@aws-sdk/credential-provider-node 3.901.0 → 3.907.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist-cjs/index.js +72 -132
  2. package/package.json +7 -7
package/dist-cjs/index.js CHANGED
@@ -1,79 +1,37 @@
1
- "use strict";
2
- var __create = Object.create;
3
- var __defProp = Object.defineProperty;
4
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
- var __getOwnPropNames = Object.getOwnPropertyNames;
6
- var __getProtoOf = Object.getPrototypeOf;
7
- var __hasOwnProp = Object.prototype.hasOwnProperty;
8
- var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
9
- var __export = (target, all) => {
10
- for (var name in all)
11
- __defProp(target, name, { get: all[name], enumerable: true });
12
- };
13
- var __copyProps = (to, from, except, desc) => {
14
- if (from && typeof from === "object" || typeof from === "function") {
15
- for (let key of __getOwnPropNames(from))
16
- if (!__hasOwnProp.call(to, key) && key !== except)
17
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
18
- }
19
- return to;
20
- };
21
- var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
22
- // If the importer is in node compatibility mode or this is not an ESM
23
- // file that has been converted to a CommonJS file using a Babel-
24
- // compatible transform (i.e. "__esModule" has not been set), then set
25
- // "default" to the CommonJS "module.exports" for node compatibility.
26
- isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
27
- mod
28
- ));
29
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
30
-
31
- // src/index.ts
32
- var index_exports = {};
33
- __export(index_exports, {
34
- credentialsTreatedAsExpired: () => credentialsTreatedAsExpired,
35
- credentialsWillNeedRefresh: () => credentialsWillNeedRefresh,
36
- defaultProvider: () => defaultProvider
37
- });
38
- module.exports = __toCommonJS(index_exports);
1
+ 'use strict';
39
2
 
40
- // src/defaultProvider.ts
41
- var import_credential_provider_env = require("@aws-sdk/credential-provider-env");
3
+ var credentialProviderEnv = require('@aws-sdk/credential-provider-env');
4
+ var propertyProvider = require('@smithy/property-provider');
5
+ var sharedIniFileLoader = require('@smithy/shared-ini-file-loader');
42
6
 
43
- var import_shared_ini_file_loader = require("@smithy/shared-ini-file-loader");
44
-
45
- // src/remoteProvider.ts
46
- var import_property_provider = require("@smithy/property-provider");
47
- var ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
48
- var remoteProvider = /* @__PURE__ */ __name(async (init) => {
49
- const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await Promise.resolve().then(() => __toESM(require("@smithy/credential-provider-imds")));
50
- if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
51
- init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
52
- const { fromHttp } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-http")));
53
- return (0, import_property_provider.chain)(fromHttp(init), fromContainerMetadata(init));
54
- }
55
- if (process.env[ENV_IMDS_DISABLED] && process.env[ENV_IMDS_DISABLED] !== "false") {
56
- return async () => {
57
- throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
58
- };
59
- }
60
- init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
61
- return fromInstanceMetadata(init);
62
- }, "remoteProvider");
7
+ const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
8
+ const remoteProvider = async (init) => {
9
+ const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import('@smithy/credential-provider-imds');
10
+ if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
11
+ init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
12
+ const { fromHttp } = await import('@aws-sdk/credential-provider-http');
13
+ return propertyProvider.chain(fromHttp(init), fromContainerMetadata(init));
14
+ }
15
+ if (process.env[ENV_IMDS_DISABLED] && process.env[ENV_IMDS_DISABLED] !== "false") {
16
+ return async () => {
17
+ throw new propertyProvider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
18
+ };
19
+ }
20
+ init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
21
+ return fromInstanceMetadata(init);
22
+ };
63
23
 
64
- // src/defaultProvider.ts
65
- var multipleCredentialSourceWarningEmitted = false;
66
- var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_provider.memoize)(
67
- (0, import_property_provider.chain)(
68
- async () => {
69
- const profile = init.profile ?? process.env[import_shared_ini_file_loader.ENV_PROFILE];
70
- if (profile) {
71
- const envStaticCredentialsAreSet = process.env[import_credential_provider_env.ENV_KEY] && process.env[import_credential_provider_env.ENV_SECRET];
24
+ let multipleCredentialSourceWarningEmitted = false;
25
+ const defaultProvider = (init = {}) => propertyProvider.memoize(propertyProvider.chain(async () => {
26
+ const profile = init.profile ?? process.env[sharedIniFileLoader.ENV_PROFILE];
27
+ if (profile) {
28
+ const envStaticCredentialsAreSet = process.env[credentialProviderEnv.ENV_KEY] && process.env[credentialProviderEnv.ENV_SECRET];
72
29
  if (envStaticCredentialsAreSet) {
73
- if (!multipleCredentialSourceWarningEmitted) {
74
- const warnFn = init.logger?.warn && init.logger?.constructor?.name !== "NoOpLogger" ? init.logger.warn.bind(init.logger) : console.warn;
75
- warnFn(
76
- `@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:
30
+ if (!multipleCredentialSourceWarningEmitted) {
31
+ const warnFn = init.logger?.warn && init.logger?.constructor?.name !== "NoOpLogger"
32
+ ? init.logger.warn.bind(init.logger)
33
+ : console.warn;
34
+ warnFn(`@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:
77
35
  Multiple credential sources detected:
78
36
  Both AWS_PROFILE and the pair AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY static credentials are set.
79
37
  This SDK will proceed with the AWS_PROFILE value.
@@ -81,67 +39,49 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
81
39
  However, a future version may change this behavior to prefer the ENV static credentials.
82
40
  Please ensure that your environment only sets either the AWS_PROFILE or the
83
41
  AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.
84
- `
85
- );
86
- multipleCredentialSourceWarningEmitted = true;
87
- }
42
+ `);
43
+ multipleCredentialSourceWarningEmitted = true;
44
+ }
88
45
  }
89
- throw new import_property_provider.CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.", {
90
- logger: init.logger,
91
- tryNextLink: true
46
+ throw new propertyProvider.CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.", {
47
+ logger: init.logger,
48
+ tryNextLink: true,
92
49
  });
93
- }
94
- init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
95
- return (0, import_credential_provider_env.fromEnv)(init)();
96
- },
97
- async () => {
98
- init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
99
- const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
100
- if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
101
- throw new import_property_provider.CredentialsProviderError(
102
- "Skipping SSO provider in default chain (inputs do not include SSO fields).",
103
- { logger: init.logger }
104
- );
105
- }
106
- const { fromSSO } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-sso")));
107
- return fromSSO(init)();
108
- },
109
- async () => {
110
- init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
111
- const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));
112
- return fromIni(init)();
113
- },
114
- async () => {
115
- init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
116
- const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));
117
- return fromProcess(init)();
118
- },
119
- async () => {
120
- init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
121
- const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));
122
- return fromTokenFile(init)();
123
- },
124
- async () => {
125
- init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
126
- return (await remoteProvider(init))();
127
- },
128
- async () => {
129
- throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", {
130
- tryNextLink: false,
131
- logger: init.logger
132
- });
133
50
  }
134
- ),
135
- credentialsTreatedAsExpired,
136
- credentialsWillNeedRefresh
137
- ), "defaultProvider");
138
- var credentialsWillNeedRefresh = /* @__PURE__ */ __name((credentials) => credentials?.expiration !== void 0, "credentialsWillNeedRefresh");
139
- var credentialsTreatedAsExpired = /* @__PURE__ */ __name((credentials) => credentials?.expiration !== void 0 && credentials.expiration.getTime() - Date.now() < 3e5, "credentialsTreatedAsExpired");
140
- // Annotate the CommonJS export names for ESM import in node:
141
-
142
- 0 && (module.exports = {
143
- defaultProvider,
144
- credentialsWillNeedRefresh,
145
- credentialsTreatedAsExpired
146
- });
51
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
52
+ return credentialProviderEnv.fromEnv(init)();
53
+ }, async () => {
54
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
55
+ const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
56
+ if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
57
+ throw new propertyProvider.CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
58
+ }
59
+ const { fromSSO } = await import('@aws-sdk/credential-provider-sso');
60
+ return fromSSO(init)();
61
+ }, async () => {
62
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
63
+ const { fromIni } = await import('@aws-sdk/credential-provider-ini');
64
+ return fromIni(init)();
65
+ }, async () => {
66
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
67
+ const { fromProcess } = await import('@aws-sdk/credential-provider-process');
68
+ return fromProcess(init)();
69
+ }, async () => {
70
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
71
+ const { fromTokenFile } = await import('@aws-sdk/credential-provider-web-identity');
72
+ return fromTokenFile(init)();
73
+ }, async () => {
74
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
75
+ return (await remoteProvider(init))();
76
+ }, async () => {
77
+ throw new propertyProvider.CredentialsProviderError("Could not load credentials from any providers", {
78
+ tryNextLink: false,
79
+ logger: init.logger,
80
+ });
81
+ }), credentialsTreatedAsExpired, credentialsWillNeedRefresh);
82
+ const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
83
+ const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;
147
84
 
85
+ exports.credentialsTreatedAsExpired = credentialsTreatedAsExpired;
86
+ exports.credentialsWillNeedRefresh = credentialsWillNeedRefresh;
87
+ exports.defaultProvider = defaultProvider;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-node",
3
- "version": "3.901.0",
3
+ "version": "3.907.0",
4
4
  "description": "AWS credential provider that sources credentials from a Node.JS environment. ",
5
5
  "engines": {
6
6
  "node": ">=18.0.0"
@@ -31,12 +31,12 @@
31
31
  },
32
32
  "license": "Apache-2.0",
33
33
  "dependencies": {
34
- "@aws-sdk/credential-provider-env": "3.901.0",
35
- "@aws-sdk/credential-provider-http": "3.901.0",
36
- "@aws-sdk/credential-provider-ini": "3.901.0",
37
- "@aws-sdk/credential-provider-process": "3.901.0",
38
- "@aws-sdk/credential-provider-sso": "3.901.0",
39
- "@aws-sdk/credential-provider-web-identity": "3.901.0",
34
+ "@aws-sdk/credential-provider-env": "3.907.0",
35
+ "@aws-sdk/credential-provider-http": "3.907.0",
36
+ "@aws-sdk/credential-provider-ini": "3.907.0",
37
+ "@aws-sdk/credential-provider-process": "3.907.0",
38
+ "@aws-sdk/credential-provider-sso": "3.907.0",
39
+ "@aws-sdk/credential-provider-web-identity": "3.907.0",
40
40
  "@aws-sdk/types": "3.901.0",
41
41
  "@smithy/credential-provider-imds": "^4.2.0",
42
42
  "@smithy/property-provider": "^4.2.0",