@cdklabs/cdk-ecs-codedeploy 0.0.283 → 0.0.285
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +4 -4
- package/.jsii.tabl.json +1 -1
- package/lib/api-canary/index.js +1 -1
- package/lib/ecs-appspec/index.js +1 -1
- package/lib/ecs-deployment/index.js +1 -1
- package/lib/ecs-patterns/application-load-balanced-codedeployed-fargate-service.js +1 -1
- package/node_modules/@aws-sdk/client-codedeploy/dist-cjs/index.js +2 -2
- package/node_modules/@aws-sdk/client-codedeploy/dist-es/protocols/Aws_json1_1.js +2 -2
- package/node_modules/@aws-sdk/client-codedeploy/package.json +18 -18
- package/node_modules/@aws-sdk/client-sso/package.json +15 -15
- package/node_modules/@aws-sdk/client-sso-oidc/package.json +17 -17
- package/node_modules/@aws-sdk/client-sts/package.json +17 -17
- package/node_modules/@aws-sdk/core/package.json +3 -3
- package/node_modules/@aws-sdk/credential-provider-env/dist-cjs/index.js +2 -2
- package/node_modules/@aws-sdk/credential-provider-env/dist-es/fromEnv.js +2 -2
- package/node_modules/@aws-sdk/credential-provider-env/package.json +2 -2
- package/node_modules/@aws-sdk/credential-provider-http/dist-cjs/fromHttp/checkUrl.js +2 -2
- package/node_modules/@aws-sdk/credential-provider-http/dist-cjs/fromHttp/fromHttp.browser.js +4 -4
- package/node_modules/@aws-sdk/credential-provider-http/dist-cjs/fromHttp/fromHttp.js +12 -9
- package/node_modules/@aws-sdk/credential-provider-http/dist-cjs/fromHttp/requestHelpers.js +6 -5
- package/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/checkUrl.js +2 -2
- package/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.browser.js +4 -4
- package/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/fromHttp.js +12 -9
- package/node_modules/@aws-sdk/credential-provider-http/dist-es/fromHttp/requestHelpers.js +6 -5
- package/node_modules/@aws-sdk/credential-provider-http/dist-types/fromHttp/checkUrl.d.ts +3 -1
- package/node_modules/@aws-sdk/credential-provider-http/dist-types/fromHttp/fromHttp.browser.d.ts +1 -1
- package/node_modules/@aws-sdk/credential-provider-http/dist-types/fromHttp/fromHttp.d.ts +1 -1
- package/node_modules/@aws-sdk/credential-provider-http/dist-types/fromHttp/requestHelpers.d.ts +2 -2
- package/node_modules/@aws-sdk/credential-provider-http/dist-types/ts3.4/fromHttp/checkUrl.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-http/dist-types/ts3.4/fromHttp/fromHttp.browser.d.ts +1 -1
- package/node_modules/@aws-sdk/credential-provider-http/dist-types/ts3.4/fromHttp/fromHttp.d.ts +1 -1
- package/node_modules/@aws-sdk/credential-provider-http/dist-types/ts3.4/fromHttp/requestHelpers.d.ts +3 -2
- package/node_modules/@aws-sdk/credential-provider-http/package.json +3 -3
- package/node_modules/@aws-sdk/credential-provider-ini/dist-cjs/index.js +70 -20
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/fromIni.js +1 -1
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js +35 -14
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveCredentialSource.js +19 -6
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveProfileData.js +2 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveStaticCredentials.js +1 -1
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveAssumeRoleCredentials.d.ts +5 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveCredentialSource.d.ts +2 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveAssumeRoleCredentials.d.ts +11 -2
- package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveCredentialSource.d.ts +3 -2
- package/node_modules/@aws-sdk/credential-provider-ini/package.json +10 -9
- package/node_modules/@aws-sdk/credential-provider-node/dist-cjs/index.js +15 -11
- package/node_modules/@aws-sdk/credential-provider-node/dist-es/defaultProvider.js +11 -8
- package/node_modules/@aws-sdk/credential-provider-node/dist-es/remoteProvider.js +3 -3
- package/node_modules/@aws-sdk/credential-provider-node/dist-types/defaultProvider.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-node/dist-types/remoteProvider.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/defaultProvider.d.ts +2 -0
- package/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/remoteProvider.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-node/package.json +10 -10
- package/node_modules/@aws-sdk/credential-provider-process/dist-cjs/index.js +8 -6
- package/node_modules/@aws-sdk/credential-provider-process/dist-es/fromProcess.js +2 -2
- package/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js +6 -4
- package/node_modules/@aws-sdk/credential-provider-process/dist-types/resolveProcessCredentials.d.ts +2 -2
- package/node_modules/@aws-sdk/credential-provider-process/dist-types/ts3.4/resolveProcessCredentials.d.ts +3 -2
- package/node_modules/@aws-sdk/credential-provider-process/package.json +3 -3
- package/node_modules/@aws-sdk/credential-provider-sso/dist-cjs/index.js +43 -21
- package/node_modules/@aws-sdk/credential-provider-sso/dist-es/fromSSO.js +15 -7
- package/node_modules/@aws-sdk/credential-provider-sso/dist-es/resolveSSOCredentials.js +21 -6
- package/node_modules/@aws-sdk/credential-provider-sso/dist-es/validateSsoProfile.js +2 -2
- package/node_modules/@aws-sdk/credential-provider-sso/dist-types/resolveSSOCredentials.d.ts +1 -1
- package/node_modules/@aws-sdk/credential-provider-sso/dist-types/ts3.4/resolveSSOCredentials.d.ts +1 -0
- package/node_modules/@aws-sdk/credential-provider-sso/dist-types/ts3.4/validateSsoProfile.d.ts +3 -1
- package/node_modules/@aws-sdk/credential-provider-sso/dist-types/validateSsoProfile.d.ts +2 -1
- package/node_modules/@aws-sdk/credential-provider-sso/package.json +5 -5
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-cjs/fromTokenFile.js +4 -2
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-cjs/fromWebToken.js +1 -1
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js +4 -2
- package/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js +1 -1
- package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +3 -3
- package/node_modules/@aws-sdk/middleware-user-agent/package.json +2 -2
- package/node_modules/@aws-sdk/region-config-resolver/package.json +2 -2
- package/node_modules/@aws-sdk/token-providers/dist-cjs/index.js +2 -2
- package/node_modules/@aws-sdk/token-providers/dist-es/fromSso.js +1 -1
- package/node_modules/@aws-sdk/token-providers/dist-es/fromStatic.js +1 -1
- package/node_modules/@aws-sdk/token-providers/package.json +4 -4
- package/node_modules/@aws-sdk/util-endpoints/package.json +2 -2
- package/node_modules/@aws-sdk/util-user-agent-node/package.json +2 -2
- package/node_modules/@smithy/config-resolver/package.json +2 -2
- package/node_modules/@smithy/core/README.md +35 -2
- package/node_modules/@smithy/core/package.json +19 -6
- package/node_modules/@smithy/credential-provider-imds/dist-cjs/index.js +30 -22
- package/node_modules/@smithy/credential-provider-imds/dist-es/fromContainerMetadata.js +17 -6
- package/node_modules/@smithy/credential-provider-imds/dist-es/fromInstanceMetadata.js +11 -9
- package/node_modules/@smithy/credential-provider-imds/package.json +3 -3
- package/node_modules/@smithy/middleware-endpoint/package.json +3 -3
- package/node_modules/@smithy/middleware-retry/package.json +3 -3
- package/node_modules/@smithy/node-config-provider/dist-cjs/getSelectorName.js +1 -0
- package/node_modules/@smithy/node-config-provider/dist-cjs/index.js +21 -3
- package/node_modules/@smithy/node-config-provider/dist-es/fromEnv.js +3 -2
- package/node_modules/@smithy/node-config-provider/dist-es/fromSharedConfigFiles.js +2 -2
- package/node_modules/@smithy/node-config-provider/dist-es/getSelectorName.js +12 -0
- package/node_modules/@smithy/node-config-provider/dist-types/fromEnv.d.ts +2 -2
- package/node_modules/@smithy/node-config-provider/dist-types/getSelectorName.d.ts +9 -0
- package/node_modules/@smithy/node-config-provider/dist-types/ts3.4/fromEnv.d.ts +2 -2
- package/node_modules/@smithy/node-config-provider/dist-types/ts3.4/getSelectorName.d.ts +9 -0
- package/node_modules/@smithy/node-config-provider/package.json +3 -3
- package/node_modules/@smithy/property-provider/dist-cjs/index.js +28 -10
- package/node_modules/@smithy/property-provider/dist-es/CredentialsProviderError.js +2 -3
- package/node_modules/@smithy/property-provider/dist-es/ProviderError.js +15 -4
- package/node_modules/@smithy/property-provider/dist-es/TokenProviderError.js +2 -3
- package/node_modules/@smithy/property-provider/dist-types/CredentialsProviderError.d.ts +16 -3
- package/node_modules/@smithy/property-provider/dist-types/ProviderError.d.ts +25 -3
- package/node_modules/@smithy/property-provider/dist-types/TokenProviderError.d.ts +16 -3
- package/node_modules/@smithy/property-provider/dist-types/ts3.4/CredentialsProviderError.d.ts +16 -3
- package/node_modules/@smithy/property-provider/dist-types/ts3.4/ProviderError.d.ts +25 -3
- package/node_modules/@smithy/property-provider/dist-types/ts3.4/TokenProviderError.d.ts +16 -3
- package/node_modules/@smithy/property-provider/package.json +1 -1
- package/node_modules/@smithy/shared-ini-file-loader/dist-types/loadSharedConfigFiles.d.ts +5 -1
- package/node_modules/@smithy/shared-ini-file-loader/dist-types/ts3.4/loadSharedConfigFiles.d.ts +5 -1
- package/node_modules/@smithy/shared-ini-file-loader/package.json +1 -1
- package/node_modules/@smithy/smithy-client/dist-cjs/index.js +3 -0
- package/node_modules/@smithy/smithy-client/dist-es/ser-utils.js +1 -0
- package/node_modules/@smithy/smithy-client/dist-types/ser-utils.d.ts +5 -0
- package/node_modules/@smithy/smithy-client/dist-types/ts3.4/ser-utils.d.ts +5 -0
- package/node_modules/@smithy/smithy-client/package.json +2 -2
- package/node_modules/@smithy/util-defaults-mode-browser/package.json +3 -3
- package/node_modules/@smithy/util-defaults-mode-node/package.json +6 -6
- package/node_modules/@smithy/util-endpoints/package.json +2 -2
- package/package.json +7 -6
package/node_modules/@aws-sdk/credential-provider-ini/dist-es/resolveAssumeRoleCredentials.js
CHANGED
|
@@ -2,17 +2,31 @@ import { CredentialsProviderError } from "@smithy/property-provider";
|
|
|
2
2
|
import { getProfileName } from "@smithy/shared-ini-file-loader";
|
|
3
3
|
import { resolveCredentialSource } from "./resolveCredentialSource";
|
|
4
4
|
import { resolveProfileData } from "./resolveProfileData";
|
|
5
|
-
export const isAssumeRoleProfile = (arg) =>
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
5
|
+
export const isAssumeRoleProfile = (arg, { profile = "default", logger } = {}) => {
|
|
6
|
+
return (Boolean(arg) &&
|
|
7
|
+
typeof arg === "object" &&
|
|
8
|
+
typeof arg.role_arn === "string" &&
|
|
9
|
+
["undefined", "string"].indexOf(typeof arg.role_session_name) > -1 &&
|
|
10
|
+
["undefined", "string"].indexOf(typeof arg.external_id) > -1 &&
|
|
11
|
+
["undefined", "string"].indexOf(typeof arg.mfa_serial) > -1 &&
|
|
12
|
+
(isAssumeRoleWithSourceProfile(arg, { profile, logger }) || isCredentialSourceProfile(arg, { profile, logger })));
|
|
13
|
+
};
|
|
14
|
+
const isAssumeRoleWithSourceProfile = (arg, { profile, logger }) => {
|
|
15
|
+
const withSourceProfile = typeof arg.source_profile === "string" && typeof arg.credential_source === "undefined";
|
|
16
|
+
if (withSourceProfile) {
|
|
17
|
+
logger?.debug?.(` ${profile} isAssumeRoleWithSourceProfile source_profile=${arg.source_profile}`);
|
|
18
|
+
}
|
|
19
|
+
return withSourceProfile;
|
|
20
|
+
};
|
|
21
|
+
const isCredentialSourceProfile = (arg, { profile, logger }) => {
|
|
22
|
+
const withProviderProfile = typeof arg.credential_source === "string" && typeof arg.source_profile === "undefined";
|
|
23
|
+
if (withProviderProfile) {
|
|
24
|
+
logger?.debug?.(` ${profile} isCredentialSourceProfile credential_source=${arg.credential_source}`);
|
|
25
|
+
}
|
|
26
|
+
return withProviderProfile;
|
|
27
|
+
};
|
|
14
28
|
export const resolveAssumeRoleCredentials = async (profileName, profiles, options, visitedProfiles = {}) => {
|
|
15
|
-
options.logger?.debug("@aws-sdk/credential-provider-ini
|
|
29
|
+
options.logger?.debug("@aws-sdk/credential-provider-ini - resolveAssumeRoleCredentials (STS)");
|
|
16
30
|
const data = profiles[profileName];
|
|
17
31
|
if (!options.roleAssumer) {
|
|
18
32
|
const { getDefaultRoleAssumer } = await import("@aws-sdk/client-sts");
|
|
@@ -26,14 +40,21 @@ export const resolveAssumeRoleCredentials = async (profileName, profiles, option
|
|
|
26
40
|
if (source_profile && source_profile in visitedProfiles) {
|
|
27
41
|
throw new CredentialsProviderError(`Detected a cycle attempting to resolve credentials for profile` +
|
|
28
42
|
` ${getProfileName(options)}. Profiles visited: ` +
|
|
29
|
-
Object.keys(visitedProfiles).join(", "),
|
|
43
|
+
Object.keys(visitedProfiles).join(", "), { logger: options.logger });
|
|
30
44
|
}
|
|
45
|
+
options.logger?.debug(`@aws-sdk/credential-provider-ini - finding credential resolver using ${source_profile ? `source_profile=[${source_profile}]` : `profile=[${profileName}]`}`);
|
|
31
46
|
const sourceCredsProvider = source_profile
|
|
32
|
-
? resolveProfileData(source_profile,
|
|
47
|
+
? resolveProfileData(source_profile, {
|
|
48
|
+
...profiles,
|
|
49
|
+
[source_profile]: {
|
|
50
|
+
...profiles[source_profile],
|
|
51
|
+
role_arn: data.role_arn ?? profiles[source_profile].role_arn,
|
|
52
|
+
},
|
|
53
|
+
}, options, {
|
|
33
54
|
...visitedProfiles,
|
|
34
55
|
[source_profile]: true,
|
|
35
56
|
})
|
|
36
|
-
: (await resolveCredentialSource(data.credential_source, profileName)(options))();
|
|
57
|
+
: (await resolveCredentialSource(data.credential_source, profileName, options.logger)(options))();
|
|
37
58
|
const params = {
|
|
38
59
|
RoleArn: data.role_arn,
|
|
39
60
|
RoleSessionName: data.role_session_name || `aws-sdk-js-${Date.now()}`,
|
|
@@ -43,7 +64,7 @@ export const resolveAssumeRoleCredentials = async (profileName, profiles, option
|
|
|
43
64
|
const { mfa_serial } = data;
|
|
44
65
|
if (mfa_serial) {
|
|
45
66
|
if (!options.mfaCodeProvider) {
|
|
46
|
-
throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, false);
|
|
67
|
+
throw new CredentialsProviderError(`Profile ${profileName} requires multi-factor authentication, but no MFA code callback was provided.`, { logger: options.logger, tryNextLink: false });
|
|
47
68
|
}
|
|
48
69
|
params.SerialNumber = mfa_serial;
|
|
49
70
|
params.TokenCode = await options.mfaCodeProvider(mfa_serial);
|
|
@@ -1,15 +1,28 @@
|
|
|
1
|
-
import { CredentialsProviderError } from "@smithy/property-provider";
|
|
2
|
-
export const resolveCredentialSource = (credentialSource, profileName) => {
|
|
1
|
+
import { chain, CredentialsProviderError } from "@smithy/property-provider";
|
|
2
|
+
export const resolveCredentialSource = (credentialSource, profileName, logger) => {
|
|
3
3
|
const sourceProvidersMap = {
|
|
4
|
-
EcsContainer: (options) =>
|
|
5
|
-
|
|
6
|
-
|
|
4
|
+
EcsContainer: async (options) => {
|
|
5
|
+
const { fromHttp } = await import("@aws-sdk/credential-provider-http");
|
|
6
|
+
const { fromContainerMetadata } = await import("@smithy/credential-provider-imds");
|
|
7
|
+
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is EcsContainer");
|
|
8
|
+
return chain(fromHttp(options ?? {}), fromContainerMetadata(options));
|
|
9
|
+
},
|
|
10
|
+
Ec2InstanceMetadata: async (options) => {
|
|
11
|
+
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Ec2InstanceMetadata");
|
|
12
|
+
const { fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
|
|
13
|
+
return fromInstanceMetadata(options);
|
|
14
|
+
},
|
|
15
|
+
Environment: async (options) => {
|
|
16
|
+
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
|
|
17
|
+
const { fromEnv } = await import("@aws-sdk/credential-provider-env");
|
|
18
|
+
return fromEnv(options);
|
|
19
|
+
},
|
|
7
20
|
};
|
|
8
21
|
if (credentialSource in sourceProvidersMap) {
|
|
9
22
|
return sourceProvidersMap[credentialSource];
|
|
10
23
|
}
|
|
11
24
|
else {
|
|
12
25
|
throw new CredentialsProviderError(`Unsupported credential source in profile ${profileName}. Got ${credentialSource}, ` +
|
|
13
|
-
`expected EcsContainer or Ec2InstanceMetadata or Environment
|
|
26
|
+
`expected EcsContainer or Ec2InstanceMetadata or Environment.`, { logger });
|
|
14
27
|
}
|
|
15
28
|
};
|
|
@@ -9,7 +9,7 @@ export const resolveProfileData = async (profileName, profiles, options, visited
|
|
|
9
9
|
if (Object.keys(visitedProfiles).length > 0 && isStaticCredsProfile(data)) {
|
|
10
10
|
return resolveStaticCredentials(data, options);
|
|
11
11
|
}
|
|
12
|
-
if (isAssumeRoleProfile(data)) {
|
|
12
|
+
if (isAssumeRoleProfile(data, { profile: profileName, logger: options.logger })) {
|
|
13
13
|
return resolveAssumeRoleCredentials(profileName, profiles, options, visitedProfiles);
|
|
14
14
|
}
|
|
15
15
|
if (isStaticCredsProfile(data)) {
|
|
@@ -24,5 +24,5 @@ export const resolveProfileData = async (profileName, profiles, options, visited
|
|
|
24
24
|
if (isSsoProfile(data)) {
|
|
25
25
|
return await resolveSsoCredentials(profileName, options);
|
|
26
26
|
}
|
|
27
|
-
throw new CredentialsProviderError(`
|
|
27
|
+
throw new CredentialsProviderError(`Could not resolve credentials using profile: [${profileName}] in configuration/credentials file(s).`, { logger: options.logger });
|
|
28
28
|
};
|
|
@@ -4,7 +4,7 @@ export const isStaticCredsProfile = (arg) => Boolean(arg) &&
|
|
|
4
4
|
typeof arg.aws_secret_access_key === "string" &&
|
|
5
5
|
["undefined", "string"].indexOf(typeof arg.aws_session_token) > -1;
|
|
6
6
|
export const resolveStaticCredentials = (profile, options) => {
|
|
7
|
-
options?.logger?.debug("@aws-sdk/credential-provider-ini
|
|
7
|
+
options?.logger?.debug("@aws-sdk/credential-provider-ini - resolveStaticCredentials");
|
|
8
8
|
return Promise.resolve({
|
|
9
9
|
accessKeyId: profile.aws_access_key_id,
|
|
10
10
|
secretAccessKey: profile.aws_secret_access_key,
|
package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveAssumeRoleCredentials.d.ts
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { AwsCredentialIdentity, ParsedIniData } from "@smithy/types";
|
|
1
|
+
import { AwsCredentialIdentity, Logger, ParsedIniData } from "@smithy/types";
|
|
2
2
|
import { FromIniInit } from "./fromIni";
|
|
3
3
|
/**
|
|
4
4
|
* @internal
|
|
@@ -37,7 +37,10 @@ export interface AssumeRoleParams {
|
|
|
37
37
|
/**
|
|
38
38
|
* @internal
|
|
39
39
|
*/
|
|
40
|
-
export declare const isAssumeRoleProfile: (arg: any
|
|
40
|
+
export declare const isAssumeRoleProfile: (arg: any, { profile, logger }?: {
|
|
41
|
+
profile?: string | undefined;
|
|
42
|
+
logger?: Logger | undefined;
|
|
43
|
+
}) => boolean;
|
|
41
44
|
/**
|
|
42
45
|
* @internal
|
|
43
46
|
*/
|
package/node_modules/@aws-sdk/credential-provider-ini/dist-types/resolveCredentialSource.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import type { CredentialProviderOptions } from "@aws-sdk/types";
|
|
2
|
-
import { AwsCredentialIdentityProvider } from "@smithy/types";
|
|
2
|
+
import { AwsCredentialIdentityProvider, Logger } from "@smithy/types";
|
|
3
3
|
/**
|
|
4
4
|
* @internal
|
|
5
5
|
*
|
|
@@ -9,4 +9,4 @@ import { AwsCredentialIdentityProvider } from "@smithy/types";
|
|
|
9
9
|
* fromIni() provider. The source credential needs to be refreshed every time
|
|
10
10
|
* fromIni() is called.
|
|
11
11
|
*/
|
|
12
|
-
export declare const resolveCredentialSource: (credentialSource: string, profileName: string) => (options?: CredentialProviderOptions) => Promise<AwsCredentialIdentityProvider>;
|
|
12
|
+
export declare const resolveCredentialSource: (credentialSource: string, profileName: string, logger?: Logger) => (options?: CredentialProviderOptions) => Promise<AwsCredentialIdentityProvider>;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { AwsCredentialIdentity, ParsedIniData } from "@smithy/types";
|
|
1
|
+
import { AwsCredentialIdentity, Logger, ParsedIniData } from "@smithy/types";
|
|
2
2
|
import { FromIniInit } from "./fromIni";
|
|
3
3
|
export interface AssumeRoleParams {
|
|
4
4
|
RoleArn: string;
|
|
@@ -8,7 +8,16 @@ export interface AssumeRoleParams {
|
|
|
8
8
|
TokenCode?: string;
|
|
9
9
|
DurationSeconds?: number;
|
|
10
10
|
}
|
|
11
|
-
export declare const isAssumeRoleProfile: (
|
|
11
|
+
export declare const isAssumeRoleProfile: (
|
|
12
|
+
arg: any,
|
|
13
|
+
{
|
|
14
|
+
profile,
|
|
15
|
+
logger,
|
|
16
|
+
}?: {
|
|
17
|
+
profile?: string | undefined;
|
|
18
|
+
logger?: Logger | undefined;
|
|
19
|
+
}
|
|
20
|
+
) => boolean;
|
|
12
21
|
export declare const resolveAssumeRoleCredentials: (
|
|
13
22
|
profileName: string,
|
|
14
23
|
profiles: ParsedIniData,
|
package/node_modules/@aws-sdk/credential-provider-ini/dist-types/ts3.4/resolveCredentialSource.d.ts
CHANGED
|
@@ -1,8 +1,9 @@
|
|
|
1
1
|
import { CredentialProviderOptions } from "@aws-sdk/types";
|
|
2
|
-
import { AwsCredentialIdentityProvider } from "@smithy/types";
|
|
2
|
+
import { AwsCredentialIdentityProvider, Logger } from "@smithy/types";
|
|
3
3
|
export declare const resolveCredentialSource: (
|
|
4
4
|
credentialSource: string,
|
|
5
|
-
profileName: string
|
|
5
|
+
profileName: string,
|
|
6
|
+
logger?: Logger
|
|
6
7
|
) => (
|
|
7
8
|
options?: CredentialProviderOptions
|
|
8
9
|
) => Promise<AwsCredentialIdentityProvider>;
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-provider-ini",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.587.0",
|
|
4
4
|
"description": "AWS credential provider that sources credentials from ~/.aws/credentials and ~/.aws/config",
|
|
5
5
|
"main": "./dist-cjs/index.js",
|
|
6
6
|
"module": "./dist-es/index.js",
|
|
@@ -24,14 +24,15 @@
|
|
|
24
24
|
},
|
|
25
25
|
"license": "Apache-2.0",
|
|
26
26
|
"dependencies": {
|
|
27
|
-
"@aws-sdk/credential-provider-env": "3.
|
|
28
|
-
"@aws-sdk/credential-provider-
|
|
29
|
-
"@aws-sdk/credential-provider-
|
|
30
|
-
"@aws-sdk/credential-provider-
|
|
27
|
+
"@aws-sdk/credential-provider-env": "3.587.0",
|
|
28
|
+
"@aws-sdk/credential-provider-http": "3.587.0",
|
|
29
|
+
"@aws-sdk/credential-provider-process": "3.587.0",
|
|
30
|
+
"@aws-sdk/credential-provider-sso": "3.587.0",
|
|
31
|
+
"@aws-sdk/credential-provider-web-identity": "3.587.0",
|
|
31
32
|
"@aws-sdk/types": "3.577.0",
|
|
32
|
-
"@smithy/credential-provider-imds": "^3.
|
|
33
|
-
"@smithy/property-provider": "^3.
|
|
34
|
-
"@smithy/shared-ini-file-loader": "^3.
|
|
33
|
+
"@smithy/credential-provider-imds": "^3.1.0",
|
|
34
|
+
"@smithy/property-provider": "^3.1.0",
|
|
35
|
+
"@smithy/shared-ini-file-loader": "^3.1.0",
|
|
35
36
|
"@smithy/types": "^3.0.0",
|
|
36
37
|
"tslib": "^2.6.2"
|
|
37
38
|
},
|
|
@@ -44,7 +45,7 @@
|
|
|
44
45
|
"typescript": "~4.9.5"
|
|
45
46
|
},
|
|
46
47
|
"peerDependencies": {
|
|
47
|
-
"@aws-sdk/client-sts": "^3.
|
|
48
|
+
"@aws-sdk/client-sts": "^3.587.0"
|
|
48
49
|
},
|
|
49
50
|
"types": "./dist-types/index.d.ts",
|
|
50
51
|
"engines": {
|
|
@@ -49,16 +49,16 @@ var remoteProvider = /* @__PURE__ */ __name(async (init) => {
|
|
|
49
49
|
var _a, _b;
|
|
50
50
|
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await Promise.resolve().then(() => __toESM(require("@smithy/credential-provider-imds")));
|
|
51
51
|
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
|
52
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
52
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
|
|
53
53
|
const { fromHttp } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-http")));
|
|
54
54
|
return (0, import_property_provider.chain)(fromHttp(init), fromContainerMetadata(init));
|
|
55
55
|
}
|
|
56
56
|
if (process.env[ENV_IMDS_DISABLED]) {
|
|
57
57
|
return async () => {
|
|
58
|
-
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled");
|
|
58
|
+
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
|
|
59
59
|
};
|
|
60
60
|
}
|
|
61
|
-
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node
|
|
61
|
+
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
|
|
62
62
|
return fromInstanceMetadata(init);
|
|
63
63
|
}, "remoteProvider");
|
|
64
64
|
|
|
@@ -68,17 +68,18 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
|
|
|
68
68
|
...init.profile || process.env[import_shared_ini_file_loader.ENV_PROFILE] ? [] : [
|
|
69
69
|
async () => {
|
|
70
70
|
var _a;
|
|
71
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
71
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
|
|
72
72
|
return (0, import_credential_provider_env.fromEnv)(init)();
|
|
73
73
|
}
|
|
74
74
|
],
|
|
75
75
|
async () => {
|
|
76
76
|
var _a;
|
|
77
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
77
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
|
|
78
78
|
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
79
79
|
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
|
80
80
|
throw new import_property_provider.CredentialsProviderError(
|
|
81
|
-
"Skipping SSO provider in default chain (inputs do not include SSO fields)."
|
|
81
|
+
"Skipping SSO provider in default chain (inputs do not include SSO fields).",
|
|
82
|
+
{ logger: init.logger }
|
|
82
83
|
);
|
|
83
84
|
}
|
|
84
85
|
const { fromSSO } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-sso")));
|
|
@@ -86,29 +87,32 @@ var defaultProvider = /* @__PURE__ */ __name((init = {}) => (0, import_property_
|
|
|
86
87
|
},
|
|
87
88
|
async () => {
|
|
88
89
|
var _a;
|
|
89
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
90
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
|
|
90
91
|
const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));
|
|
91
92
|
return fromIni(init)();
|
|
92
93
|
},
|
|
93
94
|
async () => {
|
|
94
95
|
var _a;
|
|
95
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
96
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
|
|
96
97
|
const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));
|
|
97
98
|
return fromProcess(init)();
|
|
98
99
|
},
|
|
99
100
|
async () => {
|
|
100
101
|
var _a;
|
|
101
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
102
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
|
|
102
103
|
const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));
|
|
103
104
|
return fromTokenFile(init)();
|
|
104
105
|
},
|
|
105
106
|
async () => {
|
|
106
107
|
var _a;
|
|
107
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node
|
|
108
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
|
|
108
109
|
return (await remoteProvider(init))();
|
|
109
110
|
},
|
|
110
111
|
async () => {
|
|
111
|
-
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers",
|
|
112
|
+
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", {
|
|
113
|
+
tryNextLink: false,
|
|
114
|
+
logger: init.logger
|
|
115
|
+
});
|
|
112
116
|
}
|
|
113
117
|
),
|
|
114
118
|
credentialsTreatedAsExpired,
|
|
@@ -6,34 +6,37 @@ export const defaultProvider = (init = {}) => memoize(chain(...(init.profile ||
|
|
|
6
6
|
? []
|
|
7
7
|
: [
|
|
8
8
|
async () => {
|
|
9
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
9
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
|
|
10
10
|
return fromEnv(init)();
|
|
11
11
|
},
|
|
12
12
|
]), async () => {
|
|
13
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
13
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
|
|
14
14
|
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
|
15
15
|
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
|
16
|
-
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).");
|
|
16
|
+
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
|
|
17
17
|
}
|
|
18
18
|
const { fromSSO } = await import("@aws-sdk/credential-provider-sso");
|
|
19
19
|
return fromSSO(init)();
|
|
20
20
|
}, async () => {
|
|
21
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
21
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
|
|
22
22
|
const { fromIni } = await import("@aws-sdk/credential-provider-ini");
|
|
23
23
|
return fromIni(init)();
|
|
24
24
|
}, async () => {
|
|
25
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
25
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
|
|
26
26
|
const { fromProcess } = await import("@aws-sdk/credential-provider-process");
|
|
27
27
|
return fromProcess(init)();
|
|
28
28
|
}, async () => {
|
|
29
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
29
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
|
|
30
30
|
const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity");
|
|
31
31
|
return fromTokenFile(init)();
|
|
32
32
|
}, async () => {
|
|
33
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
33
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
|
|
34
34
|
return (await remoteProvider(init))();
|
|
35
35
|
}, async () => {
|
|
36
|
-
throw new CredentialsProviderError("Could not load credentials from any providers",
|
|
36
|
+
throw new CredentialsProviderError("Could not load credentials from any providers", {
|
|
37
|
+
tryNextLink: false,
|
|
38
|
+
logger: init.logger,
|
|
39
|
+
});
|
|
37
40
|
}), credentialsTreatedAsExpired, credentialsWillNeedRefresh);
|
|
38
41
|
export const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
|
|
39
42
|
export const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;
|
|
@@ -3,15 +3,15 @@ export const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
|
3
3
|
export const remoteProvider = async (init) => {
|
|
4
4
|
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
|
|
5
5
|
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
|
6
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
6
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
|
|
7
7
|
const { fromHttp } = await import("@aws-sdk/credential-provider-http");
|
|
8
8
|
return chain(fromHttp(init), fromContainerMetadata(init));
|
|
9
9
|
}
|
|
10
10
|
if (process.env[ENV_IMDS_DISABLED]) {
|
|
11
11
|
return async () => {
|
|
12
|
-
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled");
|
|
12
|
+
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
|
|
13
13
|
};
|
|
14
14
|
}
|
|
15
|
-
init.logger?.debug("@aws-sdk/credential-provider-node
|
|
15
|
+
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
|
|
16
16
|
return fromInstanceMetadata(init);
|
|
17
17
|
};
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
|
1
2
|
import type { FromIniInit } from "@aws-sdk/credential-provider-ini";
|
|
2
3
|
import type { FromProcessInit } from "@aws-sdk/credential-provider-process";
|
|
3
4
|
import type { FromSSOInit, SsoCredentialsParameters } from "@aws-sdk/credential-provider-sso";
|
|
@@ -7,7 +8,7 @@ import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
|
|
|
7
8
|
/**
|
|
8
9
|
* @public
|
|
9
10
|
*/
|
|
10
|
-
export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
|
|
11
|
+
export type DefaultProviderInit = FromIniInit & FromHttpOptions & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
|
|
11
12
|
/**
|
|
12
13
|
* Creates a credential provider that will attempt to find credentials from the
|
|
13
14
|
* following sources (listed in order of precedence):
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
|
1
2
|
import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
|
2
3
|
import type { AwsCredentialIdentityProvider } from "@smithy/types";
|
|
3
4
|
/**
|
|
@@ -7,4 +8,4 @@ export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
|
7
8
|
/**
|
|
8
9
|
* @internal
|
|
9
10
|
*/
|
|
10
|
-
export declare const remoteProvider: (init: RemoteProviderInit) => Promise<AwsCredentialIdentityProvider>;
|
|
11
|
+
export declare const remoteProvider: (init: RemoteProviderInit | FromHttpOptions) => Promise<AwsCredentialIdentityProvider>;
|
package/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/defaultProvider.d.ts
CHANGED
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
|
1
2
|
import { FromIniInit } from "@aws-sdk/credential-provider-ini";
|
|
2
3
|
import { FromProcessInit } from "@aws-sdk/credential-provider-process";
|
|
3
4
|
import {
|
|
@@ -8,6 +9,7 @@ import { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
|
|
|
8
9
|
import { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
|
9
10
|
import { AwsCredentialIdentity, MemoizedProvider } from "@smithy/types";
|
|
10
11
|
export type DefaultProviderInit = FromIniInit &
|
|
12
|
+
FromHttpOptions &
|
|
11
13
|
RemoteProviderInit &
|
|
12
14
|
FromProcessInit &
|
|
13
15
|
(FromSSOInit & Partial<SsoCredentialsParameters>) &
|
|
@@ -1,6 +1,7 @@
|
|
|
1
|
+
import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
|
1
2
|
import { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
|
2
3
|
import { AwsCredentialIdentityProvider } from "@smithy/types";
|
|
3
4
|
export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
|
4
5
|
export declare const remoteProvider: (
|
|
5
|
-
init: RemoteProviderInit
|
|
6
|
+
init: RemoteProviderInit | FromHttpOptions
|
|
6
7
|
) => Promise<AwsCredentialIdentityProvider>;
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-provider-node",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.587.0",
|
|
4
4
|
"description": "AWS credential provider that sources credentials from a Node.JS environment. ",
|
|
5
5
|
"engines": {
|
|
6
6
|
"node": ">=16.0.0"
|
|
@@ -28,16 +28,16 @@
|
|
|
28
28
|
},
|
|
29
29
|
"license": "Apache-2.0",
|
|
30
30
|
"dependencies": {
|
|
31
|
-
"@aws-sdk/credential-provider-env": "3.
|
|
32
|
-
"@aws-sdk/credential-provider-http": "3.
|
|
33
|
-
"@aws-sdk/credential-provider-ini": "3.
|
|
34
|
-
"@aws-sdk/credential-provider-process": "3.
|
|
35
|
-
"@aws-sdk/credential-provider-sso": "3.
|
|
36
|
-
"@aws-sdk/credential-provider-web-identity": "3.
|
|
31
|
+
"@aws-sdk/credential-provider-env": "3.587.0",
|
|
32
|
+
"@aws-sdk/credential-provider-http": "3.587.0",
|
|
33
|
+
"@aws-sdk/credential-provider-ini": "3.587.0",
|
|
34
|
+
"@aws-sdk/credential-provider-process": "3.587.0",
|
|
35
|
+
"@aws-sdk/credential-provider-sso": "3.587.0",
|
|
36
|
+
"@aws-sdk/credential-provider-web-identity": "3.587.0",
|
|
37
37
|
"@aws-sdk/types": "3.577.0",
|
|
38
|
-
"@smithy/credential-provider-imds": "^3.
|
|
39
|
-
"@smithy/property-provider": "^3.
|
|
40
|
-
"@smithy/shared-ini-file-loader": "^3.
|
|
38
|
+
"@smithy/credential-provider-imds": "^3.1.0",
|
|
39
|
+
"@smithy/property-provider": "^3.1.0",
|
|
40
|
+
"@smithy/shared-ini-file-loader": "^3.1.0",
|
|
41
41
|
"@smithy/types": "^3.0.0",
|
|
42
42
|
"tslib": "^2.6.2"
|
|
43
43
|
},
|
|
@@ -58,7 +58,7 @@ var getValidatedProcessCredentials = /* @__PURE__ */ __name((profileName, data)
|
|
|
58
58
|
}, "getValidatedProcessCredentials");
|
|
59
59
|
|
|
60
60
|
// src/resolveProcessCredentials.ts
|
|
61
|
-
var resolveProcessCredentials = /* @__PURE__ */ __name(async (profileName, profiles) => {
|
|
61
|
+
var resolveProcessCredentials = /* @__PURE__ */ __name(async (profileName, profiles, logger) => {
|
|
62
62
|
const profile = profiles[profileName];
|
|
63
63
|
if (profiles[profileName]) {
|
|
64
64
|
const credentialProcess = profile["credential_process"];
|
|
@@ -74,22 +74,24 @@ var resolveProcessCredentials = /* @__PURE__ */ __name(async (profileName, profi
|
|
|
74
74
|
}
|
|
75
75
|
return getValidatedProcessCredentials(profileName, data);
|
|
76
76
|
} catch (error) {
|
|
77
|
-
throw new import_property_provider.CredentialsProviderError(error.message);
|
|
77
|
+
throw new import_property_provider.CredentialsProviderError(error.message, { logger });
|
|
78
78
|
}
|
|
79
79
|
} else {
|
|
80
|
-
throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} did not contain credential_process
|
|
80
|
+
throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });
|
|
81
81
|
}
|
|
82
82
|
} else {
|
|
83
|
-
throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file
|
|
83
|
+
throw new import_property_provider.CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {
|
|
84
|
+
logger
|
|
85
|
+
});
|
|
84
86
|
}
|
|
85
87
|
}, "resolveProcessCredentials");
|
|
86
88
|
|
|
87
89
|
// src/fromProcess.ts
|
|
88
90
|
var fromProcess = /* @__PURE__ */ __name((init = {}) => async () => {
|
|
89
91
|
var _a;
|
|
90
|
-
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-process
|
|
92
|
+
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-process - fromProcess");
|
|
91
93
|
const profiles = await (0, import_shared_ini_file_loader.parseKnownFiles)(init);
|
|
92
|
-
return resolveProcessCredentials((0, import_shared_ini_file_loader.getProfileName)(init), profiles);
|
|
94
|
+
return resolveProcessCredentials((0, import_shared_ini_file_loader.getProfileName)(init), profiles, init.logger);
|
|
93
95
|
}, "fromProcess");
|
|
94
96
|
// Annotate the CommonJS export names for ESM import in node:
|
|
95
97
|
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { getProfileName, parseKnownFiles } from "@smithy/shared-ini-file-loader";
|
|
2
2
|
import { resolveProcessCredentials } from "./resolveProcessCredentials";
|
|
3
3
|
export const fromProcess = (init = {}) => async () => {
|
|
4
|
-
init.logger?.debug("@aws-sdk/credential-provider-process
|
|
4
|
+
init.logger?.debug("@aws-sdk/credential-provider-process - fromProcess");
|
|
5
5
|
const profiles = await parseKnownFiles(init);
|
|
6
|
-
return resolveProcessCredentials(getProfileName(init), profiles);
|
|
6
|
+
return resolveProcessCredentials(getProfileName(init), profiles, init.logger);
|
|
7
7
|
};
|
package/node_modules/@aws-sdk/credential-provider-process/dist-es/resolveProcessCredentials.js
CHANGED
|
@@ -2,7 +2,7 @@ import { CredentialsProviderError } from "@smithy/property-provider";
|
|
|
2
2
|
import { exec } from "child_process";
|
|
3
3
|
import { promisify } from "util";
|
|
4
4
|
import { getValidatedProcessCredentials } from "./getValidatedProcessCredentials";
|
|
5
|
-
export const resolveProcessCredentials = async (profileName, profiles) => {
|
|
5
|
+
export const resolveProcessCredentials = async (profileName, profiles, logger) => {
|
|
6
6
|
const profile = profiles[profileName];
|
|
7
7
|
if (profiles[profileName]) {
|
|
8
8
|
const credentialProcess = profile["credential_process"];
|
|
@@ -20,14 +20,16 @@ export const resolveProcessCredentials = async (profileName, profiles) => {
|
|
|
20
20
|
return getValidatedProcessCredentials(profileName, data);
|
|
21
21
|
}
|
|
22
22
|
catch (error) {
|
|
23
|
-
throw new CredentialsProviderError(error.message);
|
|
23
|
+
throw new CredentialsProviderError(error.message, { logger });
|
|
24
24
|
}
|
|
25
25
|
}
|
|
26
26
|
else {
|
|
27
|
-
throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process
|
|
27
|
+
throw new CredentialsProviderError(`Profile ${profileName} did not contain credential_process.`, { logger });
|
|
28
28
|
}
|
|
29
29
|
}
|
|
30
30
|
else {
|
|
31
|
-
throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file
|
|
31
|
+
throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`, {
|
|
32
|
+
logger,
|
|
33
|
+
});
|
|
32
34
|
}
|
|
33
35
|
};
|
package/node_modules/@aws-sdk/credential-provider-process/dist-types/resolveProcessCredentials.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
import { AwsCredentialIdentity, ParsedIniData } from "@smithy/types";
|
|
1
|
+
import { AwsCredentialIdentity, Logger, ParsedIniData } from "@smithy/types";
|
|
2
2
|
/**
|
|
3
3
|
* @internal
|
|
4
4
|
*/
|
|
5
|
-
export declare const resolveProcessCredentials: (profileName: string, profiles: ParsedIniData) => Promise<AwsCredentialIdentity>;
|
|
5
|
+
export declare const resolveProcessCredentials: (profileName: string, profiles: ParsedIniData, logger?: Logger) => Promise<AwsCredentialIdentity>;
|
|
@@ -1,5 +1,6 @@
|
|
|
1
|
-
import { AwsCredentialIdentity, ParsedIniData } from "@smithy/types";
|
|
1
|
+
import { AwsCredentialIdentity, Logger, ParsedIniData } from "@smithy/types";
|
|
2
2
|
export declare const resolveProcessCredentials: (
|
|
3
3
|
profileName: string,
|
|
4
|
-
profiles: ParsedIniData
|
|
4
|
+
profiles: ParsedIniData,
|
|
5
|
+
logger?: Logger
|
|
5
6
|
) => Promise<AwsCredentialIdentity>;
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/credential-provider-process",
|
|
3
|
-
"version": "3.
|
|
3
|
+
"version": "3.587.0",
|
|
4
4
|
"description": "AWS credential provider that sources credential_process from ~/.aws/credentials and ~/.aws/config",
|
|
5
5
|
"main": "./dist-cjs/index.js",
|
|
6
6
|
"module": "./dist-es/index.js",
|
|
@@ -25,8 +25,8 @@
|
|
|
25
25
|
"license": "Apache-2.0",
|
|
26
26
|
"dependencies": {
|
|
27
27
|
"@aws-sdk/types": "3.577.0",
|
|
28
|
-
"@smithy/property-provider": "^3.
|
|
29
|
-
"@smithy/shared-ini-file-loader": "^3.
|
|
28
|
+
"@smithy/property-provider": "^3.1.0",
|
|
29
|
+
"@smithy/shared-ini-file-loader": "^3.1.0",
|
|
30
30
|
"@smithy/types": "^3.0.0",
|
|
31
31
|
"tslib": "^2.6.2"
|
|
32
32
|
},
|