@aws-sdk/credential-provider-ini 3.489.0 → 3.495.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/fromIni.js +1 -10
- package/dist-cjs/index.js +173 -4
- package/dist-cjs/resolveAssumeRoleCredentials.js +1 -52
- package/dist-cjs/resolveCredentialSource.js +1 -21
- package/dist-cjs/resolveProcessCredentials.js +1 -11
- package/dist-cjs/resolveProfileData.js +1 -32
- package/dist-cjs/resolveSsoCredentials.js +1 -17
- package/dist-cjs/resolveStaticCredentials.js +1 -16
- package/dist-cjs/resolveWebIdentityCredentials.js +1 -17
- package/package.json +11 -11
package/dist-cjs/fromIni.js
CHANGED
|
@@ -1,10 +1 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.fromIni = void 0;
|
|
4
|
-
const shared_ini_file_loader_1 = require("@smithy/shared-ini-file-loader");
|
|
5
|
-
const resolveProfileData_1 = require("./resolveProfileData");
|
|
6
|
-
const fromIni = (init = {}) => async () => {
|
|
7
|
-
const profiles = await (0, shared_ini_file_loader_1.parseKnownFiles)(init);
|
|
8
|
-
return (0, resolveProfileData_1.resolveProfileData)((0, shared_ini_file_loader_1.getProfileName)(init), profiles, init);
|
|
9
|
-
};
|
|
10
|
-
exports.fromIni = fromIni;
|
|
1
|
+
module.exports = require("./index.js");
|
package/dist-cjs/index.js
CHANGED
|
@@ -1,4 +1,173 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
1
|
+
var __defProp = Object.defineProperty;
|
|
2
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
3
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
4
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
5
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
6
|
+
var __export = (target, all) => {
|
|
7
|
+
for (var name in all)
|
|
8
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
9
|
+
};
|
|
10
|
+
var __copyProps = (to, from, except, desc) => {
|
|
11
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
12
|
+
for (let key of __getOwnPropNames(from))
|
|
13
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
14
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
15
|
+
}
|
|
16
|
+
return to;
|
|
17
|
+
};
|
|
18
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
|
+
|
|
20
|
+
// src/index.ts
|
|
21
|
+
var src_exports = {};
|
|
22
|
+
__export(src_exports, {
|
|
23
|
+
fromIni: () => fromIni
|
|
24
|
+
});
|
|
25
|
+
module.exports = __toCommonJS(src_exports);
|
|
26
|
+
|
|
27
|
+
// src/fromIni.ts
|
|
28
|
+
|
|
29
|
+
|
|
30
|
+
// src/resolveProfileData.ts
|
|
31
|
+
|
|
32
|
+
|
|
33
|
+
// src/resolveAssumeRoleCredentials.ts
|
|
34
|
+
|
|
35
|
+
var import_shared_ini_file_loader = require("@smithy/shared-ini-file-loader");
|
|
36
|
+
|
|
37
|
+
// src/resolveCredentialSource.ts
|
|
38
|
+
var import_credential_provider_env = require("@aws-sdk/credential-provider-env");
|
|
39
|
+
var import_credential_provider_imds = require("@smithy/credential-provider-imds");
|
|
40
|
+
var import_property_provider = require("@smithy/property-provider");
|
|
41
|
+
var resolveCredentialSource = /* @__PURE__ */ __name((credentialSource, profileName) => {
|
|
42
|
+
const sourceProvidersMap = {
|
|
43
|
+
EcsContainer: import_credential_provider_imds.fromContainerMetadata,
|
|
44
|
+
Ec2InstanceMetadata: import_credential_provider_imds.fromInstanceMetadata,
|
|
45
|
+
Environment: import_credential_provider_env.fromEnv
|
|
46
|
+
};
|
|
47
|
+
if (credentialSource in sourceProvidersMap) {
|
|
48
|
+
return sourceProvidersMap[credentialSource]();
|
|
49
|
+
} else {
|
|
50
|
+
throw new import_property_provider.CredentialsProviderError(
|
|
51
|
+
`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, expected EcsContainer or Ec2InstanceMetadata or Environment.`
|
|
52
|
+
);
|
|
53
|
+
}
|
|
54
|
+
}, "resolveCredentialSource");
|
|
55
|
+
|
|
56
|
+
// src/resolveAssumeRoleCredentials.ts
|
|
57
|
+
var isAssumeRoleProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 && ["undefined", "string"].indexOf(typeof arg.external_id) > -1 && ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 && (isAssumeRoleWithSourceProfile(arg) || isAssumeRoleWithProviderProfile(arg)), "isAssumeRoleProfile");
|
|
58
|
+
var isAssumeRoleWithSourceProfile = /* @__PURE__ */ __name((arg) => typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined", "isAssumeRoleWithSourceProfile");
|
|
59
|
+
var isAssumeRoleWithProviderProfile = /* @__PURE__ */ __name((arg) => typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined", "isAssumeRoleWithProviderProfile");
|
|
60
|
+
var resolveAssumeRoleCredentials = /* @__PURE__ */ __name(async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
61
|
+
const data = profiles[profileName];
|
|
62
|
+
if (!options.roleAssumer) {
|
|
63
|
+
throw new import_property_provider.CredentialsProviderError(
|
|
64
|
+
`Profile ${profileName} requires a role to be assumed, but no role assumption callback was provided.`,
|
|
65
|
+
false
|
|
66
|
+
);
|
|
67
|
+
}
|
|
68
|
+
const { source_profile } = data;
|
|
69
|
+
if (source_profile && source_profile in visitedProfiles) {
|
|
70
|
+
throw new import_property_provider.CredentialsProviderError(
|
|
71
|
+
`Detected a cycle attempting to resolve credentials for profile ${(0, import_shared_ini_file_loader.getProfileName)(options)}. Profiles visited: ` + Object.keys(visitedProfiles).join(", "),
|
|
72
|
+
false
|
|
73
|
+
);
|
|
74
|
+
}
|
|
75
|
+
const sourceCredsProvider = source_profile ? resolveProfileData(source_profile, profiles, options, {
|
|
76
|
+
...visitedProfiles,
|
|
77
|
+
[source_profile]: true
|
|
78
|
+
}) : resolveCredentialSource(data.credential_source, profileName)();
|
|
79
|
+
const params = {
|
|
80
|
+
RoleArn: data.role_arn,
|
|
81
|
+
RoleSessionName: data.role_session_name || `aws-sdk-js-${Date.now()}`,
|
|
82
|
+
ExternalId: data.external_id,
|
|
83
|
+
DurationSeconds: parseInt(data.duration_seconds || "3600", 10)
|
|
84
|
+
};
|
|
85
|
+
const { mfa_serial } = data;
|
|
86
|
+
if (mfa_serial) {
|
|
87
|
+
if (!options.mfaCodeProvider) {
|
|
88
|
+
throw new import_property_provider.CredentialsProviderError(
|
|
89
|
+
`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`,
|
|
90
|
+
false
|
|
91
|
+
);
|
|
92
|
+
}
|
|
93
|
+
params.SerialNumber = mfa_serial;
|
|
94
|
+
params.TokenCode = await options.mfaCodeProvider(mfa_serial);
|
|
95
|
+
}
|
|
96
|
+
const sourceCreds = await sourceCredsProvider;
|
|
97
|
+
return options.roleAssumer(sourceCreds, params);
|
|
98
|
+
}, "resolveAssumeRoleCredentials");
|
|
99
|
+
|
|
100
|
+
// src/resolveProcessCredentials.ts
|
|
101
|
+
var import_credential_provider_process = require("@aws-sdk/credential-provider-process");
|
|
102
|
+
var isProcessProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string", "isProcessProfile");
|
|
103
|
+
var resolveProcessCredentials = /* @__PURE__ */ __name(async (options, profile) => (0, import_credential_provider_process.fromProcess)({
|
|
104
|
+
...options,
|
|
105
|
+
profile
|
|
106
|
+
})(), "resolveProcessCredentials");
|
|
107
|
+
|
|
108
|
+
// src/resolveSsoCredentials.ts
|
|
109
|
+
var import_credential_provider_sso = require("@aws-sdk/credential-provider-sso");
|
|
110
|
+
|
|
111
|
+
var resolveSsoCredentials = /* @__PURE__ */ __name((data) => {
|
|
112
|
+
const { sso_start_url, sso_account_id, sso_session, sso_region, sso_role_name } = (0, import_credential_provider_sso.validateSsoProfile)(data);
|
|
113
|
+
return (0, import_credential_provider_sso.fromSSO)({
|
|
114
|
+
ssoStartUrl: sso_start_url,
|
|
115
|
+
ssoAccountId: sso_account_id,
|
|
116
|
+
ssoSession: sso_session,
|
|
117
|
+
ssoRegion: sso_region,
|
|
118
|
+
ssoRoleName: sso_role_name
|
|
119
|
+
})();
|
|
120
|
+
}, "resolveSsoCredentials");
|
|
121
|
+
|
|
122
|
+
// src/resolveStaticCredentials.ts
|
|
123
|
+
var isStaticCredsProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.aws_access_key_id === "string" && typeof arg.aws_secret_access_key === "string" && ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1, "isStaticCredsProfile");
|
|
124
|
+
var resolveStaticCredentials = /* @__PURE__ */ __name((profile) => Promise.resolve({
|
|
125
|
+
accessKeyId: profile.aws_access_key_id,
|
|
126
|
+
secretAccessKey: profile.aws_secret_access_key,
|
|
127
|
+
sessionToken: profile.aws_session_token,
|
|
128
|
+
credentialScope: profile.aws_credential_scope
|
|
129
|
+
}), "resolveStaticCredentials");
|
|
130
|
+
|
|
131
|
+
// src/resolveWebIdentityCredentials.ts
|
|
132
|
+
var import_credential_provider_web_identity = require("@aws-sdk/credential-provider-web-identity");
|
|
133
|
+
var isWebIdentityProfile = /* @__PURE__ */ __name((arg) => Boolean(arg) && typeof arg === "object" && typeof arg.web_identity_token_file === "string" && typeof arg.role_arn === "string" && ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1, "isWebIdentityProfile");
|
|
134
|
+
var resolveWebIdentityCredentials = /* @__PURE__ */ __name(async (profile, options) => (0, import_credential_provider_web_identity.fromTokenFile)({
|
|
135
|
+
webIdentityTokenFile: profile.web_identity_token_file,
|
|
136
|
+
roleArn: profile.role_arn,
|
|
137
|
+
roleSessionName: profile.role_session_name,
|
|
138
|
+
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity
|
|
139
|
+
})(), "resolveWebIdentityCredentials");
|
|
140
|
+
|
|
141
|
+
// src/resolveProfileData.ts
|
|
142
|
+
var resolveProfileData = /* @__PURE__ */ __name(async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
143
|
+
const data = profiles[profileName];
|
|
144
|
+
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
145
|
+
return resolveStaticCredentials(data);
|
|
146
|
+
}
|
|
147
|
+
if (isAssumeRoleProfile(data)) {
|
|
148
|
+
return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);
|
|
149
|
+
}
|
|
150
|
+
if (isStaticCredsProfile(data)) {
|
|
151
|
+
return resolveStaticCredentials(data);
|
|
152
|
+
}
|
|
153
|
+
if (isWebIdentityProfile(data)) {
|
|
154
|
+
return resolveWebIdentityCredentials(data, options);
|
|
155
|
+
}
|
|
156
|
+
if (isProcessProfile(data)) {
|
|
157
|
+
return resolveProcessCredentials(options, profileName);
|
|
158
|
+
}
|
|
159
|
+
if ((0, import_credential_provider_sso.isSsoProfile)(data)) {
|
|
160
|
+
return resolveSsoCredentials(data);
|
|
161
|
+
}
|
|
162
|
+
throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared credentials file.`);
|
|
163
|
+
}, "resolveProfileData");
|
|
164
|
+
|
|
165
|
+
// src/fromIni.ts
|
|
166
|
+
var fromIni = /* @__PURE__ */ __name((init = {}) => async () => {
|
|
167
|
+
const profiles = await (0, import_shared_ini_file_loader.parseKnownFiles)(init);
|
|
168
|
+
return resolveProfileData((0, import_shared_ini_file_loader.getProfileName)(init), profiles, init);
|
|
169
|
+
}, "fromIni");
|
|
170
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
171
|
+
0 && (module.exports = {
|
|
172
|
+
fromIni
|
|
173
|
+
});
|
|
@@ -1,52 +1 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.resolveAssumeRoleCredentials = exports.isAssumeRoleProfile = void 0;
|
|
4
|
-
const property_provider_1 = require("@smithy/property-provider");
|
|
5
|
-
const shared_ini_file_loader_1 = require("@smithy/shared-ini-file-loader");
|
|
6
|
-
const resolveCredentialSource_1 = require("./resolveCredentialSource");
|
|
7
|
-
const resolveProfileData_1 = require("./resolveProfileData");
|
|
8
|
-
const isAssumeRoleProfile = (arg) => Boolean(arg) &&
|
|
9
|
-
typeof arg === "object" &&
|
|
10
|
-
typeof arg.role_arn === "string" &&
|
|
11
|
-
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
|
|
12
|
-
["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
|
|
13
|
-
["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 &&
|
|
14
|
-
(isAssumeRoleWithSourceProfile(arg) || isAssumeRoleWithProviderProfile(arg));
|
|
15
|
-
exports.isAssumeRoleProfile = isAssumeRoleProfile;
|
|
16
|
-
const isAssumeRoleWithSourceProfile = (arg) => typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
17
|
-
const isAssumeRoleWithProviderProfile = (arg) => typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
18
|
-
const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
19
|
-
const data = profiles[profileName];
|
|
20
|
-
if (!options.roleAssumer) {
|
|
21
|
-
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires a role to be assumed, but no role assumption callback was provided.`, false);
|
|
22
|
-
}
|
|
23
|
-
const { source_profile } = data;
|
|
24
|
-
if (source_profile && source_profile in visitedProfiles) {
|
|
25
|
-
throw new property_provider_1.CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +
|
|
26
|
-
` ${(0, shared_ini_file_loader_1.getProfileName)(options)}. Profiles visited: ` +
|
|
27
|
-
Object.keys(visitedProfiles).join(", "), false);
|
|
28
|
-
}
|
|
29
|
-
const sourceCredsProvider = source_profile
|
|
30
|
-
? (0, resolveProfileData_1.resolveProfileData)(source_profile, profiles, options, {
|
|
31
|
-
...visitedProfiles,
|
|
32
|
-
[source_profile]: true,
|
|
33
|
-
})
|
|
34
|
-
: (0, resolveCredentialSource_1.resolveCredentialSource)(data.credential_source, profileName)();
|
|
35
|
-
const params = {
|
|
36
|
-
RoleArn: data.role_arn,
|
|
37
|
-
RoleSessionName: data.role_session_name || `aws-sdk-js-${Date.now()}`,
|
|
38
|
-
ExternalId: data.external_id,
|
|
39
|
-
DurationSeconds: parseInt(data.duration_seconds || "3600", 10),
|
|
40
|
-
};
|
|
41
|
-
const { mfa_serial } = data;
|
|
42
|
-
if (mfa_serial) {
|
|
43
|
-
if (!options.mfaCodeProvider) {
|
|
44
|
-
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, false);
|
|
45
|
-
}
|
|
46
|
-
params.SerialNumber = mfa_serial;
|
|
47
|
-
params.TokenCode = await options.mfaCodeProvider(mfa_serial);
|
|
48
|
-
}
|
|
49
|
-
const sourceCreds = await sourceCredsProvider;
|
|
50
|
-
return options.roleAssumer(sourceCreds, params);
|
|
51
|
-
};
|
|
52
|
-
exports.resolveAssumeRoleCredentials = resolveAssumeRoleCredentials;
|
|
1
|
+
module.exports = require("./index.js");
|
|
@@ -1,21 +1 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.resolveCredentialSource = void 0;
|
|
4
|
-
const credential_provider_env_1 = require("@aws-sdk/credential-provider-env");
|
|
5
|
-
const credential_provider_imds_1 = require("@smithy/credential-provider-imds");
|
|
6
|
-
const property_provider_1 = require("@smithy/property-provider");
|
|
7
|
-
const resolveCredentialSource = (credentialSource, profileName) => {
|
|
8
|
-
const sourceProvidersMap = {
|
|
9
|
-
EcsContainer: credential_provider_imds_1.fromContainerMetadata,
|
|
10
|
-
Ec2InstanceMetadata: credential_provider_imds_1.fromInstanceMetadata,
|
|
11
|
-
Environment: credential_provider_env_1.fromEnv,
|
|
12
|
-
};
|
|
13
|
-
if (credentialSource in sourceProvidersMap) {
|
|
14
|
-
return sourceProvidersMap[credentialSource]();
|
|
15
|
-
}
|
|
16
|
-
else {
|
|
17
|
-
throw new property_provider_1.CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
|
|
18
|
-
`expected EcsContainer or Ec2InstanceMetadata or Environment.`);
|
|
19
|
-
}
|
|
20
|
-
};
|
|
21
|
-
exports.resolveCredentialSource = resolveCredentialSource;
|
|
1
|
+
module.exports = require("./index.js");
|
|
@@ -1,11 +1 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.resolveProcessCredentials = exports.isProcessProfile = void 0;
|
|
4
|
-
const credential_provider_process_1 = require("@aws-sdk/credential-provider-process");
|
|
5
|
-
const isProcessProfile = (arg) => Boolean(arg) && typeof arg === "object" && typeof arg.credential_process === "string";
|
|
6
|
-
exports.isProcessProfile = isProcessProfile;
|
|
7
|
-
const resolveProcessCredentials = async (options, profile) => (0, credential_provider_process_1.fromProcess)({
|
|
8
|
-
...options,
|
|
9
|
-
profile,
|
|
10
|
-
})();
|
|
11
|
-
exports.resolveProcessCredentials = resolveProcessCredentials;
|
|
1
|
+
module.exports = require("./index.js");
|
|
@@ -1,32 +1 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.resolveProfileData = void 0;
|
|
4
|
-
const property_provider_1 = require("@smithy/property-provider");
|
|
5
|
-
const resolveAssumeRoleCredentials_1 = require("./resolveAssumeRoleCredentials");
|
|
6
|
-
const resolveProcessCredentials_1 = require("./resolveProcessCredentials");
|
|
7
|
-
const resolveSsoCredentials_1 = require("./resolveSsoCredentials");
|
|
8
|
-
const resolveStaticCredentials_1 = require("./resolveStaticCredentials");
|
|
9
|
-
const resolveWebIdentityCredentials_1 = require("./resolveWebIdentityCredentials");
|
|
10
|
-
const resolveProfileData = async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
11
|
-
const data = profiles[profileName];
|
|
12
|
-
if (Object.keys(visitedProfiles).length > 0 && (0, resolveStaticCredentials_1.isStaticCredsProfile)(data)) {
|
|
13
|
-
return (0, resolveStaticCredentials_1.resolveStaticCredentials)(data);
|
|
14
|
-
}
|
|
15
|
-
if ((0, resolveAssumeRoleCredentials_1.isAssumeRoleProfile)(data)) {
|
|
16
|
-
return (0, resolveAssumeRoleCredentials_1.resolveAssumeRoleCredentials)(profileName, profiles, options, visitedProfiles);
|
|
17
|
-
}
|
|
18
|
-
if ((0, resolveStaticCredentials_1.isStaticCredsProfile)(data)) {
|
|
19
|
-
return (0, resolveStaticCredentials_1.resolveStaticCredentials)(data);
|
|
20
|
-
}
|
|
21
|
-
if ((0, resolveWebIdentityCredentials_1.isWebIdentityProfile)(data)) {
|
|
22
|
-
return (0, resolveWebIdentityCredentials_1.resolveWebIdentityCredentials)(data, options);
|
|
23
|
-
}
|
|
24
|
-
if ((0, resolveProcessCredentials_1.isProcessProfile)(data)) {
|
|
25
|
-
return (0, resolveProcessCredentials_1.resolveProcessCredentials)(options, profileName);
|
|
26
|
-
}
|
|
27
|
-
if ((0, resolveSsoCredentials_1.isSsoProfile)(data)) {
|
|
28
|
-
return (0, resolveSsoCredentials_1.resolveSsoCredentials)(data);
|
|
29
|
-
}
|
|
30
|
-
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared credentials file.`);
|
|
31
|
-
};
|
|
32
|
-
exports.resolveProfileData = resolveProfileData;
|
|
1
|
+
module.exports = require("./index.js");
|
|
@@ -1,17 +1 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.resolveSsoCredentials = exports.isSsoProfile = void 0;
|
|
4
|
-
const credential_provider_sso_1 = require("@aws-sdk/credential-provider-sso");
|
|
5
|
-
var credential_provider_sso_2 = require("@aws-sdk/credential-provider-sso");
|
|
6
|
-
Object.defineProperty(exports, "isSsoProfile", { enumerable: true, get: function () { return credential_provider_sso_2.isSsoProfile; } });
|
|
7
|
-
const resolveSsoCredentials = (data) => {
|
|
8
|
-
const { sso_start_url, sso_account_id, sso_session, sso_region, sso_role_name } = (0, credential_provider_sso_1.validateSsoProfile)(data);
|
|
9
|
-
return (0, credential_provider_sso_1.fromSSO)({
|
|
10
|
-
ssoStartUrl: sso_start_url,
|
|
11
|
-
ssoAccountId: sso_account_id,
|
|
12
|
-
ssoSession: sso_session,
|
|
13
|
-
ssoRegion: sso_region,
|
|
14
|
-
ssoRoleName: sso_role_name,
|
|
15
|
-
})();
|
|
16
|
-
};
|
|
17
|
-
exports.resolveSsoCredentials = resolveSsoCredentials;
|
|
1
|
+
module.exports = require("./index.js");
|
|
@@ -1,16 +1 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.resolveStaticCredentials = exports.isStaticCredsProfile = void 0;
|
|
4
|
-
const isStaticCredsProfile = (arg) => Boolean(arg) &&
|
|
5
|
-
typeof arg === "object" &&
|
|
6
|
-
typeof arg.aws_access_key_id === "string" &&
|
|
7
|
-
typeof arg.aws_secret_access_key === "string" &&
|
|
8
|
-
["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
|
|
9
|
-
exports.isStaticCredsProfile = isStaticCredsProfile;
|
|
10
|
-
const resolveStaticCredentials = (profile) => Promise.resolve({
|
|
11
|
-
accessKeyId: profile.aws_access_key_id,
|
|
12
|
-
secretAccessKey: profile.aws_secret_access_key,
|
|
13
|
-
sessionToken: profile.aws_session_token,
|
|
14
|
-
credentialScope: profile.aws_credential_scope,
|
|
15
|
-
});
|
|
16
|
-
exports.resolveStaticCredentials = resolveStaticCredentials;
|
|
1
|
+
module.exports = require("./index.js");
|
|
@@ -1,17 +1 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.resolveWebIdentityCredentials = exports.isWebIdentityProfile = void 0;
|
|
4
|
-
const credential_provider_web_identity_1 = require("@aws-sdk/credential-provider-web-identity");
|
|
5
|
-
const isWebIdentityProfile = (arg) => Boolean(arg) &&
|
|
6
|
-
typeof arg === "object" &&
|
|
7
|
-
typeof arg.web_identity_token_file === "string" &&
|
|
8
|
-
typeof arg.role_arn === "string" &&
|
|
9
|
-
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1;
|
|
10
|
-
exports.isWebIdentityProfile = isWebIdentityProfile;
|
|
11
|
-
const resolveWebIdentityCredentials = async (profile, options) => (0, credential_provider_web_identity_1.fromTokenFile)({
|
|
12
|
-
webIdentityTokenFile: profile.web_identity_token_file,
|
|
13
|
-
roleArn: profile.role_arn,
|
|
14
|
-
roleSessionName: profile.role_session_name,
|
|
15
|
-
roleAssumerWithWebIdentity: options.roleAssumerWithWebIdentity,
|
|
16
|
-
})();
|
|
17
|
-
exports.resolveWebIdentityCredentials = resolveWebIdentityCredentials;
|
|
1
|
+
module.exports = require("./index.js");
|
package/package.json
CHANGED
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-provider-ini",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.495.0",
|
|
4
4
|
"description": "AWS credential provider that sources credentials from ~/.aws/credentials and ~/.aws/config",
|
|
5
5
|
"main": "./dist-cjs/index.js",
|
|
6
6
|
"module": "./dist-es/index.js",
|
|
7
7
|
"scripts": {
|
|
8
8
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
9
|
-
"build:cjs": "
|
|
9
|
+
"build:cjs": "node ../../scripts/compilation/inline credential-provider-ini",
|
|
10
10
|
"build:es": "tsc -p tsconfig.es.json",
|
|
11
11
|
"build:include:deps": "lerna run --scope $npm_package_name --include-dependencies build",
|
|
12
12
|
"build:types": "tsc -p tsconfig.types.json",
|
|
@@ -24,15 +24,15 @@
|
|
|
24
24
|
},
|
|
25
25
|
"license": "Apache-2.0",
|
|
26
26
|
"dependencies": {
|
|
27
|
-
"@aws-sdk/credential-provider-env": "3.
|
|
28
|
-
"@aws-sdk/credential-provider-process": "3.
|
|
29
|
-
"@aws-sdk/credential-provider-sso": "3.
|
|
30
|
-
"@aws-sdk/credential-provider-web-identity": "3.
|
|
31
|
-
"@aws-sdk/types": "3.
|
|
32
|
-
"@smithy/credential-provider-imds": "^2.
|
|
33
|
-
"@smithy/property-provider": "^2.
|
|
34
|
-
"@smithy/shared-ini-file-loader": "^2.0
|
|
35
|
-
"@smithy/types": "^2.
|
|
27
|
+
"@aws-sdk/credential-provider-env": "3.495.0",
|
|
28
|
+
"@aws-sdk/credential-provider-process": "3.495.0",
|
|
29
|
+
"@aws-sdk/credential-provider-sso": "3.495.0",
|
|
30
|
+
"@aws-sdk/credential-provider-web-identity": "3.495.0",
|
|
31
|
+
"@aws-sdk/types": "3.495.0",
|
|
32
|
+
"@smithy/credential-provider-imds": "^2.2.0",
|
|
33
|
+
"@smithy/property-provider": "^2.1.0",
|
|
34
|
+
"@smithy/shared-ini-file-loader": "^2.3.0",
|
|
35
|
+
"@smithy/types": "^2.9.0",
|
|
36
36
|
"tslib": "^2.5.0"
|
|
37
37
|
},
|
|
38
38
|
"devDependencies": {
|