@aws-sdk/credential-provider-node 3.501.0 → 3.502.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -44,8 +44,10 @@ var import_shared_ini_file_loader = require("@smithy/shared-ini-file-loader");
44
44
  var import_property_provider = require("@smithy/property-provider");
45
45
  var ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
46
46
  var remoteProvider = /* @__PURE__ */ __name(async (init) => {
47
+ var _a, _b;
47
48
  const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await Promise.resolve().then(() => __toESM(require("@smithy/credential-provider-imds")));
48
49
  if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
50
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromContainerMetadata");
49
51
  return fromContainerMetadata(init);
50
52
  }
51
53
  if (process.env[ENV_IMDS_DISABLED]) {
@@ -53,6 +55,7 @@ var remoteProvider = /* @__PURE__ */ __name(async (init) => {
53
55
  throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled");
54
56
  };
55
57
  }
58
+ (_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
56
59
  return fromInstanceMetadata(init);
57
60
  }, "remoteProvider");
58
61
 
@@ -61,27 +64,45 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
61
64
  (0, import_property_provider.chain)(
62
65
  ...init.profile || process.env[import_shared_ini_file_loader.ENV_PROFILE] ? [] : [
63
66
  async () => {
67
+ var _a;
68
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
64
69
  const { fromEnv } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-env")));
65
- return fromEnv()();
70
+ return fromEnv(init)();
66
71
  }
67
72
  ],
68
73
  async () => {
74
+ var _a;
75
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
76
+ const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName } = init;
77
+ if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
78
+ throw new import_property_provider.CredentialsProviderError(
79
+ "Skipping SSO provider in default chain (inputs do not include SSO fields)."
80
+ );
81
+ }
69
82
  const { fromSSO } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-sso")));
70
83
  return fromSSO(init)();
71
84
  },
72
85
  async () => {
86
+ var _a;
87
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
73
88
  const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));
74
89
  return fromIni(init)();
75
90
  },
76
91
  async () => {
92
+ var _a;
93
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
77
94
  const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));
78
95
  return fromProcess(init)();
79
96
  },
80
97
  async () => {
98
+ var _a;
99
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
81
100
  const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));
82
101
  return fromTokenFile(init)();
83
102
  },
84
103
  async () => {
104
+ var _a;
105
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
85
106
  return (await remoteProvider(init))();
86
107
  },
87
108
  async () => {
@@ -5,22 +5,32 @@ export const defaultProvider = (init = {}) => memoize(chain(...(init.profile ||
5
5
  ? []
6
6
  : [
7
7
  async () => {
8
+ init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
8
9
  const { fromEnv } = await import("@aws-sdk/credential-provider-env");
9
- return fromEnv()();
10
+ return fromEnv(init)();
10
11
  },
11
12
  ]), async () => {
13
+ init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
14
+ const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName } = init;
15
+ if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
16
+ throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).");
17
+ }
12
18
  const { fromSSO } = await import("@aws-sdk/credential-provider-sso");
13
19
  return fromSSO(init)();
14
20
  }, async () => {
21
+ init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
15
22
  const { fromIni } = await import("@aws-sdk/credential-provider-ini");
16
23
  return fromIni(init)();
17
24
  }, async () => {
25
+ init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
18
26
  const { fromProcess } = await import("@aws-sdk/credential-provider-process");
19
27
  return fromProcess(init)();
20
28
  }, async () => {
29
+ init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
21
30
  const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity");
22
31
  return fromTokenFile(init)();
23
32
  }, async () => {
33
+ init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
24
34
  return (await remoteProvider(init))();
25
35
  }, async () => {
26
36
  throw new CredentialsProviderError("Could not load credentials from any providers", false);
@@ -3,6 +3,7 @@ export const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
3
3
  export const remoteProvider = async (init) => {
4
4
  const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
5
5
  if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
6
+ init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromContainerMetadata");
6
7
  return fromContainerMetadata(init);
7
8
  }
8
9
  if (process.env[ENV_IMDS_DISABLED]) {
@@ -10,5 +11,6 @@ export const remoteProvider = async (init) => {
10
11
  throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled");
11
12
  };
12
13
  }
14
+ init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
13
15
  return fromInstanceMetadata(init);
14
16
  };
@@ -1,10 +1,13 @@
1
1
  import type { FromIniInit } from "@aws-sdk/credential-provider-ini";
2
2
  import type { FromProcessInit } from "@aws-sdk/credential-provider-process";
3
- import type { FromSSOInit } from "@aws-sdk/credential-provider-sso";
3
+ import type { FromSSOInit, SsoCredentialsParameters } from "@aws-sdk/credential-provider-sso";
4
4
  import type { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
5
5
  import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
6
6
  import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
7
- export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & FromSSOInit & FromTokenFileInit;
7
+ /**
8
+ * @public
9
+ */
10
+ export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
8
11
  /**
9
12
  * Creates a credential provider that will attempt to find credentials from the
10
13
  * following sources (listed in order of precedence):
@@ -24,20 +27,20 @@ export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcess
24
27
  * @param init Configuration that is passed to each individual
25
28
  * provider
26
29
  *
27
- * @see {@link fromEnv} The function used to source credentials from
28
- * environment variables
29
- * @see {@link fromSSO} The function used to source credentials from
30
- * resolved SSO token cache
31
- * @see {@link fromTokenFile} The function used to source credentials from
32
- * token file
33
- * @see {@link fromIni} The function used to source credentials from INI
34
- * files
35
- * @see {@link fromProcess} The function used to sources credentials from
36
- * credential_process in INI files
30
+ * @see {@link fromEnv} The function used to source credentials from
31
+ * environment variables.
32
+ * @see {@link fromSSO} The function used to source credentials from
33
+ * resolved SSO token cache.
34
+ * @see {@link fromTokenFile} The function used to source credentials from
35
+ * token file.
36
+ * @see {@link fromIni} The function used to source credentials from INI
37
+ * files.
38
+ * @see {@link fromProcess} The function used to sources credentials from
39
+ * credential_process in INI files.
37
40
  * @see {@link fromInstanceMetadata} The function used to source credentials from the
38
- * EC2 Instance Metadata Service
41
+ * EC2 Instance Metadata Service.
39
42
  * @see {@link fromContainerMetadata} The function used to source credentials from the
40
- * ECS Container Metadata Service
43
+ * ECS Container Metadata Service.
41
44
  */
42
45
  export declare const defaultProvider: (init?: DefaultProviderInit) => MemoizedProvider<AwsCredentialIdentity>;
43
46
  /**
@@ -1,13 +1,16 @@
1
1
  import { FromIniInit } from "@aws-sdk/credential-provider-ini";
2
2
  import { FromProcessInit } from "@aws-sdk/credential-provider-process";
3
- import { FromSSOInit } from "@aws-sdk/credential-provider-sso";
3
+ import {
4
+ FromSSOInit,
5
+ SsoCredentialsParameters,
6
+ } from "@aws-sdk/credential-provider-sso";
4
7
  import { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
5
8
  import { RemoteProviderInit } from "@smithy/credential-provider-imds";
6
9
  import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
7
10
  export type DefaultProviderInit = FromIniInit &
8
11
  RemoteProviderInit &
9
12
  FromProcessInit &
10
- FromSSOInit &
13
+ (FromSSOInit & Partial<SsoCredentialsParameters>) &
11
14
  FromTokenFileInit;
12
15
  export declare const defaultProvider: (
13
16
  init?: DefaultProviderInit
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-node",
3
- "version": "3.501.0",
3
+ "version": "3.502.0",
4
4
  "description": "AWS credential provider that sources credentials from a Node.JS environment. ",
5
5
  "engines": {
6
6
  "node": ">=14.0.0"
@@ -27,12 +27,12 @@
27
27
  },
28
28
  "license": "Apache-2.0",
29
29
  "dependencies": {
30
- "@aws-sdk/credential-provider-env": "3.496.0",
31
- "@aws-sdk/credential-provider-ini": "3.501.0",
32
- "@aws-sdk/credential-provider-process": "3.496.0",
33
- "@aws-sdk/credential-provider-sso": "3.501.0",
34
- "@aws-sdk/credential-provider-web-identity": "3.496.0",
35
- "@aws-sdk/types": "3.496.0",
30
+ "@aws-sdk/credential-provider-env": "3.502.0",
31
+ "@aws-sdk/credential-provider-ini": "3.502.0",
32
+ "@aws-sdk/credential-provider-process": "3.502.0",
33
+ "@aws-sdk/credential-provider-sso": "3.502.0",
34
+ "@aws-sdk/credential-provider-web-identity": "3.502.0",
35
+ "@aws-sdk/types": "3.502.0",
36
36
  "@smithy/credential-provider-imds": "^2.2.1",
37
37
  "@smithy/property-provider": "^2.1.1",
38
38
  "@smithy/shared-ini-file-loader": "^2.3.1",