , null , 2 ) ;
return writeFile ( tokenFilepath , tokenString ) ;
} ;
const lastRefreshAttemptTime = new Date ( 0 ) ;
const fromSso = ( init = { } ) => async ( { callerClientConfig } = { } ) => {
init . logger ? . debug ( "@aws-sdk/token-providers - fromSso" ) ;
const profiles = await sharedIniFileLoader . parseKnownFiles ( init ) ;
const profileName = sharedIniFileLoader . getProfileName ( {
profile : init . profile ? ? callerClientConfig ? . profile ,
} ) ;
const profile = profiles [ profileName ] ;
if ( ! profile ) {
throw new propertyProvider . TokenProviderError ( ` Profile ' ${ profileName } ' could not be found in shared credentials file. ` , false ) ;
}
else if ( ! profile [ "sso_session" ] ) {
throw new propertyProvider . TokenProviderError ( ` Profile ' ${ profileName } ' is missing required property 'sso_session'. ` ) ;
}
const ssoSessionName = profile [ "sso_session" ] ;
const ssoSessions = await sharedIniFileLoader . loadSsoSessionData ( init ) ;
const ssoSession = ssoSessions [ ssoSessionName ] ;
if ( ! ssoSession ) {
throw new propertyProvider . TokenProviderError ( ` Sso session ' ${ ssoSessionName } ' could not be found in shared credentials file. ` , false ) ;
}
for ( const ssoSessionRequiredKey of [ "sso_start_url" , "sso_region" ] ) {
if ( ! ssoSession [ ssoSessionRequiredKey ] ) {
throw new propertyProvider . TokenProviderError ( ` Sso session ' ${ ssoSessionName } ' is missing required property ' ${ ssoSessionRequiredKey } '. ` , false ) ;
}
}
ssoSession [ "sso_start_url" ] ;
const ssoRegion = ssoSession [ "sso_region" ] ;
let ssoToken ;
try {
ssoToken = await sharedIniFileLoader . getSSOTokenFromFile ( ssoSessionName ) ;
}
catch ( e ) {
throw new propertyProvider . TokenProviderError ( ` The SSO session token associated with profile= ${ profileName } was not found or is invalid. ${ REFRESH _MESSAGE } ` , false ) ;
}
validateTokenKey ( "accessToken" , ssoToken . accessToken ) ;
validateTokenKey ( "expiresAt" , ssoToken . expiresAt ) ;
const { accessToken , expiresAt } = ssoToken ;
const existingToken = { token : accessToken , expiration : new Date ( expiresAt ) } ;
if ( existingToken . expiration . getTime ( ) - Date . now ( ) > EXPIRE _WINDOW _MS ) {
return existingToken ;
}
if ( Date . now ( ) - lastRefreshAttemptTime . getTime ( ) < 30 * 1000 ) {
validateTokenExpiry ( existingToken ) ;
return existingToken ;
}
validateTokenKey ( "clientId" , ssoToken . clientId , true ) ;
validateTokenKey ( "clientSecret" , ssoToken . clientSecret , true ) ;
validateTokenKey ( "refreshToken" , ssoToken . refreshToken , true ) ;
try {
lastRefreshAttemptTime . setTime ( Date . now ( ) ) ;
const newSsoOidcToken = await getNewSsoOidcToken ( ssoToken , ssoRegion , init , callerClientConfig ) ;
validateTokenKey ( "accessToken" , newSsoOidcToken . accessToken ) ;
validateTokenKey ( "expiresIn" , newSsoOidcToken . expiresIn ) ;
const newTokenExpiration = new Date ( Date . now ( ) + newSsoOidcToken . expiresIn * 1000 ) ;
try {
await writeSSOTokenToFile ( ssoSessionName , {
... ssoToken ,
accessToken : newSsoOidcToken . accessToken ,
expiresAt : newTokenExpiration . toISOString ( ) ,
refreshToken : newSsoOidcToken . refreshToken ,
} ) ;
}
catch ( error ) {
}
return {
token : newSsoOidcToken . accessToken ,
expiration : newTokenExpiration ,
} ;
}
catch ( error ) {
validateTokenExpiry ( existingToken ) ;
return existingToken ;
}
} ;
const fromStatic = ( { token , logger } ) => async ( ) => {
logger ? . debug ( "@aws-sdk/token-providers - fromStatic" ) ;
if ( ! token || ! token . token ) {
throw new propertyProvider . TokenProviderError ( ` Please pass a valid token to fromStatic ` , false ) ;
}
return token ;
} ;
const nodeProvider = ( init = { } ) => propertyProvider . memoize ( propertyProvider . chain ( fromSso ( init ) , async ( ) => {
throw new propertyProvider . TokenProviderError ( "Could not load token from any providers" , false ) ;
} ) , ( token ) => token . expiration !== undefined && token . expiration . getTime ( ) - Date . now ( ) < 300000 , ( token ) => token . expiration !== undefined ) ;
exports . fromEnvSigningName = fromEnvSigningName ;
exports . fromSso = fromSso ;
exports . fromStatic = fromStatic ;
exports . nodeProvider = nodeProvider ;
/***/ } ) ,
2026-03-03 17:11:57 +00:00
/***/ 9955 :
2026-01-30 14:42:57 +00:00
/***/ ( ( module ) => {
2026-03-03 17:11:57 +00:00
module . exports = /*#__PURE__*/ JSON . parse ( '{"name":"@aws-sdk/nested-clients","version":"3.996.3","description":"Nested clients for AWS SDK packages.","main":"./dist-cjs/index.js","module":"./dist-es/index.js","types":"./dist-types/index.d.ts","scripts":{"build":"yarn lint && concurrently \'yarn:build:types\' \'yarn:build:es\' && yarn build : cjs "," build : cjs ":" node . . / . . / scripts / compilation / inline nested - clients "," build : es ":" tsc - p tsconfig . es . json "," build : include : deps ":" yarn g : turbo run build - F = \ \ "$npm_package_name\\" "," build : types ":" tsc - p tsconfig . types . json "," build : types : downlevel ":" downlevel - dts dist - types dist - types / ts3 . 4 "," clean ":" premove dist - cjs dist - es dist - types tsconfig . cjs . tsbuildinfo tsconfig . es . tsbuildinfo tsconfig . types . tsbuildinfo "," lint ":" node . . / . . / scripts / validation / submodules - linter . js -- pkg nested - clients "," test ":" yarn g : vitest run "," test : watch ":" yarn g : vitest watch "}," engines ":{" node ":" >= 20.0 . 0 "}," sideEffects ":false," author ":{" name ":" AWS SDK for JavaScript Team "," url ":" https : //aws.amazon.com/javascript/"},"license":"Apache-2.0","dependencies":{"@aws-crypto/sha256-browser":"5.2.0","@aws-crypto/sha256-js":"5.2.0","@aws-sdk/core":"^3.973.15","@aws-sdk/middleware-host-header":"^3.972.6","@aws-sdk/middleware-logger":"^3.972.6","@aws-sdk/middleware-recursion-detection":"^3.972.6","@aws-sdk/middleware-user-agent":"^3.972.15","@aws-sdk/region-config-resolver":"^3.972.6","@aws-sdk/types":"^3.973.4","@aws-sdk/util-endpoints":"^3.996.3","@aws-sdk/util-user-agent-browser":"^3.972.6","@aws-sdk/util-user-agent-node":"^3.973.0","@smithy/config-resolver":"^4.4.9","@smithy/core":"^3.23.6","@smithy/fetch-http-handler":"^5.3.11","@smithy/hash-node":"^4.2.10","@smithy/invalid-dependency":"^4.2.10","@smithy/middleware-content-length":"^4.2.10","@smithy/middleware-endpoint":"^4.4.20","@smithy/middleware-retry":"^4.4.37","@smithy/middleware-serde":"^4.2.11","@smithy/middleware-stack":"^4.2.10","@smithy/node-config-provider":"^4.3.10","@smithy/node-http-handler":"^4.4.12","@smithy/protocol-http":"^5.3.10","@smithy/smithy-client":"^4.12.0","@smithy/types":"^4.13.0","@smithy/url-parser":"^4.2.10","@smithy/util-base64":"^4.3.1","@smithy/util-body-length-browser":"^4.2.1","@smithy/util-body-length-node":"^4.2.2","@smithy/util-defaults-mode-browser":"^4.3.36","@smithy/util-defaults-mode-node":"^4.2.39","@smithy/util-endpoints":"^3.3.1","@smithy/util-middleware":"^4.2.10","@smithy/util-retry":"^4.2.10","@smithy/util-utf8":"^4.2.1","tslib":"^2.6.2"},"devDependencies":{"concurrently":"7.0.0","downlevel-dts":"0.10.1","premove":"4.0.0","typescript":"~5.8.3"},"typesVersions":{"<4.0":{"dist-types/*":["dist-types/ts3.4/*"]}},"files":["./cognito-identity.d.ts","./cognito-identity.js","./signin.d.ts","./signin.js","./sso-oidc.d.ts","./sso-oidc.js","./sso.d.ts","./sso.js","./sts.d.ts","./sts.js","dist-*/**"],"browser":{"./dist-es/submodules/signin/runtimeConfig":"./dist-es/submodules/signin/runtimeConfig.browser","./dist-es/submodules/sso-oidc/runtimeConfig":"./dist-es/submodules/sso-oidc/runtimeConfig.browser","./dist-es/submodules/sts/runtimeConfig":"./dist-es/submodules/sts/runtimeConfig.browser"},"react-native":{},"homepage":"https://github.com/aws/aws-sdk-js-v3/tree/main/packages/nested-clients","repository":{"type":"git","url":"https://github.com/aws/aws-sdk-js-v3.git","directory":"packages/nested-clients"},"exports":{"./package.json":"./package.json","./sso-oidc":{"types":"./dist-types/submodules/sso-oidc/index.d.ts","module":"./dist-es/submodules/sso-oidc/index.js","node":"./dist-cjs/submodules/sso-oidc/index.js","import":"./dist-es/submodules/sso-oidc/index.js","require":"./dist-cjs/submodules/sso-oidc/index.js"},"./sts":{"types":"./dist-types/submodules/sts/index.d.ts","module":"./dist-es/submodules/sts/index.js","node":"./dist-cjs/submodules/sts/index.js","import":"./dist-es/submodules/sts/index.js","require":"./dist-cjs/submodules/sts/index.js"},"./signin":{"types":"./dist-types/submodules/signin/index.d.ts","module":"./dist-es/submodules/signin/index.js","node":"./dist-cjs/submodules/signin/index.js","import":"./dist-es/submod
2026-01-30 14:42:57 +00:00
/***/ } )
} ;
2026-03-01 10:29:20 +00:00
2026-01-30 14:42:57 +00:00
//# sourceMappingURL=998.index.js.map