@aws-sdk/credential-provider-imds
Advanced tools
Comparing version 3.54.1 to 3.55.0
@@ -6,2 +6,10 @@ # Change Log | ||
# [3.55.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.54.1...v3.55.0) (2022-03-21) | ||
**Note:** Version bump only for package @aws-sdk/credential-provider-imds | ||
## [3.54.1](https://github.com/aws/aws-sdk-js-v3/compare/v3.54.0...v3.54.1) (2022-03-15) | ||
@@ -8,0 +16,0 @@ |
@@ -14,10 +14,10 @@ "use strict"; | ||
const fromContainerMetadata = (init = {}) => { | ||
const { timeout, maxRetries } = RemoteProviderInit_1.providerConfigFromInit(init); | ||
return () => retry_1.retry(async () => { | ||
const { timeout, maxRetries } = (0, RemoteProviderInit_1.providerConfigFromInit)(init); | ||
return () => (0, retry_1.retry)(async () => { | ||
const requestOptions = await getCmdsUri(); | ||
const credsResponse = JSON.parse(await requestFromEcsImds(timeout, requestOptions)); | ||
if (!ImdsCredentials_1.isImdsCredentials(credsResponse)) { | ||
if (!(0, ImdsCredentials_1.isImdsCredentials)(credsResponse)) { | ||
throw new property_provider_1.CredentialsProviderError("Invalid response received from instance metadata service."); | ||
} | ||
return ImdsCredentials_1.fromImdsCredentials(credsResponse); | ||
return (0, ImdsCredentials_1.fromImdsCredentials)(credsResponse); | ||
}, maxRetries); | ||
@@ -33,3 +33,3 @@ }; | ||
} | ||
const buffer = await httpRequest_1.httpRequest({ | ||
const buffer = await (0, httpRequest_1.httpRequest)({ | ||
...options, | ||
@@ -57,3 +57,3 @@ timeout, | ||
if (process.env[exports.ENV_CMDS_FULL_URI]) { | ||
const parsed = url_1.parse(process.env[exports.ENV_CMDS_FULL_URI]); | ||
const parsed = (0, url_1.parse)(process.env[exports.ENV_CMDS_FULL_URI]); | ||
if (!parsed.hostname || !(parsed.hostname in GREENGRASS_HOSTS)) { | ||
@@ -60,0 +60,0 @@ throw new property_provider_1.CredentialsProviderError(`${parsed.hostname} is not a valid container metadata service hostname`, false); |
@@ -13,9 +13,9 @@ "use strict"; | ||
const IMDS_TOKEN_PATH = "/latest/api/token"; | ||
const fromInstanceMetadata = (init = {}) => staticStabilityProvider_1.staticStabilityProvider(getInstanceImdsProvider(init), { logger: init.logger }); | ||
const fromInstanceMetadata = (init = {}) => (0, staticStabilityProvider_1.staticStabilityProvider)(getInstanceImdsProvider(init), { logger: init.logger }); | ||
exports.fromInstanceMetadata = fromInstanceMetadata; | ||
const getInstanceImdsProvider = (init) => { | ||
let disableFetchToken = false; | ||
const { timeout, maxRetries } = RemoteProviderInit_1.providerConfigFromInit(init); | ||
const { timeout, maxRetries } = (0, RemoteProviderInit_1.providerConfigFromInit)(init); | ||
const getCredentials = async (maxRetries, options) => { | ||
const profile = (await retry_1.retry(async () => { | ||
const profile = (await (0, retry_1.retry)(async () => { | ||
let profile; | ||
@@ -33,3 +33,3 @@ try { | ||
}, maxRetries)).trim(); | ||
return retry_1.retry(async () => { | ||
return (0, retry_1.retry)(async () => { | ||
let creds; | ||
@@ -49,3 +49,3 @@ try { | ||
return async () => { | ||
const endpoint = await getInstanceMetadataEndpoint_1.getInstanceMetadataEndpoint(); | ||
const endpoint = await (0, getInstanceMetadataEndpoint_1.getInstanceMetadataEndpoint)(); | ||
if (disableFetchToken) { | ||
@@ -80,3 +80,3 @@ return getCredentials(maxRetries, { ...endpoint, timeout }); | ||
}; | ||
const getMetadataToken = async (options) => httpRequest_1.httpRequest({ | ||
const getMetadataToken = async (options) => (0, httpRequest_1.httpRequest)({ | ||
...options, | ||
@@ -89,12 +89,12 @@ path: IMDS_TOKEN_PATH, | ||
}); | ||
const getProfile = async (options) => (await httpRequest_1.httpRequest({ ...options, path: IMDS_PATH })).toString(); | ||
const getProfile = async (options) => (await (0, httpRequest_1.httpRequest)({ ...options, path: IMDS_PATH })).toString(); | ||
const getCredentialsFromProfile = async (profile, options) => { | ||
const credsResponse = JSON.parse((await httpRequest_1.httpRequest({ | ||
const credsResponse = JSON.parse((await (0, httpRequest_1.httpRequest)({ | ||
...options, | ||
path: IMDS_PATH + profile, | ||
})).toString()); | ||
if (!ImdsCredentials_1.isImdsCredentials(credsResponse)) { | ||
if (!(0, ImdsCredentials_1.isImdsCredentials)(credsResponse)) { | ||
throw new property_provider_1.CredentialsProviderError("Invalid response received from instance metadata service."); | ||
} | ||
return ImdsCredentials_1.fromImdsCredentials(credsResponse); | ||
return (0, ImdsCredentials_1.fromImdsCredentials)(credsResponse); | ||
}; |
@@ -10,3 +10,3 @@ "use strict"; | ||
var _a; | ||
const req = http_1.request({ | ||
const req = (0, http_1.request)({ | ||
method: "GET", | ||
@@ -13,0 +13,0 @@ ...options, |
@@ -10,7 +10,7 @@ "use strict"; | ||
const EndpointModeConfigOptions_1 = require("../config/EndpointModeConfigOptions"); | ||
const getInstanceMetadataEndpoint = async () => url_parser_1.parseUrl((await getFromEndpointConfig()) || (await getFromEndpointModeConfig())); | ||
const getInstanceMetadataEndpoint = async () => (0, url_parser_1.parseUrl)((await getFromEndpointConfig()) || (await getFromEndpointModeConfig())); | ||
exports.getInstanceMetadataEndpoint = getInstanceMetadataEndpoint; | ||
const getFromEndpointConfig = async () => node_config_provider_1.loadConfig(EndpointConfigOptions_1.ENDPOINT_CONFIG_OPTIONS)(); | ||
const getFromEndpointConfig = async () => (0, node_config_provider_1.loadConfig)(EndpointConfigOptions_1.ENDPOINT_CONFIG_OPTIONS)(); | ||
const getFromEndpointModeConfig = async () => { | ||
const endpointMode = await node_config_provider_1.loadConfig(EndpointModeConfigOptions_1.ENDPOINT_MODE_CONFIG_OPTIONS)(); | ||
const endpointMode = await (0, node_config_provider_1.loadConfig)(EndpointModeConfigOptions_1.ENDPOINT_MODE_CONFIG_OPTIONS)(); | ||
switch (endpointMode) { | ||
@@ -17,0 +17,0 @@ case EndpointMode_1.EndpointMode.IPv4: |
@@ -13,3 +13,3 @@ "use strict"; | ||
if (credentials.expiration && credentials.expiration.getTime() < Date.now()) { | ||
credentials = getExtendedInstanceMetadataCredentials_1.getExtendedInstanceMetadataCredentials(credentials, logger); | ||
credentials = (0, getExtendedInstanceMetadataCredentials_1.getExtendedInstanceMetadataCredentials)(credentials, logger); | ||
} | ||
@@ -20,3 +20,3 @@ } | ||
logger.warn("Credential renew failed: ", e); | ||
credentials = getExtendedInstanceMetadataCredentials_1.getExtendedInstanceMetadataCredentials(pastCredentials, logger); | ||
credentials = (0, getExtendedInstanceMetadataCredentials_1.getExtendedInstanceMetadataCredentials)(pastCredentials, logger); | ||
} | ||
@@ -23,0 +23,0 @@ else { |
@@ -71,6 +71,6 @@ import { __assign, __awaiter, __generator } from "tslib"; | ||
if (!parsed.hostname || !(parsed.hostname in GREENGRASS_HOSTS)) { | ||
throw new CredentialsProviderError(parsed.hostname + " is not a valid container metadata service hostname", false); | ||
throw new CredentialsProviderError("".concat(parsed.hostname, " is not a valid container metadata service hostname"), false); | ||
} | ||
if (!parsed.protocol || !(parsed.protocol in GREENGRASS_PROTOCOLS)) { | ||
throw new CredentialsProviderError(parsed.protocol + " is not a valid container metadata service protocol", false); | ||
throw new CredentialsProviderError("".concat(parsed.protocol, " is not a valid container metadata service protocol"), false); | ||
} | ||
@@ -80,5 +80,5 @@ return [2, __assign(__assign({}, parsed), { port: parsed.port ? parseInt(parsed.port, 10) : undefined })]; | ||
throw new CredentialsProviderError("The container metadata credential provider cannot be used unless" + | ||
(" the " + ENV_CMDS_RELATIVE_URI + " or " + ENV_CMDS_FULL_URI + " environment") + | ||
" the ".concat(ENV_CMDS_RELATIVE_URI, " or ").concat(ENV_CMDS_FULL_URI, " environment") + | ||
" variable is set", false); | ||
}); | ||
}); }; |
@@ -39,3 +39,3 @@ import { __awaiter, __generator } from "tslib"; | ||
default: | ||
throw new Error("Unsupported endpoint mode: " + endpointMode + "." + (" Select from " + Object.values(EndpointMode))); | ||
throw new Error("Unsupported endpoint mode: ".concat(endpointMode, ".") + " Select from ".concat(Object.values(EndpointMode))); | ||
} | ||
@@ -42,0 +42,0 @@ return [2]; |
{ | ||
"name": "@aws-sdk/credential-provider-imds", | ||
"version": "3.54.1", | ||
"version": "3.55.0", | ||
"description": "AWS credential provider that sources credentials from the EC2 instance metadata service and ECS container metadata service", | ||
@@ -26,7 +26,7 @@ "main": "./dist-cjs/index.js", | ||
"dependencies": { | ||
"@aws-sdk/node-config-provider": "3.54.1", | ||
"@aws-sdk/property-provider": "3.54.1", | ||
"@aws-sdk/types": "3.54.1", | ||
"@aws-sdk/url-parser": "3.54.1", | ||
"tslib": "^2.3.0" | ||
"@aws-sdk/node-config-provider": "3.55.0", | ||
"@aws-sdk/property-provider": "3.55.0", | ||
"@aws-sdk/types": "3.55.0", | ||
"@aws-sdk/url-parser": "3.55.0", | ||
"tslib": "^2.3.1" | ||
}, | ||
@@ -41,3 +41,3 @@ "devDependencies": { | ||
"typedoc": "0.19.2", | ||
"typescript": "~4.3.5" | ||
"typescript": "~4.6.2" | ||
}, | ||
@@ -44,0 +44,0 @@ "types": "./dist-types/index.d.ts", |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
92541
+ Added@aws-sdk/node-config-provider@3.55.0(transitive)
+ Added@aws-sdk/property-provider@3.55.0(transitive)
+ Added@aws-sdk/querystring-parser@3.55.0(transitive)
+ Added@aws-sdk/shared-ini-file-loader@3.55.0(transitive)
+ Added@aws-sdk/types@3.55.0(transitive)
+ Added@aws-sdk/url-parser@3.55.0(transitive)
- Removed@aws-sdk/node-config-provider@3.54.1(transitive)
- Removed@aws-sdk/property-provider@3.54.1(transitive)
- Removed@aws-sdk/querystring-parser@3.54.1(transitive)
- Removed@aws-sdk/shared-ini-file-loader@3.54.1(transitive)
- Removed@aws-sdk/types@3.54.1(transitive)
- Removed@aws-sdk/url-parser@3.54.1(transitive)
Updated@aws-sdk/types@3.55.0
Updated@aws-sdk/url-parser@3.55.0
Updatedtslib@^2.3.1