@aws-sdk/credential-provider-node 3.502.0 → 3.503.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -47,8 +47,9 @@ var remoteProvider = /* @__PURE__ */ __name(async (init) => {
47
47
  var _a, _b;
48
48
  const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await Promise.resolve().then(() => __toESM(require("@smithy/credential-provider-imds")));
49
49
  if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
50
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromContainerMetadata");
51
- return fromContainerMetadata(init);
50
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata");
51
+ const { fromHttp } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-http")));
52
+ return (0, import_property_provider.chain)(fromHttp(init), fromContainerMetadata(init));
52
53
  }
53
54
  if (process.env[ENV_IMDS_DISABLED]) {
54
55
  return async () => {
@@ -73,8 +74,8 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
73
74
  async () => {
74
75
  var _a;
75
76
  (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
76
- const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName } = init;
77
- if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
77
+ const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
78
+ if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
78
79
  throw new import_property_provider.CredentialsProviderError(
79
80
  "Skipping SSO provider in default chain (inputs do not include SSO fields)."
80
81
  );
@@ -11,8 +11,8 @@ export const defaultProvider = (init = {}) => memoize(chain(...(init.profile ||
11
11
  },
12
12
  ]), async () => {
13
13
  init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
14
- const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName } = init;
15
- if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
14
+ const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
15
+ if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
16
16
  throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).");
17
17
  }
18
18
  const { fromSSO } = await import("@aws-sdk/credential-provider-sso");
@@ -1,10 +1,11 @@
1
- import { CredentialsProviderError } from "@smithy/property-provider";
1
+ import { chain, CredentialsProviderError } from "@smithy/property-provider";
2
2
  export const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
3
3
  export const remoteProvider = async (init) => {
4
4
  const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
5
5
  if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
6
- init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromContainerMetadata");
7
- return fromContainerMetadata(init);
6
+ init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata");
7
+ const { fromHttp } = await import("@aws-sdk/credential-provider-http");
8
+ return chain(fromHttp(init), fromContainerMetadata(init));
8
9
  }
9
10
  if (process.env[ENV_IMDS_DISABLED]) {
10
11
  return async () => {
@@ -1,5 +1,8 @@
1
1
  import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
2
2
  import type { AwsCredentialIdentityProvider } from "@smithy/types";
3
+ /**
4
+ * @internal
5
+ */
3
6
  export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
4
7
  /**
5
8
  * @internal
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-node",
3
- "version": "3.502.0",
3
+ "version": "3.503.1",
4
4
  "description": "AWS credential provider that sources credentials from a Node.JS environment. ",
5
5
  "engines": {
6
6
  "node": ">=14.0.0"
@@ -28,9 +28,10 @@
28
28
  "license": "Apache-2.0",
29
29
  "dependencies": {
30
30
  "@aws-sdk/credential-provider-env": "3.502.0",
31
- "@aws-sdk/credential-provider-ini": "3.502.0",
31
+ "@aws-sdk/credential-provider-http": "3.503.1",
32
+ "@aws-sdk/credential-provider-ini": "3.503.1",
32
33
  "@aws-sdk/credential-provider-process": "3.502.0",
33
- "@aws-sdk/credential-provider-sso": "3.502.0",
34
+ "@aws-sdk/credential-provider-sso": "3.503.1",
34
35
  "@aws-sdk/credential-provider-web-identity": "3.502.0",
35
36
  "@aws-sdk/types": "3.502.0",
36
37
  "@smithy/credential-provider-imds": "^2.2.1",