Socket
Socket
Sign inDemoInstall

@aws-sdk/credential-provider-imds

Package Overview
Dependencies
Maintainers
4
Versions
140
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-sdk/credential-provider-imds - npm Package Compare versions

Comparing version 3.54.1 to 3.55.0

8

CHANGELOG.md

@@ -6,2 +6,10 @@ # Change Log

# [3.55.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.54.1...v3.55.0) (2022-03-21)
**Note:** Version bump only for package @aws-sdk/credential-provider-imds
## [3.54.1](https://github.com/aws/aws-sdk-js-v3/compare/v3.54.0...v3.54.1) (2022-03-15)

@@ -8,0 +16,0 @@

12

dist-cjs/fromContainerMetadata.js

@@ -14,10 +14,10 @@ "use strict";

const fromContainerMetadata = (init = {}) => {
const { timeout, maxRetries } = RemoteProviderInit_1.providerConfigFromInit(init);
return () => retry_1.retry(async () => {
const { timeout, maxRetries } = (0, RemoteProviderInit_1.providerConfigFromInit)(init);
return () => (0, retry_1.retry)(async () => {
const requestOptions = await getCmdsUri();
const credsResponse = JSON.parse(await requestFromEcsImds(timeout, requestOptions));
if (!ImdsCredentials_1.isImdsCredentials(credsResponse)) {
if (!(0, ImdsCredentials_1.isImdsCredentials)(credsResponse)) {
throw new property_provider_1.CredentialsProviderError("Invalid response received from instance metadata service.");
}
return ImdsCredentials_1.fromImdsCredentials(credsResponse);
return (0, ImdsCredentials_1.fromImdsCredentials)(credsResponse);
}, maxRetries);

@@ -33,3 +33,3 @@ };

}
const buffer = await httpRequest_1.httpRequest({
const buffer = await (0, httpRequest_1.httpRequest)({
...options,

@@ -57,3 +57,3 @@ timeout,

if (process.env[exports.ENV_CMDS_FULL_URI]) {
const parsed = url_1.parse(process.env[exports.ENV_CMDS_FULL_URI]);
const parsed = (0, url_1.parse)(process.env[exports.ENV_CMDS_FULL_URI]);
if (!parsed.hostname || !(parsed.hostname in GREENGRASS_HOSTS)) {

@@ -60,0 +60,0 @@ throw new property_provider_1.CredentialsProviderError(`${parsed.hostname} is not a valid container metadata service hostname`, false);

@@ -13,9 +13,9 @@ "use strict";

const IMDS_TOKEN_PATH = "/latest/api/token";
const fromInstanceMetadata = (init = {}) => staticStabilityProvider_1.staticStabilityProvider(getInstanceImdsProvider(init), { logger: init.logger });
const fromInstanceMetadata = (init = {}) => (0, staticStabilityProvider_1.staticStabilityProvider)(getInstanceImdsProvider(init), { logger: init.logger });
exports.fromInstanceMetadata = fromInstanceMetadata;
const getInstanceImdsProvider = (init) => {
let disableFetchToken = false;
const { timeout, maxRetries } = RemoteProviderInit_1.providerConfigFromInit(init);
const { timeout, maxRetries } = (0, RemoteProviderInit_1.providerConfigFromInit)(init);
const getCredentials = async (maxRetries, options) => {
const profile = (await retry_1.retry(async () => {
const profile = (await (0, retry_1.retry)(async () => {
let profile;

@@ -33,3 +33,3 @@ try {

}, maxRetries)).trim();
return retry_1.retry(async () => {
return (0, retry_1.retry)(async () => {
let creds;

@@ -49,3 +49,3 @@ try {

return async () => {
const endpoint = await getInstanceMetadataEndpoint_1.getInstanceMetadataEndpoint();
const endpoint = await (0, getInstanceMetadataEndpoint_1.getInstanceMetadataEndpoint)();
if (disableFetchToken) {

@@ -80,3 +80,3 @@ return getCredentials(maxRetries, { ...endpoint, timeout });

};
const getMetadataToken = async (options) => httpRequest_1.httpRequest({
const getMetadataToken = async (options) => (0, httpRequest_1.httpRequest)({
...options,

@@ -89,12 +89,12 @@ path: IMDS_TOKEN_PATH,

});
const getProfile = async (options) => (await httpRequest_1.httpRequest({ ...options, path: IMDS_PATH })).toString();
const getProfile = async (options) => (await (0, httpRequest_1.httpRequest)({ ...options, path: IMDS_PATH })).toString();
const getCredentialsFromProfile = async (profile, options) => {
const credsResponse = JSON.parse((await httpRequest_1.httpRequest({
const credsResponse = JSON.parse((await (0, httpRequest_1.httpRequest)({
...options,
path: IMDS_PATH + profile,
})).toString());
if (!ImdsCredentials_1.isImdsCredentials(credsResponse)) {
if (!(0, ImdsCredentials_1.isImdsCredentials)(credsResponse)) {
throw new property_provider_1.CredentialsProviderError("Invalid response received from instance metadata service.");
}
return ImdsCredentials_1.fromImdsCredentials(credsResponse);
return (0, ImdsCredentials_1.fromImdsCredentials)(credsResponse);
};

@@ -10,3 +10,3 @@ "use strict";

var _a;
const req = http_1.request({
const req = (0, http_1.request)({
method: "GET",

@@ -13,0 +13,0 @@ ...options,

@@ -10,7 +10,7 @@ "use strict";

const EndpointModeConfigOptions_1 = require("../config/EndpointModeConfigOptions");
const getInstanceMetadataEndpoint = async () => url_parser_1.parseUrl((await getFromEndpointConfig()) || (await getFromEndpointModeConfig()));
const getInstanceMetadataEndpoint = async () => (0, url_parser_1.parseUrl)((await getFromEndpointConfig()) || (await getFromEndpointModeConfig()));
exports.getInstanceMetadataEndpoint = getInstanceMetadataEndpoint;
const getFromEndpointConfig = async () => node_config_provider_1.loadConfig(EndpointConfigOptions_1.ENDPOINT_CONFIG_OPTIONS)();
const getFromEndpointConfig = async () => (0, node_config_provider_1.loadConfig)(EndpointConfigOptions_1.ENDPOINT_CONFIG_OPTIONS)();
const getFromEndpointModeConfig = async () => {
const endpointMode = await node_config_provider_1.loadConfig(EndpointModeConfigOptions_1.ENDPOINT_MODE_CONFIG_OPTIONS)();
const endpointMode = await (0, node_config_provider_1.loadConfig)(EndpointModeConfigOptions_1.ENDPOINT_MODE_CONFIG_OPTIONS)();
switch (endpointMode) {

@@ -17,0 +17,0 @@ case EndpointMode_1.EndpointMode.IPv4:

@@ -13,3 +13,3 @@ "use strict";

if (credentials.expiration && credentials.expiration.getTime() < Date.now()) {
credentials = getExtendedInstanceMetadataCredentials_1.getExtendedInstanceMetadataCredentials(credentials, logger);
credentials = (0, getExtendedInstanceMetadataCredentials_1.getExtendedInstanceMetadataCredentials)(credentials, logger);
}

@@ -20,3 +20,3 @@ }

logger.warn("Credential renew failed: ", e);
credentials = getExtendedInstanceMetadataCredentials_1.getExtendedInstanceMetadataCredentials(pastCredentials, logger);
credentials = (0, getExtendedInstanceMetadataCredentials_1.getExtendedInstanceMetadataCredentials)(pastCredentials, logger);
}

@@ -23,0 +23,0 @@ else {

@@ -71,6 +71,6 @@ import { __assign, __awaiter, __generator } from "tslib";

if (!parsed.hostname || !(parsed.hostname in GREENGRASS_HOSTS)) {
throw new CredentialsProviderError(parsed.hostname + " is not a valid container metadata service hostname", false);
throw new CredentialsProviderError("".concat(parsed.hostname, " is not a valid container metadata service hostname"), false);
}
if (!parsed.protocol || !(parsed.protocol in GREENGRASS_PROTOCOLS)) {
throw new CredentialsProviderError(parsed.protocol + " is not a valid container metadata service protocol", false);
throw new CredentialsProviderError("".concat(parsed.protocol, " is not a valid container metadata service protocol"), false);
}

@@ -80,5 +80,5 @@ return [2, __assign(__assign({}, parsed), { port: parsed.port ? parseInt(parsed.port, 10) : undefined })];

throw new CredentialsProviderError("The container metadata credential provider cannot be used unless" +
(" the " + ENV_CMDS_RELATIVE_URI + " or " + ENV_CMDS_FULL_URI + " environment") +
" the ".concat(ENV_CMDS_RELATIVE_URI, " or ").concat(ENV_CMDS_FULL_URI, " environment") +
" variable is set", false);
});
}); };

@@ -39,3 +39,3 @@ import { __awaiter, __generator } from "tslib";

default:
throw new Error("Unsupported endpoint mode: " + endpointMode + "." + (" Select from " + Object.values(EndpointMode)));
throw new Error("Unsupported endpoint mode: ".concat(endpointMode, ".") + " Select from ".concat(Object.values(EndpointMode)));
}

@@ -42,0 +42,0 @@ return [2];

{
"name": "@aws-sdk/credential-provider-imds",
"version": "3.54.1",
"version": "3.55.0",
"description": "AWS credential provider that sources credentials from the EC2 instance metadata service and ECS container metadata service",

@@ -26,7 +26,7 @@ "main": "./dist-cjs/index.js",

"dependencies": {
"@aws-sdk/node-config-provider": "3.54.1",
"@aws-sdk/property-provider": "3.54.1",
"@aws-sdk/types": "3.54.1",
"@aws-sdk/url-parser": "3.54.1",
"tslib": "^2.3.0"
"@aws-sdk/node-config-provider": "3.55.0",
"@aws-sdk/property-provider": "3.55.0",
"@aws-sdk/types": "3.55.0",
"@aws-sdk/url-parser": "3.55.0",
"tslib": "^2.3.1"
},

@@ -41,3 +41,3 @@ "devDependencies": {

"typedoc": "0.19.2",
"typescript": "~4.3.5"
"typescript": "~4.6.2"
},

@@ -44,0 +44,0 @@ "types": "./dist-types/index.d.ts",

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc