@aws-sdk/credential-provider-ini 3.32.0 → 3.36.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -3,6 +3,44 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
5
5
 
6
+ # [3.36.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.35.0...v3.36.0) (2021-10-08)
7
+
8
+
9
+ ### Features
10
+
11
+ * publish files in dist-* only ([#2873](https://github.com/aws/aws-sdk-js-v3/issues/2873)) ([53b4243](https://github.com/aws/aws-sdk-js-v3/commit/53b4243b066f25ff2412d5f0dea1036054b2df32))
12
+
13
+
14
+
15
+
16
+
17
+ # [3.35.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.34.0...v3.35.0) (2021-10-04)
18
+
19
+ **Note:** Version bump only for package @aws-sdk/credential-provider-ini
20
+
21
+
22
+
23
+
24
+
25
+ # [3.34.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.33.0...v3.34.0) (2021-09-24)
26
+
27
+
28
+ ### Features
29
+
30
+ * **non-clients:** remove comments from transpiled JS files ([#2813](https://github.com/aws/aws-sdk-js-v3/issues/2813)) ([e6fc7f3](https://github.com/aws/aws-sdk-js-v3/commit/e6fc7f3e0fa74785590ac19e7ed143c916bb9b6e))
31
+
32
+
33
+
34
+
35
+
36
+ # [3.33.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.32.0...v3.33.0) (2021-09-21)
37
+
38
+ **Note:** Version bump only for package @aws-sdk/credential-provider-ini
39
+
40
+
41
+
42
+
43
+
6
44
  # [3.32.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.31.0...v3.32.0) (2021-09-17)
7
45
 
8
46
  **Note:** Version bump only for package @aws-sdk/credential-provider-ini
@@ -0,0 +1,105 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.fromIni = void 0;
4
+ const credential_provider_env_1 = require("@aws-sdk/credential-provider-env");
5
+ const credential_provider_imds_1 = require("@aws-sdk/credential-provider-imds");
6
+ const credential_provider_sso_1 = require("@aws-sdk/credential-provider-sso");
7
+ const credential_provider_web_identity_1 = require("@aws-sdk/credential-provider-web-identity");
8
+ const property_provider_1 = require("@aws-sdk/property-provider");
9
+ const util_credentials_1 = require("@aws-sdk/util-credentials");
10
+ const isStaticCredsProfile = (arg) => Boolean(arg) &&
11
+ typeof arg === "object" &&
12
+ typeof arg.aws_access_key_id === "string" &&
13
+ typeof arg.aws_secret_access_key === "string" &&
14
+ ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
15
+ const isWebIdentityProfile = (arg) => Boolean(arg) &&
16
+ typeof arg === "object" &&
17
+ typeof arg.web_identity_token_file === "string" &&
18
+ typeof arg.role_arn === "string" &&
19
+ ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
20
+ const isAssumeRoleProfile = (arg) => Boolean(arg) &&
21
+ typeof arg === "object" &&
22
+ typeof arg.role_arn === "string" &&
23
+ ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
24
+ ["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
25
+ ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
26
+ const isAssumeRoleWithSourceProfile = (arg) => isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
27
+ const isAssumeRoleWithProviderProfile = (arg) => isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
28
+ const fromIni = (init = {}) => async () => {
29
+ const profiles = await util_credentials_1.parseKnownFiles(init);
30
+ return resolveProfileData(util_credentials_1.getMasterProfileName(init), profiles, init);
31
+ };
32
+ exports.fromIni = fromIni;
33
+ const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}) => {
34
+ const data = profiles[profileName];
35
+ if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
36
+ return resolveStaticCredentials(data);
37
+ }
38
+ if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {
39
+ const { external_id: ExternalId, mfa_serial, role_arn: RoleArn, role_session_name: RoleSessionName = "aws-sdk-js-" + Date.now(), source_profile, credential_source, } = data;
40
+ if (!options.roleAssumer) {
41
+ throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`, false);
42
+ }
43
+ if (source_profile && source_profile in visitedProfiles) {
44
+ throw new property_provider_1.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +
45
+ ` ${util_credentials_1.getMasterProfileName(options)}. Profiles visited: ` +
46
+ Object.keys(visitedProfiles).join(", "), false);
47
+ }
48
+ const sourceCreds = source_profile
49
+ ? resolveProfileData(source_profile, profiles, options, {
50
+ ...visitedProfiles,
51
+ [source_profile]: true,
52
+ })
53
+ : resolveCredentialSource(credential_source, profileName)();
54
+ const params = { RoleArn, RoleSessionName, ExternalId };
55
+ if (mfa_serial) {
56
+ if (!options.mfaCodeProvider) {
57
+ throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`, false);
58
+ }
59
+ params.SerialNumber = mfa_serial;
60
+ params.TokenCode = await options.mfaCodeProvider(mfa_serial);
61
+ }
62
+ return options.roleAssumer(await sourceCreds, params);
63
+ }
64
+ if (isStaticCredsProfile(data)) {
65
+ return resolveStaticCredentials(data);
66
+ }
67
+ if (isWebIdentityProfile(data)) {
68
+ return resolveWebIdentityCredentials(data, options);
69
+ }
70
+ if (credential_provider_sso_1.isSsoProfile(data)) {
71
+ const { sso_start_url, sso_account_id, sso_region, sso_role_name } = credential_provider_sso_1.validateSsoProfile(data);
72
+ return credential_provider_sso_1.fromSSO({
73
+ ssoStartUrl: sso_start_url,
74
+ ssoAccountId: sso_account_id,
75
+ ssoRegion: sso_region,
76
+ ssoRoleName: sso_role_name,
77
+ })();
78
+ }
79
+ throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`);
80
+ };
81
+ const resolveCredentialSource = (credentialSource, profileName) => {
82
+ const sourceProvidersMap = {
83
+ EcsContainer: credential_provider_imds_1.fromContainerMetadata,
84
+ Ec2InstanceMetadata: credential_provider_imds_1.fromInstanceMetadata,
85
+ Environment: credential_provider_env_1.fromEnv,
86
+ };
87
+ if (credentialSource in sourceProvidersMap) {
88
+ return sourceProvidersMap[credentialSource]();
89
+ }
90
+ else {
91
+ throw new property_provider_1.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
92
+ `expected EcsContainer or Ec2InstanceMetadata or Environment.`);
93
+ }
94
+ };
95
+ const resolveStaticCredentials = (profile) => Promise.resolve({
96
+ accessKeyId: profile.aws_access_key_id,
97
+ secretAccessKey: profile.aws_secret_access_key,
98
+ sessionToken: profile.aws_session_token,
99
+ });
100
+ const resolveWebIdentityCredentials = async (profile, options) => credential_provider_web_identity_1.fromTokenFile({
101
+ webIdentityTokenFile: profile.web_identity_token_file,
102
+ roleArn: profile.role_arn,
103
+ roleSessionName: profile.role_session_name,
104
+ roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
105
+ })();
@@ -0,0 +1,141 @@
1
+ import { __assign, __awaiter, __generator } from "tslib";
2
+ import { fromEnv } from "@aws-sdk/credential-provider-env";
3
+ import { fromContainerMetadata, fromInstanceMetadata } from "@aws-sdk/credential-provider-imds";
4
+ import { fromSSO, isSsoProfile, validateSsoProfile } from "@aws-sdk/credential-provider-sso";
5
+ import { fromTokenFile } from "@aws-sdk/credential-provider-web-identity";
6
+ import { CredentialsProviderError } from "@aws-sdk/property-provider";
7
+ import { getMasterProfileName, parseKnownFiles } from "@aws-sdk/util-credentials";
8
+ var isStaticCredsProfile = function (arg) {
9
+ return Boolean(arg) &&
10
+ typeof arg === "object" &&
11
+ typeof arg.aws_access_key_id === "string" &&
12
+ typeof arg.aws_secret_access_key === "string" &&
13
+ ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
14
+ };
15
+ var isWebIdentityProfile = function (arg) {
16
+ return Boolean(arg) &&
17
+ typeof arg === "object" &&
18
+ typeof arg.web_identity_token_file === "string" &&
19
+ typeof arg.role_arn === "string" &&
20
+ ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
21
+ };
22
+ var isAssumeRoleProfile = function (arg) {
23
+ return Boolean(arg) &&
24
+ typeof arg === "object" &&
25
+ typeof arg.role_arn === "string" &&
26
+ ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
27
+ ["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
28
+ ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
29
+ };
30
+ var isAssumeRoleWithSourceProfile = function (arg) {
31
+ return isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
32
+ };
33
+ var isAssumeRoleWithProviderProfile = function (arg) {
34
+ return isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
35
+ };
36
+ export var fromIni = function (init) {
37
+ if (init === void 0) { init = {}; }
38
+ return function () { return __awaiter(void 0, void 0, void 0, function () {
39
+ var profiles;
40
+ return __generator(this, function (_a) {
41
+ switch (_a.label) {
42
+ case 0: return [4, parseKnownFiles(init)];
43
+ case 1:
44
+ profiles = _a.sent();
45
+ return [2, resolveProfileData(getMasterProfileName(init), profiles, init)];
46
+ }
47
+ });
48
+ }); };
49
+ };
50
+ var resolveProfileData = function (profileName, profiles, options, visitedProfiles) {
51
+ if (visitedProfiles === void 0) { visitedProfiles = {}; }
52
+ return __awaiter(void 0, void 0, void 0, function () {
53
+ var data, ExternalId, mfa_serial, RoleArn, _a, RoleSessionName, source_profile, credential_source, sourceCreds, params, _b, _c, _d, _e, sso_start_url, sso_account_id, sso_region, sso_role_name;
54
+ var _f;
55
+ return __generator(this, function (_g) {
56
+ switch (_g.label) {
57
+ case 0:
58
+ data = profiles[profileName];
59
+ if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
60
+ return [2, resolveStaticCredentials(data)];
61
+ }
62
+ if (!(isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data))) return [3, 4];
63
+ ExternalId = data.external_id, mfa_serial = data.mfa_serial, RoleArn = data.role_arn, _a = data.role_session_name, RoleSessionName = _a === void 0 ? "aws-sdk-js-" + Date.now() : _a, source_profile = data.source_profile, credential_source = data.credential_source;
64
+ if (!options.roleAssumer) {
65
+ throw new CredentialsProviderError("Profile " + profileName + " requires a role to be assumed, but no" + " role assumption callback was provided.", false);
66
+ }
67
+ if (source_profile && source_profile in visitedProfiles) {
68
+ throw new CredentialsProviderError("Detected a cycle attempting to resolve credentials for profile" +
69
+ (" " + getMasterProfileName(options) + ". Profiles visited: ") +
70
+ Object.keys(visitedProfiles).join(", "), false);
71
+ }
72
+ sourceCreds = source_profile
73
+ ? resolveProfileData(source_profile, profiles, options, __assign(__assign({}, visitedProfiles), (_f = {}, _f[source_profile] = true, _f)))
74
+ : resolveCredentialSource(credential_source, profileName)();
75
+ params = { RoleArn: RoleArn, RoleSessionName: RoleSessionName, ExternalId: ExternalId };
76
+ if (!mfa_serial) return [3, 2];
77
+ if (!options.mfaCodeProvider) {
78
+ throw new CredentialsProviderError("Profile " + profileName + " requires multi-factor authentication," + " but no MFA code callback was provided.", false);
79
+ }
80
+ params.SerialNumber = mfa_serial;
81
+ _b = params;
82
+ return [4, options.mfaCodeProvider(mfa_serial)];
83
+ case 1:
84
+ _b.TokenCode = _g.sent();
85
+ _g.label = 2;
86
+ case 2:
87
+ _d = (_c = options).roleAssumer;
88
+ return [4, sourceCreds];
89
+ case 3: return [2, _d.apply(_c, [_g.sent(), params])];
90
+ case 4:
91
+ if (isStaticCredsProfile(data)) {
92
+ return [2, resolveStaticCredentials(data)];
93
+ }
94
+ if (isWebIdentityProfile(data)) {
95
+ return [2, resolveWebIdentityCredentials(data, options)];
96
+ }
97
+ if (isSsoProfile(data)) {
98
+ _e = validateSsoProfile(data), sso_start_url = _e.sso_start_url, sso_account_id = _e.sso_account_id, sso_region = _e.sso_region, sso_role_name = _e.sso_role_name;
99
+ return [2, fromSSO({
100
+ ssoStartUrl: sso_start_url,
101
+ ssoAccountId: sso_account_id,
102
+ ssoRegion: sso_region,
103
+ ssoRoleName: sso_role_name,
104
+ })()];
105
+ }
106
+ throw new CredentialsProviderError("Profile " + profileName + " could not be found or parsed in shared" + " credentials file.");
107
+ }
108
+ });
109
+ });
110
+ };
111
+ var resolveCredentialSource = function (credentialSource, profileName) {
112
+ var sourceProvidersMap = {
113
+ EcsContainer: fromContainerMetadata,
114
+ Ec2InstanceMetadata: fromInstanceMetadata,
115
+ Environment: fromEnv,
116
+ };
117
+ if (credentialSource in sourceProvidersMap) {
118
+ return sourceProvidersMap[credentialSource]();
119
+ }
120
+ else {
121
+ throw new CredentialsProviderError("Unsupported credential source in profile " + profileName + ". Got " + credentialSource + ", " +
122
+ "expected EcsContainer or Ec2InstanceMetadata or Environment.");
123
+ }
124
+ };
125
+ var resolveStaticCredentials = function (profile) {
126
+ return Promise.resolve({
127
+ accessKeyId: profile.aws_access_key_id,
128
+ secretAccessKey: profile.aws_secret_access_key,
129
+ sessionToken: profile.aws_session_token,
130
+ });
131
+ };
132
+ var resolveWebIdentityCredentials = function (profile, options) { return __awaiter(void 0, void 0, void 0, function () {
133
+ return __generator(this, function (_a) {
134
+ return [2, fromTokenFile({
135
+ webIdentityTokenFile: profile.web_identity_token_file,
136
+ roleArn: profile.role_arn,
137
+ roleSessionName: profile.role_session_name,
138
+ roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
139
+ })()];
140
+ });
141
+ }); };
File without changes
File without changes
package/package.json CHANGED
@@ -1,14 +1,15 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-ini",
3
- "version": "3.32.0",
3
+ "version": "3.36.0",
4
4
  "description": "AWS credential provider that sources credentials from ~/.aws/credentials and ~/.aws/config",
5
- "main": "./dist/cjs/index.js",
6
- "module": "./dist/es/index.js",
5
+ "main": "./dist-cjs/index.js",
6
+ "module": "./dist-es/index.js",
7
7
  "scripts": {
8
+ "build": "yarn build:cjs && yarn build:es && yarn build:types",
8
9
  "build:cjs": "tsc -p tsconfig.cjs.json",
9
10
  "build:es": "tsc -p tsconfig.es.json",
10
- "build": "yarn build:es && yarn build:cjs",
11
- "downlevel-dts": "downlevel-dts dist/types dist/types/ts3.4",
11
+ "build:types": "tsc -p tsconfig.types.json",
12
+ "downlevel-dts": "downlevel-dts dist-types dist-types/ts3.4",
12
13
  "test": "jest"
13
14
  },
14
15
  "keywords": [
@@ -21,14 +22,14 @@
21
22
  },
22
23
  "license": "Apache-2.0",
23
24
  "dependencies": {
24
- "@aws-sdk/credential-provider-env": "3.32.0",
25
- "@aws-sdk/credential-provider-imds": "3.32.0",
26
- "@aws-sdk/credential-provider-sso": "3.32.0",
27
- "@aws-sdk/credential-provider-web-identity": "3.32.0",
28
- "@aws-sdk/property-provider": "3.32.0",
29
- "@aws-sdk/shared-ini-file-loader": "3.32.0",
30
- "@aws-sdk/types": "3.32.0",
31
- "@aws-sdk/util-credentials": "3.32.0",
25
+ "@aws-sdk/credential-provider-env": "3.36.0",
26
+ "@aws-sdk/credential-provider-imds": "3.36.0",
27
+ "@aws-sdk/credential-provider-sso": "3.36.0",
28
+ "@aws-sdk/credential-provider-web-identity": "3.36.0",
29
+ "@aws-sdk/property-provider": "3.36.0",
30
+ "@aws-sdk/shared-ini-file-loader": "3.36.0",
31
+ "@aws-sdk/types": "3.36.0",
32
+ "@aws-sdk/util-credentials": "3.36.0",
32
33
  "tslib": "^2.3.0"
33
34
  },
34
35
  "devDependencies": {
@@ -37,17 +38,20 @@
37
38
  "jest": "^26.1.0",
38
39
  "typescript": "~4.3.5"
39
40
  },
40
- "types": "./dist/types/index.d.ts",
41
+ "types": "./dist-types/index.d.ts",
41
42
  "engines": {
42
43
  "node": ">= 10.0.0"
43
44
  },
44
45
  "typesVersions": {
45
46
  "<4.0": {
46
- "dist/types/*": [
47
- "dist/types/ts3.4/*"
47
+ "dist-types/*": [
48
+ "dist-types/ts3.4/*"
48
49
  ]
49
50
  }
50
51
  },
52
+ "files": [
53
+ "dist-*"
54
+ ],
51
55
  "homepage": "https://github.com/aws/aws-sdk-js-v3/tree/main/packages/credential-provider-ini",
52
56
  "repository": {
53
57
  "type": "git",
package/dist/cjs/index.js DELETED
@@ -1,131 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.fromIni = void 0;
4
- const credential_provider_env_1 = require("@aws-sdk/credential-provider-env");
5
- const credential_provider_imds_1 = require("@aws-sdk/credential-provider-imds");
6
- const credential_provider_sso_1 = require("@aws-sdk/credential-provider-sso");
7
- const credential_provider_web_identity_1 = require("@aws-sdk/credential-provider-web-identity");
8
- const property_provider_1 = require("@aws-sdk/property-provider");
9
- const util_credentials_1 = require("@aws-sdk/util-credentials");
10
- const isStaticCredsProfile = (arg) => Boolean(arg) &&
11
- typeof arg === "object" &&
12
- typeof arg.aws_access_key_id === "string" &&
13
- typeof arg.aws_secret_access_key === "string" &&
14
- ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
15
- const isWebIdentityProfile = (arg) => Boolean(arg) &&
16
- typeof arg === "object" &&
17
- typeof arg.web_identity_token_file === "string" &&
18
- typeof arg.role_arn === "string" &&
19
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
20
- const isAssumeRoleProfile = (arg) => Boolean(arg) &&
21
- typeof arg === "object" &&
22
- typeof arg.role_arn === "string" &&
23
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
24
- ["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
25
- ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
26
- const isAssumeRoleWithSourceProfile = (arg) => isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
27
- const isAssumeRoleWithProviderProfile = (arg) => isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
28
- /**
29
- * Creates a credential provider that will read from ini files and supports
30
- * role assumption and multi-factor authentication.
31
- */
32
- const fromIni = (init = {}) => async () => {
33
- const profiles = await util_credentials_1.parseKnownFiles(init);
34
- return resolveProfileData(util_credentials_1.getMasterProfileName(init), profiles, init);
35
- };
36
- exports.fromIni = fromIni;
37
- const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}) => {
38
- const data = profiles[profileName];
39
- // If this is not the first profile visited, static credentials should be
40
- // preferred over role assumption metadata. This special treatment of
41
- // second and subsequent hops is to ensure compatibility with the AWS CLI.
42
- if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
43
- return resolveStaticCredentials(data);
44
- }
45
- // If this is the first profile visited, role assumption keys should be
46
- // given precedence over static credentials.
47
- if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {
48
- const { external_id: ExternalId, mfa_serial, role_arn: RoleArn, role_session_name: RoleSessionName = "aws-sdk-js-" + Date.now(), source_profile, credential_source, } = data;
49
- if (!options.roleAssumer) {
50
- throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`, false);
51
- }
52
- if (source_profile && source_profile in visitedProfiles) {
53
- throw new property_provider_1.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +
54
- ` ${util_credentials_1.getMasterProfileName(options)}. Profiles visited: ` +
55
- Object.keys(visitedProfiles).join(", "), false);
56
- }
57
- const sourceCreds = source_profile
58
- ? resolveProfileData(source_profile, profiles, options, {
59
- ...visitedProfiles,
60
- [source_profile]: true,
61
- })
62
- : resolveCredentialSource(credential_source, profileName)();
63
- const params = { RoleArn, RoleSessionName, ExternalId };
64
- if (mfa_serial) {
65
- if (!options.mfaCodeProvider) {
66
- throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`, false);
67
- }
68
- params.SerialNumber = mfa_serial;
69
- params.TokenCode = await options.mfaCodeProvider(mfa_serial);
70
- }
71
- return options.roleAssumer(await sourceCreds, params);
72
- }
73
- // If no role assumption metadata is present, attempt to load static
74
- // credentials from the selected profile.
75
- if (isStaticCredsProfile(data)) {
76
- return resolveStaticCredentials(data);
77
- }
78
- // If no static credentials are present, attempt to assume role with
79
- // web identity if web_identity_token_file and role_arn is available
80
- if (isWebIdentityProfile(data)) {
81
- return resolveWebIdentityCredentials(data, options);
82
- }
83
- if (credential_provider_sso_1.isSsoProfile(data)) {
84
- const { sso_start_url, sso_account_id, sso_region, sso_role_name } = credential_provider_sso_1.validateSsoProfile(data);
85
- return credential_provider_sso_1.fromSSO({
86
- ssoStartUrl: sso_start_url,
87
- ssoAccountId: sso_account_id,
88
- ssoRegion: sso_region,
89
- ssoRoleName: sso_role_name,
90
- })();
91
- }
92
- // If the profile cannot be parsed or contains neither static credentials
93
- // nor role assumption metadata, throw an error. This should be considered a
94
- // terminal resolution error if a profile has been specified by the user
95
- // (whether via a parameter, an environment variable, or another profile's
96
- // `source_profile` key).
97
- throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`);
98
- };
99
- /**
100
- * Resolve the `credential_source` entry from the profile, and return the
101
- * credential providers respectively. No memoization is needed for the
102
- * credential source providers because memoization should be added outside the
103
- * fromIni() provider. The source credential needs to be refreshed every time
104
- * fromIni() is called.
105
- */
106
- const resolveCredentialSource = (credentialSource, profileName) => {
107
- const sourceProvidersMap = {
108
- EcsContainer: credential_provider_imds_1.fromContainerMetadata,
109
- Ec2InstanceMetadata: credential_provider_imds_1.fromInstanceMetadata,
110
- Environment: credential_provider_env_1.fromEnv,
111
- };
112
- if (credentialSource in sourceProvidersMap) {
113
- return sourceProvidersMap[credentialSource]();
114
- }
115
- else {
116
- throw new property_provider_1.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
117
- `expected EcsContainer or Ec2InstanceMetadata or Environment.`);
118
- }
119
- };
120
- const resolveStaticCredentials = (profile) => Promise.resolve({
121
- accessKeyId: profile.aws_access_key_id,
122
- secretAccessKey: profile.aws_secret_access_key,
123
- sessionToken: profile.aws_session_token,
124
- });
125
- const resolveWebIdentityCredentials = async (profile, options) => credential_provider_web_identity_1.fromTokenFile({
126
- webIdentityTokenFile: profile.web_identity_token_file,
127
- roleArn: profile.role_arn,
128
- roleSessionName: profile.role_session_name,
129
- roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
130
- })();
131
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;AAAA,8EAA2D;AAC3D,gFAAgG;AAChG,8EAA6F;AAC7F,gGAA2G;AAC3G,kEAAsE;AAGtE,gEAAqG;AAuErG,MAAM,oBAAoB,GAAG,CAAC,GAAQ,EAA6B,EAAE,CACnE,OAAO,CAAC,GAAG,CAAC;IACZ,OAAO,GAAG,KAAK,QAAQ;IACvB,OAAO,GAAG,CAAC,iBAAiB,KAAK,QAAQ;IACzC,OAAO,GAAG,CAAC,qBAAqB,KAAK,QAAQ;IAC7C,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC,CAAC;AAQrE,MAAM,oBAAoB,GAAG,CAAC,GAAQ,EAA6B,EAAE,CACnE,OAAO,CAAC,GAAG,CAAC;IACZ,OAAO,GAAG,KAAK,QAAQ;IACvB,OAAO,GAAG,CAAC,uBAAuB,KAAK,QAAQ;IAC/C,OAAO,GAAG,CAAC,QAAQ,KAAK,QAAQ;IAChC,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC,CAAC;AAYrE,MAAM,mBAAmB,GAAG,CAAC,GAAQ,EAAE,EAAE,CACvC,OAAO,CAAC,GAAG,CAAC;IACZ,OAAO,GAAG,KAAK,QAAQ;IACvB,OAAO,GAAG,CAAC,QAAQ,KAAK,QAAQ;IAChC,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;IAClE,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;IAC5D,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAC;AAE9D,MAAM,6BAA6B,GAAG,CAAC,GAAQ,EAAsC,EAAE,CACrF,mBAAmB,CAAC,GAAG,CAAC,IAAI,OAAO,GAAG,CAAC,cAAc,KAAK,QAAQ,IAAI,OAAO,GAAG,CAAC,iBAAiB,KAAK,WAAW,CAAC;AAErH,MAAM,+BAA+B,GAAG,CAAC,GAAQ,EAAwC,EAAE,CACzF,mBAAmB,CAAC,GAAG,CAAC,IAAI,OAAO,GAAG,CAAC,iBAAiB,KAAK,QAAQ,IAAI,OAAO,GAAG,CAAC,cAAc,KAAK,WAAW,CAAC;AAErH;;;GAGG;AACI,MAAM,OAAO,GAClB,CAAC,OAAoB,EAAE,EAAsB,EAAE,CAC/C,KAAK,IAAI,EAAE;IACT,MAAM,QAAQ,GAAG,MAAM,kCAAe,CAAC,IAAI,CAAC,CAAC;IAC7C,OAAO,kBAAkB,CAAC,uCAAoB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,CAAC,CAAC;AACxE,CAAC,CAAC;AALS,QAAA,OAAO,WAKhB;AAEJ,MAAM,kBAAkB,GAAG,KAAK,EAC9B,WAAmB,EACnB,QAAuB,EACvB,OAAoB,EACpB,kBAAmD,EAAE,EAC/B,EAAE;IACxB,MAAM,IAAI,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;IAEnC,yEAAyE;IACzE,qEAAqE;IACrE,0EAA0E;IAC1E,IAAI,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,CAAC,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;QACzE,OAAO,wBAAwB,CAAC,IAAI,CAAC,CAAC;KACvC;IAED,uEAAuE;IACvE,4CAA4C;IAC5C,IAAI,6BAA6B,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,IAAI,CAAC,EAAE;QAChF,MAAM,EACJ,WAAW,EAAE,UAAU,EACvB,UAAU,EACV,QAAQ,EAAE,OAAO,EACjB,iBAAiB,EAAE,eAAe,GAAG,aAAa,GAAG,IAAI,CAAC,GAAG,EAAE,EAC/D,cAAc,EACd,iBAAiB,GAClB,GAAG,IAAI,CAAC;QAET,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE;YACxB,MAAM,IAAI,4CAAwB,CAChC,WAAW,WAAW,wCAAwC,GAAG,yCAAyC,EAC1G,KAAK,CACN,CAAC;SACH;QAED,IAAI,cAAc,IAAI,cAAc,IAAI,eAAe,EAAE;YACvD,MAAM,IAAI,4CAAwB,CAChC,gEAAgE;gBAC9D,IAAI,uCAAoB,CAAC,OAAO,CAAC,sBAAsB;gBACvD,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EACzC,KAAK,CACN,CAAC;SACH;QAED,MAAM,WAAW,GAAG,cAAc;YAChC,CAAC,CAAC,kBAAkB,CAAC,cAAc,EAAE,QAAQ,EAAE,OAAO,EAAE;gBACpD,GAAG,eAAe;gBAClB,CAAC,cAAc,CAAC,EAAE,IAAI;aACvB,CAAC;YACJ,CAAC,CAAC,uBAAuB,CAAC,iBAAkB,EAAE,WAAW,CAAC,EAAE,CAAC;QAE/D,MAAM,MAAM,GAAqB,EAAE,OAAO,EAAE,eAAe,EAAE,UAAU,EAAE,CAAC;QAC1E,IAAI,UAAU,EAAE;YACd,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE;gBAC5B,MAAM,IAAI,4CAAwB,CAChC,WAAW,WAAW,wCAAwC,GAAG,yCAAyC,EAC1G,KAAK,CACN,CAAC;aACH;YACD,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;YACjC,MAAM,CAAC,SAAS,GAAG,MAAM,OAAO,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC;SAC9D;QAED,OAAO,OAAO,CAAC,WAAW,CAAC,MAAM,WAAW,EAAE,MAAM,CAAC,CAAC;KACvD;IAED,oEAAoE;IACpE,yCAAyC;IACzC,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;QAC9B,OAAO,wBAAwB,CAAC,IAAI,CAAC,CAAC;KACvC;IAED,oEAAoE;IACpE,oEAAoE;IACpE,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;QAC9B,OAAO,6BAA6B,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;KACrD;IACD,IAAI,sCAAY,CAAC,IAAI,CAAC,EAAE;QACtB,MAAM,EAAE,aAAa,EAAE,cAAc,EAAE,UAAU,EAAE,aAAa,EAAE,GAAG,4CAAkB,CAAC,IAAI,CAAC,CAAC;QAC9F,OAAO,iCAAO,CAAC;YACb,WAAW,EAAE,aAAa;YAC1B,YAAY,EAAE,cAAc;YAC5B,SAAS,EAAE,UAAU;YACrB,WAAW,EAAE,aAAa;SAC3B,CAAC,EAAE,CAAC;KACN;IAED,yEAAyE;IACzE,4EAA4E;IAC5E,wEAAwE;IACxE,0EAA0E;IAC1E,yBAAyB;IACzB,MAAM,IAAI,4CAAwB,CAChC,WAAW,WAAW,yCAAyC,GAAG,oBAAoB,CACvF,CAAC;AACJ,CAAC,CAAC;AAEF;;;;;;GAMG;AACH,MAAM,uBAAuB,GAAG,CAAC,gBAAwB,EAAE,WAAmB,EAAsB,EAAE;IACpG,MAAM,kBAAkB,GAAiD;QACvE,YAAY,EAAE,gDAAqB;QACnC,mBAAmB,EAAE,+CAAoB;QACzC,WAAW,EAAE,iCAAO;KACrB,CAAC;IACF,IAAI,gBAAgB,IAAI,kBAAkB,EAAE;QAC1C,OAAO,kBAAkB,CAAC,gBAAgB,CAAC,EAAE,CAAC;KAC/C;SAAM;QACL,MAAM,IAAI,4CAAwB,CAChC,4CAA4C,WAAW,SAAS,gBAAgB,IAAI;YAClF,8DAA8D,CACjE,CAAC;KACH;AACH,CAAC,CAAC;AAEF,MAAM,wBAAwB,GAAG,CAAC,OAA2B,EAAwB,EAAE,CACrF,OAAO,CAAC,OAAO,CAAC;IACd,WAAW,EAAE,OAAO,CAAC,iBAAiB;IACtC,eAAe,EAAE,OAAO,CAAC,qBAAqB;IAC9C,YAAY,EAAE,OAAO,CAAC,iBAAiB;CACxC,CAAC,CAAC;AAEL,MAAM,6BAA6B,GAAG,KAAK,EAAE,OAA2B,EAAE,OAAoB,EAAwB,EAAE,CACtH,gDAAa,CAAC;IACZ,oBAAoB,EAAE,OAAO,CAAC,uBAAuB;IACrD,OAAO,EAAE,OAAO,CAAC,QAAQ;IACzB,eAAe,EAAE,OAAO,CAAC,iBAAiB;IAC1C,0BAA0B,EAAE,OAAO,CAAC,0BAA0B;CAC/D,CAAC,EAAE,CAAC","sourcesContent":["import { fromEnv } from \"@aws-sdk/credential-provider-env\";\nimport { fromContainerMetadata, fromInstanceMetadata } from \"@aws-sdk/credential-provider-imds\";\nimport { fromSSO, isSsoProfile, validateSsoProfile } from \"@aws-sdk/credential-provider-sso\";\nimport { AssumeRoleWithWebIdentityParams, fromTokenFile } from \"@aws-sdk/credential-provider-web-identity\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { ParsedIniData, Profile } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/util-credentials\";\n\n/**\n * @see http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/STS.html#assumeRole-property\n * TODO update the above to link to V3 docs\n */\nexport interface AssumeRoleParams {\n  /**\n   * The identifier of the role to be assumed.\n   */\n  RoleArn: string;\n\n  /**\n   * A name for the assumed role session.\n   */\n  RoleSessionName: string;\n\n  /**\n   * A unique identifier that is used by third parties when assuming roles in\n   * their customers' accounts.\n   */\n  ExternalId?: string;\n\n  /**\n   * The identification number of the MFA device that is associated with the\n   * user who is making the `AssumeRole` call.\n   */\n  SerialNumber?: string;\n\n  /**\n   * The value provided by the MFA device.\n   */\n  TokenCode?: string;\n}\n\nexport interface FromIniInit extends SourceProfileInit {\n  /**\n   * A function that returns a promise fulfilled with an MFA token code for\n   * the provided MFA Serial code. If a profile requires an MFA code and\n   * `mfaCodeProvider` is not a valid function, the credential provider\n   * promise will be rejected.\n   *\n   * @param mfaSerial The serial code of the MFA device specified.\n   */\n  mfaCodeProvider?: (mfaSerial: string) => Promise<string>;\n\n  /**\n   * A function that assumes a role and returns a promise fulfilled with\n   * credentials for the assumed role.\n   *\n   * @param sourceCreds The credentials with which to assume a role.\n   * @param params\n   */\n  roleAssumer?: (sourceCreds: Credentials, params: AssumeRoleParams) => Promise<Credentials>;\n\n  /**\n   * A function that assumes a role with web identity and returns a promise fulfilled with\n   * credentials for the assumed role.\n   *\n   * @param sourceCreds The credentials with which to assume a role.\n   * @param params\n   */\n  roleAssumerWithWebIdentity?: (params: AssumeRoleWithWebIdentityParams) => Promise<Credentials>;\n}\n\ninterface StaticCredsProfile extends Profile {\n  aws_access_key_id: string;\n  aws_secret_access_key: string;\n  aws_session_token?: string;\n}\n\nconst isStaticCredsProfile = (arg: any): arg is StaticCredsProfile =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.aws_access_key_id === \"string\" &&\n  typeof arg.aws_secret_access_key === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1;\n\ninterface WebIdentityProfile extends Profile {\n  web_identity_token_file: string;\n  role_arn: string;\n  role_session_name?: string;\n}\n\nconst isWebIdentityProfile = (arg: any): arg is WebIdentityProfile =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.web_identity_token_file === \"string\" &&\n  typeof arg.role_arn === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\n\ninterface AssumeRoleWithSourceProfile extends Profile {\n  role_arn: string;\n  source_profile: string;\n}\n\ninterface AssumeRoleWithProviderProfile extends Profile {\n  role_arn: string;\n  credential_source: string;\n}\n\nconst isAssumeRoleProfile = (arg: any) =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.role_arn === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1;\n\nconst isAssumeRoleWithSourceProfile = (arg: any): arg is AssumeRoleWithSourceProfile =>\n  isAssumeRoleProfile(arg) && typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n\nconst isAssumeRoleWithProviderProfile = (arg: any): arg is AssumeRoleWithProviderProfile =>\n  isAssumeRoleProfile(arg) && typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n\n/**\n * Creates a credential provider that will read from ini files and supports\n * role assumption and multi-factor authentication.\n */\nexport const fromIni =\n  (init: FromIniInit = {}): CredentialProvider =>\n  async () => {\n    const profiles = await parseKnownFiles(init);\n    return resolveProfileData(getMasterProfileName(init), profiles, init);\n  };\n\nconst resolveProfileData = async (\n  profileName: string,\n  profiles: ParsedIniData,\n  options: FromIniInit,\n  visitedProfiles: { [profileName: string]: true } = {}\n): Promise<Credentials> => {\n  const data = profiles[profileName];\n\n  // If this is not the first profile visited, static credentials should be\n  // preferred over role assumption metadata. This special treatment of\n  // second and subsequent hops is to ensure compatibility with the AWS CLI.\n  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n    return resolveStaticCredentials(data);\n  }\n\n  // If this is the first profile visited, role assumption keys should be\n  // given precedence over static credentials.\n  if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {\n    const {\n      external_id: ExternalId,\n      mfa_serial,\n      role_arn: RoleArn,\n      role_session_name: RoleSessionName = \"aws-sdk-js-\" + Date.now(),\n      source_profile,\n      credential_source,\n    } = data;\n\n    if (!options.roleAssumer) {\n      throw new CredentialsProviderError(\n        `Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`,\n        false\n      );\n    }\n\n    if (source_profile && source_profile in visitedProfiles) {\n      throw new CredentialsProviderError(\n        `Detected a cycle attempting to resolve credentials for profile` +\n          ` ${getMasterProfileName(options)}. Profiles visited: ` +\n          Object.keys(visitedProfiles).join(\", \"),\n        false\n      );\n    }\n\n    const sourceCreds = source_profile\n      ? resolveProfileData(source_profile, profiles, options, {\n          ...visitedProfiles,\n          [source_profile]: true,\n        })\n      : resolveCredentialSource(credential_source!, profileName)();\n\n    const params: AssumeRoleParams = { RoleArn, RoleSessionName, ExternalId };\n    if (mfa_serial) {\n      if (!options.mfaCodeProvider) {\n        throw new CredentialsProviderError(\n          `Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`,\n          false\n        );\n      }\n      params.SerialNumber = mfa_serial;\n      params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n    }\n\n    return options.roleAssumer(await sourceCreds, params);\n  }\n\n  // If no role assumption metadata is present, attempt to load static\n  // credentials from the selected profile.\n  if (isStaticCredsProfile(data)) {\n    return resolveStaticCredentials(data);\n  }\n\n  // If no static credentials are present, attempt to assume role with\n  // web identity if web_identity_token_file and role_arn is available\n  if (isWebIdentityProfile(data)) {\n    return resolveWebIdentityCredentials(data, options);\n  }\n  if (isSsoProfile(data)) {\n    const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(data);\n    return fromSSO({\n      ssoStartUrl: sso_start_url,\n      ssoAccountId: sso_account_id,\n      ssoRegion: sso_region,\n      ssoRoleName: sso_role_name,\n    })();\n  }\n\n  // If the profile cannot be parsed or contains neither static credentials\n  // nor role assumption metadata, throw an error. This should be considered a\n  // terminal resolution error if a profile has been specified by the user\n  // (whether via a parameter, an environment variable, or another profile's\n  // `source_profile` key).\n  throw new CredentialsProviderError(\n    `Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`\n  );\n};\n\n/**\n * Resolve the `credential_source` entry from the profile, and return the\n * credential providers respectively. No memoization is needed for the\n * credential source providers because memoization should be added outside the\n * fromIni() provider. The source credential needs to be refreshed every time\n * fromIni() is called.\n */\nconst resolveCredentialSource = (credentialSource: string, profileName: string): CredentialProvider => {\n  const sourceProvidersMap: { [name: string]: () => CredentialProvider } = {\n    EcsContainer: fromContainerMetadata,\n    Ec2InstanceMetadata: fromInstanceMetadata,\n    Environment: fromEnv,\n  };\n  if (credentialSource in sourceProvidersMap) {\n    return sourceProvidersMap[credentialSource]();\n  } else {\n    throw new CredentialsProviderError(\n      `Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n        `expected EcsContainer or Ec2InstanceMetadata or Environment.`\n    );\n  }\n};\n\nconst resolveStaticCredentials = (profile: StaticCredsProfile): Promise<Credentials> =>\n  Promise.resolve({\n    accessKeyId: profile.aws_access_key_id,\n    secretAccessKey: profile.aws_secret_access_key,\n    sessionToken: profile.aws_session_token,\n  });\n\nconst resolveWebIdentityCredentials = async (profile: WebIdentityProfile, options: FromIniInit): Promise<Credentials> =>\n  fromTokenFile({\n    webIdentityTokenFile: profile.web_identity_token_file,\n    roleArn: profile.role_arn,\n    roleSessionName: profile.role_session_name,\n    roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n  })();\n"]}
package/dist/es/index.js DELETED
@@ -1,165 +0,0 @@
1
- import { __assign, __awaiter, __generator } from "tslib";
2
- import { fromEnv } from "@aws-sdk/credential-provider-env";
3
- import { fromContainerMetadata, fromInstanceMetadata } from "@aws-sdk/credential-provider-imds";
4
- import { fromSSO, isSsoProfile, validateSsoProfile } from "@aws-sdk/credential-provider-sso";
5
- import { fromTokenFile } from "@aws-sdk/credential-provider-web-identity";
6
- import { CredentialsProviderError } from "@aws-sdk/property-provider";
7
- import { getMasterProfileName, parseKnownFiles } from "@aws-sdk/util-credentials";
8
- var isStaticCredsProfile = function (arg) {
9
- return Boolean(arg) &&
10
- typeof arg === "object" &&
11
- typeof arg.aws_access_key_id === "string" &&
12
- typeof arg.aws_secret_access_key === "string" &&
13
- ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
14
- };
15
- var isWebIdentityProfile = function (arg) {
16
- return Boolean(arg) &&
17
- typeof arg === "object" &&
18
- typeof arg.web_identity_token_file === "string" &&
19
- typeof arg.role_arn === "string" &&
20
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
21
- };
22
- var isAssumeRoleProfile = function (arg) {
23
- return Boolean(arg) &&
24
- typeof arg === "object" &&
25
- typeof arg.role_arn === "string" &&
26
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
27
- ["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
28
- ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
29
- };
30
- var isAssumeRoleWithSourceProfile = function (arg) {
31
- return isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
32
- };
33
- var isAssumeRoleWithProviderProfile = function (arg) {
34
- return isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
35
- };
36
- /**
37
- * Creates a credential provider that will read from ini files and supports
38
- * role assumption and multi-factor authentication.
39
- */
40
- export var fromIni = function (init) {
41
- if (init === void 0) { init = {}; }
42
- return function () { return __awaiter(void 0, void 0, void 0, function () {
43
- var profiles;
44
- return __generator(this, function (_a) {
45
- switch (_a.label) {
46
- case 0: return [4 /*yield*/, parseKnownFiles(init)];
47
- case 1:
48
- profiles = _a.sent();
49
- return [2 /*return*/, resolveProfileData(getMasterProfileName(init), profiles, init)];
50
- }
51
- });
52
- }); };
53
- };
54
- var resolveProfileData = function (profileName, profiles, options, visitedProfiles) {
55
- if (visitedProfiles === void 0) { visitedProfiles = {}; }
56
- return __awaiter(void 0, void 0, void 0, function () {
57
- var data, ExternalId, mfa_serial, RoleArn, _a, RoleSessionName, source_profile, credential_source, sourceCreds, params, _b, _c, _d, _e, sso_start_url, sso_account_id, sso_region, sso_role_name;
58
- var _f;
59
- return __generator(this, function (_g) {
60
- switch (_g.label) {
61
- case 0:
62
- data = profiles[profileName];
63
- // If this is not the first profile visited, static credentials should be
64
- // preferred over role assumption metadata. This special treatment of
65
- // second and subsequent hops is to ensure compatibility with the AWS CLI.
66
- if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
67
- return [2 /*return*/, resolveStaticCredentials(data)];
68
- }
69
- if (!(isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data))) return [3 /*break*/, 4];
70
- ExternalId = data.external_id, mfa_serial = data.mfa_serial, RoleArn = data.role_arn, _a = data.role_session_name, RoleSessionName = _a === void 0 ? "aws-sdk-js-" + Date.now() : _a, source_profile = data.source_profile, credential_source = data.credential_source;
71
- if (!options.roleAssumer) {
72
- throw new CredentialsProviderError("Profile " + profileName + " requires a role to be assumed, but no" + " role assumption callback was provided.", false);
73
- }
74
- if (source_profile && source_profile in visitedProfiles) {
75
- throw new CredentialsProviderError("Detected a cycle attempting to resolve credentials for profile" +
76
- (" " + getMasterProfileName(options) + ". Profiles visited: ") +
77
- Object.keys(visitedProfiles).join(", "), false);
78
- }
79
- sourceCreds = source_profile
80
- ? resolveProfileData(source_profile, profiles, options, __assign(__assign({}, visitedProfiles), (_f = {}, _f[source_profile] = true, _f)))
81
- : resolveCredentialSource(credential_source, profileName)();
82
- params = { RoleArn: RoleArn, RoleSessionName: RoleSessionName, ExternalId: ExternalId };
83
- if (!mfa_serial) return [3 /*break*/, 2];
84
- if (!options.mfaCodeProvider) {
85
- throw new CredentialsProviderError("Profile " + profileName + " requires multi-factor authentication," + " but no MFA code callback was provided.", false);
86
- }
87
- params.SerialNumber = mfa_serial;
88
- _b = params;
89
- return [4 /*yield*/, options.mfaCodeProvider(mfa_serial)];
90
- case 1:
91
- _b.TokenCode = _g.sent();
92
- _g.label = 2;
93
- case 2:
94
- _d = (_c = options).roleAssumer;
95
- return [4 /*yield*/, sourceCreds];
96
- case 3: return [2 /*return*/, _d.apply(_c, [_g.sent(), params])];
97
- case 4:
98
- // If no role assumption metadata is present, attempt to load static
99
- // credentials from the selected profile.
100
- if (isStaticCredsProfile(data)) {
101
- return [2 /*return*/, resolveStaticCredentials(data)];
102
- }
103
- // If no static credentials are present, attempt to assume role with
104
- // web identity if web_identity_token_file and role_arn is available
105
- if (isWebIdentityProfile(data)) {
106
- return [2 /*return*/, resolveWebIdentityCredentials(data, options)];
107
- }
108
- if (isSsoProfile(data)) {
109
- _e = validateSsoProfile(data), sso_start_url = _e.sso_start_url, sso_account_id = _e.sso_account_id, sso_region = _e.sso_region, sso_role_name = _e.sso_role_name;
110
- return [2 /*return*/, fromSSO({
111
- ssoStartUrl: sso_start_url,
112
- ssoAccountId: sso_account_id,
113
- ssoRegion: sso_region,
114
- ssoRoleName: sso_role_name,
115
- })()];
116
- }
117
- // If the profile cannot be parsed or contains neither static credentials
118
- // nor role assumption metadata, throw an error. This should be considered a
119
- // terminal resolution error if a profile has been specified by the user
120
- // (whether via a parameter, an environment variable, or another profile's
121
- // `source_profile` key).
122
- throw new CredentialsProviderError("Profile " + profileName + " could not be found or parsed in shared" + " credentials file.");
123
- }
124
- });
125
- });
126
- };
127
- /**
128
- * Resolve the `credential_source` entry from the profile, and return the
129
- * credential providers respectively. No memoization is needed for the
130
- * credential source providers because memoization should be added outside the
131
- * fromIni() provider. The source credential needs to be refreshed every time
132
- * fromIni() is called.
133
- */
134
- var resolveCredentialSource = function (credentialSource, profileName) {
135
- var sourceProvidersMap = {
136
- EcsContainer: fromContainerMetadata,
137
- Ec2InstanceMetadata: fromInstanceMetadata,
138
- Environment: fromEnv,
139
- };
140
- if (credentialSource in sourceProvidersMap) {
141
- return sourceProvidersMap[credentialSource]();
142
- }
143
- else {
144
- throw new CredentialsProviderError("Unsupported credential source in profile " + profileName + ". Got " + credentialSource + ", " +
145
- "expected EcsContainer or Ec2InstanceMetadata or Environment.");
146
- }
147
- };
148
- var resolveStaticCredentials = function (profile) {
149
- return Promise.resolve({
150
- accessKeyId: profile.aws_access_key_id,
151
- secretAccessKey: profile.aws_secret_access_key,
152
- sessionToken: profile.aws_session_token,
153
- });
154
- };
155
- var resolveWebIdentityCredentials = function (profile, options) { return __awaiter(void 0, void 0, void 0, function () {
156
- return __generator(this, function (_a) {
157
- return [2 /*return*/, fromTokenFile({
158
- webIdentityTokenFile: profile.web_identity_token_file,
159
- roleArn: profile.role_arn,
160
- roleSessionName: profile.role_session_name,
161
- roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
162
- })()];
163
- });
164
- }); };
165
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,kCAAkC,CAAC;AAC3D,OAAO,EAAE,qBAAqB,EAAE,oBAAoB,EAAE,MAAM,mCAAmC,CAAC;AAChG,OAAO,EAAE,OAAO,EAAE,YAAY,EAAE,kBAAkB,EAAE,MAAM,kCAAkC,CAAC;AAC7F,OAAO,EAAmC,aAAa,EAAE,MAAM,2CAA2C,CAAC;AAC3G,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AAGtE,OAAO,EAAE,oBAAoB,EAAE,eAAe,EAAqB,MAAM,2BAA2B,CAAC;AAuErG,IAAM,oBAAoB,GAAG,UAAC,GAAQ;IACpC,OAAA,OAAO,CAAC,GAAG,CAAC;QACZ,OAAO,GAAG,KAAK,QAAQ;QACvB,OAAO,GAAG,CAAC,iBAAiB,KAAK,QAAQ;QACzC,OAAO,GAAG,CAAC,qBAAqB,KAAK,QAAQ;QAC7C,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;AAJlE,CAIkE,CAAC;AAQrE,IAAM,oBAAoB,GAAG,UAAC,GAAQ;IACpC,OAAA,OAAO,CAAC,GAAG,CAAC;QACZ,OAAO,GAAG,KAAK,QAAQ;QACvB,OAAO,GAAG,CAAC,uBAAuB,KAAK,QAAQ;QAC/C,OAAO,GAAG,CAAC,QAAQ,KAAK,QAAQ;QAChC,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;AAJlE,CAIkE,CAAC;AAYrE,IAAM,mBAAmB,GAAG,UAAC,GAAQ;IACnC,OAAA,OAAO,CAAC,GAAG,CAAC;QACZ,OAAO,GAAG,KAAK,QAAQ;QACvB,OAAO,GAAG,CAAC,QAAQ,KAAK,QAAQ;QAChC,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC;QAClE,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;QAC5D,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;AAL3D,CAK2D,CAAC;AAE9D,IAAM,6BAA6B,GAAG,UAAC,GAAQ;IAC7C,OAAA,mBAAmB,CAAC,GAAG,CAAC,IAAI,OAAO,GAAG,CAAC,cAAc,KAAK,QAAQ,IAAI,OAAO,GAAG,CAAC,iBAAiB,KAAK,WAAW;AAAlH,CAAkH,CAAC;AAErH,IAAM,+BAA+B,GAAG,UAAC,GAAQ;IAC/C,OAAA,mBAAmB,CAAC,GAAG,CAAC,IAAI,OAAO,GAAG,CAAC,iBAAiB,KAAK,QAAQ,IAAI,OAAO,GAAG,CAAC,cAAc,KAAK,WAAW;AAAlH,CAAkH,CAAC;AAErH;;;GAGG;AACH,MAAM,CAAC,IAAM,OAAO,GAClB,UAAC,IAAsB;IAAtB,qBAAA,EAAA,SAAsB;IACvB,OAAA;;;;wBACmB,qBAAM,eAAe,CAAC,IAAI,CAAC,EAAA;;oBAAtC,QAAQ,GAAG,SAA2B;oBAC5C,sBAAO,kBAAkB,CAAC,oBAAoB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,CAAC,EAAC;;;SACvE;AAHD,CAGC,CAAC;AAEJ,IAAM,kBAAkB,GAAG,UACzB,WAAmB,EACnB,QAAuB,EACvB,OAAoB,EACpB,eAAqD;IAArD,gCAAA,EAAA,oBAAqD;;;;;;;oBAE/C,IAAI,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;oBAEnC,yEAAyE;oBACzE,qEAAqE;oBACrE,0EAA0E;oBAC1E,IAAI,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,MAAM,GAAG,CAAC,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;wBACzE,sBAAO,wBAAwB,CAAC,IAAI,CAAC,EAAC;qBACvC;yBAIG,CAAA,6BAA6B,CAAC,IAAI,CAAC,IAAI,+BAA+B,CAAC,IAAI,CAAC,CAAA,EAA5E,wBAA4E;oBAE/D,UAAU,GAMrB,IAAI,YANiB,EACvB,UAAU,GAKR,IAAI,WALI,EACA,OAAO,GAIf,IAAI,SAJW,EACjB,KAGE,IAAI,kBAHyD,EAA5C,eAAe,mBAAG,aAAa,GAAG,IAAI,CAAC,GAAG,EAAE,KAAA,EAC/D,cAAc,GAEZ,IAAI,eAFQ,EACd,iBAAiB,GACf,IAAI,kBADW,CACV;oBAET,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE;wBACxB,MAAM,IAAI,wBAAwB,CAChC,aAAW,WAAW,2CAAwC,GAAG,yCAAyC,EAC1G,KAAK,CACN,CAAC;qBACH;oBAED,IAAI,cAAc,IAAI,cAAc,IAAI,eAAe,EAAE;wBACvD,MAAM,IAAI,wBAAwB,CAChC,gEAAgE;6BAC9D,MAAI,oBAAoB,CAAC,OAAO,CAAC,yBAAsB,CAAA;4BACvD,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,EACzC,KAAK,CACN,CAAC;qBACH;oBAEK,WAAW,GAAG,cAAc;wBAChC,CAAC,CAAC,kBAAkB,CAAC,cAAc,EAAE,QAAQ,EAAE,OAAO,wBAC/C,eAAe,gBACjB,cAAc,IAAG,IAAI,OACtB;wBACJ,CAAC,CAAC,uBAAuB,CAAC,iBAAkB,EAAE,WAAW,CAAC,EAAE,CAAC;oBAEzD,MAAM,GAAqB,EAAE,OAAO,SAAA,EAAE,eAAe,iBAAA,EAAE,UAAU,YAAA,EAAE,CAAC;yBACtE,UAAU,EAAV,wBAAU;oBACZ,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE;wBAC5B,MAAM,IAAI,wBAAwB,CAChC,aAAW,WAAW,2CAAwC,GAAG,yCAAyC,EAC1G,KAAK,CACN,CAAC;qBACH;oBACD,MAAM,CAAC,YAAY,GAAG,UAAU,CAAC;oBACjC,KAAA,MAAM,CAAA;oBAAa,qBAAM,OAAO,CAAC,eAAe,CAAC,UAAU,CAAC,EAAA;;oBAA5D,GAAO,SAAS,GAAG,SAAyC,CAAC;;;oBAGxD,KAAA,CAAA,KAAA,OAAO,CAAA,CAAC,WAAW,CAAA;oBAAC,qBAAM,WAAW,EAAA;wBAA5C,sBAAO,cAAoB,SAAiB,EAAE,MAAM,EAAC,EAAC;;oBAGxD,oEAAoE;oBACpE,yCAAyC;oBACzC,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;wBAC9B,sBAAO,wBAAwB,CAAC,IAAI,CAAC,EAAC;qBACvC;oBAED,oEAAoE;oBACpE,oEAAoE;oBACpE,IAAI,oBAAoB,CAAC,IAAI,CAAC,EAAE;wBAC9B,sBAAO,6BAA6B,CAAC,IAAI,EAAE,OAAO,CAAC,EAAC;qBACrD;oBACD,IAAI,YAAY,CAAC,IAAI,CAAC,EAAE;wBAChB,KAA+D,kBAAkB,CAAC,IAAI,CAAC,EAArF,aAAa,mBAAA,EAAE,cAAc,oBAAA,EAAE,UAAU,gBAAA,EAAE,aAAa,mBAAA,CAA8B;wBAC9F,sBAAO,OAAO,CAAC;gCACb,WAAW,EAAE,aAAa;gCAC1B,YAAY,EAAE,cAAc;gCAC5B,SAAS,EAAE,UAAU;gCACrB,WAAW,EAAE,aAAa;6BAC3B,CAAC,EAAE,EAAC;qBACN;oBAED,yEAAyE;oBACzE,4EAA4E;oBAC5E,wEAAwE;oBACxE,0EAA0E;oBAC1E,yBAAyB;oBACzB,MAAM,IAAI,wBAAwB,CAChC,aAAW,WAAW,4CAAyC,GAAG,oBAAoB,CACvF,CAAC;;;;CACH,CAAC;AAEF;;;;;;GAMG;AACH,IAAM,uBAAuB,GAAG,UAAC,gBAAwB,EAAE,WAAmB;IAC5E,IAAM,kBAAkB,GAAiD;QACvE,YAAY,EAAE,qBAAqB;QACnC,mBAAmB,EAAE,oBAAoB;QACzC,WAAW,EAAE,OAAO;KACrB,CAAC;IACF,IAAI,gBAAgB,IAAI,kBAAkB,EAAE;QAC1C,OAAO,kBAAkB,CAAC,gBAAgB,CAAC,EAAE,CAAC;KAC/C;SAAM;QACL,MAAM,IAAI,wBAAwB,CAChC,8CAA4C,WAAW,cAAS,gBAAgB,OAAI;YAClF,8DAA8D,CACjE,CAAC;KACH;AACH,CAAC,CAAC;AAEF,IAAM,wBAAwB,GAAG,UAAC,OAA2B;IAC3D,OAAA,OAAO,CAAC,OAAO,CAAC;QACd,WAAW,EAAE,OAAO,CAAC,iBAAiB;QACtC,eAAe,EAAE,OAAO,CAAC,qBAAqB;QAC9C,YAAY,EAAE,OAAO,CAAC,iBAAiB;KACxC,CAAC;AAJF,CAIE,CAAC;AAEL,IAAM,6BAA6B,GAAG,UAAO,OAA2B,EAAE,OAAoB;;QAC5F,sBAAA,aAAa,CAAC;gBACZ,oBAAoB,EAAE,OAAO,CAAC,uBAAuB;gBACrD,OAAO,EAAE,OAAO,CAAC,QAAQ;gBACzB,eAAe,EAAE,OAAO,CAAC,iBAAiB;gBAC1C,0BAA0B,EAAE,OAAO,CAAC,0BAA0B;aAC/D,CAAC,EAAE,EAAA;;KAAA,CAAC","sourcesContent":["import { fromEnv } from \"@aws-sdk/credential-provider-env\";\nimport { fromContainerMetadata, fromInstanceMetadata } from \"@aws-sdk/credential-provider-imds\";\nimport { fromSSO, isSsoProfile, validateSsoProfile } from \"@aws-sdk/credential-provider-sso\";\nimport { AssumeRoleWithWebIdentityParams, fromTokenFile } from \"@aws-sdk/credential-provider-web-identity\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { ParsedIniData, Profile } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/util-credentials\";\n\n/**\n * @see http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/STS.html#assumeRole-property\n * TODO update the above to link to V3 docs\n */\nexport interface AssumeRoleParams {\n  /**\n   * The identifier of the role to be assumed.\n   */\n  RoleArn: string;\n\n  /**\n   * A name for the assumed role session.\n   */\n  RoleSessionName: string;\n\n  /**\n   * A unique identifier that is used by third parties when assuming roles in\n   * their customers' accounts.\n   */\n  ExternalId?: string;\n\n  /**\n   * The identification number of the MFA device that is associated with the\n   * user who is making the `AssumeRole` call.\n   */\n  SerialNumber?: string;\n\n  /**\n   * The value provided by the MFA device.\n   */\n  TokenCode?: string;\n}\n\nexport interface FromIniInit extends SourceProfileInit {\n  /**\n   * A function that returns a promise fulfilled with an MFA token code for\n   * the provided MFA Serial code. If a profile requires an MFA code and\n   * `mfaCodeProvider` is not a valid function, the credential provider\n   * promise will be rejected.\n   *\n   * @param mfaSerial The serial code of the MFA device specified.\n   */\n  mfaCodeProvider?: (mfaSerial: string) => Promise<string>;\n\n  /**\n   * A function that assumes a role and returns a promise fulfilled with\n   * credentials for the assumed role.\n   *\n   * @param sourceCreds The credentials with which to assume a role.\n   * @param params\n   */\n  roleAssumer?: (sourceCreds: Credentials, params: AssumeRoleParams) => Promise<Credentials>;\n\n  /**\n   * A function that assumes a role with web identity and returns a promise fulfilled with\n   * credentials for the assumed role.\n   *\n   * @param sourceCreds The credentials with which to assume a role.\n   * @param params\n   */\n  roleAssumerWithWebIdentity?: (params: AssumeRoleWithWebIdentityParams) => Promise<Credentials>;\n}\n\ninterface StaticCredsProfile extends Profile {\n  aws_access_key_id: string;\n  aws_secret_access_key: string;\n  aws_session_token?: string;\n}\n\nconst isStaticCredsProfile = (arg: any): arg is StaticCredsProfile =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.aws_access_key_id === \"string\" &&\n  typeof arg.aws_secret_access_key === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.aws_session_token) > -1;\n\ninterface WebIdentityProfile extends Profile {\n  web_identity_token_file: string;\n  role_arn: string;\n  role_session_name?: string;\n}\n\nconst isWebIdentityProfile = (arg: any): arg is WebIdentityProfile =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.web_identity_token_file === \"string\" &&\n  typeof arg.role_arn === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1;\n\ninterface AssumeRoleWithSourceProfile extends Profile {\n  role_arn: string;\n  source_profile: string;\n}\n\ninterface AssumeRoleWithProviderProfile extends Profile {\n  role_arn: string;\n  credential_source: string;\n}\n\nconst isAssumeRoleProfile = (arg: any) =>\n  Boolean(arg) &&\n  typeof arg === \"object\" &&\n  typeof arg.role_arn === \"string\" &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.role_session_name) > -1 &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.external_id) > -1 &&\n  [\"undefined\", \"string\"].indexOf(typeof arg.mfa_serial) > -1;\n\nconst isAssumeRoleWithSourceProfile = (arg: any): arg is AssumeRoleWithSourceProfile =>\n  isAssumeRoleProfile(arg) && typeof arg.source_profile === \"string\" && typeof arg.credential_source === \"undefined\";\n\nconst isAssumeRoleWithProviderProfile = (arg: any): arg is AssumeRoleWithProviderProfile =>\n  isAssumeRoleProfile(arg) && typeof arg.credential_source === \"string\" && typeof arg.source_profile === \"undefined\";\n\n/**\n * Creates a credential provider that will read from ini files and supports\n * role assumption and multi-factor authentication.\n */\nexport const fromIni =\n  (init: FromIniInit = {}): CredentialProvider =>\n  async () => {\n    const profiles = await parseKnownFiles(init);\n    return resolveProfileData(getMasterProfileName(init), profiles, init);\n  };\n\nconst resolveProfileData = async (\n  profileName: string,\n  profiles: ParsedIniData,\n  options: FromIniInit,\n  visitedProfiles: { [profileName: string]: true } = {}\n): Promise<Credentials> => {\n  const data = profiles[profileName];\n\n  // If this is not the first profile visited, static credentials should be\n  // preferred over role assumption metadata. This special treatment of\n  // second and subsequent hops is to ensure compatibility with the AWS CLI.\n  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {\n    return resolveStaticCredentials(data);\n  }\n\n  // If this is the first profile visited, role assumption keys should be\n  // given precedence over static credentials.\n  if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {\n    const {\n      external_id: ExternalId,\n      mfa_serial,\n      role_arn: RoleArn,\n      role_session_name: RoleSessionName = \"aws-sdk-js-\" + Date.now(),\n      source_profile,\n      credential_source,\n    } = data;\n\n    if (!options.roleAssumer) {\n      throw new CredentialsProviderError(\n        `Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`,\n        false\n      );\n    }\n\n    if (source_profile && source_profile in visitedProfiles) {\n      throw new CredentialsProviderError(\n        `Detected a cycle attempting to resolve credentials for profile` +\n          ` ${getMasterProfileName(options)}. Profiles visited: ` +\n          Object.keys(visitedProfiles).join(\", \"),\n        false\n      );\n    }\n\n    const sourceCreds = source_profile\n      ? resolveProfileData(source_profile, profiles, options, {\n          ...visitedProfiles,\n          [source_profile]: true,\n        })\n      : resolveCredentialSource(credential_source!, profileName)();\n\n    const params: AssumeRoleParams = { RoleArn, RoleSessionName, ExternalId };\n    if (mfa_serial) {\n      if (!options.mfaCodeProvider) {\n        throw new CredentialsProviderError(\n          `Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`,\n          false\n        );\n      }\n      params.SerialNumber = mfa_serial;\n      params.TokenCode = await options.mfaCodeProvider(mfa_serial);\n    }\n\n    return options.roleAssumer(await sourceCreds, params);\n  }\n\n  // If no role assumption metadata is present, attempt to load static\n  // credentials from the selected profile.\n  if (isStaticCredsProfile(data)) {\n    return resolveStaticCredentials(data);\n  }\n\n  // If no static credentials are present, attempt to assume role with\n  // web identity if web_identity_token_file and role_arn is available\n  if (isWebIdentityProfile(data)) {\n    return resolveWebIdentityCredentials(data, options);\n  }\n  if (isSsoProfile(data)) {\n    const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(data);\n    return fromSSO({\n      ssoStartUrl: sso_start_url,\n      ssoAccountId: sso_account_id,\n      ssoRegion: sso_region,\n      ssoRoleName: sso_role_name,\n    })();\n  }\n\n  // If the profile cannot be parsed or contains neither static credentials\n  // nor role assumption metadata, throw an error. This should be considered a\n  // terminal resolution error if a profile has been specified by the user\n  // (whether via a parameter, an environment variable, or another profile's\n  // `source_profile` key).\n  throw new CredentialsProviderError(\n    `Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`\n  );\n};\n\n/**\n * Resolve the `credential_source` entry from the profile, and return the\n * credential providers respectively. No memoization is needed for the\n * credential source providers because memoization should be added outside the\n * fromIni() provider. The source credential needs to be refreshed every time\n * fromIni() is called.\n */\nconst resolveCredentialSource = (credentialSource: string, profileName: string): CredentialProvider => {\n  const sourceProvidersMap: { [name: string]: () => CredentialProvider } = {\n    EcsContainer: fromContainerMetadata,\n    Ec2InstanceMetadata: fromInstanceMetadata,\n    Environment: fromEnv,\n  };\n  if (credentialSource in sourceProvidersMap) {\n    return sourceProvidersMap[credentialSource]();\n  } else {\n    throw new CredentialsProviderError(\n      `Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +\n        `expected EcsContainer or Ec2InstanceMetadata or Environment.`\n    );\n  }\n};\n\nconst resolveStaticCredentials = (profile: StaticCredsProfile): Promise<Credentials> =>\n  Promise.resolve({\n    accessKeyId: profile.aws_access_key_id,\n    secretAccessKey: profile.aws_secret_access_key,\n    sessionToken: profile.aws_session_token,\n  });\n\nconst resolveWebIdentityCredentials = async (profile: WebIdentityProfile, options: FromIniInit): Promise<Credentials> =>\n  fromTokenFile({\n    webIdentityTokenFile: profile.web_identity_token_file,\n    roleArn: profile.role_arn,\n    roleSessionName: profile.role_session_name,\n    roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,\n  })();\n"]}
package/src/index.ts DELETED
@@ -1,266 +0,0 @@
1
- import { fromEnv } from "@aws-sdk/credential-provider-env";
2
- import { fromContainerMetadata, fromInstanceMetadata } from "@aws-sdk/credential-provider-imds";
3
- import { fromSSO, isSsoProfile, validateSsoProfile } from "@aws-sdk/credential-provider-sso";
4
- import { AssumeRoleWithWebIdentityParams, fromTokenFile } from "@aws-sdk/credential-provider-web-identity";
5
- import { CredentialsProviderError } from "@aws-sdk/property-provider";
6
- import { ParsedIniData, Profile } from "@aws-sdk/shared-ini-file-loader";
7
- import { CredentialProvider, Credentials } from "@aws-sdk/types";
8
- import { getMasterProfileName, parseKnownFiles, SourceProfileInit } from "@aws-sdk/util-credentials";
9
-
10
- /**
11
- * @see http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/STS.html#assumeRole-property
12
- * TODO update the above to link to V3 docs
13
- */
14
- export interface AssumeRoleParams {
15
- /**
16
- * The identifier of the role to be assumed.
17
- */
18
- RoleArn: string;
19
-
20
- /**
21
- * A name for the assumed role session.
22
- */
23
- RoleSessionName: string;
24
-
25
- /**
26
- * A unique identifier that is used by third parties when assuming roles in
27
- * their customers' accounts.
28
- */
29
- ExternalId?: string;
30
-
31
- /**
32
- * The identification number of the MFA device that is associated with the
33
- * user who is making the `AssumeRole` call.
34
- */
35
- SerialNumber?: string;
36
-
37
- /**
38
- * The value provided by the MFA device.
39
- */
40
- TokenCode?: string;
41
- }
42
-
43
- export interface FromIniInit extends SourceProfileInit {
44
- /**
45
- * A function that returns a promise fulfilled with an MFA token code for
46
- * the provided MFA Serial code. If a profile requires an MFA code and
47
- * `mfaCodeProvider` is not a valid function, the credential provider
48
- * promise will be rejected.
49
- *
50
- * @param mfaSerial The serial code of the MFA device specified.
51
- */
52
- mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
53
-
54
- /**
55
- * A function that assumes a role and returns a promise fulfilled with
56
- * credentials for the assumed role.
57
- *
58
- * @param sourceCreds The credentials with which to assume a role.
59
- * @param params
60
- */
61
- roleAssumer?: (sourceCreds: Credentials, params: AssumeRoleParams) => Promise<Credentials>;
62
-
63
- /**
64
- * A function that assumes a role with web identity and returns a promise fulfilled with
65
- * credentials for the assumed role.
66
- *
67
- * @param sourceCreds The credentials with which to assume a role.
68
- * @param params
69
- */
70
- roleAssumerWithWebIdentity?: (params: AssumeRoleWithWebIdentityParams) => Promise<Credentials>;
71
- }
72
-
73
- interface StaticCredsProfile extends Profile {
74
- aws_access_key_id: string;
75
- aws_secret_access_key: string;
76
- aws_session_token?: string;
77
- }
78
-
79
- const isStaticCredsProfile = (arg: any): arg is StaticCredsProfile =>
80
- Boolean(arg) &&
81
- typeof arg === "object" &&
82
- typeof arg.aws_access_key_id === "string" &&
83
- typeof arg.aws_secret_access_key === "string" &&
84
- ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
85
-
86
- interface WebIdentityProfile extends Profile {
87
- web_identity_token_file: string;
88
- role_arn: string;
89
- role_session_name?: string;
90
- }
91
-
92
- const isWebIdentityProfile = (arg: any): arg is WebIdentityProfile =>
93
- Boolean(arg) &&
94
- typeof arg === "object" &&
95
- typeof arg.web_identity_token_file === "string" &&
96
- typeof arg.role_arn === "string" &&
97
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
98
-
99
- interface AssumeRoleWithSourceProfile extends Profile {
100
- role_arn: string;
101
- source_profile: string;
102
- }
103
-
104
- interface AssumeRoleWithProviderProfile extends Profile {
105
- role_arn: string;
106
- credential_source: string;
107
- }
108
-
109
- const isAssumeRoleProfile = (arg: any) =>
110
- Boolean(arg) &&
111
- typeof arg === "object" &&
112
- typeof arg.role_arn === "string" &&
113
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
114
- ["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
115
- ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1;
116
-
117
- const isAssumeRoleWithSourceProfile = (arg: any): arg is AssumeRoleWithSourceProfile =>
118
- isAssumeRoleProfile(arg) && typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
119
-
120
- const isAssumeRoleWithProviderProfile = (arg: any): arg is AssumeRoleWithProviderProfile =>
121
- isAssumeRoleProfile(arg) && typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
122
-
123
- /**
124
- * Creates a credential provider that will read from ini files and supports
125
- * role assumption and multi-factor authentication.
126
- */
127
- export const fromIni =
128
- (init: FromIniInit = {}): CredentialProvider =>
129
- async () => {
130
- const profiles = await parseKnownFiles(init);
131
- return resolveProfileData(getMasterProfileName(init), profiles, init);
132
- };
133
-
134
- const resolveProfileData = async (
135
- profileName: string,
136
- profiles: ParsedIniData,
137
- options: FromIniInit,
138
- visitedProfiles: { [profileName: string]: true } = {}
139
- ): Promise<Credentials> => {
140
- const data = profiles[profileName];
141
-
142
- // If this is not the first profile visited, static credentials should be
143
- // preferred over role assumption metadata. This special treatment of
144
- // second and subsequent hops is to ensure compatibility with the AWS CLI.
145
- if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
146
- return resolveStaticCredentials(data);
147
- }
148
-
149
- // If this is the first profile visited, role assumption keys should be
150
- // given precedence over static credentials.
151
- if (isAssumeRoleWithSourceProfile(data) || isAssumeRoleWithProviderProfile(data)) {
152
- const {
153
- external_id: ExternalId,
154
- mfa_serial,
155
- role_arn: RoleArn,
156
- role_session_name: RoleSessionName = "aws-sdk-js-" + Date.now(),
157
- source_profile,
158
- credential_source,
159
- } = data;
160
-
161
- if (!options.roleAssumer) {
162
- throw new CredentialsProviderError(
163
- `Profile ${profileName} requires a role to be assumed, but no` + ` role assumption callback was provided.`,
164
- false
165
- );
166
- }
167
-
168
- if (source_profile && source_profile in visitedProfiles) {
169
- throw new CredentialsProviderError(
170
- `Detected a cycle attempting to resolve credentials for profile` +
171
- ` ${getMasterProfileName(options)}. Profiles visited: ` +
172
- Object.keys(visitedProfiles).join(", "),
173
- false
174
- );
175
- }
176
-
177
- const sourceCreds = source_profile
178
- ? resolveProfileData(source_profile, profiles, options, {
179
- ...visitedProfiles,
180
- [source_profile]: true,
181
- })
182
- : resolveCredentialSource(credential_source!, profileName)();
183
-
184
- const params: AssumeRoleParams = { RoleArn, RoleSessionName, ExternalId };
185
- if (mfa_serial) {
186
- if (!options.mfaCodeProvider) {
187
- throw new CredentialsProviderError(
188
- `Profile ${profileName} requires multi-factor authentication,` + ` but no MFA code callback was provided.`,
189
- false
190
- );
191
- }
192
- params.SerialNumber = mfa_serial;
193
- params.TokenCode = await options.mfaCodeProvider(mfa_serial);
194
- }
195
-
196
- return options.roleAssumer(await sourceCreds, params);
197
- }
198
-
199
- // If no role assumption metadata is present, attempt to load static
200
- // credentials from the selected profile.
201
- if (isStaticCredsProfile(data)) {
202
- return resolveStaticCredentials(data);
203
- }
204
-
205
- // If no static credentials are present, attempt to assume role with
206
- // web identity if web_identity_token_file and role_arn is available
207
- if (isWebIdentityProfile(data)) {
208
- return resolveWebIdentityCredentials(data, options);
209
- }
210
- if (isSsoProfile(data)) {
211
- const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(data);
212
- return fromSSO({
213
- ssoStartUrl: sso_start_url,
214
- ssoAccountId: sso_account_id,
215
- ssoRegion: sso_region,
216
- ssoRoleName: sso_role_name,
217
- })();
218
- }
219
-
220
- // If the profile cannot be parsed or contains neither static credentials
221
- // nor role assumption metadata, throw an error. This should be considered a
222
- // terminal resolution error if a profile has been specified by the user
223
- // (whether via a parameter, an environment variable, or another profile's
224
- // `source_profile` key).
225
- throw new CredentialsProviderError(
226
- `Profile ${profileName} could not be found or parsed in shared` + ` credentials file.`
227
- );
228
- };
229
-
230
- /**
231
- * Resolve the `credential_source` entry from the profile, and return the
232
- * credential providers respectively. No memoization is needed for the
233
- * credential source providers because memoization should be added outside the
234
- * fromIni() provider. The source credential needs to be refreshed every time
235
- * fromIni() is called.
236
- */
237
- const resolveCredentialSource = (credentialSource: string, profileName: string): CredentialProvider => {
238
- const sourceProvidersMap: { [name: string]: () => CredentialProvider } = {
239
- EcsContainer: fromContainerMetadata,
240
- Ec2InstanceMetadata: fromInstanceMetadata,
241
- Environment: fromEnv,
242
- };
243
- if (credentialSource in sourceProvidersMap) {
244
- return sourceProvidersMap[credentialSource]();
245
- } else {
246
- throw new CredentialsProviderError(
247
- `Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
248
- `expected EcsContainer or Ec2InstanceMetadata or Environment.`
249
- );
250
- }
251
- };
252
-
253
- const resolveStaticCredentials = (profile: StaticCredsProfile): Promise<Credentials> =>
254
- Promise.resolve({
255
- accessKeyId: profile.aws_access_key_id,
256
- secretAccessKey: profile.aws_secret_access_key,
257
- sessionToken: profile.aws_session_token,
258
- });
259
-
260
- const resolveWebIdentityCredentials = async (profile: WebIdentityProfile, options: FromIniInit): Promise<Credentials> =>
261
- fromTokenFile({
262
- webIdentityTokenFile: profile.web_identity_token_file,
263
- roleArn: profile.role_arn,
264
- roleSessionName: profile.role_session_name,
265
- roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
266
- })();
package/tsconfig.cjs.json DELETED
@@ -1,10 +0,0 @@
1
- {
2
- "compilerOptions": {
3
- "declarationDir": "./dist/types",
4
- "rootDir": "./src",
5
- "outDir": "./dist/cjs",
6
- "baseUrl": "."
7
- },
8
- "extends": "../../tsconfig.cjs.json",
9
- "include": ["src/"]
10
- }
package/tsconfig.es.json DELETED
@@ -1,11 +0,0 @@
1
- {
2
- "compilerOptions": {
3
- "lib": ["es5", "es2015.promise", "es2015.collection"],
4
- "declarationDir": "./dist/types",
5
- "rootDir": "./src",
6
- "outDir": "./dist/es",
7
- "baseUrl": "."
8
- },
9
- "extends": "../../tsconfig.es.json",
10
- "include": ["src/"]
11
- }