@aws-sdk/credential-providers 3.731.1 → 3.734.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/fromTemporaryCredentials.base.js +133 -0
- package/dist-cjs/fromTemporaryCredentials.browser.js +2 -71
- package/dist-cjs/fromTemporaryCredentials.js +2 -2
- package/dist-es/fromTemporaryCredentials.base.js +106 -0
- package/dist-es/fromTemporaryCredentials.browser.js +1 -47
- package/dist-es/fromTemporaryCredentials.js +1 -1
- package/dist-types/fromTemporaryCredentials.base.d.ts +14 -0
- package/dist-types/fromTemporaryCredentials.browser.d.ts +1 -13
- package/dist-types/fromTemporaryCredentials.d.ts +1 -1
- package/dist-types/ts3.4/fromTemporaryCredentials.base.d.ts +32 -0
- package/dist-types/ts3.4/fromTemporaryCredentials.browser.d.ts +4 -30
- package/dist-types/ts3.4/fromTemporaryCredentials.d.ts +1 -1
- package/package.json +17 -16
|
@@ -0,0 +1,133 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
+
if (mod && mod.__esModule) return mod;
|
|
20
|
+
var result = {};
|
|
21
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
+
__setModuleDefault(result, mod);
|
|
23
|
+
return result;
|
|
24
|
+
};
|
|
25
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
|
+
exports.fromTemporaryCredentials = void 0;
|
|
27
|
+
const core_1 = require("@smithy/core");
|
|
28
|
+
const property_provider_1 = require("@smithy/property-provider");
|
|
29
|
+
const ASSUME_ROLE_DEFAULT_REGION = "us-east-1";
|
|
30
|
+
const fromTemporaryCredentials = (options, credentialDefaultProvider) => {
|
|
31
|
+
let stsClient;
|
|
32
|
+
return async (awsIdentityProperties = {}) => {
|
|
33
|
+
const { callerClientConfig } = awsIdentityProperties;
|
|
34
|
+
const logger = options.logger ?? callerClientConfig?.logger;
|
|
35
|
+
logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
|
|
36
|
+
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
|
|
37
|
+
if (params?.SerialNumber) {
|
|
38
|
+
if (!options.mfaCodeProvider) {
|
|
39
|
+
throw new property_provider_1.CredentialsProviderError(`Temporary credential requires multi-factor authentication, but no MFA code callback was provided.`, {
|
|
40
|
+
tryNextLink: false,
|
|
41
|
+
logger,
|
|
42
|
+
});
|
|
43
|
+
}
|
|
44
|
+
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
|
|
45
|
+
}
|
|
46
|
+
const { AssumeRoleCommand, STSClient } = await Promise.resolve().then(() => __importStar(require("./loadSts")));
|
|
47
|
+
if (!stsClient) {
|
|
48
|
+
const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
|
|
49
|
+
const credentialSources = [
|
|
50
|
+
options.masterCredentials,
|
|
51
|
+
options.clientConfig?.credentials,
|
|
52
|
+
void callerClientConfig?.credentials,
|
|
53
|
+
callerClientConfig?.credentialDefaultProvider?.(),
|
|
54
|
+
defaultCredentialsOrError,
|
|
55
|
+
];
|
|
56
|
+
let credentialSource = "STS client default credentials";
|
|
57
|
+
if (credentialSources[0]) {
|
|
58
|
+
credentialSource = "options.masterCredentials";
|
|
59
|
+
}
|
|
60
|
+
else if (credentialSources[1]) {
|
|
61
|
+
credentialSource = "options.clientConfig.credentials";
|
|
62
|
+
}
|
|
63
|
+
else if (credentialSources[2]) {
|
|
64
|
+
credentialSource = "caller client's credentials";
|
|
65
|
+
throw new Error("fromTemporaryCredentials recursion in callerClientConfig.credentials");
|
|
66
|
+
}
|
|
67
|
+
else if (credentialSources[3]) {
|
|
68
|
+
credentialSource = "caller client's credentialDefaultProvider";
|
|
69
|
+
}
|
|
70
|
+
else if (credentialSources[4]) {
|
|
71
|
+
credentialSource = "AWS SDK default credentials";
|
|
72
|
+
}
|
|
73
|
+
const regionSources = [options.clientConfig?.region, callerClientConfig?.region, ASSUME_ROLE_DEFAULT_REGION];
|
|
74
|
+
let regionSource = "default partition's default region";
|
|
75
|
+
if (regionSources[0]) {
|
|
76
|
+
regionSource = "options.clientConfig.region";
|
|
77
|
+
}
|
|
78
|
+
else if (regionSources[1]) {
|
|
79
|
+
regionSource = "caller client's region";
|
|
80
|
+
}
|
|
81
|
+
const requestHandlerSources = [
|
|
82
|
+
filterRequestHandler(options.clientConfig?.requestHandler),
|
|
83
|
+
filterRequestHandler(callerClientConfig?.requestHandler),
|
|
84
|
+
];
|
|
85
|
+
let requestHandlerSource = "STS default requestHandler";
|
|
86
|
+
if (requestHandlerSources[0]) {
|
|
87
|
+
requestHandlerSource = "options.clientConfig.requestHandler";
|
|
88
|
+
}
|
|
89
|
+
else if (requestHandlerSources[1]) {
|
|
90
|
+
requestHandlerSource = "caller client's requestHandler";
|
|
91
|
+
}
|
|
92
|
+
logger?.debug?.(`@aws-sdk/credential-providers - fromTemporaryCredentials STS client init with ` +
|
|
93
|
+
`${regionSource}=${await (0, core_1.normalizeProvider)(coalesce(regionSources))()}, ${credentialSource}, ${requestHandlerSource}.`);
|
|
94
|
+
stsClient = new STSClient({
|
|
95
|
+
...options.clientConfig,
|
|
96
|
+
credentials: coalesce(credentialSources),
|
|
97
|
+
logger,
|
|
98
|
+
profile: options.clientConfig?.profile ?? callerClientConfig?.profile,
|
|
99
|
+
region: coalesce(regionSources),
|
|
100
|
+
requestHandler: coalesce(requestHandlerSources),
|
|
101
|
+
});
|
|
102
|
+
}
|
|
103
|
+
if (options.clientPlugins) {
|
|
104
|
+
for (const plugin of options.clientPlugins) {
|
|
105
|
+
stsClient.middlewareStack.use(plugin);
|
|
106
|
+
}
|
|
107
|
+
}
|
|
108
|
+
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
|
|
109
|
+
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
110
|
+
throw new property_provider_1.CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
|
|
111
|
+
logger,
|
|
112
|
+
});
|
|
113
|
+
}
|
|
114
|
+
return {
|
|
115
|
+
accessKeyId: Credentials.AccessKeyId,
|
|
116
|
+
secretAccessKey: Credentials.SecretAccessKey,
|
|
117
|
+
sessionToken: Credentials.SessionToken,
|
|
118
|
+
expiration: Credentials.Expiration,
|
|
119
|
+
credentialScope: Credentials.CredentialScope,
|
|
120
|
+
};
|
|
121
|
+
};
|
|
122
|
+
};
|
|
123
|
+
exports.fromTemporaryCredentials = fromTemporaryCredentials;
|
|
124
|
+
const filterRequestHandler = (requestHandler) => {
|
|
125
|
+
return requestHandler?.metadata?.handlerProtocol === "h2" ? undefined : requestHandler;
|
|
126
|
+
};
|
|
127
|
+
const coalesce = (args) => {
|
|
128
|
+
for (const item of args) {
|
|
129
|
+
if (item !== undefined) {
|
|
130
|
+
return item;
|
|
131
|
+
}
|
|
132
|
+
}
|
|
133
|
+
};
|
|
@@ -1,74 +1,5 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
3
|
exports.fromTemporaryCredentials = void 0;
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
let stsClient;
|
|
30
|
-
return async (awsIdentityProperties = {}) => {
|
|
31
|
-
options.logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
|
|
32
|
-
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
|
|
33
|
-
if (params?.SerialNumber) {
|
|
34
|
-
if (!options.mfaCodeProvider) {
|
|
35
|
-
throw new property_provider_1.CredentialsProviderError(`Temporary credential requires multi-factor authentication, but no MFA code callback was provided.`, {
|
|
36
|
-
tryNextLink: false,
|
|
37
|
-
logger: options.logger,
|
|
38
|
-
});
|
|
39
|
-
}
|
|
40
|
-
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
|
|
41
|
-
}
|
|
42
|
-
const { AssumeRoleCommand, STSClient } = await Promise.resolve().then(() => __importStar(require("./loadSts")));
|
|
43
|
-
if (!stsClient) {
|
|
44
|
-
const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
|
|
45
|
-
const { callerClientConfig } = awsIdentityProperties;
|
|
46
|
-
stsClient = new STSClient({
|
|
47
|
-
...options.clientConfig,
|
|
48
|
-
credentials: options.masterCredentials ??
|
|
49
|
-
options.clientConfig?.credentials ??
|
|
50
|
-
callerClientConfig?.credentialDefaultProvider?.() ??
|
|
51
|
-
defaultCredentialsOrError,
|
|
52
|
-
});
|
|
53
|
-
}
|
|
54
|
-
if (options.clientPlugins) {
|
|
55
|
-
for (const plugin of options.clientPlugins) {
|
|
56
|
-
stsClient.middlewareStack.use(plugin);
|
|
57
|
-
}
|
|
58
|
-
}
|
|
59
|
-
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
|
|
60
|
-
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
61
|
-
throw new property_provider_1.CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
|
|
62
|
-
logger: options.logger,
|
|
63
|
-
});
|
|
64
|
-
}
|
|
65
|
-
return {
|
|
66
|
-
accessKeyId: Credentials.AccessKeyId,
|
|
67
|
-
secretAccessKey: Credentials.SecretAccessKey,
|
|
68
|
-
sessionToken: Credentials.SessionToken,
|
|
69
|
-
expiration: Credentials.Expiration,
|
|
70
|
-
credentialScope: Credentials.CredentialScope,
|
|
71
|
-
};
|
|
72
|
-
};
|
|
73
|
-
};
|
|
74
|
-
exports.fromTemporaryCredentials = fromTemporaryCredentials;
|
|
4
|
+
var fromTemporaryCredentials_base_1 = require("./fromTemporaryCredentials.base");
|
|
5
|
+
Object.defineProperty(exports, "fromTemporaryCredentials", { enumerable: true, get: function () { return fromTemporaryCredentials_base_1.fromTemporaryCredentials; } });
|
|
@@ -2,8 +2,8 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.fromTemporaryCredentials = void 0;
|
|
4
4
|
const fromNodeProviderChain_1 = require("./fromNodeProviderChain");
|
|
5
|
-
const
|
|
5
|
+
const fromTemporaryCredentials_base_1 = require("./fromTemporaryCredentials.base");
|
|
6
6
|
const fromTemporaryCredentials = (options) => {
|
|
7
|
-
return (0,
|
|
7
|
+
return (0, fromTemporaryCredentials_base_1.fromTemporaryCredentials)(options, fromNodeProviderChain_1.fromNodeProviderChain);
|
|
8
8
|
};
|
|
9
9
|
exports.fromTemporaryCredentials = fromTemporaryCredentials;
|
|
@@ -0,0 +1,106 @@
|
|
|
1
|
+
import { normalizeProvider } from "@smithy/core";
|
|
2
|
+
import { CredentialsProviderError } from "@smithy/property-provider";
|
|
3
|
+
const ASSUME_ROLE_DEFAULT_REGION = "us-east-1";
|
|
4
|
+
export const fromTemporaryCredentials = (options, credentialDefaultProvider) => {
|
|
5
|
+
let stsClient;
|
|
6
|
+
return async (awsIdentityProperties = {}) => {
|
|
7
|
+
const { callerClientConfig } = awsIdentityProperties;
|
|
8
|
+
const logger = options.logger ?? callerClientConfig?.logger;
|
|
9
|
+
logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
|
|
10
|
+
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
|
|
11
|
+
if (params?.SerialNumber) {
|
|
12
|
+
if (!options.mfaCodeProvider) {
|
|
13
|
+
throw new CredentialsProviderError(`Temporary credential requires multi-factor authentication, but no MFA code callback was provided.`, {
|
|
14
|
+
tryNextLink: false,
|
|
15
|
+
logger,
|
|
16
|
+
});
|
|
17
|
+
}
|
|
18
|
+
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
|
|
19
|
+
}
|
|
20
|
+
const { AssumeRoleCommand, STSClient } = await import("./loadSts");
|
|
21
|
+
if (!stsClient) {
|
|
22
|
+
const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
|
|
23
|
+
const credentialSources = [
|
|
24
|
+
options.masterCredentials,
|
|
25
|
+
options.clientConfig?.credentials,
|
|
26
|
+
void callerClientConfig?.credentials,
|
|
27
|
+
callerClientConfig?.credentialDefaultProvider?.(),
|
|
28
|
+
defaultCredentialsOrError,
|
|
29
|
+
];
|
|
30
|
+
let credentialSource = "STS client default credentials";
|
|
31
|
+
if (credentialSources[0]) {
|
|
32
|
+
credentialSource = "options.masterCredentials";
|
|
33
|
+
}
|
|
34
|
+
else if (credentialSources[1]) {
|
|
35
|
+
credentialSource = "options.clientConfig.credentials";
|
|
36
|
+
}
|
|
37
|
+
else if (credentialSources[2]) {
|
|
38
|
+
credentialSource = "caller client's credentials";
|
|
39
|
+
throw new Error("fromTemporaryCredentials recursion in callerClientConfig.credentials");
|
|
40
|
+
}
|
|
41
|
+
else if (credentialSources[3]) {
|
|
42
|
+
credentialSource = "caller client's credentialDefaultProvider";
|
|
43
|
+
}
|
|
44
|
+
else if (credentialSources[4]) {
|
|
45
|
+
credentialSource = "AWS SDK default credentials";
|
|
46
|
+
}
|
|
47
|
+
const regionSources = [options.clientConfig?.region, callerClientConfig?.region, ASSUME_ROLE_DEFAULT_REGION];
|
|
48
|
+
let regionSource = "default partition's default region";
|
|
49
|
+
if (regionSources[0]) {
|
|
50
|
+
regionSource = "options.clientConfig.region";
|
|
51
|
+
}
|
|
52
|
+
else if (regionSources[1]) {
|
|
53
|
+
regionSource = "caller client's region";
|
|
54
|
+
}
|
|
55
|
+
const requestHandlerSources = [
|
|
56
|
+
filterRequestHandler(options.clientConfig?.requestHandler),
|
|
57
|
+
filterRequestHandler(callerClientConfig?.requestHandler),
|
|
58
|
+
];
|
|
59
|
+
let requestHandlerSource = "STS default requestHandler";
|
|
60
|
+
if (requestHandlerSources[0]) {
|
|
61
|
+
requestHandlerSource = "options.clientConfig.requestHandler";
|
|
62
|
+
}
|
|
63
|
+
else if (requestHandlerSources[1]) {
|
|
64
|
+
requestHandlerSource = "caller client's requestHandler";
|
|
65
|
+
}
|
|
66
|
+
logger?.debug?.(`@aws-sdk/credential-providers - fromTemporaryCredentials STS client init with ` +
|
|
67
|
+
`${regionSource}=${await normalizeProvider(coalesce(regionSources))()}, ${credentialSource}, ${requestHandlerSource}.`);
|
|
68
|
+
stsClient = new STSClient({
|
|
69
|
+
...options.clientConfig,
|
|
70
|
+
credentials: coalesce(credentialSources),
|
|
71
|
+
logger,
|
|
72
|
+
profile: options.clientConfig?.profile ?? callerClientConfig?.profile,
|
|
73
|
+
region: coalesce(regionSources),
|
|
74
|
+
requestHandler: coalesce(requestHandlerSources),
|
|
75
|
+
});
|
|
76
|
+
}
|
|
77
|
+
if (options.clientPlugins) {
|
|
78
|
+
for (const plugin of options.clientPlugins) {
|
|
79
|
+
stsClient.middlewareStack.use(plugin);
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
|
|
83
|
+
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
84
|
+
throw new CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
|
|
85
|
+
logger,
|
|
86
|
+
});
|
|
87
|
+
}
|
|
88
|
+
return {
|
|
89
|
+
accessKeyId: Credentials.AccessKeyId,
|
|
90
|
+
secretAccessKey: Credentials.SecretAccessKey,
|
|
91
|
+
sessionToken: Credentials.SessionToken,
|
|
92
|
+
expiration: Credentials.Expiration,
|
|
93
|
+
credentialScope: Credentials.CredentialScope,
|
|
94
|
+
};
|
|
95
|
+
};
|
|
96
|
+
};
|
|
97
|
+
const filterRequestHandler = (requestHandler) => {
|
|
98
|
+
return requestHandler?.metadata?.handlerProtocol === "h2" ? undefined : requestHandler;
|
|
99
|
+
};
|
|
100
|
+
const coalesce = (args) => {
|
|
101
|
+
for (const item of args) {
|
|
102
|
+
if (item !== undefined) {
|
|
103
|
+
return item;
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
};
|
|
@@ -1,47 +1 @@
|
|
|
1
|
-
|
|
2
|
-
export const fromTemporaryCredentials = (options, credentialDefaultProvider) => {
|
|
3
|
-
let stsClient;
|
|
4
|
-
return async (awsIdentityProperties = {}) => {
|
|
5
|
-
options.logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
|
|
6
|
-
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
|
|
7
|
-
if (params?.SerialNumber) {
|
|
8
|
-
if (!options.mfaCodeProvider) {
|
|
9
|
-
throw new CredentialsProviderError(`Temporary credential requires multi-factor authentication, but no MFA code callback was provided.`, {
|
|
10
|
-
tryNextLink: false,
|
|
11
|
-
logger: options.logger,
|
|
12
|
-
});
|
|
13
|
-
}
|
|
14
|
-
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
|
|
15
|
-
}
|
|
16
|
-
const { AssumeRoleCommand, STSClient } = await import("./loadSts");
|
|
17
|
-
if (!stsClient) {
|
|
18
|
-
const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
|
|
19
|
-
const { callerClientConfig } = awsIdentityProperties;
|
|
20
|
-
stsClient = new STSClient({
|
|
21
|
-
...options.clientConfig,
|
|
22
|
-
credentials: options.masterCredentials ??
|
|
23
|
-
options.clientConfig?.credentials ??
|
|
24
|
-
callerClientConfig?.credentialDefaultProvider?.() ??
|
|
25
|
-
defaultCredentialsOrError,
|
|
26
|
-
});
|
|
27
|
-
}
|
|
28
|
-
if (options.clientPlugins) {
|
|
29
|
-
for (const plugin of options.clientPlugins) {
|
|
30
|
-
stsClient.middlewareStack.use(plugin);
|
|
31
|
-
}
|
|
32
|
-
}
|
|
33
|
-
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
|
|
34
|
-
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
|
35
|
-
throw new CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
|
|
36
|
-
logger: options.logger,
|
|
37
|
-
});
|
|
38
|
-
}
|
|
39
|
-
return {
|
|
40
|
-
accessKeyId: Credentials.AccessKeyId,
|
|
41
|
-
secretAccessKey: Credentials.SecretAccessKey,
|
|
42
|
-
sessionToken: Credentials.SessionToken,
|
|
43
|
-
expiration: Credentials.Expiration,
|
|
44
|
-
credentialScope: Credentials.CredentialScope,
|
|
45
|
-
};
|
|
46
|
-
};
|
|
47
|
-
};
|
|
1
|
+
export { fromTemporaryCredentials } from "./fromTemporaryCredentials.base";
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { fromNodeProviderChain } from "./fromNodeProviderChain";
|
|
2
|
-
import { fromTemporaryCredentials as fromTemporaryCredentialsBase } from "./fromTemporaryCredentials.
|
|
2
|
+
import { fromTemporaryCredentials as fromTemporaryCredentialsBase } from "./fromTemporaryCredentials.base";
|
|
3
3
|
export const fromTemporaryCredentials = (options) => {
|
|
4
4
|
return fromTemporaryCredentialsBase(options, fromNodeProviderChain);
|
|
5
5
|
};
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
import type { AssumeRoleCommandInput, STSClientConfig } from "@aws-sdk/nested-clients/sts";
|
|
2
|
+
import type { CredentialProviderOptions, RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
|
|
3
|
+
import { AwsCredentialIdentity, AwsCredentialIdentityProvider, Logger, Pluggable } from "@smithy/types";
|
|
4
|
+
export interface FromTemporaryCredentialsOptions extends CredentialProviderOptions {
|
|
5
|
+
params: Omit<AssumeRoleCommandInput, "RoleSessionName"> & {
|
|
6
|
+
RoleSessionName?: string;
|
|
7
|
+
};
|
|
8
|
+
masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
|
|
9
|
+
clientConfig?: STSClientConfig;
|
|
10
|
+
logger?: Logger;
|
|
11
|
+
clientPlugins?: Pluggable<any, any>[];
|
|
12
|
+
mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
|
|
13
|
+
}
|
|
14
|
+
export declare const fromTemporaryCredentials: (options: FromTemporaryCredentialsOptions, credentialDefaultProvider?: () => AwsCredentialIdentityProvider) => RuntimeConfigAwsCredentialIdentityProvider;
|
|
@@ -1,13 +1 @@
|
|
|
1
|
-
|
|
2
|
-
import type { CredentialProviderOptions, RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
|
|
3
|
-
import { AwsCredentialIdentity, AwsCredentialIdentityProvider, Pluggable } from "@smithy/types";
|
|
4
|
-
export interface FromTemporaryCredentialsOptions extends CredentialProviderOptions {
|
|
5
|
-
params: Omit<AssumeRoleCommandInput, "RoleSessionName"> & {
|
|
6
|
-
RoleSessionName?: string;
|
|
7
|
-
};
|
|
8
|
-
masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
|
|
9
|
-
clientConfig?: STSClientConfig;
|
|
10
|
-
clientPlugins?: Pluggable<any, any>[];
|
|
11
|
-
mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
|
|
12
|
-
}
|
|
13
|
-
export declare const fromTemporaryCredentials: (options: FromTemporaryCredentialsOptions, credentialDefaultProvider?: () => AwsCredentialIdentityProvider) => RuntimeConfigAwsCredentialIdentityProvider;
|
|
1
|
+
export { FromTemporaryCredentialsOptions, fromTemporaryCredentials } from "./fromTemporaryCredentials.base";
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import type { RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
|
|
2
|
-
import type { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.
|
|
2
|
+
import type { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.base";
|
|
3
3
|
/**
|
|
4
4
|
* @public
|
|
5
5
|
*/
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
import {
|
|
2
|
+
AssumeRoleCommandInput,
|
|
3
|
+
STSClientConfig,
|
|
4
|
+
} from "@aws-sdk/nested-clients/sts";
|
|
5
|
+
import {
|
|
6
|
+
CredentialProviderOptions,
|
|
7
|
+
RuntimeConfigAwsCredentialIdentityProvider,
|
|
8
|
+
} from "@aws-sdk/types";
|
|
9
|
+
import {
|
|
10
|
+
AwsCredentialIdentity,
|
|
11
|
+
AwsCredentialIdentityProvider,
|
|
12
|
+
Logger,
|
|
13
|
+
Pluggable,
|
|
14
|
+
} from "@smithy/types";
|
|
15
|
+
export interface FromTemporaryCredentialsOptions
|
|
16
|
+
extends CredentialProviderOptions {
|
|
17
|
+
params: Pick<
|
|
18
|
+
AssumeRoleCommandInput,
|
|
19
|
+
Exclude<keyof AssumeRoleCommandInput, "RoleSessionName">
|
|
20
|
+
> & {
|
|
21
|
+
RoleSessionName?: string;
|
|
22
|
+
};
|
|
23
|
+
masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
|
|
24
|
+
clientConfig?: STSClientConfig;
|
|
25
|
+
logger?: Logger;
|
|
26
|
+
clientPlugins?: Pluggable<any, any>[];
|
|
27
|
+
mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
|
|
28
|
+
}
|
|
29
|
+
export declare const fromTemporaryCredentials: (
|
|
30
|
+
options: FromTemporaryCredentialsOptions,
|
|
31
|
+
credentialDefaultProvider?: () => AwsCredentialIdentityProvider
|
|
32
|
+
) => RuntimeConfigAwsCredentialIdentityProvider;
|
|
@@ -1,30 +1,4 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
} from "
|
|
5
|
-
import {
|
|
6
|
-
CredentialProviderOptions,
|
|
7
|
-
RuntimeConfigAwsCredentialIdentityProvider,
|
|
8
|
-
} from "@aws-sdk/types";
|
|
9
|
-
import {
|
|
10
|
-
AwsCredentialIdentity,
|
|
11
|
-
AwsCredentialIdentityProvider,
|
|
12
|
-
Pluggable,
|
|
13
|
-
} from "@smithy/types";
|
|
14
|
-
export interface FromTemporaryCredentialsOptions
|
|
15
|
-
extends CredentialProviderOptions {
|
|
16
|
-
params: Pick<
|
|
17
|
-
AssumeRoleCommandInput,
|
|
18
|
-
Exclude<keyof AssumeRoleCommandInput, "RoleSessionName">
|
|
19
|
-
> & {
|
|
20
|
-
RoleSessionName?: string;
|
|
21
|
-
};
|
|
22
|
-
masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
|
|
23
|
-
clientConfig?: STSClientConfig;
|
|
24
|
-
clientPlugins?: Pluggable<any, any>[];
|
|
25
|
-
mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
|
|
26
|
-
}
|
|
27
|
-
export declare const fromTemporaryCredentials: (
|
|
28
|
-
options: FromTemporaryCredentialsOptions,
|
|
29
|
-
credentialDefaultProvider?: () => AwsCredentialIdentityProvider
|
|
30
|
-
) => RuntimeConfigAwsCredentialIdentityProvider;
|
|
1
|
+
export {
|
|
2
|
+
FromTemporaryCredentialsOptions,
|
|
3
|
+
fromTemporaryCredentials,
|
|
4
|
+
} from "./fromTemporaryCredentials.base";
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
|
|
2
|
-
import { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.
|
|
2
|
+
import { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.base";
|
|
3
3
|
export { FromTemporaryCredentialsOptions };
|
|
4
4
|
export declare const fromTemporaryCredentials: (
|
|
5
5
|
options: FromTemporaryCredentialsOptions
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-providers",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.734.0",
|
|
4
4
|
"description": "A collection of credential providers, without requiring service clients like STS, Cognito",
|
|
5
5
|
"main": "./dist-cjs/index.js",
|
|
6
6
|
"module": "./dist-es/index.js",
|
|
@@ -30,21 +30,22 @@
|
|
|
30
30
|
},
|
|
31
31
|
"license": "Apache-2.0",
|
|
32
32
|
"dependencies": {
|
|
33
|
-
"@aws-sdk/client-cognito-identity": "3.
|
|
34
|
-
"@aws-sdk/core": "3.
|
|
35
|
-
"@aws-sdk/credential-provider-cognito-identity": "3.
|
|
36
|
-
"@aws-sdk/credential-provider-env": "3.
|
|
37
|
-
"@aws-sdk/credential-provider-http": "3.
|
|
38
|
-
"@aws-sdk/credential-provider-ini": "3.
|
|
39
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
40
|
-
"@aws-sdk/credential-provider-process": "3.
|
|
41
|
-
"@aws-sdk/credential-provider-sso": "3.
|
|
42
|
-
"@aws-sdk/credential-provider-web-identity": "3.
|
|
43
|
-
"@aws-sdk/nested-clients": "3.
|
|
44
|
-
"@aws-sdk/types": "3.
|
|
45
|
-
"@smithy/
|
|
46
|
-
"@smithy/
|
|
47
|
-
"@smithy/
|
|
33
|
+
"@aws-sdk/client-cognito-identity": "3.734.0",
|
|
34
|
+
"@aws-sdk/core": "3.734.0",
|
|
35
|
+
"@aws-sdk/credential-provider-cognito-identity": "3.734.0",
|
|
36
|
+
"@aws-sdk/credential-provider-env": "3.734.0",
|
|
37
|
+
"@aws-sdk/credential-provider-http": "3.734.0",
|
|
38
|
+
"@aws-sdk/credential-provider-ini": "3.734.0",
|
|
39
|
+
"@aws-sdk/credential-provider-node": "3.734.0",
|
|
40
|
+
"@aws-sdk/credential-provider-process": "3.734.0",
|
|
41
|
+
"@aws-sdk/credential-provider-sso": "3.734.0",
|
|
42
|
+
"@aws-sdk/credential-provider-web-identity": "3.734.0",
|
|
43
|
+
"@aws-sdk/nested-clients": "3.734.0",
|
|
44
|
+
"@aws-sdk/types": "3.734.0",
|
|
45
|
+
"@smithy/core": "^3.1.1",
|
|
46
|
+
"@smithy/credential-provider-imds": "^4.0.1",
|
|
47
|
+
"@smithy/property-provider": "^4.0.1",
|
|
48
|
+
"@smithy/types": "^4.1.0",
|
|
48
49
|
"tslib": "^2.6.2"
|
|
49
50
|
},
|
|
50
51
|
"devDependencies": {
|