@aws-sdk/credential-provider-node 3.501.0 → 3.502.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js
CHANGED
|
@@ -44,8 +44,10 @@ var import_shared_ini_file_loader = require("@smithy/shared-ini-file-loader");
|
|
|
44
44
|
var import_property_provider = require("@smithy/property-provider");
|
|
45
45
|
var ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
46
46
|
var remoteProvider = /* @__PURE__ */ __name(async (init) => {
|
|
47
|
+
var _a, _b;
|
|
47
48
|
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await Promise.resolve().then(() => __toESM(require("@smithy/credential-provider-imds")));
|
|
48
49
|
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
|
50
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromContainerMetadata");
|
|
49
51
|
return fromContainerMetadata(init);
|
|
50
52
|
}
|
|
51
53
|
if (process.env[ENV_IMDS_DISABLED]) {
|
|
@@ -53,6 +55,7 @@ var remoteProvider = /* @__PURE__ */ __name(async (init) => {
|
|
|
53
55
|
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled");
|
|
54
56
|
};
|
|
55
57
|
}
|
|
58
|
+
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
|
|
56
59
|
return fromInstanceMetadata(init);
|
|
57
60
|
}, "remoteProvider");
|
|
58
61
|
|
|
@@ -61,27 +64,45 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
|
|
|
61
64
|
(0, import_property_provider.chain)(
|
|
62
65
|
...init.profile || process.env[import_shared_ini_file_loader.ENV_PROFILE] ? [] : [
|
|
63
66
|
async () => {
|
|
67
|
+
var _a;
|
|
68
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
|
|
64
69
|
const { fromEnv } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-env")));
|
|
65
|
-
return fromEnv()();
|
|
70
|
+
return fromEnv(init)();
|
|
66
71
|
}
|
|
67
72
|
],
|
|
68
73
|
async () => {
|
|
74
|
+
var _a;
|
|
75
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
|
|
76
|
+
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName } = init;
|
|
77
|
+
if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
|
|
78
|
+
throw new import_property_provider.CredentialsProviderError(
|
|
79
|
+
"Skipping SSO provider in default chain (inputs do not include SSO fields)."
|
|
80
|
+
);
|
|
81
|
+
}
|
|
69
82
|
const { fromSSO } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-sso")));
|
|
70
83
|
return fromSSO(init)();
|
|
71
84
|
},
|
|
72
85
|
async () => {
|
|
86
|
+
var _a;
|
|
87
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
|
|
73
88
|
const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));
|
|
74
89
|
return fromIni(init)();
|
|
75
90
|
},
|
|
76
91
|
async () => {
|
|
92
|
+
var _a;
|
|
93
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
|
|
77
94
|
const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));
|
|
78
95
|
return fromProcess(init)();
|
|
79
96
|
},
|
|
80
97
|
async () => {
|
|
98
|
+
var _a;
|
|
99
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
|
|
81
100
|
const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));
|
|
82
101
|
return fromTokenFile(init)();
|
|
83
102
|
},
|
|
84
103
|
async () => {
|
|
104
|
+
var _a;
|
|
105
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
|
|
85
106
|
return (await remoteProvider(init))();
|
|
86
107
|
},
|
|
87
108
|
async () => {
|
|
@@ -5,22 +5,32 @@ export const defaultProvider = (init = {}) => memoize(chain(...(init.profile ||
|
|
|
5
5
|
? []
|
|
6
6
|
: [
|
|
7
7
|
async () => {
|
|
8
|
+
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
|
|
8
9
|
const { fromEnv } = await import("@aws-sdk/credential-provider-env");
|
|
9
|
-
return fromEnv()();
|
|
10
|
+
return fromEnv(init)();
|
|
10
11
|
},
|
|
11
12
|
]), async () => {
|
|
13
|
+
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
|
|
14
|
+
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName } = init;
|
|
15
|
+
if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
|
|
16
|
+
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).");
|
|
17
|
+
}
|
|
12
18
|
const { fromSSO } = await import("@aws-sdk/credential-provider-sso");
|
|
13
19
|
return fromSSO(init)();
|
|
14
20
|
}, async () => {
|
|
21
|
+
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
|
|
15
22
|
const { fromIni } = await import("@aws-sdk/credential-provider-ini");
|
|
16
23
|
return fromIni(init)();
|
|
17
24
|
}, async () => {
|
|
25
|
+
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
|
|
18
26
|
const { fromProcess } = await import("@aws-sdk/credential-provider-process");
|
|
19
27
|
return fromProcess(init)();
|
|
20
28
|
}, async () => {
|
|
29
|
+
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
|
|
21
30
|
const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity");
|
|
22
31
|
return fromTokenFile(init)();
|
|
23
32
|
}, async () => {
|
|
33
|
+
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
|
|
24
34
|
return (await remoteProvider(init))();
|
|
25
35
|
}, async () => {
|
|
26
36
|
throw new CredentialsProviderError("Could not load credentials from any providers", false);
|
|
@@ -3,6 +3,7 @@ export const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
|
3
3
|
export const remoteProvider = async (init) => {
|
|
4
4
|
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
|
|
5
5
|
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
|
6
|
+
init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromContainerMetadata");
|
|
6
7
|
return fromContainerMetadata(init);
|
|
7
8
|
}
|
|
8
9
|
if (process.env[ENV_IMDS_DISABLED]) {
|
|
@@ -10,5 +11,6 @@ export const remoteProvider = async (init) => {
|
|
|
10
11
|
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled");
|
|
11
12
|
};
|
|
12
13
|
}
|
|
14
|
+
init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
|
|
13
15
|
return fromInstanceMetadata(init);
|
|
14
16
|
};
|
|
@@ -1,10 +1,13 @@
|
|
|
1
1
|
import type { FromIniInit } from "@aws-sdk/credential-provider-ini";
|
|
2
2
|
import type { FromProcessInit } from "@aws-sdk/credential-provider-process";
|
|
3
|
-
import type { FromSSOInit } from "@aws-sdk/credential-provider-sso";
|
|
3
|
+
import type { FromSSOInit, SsoCredentialsParameters } from "@aws-sdk/credential-provider-sso";
|
|
4
4
|
import type { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
|
|
5
5
|
import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
|
6
6
|
import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
|
|
7
|
-
|
|
7
|
+
/**
|
|
8
|
+
* @public
|
|
9
|
+
*/
|
|
10
|
+
export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
|
|
8
11
|
/**
|
|
9
12
|
* Creates a credential provider that will attempt to find credentials from the
|
|
10
13
|
* following sources (listed in order of precedence):
|
|
@@ -24,20 +27,20 @@ export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcess
|
|
|
24
27
|
* @param init Configuration that is passed to each individual
|
|
25
28
|
* provider
|
|
26
29
|
*
|
|
27
|
-
* @see {@link fromEnv}
|
|
28
|
-
* environment variables
|
|
29
|
-
* @see {@link fromSSO}
|
|
30
|
-
* resolved SSO token cache
|
|
31
|
-
* @see {@link fromTokenFile}
|
|
32
|
-
* token file
|
|
33
|
-
* @see {@link fromIni}
|
|
34
|
-
* files
|
|
35
|
-
* @see {@link fromProcess}
|
|
36
|
-
* credential_process in INI files
|
|
30
|
+
* @see {@link fromEnv} The function used to source credentials from
|
|
31
|
+
* environment variables.
|
|
32
|
+
* @see {@link fromSSO} The function used to source credentials from
|
|
33
|
+
* resolved SSO token cache.
|
|
34
|
+
* @see {@link fromTokenFile} The function used to source credentials from
|
|
35
|
+
* token file.
|
|
36
|
+
* @see {@link fromIni} The function used to source credentials from INI
|
|
37
|
+
* files.
|
|
38
|
+
* @see {@link fromProcess} The function used to sources credentials from
|
|
39
|
+
* credential_process in INI files.
|
|
37
40
|
* @see {@link fromInstanceMetadata} The function used to source credentials from the
|
|
38
|
-
*
|
|
41
|
+
* EC2 Instance Metadata Service.
|
|
39
42
|
* @see {@link fromContainerMetadata} The function used to source credentials from the
|
|
40
|
-
*
|
|
43
|
+
* ECS Container Metadata Service.
|
|
41
44
|
*/
|
|
42
45
|
export declare const defaultProvider: (init?: DefaultProviderInit) => MemoizedProvider<AwsCredentialIdentity>;
|
|
43
46
|
/**
|
|
@@ -1,13 +1,16 @@
|
|
|
1
1
|
import { FromIniInit } from "@aws-sdk/credential-provider-ini";
|
|
2
2
|
import { FromProcessInit } from "@aws-sdk/credential-provider-process";
|
|
3
|
-
import {
|
|
3
|
+
import {
|
|
4
|
+
FromSSOInit,
|
|
5
|
+
SsoCredentialsParameters,
|
|
6
|
+
} from "@aws-sdk/credential-provider-sso";
|
|
4
7
|
import { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
|
|
5
8
|
import { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
|
6
9
|
import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
|
|
7
10
|
export type DefaultProviderInit = FromIniInit &
|
|
8
11
|
RemoteProviderInit &
|
|
9
12
|
FromProcessInit &
|
|
10
|
-
FromSSOInit &
|
|
13
|
+
(FromSSOInit & Partial<SsoCredentialsParameters>) &
|
|
11
14
|
FromTokenFileInit;
|
|
12
15
|
export declare const defaultProvider: (
|
|
13
16
|
init?: DefaultProviderInit
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-provider-node",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.502.0",
|
|
4
4
|
"description": "AWS credential provider that sources credentials from a Node.JS environment. ",
|
|
5
5
|
"engines": {
|
|
6
6
|
"node": ">=14.0.0"
|
|
@@ -27,12 +27,12 @@
|
|
|
27
27
|
},
|
|
28
28
|
"license": "Apache-2.0",
|
|
29
29
|
"dependencies": {
|
|
30
|
-
"@aws-sdk/credential-provider-env": "3.
|
|
31
|
-
"@aws-sdk/credential-provider-ini": "3.
|
|
32
|
-
"@aws-sdk/credential-provider-process": "3.
|
|
33
|
-
"@aws-sdk/credential-provider-sso": "3.
|
|
34
|
-
"@aws-sdk/credential-provider-web-identity": "3.
|
|
35
|
-
"@aws-sdk/types": "3.
|
|
30
|
+
"@aws-sdk/credential-provider-env": "3.502.0",
|
|
31
|
+
"@aws-sdk/credential-provider-ini": "3.502.0",
|
|
32
|
+
"@aws-sdk/credential-provider-process": "3.502.0",
|
|
33
|
+
"@aws-sdk/credential-provider-sso": "3.502.0",
|
|
34
|
+
"@aws-sdk/credential-provider-web-identity": "3.502.0",
|
|
35
|
+
"@aws-sdk/types": "3.502.0",
|
|
36
36
|
"@smithy/credential-provider-imds": "^2.2.1",
|
|
37
37
|
"@smithy/property-provider": "^2.1.1",
|
|
38
38
|
"@smithy/shared-ini-file-loader": "^2.3.1",
|