UNPKG

aws-secrets-manager-wrapper

Version:

A TypeScript wrapper for AWS Secrets Manager that simplifies common operations and provides a more user-friendly interface.

1 lines 131 kB
(()=>{"use strict";var e,t={6554:(e,t,r)=>{r.r(t),r.d(t,{$Command:()=>p.uB,BatchGetSecretValueCommand:()=>gr,BatchGetSecretValueResponseFilterSensitiveLog:()=>Ne,CancelRotateSecretCommand:()=>mr,CreateSecretCommand:()=>yr,CreateSecretRequestFilterSensitiveLog:()=>Me,DecryptionFailure:()=>we,DeleteResourcePolicyCommand:()=>Sr,DeleteSecretCommand:()=>wr,DescribeSecretCommand:()=>vr,EncryptionFailure:()=>Ae,FilterNameStringType:()=>Se,GetRandomPasswordCommand:()=>br,GetRandomPasswordResponseFilterSensitiveLog:()=>_e,GetResourcePolicyCommand:()=>Er,GetSecretValueCommand:()=>Rr,GetSecretValueResponseFilterSensitiveLog:()=>Le,InternalServiceError:()=>ve,InvalidNextTokenException:()=>be,InvalidParameterException:()=>Ee,InvalidRequestException:()=>Re,LimitExceededException:()=>xe,ListSecretVersionIdsCommand:()=>Tr,ListSecretsCommand:()=>Cr,MalformedPolicyDocumentException:()=>Pe,PreconditionNotMetException:()=>Ie,PublicPolicyException:()=>ke,PutResourcePolicyCommand:()=>Ar,PutSecretValueCommand:()=>xr,PutSecretValueRequestFilterSensitiveLog:()=>Fe,RemoveRegionsFromReplicationCommand:()=>Pr,ReplicateSecretToRegionsCommand:()=>Ir,ResourceExistsException:()=>$e,ResourceNotFoundException:()=>Ce,RestoreSecretCommand:()=>$r,RotateSecretCommand:()=>Or,SecretValueEntryFilterSensitiveLog:()=>De,SecretsManager:()=>Ur,SecretsManagerClient:()=>ge,SecretsManagerServiceException:()=>ye,SortOrderType:()=>Oe,StatusType:()=>Te,StopReplicationToReplicaCommand:()=>kr,TagResourceCommand:()=>Dr,UntagResourceCommand:()=>Nr,UpdateSecretCommand:()=>Mr,UpdateSecretRequestFilterSensitiveLog:()=>Ue,UpdateSecretVersionStageCommand:()=>_r,ValidateResourcePolicyCommand:()=>Lr,__Client:()=>p.Kj,paginateBatchGetSecretValue:()=>jr,paginateListSecretVersionIds:()=>Br,paginateListSecrets:()=>qr});var n=r(1095),s=r(9359),o=r(8377),i=r(6961),a=r(1487),c=r(3847),d=r(649),u=r(9389),l=r(3594),p=r(1540),f=r(3448),h=r(7135);const g=async(e,t,r)=>({operation:(0,h.u)(t).operation,region:await(0,h.t)(e.region)()||(()=>{throw new Error("expected `region` to be configured for `aws.auth#sigv4`")})()}),m=e=>{const t=[];return e.operation,t.push(function(e){return{schemeId:"aws.auth#sigv4",signingProperties:{name:"secretsmanager",region:e.region},propertiesExtractor:(e,t)=>({signingProperties:{config:e,context:t}})}}(e)),t},y={UseFIPS:{type:"builtInParams",name:"useFipsEndpoint"},Endpoint:{type:"builtInParams",name:"endpoint"},Region:{type:"builtInParams",name:"region"},UseDualStack:{type:"builtInParams",name:"useDualstackEndpoint"}};var S=r(5122),w=r(8257),v=r(3410),b=r(1701),E=r(9987),R=r(4029),C=r(7809),T=r(3323),A=r(6228),x=r(2641),P=r(4572),I=r(3197),$=r(6652),O=r(8545);const k="required",D="fn",N="argv",M="ref",_="properties",L="headers",F=!0,U="isSet",j="booleanEquals",B="error",q="endpoint",z="tree",V="PartitionResult",K="stringEquals",H={[k]:!1,type:"String"},W={[k]:!0,default:!1,type:"Boolean"},G={[M]:"Endpoint"},Y={[D]:j,[N]:[{[M]:"UseFIPS"},!0]},J={[D]:j,[N]:[{[M]:"UseDualStack"},!0]},Z={},X={[D]:"getAttr",[N]:[{[M]:V},"supportsFIPS"]},Q={[D]:j,[N]:[!0,{[D]:"getAttr",[N]:[{[M]:V},"supportsDualStack"]}]},ee={[D]:"getAttr",[N]:[{[M]:V},"name"]},te={url:"https://secretsmanager-fips.{Region}.amazonaws.com",[_]:{},[L]:{}},re={url:"https://secretsmanager.{Region}.amazonaws.com",[_]:{},[L]:{}},ne=[Y],se=[J],oe=[{[M]:"Region"}],ie=[{[D]:K,[N]:["aws",ee]}],ae=[{[D]:K,[N]:["aws-us-gov",ee]}],ce={version:"1.0",parameters:{Region:H,UseDualStack:W,UseFIPS:W,Endpoint:H},rules:[{conditions:[{[D]:U,[N]:[G]}],rules:[{conditions:ne,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:B},{conditions:se,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:B},{endpoint:{url:G,[_]:Z,[L]:Z},type:q}],type:z},{conditions:[{[D]:U,[N]:oe}],rules:[{conditions:[{[D]:"aws.partition",[N]:oe,assign:V}],rules:[{conditions:[Y,J],rules:[{conditions:[{[D]:j,[N]:[F,X]},Q],rules:[{conditions:ie,endpoint:te,type:q},{conditions:ae,endpoint:te,type:q},{endpoint:{url:"https://secretsmanager-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",[_]:Z,[L]:Z},type:q}],type:z},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:B}],type:z},{conditions:ne,rules:[{conditions:[{[D]:j,[N]:[X,F]}],rules:[{endpoint:{url:"https://secretsmanager-fips.{Region}.{PartitionResult#dnsSuffix}",[_]:Z,[L]:Z},type:q}],type:z},{error:"FIPS is enabled but this partition does not support FIPS",type:B}],type:z},{conditions:se,rules:[{conditions:[Q],rules:[{conditions:ie,endpoint:re,type:q},{conditions:[{[D]:K,[N]:["aws-cn",ee]}],endpoint:{url:"https://secretsmanager.{Region}.amazonaws.com.cn",[_]:Z,[L]:Z},type:q},{conditions:ae,endpoint:re,type:q},{endpoint:{url:"https://secretsmanager.{Region}.{PartitionResult#dualStackDnsSuffix}",[_]:Z,[L]:Z},type:q}],type:z},{error:"DualStack is enabled but this partition does not support DualStack",type:B}],type:z},{endpoint:{url:"https://secretsmanager.{Region}.{PartitionResult#dnsSuffix}",[_]:Z,[L]:Z},type:q}],type:z}],type:z},{error:"Invalid Configuration: Missing Region",type:B}]},de=new O.kS({size:50,params:["Endpoint","Region","UseDualStack","UseFIPS"]}),ue=(e,t={})=>de.get(e,(()=>(0,O.sO)(ce,{endpointParams:e,logger:t.logger})));O.mw.aws=$.UF;var le=r(4321);var pe=r(6928),fe=r(5479);const he=e=>{const t=e.httpAuthSchemes;let r=e.httpAuthSchemeProvider,n=e.credentials;return{setHttpAuthScheme(e){const r=t.findIndex((t=>t.schemeId===e.schemeId));-1===r?t.push(e):t.splice(r,1,e)},httpAuthSchemes:()=>t,setHttpAuthSchemeProvider(e){r=e},httpAuthSchemeProvider:()=>r,setCredentials(e){n=e},credentials:()=>n}};class ge extends p.Kj{constructor(...[e]){const t=(e=>{(0,p.I9)(process.version);const t=(0,le.I)(e),r=()=>t().then(p.lT),n=(e=>({apiVersion:"2017-10-17",base64Decoder:e?.base64Decoder??P.E,base64Encoder:e?.base64Encoder??P.n,disableHostPrefix:e?.disableHostPrefix??!1,endpointProvider:e?.endpointProvider??ue,extensions:e?.extensions??[],httpAuthSchemeProvider:e?.httpAuthSchemeProvider??m,httpAuthSchemes:e?.httpAuthSchemes??[{schemeId:"aws.auth#sigv4",identityProvider:e=>e.getIdentityProvider("aws.auth#sigv4"),signer:new A.f2}],logger:e?.logger??new p.N4,serviceId:e?.serviceId??"Secrets Manager",urlParser:e?.urlParser??x.D,utf8Decoder:e?.utf8Decoder??I.ar,utf8Encoder:e?.utf8Encoder??I.Pq}))(e);return(0,S.I)(process.version),{...n,...e,runtime:"node",defaultsMode:t,bodyLengthChecker:e?.bodyLengthChecker??C.n,credentialDefaultProvider:e?.credentialDefaultProvider??w.v6,defaultUserAgentProvider:e?.defaultUserAgentProvider??(0,v.pf)({serviceId:n.serviceId,clientVersion:"3.670.0"}),maxAttempts:e?.maxAttempts??(0,E.Z)(l.qs),region:e?.region??(0,E.Z)(a.GG,a.zH),requestHandler:R.$c.create(e?.requestHandler??r),retryMode:e?.retryMode??(0,E.Z)({...l.kN,default:async()=>(await r()).retryMode||T.L0}),sha256:e?.sha256??b.V.bind(null,"sha256"),streamCollector:e?.streamCollector??R.kv,useDualstackEndpoint:e?.useDualstackEndpoint??(0,E.Z)(a.e$),useFipsEndpoint:e?.useFipsEndpoint??(0,E.Z)(a.Ko),userAgentAppId:e?.userAgentAppId??(0,E.Z)(v.hV)}})(e||{}),r=(h=t,{...h,useDualstackEndpoint:h.useDualstackEndpoint??!1,useFipsEndpoint:h.useFipsEndpoint??!1,defaultSigningName:"secretsmanager"});var h;const y=(0,i.Dc)(r),$=(0,l.$z)(y),O=(0,a.TD)($),k=(0,n.OV)(O);var D;const N=((e,t)=>{const r={...(0,pe.Rq)(e),...(0,p.xA)(e),...(0,fe.eS)(e),...he(e)};return t.forEach((e=>e.configure(r))),{...e,...(0,pe.$3)(r),...(0,p.uv)(r),...(0,fe.jt)(r),...(n=r,{httpAuthSchemes:n.httpAuthSchemes(),httpAuthSchemeProvider:n.httpAuthSchemeProvider(),credentials:n.credentials()})};var n})((D=(0,u.Co)(k),{...(0,f.h)(D)}),e?.extensions||[]);super(N),this.config=N,this.middlewareStack.use((0,i.sM)(this.config)),this.middlewareStack.use((0,l.ey)(this.config)),this.middlewareStack.use((0,d.vK)(this.config)),this.middlewareStack.use((0,n.TC)(this.config)),this.middlewareStack.use((0,s.Y7)(this.config)),this.middlewareStack.use((0,o.n4)(this.config)),this.middlewareStack.use((0,c.wB)(this.config,{httpAuthSchemeParametersProvider:g,identityProviderConfigProvider:async e=>new c.h$({"aws.auth#sigv4":e.credentials})})),this.middlewareStack.use((0,c.lW)(this.config))}destroy(){super.destroy()}}var me=r(1208);class ye extends p.TJ{constructor(e){super(e),Object.setPrototypeOf(this,ye.prototype)}}const Se={all:"all",description:"description",name:"name",owning_service:"owning-service",primary_region:"primary-region",tag_key:"tag-key",tag_value:"tag-value"};class we extends ye{constructor(e){super({name:"DecryptionFailure",$fault:"client",...e}),this.name="DecryptionFailure",this.$fault="client",Object.setPrototypeOf(this,we.prototype),this.Message=e.Message}}class ve extends ye{constructor(e){super({name:"InternalServiceError",$fault:"server",...e}),this.name="InternalServiceError",this.$fault="server",Object.setPrototypeOf(this,ve.prototype),this.Message=e.Message}}class be extends ye{constructor(e){super({name:"InvalidNextTokenException",$fault:"client",...e}),this.name="InvalidNextTokenException",this.$fault="client",Object.setPrototypeOf(this,be.prototype),this.Message=e.Message}}class Ee extends ye{constructor(e){super({name:"InvalidParameterException",$fault:"client",...e}),this.name="InvalidParameterException",this.$fault="client",Object.setPrototypeOf(this,Ee.prototype),this.Message=e.Message}}class Re extends ye{constructor(e){super({name:"InvalidRequestException",$fault:"client",...e}),this.name="InvalidRequestException",this.$fault="client",Object.setPrototypeOf(this,Re.prototype),this.Message=e.Message}}class Ce extends ye{constructor(e){super({name:"ResourceNotFoundException",$fault:"client",...e}),this.name="ResourceNotFoundException",this.$fault="client",Object.setPrototypeOf(this,Ce.prototype),this.Message=e.Message}}const Te={Failed:"Failed",InProgress:"InProgress",InSync:"InSync"};class Ae extends ye{constructor(e){super({name:"EncryptionFailure",$fault:"client",...e}),this.name="EncryptionFailure",this.$fault="client",Object.setPrototypeOf(this,Ae.prototype),this.Message=e.Message}}class xe extends ye{constructor(e){super({name:"LimitExceededException",$fault:"client",...e}),this.name="LimitExceededException",this.$fault="client",Object.setPrototypeOf(this,xe.prototype),this.Message=e.Message}}class Pe extends ye{constructor(e){super({name:"MalformedPolicyDocumentException",$fault:"client",...e}),this.name="MalformedPolicyDocumentException",this.$fault="client",Object.setPrototypeOf(this,Pe.prototype),this.Message=e.Message}}class Ie extends ye{constructor(e){super({name:"PreconditionNotMetException",$fault:"client",...e}),this.name="PreconditionNotMetException",this.$fault="client",Object.setPrototypeOf(this,Ie.prototype),this.Message=e.Message}}class $e extends ye{constructor(e){super({name:"ResourceExistsException",$fault:"client",...e}),this.name="ResourceExistsException",this.$fault="client",Object.setPrototypeOf(this,$e.prototype),this.Message=e.Message}}const Oe={asc:"asc",desc:"desc"};class ke extends ye{constructor(e){super({name:"PublicPolicyException",$fault:"client",...e}),this.name="PublicPolicyException",this.$fault="client",Object.setPrototypeOf(this,ke.prototype),this.Message=e.Message}}const De=e=>({...e,...e.SecretBinary&&{SecretBinary:p.$H},...e.SecretString&&{SecretString:p.$H}}),Ne=e=>({...e,...e.SecretValues&&{SecretValues:e.SecretValues.map((e=>De(e)))}}),Me=e=>({...e,...e.SecretBinary&&{SecretBinary:p.$H},...e.SecretString&&{SecretString:p.$H}}),_e=e=>({...e,...e.RandomPassword&&{RandomPassword:p.$H}}),Le=e=>({...e,...e.SecretBinary&&{SecretBinary:p.$H},...e.SecretString&&{SecretString:p.$H}}),Fe=e=>({...e,...e.SecretBinary&&{SecretBinary:p.$H},...e.SecretString&&{SecretString:p.$H},...e.RotationToken&&{RotationToken:p.$H}}),Ue=e=>({...e,...e.SecretBinary&&{SecretBinary:p.$H},...e.SecretString&&{SecretString:p.$H}});var je=r(1919),Be=r(4349);const qe=async(e,t)=>{const r=hr("BatchGetSecretValue");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},ze=async(e,t)=>{const r=hr("CancelRotateSecret");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},Ve=async(e,t)=>{const r=hr("CreateSecret");let n;return n=JSON.stringify(Wt(e,t)),fr(t,r,"/",void 0,n)},Ke=async(e,t)=>{const r=hr("DeleteResourcePolicy");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},He=async(e,t)=>{const r=hr("DeleteSecret");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},We=async(e,t)=>{const r=hr("DescribeSecret");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},Ge=async(e,t)=>{const r=hr("GetRandomPassword");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},Ye=async(e,t)=>{const r=hr("GetResourcePolicy");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},Je=async(e,t)=>{const r=hr("GetSecretValue");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},Ze=async(e,t)=>{const r=hr("ListSecrets");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},Xe=async(e,t)=>{const r=hr("ListSecretVersionIds");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},Qe=async(e,t)=>{const r=hr("PutResourcePolicy");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},et=async(e,t)=>{const r=hr("PutSecretValue");let n;return n=JSON.stringify(Gt(e,t)),fr(t,r,"/",void 0,n)},tt=async(e,t)=>{const r=hr("RemoveRegionsFromReplication");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},rt=async(e,t)=>{const r=hr("ReplicateSecretToRegions");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},nt=async(e,t)=>{const r=hr("RestoreSecret");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},st=async(e,t)=>{const r=hr("RotateSecret");let n;return n=JSON.stringify(Yt(e,t)),fr(t,r,"/",void 0,n)},ot=async(e,t)=>{const r=hr("StopReplicationToReplica");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},it=async(e,t)=>{const r=hr("TagResource");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},at=async(e,t)=>{const r=hr("UntagResource");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},ct=async(e,t)=>{const r=hr("UpdateSecret");let n;return n=JSON.stringify(Jt(e,t)),fr(t,r,"/",void 0,n)},dt=async(e,t)=>{const r=hr("UpdateSecretVersionStage");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},ut=async(e,t)=>{const r=hr("ValidateResourcePolicy");let n;return n=JSON.stringify((0,p.Ss)(e)),fr(t,r,"/",void 0,n)},lt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=Zt(r,t),{$metadata:lr(e),...n}},pt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},ft=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=Xt(r,t),{$metadata:lr(e),...n}},ht=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},gt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=Qt(r,t),{$metadata:lr(e),...n}},mt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=er(r,t),{$metadata:lr(e),...n}},yt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},St=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},wt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=tr(r,t),{$metadata:lr(e),...n}},vt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=rr(r,t),{$metadata:lr(e),...n}},bt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=nr(r,t),{$metadata:lr(e),...n}},Et=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},Rt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},Ct=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=sr(r,t),{$metadata:lr(e),...n}},Tt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=or(r,t),{$metadata:lr(e),...n}},At=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},xt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},Pt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},It=async(e,t)=>e.statusCode>=300?Nt(e,t):(await(0,p.Px)(e.body,t),{$metadata:lr(e)}),$t=async(e,t)=>e.statusCode>=300?Nt(e,t):(await(0,p.Px)(e.body,t),{$metadata:lr(e)}),Ot=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},kt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},Dt=async(e,t)=>{if(e.statusCode>=300)return Nt(e,t);const r=await(0,je.Y2)(e.body,t);let n={};return n=(0,p.Ss)(r),{$metadata:lr(e),...n}},Nt=async(e,t)=>{const r={...e,body:await(0,je.CG)(e.body,t)},n=(0,je.cJ)(e,r.body);switch(n){case"DecryptionFailure":case"com.amazonaws.secretsmanager#DecryptionFailure":throw await Mt(r,t);case"InternalServiceError":case"com.amazonaws.secretsmanager#InternalServiceError":throw await Lt(r,t);case"InvalidNextTokenException":case"com.amazonaws.secretsmanager#InvalidNextTokenException":throw await Ft(r,t);case"InvalidParameterException":case"com.amazonaws.secretsmanager#InvalidParameterException":throw await Ut(r,t);case"InvalidRequestException":case"com.amazonaws.secretsmanager#InvalidRequestException":throw await jt(r,t);case"ResourceNotFoundException":case"com.amazonaws.secretsmanager#ResourceNotFoundException":throw await Ht(r,t);case"EncryptionFailure":case"com.amazonaws.secretsmanager#EncryptionFailure":throw await _t(r,t);case"LimitExceededException":case"com.amazonaws.secretsmanager#LimitExceededException":throw await Bt(r,t);case"MalformedPolicyDocumentException":case"com.amazonaws.secretsmanager#MalformedPolicyDocumentException":throw await qt(r,t);case"PreconditionNotMetException":case"com.amazonaws.secretsmanager#PreconditionNotMetException":throw await zt(r,t);case"ResourceExistsException":case"com.amazonaws.secretsmanager#ResourceExistsException":throw await Kt(r,t);case"PublicPolicyException":case"com.amazonaws.secretsmanager#PublicPolicyException":throw await Vt(r,t);default:const s=r.body;return pr({output:e,parsedBody:s,errorCode:n})}},Mt=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new we({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},_t=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new Ae({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},Lt=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new ve({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},Ft=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new be({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},Ut=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new Ee({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},jt=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new Re({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},Bt=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new xe({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},qt=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new Pe({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},zt=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new Ie({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},Vt=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new ke({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},Kt=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new $e({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},Ht=async(e,t)=>{const r=e.body,n=(0,p.Ss)(r),s=new Ce({$metadata:lr(e),...n});return(0,p.Mw)(s,r)},Wt=(e,t)=>(0,p.s)(e,{AddReplicaRegions:p.Ss,ClientRequestToken:[!0,e=>e??(0,Be.A)()],Description:[],ForceOverwriteReplicaSecret:[],KmsKeyId:[],Name:[],SecretBinary:t.base64Encoder,SecretString:[],Tags:p.Ss}),Gt=(e,t)=>(0,p.s)(e,{ClientRequestToken:[!0,e=>e??(0,Be.A)()],RotationToken:[],SecretBinary:t.base64Encoder,SecretId:[],SecretString:[],VersionStages:p.Ss}),Yt=(e,t)=>(0,p.s)(e,{ClientRequestToken:[!0,e=>e??(0,Be.A)()],RotateImmediately:[],RotationLambdaARN:[],RotationRules:p.Ss,SecretId:[]}),Jt=(e,t)=>(0,p.s)(e,{ClientRequestToken:[!0,e=>e??(0,Be.A)()],Description:[],KmsKeyId:[],SecretBinary:t.base64Encoder,SecretId:[],SecretString:[]}),Zt=(e,t)=>(0,p.s)(e,{Errors:p.Ss,NextToken:p.lK,SecretValues:e=>dr(e,t)}),Xt=(e,t)=>(0,p.s)(e,{ARN:p.lK,Name:p.lK,ReplicationStatus:e=>ir(e,t),VersionId:p.lK}),Qt=(e,t)=>(0,p.s)(e,{ARN:p.lK,DeletionDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),Name:p.lK}),er=(e,t)=>(0,p.s)(e,{ARN:p.lK,CreatedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),DeletedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),Description:p.lK,KmsKeyId:p.lK,LastAccessedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),LastChangedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),LastRotatedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),Name:p.lK,NextRotationDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),OwningService:p.lK,PrimaryRegion:p.lK,ReplicationStatus:e=>ir(e,t),RotationEnabled:p.ak,RotationLambdaARN:p.lK,RotationRules:p.Ss,Tags:p.Ss,VersionIdsToStages:p.Ss}),tr=(e,t)=>(0,p.s)(e,{ARN:p.lK,CreatedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),Name:p.lK,SecretBinary:t.base64Decoder,SecretString:p.lK,VersionId:p.lK,VersionStages:p.Ss}),rr=(e,t)=>(0,p.s)(e,{NextToken:p.lK,SecretList:e=>cr(e,t)}),nr=(e,t)=>(0,p.s)(e,{ARN:p.lK,Name:p.lK,NextToken:p.lK,Versions:e=>ur(e,t)}),sr=(e,t)=>(0,p.s)(e,{ARN:p.lK,ReplicationStatus:e=>ir(e,t)}),or=(e,t)=>(0,p.s)(e,{ARN:p.lK,ReplicationStatus:e=>ir(e,t)}),ir=(e,t)=>{const r=(e||[]).filter((e=>null!=e)).map((e=>ar(e,t)));return r},ar=(e,t)=>(0,p.s)(e,{KmsKeyId:p.lK,LastAccessedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),Region:p.lK,Status:p.lK,StatusMessage:p.lK}),cr=(e,t)=>{const r=(e||[]).filter((e=>null!=e)).map((e=>(e=>(0,p.s)(e,{ARN:p.lK,CreatedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),DeletedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),Description:p.lK,KmsKeyId:p.lK,LastAccessedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),LastChangedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),LastRotatedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),Name:p.lK,NextRotationDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),OwningService:p.lK,PrimaryRegion:p.lK,RotationEnabled:p.ak,RotationLambdaARN:p.lK,RotationRules:p.Ss,SecretVersionsToStages:p.Ss,Tags:p.Ss}))(e)));return r},dr=(e,t)=>{const r=(e||[]).filter((e=>null!=e)).map((e=>((e,t)=>(0,p.s)(e,{ARN:p.lK,CreatedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),Name:p.lK,SecretBinary:t.base64Decoder,SecretString:p.lK,VersionId:p.lK,VersionStages:p.Ss}))(e,t)));return r},ur=(e,t)=>{const r=(e||[]).filter((e=>null!=e)).map((e=>(e=>(0,p.s)(e,{CreatedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),KmsKeyIds:p.Ss,LastAccessedDate:e=>(0,p.Y0)((0,p.l3)((0,p.r$)(e))),VersionId:p.lK,VersionStages:p.Ss}))(e)));return r},lr=e=>({httpStatusCode:e.statusCode,requestId:e.headers["x-amzn-requestid"]??e.headers["x-amzn-request-id"]??e.headers["x-amz-request-id"],extendedRequestId:e.headers["x-amz-id-2"],cfId:e.headers["x-amz-cf-id"]}),pr=(0,p.jr)(ye),fr=async(e,t,r,n,s)=>{const{hostname:o,protocol:i="https",port:a,path:c}=await e.endpoint(),d={protocol:i,hostname:o,port:a,method:"POST",path:c.endsWith("/")?c.slice(0,-1)+r:c+r,headers:t};return void 0!==n&&(d.hostname=n),void 0!==s&&(d.body=s),new fe.Kd(d)};function hr(e){return{"content-type":"application/x-amz-json-1.1","x-amz-target":`secretsmanager.${e}`}}class gr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","BatchGetSecretValue",{}).n("SecretsManagerClient","BatchGetSecretValueCommand").f(void 0,Ne).ser(qe).de(lt).build()){}class mr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","CancelRotateSecret",{}).n("SecretsManagerClient","CancelRotateSecretCommand").f(void 0,void 0).ser(ze).de(pt).build()){}class yr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","CreateSecret",{}).n("SecretsManagerClient","CreateSecretCommand").f(Me,void 0).ser(Ve).de(ft).build()){}class Sr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","DeleteResourcePolicy",{}).n("SecretsManagerClient","DeleteResourcePolicyCommand").f(void 0,void 0).ser(Ke).de(ht).build()){}class wr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","DeleteSecret",{}).n("SecretsManagerClient","DeleteSecretCommand").f(void 0,void 0).ser(He).de(gt).build()){}class vr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","DescribeSecret",{}).n("SecretsManagerClient","DescribeSecretCommand").f(void 0,void 0).ser(We).de(mt).build()){}class br extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","GetRandomPassword",{}).n("SecretsManagerClient","GetRandomPasswordCommand").f(void 0,_e).ser(Ge).de(yt).build()){}class Er extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","GetResourcePolicy",{}).n("SecretsManagerClient","GetResourcePolicyCommand").f(void 0,void 0).ser(Ye).de(St).build()){}class Rr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","GetSecretValue",{}).n("SecretsManagerClient","GetSecretValueCommand").f(void 0,Le).ser(Je).de(wt).build()){}class Cr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","ListSecrets",{}).n("SecretsManagerClient","ListSecretsCommand").f(void 0,void 0).ser(Ze).de(vt).build()){}class Tr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","ListSecretVersionIds",{}).n("SecretsManagerClient","ListSecretVersionIdsCommand").f(void 0,void 0).ser(Xe).de(bt).build()){}class Ar extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","PutResourcePolicy",{}).n("SecretsManagerClient","PutResourcePolicyCommand").f(void 0,void 0).ser(Qe).de(Et).build()){}class xr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","PutSecretValue",{}).n("SecretsManagerClient","PutSecretValueCommand").f(Fe,void 0).ser(et).de(Rt).build()){}class Pr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","RemoveRegionsFromReplication",{}).n("SecretsManagerClient","RemoveRegionsFromReplicationCommand").f(void 0,void 0).ser(tt).de(Ct).build()){}class Ir extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","ReplicateSecretToRegions",{}).n("SecretsManagerClient","ReplicateSecretToRegionsCommand").f(void 0,void 0).ser(rt).de(Tt).build()){}class $r extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","RestoreSecret",{}).n("SecretsManagerClient","RestoreSecretCommand").f(void 0,void 0).ser(nt).de(At).build()){}class Or extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","RotateSecret",{}).n("SecretsManagerClient","RotateSecretCommand").f(void 0,void 0).ser(st).de(xt).build()){}class kr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","StopReplicationToReplica",{}).n("SecretsManagerClient","StopReplicationToReplicaCommand").f(void 0,void 0).ser(ot).de(Pt).build()){}class Dr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","TagResource",{}).n("SecretsManagerClient","TagResourceCommand").f(void 0,void 0).ser(it).de(It).build()){}class Nr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","UntagResource",{}).n("SecretsManagerClient","UntagResourceCommand").f(void 0,void 0).ser(at).de($t).build()){}class Mr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","UpdateSecret",{}).n("SecretsManagerClient","UpdateSecretCommand").f(Ue,void 0).ser(ct).de(Ot).build()){}class _r extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","UpdateSecretVersionStage",{}).n("SecretsManagerClient","UpdateSecretVersionStageCommand").f(void 0,void 0).ser(dt).de(kt).build()){}class Lr extends(p.uB.classBuilder().ep(y).m((function(e,t,r,n){return[(0,me.TM)(r,this.serialize,this.deserialize),(0,u.rD)(r,e.getEndpointParameterInstructions())]})).s("secretsmanager","ValidateResourcePolicy",{}).n("SecretsManagerClient","ValidateResourcePolicyCommand").f(void 0,void 0).ser(ut).de(Dt).build()){}const Fr={BatchGetSecretValueCommand:gr,CancelRotateSecretCommand:mr,CreateSecretCommand:yr,DeleteResourcePolicyCommand:Sr,DeleteSecretCommand:wr,DescribeSecretCommand:vr,GetRandomPasswordCommand:br,GetResourcePolicyCommand:Er,GetSecretValueCommand:Rr,ListSecretsCommand:Cr,ListSecretVersionIdsCommand:Tr,PutResourcePolicyCommand:Ar,PutSecretValueCommand:xr,RemoveRegionsFromReplicationCommand:Pr,ReplicateSecretToRegionsCommand:Ir,RestoreSecretCommand:$r,RotateSecretCommand:Or,StopReplicationToReplicaCommand:kr,TagResourceCommand:Dr,UntagResourceCommand:Nr,UpdateSecretCommand:Mr,UpdateSecretVersionStageCommand:_r,ValidateResourcePolicyCommand:Lr};class Ur extends ge{}(0,p.J1)(Fr,Ur);const jr=(0,c.KU)(ge,gr,"NextToken","NextToken","MaxResults"),Br=(0,c.KU)(ge,Tr,"NextToken","NextToken","MaxResults"),qr=(0,c.KU)(ge,Cr,"NextToken","NextToken","MaxResults")},5122:(e,t,r)=>{r.d(t,{I:()=>s});let n=!1;const s=e=>{e&&!n&&parseInt(e.substring(1,e.indexOf(".")))<18&&(n=!0,process.emitWarning("NodeDeprecationWarning: The AWS SDK for JavaScript (v3) will\nno longer support Node.js 16.x on January 6, 2025.\n\nTo continue receiving updates to AWS services, bug fixes, and security\nupdates please upgrade to a supported Node.js LTS version.\n\nMore information can be found at: https://a.co/74kJMmI"))}},244:(e,t,r)=>{function n(e,t,r){return e.$source||(e.$source={}),e.$source[t]=r,e}r.d(t,{g:()=>n})},6228:(e,t,r)=>{r.d(t,{f2:()=>c});var n=r(5479);const s=e=>new Date(Date.now()+e),o=e=>n.cS.isInstance(e)?e.headers?.date??e.headers?.Date:void 0,i=(e,t)=>{const r=Date.parse(e);return((e,t)=>Math.abs(s(t).getTime()-e)>=3e5)(r,t)?r-Date.now():t},a=(e,t)=>{if(!t)throw new Error(`Property \`${e}\` is not resolved for AWS SDK SigV4Auth`);return t};class c{async sign(e,t,r){if(!n.Kd.isInstance(e))throw new Error("The request is not an instance of `HttpRequest` and cannot be signed");const o=await(async e=>{const t=a("context",e.context),r=a("config",e.config),n=t.endpointV2?.properties?.authSchemes?.[0],s=a("signer",r.signer),o=await s(n),i=e?.signingRegion,c=e?.signingRegionSet,d=e?.signingName;return{config:r,signer:o,signingRegion:i,signingRegionSet:c,signingName:d}})(r),{config:i,signer:c}=o;let{signingRegion:d,signingName:u}=o;const l=r.context;if(l?.authSchemes?.length){const[e,t]=l.authSchemes;"sigv4a"===e?.name&&"sigv4"===t?.name&&(d=t?.signingRegion??d,u=t?.signingName??u)}return await c.sign(e,{signingDate:s(i.systemClockOffset),signingRegion:d,signingService:u})}errorHandler(e){return t=>{const r=t.ServerTime??o(t.$response);if(r){const n=a("config",e.config),s=n.systemClockOffset;n.systemClockOffset=i(r,n.systemClockOffset),n.systemClockOffset!==s&&t.$metadata&&(t.$metadata.clockSkewCorrected=!0)}throw t}}successHandler(e,t){const r=o(e);if(r){const e=a("config",t.config);e.systemClockOffset=i(r,e.systemClockOffset)}}}},3448:(e,t,r)=>{r.d(t,{h:()=>B});var n=r(244),s=r(3847),o=r(8004),i=r(7135),a=r(2531),c=r(3197);const d="X-Amz-Date",u="X-Amz-Signature",l="X-Amz-Security-Token",p="authorization",f=d.toLowerCase(),h=[p,f,"date"],g=u.toLowerCase(),m="x-amz-content-sha256",y=l.toLowerCase(),S={authorization:!0,"cache-control":!0,connection:!0,expect:!0,from:!0,"keep-alive":!0,"max-forwards":!0,pragma:!0,referer:!0,te:!0,trailer:!0,"transfer-encoding":!0,upgrade:!0,"user-agent":!0,"x-amzn-trace-id":!0},w=/^proxy-/,v=/^sec-/,b="AWS4-HMAC-SHA256",E="AWS4-HMAC-SHA256-PAYLOAD",R="aws4_request",C={},T=[],A=(e,t,r)=>`${e}/${t}/${r}/${R}`,x=(e,t,r)=>{const n=new e(t);return n.update((0,c.Fo)(r)),n.digest()},P=({headers:e},t,r)=>{const n={};for(const s of Object.keys(e).sort()){if(null==e[s])continue;const o=s.toLowerCase();(o in S||t?.has(o)||w.test(o)||v.test(o))&&(!r||r&&!r.has(o))||(n[o]=e[s].trim().replace(/\s+/g," "))}return n};var I=r(3695);const $=async({headers:e,body:t},r)=>{for(const t of Object.keys(e))if(t.toLowerCase()===m)return e[t];if(null==t)return"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855";if("string"==typeof t||ArrayBuffer.isView(t)||(0,I.m)(t)){const e=new r;return e.update((0,c.Fo)(t)),(0,o.n)(await e.digest())}return"UNSIGNED-PAYLOAD"};class O{format(e){const t=[];for(const r of Object.keys(e)){const n=(0,c.ar)(r);t.push(Uint8Array.from([n.byteLength]),n,this.formatHeaderValue(e[r]))}const r=new Uint8Array(t.reduce(((e,t)=>e+t.byteLength),0));let n=0;for(const e of t)r.set(e,n),n+=e.byteLength;return r}formatHeaderValue(e){switch(e.type){case"boolean":return Uint8Array.from([e.value?0:1]);case"byte":return Uint8Array.from([2,e.value]);case"short":const t=new DataView(new ArrayBuffer(3));return t.setUint8(0,3),t.setInt16(1,e.value,!1),new Uint8Array(t.buffer);case"integer":const r=new DataView(new ArrayBuffer(5));return r.setUint8(0,4),r.setInt32(1,e.value,!1),new Uint8Array(r.buffer);case"long":const n=new Uint8Array(9);return n[0]=5,n.set(e.value.bytes,1),n;case"binary":const s=new DataView(new ArrayBuffer(3+e.value.byteLength));s.setUint8(0,6),s.setUint16(1,e.value.byteLength,!1);const i=new Uint8Array(s.buffer);return i.set(e.value,3),i;case"string":const a=(0,c.ar)(e.value),d=new DataView(new ArrayBuffer(3+a.byteLength));d.setUint8(0,7),d.setUint16(1,a.byteLength,!1);const u=new Uint8Array(d.buffer);return u.set(a,3),u;case"timestamp":const l=new Uint8Array(9);return l[0]=8,l.set(N.fromNumber(e.value.valueOf()).bytes,1),l;case"uuid":if(!D.test(e.value))throw new Error(`Invalid UUID received: ${e.value}`);const p=new Uint8Array(17);return p[0]=9,p.set((0,o.a)(e.value.replace(/\-/g,"")),1),p}}}var k;!function(e){e[e.boolTrue=0]="boolTrue",e[e.boolFalse=1]="boolFalse",e[e.byte=2]="byte",e[e.short=3]="short",e[e.integer=4]="integer",e[e.long=5]="long",e[e.byteArray=6]="byteArray",e[e.string=7]="string",e[e.timestamp=8]="timestamp",e[e.uuid=9]="uuid"}(k||(k={}));const D=/^[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}$/;class N{constructor(e){if(this.bytes=e,8!==e.byteLength)throw new Error("Int64 buffers must be exactly 8 bytes")}static fromNumber(e){if(e>0x8000000000000000||e<-0x8000000000000000)throw new Error(`${e} is too large (or, if negative, too small) to represent as an Int64`);const t=new Uint8Array(8);for(let r=7,n=Math.abs(Math.round(e));r>-1&&n>0;r--,n/=256)t[r]=n;return e<0&&M(t),new N(t)}valueOf(){const e=this.bytes.slice(0),t=128&e[0];return t&&M(e),parseInt((0,o.n)(e),16)*(t?-1:1)}toString(){return String(this.valueOf())}}function M(e){for(let t=0;t<8;t++)e[t]^=255;for(let t=7;t>-1&&(e[t]++,0===e[t]);t--);}var _=r(5479);const L=e=>{e=_.Kd.clone(e);for(const t of Object.keys(e.headers))h.indexOf(t.toLowerCase())>-1&&delete e.headers[t];return e};class F{constructor({applyChecksum:e,credentials:t,region:r,service:n,sha256:s,uriEscapePath:o=!0}){this.headerFormatter=new O,this.service=n,this.sha256=s,this.uriEscapePath=o,this.applyChecksum="boolean"!=typeof e||e,this.regionProvider=(0,i.t)(r),this.credentialProvider=(0,i.t)(t)}async presign(e,t={}){const{signingDate:r=new Date,expiresIn:n=3600,unsignableHeaders:s,unhoistableHeaders:o,signableHeaders:i,hoistableHeaders:a,signingRegion:c,signingService:p}=t,f=await this.credentialProvider();this.validateResolvedCredentials(f);const h=c??await this.regionProvider(),{longDate:g,shortDate:m}=U(r);if(n>604800)return Promise.reject("Signature version 4 presigned URLs must have an expiration date less than one week in the future");const y=A(m,h,p??this.service),S=((e,t={})=>{const{headers:r,query:n={}}=_.Kd.clone(e);for(const e of Object.keys(r)){const s=e.toLowerCase();("x-amz-"===s.slice(0,6)&&!t.unhoistableHeaders?.has(s)||t.hoistableHeaders?.has(s))&&(n[e]=r[e],delete r[e])}return{...e,headers:r,query:n}})(L(e),{unhoistableHeaders:o,hoistableHeaders:a});f.sessionToken&&(S.query[l]=f.sessionToken),S.query["X-Amz-Algorithm"]=b,S.query["X-Amz-Credential"]=`${f.accessKeyId}/${y}`,S.query[d]=g,S.query["X-Amz-Expires"]=n.toString(10);const w=P(S,s,i);return S.query["X-Amz-SignedHeaders"]=j(w),S.query[u]=await this.getSignature(g,y,this.getSigningKey(f,h,m,p),this.createCanonicalRequest(S,w,await $(e,this.sha256))),S}async sign(e,t){return"string"==typeof e?this.signString(e,t):e.headers&&e.payload?this.signEvent(e,t):e.message?this.signMessage(e,t):this.signRequest(e,t)}async signEvent({headers:e,payload:t},{signingDate:r=new Date,priorSignature:n,signingRegion:s,signingService:i}){const a=s??await this.regionProvider(),{shortDate:c,longDate:d}=U(r),u=A(c,a,i??this.service),l=await $({headers:{},body:t},this.sha256),p=new this.sha256;p.update(e);const f=(0,o.n)(await p.digest()),h=[E,d,u,n,f,l].join("\n");return this.signString(h,{signingDate:r,signingRegion:a,signingService:i})}async signMessage(e,{signingDate:t=new Date,signingRegion:r,signingService:n}){return this.signEvent({headers:this.headerFormatter.format(e.message.headers),payload:e.message.body},{signingDate:t,signingRegion:r,signingService:n,priorSignature:e.priorSignature}).then((t=>({message:e.message,signature:t})))}async signString(e,{signingDate:t=new Date,signingRegion:r,signingService:n}={}){const s=await this.credentialProvider();this.validateResolvedCredentials(s);const i=r??await this.regionProvider(),{shortDate:a}=U(t),d=new this.sha256(await this.getSigningKey(s,i,a,n));return d.update((0,c.Fo)(e)),(0,o.n)(await d.digest())}async signRequest(e,{signingDate:t=new Date,signableHeaders:r,unsignableHeaders:n,signingRegion:s,signingService:o}={}){const i=await this.credentialProvider();this.validateResolvedCredentials(i);const a=s??await this.regionProvider(),c=L(e),{longDate:d,shortDate:u}=U(t),l=A(u,a,o??this.service);c.headers[f]=d,i.sessionToken&&(c.headers[y]=i.sessionToken);const h=await $(c,this.sha256);!((e,t)=>{e=e.toLowerCase();for(const r of Object.keys(t))if(e===r.toLowerCase())return!0;return!1})(m,c.headers)&&this.applyChecksum&&(c.headers[m]=h);const g=P(c,n,r),S=await this.getSignature(d,l,this.getSigningKey(i,a,u,o),this.createCanonicalRequest(c,g,h));return c.headers[p]=`${b} Credential=${i.accessKeyId}/${l}, SignedHeaders=${j(g)}, Signature=${S}`,c}createCanonicalRequest(e,t,r){const n=Object.keys(t).sort();return`${e.method}\n${this.getCanonicalPath(e)}\n${(({query:e={}})=>{const t=[],r={};for(const n of Object.keys(e)){if(n.toLowerCase()===g)continue;const s=(0,a.o)(n);t.push(s);const o=e[n];"string"==typeof o?r[s]=`${s}=${(0,a.o)(o)}`:Array.isArray(o)&&(r[s]=o.slice(0).reduce(((e,t)=>e.concat([`${s}=${(0,a.o)(t)}`])),[]).sort().join("&"))}return t.sort().map((e=>r[e])).filter((e=>e)).join("&")})(e)}\n${n.map((e=>`${e}:${t[e]}`)).join("\n")}\n\n${n.join(";")}\n${r}`}async createStringToSign(e,t,r){const n=new this.sha256;n.update((0,c.Fo)(r));const s=await n.digest();return`${b}\n${e}\n${t}\n${(0,o.n)(s)}`}getCanonicalPath({path:e}){if(this.uriEscapePath){const t=[];for(const r of e.split("/"))0!==r?.length&&"."!==r&&(".."===r?t.pop():t.push(r));const r=`${e?.startsWith("/")?"/":""}${t.join("/")}${t.length>0&&e?.endsWith("/")?"/":""}`;return(0,a.o)(r).replace(/%2F/g,"/")}return e}async getSignature(e,t,r,n){const s=await this.createStringToSign(e,t,n),i=new this.sha256(await r);return i.update((0,c.Fo)(s)),(0,o.n)(await i.digest())}getSigningKey(e,t,r,n){return(async(e,t,r,n,s)=>{const i=await x(e,t.secretAccessKey,t.accessKeyId),a=`${r}:${n}:${s}:${(0,o.n)(i)}:${t.sessionToken}`;if(a in C)return C[a];for(T.push(a);T.length>50;)delete C[T.shift()];let c=`AWS4${t.secretAccessKey}`;for(const t of[r,n,s,R])c=await x(e,c,t);return C[a]=c})(this.sha256,e,r,t,n||this.service)}validateResolvedCredentials(e){if("object"!=typeof e||"string"!=typeof e.accessKeyId||"string"!=typeof e.secretAccessKey)throw new Error("Resolved credential object is not valid")}}const U=e=>{const t=(r=e,(e=>"number"==typeof e?new Date(1e3*e):"string"==typeof e?Number(e)?new Date(1e3*Number(e)):new Date(e):e)(r).toISOString().replace(/\.\d{3}Z$/,"Z")).replace(/[\-:]/g,"");var r;return{longDate:t,shortDate:t.slice(0,8)}},j=e=>Object.keys(e).sort().join(";"),B=e=>{let t,r=!1;e.credentials&&(r=!0,t=(0,s.K4)(e.credentials,s.OC,s.e)),t||(t=e.credentialDefaultProvider?(0,s.te)(e.credentialDefaultProvider(Object.assign({},e,{parentClientConfig:e}))):async()=>{throw new Error("`credentials` is missing")});const{signingEscapePath:o=!0,systemClockOffset:i=e.systemClockOffset||0,sha256:a}=e;let c;return c=e.signer?(0,s.te)(e.signer):e.regionInfoProvider?()=>(0,s.te)(e.region)().then((async t=>[await e.regionInfoProvider(t,{useFipsEndpoint:await e.useFipsEndpoint(),useDualstackEndpoint:await e.useDualstackEndpoint()})||{},t])).then((([r,n])=>{const{signingRegion:s,signingService:i}=r;e.signingRegion=e.signingRegion||s||n,e.signingName=e.signingName||i||e.serviceId;const c={...e,credentials:t,region:e.signingRegion,service:e.signingName,sha256:a,uriEscapePath:o};return new(e.signerConstructor||F)(c)})):async r=>{const n=(r=Object.assign({},{name:"sigv4",signingName:e.signingName||e.defaultSigningName,signingRegion:await(0,s.te)(e.region)(),properties:{}},r)).signingRegion,i=r.signingName;e.signingRegion=e.signingRegion||n,e.signingName=e.signingName||i||e.serviceId;const c={...e,credentials:t,region:e.signingRegion,service:e.signingName,sha256:a,uriEscapePath:o};return new(e.signerConstructor||F)(c)},{...e,systemClockOffset:i,signingEscapePath:o,credentials:r?async()=>t().then((e=>(0,n.g)(e,"CREDENTIALS_CODE","e"))):t,signer:c}}},8218:(e,t,r)=>{r.d(t,{w:()=>s});var n=r(1540);const s=(e,t)=>(0,n.Px)(e,t).then((e=>t.utf8Encoder(e)))},1919:(e,t,r)=>{r.d(t,{CG:()=>o,Y2:()=>s,cJ:()=>i});var n=r(8218);const s=(e,t)=>(0,n.w)(e,t).then((e=>{if(e.length)try{return JSON.parse(e)}catch(t){throw"SyntaxError"===t?.name&&Object.defineProperty(t,"$responseBodyText",{value:e}),t}return{}})),o=async(e,t)=>{const r=await s(e,t);return r.message=r.message??r.Message,r},i=(e,t)=>{const r=e=>{let t=e;return"number"==typeof t&&(t=t.toString()),t.indexOf(",")>=0&&(t=t.split(",")[0]),t.indexOf(":")>=0&&(t=t.split(":")[0]),t.indexOf("#")>=0&&(t=t.split("#")[1]),t},n=(s=e.headers,Object.keys(s).find((e=>e.toLowerCase()==="x-amzn-errortype".toLowerCase())));var s;return void 0!==n?r(e.headers[n]):void 0!==t.code?r(t.code):void 0!==t.__type?r(t.__type):void 0}},904:(e,t,r)=>{r.d(t,{yG:()=>o,pi:()=>i,fromEnv:()=>a});var n=r(244),s=r(8112);const o="AWS_ACCESS_KEY_ID",i="AWS_SECRET_ACCESS_KEY",a=e=>async()=>{e?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");const t=process.env[o],r=process.env[i],a=process.env.AWS_SESSION_TOKEN,c=process.env.AWS_CREDENTIAL_EXPIRATION,d=process.env.AWS_CREDENTIAL_SCOPE,u=process.env.AWS_ACCOUNT_ID;if(t&&r){const e={accessKeyId:t,secretAccessKey:r,...a&&{sessionToken:a},...c&&{expiration:new Date(c)},...d&&{credentialScope:d},...u&&{accountId:u}};return(0,n.g)(e,"CREDENTIALS_ENV_VARS","g"),e}throw new s.C1("Unable to find environment variable credentials.",{logger:e?.logger})}},8257:(e,t,r)=>{r.d(t,{v6:()=>a});var n=r(904),s=r(8112),o=r(2792);let i=!1;const a=(e={})=>(0,s.Bj)((0,s.cy)((async()=>{if(e.profile??process.env[o.Ch])throw process.env[n.yG]&&process.env[n.pi]&&!i&&((e.logger?.warn&&"NoOpLogger"!==e.logger?.constructor?.name?e.logger.warn:console.warn)("@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:\n Multiple credential sources detected: \n Both AWS_PROFILE and the pair AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY static credentials are set.\n This SDK will proceed with the AWS_PROFILE value.\n \n However, a future version may change this behavior to prefer the ENV static credentials.\n Please ensure that your environment only sets either the AWS_PROFILE or the\n AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.\n"),i=!0),new s.C1("AWS_PROFILE is set, skipping fromEnv provider.",{logger:e.logger,tryNextLink:!0});return e.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv"),(0,n.fromEnv)(e)()}),(async()=>{e.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");const{ssoStartUrl:t,ssoAccountId:n,ssoRegion:o,ssoRoleName:i,ssoSession:a}=e;if(!(t||n||o||i||a))throw new s.C1("Skipping SSO provider in default chain (inputs do not include SSO fields).",{logger:e.logger});const{fromSSO:c}=await r.e(791).then(r.bind(r,9791));return c(e)()}),(async()=>{e.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");const{fromIni:t}=await r.e(789).then(r.bind(r,2789));return t(e)()}),(async()=>{e.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");const{fromProcess:t}=await r.e(109).then(r.bind(r,5109));return t(e)()}),(async()=>{e.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");const{fromTokenFile:t}=await r.e(819).then(r.bind(r,7819));return t(e)()}),(async()=>(e.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider"),(await(async e=>{const{ENV_CMDS_FULL_URI:t,ENV_CMDS_RELATIVE_URI:n,fromContainerMetadata:o,fromInstanceMetadata:i}=await r.e(897).then(r.bind(r,7897));if(process.env[n]||process.env[t]){e.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");const{fromHttp:t}=await r.e(610).then(r.bind(r,3610));return(0,s.cy)(t(e),o(e))}return process.env.AWS_EC2_METADATA_DISABLED?async()=>{throw new s.C1("EC2 Instance Metadata Service access disabled",{logger:e.logger})}:(e.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata"),i(e))})(e))())),(async()=>{throw new s.C1("Could not load credentials from any providers",{tryNextLink:!1,logger:e.logger})})),d,c),c=e=>void 0!==e?.expiration,d=e=>void 0!==e?.expiration&&e.expiration.getTime()-Date.now()<3e5},1095:(e,t,r)=>{r.d(t,{OV:()=>s,TC:()=>i});var n=r(5479);function s(e){return e}const o={name:"hostHeaderMiddleware",step:"build",priority:"low",tags:["HOST"],override:!0},i=e=>({applyToStack:t=>{t.add((e=>t=>async r=>{if(!n.Kd.isInstance(r.request))return t(r);const{request:s}=r,{handlerProtocol:o=""}=e.requestHandler.metadata||{};if(o.indexOf("h2")>=0&&!s.headers[":authority"])delete s.headers.host,s.headers[":authority"]=s.hostname+(s.port?":"+s.port:"");else if(!s.headers.host){let e=s.hostname;null!=s.port&&(e+=`:${s.port}`),s.headers.host=e}return t(r)})(e),o)}})},9359:(e,t,r)=>{r.d(t,{Y7:()=>s});const n={name:"loggerMiddleware",tags:["LOGGER"],step:"initialize",override:!0},s=e=>({applyToStack:e=>{e.add(((e,t)=>async r=>{try{const n=await e(r),{clientName:s,commandName:o,logger:i,dynamoDbDocumentClientOptions:a={}}=t,{overrideInputFilterSensitiveLog:c,overrideOutputFilterSensitiveLog:d}=a,u=c??t.inputFilterSensitiveLog,l=d??t.outputFilterSensitiveLog,{$metadata:p,...f}=n.output;return i?.info?.({clientName:s,commandName:o,input:u(r.input),output:l(f),metadata:p}),n}catch(e){const{clientName:n,commandName:s,logger:o,dynamoDbDocumentClientOptions:i={}}=t,{overrideInputFilterSensitiveLog:a}=i,c=a??t.inputFilterSensitiveLog;throw o?.error?.({clientName:n,commandName:s,input:c(r.input),error:e,metadata:e.$metadata}),e}}),n)}})},8377:(e,t,r)=>{r.d(t,{n4:()=>i});var n=r(5479);const s="X-Amzn-Trace-Id",o={step:"build",tags:["RECURSION_DET