@aws-sdk/credential-provider-sso 3.888.0 → 3.890.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -67,13 +67,21 @@ var resolveSSOCredentials = /* @__PURE__ */ __name(async ({
67
67
  clientConfig,
68
68
  parentClientConfig,
69
69
  profile,
70
+ filepath,
71
+ configFilepath,
72
+ ignoreCache,
70
73
  logger
71
74
  }) => {
72
75
  let token;
73
76
  const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
74
77
  if (ssoSession) {
75
78
  try {
76
- const _token = await (0, import_token_providers.fromSso)({ profile })();
79
+ const _token = await (0, import_token_providers.fromSso)({
80
+ profile,
81
+ filepath,
82
+ configFilepath,
83
+ ignoreCache
84
+ })();
77
85
  token = {
78
86
  accessToken: _token.token,
79
87
  expiresAt: new Date(_token.expiration).toISOString()
@@ -215,7 +223,11 @@ var fromSSO = /* @__PURE__ */ __name((init = {}) => async ({ callerClientConfig
215
223
  ssoClient,
216
224
  clientConfig: init.clientConfig,
217
225
  parentClientConfig: init.parentClientConfig,
218
- profile: profileName
226
+ profile: profileName,
227
+ filepath: init.filepath,
228
+ configFilepath: init.configFilepath,
229
+ ignoreCache: init.ignoreCache,
230
+ logger: init.logger
219
231
  });
220
232
  } else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
221
233
  throw new import_property_provider.CredentialsProviderError(
@@ -232,7 +244,11 @@ var fromSSO = /* @__PURE__ */ __name((init = {}) => async ({ callerClientConfig
232
244
  ssoClient,
233
245
  clientConfig: init.clientConfig,
234
246
  parentClientConfig: init.parentClientConfig,
235
- profile: profileName
247
+ profile: profileName,
248
+ filepath: init.filepath,
249
+ configFilepath: init.configFilepath,
250
+ ignoreCache: init.ignoreCache,
251
+ logger: init.logger
236
252
  });
237
253
  }
238
254
  }, "fromSSO");
@@ -51,6 +51,10 @@ export const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
51
51
  clientConfig: init.clientConfig,
52
52
  parentClientConfig: init.parentClientConfig,
53
53
  profile: profileName,
54
+ filepath: init.filepath,
55
+ configFilepath: init.configFilepath,
56
+ ignoreCache: init.ignoreCache,
57
+ logger: init.logger,
54
58
  });
55
59
  }
56
60
  else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
@@ -68,6 +72,10 @@ export const fromSSO = (init = {}) => async ({ callerClientConfig } = {}) => {
68
72
  clientConfig: init.clientConfig,
69
73
  parentClientConfig: init.parentClientConfig,
70
74
  profile: profileName,
75
+ filepath: init.filepath,
76
+ configFilepath: init.configFilepath,
77
+ ignoreCache: init.ignoreCache,
78
+ logger: init.logger,
71
79
  });
72
80
  }
73
81
  };
@@ -3,12 +3,17 @@ import { fromSso as getSsoTokenProvider } from "@aws-sdk/token-providers";
3
3
  import { CredentialsProviderError } from "@smithy/property-provider";
4
4
  import { getSSOTokenFromFile } from "@smithy/shared-ini-file-loader";
5
5
  const SHOULD_FAIL_CREDENTIAL_CHAIN = false;
6
- export const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }) => {
6
+ export const resolveSSOCredentials = async ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, filepath, configFilepath, ignoreCache, logger, }) => {
7
7
  let token;
8
8
  const refreshMessage = `To refresh this SSO session run aws sso login with the corresponding profile.`;
9
9
  if (ssoSession) {
10
10
  try {
11
- const _token = await getSsoTokenProvider({ profile })();
11
+ const _token = await getSsoTokenProvider({
12
+ profile,
13
+ filepath,
14
+ configFilepath,
15
+ ignoreCache,
16
+ })();
12
17
  token = {
13
18
  accessToken: _token.token,
14
19
  expiresAt: new Date(_token.expiration).toISOString(),
@@ -3,4 +3,4 @@ import { FromSSOInit, SsoCredentialsParameters } from "./fromSSO";
3
3
  /**
4
4
  * @internal
5
5
  */
6
- export declare const resolveSSOCredentials: ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, logger, }: FromSSOInit & SsoCredentialsParameters) => Promise<AwsCredentialIdentity>;
6
+ export declare const resolveSSOCredentials: ({ ssoStartUrl, ssoSession, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, clientConfig, parentClientConfig, profile, filepath, configFilepath, ignoreCache, logger, }: FromSSOInit & SsoCredentialsParameters) => Promise<AwsCredentialIdentity>;
@@ -10,5 +10,8 @@ export declare const resolveSSOCredentials: ({
10
10
  clientConfig,
11
11
  parentClientConfig,
12
12
  profile,
13
+ filepath,
14
+ configFilepath,
15
+ ignoreCache,
13
16
  logger,
14
17
  }: FromSSOInit & SsoCredentialsParameters) => Promise<AwsCredentialIdentity>;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-sso",
3
- "version": "3.888.0",
3
+ "version": "3.890.0",
4
4
  "description": "AWS credential provider that exchanges a resolved SSO login token file for temporary AWS credentials",
5
5
  "main": "./dist-cjs/index.js",
6
6
  "module": "./dist-es/index.js",
@@ -25,12 +25,12 @@
25
25
  },
26
26
  "license": "Apache-2.0",
27
27
  "dependencies": {
28
- "@aws-sdk/client-sso": "3.888.0",
29
- "@aws-sdk/core": "3.888.0",
30
- "@aws-sdk/token-providers": "3.888.0",
28
+ "@aws-sdk/client-sso": "3.890.0",
29
+ "@aws-sdk/core": "3.890.0",
30
+ "@aws-sdk/token-providers": "3.890.0",
31
31
  "@aws-sdk/types": "3.887.0",
32
- "@smithy/property-provider": "^4.0.5",
33
- "@smithy/shared-ini-file-loader": "^4.0.5",
32
+ "@smithy/property-provider": "^4.1.1",
33
+ "@smithy/shared-ini-file-loader": "^4.2.0",
34
34
  "@smithy/types": "^4.5.0",
35
35
  "tslib": "^2.6.2"
36
36
  },