@cdklabs/cdk-ecs-codedeploy 0.0.283 → 0.0.285

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (122) hide show
  1. package/.jsii +4 -4
  2. package/.jsii.tabl.json +1 -1
  3. package/lib/api-canary/index.js +1 -1
  4. package/lib/ecs-appspec/index.js +1 -1
  5. package/lib/ecs-deployment/index.js +1 -1
  6. package/lib/ecs-patterns/application-load-balanced-codedeployed-fargate-service.js +1 -1
  7. package/node_modules/@aws-sdk/client-codedeploy/dist-cjs/index.js +2 -2
  8. package/node_modules/@aws-sdk/client-codedeploy/dist-es/protocols/Aws_json1_1.js +2 -2
  9. package/node_modules/@aws-sdk/client-codedeploy/package.json +18 -18
  10. package/node_modules/@aws-sdk/client-sso/package.json +15 -15
  11. package/node_modules/@aws-sdk/client-sso-oidc/package.json +17 -17
  12. package/node_modules/@aws-sdk/client-sts/package.json +17 -17
  13. package/node_modules/@aws-sdk/core/package.json +3 -3
  14. package/node_modules/@aws-sdk/credential-provider-env/dist-cjs/index.js +2 -2
  15. package/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js +2 -2
  16. package/node_modules/@aws-sdk/credential-provider-env/package.json +2 -2
  17. package/node_modules/@aws-sdk/credential-provider-http/dist-cjs/fromHttp/checkUrl.js +2 -2
  18. package/node_modules/@aws-sdk/credential-provider-http/dist-cjs/fromHttp/fromHttp.browser.js +4 -4
  19. package/node_modules/@aws-sdk/credential-provider-http/dist-cjs/fromHttp/fromHttp.js +12 -9
  20. package/node_modules/@aws-sdk/credential-provider-http/dist-cjs/fromHttp/requestHelpers.js +6 -5
  21. package/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/checkUrl.js +2 -2
  22. package/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.browser.js +4 -4
  23. package/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js +12 -9
  24. package/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js +6 -5
  25. package/node_modules/@aws-sdk/credential-provider-http/dist-types/fromHttp/checkUrl.d.ts +3 -1
  26. package/node_modules/@aws-sdk/credential-provider-http/dist-types/fromHttp/fromHttp.browser.d.ts +1 -1
  27. package/node_modules/@aws-sdk/credential-provider-http/dist-types/fromHttp/fromHttp.d.ts +1 -1
  28. package/node_modules/@aws-sdk/credential-provider-http/dist-types/fromHttp/requestHelpers.d.ts +2 -2
  29. package/node_modules/@aws-sdk/credential-provider-http/dist-types/ts3.4/fromHttp/checkUrl.d.ts +2 -1
  30. package/node_modules/@aws-sdk/credential-provider-http/dist-types/ts3.4/fromHttp/fromHttp.browser.d.ts +1 -1
  31. package/node_modules/@aws-sdk/credential-provider-http/dist-types/ts3.4/fromHttp/fromHttp.d.ts +1 -1
  32. package/node_modules/@aws-sdk/credential-provider-http/dist-types/ts3.4/fromHttp/requestHelpers.d.ts +3 -2
  33. package/node_modules/@aws-sdk/credential-provider-http/package.json +3 -3
  34. package/node_modules/@aws-sdk/credential-provider-ini/dist-cjs/index.js +70 -20
  35. package/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js +1 -1
  36. package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js +35 -14
  37. package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js +19 -6
  38. package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js +2 -2
  39. package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js +1 -1
  40. package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveAssumeRoleCredentials.d.ts +5 -2
  41. package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveCredentialSource.d.ts +2 -2
  42. package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveAssumeRoleCredentials.d.ts +11 -2
  43. package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveCredentialSource.d.ts +3 -2
  44. package/node_modules/@aws-sdk/credential-provider-ini/package.json +10 -9
  45. package/node_modules/@aws-sdk/credential-provider-node/dist-cjs/index.js +15 -11
  46. package/node_modules/@aws-sdk/credential-provider-node/dist-es/defaultProvider.js +11 -8
  47. package/node_modules/@aws-sdk/credential-provider-node/dist-es/remoteProvider.js +3 -3
  48. package/node_modules/@aws-sdk/credential-provider-node/dist-types/defaultProvider.d.ts +2 -1
  49. package/node_modules/@aws-sdk/credential-provider-node/dist-types/remoteProvider.d.ts +2 -1
  50. package/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/defaultProvider.d.ts +2 -0
  51. package/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/remoteProvider.d.ts +2 -1
  52. package/node_modules/@aws-sdk/credential-provider-node/package.json +10 -10
  53. package/node_modules/@aws-sdk/credential-provider-process/dist-cjs/index.js +8 -6
  54. package/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js +2 -2
  55. package/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js +6 -4
  56. package/node_modules/@aws-sdk/credential-provider-process/dist-types/resolveProcessCredentials.d.ts +2 -2
  57. package/node_modules/@aws-sdk/credential-provider-process/dist-types/ts3.4/resolveProcessCredentials.d.ts +3 -2
  58. package/node_modules/@aws-sdk/credential-provider-process/package.json +3 -3
  59. package/node_modules/@aws-sdk/credential-provider-sso/dist-cjs/index.js +43 -21
  60. package/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js +15 -7
  61. package/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js +21 -6
  62. package/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js +2 -2
  63. package/node_modules/@aws-sdk/credential-provider-sso/dist-types/resolveSSOCredentials.d.ts +1 -1
  64. package/node_modules/@aws-sdk/credential-provider-sso/dist-types/ts3.4/resolveSSOCredentials.d.ts +1 -0
  65. package/node_modules/@aws-sdk/credential-provider-sso/dist-types/ts3.4/validateSsoProfile.d.ts +3 -1
  66. package/node_modules/@aws-sdk/credential-provider-sso/dist-types/validateSsoProfile.d.ts +2 -1
  67. package/node_modules/@aws-sdk/credential-provider-sso/package.json +5 -5
  68. package/node_modules/@aws-sdk/credential-provider-web-identity/dist-cjs/fromTokenFile.js +4 -2
  69. package/node_modules/@aws-sdk/credential-provider-web-identity/dist-cjs/fromWebToken.js +1 -1
  70. package/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js +4 -2
  71. package/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js +1 -1
  72. package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +3 -3
  73. package/node_modules/@aws-sdk/middleware-user-agent/package.json +2 -2
  74. package/node_modules/@aws-sdk/region-config-resolver/package.json +2 -2
  75. package/node_modules/@aws-sdk/token-providers/dist-cjs/index.js +2 -2
  76. package/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js +1 -1
  77. package/node_modules/@aws-sdk/token-providers/dist-es/fromStatic.js +1 -1
  78. package/node_modules/@aws-sdk/token-providers/package.json +4 -4
  79. package/node_modules/@aws-sdk/util-endpoints/package.json +2 -2
  80. package/node_modules/@aws-sdk/util-user-agent-node/package.json +2 -2
  81. package/node_modules/@smithy/config-resolver/package.json +2 -2
  82. package/node_modules/@smithy/core/README.md +35 -2
  83. package/node_modules/@smithy/core/package.json +19 -6
  84. package/node_modules/@smithy/credential-provider-imds/dist-cjs/index.js +30 -22
  85. package/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js +17 -6
  86. package/node_modules/@smithy/credential-provider-imds/dist-es/fromInstanceMetadata.js +11 -9
  87. package/node_modules/@smithy/credential-provider-imds/package.json +3 -3
  88. package/node_modules/@smithy/middleware-endpoint/package.json +3 -3
  89. package/node_modules/@smithy/middleware-retry/package.json +3 -3
  90. package/node_modules/@smithy/node-config-provider/dist-cjs/getSelectorName.js +1 -0
  91. package/node_modules/@smithy/node-config-provider/dist-cjs/index.js +21 -3
  92. package/node_modules/@smithy/node-config-provider/dist-es/fromEnv.js +3 -2
  93. package/node_modules/@smithy/node-config-provider/dist-es/fromSharedConfigFiles.js +2 -2
  94. package/node_modules/@smithy/node-config-provider/dist-es/getSelectorName.js +12 -0
  95. package/node_modules/@smithy/node-config-provider/dist-types/fromEnv.d.ts +2 -2
  96. package/node_modules/@smithy/node-config-provider/dist-types/getSelectorName.d.ts +9 -0
  97. package/node_modules/@smithy/node-config-provider/dist-types/ts3.4/fromEnv.d.ts +2 -2
  98. package/node_modules/@smithy/node-config-provider/dist-types/ts3.4/getSelectorName.d.ts +9 -0
  99. package/node_modules/@smithy/node-config-provider/package.json +3 -3
  100. package/node_modules/@smithy/property-provider/dist-cjs/index.js +28 -10
  101. package/node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js +2 -3
  102. package/node_modules/@smithy/property-provider/dist-es/ProviderError.js +15 -4
  103. package/node_modules/@smithy/property-provider/dist-es/TokenProviderError.js +2 -3
  104. package/node_modules/@smithy/property-provider/dist-types/CredentialsProviderError.d.ts +16 -3
  105. package/node_modules/@smithy/property-provider/dist-types/ProviderError.d.ts +25 -3
  106. package/node_modules/@smithy/property-provider/dist-types/TokenProviderError.d.ts +16 -3
  107. package/node_modules/@smithy/property-provider/dist-types/ts3.4/CredentialsProviderError.d.ts +16 -3
  108. package/node_modules/@smithy/property-provider/dist-types/ts3.4/ProviderError.d.ts +25 -3
  109. package/node_modules/@smithy/property-provider/dist-types/ts3.4/TokenProviderError.d.ts +16 -3
  110. package/node_modules/@smithy/property-provider/package.json +1 -1
  111. package/node_modules/@smithy/shared-ini-file-loader/dist-types/loadSharedConfigFiles.d.ts +5 -1
  112. package/node_modules/@smithy/shared-ini-file-loader/dist-types/ts3.4/loadSharedConfigFiles.d.ts +5 -1
  113. package/node_modules/@smithy/shared-ini-file-loader/package.json +1 -1
  114. package/node_modules/@smithy/smithy-client/dist-cjs/index.js +3 -0
  115. package/node_modules/@smithy/smithy-client/dist-es/ser-utils.js +1 -0
  116. package/node_modules/@smithy/smithy-client/dist-types/ser-utils.d.ts +5 -0
  117. package/node_modules/@smithy/smithy-client/dist-types/ts3.4/ser-utils.d.ts +5 -0
  118. package/node_modules/@smithy/smithy-client/package.json +2 -2
  119. package/node_modules/@smithy/util-defaults-mode-browser/package.json +3 -3
  120. package/node_modules/@smithy/util-defaults-mode-node/package.json +6 -6
  121. package/node_modules/@smithy/util-endpoints/package.json +2 -2
  122. package/package.json +7 -6
@@ -2,17 +2,31 @@ import { CredentialsProviderError } from "@smithy/property-provider";
2
2
  import { getProfileName } from "@smithy/shared-ini-file-loader";
3
3
  import { resolveCredentialSource } from "./resolveCredentialSource";
4
4
  import { resolveProfileData } from "./resolveProfileData";
5
- export const isAssumeRoleProfile = (arg) => Boolean(arg) &&
6
- typeof arg === "object" &&
7
- typeof arg.role_arn === "string" &&
8
- ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
9
- ["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
10
- ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 &&
11
- (isAssumeRoleWithSourceProfile(arg) || isAssumeRoleWithProviderProfile(arg));
12
- const isAssumeRoleWithSourceProfile = (arg) => typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
13
- const isAssumeRoleWithProviderProfile = (arg) => typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
5
+ export const isAssumeRoleProfile = (arg, { profile = "default", logger } = {}) => {
6
+ return (Boolean(arg) &&
7
+ typeof arg === "object" &&
8
+ typeof arg.role_arn === "string" &&
9
+ ["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
10
+ ["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
11
+ ["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 &&
12
+ (isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));
13
+ };
14
+ const isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {
15
+ const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
16
+ if (withSourceProfile) {
17
+ logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
18
+ }
19
+ return withSourceProfile;
20
+ };
21
+ const isCredentialSourceProfile = (arg, { profile, logger }) => {
22
+ const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
23
+ if (withProviderProfile) {
24
+ logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
25
+ }
26
+ return withProviderProfile;
27
+ };
14
28
  export const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {
15
- options.logger?.debug("@aws-sdk/credential-provider-ini", "resolveAssumeRoleCredentials (STS)");
29
+ options.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");
16
30
  const data = profiles[profileName];
17
31
  if (!options.roleAssumer) {
18
32
  const { getDefaultRoleAssumer } = await import("@aws-sdk/client-sts");
@@ -26,14 +40,21 @@ export const resolveAssumeRoleCredentials = async (profileName, profiles, option
26
40
  if (source_profile && source_profile in visitedProfiles) {
27
41
  throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +
28
42
  ` ${getProfileName(options)}. Profiles visited: ` +
29
- Object.keys(visitedProfiles).join(", "), false);
43
+ Object.keys(visitedProfiles).join(", "), { logger: options.logger });
30
44
  }
45
+ options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);
31
46
  const sourceCredsProvider = source_profile
32
- ? resolveProfileData(source_profile, profiles, options, {
47
+ ? resolveProfileData(source_profile, {
48
+ ...profiles,
49
+ [source_profile]: {
50
+ ...profiles[source_profile],
51
+ role_arn: data.role_arn ?? profiles[source_profile].role_arn,
52
+ },
53
+ }, options, {
33
54
  ...visitedProfiles,
34
55
  [source_profile]: true,
35
56
  })
36
- : (await resolveCredentialSource(data.credential_source, profileName)(options))();
57
+ : (await resolveCredentialSource(data.credential_source, profileName, options.logger)(options))();
37
58
  const params = {
38
59
  RoleArn: data.role_arn,
39
60
  RoleSessionName: data.role_session_name || `aws-sdk-js-${Date.now()}`,
@@ -43,7 +64,7 @@ export const resolveAssumeRoleCredentials = async (profileName, profiles, option
43
64
  const { mfa_serial } = data;
44
65
  if (mfa_serial) {
45
66
  if (!options.mfaCodeProvider) {
46
- throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, false);
67
+ throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });
47
68
  }
48
69
  params.SerialNumber = mfa_serial;
49
70
  params.TokenCode = await options.mfaCodeProvider(mfa_serial);
@@ -1,15 +1,28 @@
1
- import { CredentialsProviderError } from "@smithy/property-provider";
2
- export const resolveCredentialSource = (credentialSource, profileName) => {
1
+ import { chain, CredentialsProviderError } from "@smithy/property-provider";
2
+ export const resolveCredentialSource = (credentialSource, profileName, logger) => {
3
3
  const sourceProvidersMap = {
4
- EcsContainer: (options) => import("@smithy/credential-provider-imds").then(({ fromContainerMetadata }) => fromContainerMetadata(options)),
5
- Ec2InstanceMetadata: (options) => import("@smithy/credential-provider-imds").then(({ fromInstanceMetadata }) => fromInstanceMetadata(options)),
6
- Environment: (options) => import("@aws-sdk/credential-provider-env").then(({ fromEnv }) => fromEnv(options)),
4
+ EcsContainer: async (options) => {
5
+ const { fromHttp } = await import("@aws-sdk/credential-provider-http");
6
+ const { fromContainerMetadata } = await import("@smithy/credential-provider-imds");
7
+ logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
8
+ return chain(fromHttp(options ?? {}), fromContainerMetadata(options));
9
+ },
10
+ Ec2InstanceMetadata: async (options) => {
11
+ logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
12
+ const { fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
13
+ return fromInstanceMetadata(options);
14
+ },
15
+ Environment: async (options) => {
16
+ logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
17
+ const { fromEnv } = await import("@aws-sdk/credential-provider-env");
18
+ return fromEnv(options);
19
+ },
7
20
  };
8
21
  if (credentialSource in sourceProvidersMap) {
9
22
  return sourceProvidersMap[credentialSource];
10
23
  }
11
24
  else {
12
25
  throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
13
- `expected EcsContainer or Ec2InstanceMetadata or Environment.`);
26
+ `expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });
14
27
  }
15
28
  };
@@ -9,7 +9,7 @@ export const resolveProfileData = async (profileName, profiles, options, visited
9
9
  if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
10
10
  return resolveStaticCredentials(data, options);
11
11
  }
12
- if (isAssumeRoleProfile(data)) {
12
+ if (isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {
13
13
  return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);
14
14
  }
15
15
  if (isStaticCredsProfile(data)) {
@@ -24,5 +24,5 @@ export const resolveProfileData = async (profileName, profiles, options, visited
24
24
  if (isSsoProfile(data)) {
25
25
  return await resolveSsoCredentials(profileName, options);
26
26
  }
27
- throw new CredentialsProviderError(`Profile ${profileName} could not be found or parsed in shared credentials file.`);
27
+ throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });
28
28
  };
@@ -4,7 +4,7 @@ export const isStaticCredsProfile = (arg) => Boolean(arg) &&
4
4
  typeof arg.aws_secret_access_key === "string" &&
5
5
  ["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
6
6
  export const resolveStaticCredentials = (profile, options) => {
7
- options?.logger?.debug("@aws-sdk/credential-provider-ini", "resolveStaticCredentials");
7
+ options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
8
8
  return Promise.resolve({
9
9
  accessKeyId: profile.aws_access_key_id,
10
10
  secretAccessKey: profile.aws_secret_access_key,
@@ -1,4 +1,4 @@
1
- import { AwsCredentialIdentity, ParsedIniData } from "@smithy/types";
1
+ import { AwsCredentialIdentity, Logger, ParsedIniData } from "@smithy/types";
2
2
  import { FromIniInit } from "./fromIni";
3
3
  /**
4
4
  * @internal
@@ -37,7 +37,10 @@ export interface AssumeRoleParams {
37
37
  /**
38
38
  * @internal
39
39
  */
40
- export declare const isAssumeRoleProfile: (arg: any) => boolean;
40
+ export declare const isAssumeRoleProfile: (arg: any, { profile, logger }?: {
41
+ profile?: string | undefined;
42
+ logger?: Logger | undefined;
43
+ }) => boolean;
41
44
  /**
42
45
  * @internal
43
46
  */
@@ -1,5 +1,5 @@
1
1
  import type { CredentialProviderOptions } from "@aws-sdk/types";
2
- import { AwsCredentialIdentityProvider } from "@smithy/types";
2
+ import { AwsCredentialIdentityProvider, Logger } from "@smithy/types";
3
3
  /**
4
4
  * @internal
5
5
  *
@@ -9,4 +9,4 @@ import { AwsCredentialIdentityProvider } from "@smithy/types";
9
9
  * fromIni() provider. The source credential needs to be refreshed every time
10
10
  * fromIni() is called.
11
11
  */
12
- export declare const resolveCredentialSource: (credentialSource: string, profileName: string) => (options?: CredentialProviderOptions) => Promise<AwsCredentialIdentityProvider>;
12
+ export declare const resolveCredentialSource: (credentialSource: string, profileName: string, logger?: Logger) => (options?: CredentialProviderOptions) => Promise<AwsCredentialIdentityProvider>;
@@ -1,4 +1,4 @@
1
- import { AwsCredentialIdentity, ParsedIniData } from "@smithy/types";
1
+ import { AwsCredentialIdentity, Logger, ParsedIniData } from "@smithy/types";
2
2
  import { FromIniInit } from "./fromIni";
3
3
  export interface AssumeRoleParams {
4
4
  RoleArn: string;
@@ -8,7 +8,16 @@ export interface AssumeRoleParams {
8
8
  TokenCode?: string;
9
9
  DurationSeconds?: number;
10
10
  }
11
- export declare const isAssumeRoleProfile: (arg: any) => boolean;
11
+ export declare const isAssumeRoleProfile: (
12
+ arg: any,
13
+ {
14
+ profile,
15
+ logger,
16
+ }?: {
17
+ profile?: string | undefined;
18
+ logger?: Logger | undefined;
19
+ }
20
+ ) => boolean;
12
21
  export declare const resolveAssumeRoleCredentials: (
13
22
  profileName: string,
14
23
  profiles: ParsedIniData,
@@ -1,8 +1,9 @@
1
1
  import { CredentialProviderOptions } from "@aws-sdk/types";
2
- import { AwsCredentialIdentityProvider } from "@smithy/types";
2
+ import { AwsCredentialIdentityProvider, Logger } from "@smithy/types";
3
3
  export declare const resolveCredentialSource: (
4
4
  credentialSource: string,
5
- profileName: string
5
+ profileName: string,
6
+ logger?: Logger
6
7
  ) => (
7
8
  options?: CredentialProviderOptions
8
9
  ) => Promise<AwsCredentialIdentityProvider>;
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-ini",
3
- "version": "3.583.0",
3
+ "version": "3.587.0",
4
4
  "description": "AWS credential provider that sources credentials from ~/.aws/credentials and ~/.aws/config",
5
5
  "main": "./dist-cjs/index.js",
6
6
  "module": "./dist-es/index.js",
@@ -24,14 +24,15 @@
24
24
  },
25
25
  "license": "Apache-2.0",
26
26
  "dependencies": {
27
- "@aws-sdk/credential-provider-env": "3.577.0",
28
- "@aws-sdk/credential-provider-process": "3.577.0",
29
- "@aws-sdk/credential-provider-sso": "3.583.0",
30
- "@aws-sdk/credential-provider-web-identity": "3.577.0",
27
+ "@aws-sdk/credential-provider-env": "3.587.0",
28
+ "@aws-sdk/credential-provider-http": "3.587.0",
29
+ "@aws-sdk/credential-provider-process": "3.587.0",
30
+ "@aws-sdk/credential-provider-sso": "3.587.0",
31
+ "@aws-sdk/credential-provider-web-identity": "3.587.0",
31
32
  "@aws-sdk/types": "3.577.0",
32
- "@smithy/credential-provider-imds": "^3.0.0",
33
- "@smithy/property-provider": "^3.0.0",
34
- "@smithy/shared-ini-file-loader": "^3.0.0",
33
+ "@smithy/credential-provider-imds": "^3.1.0",
34
+ "@smithy/property-provider": "^3.1.0",
35
+ "@smithy/shared-ini-file-loader": "^3.1.0",
35
36
  "@smithy/types": "^3.0.0",
36
37
  "tslib": "^2.6.2"
37
38
  },
@@ -44,7 +45,7 @@
44
45
  "typescript": "~4.9.5"
45
46
  },
46
47
  "peerDependencies": {
47
- "@aws-sdk/client-sts": "^3.583.0"
48
+ "@aws-sdk/client-sts": "^3.587.0"
48
49
  },
49
50
  "types": "./dist-types/index.d.ts",
50
51
  "engines": {
@@ -49,16 +49,16 @@ var remoteProvider = /* @__PURE__ */ __name(async (init) => {
49
49
  var _a, _b;
50
50
  const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await Promise.resolve().then(() => __toESM(require("@smithy/credential-provider-imds")));
51
51
  if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
52
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata");
52
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
53
53
  const { fromHttp } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-http")));
54
54
  return (0, import_property_provider.chain)(fromHttp(init), fromContainerMetadata(init));
55
55
  }
56
56
  if (process.env[ENV_IMDS_DISABLED]) {
57
57
  return async () => {
58
- throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled");
58
+ throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
59
59
  };
60
60
  }
61
- (_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
61
+ (_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
62
62
  return fromInstanceMetadata(init);
63
63
  }, "remoteProvider");
64
64
 
@@ -68,17 +68,18 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
68
68
  ...init.profile || process.env[import_shared_ini_file_loader.ENV_PROFILE] ? [] : [
69
69
  async () => {
70
70
  var _a;
71
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
71
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
72
72
  return (0, import_credential_provider_env.fromEnv)(init)();
73
73
  }
74
74
  ],
75
75
  async () => {
76
76
  var _a;
77
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
77
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
78
78
  const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
79
79
  if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
80
80
  throw new import_property_provider.CredentialsProviderError(
81
- "Skipping SSO provider in default chain (inputs do not include SSO fields)."
81
+ "Skipping SSO provider in default chain (inputs do not include SSO fields).",
82
+ { logger: init.logger }
82
83
  );
83
84
  }
84
85
  const { fromSSO } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-sso")));
@@ -86,29 +87,32 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
86
87
  },
87
88
  async () => {
88
89
  var _a;
89
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
90
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
90
91
  const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));
91
92
  return fromIni(init)();
92
93
  },
93
94
  async () => {
94
95
  var _a;
95
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
96
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
96
97
  const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));
97
98
  return fromProcess(init)();
98
99
  },
99
100
  async () => {
100
101
  var _a;
101
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
102
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
102
103
  const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));
103
104
  return fromTokenFile(init)();
104
105
  },
105
106
  async () => {
106
107
  var _a;
107
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
108
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
108
109
  return (await remoteProvider(init))();
109
110
  },
110
111
  async () => {
111
- throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", false);
112
+ throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", {
113
+ tryNextLink: false,
114
+ logger: init.logger
115
+ });
112
116
  }
113
117
  ),
114
118
  credentialsTreatedAsExpired,
@@ -6,34 +6,37 @@ export const defaultProvider = (init = {}) => memoize(chain(...(init.profile ||
6
6
  ? []
7
7
  : [
8
8
  async () => {
9
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
9
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
10
10
  return fromEnv(init)();
11
11
  },
12
12
  ]), async () => {
13
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
13
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
14
14
  const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
15
15
  if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
16
- throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).");
16
+ throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
17
17
  }
18
18
  const { fromSSO } = await import("@aws-sdk/credential-provider-sso");
19
19
  return fromSSO(init)();
20
20
  }, async () => {
21
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
21
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
22
22
  const { fromIni } = await import("@aws-sdk/credential-provider-ini");
23
23
  return fromIni(init)();
24
24
  }, async () => {
25
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
25
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
26
26
  const { fromProcess } = await import("@aws-sdk/credential-provider-process");
27
27
  return fromProcess(init)();
28
28
  }, async () => {
29
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
29
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
30
30
  const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity");
31
31
  return fromTokenFile(init)();
32
32
  }, async () => {
33
- init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
33
+ init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
34
34
  return (await remoteProvider(init))();
35
35
  }, async () => {
36
- throw new CredentialsProviderError("Could not load credentials from any providers", false);
36
+ throw new CredentialsProviderError("Could not load credentials from any providers", {
37
+ tryNextLink: false,
38
+ logger: init.logger,
39
+ });
37
40
  }), credentialsTreatedAsExpired, credentialsWillNeedRefresh);
38
41
  export const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
39
42
  export const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;
@@ -3,15 +3,15 @@ export const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
3
3
  export const remoteProvider = async (init) => {
4
4
  const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
5
5
  if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
6
- init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata");
6
+ init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
7
7
  const { fromHttp } = await import("@aws-sdk/credential-provider-http");
8
8
  return chain(fromHttp(init), fromContainerMetadata(init));
9
9
  }
10
10
  if (process.env[ENV_IMDS_DISABLED]) {
11
11
  return async () => {
12
- throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled");
12
+ throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
13
13
  };
14
14
  }
15
- init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
15
+ init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
16
16
  return fromInstanceMetadata(init);
17
17
  };
@@ -1,3 +1,4 @@
1
+ import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
1
2
  import type { FromIniInit } from "@aws-sdk/credential-provider-ini";
2
3
  import type { FromProcessInit } from "@aws-sdk/credential-provider-process";
3
4
  import type { FromSSOInit, SsoCredentialsParameters } from "@aws-sdk/credential-provider-sso";
@@ -7,7 +8,7 @@ import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
7
8
  /**
8
9
  * @public
9
10
  */
10
- export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
11
+ export type DefaultProviderInit = FromIniInit & FromHttpOptions & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
11
12
  /**
12
13
  * Creates a credential provider that will attempt to find credentials from the
13
14
  * following sources (listed in order of precedence):
@@ -1,3 +1,4 @@
1
+ import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
1
2
  import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
2
3
  import type { AwsCredentialIdentityProvider } from "@smithy/types";
3
4
  /**
@@ -7,4 +8,4 @@ export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
7
8
  /**
8
9
  * @internal
9
10
  */
10
- export declare const remoteProvider: (init: RemoteProviderInit) => Promise<AwsCredentialIdentityProvider>;
11
+ export declare const remoteProvider: (init: RemoteProviderInit | FromHttpOptions) => Promise<AwsCredentialIdentityProvider>;
@@ -1,3 +1,4 @@
1
+ import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
1
2
  import { FromIniInit } from "@aws-sdk/credential-provider-ini";
2
3
  import { FromProcessInit } from "@aws-sdk/credential-provider-process";
3
4
  import {
@@ -8,6 +9,7 @@ import { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
8
9
  import { RemoteProviderInit } from "@smithy/credential-provider-imds";
9
10
  import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
10
11
  export type DefaultProviderInit = FromIniInit &
12
+ FromHttpOptions &
11
13
  RemoteProviderInit &
12
14
  FromProcessInit &
13
15
  (FromSSOInit & Partial<SsoCredentialsParameters>) &
@@ -1,6 +1,7 @@
1
+ import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
1
2
  import { RemoteProviderInit } from "@smithy/credential-provider-imds";
2
3
  import { AwsCredentialIdentityProvider } from "@smithy/types";
3
4
  export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
4
5
  export declare const remoteProvider: (
5
- init: RemoteProviderInit
6
+ init: RemoteProviderInit | FromHttpOptions
6
7
  ) => Promise<AwsCredentialIdentityProvider>;
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-node",
3
- "version": "3.583.0",
3
+ "version": "3.587.0",
4
4
  "description": "AWS credential provider that sources credentials from a Node.JS environment. ",
5
5
  "engines": {
6
6
  "node": ">=16.0.0"
@@ -28,16 +28,16 @@
28
28
  },
29
29
  "license": "Apache-2.0",
30
30
  "dependencies": {
31
- "@aws-sdk/credential-provider-env": "3.577.0",
32
- "@aws-sdk/credential-provider-http": "3.582.0",
33
- "@aws-sdk/credential-provider-ini": "3.583.0",
34
- "@aws-sdk/credential-provider-process": "3.577.0",
35
- "@aws-sdk/credential-provider-sso": "3.583.0",
36
- "@aws-sdk/credential-provider-web-identity": "3.577.0",
31
+ "@aws-sdk/credential-provider-env": "3.587.0",
32
+ "@aws-sdk/credential-provider-http": "3.587.0",
33
+ "@aws-sdk/credential-provider-ini": "3.587.0",
34
+ "@aws-sdk/credential-provider-process": "3.587.0",
35
+ "@aws-sdk/credential-provider-sso": "3.587.0",
36
+ "@aws-sdk/credential-provider-web-identity": "3.587.0",
37
37
  "@aws-sdk/types": "3.577.0",
38
- "@smithy/credential-provider-imds": "^3.0.0",
39
- "@smithy/property-provider": "^3.0.0",
40
- "@smithy/shared-ini-file-loader": "^3.0.0",
38
+ "@smithy/credential-provider-imds": "^3.1.0",
39
+ "@smithy/property-provider": "^3.1.0",
40
+ "@smithy/shared-ini-file-loader": "^3.1.0",
41
41
  "@smithy/types": "^3.0.0",
42
42
  "tslib": "^2.6.2"
43
43
  },
@@ -58,7 +58,7 @@ var getValidatedProcessCredentials = /* @__PURE__ */ __name((profileName, data)
58
58
  }, "getValidatedProcessCredentials");
59
59
 
60
60
  // src/resolveProcessCredentials.ts
61
- var resolveProcessCredentials = /* @__PURE__ */ __name(async (profileName, profiles) => {
61
+ var resolveProcessCredentials = /* @__PURE__ */ __name(async (profileName, profiles, logger) => {
62
62
  const profile = profiles[profileName];
63
63
  if (profiles[profileName]) {
64
64
  const credentialProcess = profile["credential_process"];
@@ -74,22 +74,24 @@ var resolveProcessCredentials = /* @__PURE__ */ __name(async (profileName, profi
74
74
  }
75
75
  return getValidatedProcessCredentials(profileName, data);
76
76
  } catch (error) {
77
- throw new import_property_provider.CredentialsProviderError(error.message);
77
+ throw new import_property_provider.CredentialsProviderError(error.message, { logger });
78
78
  }
79
79
  } else {
80
- throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`);
80
+ throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });
81
81
  }
82
82
  } else {
83
- throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`);
83
+ throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {
84
+ logger
85
+ });
84
86
  }
85
87
  }, "resolveProcessCredentials");
86
88
 
87
89
  // src/fromProcess.ts
88
90
  var fromProcess = /* @__PURE__ */ __name((init = {}) => async () => {
89
91
  var _a;
90
- (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-process", "fromProcess");
92
+ (_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-process - fromProcess");
91
93
  const profiles = await (0, import_shared_ini_file_loader.parseKnownFiles)(init);
92
- return resolveProcessCredentials((0, import_shared_ini_file_loader.getProfileName)(init), profiles);
94
+ return resolveProcessCredentials((0, import_shared_ini_file_loader.getProfileName)(init), profiles, init.logger);
93
95
  }, "fromProcess");
94
96
  // Annotate the CommonJS export names for ESM import in node:
95
97
 
@@ -1,7 +1,7 @@
1
1
  import { getProfileName, parseKnownFiles } from "@smithy/shared-ini-file-loader";
2
2
  import { resolveProcessCredentials } from "./resolveProcessCredentials";
3
3
  export const fromProcess = (init = {}) => async () => {
4
- init.logger?.debug("@aws-sdk/credential-provider-process", "fromProcess");
4
+ init.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");
5
5
  const profiles = await parseKnownFiles(init);
6
- return resolveProcessCredentials(getProfileName(init), profiles);
6
+ return resolveProcessCredentials(getProfileName(init), profiles, init.logger);
7
7
  };
@@ -2,7 +2,7 @@ import { CredentialsProviderError } from "@smithy/property-provider";
2
2
  import { exec } from "child_process";
3
3
  import { promisify } from "util";
4
4
  import { getValidatedProcessCredentials } from "./getValidatedProcessCredentials";
5
- export const resolveProcessCredentials = async (profileName, profiles) => {
5
+ export const resolveProcessCredentials = async (profileName, profiles, logger) => {
6
6
  const profile = profiles[profileName];
7
7
  if (profiles[profileName]) {
8
8
  const credentialProcess = profile["credential_process"];
@@ -20,14 +20,16 @@ export const resolveProcessCredentials = async (profileName, profiles) => {
20
20
  return getValidatedProcessCredentials(profileName, data);
21
21
  }
22
22
  catch (error) {
23
- throw new CredentialsProviderError(error.message);
23
+ throw new CredentialsProviderError(error.message, { logger });
24
24
  }
25
25
  }
26
26
  else {
27
- throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`);
27
+ throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });
28
28
  }
29
29
  }
30
30
  else {
31
- throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`);
31
+ throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {
32
+ logger,
33
+ });
32
34
  }
33
35
  };
@@ -1,5 +1,5 @@
1
- import { AwsCredentialIdentity, ParsedIniData } from "@smithy/types";
1
+ import { AwsCredentialIdentity, Logger, ParsedIniData } from "@smithy/types";
2
2
  /**
3
3
  * @internal
4
4
  */
5
- export declare const resolveProcessCredentials: (profileName: string, profiles: ParsedIniData) => Promise<AwsCredentialIdentity>;
5
+ export declare const resolveProcessCredentials: (profileName: string, profiles: ParsedIniData, logger?: Logger) => Promise<AwsCredentialIdentity>;
@@ -1,5 +1,6 @@
1
- import { AwsCredentialIdentity, ParsedIniData } from "@smithy/types";
1
+ import { AwsCredentialIdentity, Logger, ParsedIniData } from "@smithy/types";
2
2
  export declare const resolveProcessCredentials: (
3
3
  profileName: string,
4
- profiles: ParsedIniData
4
+ profiles: ParsedIniData,
5
+ logger?: Logger
5
6
  ) => Promise<AwsCredentialIdentity>;
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aws-sdk/credential-provider-process",
3
- "version": "3.577.0",
3
+ "version": "3.587.0",
4
4
  "description": "AWS credential provider that sources credential_process from ~/.aws/credentials and ~/.aws/config",
5
5
  "main": "./dist-cjs/index.js",
6
6
  "module": "./dist-es/index.js",
@@ -25,8 +25,8 @@
25
25
  "license": "Apache-2.0",
26
26
  "dependencies": {
27
27
  "@aws-sdk/types": "3.577.0",
28
- "@smithy/property-provider": "^3.0.0",
29
- "@smithy/shared-ini-file-loader": "^3.0.0",
28
+ "@smithy/property-provider": "^3.1.0",
29
+ "@smithy/shared-ini-file-loader": "^3.1.0",
30
30
  "@smithy/types": "^3.0.0",
31
31
  "tslib": "^2.6.2"
32
32
  },