@aws-sdk/credential-provider-node 3.583.0 → 3.587.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +15 -11
- package/dist-es/defaultProvider.js +11 -8
- package/dist-es/remoteProvider.js +3 -3
- package/dist-types/defaultProvider.d.ts +2 -1
- package/dist-types/remoteProvider.d.ts +2 -1
- package/dist-types/ts3.4/defaultProvider.d.ts +2 -0
- package/dist-types/ts3.4/remoteProvider.d.ts +2 -1
- package/package.json +10 -10
package/dist-cjs/index.js
CHANGED
|
@@ -49,16 +49,16 @@ var remoteProvider = /* @__PURE__ */ __name(async (init) => {
|
|
|
49
49
|
var _a, _b;
|
|
50
50
|
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await Promise.resolve().then(() => __toESM(require("@smithy/credential-provider-imds")));
|
|
51
51
|
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
|
52
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
52
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
|
|
53
53
|
const { fromHttp } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-http")));
|
|
54
54
|
return (0, import_property_provider.chain)(fromHttp(init), fromContainerMetadata(init));
|
|
55
55
|
}
|
|
56
56
|
if (process.env[ENV_IMDS_DISABLED]) {
|
|
57
57
|
return async () => {
|
|
58
|
-
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled");
|
|
58
|
+
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
|
|
59
59
|
};
|
|
60
60
|
}
|
|
61
|
-
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node
|
|
61
|
+
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
|
|
62
62
|
return fromInstanceMetadata(init);
|
|
63
63
|
}, "remoteProvider");
|
|
64
64
|
|
|
@@ -68,17 +68,18 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
|
|
|
68
68
|
...init.profile || process.env[import_shared_ini_file_loader.ENV_PROFILE] ? [] : [
|
|
69
69
|
async () => {
|
|
70
70
|
var _a;
|
|
71
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
71
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
|
|
72
72
|
return (0, import_credential_provider_env.fromEnv)(init)();
|
|
73
73
|
}
|
|
74
74
|
],
|
|
75
75
|
async () => {
|
|
76
76
|
var _a;
|
|
77
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
77
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
|
|
78
78
|
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
79
79
|
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
|
80
80
|
throw new import_property_provider.CredentialsProviderError(
|
|
81
|
-
"Skipping SSO provider in default chain (inputs do not include SSO fields)."
|
|
81
|
+
"Skipping SSO provider in default chain (inputs do not include SSO fields).",
|
|
82
|
+
{ logger: init.logger }
|
|
82
83
|
);
|
|
83
84
|
}
|
|
84
85
|
const { fromSSO } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-sso")));
|
|
@@ -86,29 +87,32 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
|
|
|
86
87
|
},
|
|
87
88
|
async () => {
|
|
88
89
|
var _a;
|
|
89
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
90
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
|
|
90
91
|
const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));
|
|
91
92
|
return fromIni(init)();
|
|
92
93
|
},
|
|
93
94
|
async () => {
|
|
94
95
|
var _a;
|
|
95
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
96
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
|
|
96
97
|
const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));
|
|
97
98
|
return fromProcess(init)();
|
|
98
99
|
},
|
|
99
100
|
async () => {
|
|
100
101
|
var _a;
|
|
101
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
102
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
|
|
102
103
|
const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));
|
|
103
104
|
return fromTokenFile(init)();
|
|
104
105
|
},
|
|
105
106
|
async () => {
|
|
106
107
|
var _a;
|
|
107
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
108
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
|
|
108
109
|
return (await remoteProvider(init))();
|
|
109
110
|
},
|
|
110
111
|
async () => {
|
|
111
|
-
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers",
|
|
112
|
+
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", {
|
|
113
|
+
tryNextLink: false,
|
|
114
|
+
logger: init.logger
|
|
115
|
+
});
|
|
112
116
|
}
|
|
113
117
|
),
|
|
114
118
|
credentialsTreatedAsExpired,
|
|
@@ -6,34 +6,37 @@ export const defaultProvider = (init = {}) => memoize(chain(...(init.profile ||
|
|
|
6
6
|
? []
|
|
7
7
|
: [
|
|
8
8
|
async () => {
|
|
9
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
9
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
|
|
10
10
|
return fromEnv(init)();
|
|
11
11
|
},
|
|
12
12
|
]), async () => {
|
|
13
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
13
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
|
|
14
14
|
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
15
15
|
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
|
16
|
-
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).");
|
|
16
|
+
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
|
|
17
17
|
}
|
|
18
18
|
const { fromSSO } = await import("@aws-sdk/credential-provider-sso");
|
|
19
19
|
return fromSSO(init)();
|
|
20
20
|
}, async () => {
|
|
21
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
21
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
|
|
22
22
|
const { fromIni } = await import("@aws-sdk/credential-provider-ini");
|
|
23
23
|
return fromIni(init)();
|
|
24
24
|
}, async () => {
|
|
25
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
25
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
|
|
26
26
|
const { fromProcess } = await import("@aws-sdk/credential-provider-process");
|
|
27
27
|
return fromProcess(init)();
|
|
28
28
|
}, async () => {
|
|
29
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
29
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
|
|
30
30
|
const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity");
|
|
31
31
|
return fromTokenFile(init)();
|
|
32
32
|
}, async () => {
|
|
33
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
33
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
|
|
34
34
|
return (await remoteProvider(init))();
|
|
35
35
|
}, async () => {
|
|
36
|
-
throw new CredentialsProviderError("Could not load credentials from any providers",
|
|
36
|
+
throw new CredentialsProviderError("Could not load credentials from any providers", {
|
|
37
|
+
tryNextLink: false,
|
|
38
|
+
logger: init.logger,
|
|
39
|
+
});
|
|
37
40
|
}), credentialsTreatedAsExpired, credentialsWillNeedRefresh);
|
|
38
41
|
export const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
|
|
39
42
|
export const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;
|
|
@@ -3,15 +3,15 @@ export const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
|
3
3
|
export const remoteProvider = async (init) => {
|
|
4
4
|
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
|
|
5
5
|
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
|
6
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
6
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
|
|
7
7
|
const { fromHttp } = await import("@aws-sdk/credential-provider-http");
|
|
8
8
|
return chain(fromHttp(init), fromContainerMetadata(init));
|
|
9
9
|
}
|
|
10
10
|
if (process.env[ENV_IMDS_DISABLED]) {
|
|
11
11
|
return async () => {
|
|
12
|
-
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled");
|
|
12
|
+
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
|
|
13
13
|
};
|
|
14
14
|
}
|
|
15
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
15
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
|
|
16
16
|
return fromInstanceMetadata(init);
|
|
17
17
|
};
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
|
1
2
|
import type { FromIniInit } from "@aws-sdk/credential-provider-ini";
|
|
2
3
|
import type { FromProcessInit } from "@aws-sdk/credential-provider-process";
|
|
3
4
|
import type { FromSSOInit, SsoCredentialsParameters } from "@aws-sdk/credential-provider-sso";
|
|
@@ -7,7 +8,7 @@ import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
|
|
|
7
8
|
/**
|
|
8
9
|
* @public
|
|
9
10
|
*/
|
|
10
|
-
export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
|
|
11
|
+
export type DefaultProviderInit = FromIniInit & FromHttpOptions & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
|
|
11
12
|
/**
|
|
12
13
|
* Creates a credential provider that will attempt to find credentials from the
|
|
13
14
|
* following sources (listed in order of precedence):
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
|
1
2
|
import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
|
2
3
|
import type { AwsCredentialIdentityProvider } from "@smithy/types";
|
|
3
4
|
/**
|
|
@@ -7,4 +8,4 @@ export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
|
7
8
|
/**
|
|
8
9
|
* @internal
|
|
9
10
|
*/
|
|
10
|
-
export declare const remoteProvider: (init: RemoteProviderInit) => Promise<AwsCredentialIdentityProvider>;
|
|
11
|
+
export declare const remoteProvider: (init: RemoteProviderInit | FromHttpOptions) => Promise<AwsCredentialIdentityProvider>;
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
|
1
2
|
import { FromIniInit } from "@aws-sdk/credential-provider-ini";
|
|
2
3
|
import { FromProcessInit } from "@aws-sdk/credential-provider-process";
|
|
3
4
|
import {
|
|
@@ -8,6 +9,7 @@ import { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
|
|
|
8
9
|
import { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
|
9
10
|
import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
|
|
10
11
|
export type DefaultProviderInit = FromIniInit &
|
|
12
|
+
FromHttpOptions &
|
|
11
13
|
RemoteProviderInit &
|
|
12
14
|
FromProcessInit &
|
|
13
15
|
(FromSSOInit & Partial<SsoCredentialsParameters>) &
|
|
@@ -1,6 +1,7 @@
|
|
|
1
|
+
import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
|
1
2
|
import { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
|
2
3
|
import { AwsCredentialIdentityProvider } from "@smithy/types";
|
|
3
4
|
export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
4
5
|
export declare const remoteProvider: (
|
|
5
|
-
init: RemoteProviderInit
|
|
6
|
+
init: RemoteProviderInit | FromHttpOptions
|
|
6
7
|
) => Promise<AwsCredentialIdentityProvider>;
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-provider-node",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.587.0",
|
|
4
4
|
"description": "AWS credential provider that sources credentials from a Node.JS environment. ",
|
|
5
5
|
"engines": {
|
|
6
6
|
"node": ">=16.0.0"
|
|
@@ -28,16 +28,16 @@
|
|
|
28
28
|
},
|
|
29
29
|
"license": "Apache-2.0",
|
|
30
30
|
"dependencies": {
|
|
31
|
-
"@aws-sdk/credential-provider-env": "3.
|
|
32
|
-
"@aws-sdk/credential-provider-http": "3.
|
|
33
|
-
"@aws-sdk/credential-provider-ini": "3.
|
|
34
|
-
"@aws-sdk/credential-provider-process": "3.
|
|
35
|
-
"@aws-sdk/credential-provider-sso": "3.
|
|
36
|
-
"@aws-sdk/credential-provider-web-identity": "3.
|
|
31
|
+
"@aws-sdk/credential-provider-env": "3.587.0",
|
|
32
|
+
"@aws-sdk/credential-provider-http": "3.587.0",
|
|
33
|
+
"@aws-sdk/credential-provider-ini": "3.587.0",
|
|
34
|
+
"@aws-sdk/credential-provider-process": "3.587.0",
|
|
35
|
+
"@aws-sdk/credential-provider-sso": "3.587.0",
|
|
36
|
+
"@aws-sdk/credential-provider-web-identity": "3.587.0",
|
|
37
37
|
"@aws-sdk/types": "3.577.0",
|
|
38
|
-
"@smithy/credential-provider-imds": "^3.
|
|
39
|
-
"@smithy/property-provider": "^3.
|
|
40
|
-
"@smithy/shared-ini-file-loader": "^3.
|
|
38
|
+
"@smithy/credential-provider-imds": "^3.1.0",
|
|
39
|
+
"@smithy/property-provider": "^3.1.0",
|
|
40
|
+
"@smithy/shared-ini-file-loader": "^3.1.0",
|
|
41
41
|
"@smithy/types": "^3.0.0",
|
|
42
42
|
"tslib": "^2.6.2"
|
|
43
43
|
},
|