insomnia-plugin-aws-amplify 2.0.0 → 2.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/README.md +37 -0
  2. package/app.js +55464 -25171
  3. package/package.json +12 -11
package/README.md CHANGED
@@ -5,11 +5,48 @@
5
5
  [Insomnia](https://insomnia.rest) plugin for signing in via AWS Amplify
6
6
 
7
7
  **Key Features**
8
+
8
9
  - Environment configuration GUI to input Amplify credentials.
9
10
  - Automatic token caching and flexible expiry options.
10
11
  - Customisable return properties (Access Token, ID Token, User ID, Auth ID).
11
12
  - Multiple user pool support across environments.
13
+ - Two authentication methods: AWS Amplify with USER_SRP_AUTH or Cognito Identity Provider with ADMIN_USER_PASSWORD_AUTH
12
14
 
13
15
  ## Installation
16
+
14
17
  1. Open Insomnia and go to plugin settings.
15
18
  2. Add `insomnia-plugin-aws-amplify`.
19
+
20
+ ## Usage
21
+
22
+ ### AWS Amplify Provider (Default)
23
+
24
+ Uses client-side authentication flow. No AWS credentials required.
25
+
26
+ **Required fields:**
27
+
28
+ - username
29
+ - password
30
+ - region (e.g., `us-east-1`)
31
+ - userPoolId (e.g., `us-east-1_XXXXXXXXX`)
32
+ - clientId
33
+
34
+ ### Cognito Identity Provider
35
+
36
+ Uses server-side AdminInitiateAuth flow. Retrieves AWS credentials from your local AWS CLI configuration.
37
+
38
+ **Required fields:**
39
+
40
+ - username
41
+ - password
42
+ - region (e.g., `us-east-1`)
43
+ - userPoolId (e.g., `us-east-1_XXXXXXXXX`)
44
+ - clientId
45
+ - **awsProfile**: AWS profile name (e.g., `staging`) - only shown when "Cognito Identity Provider" is selected
46
+
47
+ **Notes**:
48
+
49
+ - The plugin uses the AWS CLI to retrieve credentials, so you must have:
50
+ 1. AWS CLI installed and configured
51
+ 2. Valid SSO session (run `aws sso login --profile <profile-name>`)
52
+ - Your AWS profile/role must have permission to call `cognito-idp:AdminInitiateAuth`: