@aws-sdk/credential-providers 3.731.0 → 3.733.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,74 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ Object.defineProperty(exports, "__esModule", { value: true });
26
+ exports.fromTemporaryCredentials = void 0;
27
+ const property_provider_1 = require("@smithy/property-provider");
28
+ const fromTemporaryCredentials = (options, credentialDefaultProvider) => {
29
+ let stsClient;
30
+ return async (awsIdentityProperties = {}) => {
31
+ options.logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
32
+ const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
33
+ if (params?.SerialNumber) {
34
+ if (!options.mfaCodeProvider) {
35
+ throw new property_provider_1.CredentialsProviderError(`Temporary credential requires multi-factor authentication, but no MFA code callback was provided.`, {
36
+ tryNextLink: false,
37
+ logger: options.logger,
38
+ });
39
+ }
40
+ params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
41
+ }
42
+ const { AssumeRoleCommand, STSClient } = await Promise.resolve().then(() => __importStar(require("./loadSts")));
43
+ if (!stsClient) {
44
+ const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
45
+ const { callerClientConfig } = awsIdentityProperties;
46
+ stsClient = new STSClient({
47
+ ...options.clientConfig,
48
+ credentials: options.masterCredentials ??
49
+ options.clientConfig?.credentials ??
50
+ callerClientConfig?.credentialDefaultProvider?.() ??
51
+ defaultCredentialsOrError,
52
+ });
53
+ }
54
+ if (options.clientPlugins) {
55
+ for (const plugin of options.clientPlugins) {
56
+ stsClient.middlewareStack.use(plugin);
57
+ }
58
+ }
59
+ const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
60
+ if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
61
+ throw new property_provider_1.CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
62
+ logger: options.logger,
63
+ });
64
+ }
65
+ return {
66
+ accessKeyId: Credentials.AccessKeyId,
67
+ secretAccessKey: Credentials.SecretAccessKey,
68
+ sessionToken: Credentials.SessionToken,
69
+ expiration: Credentials.Expiration,
70
+ credentialScope: Credentials.CredentialScope,
71
+ };
72
+ };
73
+ };
74
+ exports.fromTemporaryCredentials = fromTemporaryCredentials;
@@ -1,74 +1,5 @@
1
1
  "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
2
  Object.defineProperty(exports, "__esModule", { value: true });
26
3
  exports.fromTemporaryCredentials = void 0;
27
- const property_provider_1 = require("@smithy/property-provider");
28
- const fromTemporaryCredentials = (options, credentialDefaultProvider) => {
29
- let stsClient;
30
- return async (awsIdentityProperties = {}) => {
31
- options.logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
32
- const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
33
- if (params?.SerialNumber) {
34
- if (!options.mfaCodeProvider) {
35
- throw new property_provider_1.CredentialsProviderError(`Temporary credential requires multi-factor authentication,` + ` but no MFA code callback was provided.`, {
36
- tryNextLink: false,
37
- logger: options.logger,
38
- });
39
- }
40
- params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
41
- }
42
- const { AssumeRoleCommand, STSClient } = await Promise.resolve().then(() => __importStar(require("./loadSts")));
43
- if (!stsClient) {
44
- const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
45
- const { callerClientConfig } = awsIdentityProperties;
46
- stsClient = new STSClient({
47
- ...options.clientConfig,
48
- credentials: options.masterCredentials ??
49
- options.clientConfig?.credentials ??
50
- callerClientConfig?.credentialDefaultProvider?.() ??
51
- defaultCredentialsOrError,
52
- });
53
- }
54
- if (options.clientPlugins) {
55
- for (const plugin of options.clientPlugins) {
56
- stsClient.middlewareStack.use(plugin);
57
- }
58
- }
59
- const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
60
- if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
61
- throw new property_provider_1.CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
62
- logger: options.logger,
63
- });
64
- }
65
- return {
66
- accessKeyId: Credentials.AccessKeyId,
67
- secretAccessKey: Credentials.SecretAccessKey,
68
- sessionToken: Credentials.SessionToken,
69
- expiration: Credentials.Expiration,
70
- credentialScope: Credentials.CredentialScope,
71
- };
72
- };
73
- };
74
- exports.fromTemporaryCredentials = fromTemporaryCredentials;
4
+ var fromTemporaryCredentials_base_1 = require("./fromTemporaryCredentials.base");
5
+ Object.defineProperty(exports, "fromTemporaryCredentials", { enumerable: true, get: function () { return fromTemporaryCredentials_base_1.fromTemporaryCredentials; } });
@@ -2,8 +2,8 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.fromTemporaryCredentials = void 0;
4
4
  const fromNodeProviderChain_1 = require("./fromNodeProviderChain");
5
- const fromTemporaryCredentials_browser_1 = require("./fromTemporaryCredentials.browser");
5
+ const fromTemporaryCredentials_base_1 = require("./fromTemporaryCredentials.base");
6
6
  const fromTemporaryCredentials = (options) => {
7
- return (0, fromTemporaryCredentials_browser_1.fromTemporaryCredentials)(options, fromNodeProviderChain_1.fromNodeProviderChain);
7
+ return (0, fromTemporaryCredentials_base_1.fromTemporaryCredentials)(options, fromNodeProviderChain_1.fromNodeProviderChain);
8
8
  };
9
9
  exports.fromTemporaryCredentials = fromTemporaryCredentials;
@@ -0,0 +1,47 @@
1
+ import { CredentialsProviderError } from "@smithy/property-provider";
2
+ export const fromTemporaryCredentials = (options, credentialDefaultProvider) => {
3
+ let stsClient;
4
+ return async (awsIdentityProperties = {}) => {
5
+ options.logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
6
+ const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
7
+ if (params?.SerialNumber) {
8
+ if (!options.mfaCodeProvider) {
9
+ throw new CredentialsProviderError(`Temporary credential requires multi-factor authentication, but no MFA code callback was provided.`, {
10
+ tryNextLink: false,
11
+ logger: options.logger,
12
+ });
13
+ }
14
+ params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
15
+ }
16
+ const { AssumeRoleCommand, STSClient } = await import("./loadSts");
17
+ if (!stsClient) {
18
+ const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
19
+ const { callerClientConfig } = awsIdentityProperties;
20
+ stsClient = new STSClient({
21
+ ...options.clientConfig,
22
+ credentials: options.masterCredentials ??
23
+ options.clientConfig?.credentials ??
24
+ callerClientConfig?.credentialDefaultProvider?.() ??
25
+ defaultCredentialsOrError,
26
+ });
27
+ }
28
+ if (options.clientPlugins) {
29
+ for (const plugin of options.clientPlugins) {
30
+ stsClient.middlewareStack.use(plugin);
31
+ }
32
+ }
33
+ const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
34
+ if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
35
+ throw new CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
36
+ logger: options.logger,
37
+ });
38
+ }
39
+ return {
40
+ accessKeyId: Credentials.AccessKeyId,
41
+ secretAccessKey: Credentials.SecretAccessKey,
42
+ sessionToken: Credentials.SessionToken,
43
+ expiration: Credentials.Expiration,
44
+ credentialScope: Credentials.CredentialScope,
45
+ };
46
+ };
47
+ };
@@ -1,47 +1 @@
1
- import { CredentialsProviderError } from "@smithy/property-provider";
2
- export const fromTemporaryCredentials = (options, credentialDefaultProvider) => {
3
- let stsClient;
4
- return async (awsIdentityProperties = {}) => {
5
- options.logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
6
- const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
7
- if (params?.SerialNumber) {
8
- if (!options.mfaCodeProvider) {
9
- throw new CredentialsProviderError(`Temporary credential requires multi-factor authentication,` + ` but no MFA code callback was provided.`, {
10
- tryNextLink: false,
11
- logger: options.logger,
12
- });
13
- }
14
- params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
15
- }
16
- const { AssumeRoleCommand, STSClient } = await import("./loadSts");
17
- if (!stsClient) {
18
- const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
19
- const { callerClientConfig } = awsIdentityProperties;
20
- stsClient = new STSClient({
21
- ...options.clientConfig,
22
- credentials: options.masterCredentials ??
23
- options.clientConfig?.credentials ??
24
- callerClientConfig?.credentialDefaultProvider?.() ??
25
- defaultCredentialsOrError,
26
- });
27
- }
28
- if (options.clientPlugins) {
29
- for (const plugin of options.clientPlugins) {
30
- stsClient.middlewareStack.use(plugin);
31
- }
32
- }
33
- const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
34
- if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
35
- throw new CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
36
- logger: options.logger,
37
- });
38
- }
39
- return {
40
- accessKeyId: Credentials.AccessKeyId,
41
- secretAccessKey: Credentials.SecretAccessKey,
42
- sessionToken: Credentials.SessionToken,
43
- expiration: Credentials.Expiration,
44
- credentialScope: Credentials.CredentialScope,
45
- };
46
- };
47
- };
1
+ export { fromTemporaryCredentials } from "./fromTemporaryCredentials.base";
@@ -1,5 +1,5 @@
1
1
  import { fromNodeProviderChain } from "./fromNodeProviderChain";
2
- import { fromTemporaryCredentials as fromTemporaryCredentialsBase } from "./fromTemporaryCredentials.browser";
2
+ import { fromTemporaryCredentials as fromTemporaryCredentialsBase } from "./fromTemporaryCredentials.base";
3
3
  export const fromTemporaryCredentials = (options) => {
4
4
  return fromTemporaryCredentialsBase(options, fromNodeProviderChain);
5
5
  };
@@ -0,0 +1,13 @@
1
+ import type { AssumeRoleCommandInput, STSClientConfig } from "@aws-sdk/nested-clients/sts";
2
+ import type { CredentialProviderOptions, RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
3
+ import { AwsCredentialIdentity, AwsCredentialIdentityProvider, Pluggable } from "@smithy/types";
4
+ export interface FromTemporaryCredentialsOptions extends CredentialProviderOptions {
5
+ params: Omit<AssumeRoleCommandInput, "RoleSessionName"> & {
6
+ RoleSessionName?: string;
7
+ };
8
+ masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
9
+ clientConfig?: STSClientConfig;
10
+ clientPlugins?: Pluggable<any, any>[];
11
+ mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
12
+ }
13
+ export declare const fromTemporaryCredentials: (options: FromTemporaryCredentialsOptions, credentialDefaultProvider?: () => AwsCredentialIdentityProvider) => RuntimeConfigAwsCredentialIdentityProvider;
@@ -1,13 +1 @@
1
- import type { AssumeRoleCommandInput, STSClientConfig } from "@aws-sdk/nested-clients/sts";
2
- import type { CredentialProviderOptions, RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
3
- import { AwsCredentialIdentity, AwsCredentialIdentityProvider, Pluggable } from "@smithy/types";
4
- export interface FromTemporaryCredentialsOptions extends CredentialProviderOptions {
5
- params: Omit<AssumeRoleCommandInput, "RoleSessionName"> & {
6
- RoleSessionName?: string;
7
- };
8
- masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
9
- clientConfig?: STSClientConfig;
10
- clientPlugins?: Pluggable<any, any>[];
11
- mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
12
- }
13
- export declare const fromTemporaryCredentials: (options: FromTemporaryCredentialsOptions, credentialDefaultProvider?: () => AwsCredentialIdentityProvider) => RuntimeConfigAwsCredentialIdentityProvider;
1
+ export { FromTemporaryCredentialsOptions, fromTemporaryCredentials } from "./fromTemporaryCredentials.base";
@@ -1,5 +1,5 @@
1
1
  import type { RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
2
- import type { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.browser";
2
+ import type { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.base";
3
3
  /**
4
4
  * @public
5
5
  */
@@ -0,0 +1,30 @@
1
+ import {
2
+ AssumeRoleCommandInput,
3
+ STSClientConfig,
4
+ } from "@aws-sdk/nested-clients/sts";
5
+ import {
6
+ CredentialProviderOptions,
7
+ RuntimeConfigAwsCredentialIdentityProvider,
8
+ } from "@aws-sdk/types";
9
+ import {
10
+ AwsCredentialIdentity,
11
+ AwsCredentialIdentityProvider,
12
+ Pluggable,
13
+ } from "@smithy/types";
14
+ export interface FromTemporaryCredentialsOptions
15
+ extends CredentialProviderOptions {
16
+ params: Pick<
17
+ AssumeRoleCommandInput,
18
+ Exclude<keyof AssumeRoleCommandInput, "RoleSessionName">
19
+ > & {
20
+ RoleSessionName?: string;
21
+ };
22
+ masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
23
+ clientConfig?: STSClientConfig;
24
+ clientPlugins?: Pluggable<any, any>[];
25
+ mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
26
+ }
27
+ export declare const fromTemporaryCredentials: (
28
+ options: FromTemporaryCredentialsOptions,
29
+ credentialDefaultProvider?: () => AwsCredentialIdentityProvider
30
+ ) => RuntimeConfigAwsCredentialIdentityProvider;
@@ -1,30 +1,4 @@
1
- import {
2
- AssumeRoleCommandInput,
3
- STSClientConfig,
4
- } from "@aws-sdk/nested-clients/sts";
5
- import {
6
- CredentialProviderOptions,
7
- RuntimeConfigAwsCredentialIdentityProvider,
8
- } from "@aws-sdk/types";
9
- import {
10
- AwsCredentialIdentity,
11
- AwsCredentialIdentityProvider,
12
- Pluggable,
13
- } from "@smithy/types";
14
- export interface FromTemporaryCredentialsOptions
15
- extends CredentialProviderOptions {
16
- params: Pick<
17
- AssumeRoleCommandInput,
18
- Exclude<keyof AssumeRoleCommandInput, "RoleSessionName">
19
- > & {
20
- RoleSessionName?: string;
21
- };
22
- masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
23
- clientConfig?: STSClientConfig;
24
- clientPlugins?: Pluggable<any, any>[];
25
- mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
26
- }
27
- export declare const fromTemporaryCredentials: (
28
- options: FromTemporaryCredentialsOptions,
29
- credentialDefaultProvider?: () => AwsCredentialIdentityProvider
30
- ) => RuntimeConfigAwsCredentialIdentityProvider;
1
+ export {
2
+ FromTemporaryCredentialsOptions,
3
+ fromTemporaryCredentials,
4
+ } from "./fromTemporaryCredentials.base";
@@ -1,5 +1,5 @@
1
1
  import { RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
2
- import { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.browser";
2
+ import { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.base";
3
3
  export { FromTemporaryCredentialsOptions };
4
4
  export declare const fromTemporaryCredentials: (
5
5
  options: FromTemporaryCredentialsOptions
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-providers",
3
- "version": "3.731.0",
3
+ "version": "3.733.0",
4
4
  "description": "A collection of credential providers, without requiring service clients like STS, Cognito",
5
5
  "main": "./dist-cjs/index.js",
6
6
  "module": "./dist-es/index.js",
@@ -30,17 +30,17 @@
30
30
  },
31
31
  "license": "Apache-2.0",
32
32
  "dependencies": {
33
- "@aws-sdk/client-cognito-identity": "3.731.0",
33
+ "@aws-sdk/client-cognito-identity": "3.731.1",
34
34
  "@aws-sdk/core": "3.731.0",
35
- "@aws-sdk/credential-provider-cognito-identity": "3.731.0",
35
+ "@aws-sdk/credential-provider-cognito-identity": "3.731.1",
36
36
  "@aws-sdk/credential-provider-env": "3.731.0",
37
37
  "@aws-sdk/credential-provider-http": "3.731.0",
38
- "@aws-sdk/credential-provider-ini": "3.731.0",
39
- "@aws-sdk/credential-provider-node": "3.731.0",
38
+ "@aws-sdk/credential-provider-ini": "3.731.1",
39
+ "@aws-sdk/credential-provider-node": "3.731.1",
40
40
  "@aws-sdk/credential-provider-process": "3.731.0",
41
- "@aws-sdk/credential-provider-sso": "3.731.0",
42
- "@aws-sdk/credential-provider-web-identity": "3.731.0",
43
- "@aws-sdk/nested-clients": "3.731.0",
41
+ "@aws-sdk/credential-provider-sso": "3.731.1",
42
+ "@aws-sdk/credential-provider-web-identity": "3.731.1",
43
+ "@aws-sdk/nested-clients": "3.731.1",
44
44
  "@aws-sdk/types": "3.731.0",
45
45
  "@smithy/credential-provider-imds": "^4.0.0",
46
46
  "@smithy/property-provider": "^4.0.0",