@aws-sdk/credential-provider-node 3.583.0 → 3.588.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -49,16 +49,16 @@ var remoteProvider = /* @__PURE__ */ __name(async (init) => {
49
49
  var _a, _b;
50
50
  const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await Promise.resolve().then(() => __toESM(require("@smithy/credential-provider-imds")));
51
51
  if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
52
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata");
52
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
53
53
  const { fromHttp } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-http")));
54
54
  return (0, import_property_provider.chain)(fromHttp(init), fromContainerMetadata(init));
55
55
  }
56
56
  if (process.env[ENV_IMDS_DISABLED]) {
57
57
  return async () => {
58
- throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled");
58
+ throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
59
59
  };
60
60
  }
61
- (_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
61
+ (_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
62
62
  return fromInstanceMetadata(init);
63
63
  }, "remoteProvider");
64
64
 
@@ -68,17 +68,18 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
68
68
  ...init.profile || process.env[import_shared_ini_file_loader.ENV_PROFILE] ? [] : [
69
69
  async () => {
70
70
  var _a;
71
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
71
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
72
72
  return (0, import_credential_provider_env.fromEnv)(init)();
73
73
  }
74
74
  ],
75
75
  async () => {
76
76
  var _a;
77
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
77
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
78
78
  const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
79
79
  if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
80
80
  throw new import_property_provider.CredentialsProviderError(
81
- "Skipping SSO provider in default chain (inputs do not include SSO fields)."
81
+ "Skipping SSO provider in default chain (inputs do not include SSO fields).",
82
+ { logger: init.logger }
82
83
  );
83
84
  }
84
85
  const { fromSSO } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-sso")));
@@ -86,29 +87,32 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
86
87
  },
87
88
  async () => {
88
89
  var _a;
89
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
90
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
90
91
  const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));
91
92
  return fromIni(init)();
92
93
  },
93
94
  async () => {
94
95
  var _a;
95
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
96
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
96
97
  const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));
97
98
  return fromProcess(init)();
98
99
  },
99
100
  async () => {
100
101
  var _a;
101
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
102
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
102
103
  const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));
103
104
  return fromTokenFile(init)();
104
105
  },
105
106
  async () => {
106
107
  var _a;
107
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
108
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
108
109
  return (await remoteProvider(init))();
109
110
  },
110
111
  async () => {
111
- throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", false);
112
+ throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", {
113
+ tryNextLink: false,
114
+ logger: init.logger
115
+ });
112
116
  }
113
117
  ),
114
118
  credentialsTreatedAsExpired,
@@ -6,34 +6,37 @@ export const defaultProvider = (init = {}) => memoize(chain(...(init.profile ||
6
6
  ? []
7
7
  : [
8
8
  async () => {
9
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
9
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
10
10
  return fromEnv(init)();
11
11
  },
12
12
  ]), async () => {
13
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
13
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
14
14
  const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
15
15
  if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
16
- throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).");
16
+ throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
17
17
  }
18
18
  const { fromSSO } = await import("@aws-sdk/credential-provider-sso");
19
19
  return fromSSO(init)();
20
20
  }, async () => {
21
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
21
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
22
22
  const { fromIni } = await import("@aws-sdk/credential-provider-ini");
23
23
  return fromIni(init)();
24
24
  }, async () => {
25
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
25
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
26
26
  const { fromProcess } = await import("@aws-sdk/credential-provider-process");
27
27
  return fromProcess(init)();
28
28
  }, async () => {
29
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
29
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
30
30
  const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity");
31
31
  return fromTokenFile(init)();
32
32
  }, async () => {
33
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
33
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
34
34
  return (await remoteProvider(init))();
35
35
  }, async () => {
36
- throw new CredentialsProviderError("Could not load credentials from any providers", false);
36
+ throw new CredentialsProviderError("Could not load credentials from any providers", {
37
+ tryNextLink: false,
38
+ logger: init.logger,
39
+ });
37
40
  }), credentialsTreatedAsExpired, credentialsWillNeedRefresh);
38
41
  export const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
39
42
  export const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;
@@ -3,15 +3,15 @@ export const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
3
3
  export const remoteProvider = async (init) => {
4
4
  const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
5
5
  if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
6
- init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata");
6
+ init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
7
7
  const { fromHttp } = await import("@aws-sdk/credential-provider-http");
8
8
  return chain(fromHttp(init), fromContainerMetadata(init));
9
9
  }
10
10
  if (process.env[ENV_IMDS_DISABLED]) {
11
11
  return async () => {
12
- throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled");
12
+ throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
13
13
  };
14
14
  }
15
- init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
15
+ init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
16
16
  return fromInstanceMetadata(init);
17
17
  };
@@ -1,3 +1,4 @@
1
+ import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
1
2
  import type { FromIniInit } from "@aws-sdk/credential-provider-ini";
2
3
  import type { FromProcessInit } from "@aws-sdk/credential-provider-process";
3
4
  import type { FromSSOInit, SsoCredentialsParameters } from "@aws-sdk/credential-provider-sso";
@@ -7,7 +8,7 @@ import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
7
8
  /**
8
9
  * @public
9
10
  */
10
- export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
11
+ export type DefaultProviderInit = FromIniInit & FromHttpOptions & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
11
12
  /**
12
13
  * Creates a credential provider that will attempt to find credentials from the
13
14
  * following sources (listed in order of precedence):
@@ -1,3 +1,4 @@
1
+ import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
1
2
  import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
2
3
  import type { AwsCredentialIdentityProvider } from "@smithy/types";
3
4
  /**
@@ -7,4 +8,4 @@ export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
7
8
  /**
8
9
  * @internal
9
10
  */
10
- export declare const remoteProvider: (init: RemoteProviderInit) => Promise<AwsCredentialIdentityProvider>;
11
+ export declare const remoteProvider: (init: RemoteProviderInit | FromHttpOptions) => Promise<AwsCredentialIdentityProvider>;
@@ -1,3 +1,4 @@
1
+ import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
1
2
  import { FromIniInit } from "@aws-sdk/credential-provider-ini";
2
3
  import { FromProcessInit } from "@aws-sdk/credential-provider-process";
3
4
  import {
@@ -8,6 +9,7 @@ import { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
8
9
  import { RemoteProviderInit } from "@smithy/credential-provider-imds";
9
10
  import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
10
11
  export type DefaultProviderInit = FromIniInit &
12
+ FromHttpOptions &
11
13
  RemoteProviderInit &
12
14
  FromProcessInit &
13
15
  (FromSSOInit & Partial<SsoCredentialsParameters>) &
@@ -1,6 +1,7 @@
1
+ import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
1
2
  import { RemoteProviderInit } from "@smithy/credential-provider-imds";
2
3
  import { AwsCredentialIdentityProvider } from "@smithy/types";
3
4
  export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
4
5
  export declare const remoteProvider: (
5
- init: RemoteProviderInit
6
+ init: RemoteProviderInit | FromHttpOptions
6
7
  ) => Promise<AwsCredentialIdentityProvider>;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-node",
3
- "version": "3.583.0",
3
+ "version": "3.588.0",
4
4
  "description": "AWS credential provider that sources credentials from a Node.JS environment. ",
5
5
  "engines": {
6
6
  "node": ">=16.0.0"
@@ -28,16 +28,16 @@
28
28
  },
29
29
  "license": "Apache-2.0",
30
30
  "dependencies": {
31
- "@aws-sdk/credential-provider-env": "3.577.0",
32
- "@aws-sdk/credential-provider-http": "3.582.0",
33
- "@aws-sdk/credential-provider-ini": "3.583.0",
34
- "@aws-sdk/credential-provider-process": "3.577.0",
35
- "@aws-sdk/credential-provider-sso": "3.583.0",
36
- "@aws-sdk/credential-provider-web-identity": "3.577.0",
31
+ "@aws-sdk/credential-provider-env": "3.587.0",
32
+ "@aws-sdk/credential-provider-http": "3.587.0",
33
+ "@aws-sdk/credential-provider-ini": "3.588.0",
34
+ "@aws-sdk/credential-provider-process": "3.587.0",
35
+ "@aws-sdk/credential-provider-sso": "3.588.0",
36
+ "@aws-sdk/credential-provider-web-identity": "3.587.0",
37
37
  "@aws-sdk/types": "3.577.0",
38
- "@smithy/credential-provider-imds": "^3.0.0",
39
- "@smithy/property-provider": "^3.0.0",
40
- "@smithy/shared-ini-file-loader": "^3.0.0",
38
+ "@smithy/credential-provider-imds": "^3.1.0",
39
+ "@smithy/property-provider": "^3.1.0",
40
+ "@smithy/shared-ini-file-loader": "^3.1.0",
41
41
  "@smithy/types": "^3.0.0",
42
42
  "tslib": "^2.6.2"
43
43
  },