@aws-sdk/credential-provider-ini 3.32.0 → 3.36.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +38 -0
- package/dist-cjs/index.js +105 -0
- package/dist-es/index.js +141 -0
- package/{dist/types → dist-types}/index.d.ts +0 -0
- package/{dist/types → dist-types}/ts3.4/index.d.ts +0 -0
- package/package.json +20 -16
- package/dist/cjs/index.js +0 -131
- package/dist/es/index.js +0 -165
- package/src/index.ts +0 -266
- package/tsconfig.cjs.json +0 -10
- package/tsconfig.es.json +0 -11
package/CHANGELOG.md
CHANGED
|
@@ -3,6 +3,44 @@
|
|
|
3
3
|
All notable changes to this project will be documented in this file.
|
|
4
4
|
See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
|
|
5
5
|
|
|
6
|
+
# [3.36.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.35.0...v3.36.0) (2021-10-08)
|
|
7
|
+
|
|
8
|
+
|
|
9
|
+
### Features
|
|
10
|
+
|
|
11
|
+
* publish files in dist-* only ([#2873](https://github.com/aws/aws-sdk-js-v3/issues/2873)) ([53b4243](https://github.com/aws/aws-sdk-js-v3/commit/53b4243b066f25ff2412d5f0dea1036054b2df32))
|
|
12
|
+
|
|
13
|
+
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
# [3.35.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.34.0...v3.35.0) (2021-10-04)
|
|
18
|
+
|
|
19
|
+
**Note:** Version bump only for package @aws-sdk/credential-provider-ini
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
# [3.34.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.33.0...v3.34.0) (2021-09-24)
|
|
26
|
+
|
|
27
|
+
|
|
28
|
+
### Features
|
|
29
|
+
|
|
30
|
+
* **non-clients:** remove comments from transpiled JS files ([#2813](https://github.com/aws/aws-sdk-js-v3/issues/2813)) ([e6fc7f3](https://github.com/aws/aws-sdk-js-v3/commit/e6fc7f3e0fa74785590ac19e7ed143c916bb9b6e))
|
|
31
|
+
|
|
32
|
+
|
|
33
|
+
|
|
34
|
+
|
|
35
|
+
|
|
36
|
+
# [3.33.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.32.0...v3.33.0) (2021-09-21)
|
|
37
|
+
|
|
38
|
+
**Note:** Version bump only for package @aws-sdk/credential-provider-ini
|
|
39
|
+
|
|
40
|
+
|
|
41
|
+
|
|
42
|
+
|
|
43
|
+
|
|
6
44
|
# [3.32.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.31.0...v3.32.0) (2021-09-17)
|
|
7
45
|
|
|
8
46
|
**Note:** Version bump only for package @aws-sdk/credential-provider-ini
|
|
@@ -0,0 +1,105 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.fromIni = void 0;
|
|
4
|
+
const credential_provider_env_1 = require("@aws-sdk/credential-provider-env");
|
|
5
|
+
const credential_provider_imds_1 = require("@aws-sdk/credential-provider-imds");
|
|
6
|
+
const credential_provider_sso_1 = require("@aws-sdk/credential-provider-sso");
|
|
7
|
+
const credential_provider_web_identity_1 = require("@aws-sdk/credential-provider-web-identity");
|
|
8
|
+
const property_provider_1 = require("@aws-sdk/property-provider");
|
|
9
|
+
const util_credentials_1 = require("@aws-sdk/util-credentials");
|
|
10
|
+
const isStaticCredsProfile = (arg) => Boolean(arg) &&
|
|
11
|
+
typeof arg === "object" &&
|
|
12
|
+
typeof arg.aws_access_key_id === "string" &&
|
|
13
|
+
typeof arg.aws_secret_access_key === "string" &&
|
|
14
|
+
["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
|
|
15
|
+
const isWebIdentityProfile = (arg) => Boolean(arg) &&
|
|
16
|
+
typeof arg === "object" &&
|
|
17
|
+
typeof arg.web_identity_token_file === "string" &&
|
|
18
|
+
typeof arg.role_arn === "string" &&
|
|
19
|
+
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
20
|
+
const isAssumeRoleProfile = (arg) => Boolean(arg) &&
|
|
21
|
+
typeof arg === "object" &&
|
|
22
|
+
typeof arg.role_arn === "string" &&
|
|
23
|
+
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
|
|
24
|
+
["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
|
|
25
|
+
["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
|
|
26
|
+
const isAssumeRoleWithSourceProfile = (arg) => isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
27
|
+
const isAssumeRoleWithProviderProfile = (arg) => isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
28
|
+
const fromIni = (init = {}) => async () => {
|
|
29
|
+
const profiles = await util_credentials_1.parseKnownFiles(init);
|
|
30
|
+
return resolveProfileData(util_credentials_1.getMasterProfileName(init), profiles, init);
|
|
31
|
+
};
|
|
32
|
+
exports.fromIni = fromIni;
|
|
33
|
+
const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
34
|
+
const data = profiles[profileName];
|
|
35
|
+
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
36
|
+
return resolveStaticCredentials(data);
|
|
37
|
+
}
|
|
38
|
+
if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {
|
|
39
|
+
const { external_id: ExternalId, mfa_serial, role_arn: RoleArn, role_session_name: RoleSessionName = "aws-sdk-js-" + Date.now(), source_profile, credential_source, } = data;
|
|
40
|
+
if (!options.roleAssumer) {
|
|
41
|
+
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`, false);
|
|
42
|
+
}
|
|
43
|
+
if (source_profile && source_profile in visitedProfiles) {
|
|
44
|
+
throw new property_provider_1.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +
|
|
45
|
+
` ${util_credentials_1.getMasterProfileName(options)}. Profiles visited: ` +
|
|
46
|
+
Object.keys(visitedProfiles).join(", "), false);
|
|
47
|
+
}
|
|
48
|
+
const sourceCreds = source_profile
|
|
49
|
+
? resolveProfileData(source_profile, profiles, options, {
|
|
50
|
+
...visitedProfiles,
|
|
51
|
+
[source_profile]: true,
|
|
52
|
+
})
|
|
53
|
+
: resolveCredentialSource(credential_source, profileName)();
|
|
54
|
+
const params = { RoleArn, RoleSessionName, ExternalId };
|
|
55
|
+
if (mfa_serial) {
|
|
56
|
+
if (!options.mfaCodeProvider) {
|
|
57
|
+
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`, false);
|
|
58
|
+
}
|
|
59
|
+
params.SerialNumber = mfa_serial;
|
|
60
|
+
params.TokenCode = await options.mfaCodeProvider(mfa_serial);
|
|
61
|
+
}
|
|
62
|
+
return options.roleAssumer(await sourceCreds, params);
|
|
63
|
+
}
|
|
64
|
+
if (isStaticCredsProfile(data)) {
|
|
65
|
+
return resolveStaticCredentials(data);
|
|
66
|
+
}
|
|
67
|
+
if (isWebIdentityProfile(data)) {
|
|
68
|
+
return resolveWebIdentityCredentials(data, options);
|
|
69
|
+
}
|
|
70
|
+
if (credential_provider_sso_1.isSsoProfile(data)) {
|
|
71
|
+
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = credential_provider_sso_1.validateSsoProfile(data);
|
|
72
|
+
return credential_provider_sso_1.fromSSO({
|
|
73
|
+
ssoStartUrl: sso_start_url,
|
|
74
|
+
ssoAccountId: sso_account_id,
|
|
75
|
+
ssoRegion: sso_region,
|
|
76
|
+
ssoRoleName: sso_role_name,
|
|
77
|
+
})();
|
|
78
|
+
}
|
|
79
|
+
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`);
|
|
80
|
+
};
|
|
81
|
+
const resolveCredentialSource = (credentialSource, profileName) => {
|
|
82
|
+
const sourceProvidersMap = {
|
|
83
|
+
EcsContainer: credential_provider_imds_1.fromContainerMetadata,
|
|
84
|
+
Ec2InstanceMetadata: credential_provider_imds_1.fromInstanceMetadata,
|
|
85
|
+
Environment: credential_provider_env_1.fromEnv,
|
|
86
|
+
};
|
|
87
|
+
if (credentialSource in sourceProvidersMap) {
|
|
88
|
+
return sourceProvidersMap[credentialSource]();
|
|
89
|
+
}
|
|
90
|
+
else {
|
|
91
|
+
throw new property_provider_1.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
|
|
92
|
+
`expected EcsContainer or Ec2InstanceMetadata or Environment.`);
|
|
93
|
+
}
|
|
94
|
+
};
|
|
95
|
+
const resolveStaticCredentials = (profile) => Promise.resolve({
|
|
96
|
+
accessKeyId: profile.aws_access_key_id,
|
|
97
|
+
secretAccessKey: profile.aws_secret_access_key,
|
|
98
|
+
sessionToken: profile.aws_session_token,
|
|
99
|
+
});
|
|
100
|
+
const resolveWebIdentityCredentials = async (profile, options) => credential_provider_web_identity_1.fromTokenFile({
|
|
101
|
+
webIdentityTokenFile: profile.web_identity_token_file,
|
|
102
|
+
roleArn: profile.role_arn,
|
|
103
|
+
roleSessionName: profile.role_session_name,
|
|
104
|
+
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
|
|
105
|
+
})();
|
package/dist-es/index.js
ADDED
|
@@ -0,0 +1,141 @@
|
|
|
1
|
+
import { __assign, __awaiter, __generator } from "tslib";
|
|
2
|
+
import { fromEnv } from "@aws-sdk/credential-provider-env";
|
|
3
|
+
import { fromContainerMetadata, fromInstanceMetadata } from "@aws-sdk/credential-provider-imds";
|
|
4
|
+
import { fromSSO, isSsoProfile, validateSsoProfile } from "@aws-sdk/credential-provider-sso";
|
|
5
|
+
import { fromTokenFile } from "@aws-sdk/credential-provider-web-identity";
|
|
6
|
+
import { CredentialsProviderError } from "@aws-sdk/property-provider";
|
|
7
|
+
import { getMasterProfileName, parseKnownFiles } from "@aws-sdk/util-credentials";
|
|
8
|
+
var isStaticCredsProfile = function (arg) {
|
|
9
|
+
return Boolean(arg) &&
|
|
10
|
+
typeof arg === "object" &&
|
|
11
|
+
typeof arg.aws_access_key_id === "string" &&
|
|
12
|
+
typeof arg.aws_secret_access_key === "string" &&
|
|
13
|
+
["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
|
|
14
|
+
};
|
|
15
|
+
var isWebIdentityProfile = function (arg) {
|
|
16
|
+
return Boolean(arg) &&
|
|
17
|
+
typeof arg === "object" &&
|
|
18
|
+
typeof arg.web_identity_token_file === "string" &&
|
|
19
|
+
typeof arg.role_arn === "string" &&
|
|
20
|
+
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
21
|
+
};
|
|
22
|
+
var isAssumeRoleProfile = function (arg) {
|
|
23
|
+
return Boolean(arg) &&
|
|
24
|
+
typeof arg === "object" &&
|
|
25
|
+
typeof arg.role_arn === "string" &&
|
|
26
|
+
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
|
|
27
|
+
["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
|
|
28
|
+
["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
|
|
29
|
+
};
|
|
30
|
+
var isAssumeRoleWithSourceProfile = function (arg) {
|
|
31
|
+
return isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
32
|
+
};
|
|
33
|
+
var isAssumeRoleWithProviderProfile = function (arg) {
|
|
34
|
+
return isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
35
|
+
};
|
|
36
|
+
export var fromIni = function (init) {
|
|
37
|
+
if (init === void 0) { init = {}; }
|
|
38
|
+
return function () { return __awaiter(void 0, void 0, void 0, function () {
|
|
39
|
+
var profiles;
|
|
40
|
+
return __generator(this, function (_a) {
|
|
41
|
+
switch (_a.label) {
|
|
42
|
+
case 0: return [4, parseKnownFiles(init)];
|
|
43
|
+
case 1:
|
|
44
|
+
profiles = _a.sent();
|
|
45
|
+
return [2, resolveProfileData(getMasterProfileName(init), profiles, init)];
|
|
46
|
+
}
|
|
47
|
+
});
|
|
48
|
+
}); };
|
|
49
|
+
};
|
|
50
|
+
var resolveProfileData = function (profileName, profiles, options, visitedProfiles) {
|
|
51
|
+
if (visitedProfiles === void 0) { visitedProfiles = {}; }
|
|
52
|
+
return __awaiter(void 0, void 0, void 0, function () {
|
|
53
|
+
var data, ExternalId, mfa_serial, RoleArn, _a, RoleSessionName, source_profile, credential_source, sourceCreds, params, _b, _c, _d, _e, sso_start_url, sso_account_id, sso_region, sso_role_name;
|
|
54
|
+
var _f;
|
|
55
|
+
return __generator(this, function (_g) {
|
|
56
|
+
switch (_g.label) {
|
|
57
|
+
case 0:
|
|
58
|
+
data = profiles[profileName];
|
|
59
|
+
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
60
|
+
return [2, resolveStaticCredentials(data)];
|
|
61
|
+
}
|
|
62
|
+
if (!(isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data))) return [3, 4];
|
|
63
|
+
ExternalId = data.external_id, mfa_serial = data.mfa_serial, RoleArn = data.role_arn, _a = data.role_session_name, RoleSessionName = _a === void 0 ? "aws-sdk-js-" + Date.now() : _a, source_profile = data.source_profile, credential_source = data.credential_source;
|
|
64
|
+
if (!options.roleAssumer) {
|
|
65
|
+
throw new CredentialsProviderError("Profile " + profileName + " requires a role to be assumed, but no" + " role assumption callback was provided.", false);
|
|
66
|
+
}
|
|
67
|
+
if (source_profile && source_profile in visitedProfiles) {
|
|
68
|
+
throw new CredentialsProviderError("Detected a cycle attempting to resolve credentials for profile" +
|
|
69
|
+
(" " + getMasterProfileName(options) + ". Profiles visited: ") +
|
|
70
|
+
Object.keys(visitedProfiles).join(", "), false);
|
|
71
|
+
}
|
|
72
|
+
sourceCreds = source_profile
|
|
73
|
+
? resolveProfileData(source_profile, profiles, options, __assign(__assign({}, visitedProfiles), (_f = {}, _f[source_profile] = true, _f)))
|
|
74
|
+
: resolveCredentialSource(credential_source, profileName)();
|
|
75
|
+
params = { RoleArn: RoleArn, RoleSessionName: RoleSessionName, ExternalId: ExternalId };
|
|
76
|
+
if (!mfa_serial) return [3, 2];
|
|
77
|
+
if (!options.mfaCodeProvider) {
|
|
78
|
+
throw new CredentialsProviderError("Profile " + profileName + " requires multi-factor authentication," + " but no MFA code callback was provided.", false);
|
|
79
|
+
}
|
|
80
|
+
params.SerialNumber = mfa_serial;
|
|
81
|
+
_b = params;
|
|
82
|
+
return [4, options.mfaCodeProvider(mfa_serial)];
|
|
83
|
+
case 1:
|
|
84
|
+
_b.TokenCode = _g.sent();
|
|
85
|
+
_g.label = 2;
|
|
86
|
+
case 2:
|
|
87
|
+
_d = (_c = options).roleAssumer;
|
|
88
|
+
return [4, sourceCreds];
|
|
89
|
+
case 3: return [2, _d.apply(_c, [_g.sent(), params])];
|
|
90
|
+
case 4:
|
|
91
|
+
if (isStaticCredsProfile(data)) {
|
|
92
|
+
return [2, resolveStaticCredentials(data)];
|
|
93
|
+
}
|
|
94
|
+
if (isWebIdentityProfile(data)) {
|
|
95
|
+
return [2, resolveWebIdentityCredentials(data, options)];
|
|
96
|
+
}
|
|
97
|
+
if (isSsoProfile(data)) {
|
|
98
|
+
_e = validateSsoProfile(data), sso_start_url = _e.sso_start_url, sso_account_id = _e.sso_account_id, sso_region = _e.sso_region, sso_role_name = _e.sso_role_name;
|
|
99
|
+
return [2, fromSSO({
|
|
100
|
+
ssoStartUrl: sso_start_url,
|
|
101
|
+
ssoAccountId: sso_account_id,
|
|
102
|
+
ssoRegion: sso_region,
|
|
103
|
+
ssoRoleName: sso_role_name,
|
|
104
|
+
})()];
|
|
105
|
+
}
|
|
106
|
+
throw new CredentialsProviderError("Profile " + profileName + " could not be found or parsed in shared" + " credentials file.");
|
|
107
|
+
}
|
|
108
|
+
});
|
|
109
|
+
});
|
|
110
|
+
};
|
|
111
|
+
var resolveCredentialSource = function (credentialSource, profileName) {
|
|
112
|
+
var sourceProvidersMap = {
|
|
113
|
+
EcsContainer: fromContainerMetadata,
|
|
114
|
+
Ec2InstanceMetadata: fromInstanceMetadata,
|
|
115
|
+
Environment: fromEnv,
|
|
116
|
+
};
|
|
117
|
+
if (credentialSource in sourceProvidersMap) {
|
|
118
|
+
return sourceProvidersMap[credentialSource]();
|
|
119
|
+
}
|
|
120
|
+
else {
|
|
121
|
+
throw new CredentialsProviderError("Unsupported credential source in profile " + profileName + ". Got " + credentialSource + ", " +
|
|
122
|
+
"expected EcsContainer or Ec2InstanceMetadata or Environment.");
|
|
123
|
+
}
|
|
124
|
+
};
|
|
125
|
+
var resolveStaticCredentials = function (profile) {
|
|
126
|
+
return Promise.resolve({
|
|
127
|
+
accessKeyId: profile.aws_access_key_id,
|
|
128
|
+
secretAccessKey: profile.aws_secret_access_key,
|
|
129
|
+
sessionToken: profile.aws_session_token,
|
|
130
|
+
});
|
|
131
|
+
};
|
|
132
|
+
var resolveWebIdentityCredentials = function (profile, options) { return __awaiter(void 0, void 0, void 0, function () {
|
|
133
|
+
return __generator(this, function (_a) {
|
|
134
|
+
return [2, fromTokenFile({
|
|
135
|
+
webIdentityTokenFile: profile.web_identity_token_file,
|
|
136
|
+
roleArn: profile.role_arn,
|
|
137
|
+
roleSessionName: profile.role_session_name,
|
|
138
|
+
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
|
|
139
|
+
})()];
|
|
140
|
+
});
|
|
141
|
+
}); };
|
|
File without changes
|
|
File without changes
|
package/package.json
CHANGED
|
@@ -1,14 +1,15 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-provider-ini",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.36.0",
|
|
4
4
|
"description": "AWS credential provider that sources credentials from ~/.aws/credentials and ~/.aws/config",
|
|
5
|
-
"main": "./dist
|
|
6
|
-
"module": "./dist
|
|
5
|
+
"main": "./dist-cjs/index.js",
|
|
6
|
+
"module": "./dist-es/index.js",
|
|
7
7
|
"scripts": {
|
|
8
|
+
"build": "yarn build:cjs && yarn build:es && yarn build:types",
|
|
8
9
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
9
10
|
"build:es": "tsc -p tsconfig.es.json",
|
|
10
|
-
"build": "
|
|
11
|
-
"downlevel-dts": "downlevel-dts dist
|
|
11
|
+
"build:types": "tsc -p tsconfig.types.json",
|
|
12
|
+
"downlevel-dts": "downlevel-dts dist-types dist-types/ts3.4",
|
|
12
13
|
"test": "jest"
|
|
13
14
|
},
|
|
14
15
|
"keywords": [
|
|
@@ -21,14 +22,14 @@
|
|
|
21
22
|
},
|
|
22
23
|
"license": "Apache-2.0",
|
|
23
24
|
"dependencies": {
|
|
24
|
-
"@aws-sdk/credential-provider-env": "3.
|
|
25
|
-
"@aws-sdk/credential-provider-imds": "3.
|
|
26
|
-
"@aws-sdk/credential-provider-sso": "3.
|
|
27
|
-
"@aws-sdk/credential-provider-web-identity": "3.
|
|
28
|
-
"@aws-sdk/property-provider": "3.
|
|
29
|
-
"@aws-sdk/shared-ini-file-loader": "3.
|
|
30
|
-
"@aws-sdk/types": "3.
|
|
31
|
-
"@aws-sdk/util-credentials": "3.
|
|
25
|
+
"@aws-sdk/credential-provider-env": "3.36.0",
|
|
26
|
+
"@aws-sdk/credential-provider-imds": "3.36.0",
|
|
27
|
+
"@aws-sdk/credential-provider-sso": "3.36.0",
|
|
28
|
+
"@aws-sdk/credential-provider-web-identity": "3.36.0",
|
|
29
|
+
"@aws-sdk/property-provider": "3.36.0",
|
|
30
|
+
"@aws-sdk/shared-ini-file-loader": "3.36.0",
|
|
31
|
+
"@aws-sdk/types": "3.36.0",
|
|
32
|
+
"@aws-sdk/util-credentials": "3.36.0",
|
|
32
33
|
"tslib": "^2.3.0"
|
|
33
34
|
},
|
|
34
35
|
"devDependencies": {
|
|
@@ -37,17 +38,20 @@
|
|
|
37
38
|
"jest": "^26.1.0",
|
|
38
39
|
"typescript": "~4.3.5"
|
|
39
40
|
},
|
|
40
|
-
"types": "./dist
|
|
41
|
+
"types": "./dist-types/index.d.ts",
|
|
41
42
|
"engines": {
|
|
42
43
|
"node": ">= 10.0.0"
|
|
43
44
|
},
|
|
44
45
|
"typesVersions": {
|
|
45
46
|
"<4.0": {
|
|
46
|
-
"dist
|
|
47
|
-
"dist
|
|
47
|
+
"dist-types/*": [
|
|
48
|
+
"dist-types/ts3.4/*"
|
|
48
49
|
]
|
|
49
50
|
}
|
|
50
51
|
},
|
|
52
|
+
"files": [
|
|
53
|
+
"dist-*"
|
|
54
|
+
],
|
|
51
55
|
"homepage": "https://github.com/aws/aws-sdk-js-v3/tree/main/packages/credential-provider-ini",
|
|
52
56
|
"repository": {
|
|
53
57
|
"type": "git",
|
package/dist/cjs/index.js
DELETED
|
@@ -1,131 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.fromIni = void 0;
|
|
4
|
-
const credential_provider_env_1 = require("@aws-sdk/credential-provider-env");
|
|
5
|
-
const credential_provider_imds_1 = require("@aws-sdk/credential-provider-imds");
|
|
6
|
-
const credential_provider_sso_1 = require("@aws-sdk/credential-provider-sso");
|
|
7
|
-
const credential_provider_web_identity_1 = require("@aws-sdk/credential-provider-web-identity");
|
|
8
|
-
const property_provider_1 = require("@aws-sdk/property-provider");
|
|
9
|
-
const util_credentials_1 = require("@aws-sdk/util-credentials");
|
|
10
|
-
const isStaticCredsProfile = (arg) => Boolean(arg) &&
|
|
11
|
-
typeof arg === "object" &&
|
|
12
|
-
typeof arg.aws_access_key_id === "string" &&
|
|
13
|
-
typeof arg.aws_secret_access_key === "string" &&
|
|
14
|
-
["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
|
|
15
|
-
const isWebIdentityProfile = (arg) => Boolean(arg) &&
|
|
16
|
-
typeof arg === "object" &&
|
|
17
|
-
typeof arg.web_identity_token_file === "string" &&
|
|
18
|
-
typeof arg.role_arn === "string" &&
|
|
19
|
-
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
20
|
-
const isAssumeRoleProfile = (arg) => Boolean(arg) &&
|
|
21
|
-
typeof arg === "object" &&
|
|
22
|
-
typeof arg.role_arn === "string" &&
|
|
23
|
-
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
|
|
24
|
-
["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
|
|
25
|
-
["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
|
|
26
|
-
const isAssumeRoleWithSourceProfile = (arg) => isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
27
|
-
const isAssumeRoleWithProviderProfile = (arg) => isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
28
|
-
/**
|
|
29
|
-
* Creates a credential provider that will read from ini files and supports
|
|
30
|
-
* role assumption and multi-factor authentication.
|
|
31
|
-
*/
|
|
32
|
-
const fromIni = (init = {}) => async () => {
|
|
33
|
-
const profiles = await util_credentials_1.parseKnownFiles(init);
|
|
34
|
-
return resolveProfileData(util_credentials_1.getMasterProfileName(init), profiles, init);
|
|
35
|
-
};
|
|
36
|
-
exports.fromIni = fromIni;
|
|
37
|
-
const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
38
|
-
const data = profiles[profileName];
|
|
39
|
-
// If this is not the first profile visited, static credentials should be
|
|
40
|
-
// preferred over role assumption metadata. This special treatment of
|
|
41
|
-
// second and subsequent hops is to ensure compatibility with the AWS CLI.
|
|
42
|
-
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
43
|
-
return resolveStaticCredentials(data);
|
|
44
|
-
}
|
|
45
|
-
// If this is the first profile visited, role assumption keys should be
|
|
46
|
-
// given precedence over static credentials.
|
|
47
|
-
if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {
|
|
48
|
-
const { external_id: ExternalId, mfa_serial, role_arn: RoleArn, role_session_name: RoleSessionName = "aws-sdk-js-" + Date.now(), source_profile, credential_source, } = data;
|
|
49
|
-
if (!options.roleAssumer) {
|
|
50
|
-
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`, false);
|
|
51
|
-
}
|
|
52
|
-
if (source_profile && source_profile in visitedProfiles) {
|
|
53
|
-
throw new property_provider_1.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +
|
|
54
|
-
` ${util_credentials_1.getMasterProfileName(options)}. Profiles visited: ` +
|
|
55
|
-
Object.keys(visitedProfiles).join(", "), false);
|
|
56
|
-
}
|
|
57
|
-
const sourceCreds = source_profile
|
|
58
|
-
? resolveProfileData(source_profile, profiles, options, {
|
|
59
|
-
...visitedProfiles,
|
|
60
|
-
[source_profile]: true,
|
|
61
|
-
})
|
|
62
|
-
: resolveCredentialSource(credential_source, profileName)();
|
|
63
|
-
const params = { RoleArn, RoleSessionName, ExternalId };
|
|
64
|
-
if (mfa_serial) {
|
|
65
|
-
if (!options.mfaCodeProvider) {
|
|
66
|
-
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`, false);
|
|
67
|
-
}
|
|
68
|
-
params.SerialNumber = mfa_serial;
|
|
69
|
-
params.TokenCode = await options.mfaCodeProvider(mfa_serial);
|
|
70
|
-
}
|
|
71
|
-
return options.roleAssumer(await sourceCreds, params);
|
|
72
|
-
}
|
|
73
|
-
// If no role assumption metadata is present, attempt to load static
|
|
74
|
-
// credentials from the selected profile.
|
|
75
|
-
if (isStaticCredsProfile(data)) {
|
|
76
|
-
return resolveStaticCredentials(data);
|
|
77
|
-
}
|
|
78
|
-
// If no static credentials are present, attempt to assume role with
|
|
79
|
-
// web identity if web_identity_token_file and role_arn is available
|
|
80
|
-
if (isWebIdentityProfile(data)) {
|
|
81
|
-
return resolveWebIdentityCredentials(data, options);
|
|
82
|
-
}
|
|
83
|
-
if (credential_provider_sso_1.isSsoProfile(data)) {
|
|
84
|
-
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = credential_provider_sso_1.validateSsoProfile(data);
|
|
85
|
-
return credential_provider_sso_1.fromSSO({
|
|
86
|
-
ssoStartUrl: sso_start_url,
|
|
87
|
-
ssoAccountId: sso_account_id,
|
|
88
|
-
ssoRegion: sso_region,
|
|
89
|
-
ssoRoleName: sso_role_name,
|
|
90
|
-
})();
|
|
91
|
-
}
|
|
92
|
-
// If the profile cannot be parsed or contains neither static credentials
|
|
93
|
-
// nor role assumption metadata, throw an error. This should be considered a
|
|
94
|
-
// terminal resolution error if a profile has been specified by the user
|
|
95
|
-
// (whether via a parameter, an environment variable, or another profile's
|
|
96
|
-
// `source_profile` key).
|
|
97
|
-
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`);
|
|
98
|
-
};
|
|
99
|
-
/**
|
|
100
|
-
* Resolve the `credential_source` entry from the profile, and return the
|
|
101
|
-
* credential providers respectively. No memoization is needed for the
|
|
102
|
-
* credential source providers because memoization should be added outside the
|
|
103
|
-
* fromIni() provider. The source credential needs to be refreshed every time
|
|
104
|
-
* fromIni() is called.
|
|
105
|
-
*/
|
|
106
|
-
const resolveCredentialSource = (credentialSource, profileName) => {
|
|
107
|
-
const sourceProvidersMap = {
|
|
108
|
-
EcsContainer: credential_provider_imds_1.fromContainerMetadata,
|
|
109
|
-
Ec2InstanceMetadata: credential_provider_imds_1.fromInstanceMetadata,
|
|
110
|
-
Environment: credential_provider_env_1.fromEnv,
|
|
111
|
-
};
|
|
112
|
-
if (credentialSource in sourceProvidersMap) {
|
|
113
|
-
return sourceProvidersMap[credentialSource]();
|
|
114
|
-
}
|
|
115
|
-
else {
|
|
116
|
-
throw new property_provider_1.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
|
|
117
|
-
`expected EcsContainer or Ec2InstanceMetadata or Environment.`);
|
|
118
|
-
}
|
|
119
|
-
};
|
|
120
|
-
const resolveStaticCredentials = (profile) => Promise.resolve({
|
|
121
|
-
accessKeyId: profile.aws_access_key_id,
|
|
122
|
-
secretAccessKey: profile.aws_secret_access_key,
|
|
123
|
-
sessionToken: profile.aws_session_token,
|
|
124
|
-
});
|
|
125
|
-
const resolveWebIdentityCredentials = async (profile, options) => credential_provider_web_identity_1.fromTokenFile({
|
|
126
|
-
webIdentityTokenFile: profile.web_identity_token_file,
|
|
127
|
-
roleArn: profile.role_arn,
|
|
128
|
-
roleSessionName: profile.role_session_name,
|
|
129
|
-
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
|
|
130
|
-
})();
|
|
131
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;AAAA,8EAA2D;AAC3D,gFAAgG;AAChG,8EAA6F;AAC7F,gGAA2G;AAC3G,kEAAsE;AAGtE,gEAAqG;AAuErG,MAAM,oBAAoB,GAAG,CAAC,GAAQ,EAA6B,EAAE,CACnE,OAAO,CAAC,GAAG,CAAC;IACZ,OAAO,GAAG,KAAK,QAAQ;IACvB,OAAO,GAAG,CAAC,iBAAiB,KAAK,QAAQ;IACzC,OAAO,GAAG,CAAC,qBAAqB,KAAK,QAAQ;IAC7C,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC,CAAC;AAQrE,MAAM,oBAAoB,GAAG,CAAC,GAAQ,EAA6B,EAAE,CACnE,OAAO,CAAC,GAAG,CAAC;IACZ,OAAO,GAAG,KAAK,QAAQ;IACvB,OAAO,GAAG,CAAC,uBAAuB,KAAK,QAAQ;IAC/C,OAAO,GAAG,CAAC,QAAQ,KAAK,QAAQ;IAChC,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC,CAAC;AAYrE,MAAM,mBAAmB,GAAG,CAAC,GAAQ,EAAE,EAAE,CACvC,OAAO,CAAC,GAAG,CAAC;IACZ,OAAO,GAAG,KAAK,QAAQ;IACvB,OAAO,GAAG,CAAC,QAAQ,KAAK,QAAQ;IAChC,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;IAClE,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;IAC5D,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC;AAE9D,MAAM,6BAA6B,GAAG,CAAC,GAAQ,EAAsC,EAAE,CACrF,mBAAmB,CAAC,GAAG,CAAC,IAAI,OAAO,GAAG,CAAC,cAAc,KAAK,QAAQ,IAAI,OAAO,GAAG,CAAC,iBAAiB,KAAK,WAAW,CAAC;AAErH,MAAM,+BAA+B,GAAG,CAAC,GAAQ,EAAwC,EAAE,CACzF,mBAAmB,CAAC,GAAG,CAAC,IAAI,OAAO,GAAG,CAAC,iBAAiB,KAAK,QAAQ,IAAI,OAAO,GAAG,CAAC,cAAc,KAAK,WAAW,CAAC;AAErH;;;GAGG;AACI,MAAM,OAAO,GAClB,CAAC,OAAoB,EAAE,EAAsB,EAAE,CAC/C,KAAK,IAAI,EAAE;IACT,MAAM,QAAQ,GAAG,MAAM,kCAAe,CAAC,IAAI,CAAC,CAAC;IAC7C,OAAO,kBAAkB,CAAC,uCAAoB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,CAAC,CAAC;AACxE,CAAC,CAAC;AALS,QAAA,OAAO,WAKhB;AAEJ,MAAM,kBAAkB,GAAG,KAAK,EAC9B,WAAmB,EACnB,QAAuB,EACvB,OAAoB,EACpB,kBAAmD,EAAE,EAC/B,EAAE;IACxB,MAAM,IAAI,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;IAEnC,yEAAyE;IACzE,qEAAqE;IACrE,0EAA0E;IAC1E,IAAI,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,CAAC,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;QACzE,OAAO,wBAAwB,CAAC,IAAI,CAAC,CAAC;KACvC;IAED,uEAAuE;IACvE,4CAA4C;IAC5C,IAAI,6BAA6B,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,IAAI,CAAC,EAAE;QAChF,MAAM,EACJ,WAAW,EAAE,UAAU,EACvB,UAAU,EACV,QAAQ,EAAE,OAAO,EACjB,iBAAiB,EAAE,eAAe,GAAG,aAAa,GAAG,IAAI,CAAC,GAAG,EAAE,EAC/D,cAAc,EACd,iBAAiB,GAClB,GAAG,IAAI,CAAC;QAET,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE;YACxB,MAAM,IAAI,4CAAwB,CAChC,WAAW,WAAW,wCAAwC,GAAG,yCAAyC,EAC1G,KAAK,CACN,CAAC;SACH;QAED,IAAI,cAAc,IAAI,cAAc,IAAI,eAAe,EAAE;YACvD,MAAM,IAAI,4CAAwB,CAChC,gEAAgE;gBAC9D,IAAI,uCAAoB,CAAC,OAAO,CAAC,sBAAsB;gBACvD,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EACzC,KAAK,CACN,CAAC;SACH;QAED,MAAM,WAAW,GAAG,cAAc;YAChC,CAAC,CAAC,kBAAkB,CAAC,cAAc,EAAE,QAAQ,EAAE,OAAO,EAAE;gBACpD,GAAG,eAAe;gBAClB,CAAC,cAAc,CAAC,EAAE,IAAI;aACvB,CAAC;YACJ,CAAC,CAAC,uBAAuB,CAAC,iBAAkB,EAAE,WAAW,CAAC,EAAE,CAAC;QAE/D,MAAM,MAAM,GAAqB,EAAE,OAAO,EAAE,eAAe,EAAE,UAAU,EAAE,CAAC;QAC1E,IAAI,UAAU,EAAE;YACd,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE;gBAC5B,MAAM,IAAI,4CAAwB,CAChC,WAAW,WAAW,wCAAwC,GAAG,yCAAyC,EAC1G,KAAK,CACN,CAAC;aACH;YACD,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;YACjC,MAAM,CAAC,SAAS,GAAG,MAAM,OAAO,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC;SAC9D;QAED,OAAO,OAAO,CAAC,WAAW,CAAC,MAAM,WAAW,EAAE,MAAM,CAAC,CAAC;KACvD;IAED,oEAAoE;IACpE,yCAAyC;IACzC,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;QAC9B,OAAO,wBAAwB,CAAC,IAAI,CAAC,CAAC;KACvC;IAED,oEAAoE;IACpE,oEAAoE;IACpE,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;QAC9B,OAAO,6BAA6B,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;KACrD;IACD,IAAI,sCAAY,CAAC,IAAI,CAAC,EAAE;QACtB,MAAM,EAAE,aAAa,EAAE,cAAc,EAAE,UAAU,EAAE,aAAa,EAAE,GAAG,4CAAkB,CAAC,IAAI,CAAC,CAAC;QAC9F,OAAO,iCAAO,CAAC;YACb,WAAW,EAAE,aAAa;YAC1B,YAAY,EAAE,cAAc;YAC5B,SAAS,EAAE,UAAU;YACrB,WAAW,EAAE,aAAa;SAC3B,CAAC,EAAE,CAAC;KACN;IAED,yEAAyE;IACzE,4EAA4E;IAC5E,wEAAwE;IACxE,0EAA0E;IAC1E,yBAAyB;IACzB,MAAM,IAAI,4CAAwB,CAChC,WAAW,WAAW,yCAAyC,GAAG,oBAAoB,CACvF,CAAC;AACJ,CAAC,CAAC;AAEF;;;;;;GAMG;AACH,MAAM,uBAAuB,GAAG,CAAC,gBAAwB,EAAE,WAAmB,EAAsB,EAAE;IACpG,MAAM,kBAAkB,GAAiD;QACvE,YAAY,EAAE,gDAAqB;QACnC,mBAAmB,EAAE,+CAAoB;QACzC,WAAW,EAAE,iCAAO;KACrB,CAAC;IACF,IAAI,gBAAgB,IAAI,kBAAkB,EAAE;QAC1C,OAAO,kBAAkB,CAAC,gBAAgB,CAAC,EAAE,CAAC;KAC/C;SAAM;QACL,MAAM,IAAI,4CAAwB,CAChC,4CAA4C,WAAW,SAAS,gBAAgB,IAAI;YAClF,8DAA8D,CACjE,CAAC;KACH;AACH,CAAC,CAAC;AAEF,MAAM,wBAAwB,GAAG,CAAC,OAA2B,EAAwB,EAAE,CACrF,OAAO,CAAC,OAAO,CAAC;IACd,WAAW,EAAE,OAAO,CAAC,iBAAiB;IACtC,eAAe,EAAE,OAAO,CAAC,qBAAqB;IAC9C,YAAY,EAAE,OAAO,CAAC,iBAAiB;CACxC,CAAC,CAAC;AAEL,MAAM,6BAA6B,GAAG,KAAK,EAAE,OAA2B,EAAE,OAAoB,EAAwB,EAAE,CACtH,gDAAa,CAAC;IACZ,oBAAoB,EAAE,OAAO,CAAC,uBAAuB;IACrD,OAAO,EAAE,OAAO,CAAC,QAAQ;IACzB,eAAe,EAAE,OAAO,CAAC,iBAAiB;IAC1C,0BAA0B,EAAE,OAAO,CAAC,0BAA0B;CAC/D,CAAC,EAAE,CAAC","sourcesContent":["import { fromEnv } from \"@aws-sdk/credential-provider-env\";\nimport { fromContainerMetadata, fromInstanceMetadata } from \"@aws-sdk/credential-provider-imds\";\nimport { fromSSO, isSsoProfile, validateSsoProfile } from \"@aws-sdk/credential-provider-sso\";\nimport { AssumeRoleWithWebIdentityParams, fromTokenFile } from \"@aws-sdk/credential-provider-web-identity\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { ParsedIniData, Profile } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/util-credentials\";\n\n/**\n * @see http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/STS.html#assumeRole-property\n * TODO update the above to link to V3 docs\n */\nexport interface AssumeRoleParams {\n  /**\n   * The identifier of the role to be assumed.\n   */\n  RoleArn: string;\n\n  /**\n   * A name for the assumed role session.\n   */\n  RoleSessionName: string;\n\n  /**\n   * A unique identifier that is used by third parties when assuming roles in\n   * their customers' accounts.\n   */\n  ExternalId?: string;\n\n  /**\n   * The identification number of the MFA device that is associated with the\n   * user who is making the `AssumeRole` call.\n   */\n  SerialNumber?: string;\n\n  /**\n   * The value provided by the MFA device.\n   */\n  TokenCode?: string;\n}\n\nexport interface FromIniInit extends SourceProfileInit {\n  /**\n   * A function that returns a promise fulfilled with an MFA token code for\n   * the provided MFA Serial code. If a profile requires an MFA code and\n   * `mfaCodeProvider` is not a valid function, the credential provider\n   * promise will be rejected.\n   *\n   * @param mfaSerial The serial code of the MFA device specified.\n   */\n  mfaCodeProvider?: (mfaSerial: string) => Promise<string>;\n\n  /**\n   * A function that assumes a role and returns a promise fulfilled with\n   * credentials for the assumed role.\n   *\n   * @param sourceCreds The credentials with which to assume a role.\n   * @param params\n   */\n  roleAssumer?: (sourceCreds: Credentials, params: AssumeRoleParams) => Promise<Credentials>;\n\n  /**\n   * A function that assumes a role with web identity and returns a promise fulfilled with\n   * credentials for the assumed role.\n   *\n   * @param sourceCreds The credentials with which to assume a role.\n   * @param params\n   */\n  roleAssumerWithWebIdentity?: (params: AssumeRoleWithWebIdentityParams) => Promise<Credentials>;\n}\n\ninterface StaticCredsProfile extends Profile {\n  aws_access_key_id: string;\n  aws_secret_access_key: string;\n  aws_session_token?: string;\n}\n\nconst isStaticCredsProfile = (arg: any): arg is StaticCredsProfile =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.aws_access_key_id === \"string\" &&\n  typeof arg.aws_secret_access_key === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1;\n\ninterface WebIdentityProfile extends Profile {\n  web_identity_token_file: string;\n  role_arn: string;\n  role_session_name?: string;\n}\n\nconst isWebIdentityProfile = (arg: any): arg is WebIdentityProfile =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.web_identity_token_file === \"string\" &&\n  typeof arg.role_arn === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\n\ninterface AssumeRoleWithSourceProfile extends Profile {\n  role_arn: string;\n  source_profile: string;\n}\n\ninterface AssumeRoleWithProviderProfile extends Profile {\n  role_arn: string;\n  credential_source: string;\n}\n\nconst isAssumeRoleProfile = (arg: any) =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.role_arn === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1;\n\nconst isAssumeRoleWithSourceProfile = (arg: any): arg is AssumeRoleWithSourceProfile =>\n  isAssumeRoleProfile(arg) && typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n\nconst isAssumeRoleWithProviderProfile = (arg: any): arg is AssumeRoleWithProviderProfile =>\n  isAssumeRoleProfile(arg) && typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n\n/**\n * Creates a credential provider that will read from ini files and supports\n * role assumption and multi-factor authentication.\n */\nexport const fromIni =\n  (init: FromIniInit = {}): CredentialProvider =>\n  async () => {\n    const profiles = await parseKnownFiles(init);\n    return resolveProfileData(getMasterProfileName(init), profiles, init);\n  };\n\nconst resolveProfileData = async (\n  profileName: string,\n  profiles: ParsedIniData,\n  options: FromIniInit,\n  visitedProfiles: { [profileName: string]: true } = {}\n): Promise<Credentials> => {\n  const data = profiles[profileName];\n\n  // If this is not the first profile visited, static credentials should be\n  // preferred over role assumption metadata. This special treatment of\n  // second and subsequent hops is to ensure compatibility with the AWS CLI.\n  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n    return resolveStaticCredentials(data);\n  }\n\n  // If this is the first profile visited, role assumption keys should be\n  // given precedence over static credentials.\n  if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {\n    const {\n      external_id: ExternalId,\n      mfa_serial,\n      role_arn: RoleArn,\n      role_session_name: RoleSessionName = \"aws-sdk-js-\" + Date.now(),\n      source_profile,\n      credential_source,\n    } = data;\n\n    if (!options.roleAssumer) {\n      throw new CredentialsProviderError(\n        `Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`,\n        false\n      );\n    }\n\n    if (source_profile && source_profile in visitedProfiles) {\n      throw new CredentialsProviderError(\n        `Detected a cycle attempting to resolve credentials for profile` +\n          ` ${getMasterProfileName(options)}. Profiles visited: ` +\n          Object.keys(visitedProfiles).join(\", \"),\n        false\n      );\n    }\n\n    const sourceCreds = source_profile\n      ? resolveProfileData(source_profile, profiles, options, {\n          ...visitedProfiles,\n          [source_profile]: true,\n        })\n      : resolveCredentialSource(credential_source!, profileName)();\n\n    const params: AssumeRoleParams = { RoleArn, RoleSessionName, ExternalId };\n    if (mfa_serial) {\n      if (!options.mfaCodeProvider) {\n        throw new CredentialsProviderError(\n          `Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`,\n          false\n        );\n      }\n      params.SerialNumber = mfa_serial;\n      params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n    }\n\n    return options.roleAssumer(await sourceCreds, params);\n  }\n\n  // If no role assumption metadata is present, attempt to load static\n  // credentials from the selected profile.\n  if (isStaticCredsProfile(data)) {\n    return resolveStaticCredentials(data);\n  }\n\n  // If no static credentials are present, attempt to assume role with\n  // web identity if web_identity_token_file and role_arn is available\n  if (isWebIdentityProfile(data)) {\n    return resolveWebIdentityCredentials(data, options);\n  }\n  if (isSsoProfile(data)) {\n    const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(data);\n    return fromSSO({\n      ssoStartUrl: sso_start_url,\n      ssoAccountId: sso_account_id,\n      ssoRegion: sso_region,\n      ssoRoleName: sso_role_name,\n    })();\n  }\n\n  // If the profile cannot be parsed or contains neither static credentials\n  // nor role assumption metadata, throw an error. This should be considered a\n  // terminal resolution error if a profile has been specified by the user\n  // (whether via a parameter, an environment variable, or another profile's\n  // `source_profile` key).\n  throw new CredentialsProviderError(\n    `Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`\n  );\n};\n\n/**\n * Resolve the `credential_source` entry from the profile, and return the\n * credential providers respectively. No memoization is needed for the\n * credential source providers because memoization should be added outside the\n * fromIni() provider. The source credential needs to be refreshed every time\n * fromIni() is called.\n */\nconst resolveCredentialSource = (credentialSource: string, profileName: string): CredentialProvider => {\n  const sourceProvidersMap: { [name: string]: () => CredentialProvider } = {\n    EcsContainer: fromContainerMetadata,\n    Ec2InstanceMetadata: fromInstanceMetadata,\n    Environment: fromEnv,\n  };\n  if (credentialSource in sourceProvidersMap) {\n    return sourceProvidersMap[credentialSource]();\n  } else {\n    throw new CredentialsProviderError(\n      `Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n        `expected EcsContainer or Ec2InstanceMetadata or Environment.`\n    );\n  }\n};\n\nconst resolveStaticCredentials = (profile: StaticCredsProfile): Promise<Credentials> =>\n  Promise.resolve({\n    accessKeyId: profile.aws_access_key_id,\n    secretAccessKey: profile.aws_secret_access_key,\n    sessionToken: profile.aws_session_token,\n  });\n\nconst resolveWebIdentityCredentials = async (profile: WebIdentityProfile, options: FromIniInit): Promise<Credentials> =>\n  fromTokenFile({\n    webIdentityTokenFile: profile.web_identity_token_file,\n    roleArn: profile.role_arn,\n    roleSessionName: profile.role_session_name,\n    roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n  })();\n"]}
|
package/dist/es/index.js
DELETED
|
@@ -1,165 +0,0 @@
|
|
|
1
|
-
import { __assign, __awaiter, __generator } from "tslib";
|
|
2
|
-
import { fromEnv } from "@aws-sdk/credential-provider-env";
|
|
3
|
-
import { fromContainerMetadata, fromInstanceMetadata } from "@aws-sdk/credential-provider-imds";
|
|
4
|
-
import { fromSSO, isSsoProfile, validateSsoProfile } from "@aws-sdk/credential-provider-sso";
|
|
5
|
-
import { fromTokenFile } from "@aws-sdk/credential-provider-web-identity";
|
|
6
|
-
import { CredentialsProviderError } from "@aws-sdk/property-provider";
|
|
7
|
-
import { getMasterProfileName, parseKnownFiles } from "@aws-sdk/util-credentials";
|
|
8
|
-
var isStaticCredsProfile = function (arg) {
|
|
9
|
-
return Boolean(arg) &&
|
|
10
|
-
typeof arg === "object" &&
|
|
11
|
-
typeof arg.aws_access_key_id === "string" &&
|
|
12
|
-
typeof arg.aws_secret_access_key === "string" &&
|
|
13
|
-
["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
|
|
14
|
-
};
|
|
15
|
-
var isWebIdentityProfile = function (arg) {
|
|
16
|
-
return Boolean(arg) &&
|
|
17
|
-
typeof arg === "object" &&
|
|
18
|
-
typeof arg.web_identity_token_file === "string" &&
|
|
19
|
-
typeof arg.role_arn === "string" &&
|
|
20
|
-
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
21
|
-
};
|
|
22
|
-
var isAssumeRoleProfile = function (arg) {
|
|
23
|
-
return Boolean(arg) &&
|
|
24
|
-
typeof arg === "object" &&
|
|
25
|
-
typeof arg.role_arn === "string" &&
|
|
26
|
-
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
|
|
27
|
-
["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
|
|
28
|
-
["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
|
|
29
|
-
};
|
|
30
|
-
var isAssumeRoleWithSourceProfile = function (arg) {
|
|
31
|
-
return isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
32
|
-
};
|
|
33
|
-
var isAssumeRoleWithProviderProfile = function (arg) {
|
|
34
|
-
return isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
35
|
-
};
|
|
36
|
-
/**
|
|
37
|
-
* Creates a credential provider that will read from ini files and supports
|
|
38
|
-
* role assumption and multi-factor authentication.
|
|
39
|
-
*/
|
|
40
|
-
export var fromIni = function (init) {
|
|
41
|
-
if (init === void 0) { init = {}; }
|
|
42
|
-
return function () { return __awaiter(void 0, void 0, void 0, function () {
|
|
43
|
-
var profiles;
|
|
44
|
-
return __generator(this, function (_a) {
|
|
45
|
-
switch (_a.label) {
|
|
46
|
-
case 0: return [4 /*yield*/, parseKnownFiles(init)];
|
|
47
|
-
case 1:
|
|
48
|
-
profiles = _a.sent();
|
|
49
|
-
return [2 /*return*/, resolveProfileData(getMasterProfileName(init), profiles, init)];
|
|
50
|
-
}
|
|
51
|
-
});
|
|
52
|
-
}); };
|
|
53
|
-
};
|
|
54
|
-
var resolveProfileData = function (profileName, profiles, options, visitedProfiles) {
|
|
55
|
-
if (visitedProfiles === void 0) { visitedProfiles = {}; }
|
|
56
|
-
return __awaiter(void 0, void 0, void 0, function () {
|
|
57
|
-
var data, ExternalId, mfa_serial, RoleArn, _a, RoleSessionName, source_profile, credential_source, sourceCreds, params, _b, _c, _d, _e, sso_start_url, sso_account_id, sso_region, sso_role_name;
|
|
58
|
-
var _f;
|
|
59
|
-
return __generator(this, function (_g) {
|
|
60
|
-
switch (_g.label) {
|
|
61
|
-
case 0:
|
|
62
|
-
data = profiles[profileName];
|
|
63
|
-
// If this is not the first profile visited, static credentials should be
|
|
64
|
-
// preferred over role assumption metadata. This special treatment of
|
|
65
|
-
// second and subsequent hops is to ensure compatibility with the AWS CLI.
|
|
66
|
-
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
67
|
-
return [2 /*return*/, resolveStaticCredentials(data)];
|
|
68
|
-
}
|
|
69
|
-
if (!(isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data))) return [3 /*break*/, 4];
|
|
70
|
-
ExternalId = data.external_id, mfa_serial = data.mfa_serial, RoleArn = data.role_arn, _a = data.role_session_name, RoleSessionName = _a === void 0 ? "aws-sdk-js-" + Date.now() : _a, source_profile = data.source_profile, credential_source = data.credential_source;
|
|
71
|
-
if (!options.roleAssumer) {
|
|
72
|
-
throw new CredentialsProviderError("Profile " + profileName + " requires a role to be assumed, but no" + " role assumption callback was provided.", false);
|
|
73
|
-
}
|
|
74
|
-
if (source_profile && source_profile in visitedProfiles) {
|
|
75
|
-
throw new CredentialsProviderError("Detected a cycle attempting to resolve credentials for profile" +
|
|
76
|
-
(" " + getMasterProfileName(options) + ". Profiles visited: ") +
|
|
77
|
-
Object.keys(visitedProfiles).join(", "), false);
|
|
78
|
-
}
|
|
79
|
-
sourceCreds = source_profile
|
|
80
|
-
? resolveProfileData(source_profile, profiles, options, __assign(__assign({}, visitedProfiles), (_f = {}, _f[source_profile] = true, _f)))
|
|
81
|
-
: resolveCredentialSource(credential_source, profileName)();
|
|
82
|
-
params = { RoleArn: RoleArn, RoleSessionName: RoleSessionName, ExternalId: ExternalId };
|
|
83
|
-
if (!mfa_serial) return [3 /*break*/, 2];
|
|
84
|
-
if (!options.mfaCodeProvider) {
|
|
85
|
-
throw new CredentialsProviderError("Profile " + profileName + " requires multi-factor authentication," + " but no MFA code callback was provided.", false);
|
|
86
|
-
}
|
|
87
|
-
params.SerialNumber = mfa_serial;
|
|
88
|
-
_b = params;
|
|
89
|
-
return [4 /*yield*/, options.mfaCodeProvider(mfa_serial)];
|
|
90
|
-
case 1:
|
|
91
|
-
_b.TokenCode = _g.sent();
|
|
92
|
-
_g.label = 2;
|
|
93
|
-
case 2:
|
|
94
|
-
_d = (_c = options).roleAssumer;
|
|
95
|
-
return [4 /*yield*/, sourceCreds];
|
|
96
|
-
case 3: return [2 /*return*/, _d.apply(_c, [_g.sent(), params])];
|
|
97
|
-
case 4:
|
|
98
|
-
// If no role assumption metadata is present, attempt to load static
|
|
99
|
-
// credentials from the selected profile.
|
|
100
|
-
if (isStaticCredsProfile(data)) {
|
|
101
|
-
return [2 /*return*/, resolveStaticCredentials(data)];
|
|
102
|
-
}
|
|
103
|
-
// If no static credentials are present, attempt to assume role with
|
|
104
|
-
// web identity if web_identity_token_file and role_arn is available
|
|
105
|
-
if (isWebIdentityProfile(data)) {
|
|
106
|
-
return [2 /*return*/, resolveWebIdentityCredentials(data, options)];
|
|
107
|
-
}
|
|
108
|
-
if (isSsoProfile(data)) {
|
|
109
|
-
_e = validateSsoProfile(data), sso_start_url = _e.sso_start_url, sso_account_id = _e.sso_account_id, sso_region = _e.sso_region, sso_role_name = _e.sso_role_name;
|
|
110
|
-
return [2 /*return*/, fromSSO({
|
|
111
|
-
ssoStartUrl: sso_start_url,
|
|
112
|
-
ssoAccountId: sso_account_id,
|
|
113
|
-
ssoRegion: sso_region,
|
|
114
|
-
ssoRoleName: sso_role_name,
|
|
115
|
-
})()];
|
|
116
|
-
}
|
|
117
|
-
// If the profile cannot be parsed or contains neither static credentials
|
|
118
|
-
// nor role assumption metadata, throw an error. This should be considered a
|
|
119
|
-
// terminal resolution error if a profile has been specified by the user
|
|
120
|
-
// (whether via a parameter, an environment variable, or another profile's
|
|
121
|
-
// `source_profile` key).
|
|
122
|
-
throw new CredentialsProviderError("Profile " + profileName + " could not be found or parsed in shared" + " credentials file.");
|
|
123
|
-
}
|
|
124
|
-
});
|
|
125
|
-
});
|
|
126
|
-
};
|
|
127
|
-
/**
|
|
128
|
-
* Resolve the `credential_source` entry from the profile, and return the
|
|
129
|
-
* credential providers respectively. No memoization is needed for the
|
|
130
|
-
* credential source providers because memoization should be added outside the
|
|
131
|
-
* fromIni() provider. The source credential needs to be refreshed every time
|
|
132
|
-
* fromIni() is called.
|
|
133
|
-
*/
|
|
134
|
-
var resolveCredentialSource = function (credentialSource, profileName) {
|
|
135
|
-
var sourceProvidersMap = {
|
|
136
|
-
EcsContainer: fromContainerMetadata,
|
|
137
|
-
Ec2InstanceMetadata: fromInstanceMetadata,
|
|
138
|
-
Environment: fromEnv,
|
|
139
|
-
};
|
|
140
|
-
if (credentialSource in sourceProvidersMap) {
|
|
141
|
-
return sourceProvidersMap[credentialSource]();
|
|
142
|
-
}
|
|
143
|
-
else {
|
|
144
|
-
throw new CredentialsProviderError("Unsupported credential source in profile " + profileName + ". Got " + credentialSource + ", " +
|
|
145
|
-
"expected EcsContainer or Ec2InstanceMetadata or Environment.");
|
|
146
|
-
}
|
|
147
|
-
};
|
|
148
|
-
var resolveStaticCredentials = function (profile) {
|
|
149
|
-
return Promise.resolve({
|
|
150
|
-
accessKeyId: profile.aws_access_key_id,
|
|
151
|
-
secretAccessKey: profile.aws_secret_access_key,
|
|
152
|
-
sessionToken: profile.aws_session_token,
|
|
153
|
-
});
|
|
154
|
-
};
|
|
155
|
-
var resolveWebIdentityCredentials = function (profile, options) { return __awaiter(void 0, void 0, void 0, function () {
|
|
156
|
-
return __generator(this, function (_a) {
|
|
157
|
-
return [2 /*return*/, fromTokenFile({
|
|
158
|
-
webIdentityTokenFile: profile.web_identity_token_file,
|
|
159
|
-
roleArn: profile.role_arn,
|
|
160
|
-
roleSessionName: profile.role_session_name,
|
|
161
|
-
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
|
|
162
|
-
})()];
|
|
163
|
-
});
|
|
164
|
-
}); };
|
|
165
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,kCAAkC,CAAC;AAC3D,OAAO,EAAE,qBAAqB,EAAE,oBAAoB,EAAE,MAAM,mCAAmC,CAAC;AAChG,OAAO,EAAE,OAAO,EAAE,YAAY,EAAE,kBAAkB,EAAE,MAAM,kCAAkC,CAAC;AAC7F,OAAO,EAAmC,aAAa,EAAE,MAAM,2CAA2C,CAAC;AAC3G,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AAGtE,OAAO,EAAE,oBAAoB,EAAE,eAAe,EAAqB,MAAM,2BAA2B,CAAC;AAuErG,IAAM,oBAAoB,GAAG,UAAC,GAAQ;IACpC,OAAA,OAAO,CAAC,GAAG,CAAC;QACZ,OAAO,GAAG,KAAK,QAAQ;QACvB,OAAO,GAAG,CAAC,iBAAiB,KAAK,QAAQ;QACzC,OAAO,GAAG,CAAC,qBAAqB,KAAK,QAAQ;QAC7C,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;AAJlE,CAIkE,CAAC;AAQrE,IAAM,oBAAoB,GAAG,UAAC,GAAQ;IACpC,OAAA,OAAO,CAAC,GAAG,CAAC;QACZ,OAAO,GAAG,KAAK,QAAQ;QACvB,OAAO,GAAG,CAAC,uBAAuB,KAAK,QAAQ;QAC/C,OAAO,GAAG,CAAC,QAAQ,KAAK,QAAQ;QAChC,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;AAJlE,CAIkE,CAAC;AAYrE,IAAM,mBAAmB,GAAG,UAAC,GAAQ;IACnC,OAAA,OAAO,CAAC,GAAG,CAAC;QACZ,OAAO,GAAG,KAAK,QAAQ;QACvB,OAAO,GAAG,CAAC,QAAQ,KAAK,QAAQ;QAChC,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;QAClE,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;QAC5D,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;AAL3D,CAK2D,CAAC;AAE9D,IAAM,6BAA6B,GAAG,UAAC,GAAQ;IAC7C,OAAA,mBAAmB,CAAC,GAAG,CAAC,IAAI,OAAO,GAAG,CAAC,cAAc,KAAK,QAAQ,IAAI,OAAO,GAAG,CAAC,iBAAiB,KAAK,WAAW;AAAlH,CAAkH,CAAC;AAErH,IAAM,+BAA+B,GAAG,UAAC,GAAQ;IAC/C,OAAA,mBAAmB,CAAC,GAAG,CAAC,IAAI,OAAO,GAAG,CAAC,iBAAiB,KAAK,QAAQ,IAAI,OAAO,GAAG,CAAC,cAAc,KAAK,WAAW;AAAlH,CAAkH,CAAC;AAErH;;;GAGG;AACH,MAAM,CAAC,IAAM,OAAO,GAClB,UAAC,IAAsB;IAAtB,qBAAA,EAAA,SAAsB;IACvB,OAAA;;;;wBACmB,qBAAM,eAAe,CAAC,IAAI,CAAC,EAAA;;oBAAtC,QAAQ,GAAG,SAA2B;oBAC5C,sBAAO,kBAAkB,CAAC,oBAAoB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,CAAC,EAAC;;;SACvE;AAHD,CAGC,CAAC;AAEJ,IAAM,kBAAkB,GAAG,UACzB,WAAmB,EACnB,QAAuB,EACvB,OAAoB,EACpB,eAAqD;IAArD,gCAAA,EAAA,oBAAqD;;;;;;;oBAE/C,IAAI,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;oBAEnC,yEAAyE;oBACzE,qEAAqE;oBACrE,0EAA0E;oBAC1E,IAAI,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,CAAC,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;wBACzE,sBAAO,wBAAwB,CAAC,IAAI,CAAC,EAAC;qBACvC;yBAIG,CAAA,6BAA6B,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,IAAI,CAAC,CAAA,EAA5E,wBAA4E;oBAE/D,UAAU,GAMrB,IAAI,YANiB,EACvB,UAAU,GAKR,IAAI,WALI,EACA,OAAO,GAIf,IAAI,SAJW,EACjB,KAGE,IAAI,kBAHyD,EAA5C,eAAe,mBAAG,aAAa,GAAG,IAAI,CAAC,GAAG,EAAE,KAAA,EAC/D,cAAc,GAEZ,IAAI,eAFQ,EACd,iBAAiB,GACf,IAAI,kBADW,CACV;oBAET,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE;wBACxB,MAAM,IAAI,wBAAwB,CAChC,aAAW,WAAW,2CAAwC,GAAG,yCAAyC,EAC1G,KAAK,CACN,CAAC;qBACH;oBAED,IAAI,cAAc,IAAI,cAAc,IAAI,eAAe,EAAE;wBACvD,MAAM,IAAI,wBAAwB,CAChC,gEAAgE;6BAC9D,MAAI,oBAAoB,CAAC,OAAO,CAAC,yBAAsB,CAAA;4BACvD,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EACzC,KAAK,CACN,CAAC;qBACH;oBAEK,WAAW,GAAG,cAAc;wBAChC,CAAC,CAAC,kBAAkB,CAAC,cAAc,EAAE,QAAQ,EAAE,OAAO,wBAC/C,eAAe,gBACjB,cAAc,IAAG,IAAI,OACtB;wBACJ,CAAC,CAAC,uBAAuB,CAAC,iBAAkB,EAAE,WAAW,CAAC,EAAE,CAAC;oBAEzD,MAAM,GAAqB,EAAE,OAAO,SAAA,EAAE,eAAe,iBAAA,EAAE,UAAU,YAAA,EAAE,CAAC;yBACtE,UAAU,EAAV,wBAAU;oBACZ,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE;wBAC5B,MAAM,IAAI,wBAAwB,CAChC,aAAW,WAAW,2CAAwC,GAAG,yCAAyC,EAC1G,KAAK,CACN,CAAC;qBACH;oBACD,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;oBACjC,KAAA,MAAM,CAAA;oBAAa,qBAAM,OAAO,CAAC,eAAe,CAAC,UAAU,CAAC,EAAA;;oBAA5D,GAAO,SAAS,GAAG,SAAyC,CAAC;;;oBAGxD,KAAA,CAAA,KAAA,OAAO,CAAA,CAAC,WAAW,CAAA;oBAAC,qBAAM,WAAW,EAAA;wBAA5C,sBAAO,cAAoB,SAAiB,EAAE,MAAM,EAAC,EAAC;;oBAGxD,oEAAoE;oBACpE,yCAAyC;oBACzC,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;wBAC9B,sBAAO,wBAAwB,CAAC,IAAI,CAAC,EAAC;qBACvC;oBAED,oEAAoE;oBACpE,oEAAoE;oBACpE,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;wBAC9B,sBAAO,6BAA6B,CAAC,IAAI,EAAE,OAAO,CAAC,EAAC;qBACrD;oBACD,IAAI,YAAY,CAAC,IAAI,CAAC,EAAE;wBAChB,KAA+D,kBAAkB,CAAC,IAAI,CAAC,EAArF,aAAa,mBAAA,EAAE,cAAc,oBAAA,EAAE,UAAU,gBAAA,EAAE,aAAa,mBAAA,CAA8B;wBAC9F,sBAAO,OAAO,CAAC;gCACb,WAAW,EAAE,aAAa;gCAC1B,YAAY,EAAE,cAAc;gCAC5B,SAAS,EAAE,UAAU;gCACrB,WAAW,EAAE,aAAa;6BAC3B,CAAC,EAAE,EAAC;qBACN;oBAED,yEAAyE;oBACzE,4EAA4E;oBAC5E,wEAAwE;oBACxE,0EAA0E;oBAC1E,yBAAyB;oBACzB,MAAM,IAAI,wBAAwB,CAChC,aAAW,WAAW,4CAAyC,GAAG,oBAAoB,CACvF,CAAC;;;;CACH,CAAC;AAEF;;;;;;GAMG;AACH,IAAM,uBAAuB,GAAG,UAAC,gBAAwB,EAAE,WAAmB;IAC5E,IAAM,kBAAkB,GAAiD;QACvE,YAAY,EAAE,qBAAqB;QACnC,mBAAmB,EAAE,oBAAoB;QACzC,WAAW,EAAE,OAAO;KACrB,CAAC;IACF,IAAI,gBAAgB,IAAI,kBAAkB,EAAE;QAC1C,OAAO,kBAAkB,CAAC,gBAAgB,CAAC,EAAE,CAAC;KAC/C;SAAM;QACL,MAAM,IAAI,wBAAwB,CAChC,8CAA4C,WAAW,cAAS,gBAAgB,OAAI;YAClF,8DAA8D,CACjE,CAAC;KACH;AACH,CAAC,CAAC;AAEF,IAAM,wBAAwB,GAAG,UAAC,OAA2B;IAC3D,OAAA,OAAO,CAAC,OAAO,CAAC;QACd,WAAW,EAAE,OAAO,CAAC,iBAAiB;QACtC,eAAe,EAAE,OAAO,CAAC,qBAAqB;QAC9C,YAAY,EAAE,OAAO,CAAC,iBAAiB;KACxC,CAAC;AAJF,CAIE,CAAC;AAEL,IAAM,6BAA6B,GAAG,UAAO,OAA2B,EAAE,OAAoB;;QAC5F,sBAAA,aAAa,CAAC;gBACZ,oBAAoB,EAAE,OAAO,CAAC,uBAAuB;gBACrD,OAAO,EAAE,OAAO,CAAC,QAAQ;gBACzB,eAAe,EAAE,OAAO,CAAC,iBAAiB;gBAC1C,0BAA0B,EAAE,OAAO,CAAC,0BAA0B;aAC/D,CAAC,EAAE,EAAA;;KAAA,CAAC","sourcesContent":["import { fromEnv } from \"@aws-sdk/credential-provider-env\";\nimport { fromContainerMetadata, fromInstanceMetadata } from \"@aws-sdk/credential-provider-imds\";\nimport { fromSSO, isSsoProfile, validateSsoProfile } from \"@aws-sdk/credential-provider-sso\";\nimport { AssumeRoleWithWebIdentityParams, fromTokenFile } from \"@aws-sdk/credential-provider-web-identity\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { ParsedIniData, Profile } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/util-credentials\";\n\n/**\n * @see http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/STS.html#assumeRole-property\n * TODO update the above to link to V3 docs\n */\nexport interface AssumeRoleParams {\n  /**\n   * The identifier of the role to be assumed.\n   */\n  RoleArn: string;\n\n  /**\n   * A name for the assumed role session.\n   */\n  RoleSessionName: string;\n\n  /**\n   * A unique identifier that is used by third parties when assuming roles in\n   * their customers' accounts.\n   */\n  ExternalId?: string;\n\n  /**\n   * The identification number of the MFA device that is associated with the\n   * user who is making the `AssumeRole` call.\n   */\n  SerialNumber?: string;\n\n  /**\n   * The value provided by the MFA device.\n   */\n  TokenCode?: string;\n}\n\nexport interface FromIniInit extends SourceProfileInit {\n  /**\n   * A function that returns a promise fulfilled with an MFA token code for\n   * the provided MFA Serial code. If a profile requires an MFA code and\n   * `mfaCodeProvider` is not a valid function, the credential provider\n   * promise will be rejected.\n   *\n   * @param mfaSerial The serial code of the MFA device specified.\n   */\n  mfaCodeProvider?: (mfaSerial: string) => Promise<string>;\n\n  /**\n   * A function that assumes a role and returns a promise fulfilled with\n   * credentials for the assumed role.\n   *\n   * @param sourceCreds The credentials with which to assume a role.\n   * @param params\n   */\n  roleAssumer?: (sourceCreds: Credentials, params: AssumeRoleParams) => Promise<Credentials>;\n\n  /**\n   * A function that assumes a role with web identity and returns a promise fulfilled with\n   * credentials for the assumed role.\n   *\n   * @param sourceCreds The credentials with which to assume a role.\n   * @param params\n   */\n  roleAssumerWithWebIdentity?: (params: AssumeRoleWithWebIdentityParams) => Promise<Credentials>;\n}\n\ninterface StaticCredsProfile extends Profile {\n  aws_access_key_id: string;\n  aws_secret_access_key: string;\n  aws_session_token?: string;\n}\n\nconst isStaticCredsProfile = (arg: any): arg is StaticCredsProfile =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.aws_access_key_id === \"string\" &&\n  typeof arg.aws_secret_access_key === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1;\n\ninterface WebIdentityProfile extends Profile {\n  web_identity_token_file: string;\n  role_arn: string;\n  role_session_name?: string;\n}\n\nconst isWebIdentityProfile = (arg: any): arg is WebIdentityProfile =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.web_identity_token_file === \"string\" &&\n  typeof arg.role_arn === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\n\ninterface AssumeRoleWithSourceProfile extends Profile {\n  role_arn: string;\n  source_profile: string;\n}\n\ninterface AssumeRoleWithProviderProfile extends Profile {\n  role_arn: string;\n  credential_source: string;\n}\n\nconst isAssumeRoleProfile = (arg: any) =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.role_arn === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1;\n\nconst isAssumeRoleWithSourceProfile = (arg: any): arg is AssumeRoleWithSourceProfile =>\n  isAssumeRoleProfile(arg) && typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n\nconst isAssumeRoleWithProviderProfile = (arg: any): arg is AssumeRoleWithProviderProfile =>\n  isAssumeRoleProfile(arg) && typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n\n/**\n * Creates a credential provider that will read from ini files and supports\n * role assumption and multi-factor authentication.\n */\nexport const fromIni =\n  (init: FromIniInit = {}): CredentialProvider =>\n  async () => {\n    const profiles = await parseKnownFiles(init);\n    return resolveProfileData(getMasterProfileName(init), profiles, init);\n  };\n\nconst resolveProfileData = async (\n  profileName: string,\n  profiles: ParsedIniData,\n  options: FromIniInit,\n  visitedProfiles: { [profileName: string]: true } = {}\n): Promise<Credentials> => {\n  const data = profiles[profileName];\n\n  // If this is not the first profile visited, static credentials should be\n  // preferred over role assumption metadata. This special treatment of\n  // second and subsequent hops is to ensure compatibility with the AWS CLI.\n  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n    return resolveStaticCredentials(data);\n  }\n\n  // If this is the first profile visited, role assumption keys should be\n  // given precedence over static credentials.\n  if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {\n    const {\n      external_id: ExternalId,\n      mfa_serial,\n      role_arn: RoleArn,\n      role_session_name: RoleSessionName = \"aws-sdk-js-\" + Date.now(),\n      source_profile,\n      credential_source,\n    } = data;\n\n    if (!options.roleAssumer) {\n      throw new CredentialsProviderError(\n        `Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`,\n        false\n      );\n    }\n\n    if (source_profile && source_profile in visitedProfiles) {\n      throw new CredentialsProviderError(\n        `Detected a cycle attempting to resolve credentials for profile` +\n          ` ${getMasterProfileName(options)}. Profiles visited: ` +\n          Object.keys(visitedProfiles).join(\", \"),\n        false\n      );\n    }\n\n    const sourceCreds = source_profile\n      ? resolveProfileData(source_profile, profiles, options, {\n          ...visitedProfiles,\n          [source_profile]: true,\n        })\n      : resolveCredentialSource(credential_source!, profileName)();\n\n    const params: AssumeRoleParams = { RoleArn, RoleSessionName, ExternalId };\n    if (mfa_serial) {\n      if (!options.mfaCodeProvider) {\n        throw new CredentialsProviderError(\n          `Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`,\n          false\n        );\n      }\n      params.SerialNumber = mfa_serial;\n      params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n    }\n\n    return options.roleAssumer(await sourceCreds, params);\n  }\n\n  // If no role assumption metadata is present, attempt to load static\n  // credentials from the selected profile.\n  if (isStaticCredsProfile(data)) {\n    return resolveStaticCredentials(data);\n  }\n\n  // If no static credentials are present, attempt to assume role with\n  // web identity if web_identity_token_file and role_arn is available\n  if (isWebIdentityProfile(data)) {\n    return resolveWebIdentityCredentials(data, options);\n  }\n  if (isSsoProfile(data)) {\n    const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(data);\n    return fromSSO({\n      ssoStartUrl: sso_start_url,\n      ssoAccountId: sso_account_id,\n      ssoRegion: sso_region,\n      ssoRoleName: sso_role_name,\n    })();\n  }\n\n  // If the profile cannot be parsed or contains neither static credentials\n  // nor role assumption metadata, throw an error. This should be considered a\n  // terminal resolution error if a profile has been specified by the user\n  // (whether via a parameter, an environment variable, or another profile's\n  // `source_profile` key).\n  throw new CredentialsProviderError(\n    `Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`\n  );\n};\n\n/**\n * Resolve the `credential_source` entry from the profile, and return the\n * credential providers respectively. No memoization is needed for the\n * credential source providers because memoization should be added outside the\n * fromIni() provider. The source credential needs to be refreshed every time\n * fromIni() is called.\n */\nconst resolveCredentialSource = (credentialSource: string, profileName: string): CredentialProvider => {\n  const sourceProvidersMap: { [name: string]: () => CredentialProvider } = {\n    EcsContainer: fromContainerMetadata,\n    Ec2InstanceMetadata: fromInstanceMetadata,\n    Environment: fromEnv,\n  };\n  if (credentialSource in sourceProvidersMap) {\n    return sourceProvidersMap[credentialSource]();\n  } else {\n    throw new CredentialsProviderError(\n      `Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n        `expected EcsContainer or Ec2InstanceMetadata or Environment.`\n    );\n  }\n};\n\nconst resolveStaticCredentials = (profile: StaticCredsProfile): Promise<Credentials> =>\n  Promise.resolve({\n    accessKeyId: profile.aws_access_key_id,\n    secretAccessKey: profile.aws_secret_access_key,\n    sessionToken: profile.aws_session_token,\n  });\n\nconst resolveWebIdentityCredentials = async (profile: WebIdentityProfile, options: FromIniInit): Promise<Credentials> =>\n  fromTokenFile({\n    webIdentityTokenFile: profile.web_identity_token_file,\n    roleArn: profile.role_arn,\n    roleSessionName: profile.role_session_name,\n    roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n  })();\n"]}
|
package/src/index.ts
DELETED
|
@@ -1,266 +0,0 @@
|
|
|
1
|
-
import { fromEnv } from "@aws-sdk/credential-provider-env";
|
|
2
|
-
import { fromContainerMetadata, fromInstanceMetadata } from "@aws-sdk/credential-provider-imds";
|
|
3
|
-
import { fromSSO, isSsoProfile, validateSsoProfile } from "@aws-sdk/credential-provider-sso";
|
|
4
|
-
import { AssumeRoleWithWebIdentityParams, fromTokenFile } from "@aws-sdk/credential-provider-web-identity";
|
|
5
|
-
import { CredentialsProviderError } from "@aws-sdk/property-provider";
|
|
6
|
-
import { ParsedIniData, Profile } from "@aws-sdk/shared-ini-file-loader";
|
|
7
|
-
import { CredentialProvider, Credentials } from "@aws-sdk/types";
|
|
8
|
-
import { getMasterProfileName, parseKnownFiles, SourceProfileInit } from "@aws-sdk/util-credentials";
|
|
9
|
-
|
|
10
|
-
/**
|
|
11
|
-
* @see http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/STS.html#assumeRole-property
|
|
12
|
-
* TODO update the above to link to V3 docs
|
|
13
|
-
*/
|
|
14
|
-
export interface AssumeRoleParams {
|
|
15
|
-
/**
|
|
16
|
-
* The identifier of the role to be assumed.
|
|
17
|
-
*/
|
|
18
|
-
RoleArn: string;
|
|
19
|
-
|
|
20
|
-
/**
|
|
21
|
-
* A name for the assumed role session.
|
|
22
|
-
*/
|
|
23
|
-
RoleSessionName: string;
|
|
24
|
-
|
|
25
|
-
/**
|
|
26
|
-
* A unique identifier that is used by third parties when assuming roles in
|
|
27
|
-
* their customers' accounts.
|
|
28
|
-
*/
|
|
29
|
-
ExternalId?: string;
|
|
30
|
-
|
|
31
|
-
/**
|
|
32
|
-
* The identification number of the MFA device that is associated with the
|
|
33
|
-
* user who is making the `AssumeRole` call.
|
|
34
|
-
*/
|
|
35
|
-
SerialNumber?: string;
|
|
36
|
-
|
|
37
|
-
/**
|
|
38
|
-
* The value provided by the MFA device.
|
|
39
|
-
*/
|
|
40
|
-
TokenCode?: string;
|
|
41
|
-
}
|
|
42
|
-
|
|
43
|
-
export interface FromIniInit extends SourceProfileInit {
|
|
44
|
-
/**
|
|
45
|
-
* A function that returns a promise fulfilled with an MFA token code for
|
|
46
|
-
* the provided MFA Serial code. If a profile requires an MFA code and
|
|
47
|
-
* `mfaCodeProvider` is not a valid function, the credential provider
|
|
48
|
-
* promise will be rejected.
|
|
49
|
-
*
|
|
50
|
-
* @param mfaSerial The serial code of the MFA device specified.
|
|
51
|
-
*/
|
|
52
|
-
mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
|
|
53
|
-
|
|
54
|
-
/**
|
|
55
|
-
* A function that assumes a role and returns a promise fulfilled with
|
|
56
|
-
* credentials for the assumed role.
|
|
57
|
-
*
|
|
58
|
-
* @param sourceCreds The credentials with which to assume a role.
|
|
59
|
-
* @param params
|
|
60
|
-
*/
|
|
61
|
-
roleAssumer?: (sourceCreds: Credentials, params: AssumeRoleParams) => Promise<Credentials>;
|
|
62
|
-
|
|
63
|
-
/**
|
|
64
|
-
* A function that assumes a role with web identity and returns a promise fulfilled with
|
|
65
|
-
* credentials for the assumed role.
|
|
66
|
-
*
|
|
67
|
-
* @param sourceCreds The credentials with which to assume a role.
|
|
68
|
-
* @param params
|
|
69
|
-
*/
|
|
70
|
-
roleAssumerWithWebIdentity?: (params: AssumeRoleWithWebIdentityParams) => Promise<Credentials>;
|
|
71
|
-
}
|
|
72
|
-
|
|
73
|
-
interface StaticCredsProfile extends Profile {
|
|
74
|
-
aws_access_key_id: string;
|
|
75
|
-
aws_secret_access_key: string;
|
|
76
|
-
aws_session_token?: string;
|
|
77
|
-
}
|
|
78
|
-
|
|
79
|
-
const isStaticCredsProfile = (arg: any): arg is StaticCredsProfile =>
|
|
80
|
-
Boolean(arg) &&
|
|
81
|
-
typeof arg === "object" &&
|
|
82
|
-
typeof arg.aws_access_key_id === "string" &&
|
|
83
|
-
typeof arg.aws_secret_access_key === "string" &&
|
|
84
|
-
["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
|
|
85
|
-
|
|
86
|
-
interface WebIdentityProfile extends Profile {
|
|
87
|
-
web_identity_token_file: string;
|
|
88
|
-
role_arn: string;
|
|
89
|
-
role_session_name?: string;
|
|
90
|
-
}
|
|
91
|
-
|
|
92
|
-
const isWebIdentityProfile = (arg: any): arg is WebIdentityProfile =>
|
|
93
|
-
Boolean(arg) &&
|
|
94
|
-
typeof arg === "object" &&
|
|
95
|
-
typeof arg.web_identity_token_file === "string" &&
|
|
96
|
-
typeof arg.role_arn === "string" &&
|
|
97
|
-
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
98
|
-
|
|
99
|
-
interface AssumeRoleWithSourceProfile extends Profile {
|
|
100
|
-
role_arn: string;
|
|
101
|
-
source_profile: string;
|
|
102
|
-
}
|
|
103
|
-
|
|
104
|
-
interface AssumeRoleWithProviderProfile extends Profile {
|
|
105
|
-
role_arn: string;
|
|
106
|
-
credential_source: string;
|
|
107
|
-
}
|
|
108
|
-
|
|
109
|
-
const isAssumeRoleProfile = (arg: any) =>
|
|
110
|
-
Boolean(arg) &&
|
|
111
|
-
typeof arg === "object" &&
|
|
112
|
-
typeof arg.role_arn === "string" &&
|
|
113
|
-
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
|
|
114
|
-
["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
|
|
115
|
-
["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
|
|
116
|
-
|
|
117
|
-
const isAssumeRoleWithSourceProfile = (arg: any): arg is AssumeRoleWithSourceProfile =>
|
|
118
|
-
isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
119
|
-
|
|
120
|
-
const isAssumeRoleWithProviderProfile = (arg: any): arg is AssumeRoleWithProviderProfile =>
|
|
121
|
-
isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
122
|
-
|
|
123
|
-
/**
|
|
124
|
-
* Creates a credential provider that will read from ini files and supports
|
|
125
|
-
* role assumption and multi-factor authentication.
|
|
126
|
-
*/
|
|
127
|
-
export const fromIni =
|
|
128
|
-
(init: FromIniInit = {}): CredentialProvider =>
|
|
129
|
-
async () => {
|
|
130
|
-
const profiles = await parseKnownFiles(init);
|
|
131
|
-
return resolveProfileData(getMasterProfileName(init), profiles, init);
|
|
132
|
-
};
|
|
133
|
-
|
|
134
|
-
const resolveProfileData = async (
|
|
135
|
-
profileName: string,
|
|
136
|
-
profiles: ParsedIniData,
|
|
137
|
-
options: FromIniInit,
|
|
138
|
-
visitedProfiles: { [profileName: string]: true } = {}
|
|
139
|
-
): Promise<Credentials> => {
|
|
140
|
-
const data = profiles[profileName];
|
|
141
|
-
|
|
142
|
-
// If this is not the first profile visited, static credentials should be
|
|
143
|
-
// preferred over role assumption metadata. This special treatment of
|
|
144
|
-
// second and subsequent hops is to ensure compatibility with the AWS CLI.
|
|
145
|
-
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
146
|
-
return resolveStaticCredentials(data);
|
|
147
|
-
}
|
|
148
|
-
|
|
149
|
-
// If this is the first profile visited, role assumption keys should be
|
|
150
|
-
// given precedence over static credentials.
|
|
151
|
-
if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {
|
|
152
|
-
const {
|
|
153
|
-
external_id: ExternalId,
|
|
154
|
-
mfa_serial,
|
|
155
|
-
role_arn: RoleArn,
|
|
156
|
-
role_session_name: RoleSessionName = "aws-sdk-js-" + Date.now(),
|
|
157
|
-
source_profile,
|
|
158
|
-
credential_source,
|
|
159
|
-
} = data;
|
|
160
|
-
|
|
161
|
-
if (!options.roleAssumer) {
|
|
162
|
-
throw new CredentialsProviderError(
|
|
163
|
-
`Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`,
|
|
164
|
-
false
|
|
165
|
-
);
|
|
166
|
-
}
|
|
167
|
-
|
|
168
|
-
if (source_profile && source_profile in visitedProfiles) {
|
|
169
|
-
throw new CredentialsProviderError(
|
|
170
|
-
`Detected a cycle attempting to resolve credentials for profile` +
|
|
171
|
-
` ${getMasterProfileName(options)}. Profiles visited: ` +
|
|
172
|
-
Object.keys(visitedProfiles).join(", "),
|
|
173
|
-
false
|
|
174
|
-
);
|
|
175
|
-
}
|
|
176
|
-
|
|
177
|
-
const sourceCreds = source_profile
|
|
178
|
-
? resolveProfileData(source_profile, profiles, options, {
|
|
179
|
-
...visitedProfiles,
|
|
180
|
-
[source_profile]: true,
|
|
181
|
-
})
|
|
182
|
-
: resolveCredentialSource(credential_source!, profileName)();
|
|
183
|
-
|
|
184
|
-
const params: AssumeRoleParams = { RoleArn, RoleSessionName, ExternalId };
|
|
185
|
-
if (mfa_serial) {
|
|
186
|
-
if (!options.mfaCodeProvider) {
|
|
187
|
-
throw new CredentialsProviderError(
|
|
188
|
-
`Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`,
|
|
189
|
-
false
|
|
190
|
-
);
|
|
191
|
-
}
|
|
192
|
-
params.SerialNumber = mfa_serial;
|
|
193
|
-
params.TokenCode = await options.mfaCodeProvider(mfa_serial);
|
|
194
|
-
}
|
|
195
|
-
|
|
196
|
-
return options.roleAssumer(await sourceCreds, params);
|
|
197
|
-
}
|
|
198
|
-
|
|
199
|
-
// If no role assumption metadata is present, attempt to load static
|
|
200
|
-
// credentials from the selected profile.
|
|
201
|
-
if (isStaticCredsProfile(data)) {
|
|
202
|
-
return resolveStaticCredentials(data);
|
|
203
|
-
}
|
|
204
|
-
|
|
205
|
-
// If no static credentials are present, attempt to assume role with
|
|
206
|
-
// web identity if web_identity_token_file and role_arn is available
|
|
207
|
-
if (isWebIdentityProfile(data)) {
|
|
208
|
-
return resolveWebIdentityCredentials(data, options);
|
|
209
|
-
}
|
|
210
|
-
if (isSsoProfile(data)) {
|
|
211
|
-
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(data);
|
|
212
|
-
return fromSSO({
|
|
213
|
-
ssoStartUrl: sso_start_url,
|
|
214
|
-
ssoAccountId: sso_account_id,
|
|
215
|
-
ssoRegion: sso_region,
|
|
216
|
-
ssoRoleName: sso_role_name,
|
|
217
|
-
})();
|
|
218
|
-
}
|
|
219
|
-
|
|
220
|
-
// If the profile cannot be parsed or contains neither static credentials
|
|
221
|
-
// nor role assumption metadata, throw an error. This should be considered a
|
|
222
|
-
// terminal resolution error if a profile has been specified by the user
|
|
223
|
-
// (whether via a parameter, an environment variable, or another profile's
|
|
224
|
-
// `source_profile` key).
|
|
225
|
-
throw new CredentialsProviderError(
|
|
226
|
-
`Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`
|
|
227
|
-
);
|
|
228
|
-
};
|
|
229
|
-
|
|
230
|
-
/**
|
|
231
|
-
* Resolve the `credential_source` entry from the profile, and return the
|
|
232
|
-
* credential providers respectively. No memoization is needed for the
|
|
233
|
-
* credential source providers because memoization should be added outside the
|
|
234
|
-
* fromIni() provider. The source credential needs to be refreshed every time
|
|
235
|
-
* fromIni() is called.
|
|
236
|
-
*/
|
|
237
|
-
const resolveCredentialSource = (credentialSource: string, profileName: string): CredentialProvider => {
|
|
238
|
-
const sourceProvidersMap: { [name: string]: () => CredentialProvider } = {
|
|
239
|
-
EcsContainer: fromContainerMetadata,
|
|
240
|
-
Ec2InstanceMetadata: fromInstanceMetadata,
|
|
241
|
-
Environment: fromEnv,
|
|
242
|
-
};
|
|
243
|
-
if (credentialSource in sourceProvidersMap) {
|
|
244
|
-
return sourceProvidersMap[credentialSource]();
|
|
245
|
-
} else {
|
|
246
|
-
throw new CredentialsProviderError(
|
|
247
|
-
`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
|
|
248
|
-
`expected EcsContainer or Ec2InstanceMetadata or Environment.`
|
|
249
|
-
);
|
|
250
|
-
}
|
|
251
|
-
};
|
|
252
|
-
|
|
253
|
-
const resolveStaticCredentials = (profile: StaticCredsProfile): Promise<Credentials> =>
|
|
254
|
-
Promise.resolve({
|
|
255
|
-
accessKeyId: profile.aws_access_key_id,
|
|
256
|
-
secretAccessKey: profile.aws_secret_access_key,
|
|
257
|
-
sessionToken: profile.aws_session_token,
|
|
258
|
-
});
|
|
259
|
-
|
|
260
|
-
const resolveWebIdentityCredentials = async (profile: WebIdentityProfile, options: FromIniInit): Promise<Credentials> =>
|
|
261
|
-
fromTokenFile({
|
|
262
|
-
webIdentityTokenFile: profile.web_identity_token_file,
|
|
263
|
-
roleArn: profile.role_arn,
|
|
264
|
-
roleSessionName: profile.role_session_name,
|
|
265
|
-
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
|
|
266
|
-
})();
|
package/tsconfig.cjs.json
DELETED
package/tsconfig.es.json
DELETED