@aws-sdk/credential-provider-node 3.901.0 → 3.907.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +72 -132
- package/package.json +7 -7
package/dist-cjs/index.js
CHANGED
|
@@ -1,79 +1,37 @@
|
|
|
1
|
-
|
|
2
|
-
var __create = Object.create;
|
|
3
|
-
var __defProp = Object.defineProperty;
|
|
4
|
-
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
|
-
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
-
var __getProtoOf = Object.getPrototypeOf;
|
|
7
|
-
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
8
|
-
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
9
|
-
var __export = (target, all) => {
|
|
10
|
-
for (var name in all)
|
|
11
|
-
__defProp(target, name, { get: all[name], enumerable: true });
|
|
12
|
-
};
|
|
13
|
-
var __copyProps = (to, from, except, desc) => {
|
|
14
|
-
if (from && typeof from === "object" || typeof from === "function") {
|
|
15
|
-
for (let key of __getOwnPropNames(from))
|
|
16
|
-
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
17
|
-
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
18
|
-
}
|
|
19
|
-
return to;
|
|
20
|
-
};
|
|
21
|
-
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
22
|
-
// If the importer is in node compatibility mode or this is not an ESM
|
|
23
|
-
// file that has been converted to a CommonJS file using a Babel-
|
|
24
|
-
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
25
|
-
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
26
|
-
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
27
|
-
mod
|
|
28
|
-
));
|
|
29
|
-
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
30
|
-
|
|
31
|
-
// src/index.ts
|
|
32
|
-
var index_exports = {};
|
|
33
|
-
__export(index_exports, {
|
|
34
|
-
credentialsTreatedAsExpired: () => credentialsTreatedAsExpired,
|
|
35
|
-
credentialsWillNeedRefresh: () => credentialsWillNeedRefresh,
|
|
36
|
-
defaultProvider: () => defaultProvider
|
|
37
|
-
});
|
|
38
|
-
module.exports = __toCommonJS(index_exports);
|
|
1
|
+
'use strict';
|
|
39
2
|
|
|
40
|
-
|
|
41
|
-
var
|
|
3
|
+
var credentialProviderEnv = require('@aws-sdk/credential-provider-env');
|
|
4
|
+
var propertyProvider = require('@smithy/property-provider');
|
|
5
|
+
var sharedIniFileLoader = require('@smithy/shared-ini-file-loader');
|
|
42
6
|
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
}
|
|
60
|
-
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
|
|
61
|
-
return fromInstanceMetadata(init);
|
|
62
|
-
}, "remoteProvider");
|
|
7
|
+
const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
8
|
+
const remoteProvider = async (init) => {
|
|
9
|
+
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import('@smithy/credential-provider-imds');
|
|
10
|
+
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
|
11
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
|
|
12
|
+
const { fromHttp } = await import('@aws-sdk/credential-provider-http');
|
|
13
|
+
return propertyProvider.chain(fromHttp(init), fromContainerMetadata(init));
|
|
14
|
+
}
|
|
15
|
+
if (process.env[ENV_IMDS_DISABLED] && process.env[ENV_IMDS_DISABLED] !== "false") {
|
|
16
|
+
return async () => {
|
|
17
|
+
throw new propertyProvider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
|
|
18
|
+
};
|
|
19
|
+
}
|
|
20
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
|
|
21
|
+
return fromInstanceMetadata(init);
|
|
22
|
+
};
|
|
63
23
|
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
const profile = init.profile ?? process.env[import_shared_ini_file_loader.ENV_PROFILE];
|
|
70
|
-
if (profile) {
|
|
71
|
-
const envStaticCredentialsAreSet = process.env[import_credential_provider_env.ENV_KEY] && process.env[import_credential_provider_env.ENV_SECRET];
|
|
24
|
+
let multipleCredentialSourceWarningEmitted = false;
|
|
25
|
+
const defaultProvider = (init = {}) => propertyProvider.memoize(propertyProvider.chain(async () => {
|
|
26
|
+
const profile = init.profile ?? process.env[sharedIniFileLoader.ENV_PROFILE];
|
|
27
|
+
if (profile) {
|
|
28
|
+
const envStaticCredentialsAreSet = process.env[credentialProviderEnv.ENV_KEY] && process.env[credentialProviderEnv.ENV_SECRET];
|
|
72
29
|
if (envStaticCredentialsAreSet) {
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
30
|
+
if (!multipleCredentialSourceWarningEmitted) {
|
|
31
|
+
const warnFn = init.logger?.warn && init.logger?.constructor?.name !== "NoOpLogger"
|
|
32
|
+
? init.logger.warn.bind(init.logger)
|
|
33
|
+
: console.warn;
|
|
34
|
+
warnFn(`@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:
|
|
77
35
|
Multiple credential sources detected:
|
|
78
36
|
Both AWS_PROFILE and the pair AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY static credentials are set.
|
|
79
37
|
This SDK will proceed with the AWS_PROFILE value.
|
|
@@ -81,67 +39,49 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
|
|
|
81
39
|
However, a future version may change this behavior to prefer the ENV static credentials.
|
|
82
40
|
Please ensure that your environment only sets either the AWS_PROFILE or the
|
|
83
41
|
AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.
|
|
84
|
-
`
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
}
|
|
42
|
+
`);
|
|
43
|
+
multipleCredentialSourceWarningEmitted = true;
|
|
44
|
+
}
|
|
88
45
|
}
|
|
89
|
-
throw new
|
|
90
|
-
|
|
91
|
-
|
|
46
|
+
throw new propertyProvider.CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.", {
|
|
47
|
+
logger: init.logger,
|
|
48
|
+
tryNextLink: true,
|
|
92
49
|
});
|
|
93
|
-
}
|
|
94
|
-
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
|
|
95
|
-
return (0, import_credential_provider_env.fromEnv)(init)();
|
|
96
|
-
},
|
|
97
|
-
async () => {
|
|
98
|
-
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
|
|
99
|
-
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
100
|
-
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
|
101
|
-
throw new import_property_provider.CredentialsProviderError(
|
|
102
|
-
"Skipping SSO provider in default chain (inputs do not include SSO fields).",
|
|
103
|
-
{ logger: init.logger }
|
|
104
|
-
);
|
|
105
|
-
}
|
|
106
|
-
const { fromSSO } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-sso")));
|
|
107
|
-
return fromSSO(init)();
|
|
108
|
-
},
|
|
109
|
-
async () => {
|
|
110
|
-
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
|
|
111
|
-
const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));
|
|
112
|
-
return fromIni(init)();
|
|
113
|
-
},
|
|
114
|
-
async () => {
|
|
115
|
-
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
|
|
116
|
-
const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));
|
|
117
|
-
return fromProcess(init)();
|
|
118
|
-
},
|
|
119
|
-
async () => {
|
|
120
|
-
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
|
|
121
|
-
const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));
|
|
122
|
-
return fromTokenFile(init)();
|
|
123
|
-
},
|
|
124
|
-
async () => {
|
|
125
|
-
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
|
|
126
|
-
return (await remoteProvider(init))();
|
|
127
|
-
},
|
|
128
|
-
async () => {
|
|
129
|
-
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", {
|
|
130
|
-
tryNextLink: false,
|
|
131
|
-
logger: init.logger
|
|
132
|
-
});
|
|
133
50
|
}
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
});
|
|
51
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
|
|
52
|
+
return credentialProviderEnv.fromEnv(init)();
|
|
53
|
+
}, async () => {
|
|
54
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
|
|
55
|
+
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
56
|
+
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
|
57
|
+
throw new propertyProvider.CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
|
|
58
|
+
}
|
|
59
|
+
const { fromSSO } = await import('@aws-sdk/credential-provider-sso');
|
|
60
|
+
return fromSSO(init)();
|
|
61
|
+
}, async () => {
|
|
62
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
|
|
63
|
+
const { fromIni } = await import('@aws-sdk/credential-provider-ini');
|
|
64
|
+
return fromIni(init)();
|
|
65
|
+
}, async () => {
|
|
66
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
|
|
67
|
+
const { fromProcess } = await import('@aws-sdk/credential-provider-process');
|
|
68
|
+
return fromProcess(init)();
|
|
69
|
+
}, async () => {
|
|
70
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
|
|
71
|
+
const { fromTokenFile } = await import('@aws-sdk/credential-provider-web-identity');
|
|
72
|
+
return fromTokenFile(init)();
|
|
73
|
+
}, async () => {
|
|
74
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
|
|
75
|
+
return (await remoteProvider(init))();
|
|
76
|
+
}, async () => {
|
|
77
|
+
throw new propertyProvider.CredentialsProviderError("Could not load credentials from any providers", {
|
|
78
|
+
tryNextLink: false,
|
|
79
|
+
logger: init.logger,
|
|
80
|
+
});
|
|
81
|
+
}), credentialsTreatedAsExpired, credentialsWillNeedRefresh);
|
|
82
|
+
const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
|
|
83
|
+
const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;
|
|
147
84
|
|
|
85
|
+
exports.credentialsTreatedAsExpired = credentialsTreatedAsExpired;
|
|
86
|
+
exports.credentialsWillNeedRefresh = credentialsWillNeedRefresh;
|
|
87
|
+
exports.defaultProvider = defaultProvider;
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-provider-node",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.907.0",
|
|
4
4
|
"description": "AWS credential provider that sources credentials from a Node.JS environment. ",
|
|
5
5
|
"engines": {
|
|
6
6
|
"node": ">=18.0.0"
|
|
@@ -31,12 +31,12 @@
|
|
|
31
31
|
},
|
|
32
32
|
"license": "Apache-2.0",
|
|
33
33
|
"dependencies": {
|
|
34
|
-
"@aws-sdk/credential-provider-env": "3.
|
|
35
|
-
"@aws-sdk/credential-provider-http": "3.
|
|
36
|
-
"@aws-sdk/credential-provider-ini": "3.
|
|
37
|
-
"@aws-sdk/credential-provider-process": "3.
|
|
38
|
-
"@aws-sdk/credential-provider-sso": "3.
|
|
39
|
-
"@aws-sdk/credential-provider-web-identity": "3.
|
|
34
|
+
"@aws-sdk/credential-provider-env": "3.907.0",
|
|
35
|
+
"@aws-sdk/credential-provider-http": "3.907.0",
|
|
36
|
+
"@aws-sdk/credential-provider-ini": "3.907.0",
|
|
37
|
+
"@aws-sdk/credential-provider-process": "3.907.0",
|
|
38
|
+
"@aws-sdk/credential-provider-sso": "3.907.0",
|
|
39
|
+
"@aws-sdk/credential-provider-web-identity": "3.907.0",
|
|
40
40
|
"@aws-sdk/types": "3.901.0",
|
|
41
41
|
"@smithy/credential-provider-imds": "^4.2.0",
|
|
42
42
|
"@smithy/property-provider": "^4.2.0",
|