Socket
Socket
Sign inDemoInstall

@aws-sdk/credential-provider-node

Package Overview
Dependencies
Maintainers
5
Versions
360
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-sdk/credential-provider-node - npm Package Compare versions

Comparing version 3.583.0 to 3.587.0

26

dist-cjs/index.js

@@ -52,3 +52,3 @@ "use strict";

if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata");
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
const { fromHttp } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-http")));

@@ -59,6 +59,6 @@ return (0, import_property_provider.chain)(fromHttp(init), fromContainerMetadata(init));

return async () => {
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled");
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
};
}
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
return fromInstanceMetadata(init);

@@ -73,3 +73,3 @@ }, "remoteProvider");

var _a;
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
return (0, import_credential_provider_env.fromEnv)(init)();

@@ -80,7 +80,8 @@ }

var _a;
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
throw new import_property_provider.CredentialsProviderError(
"Skipping SSO provider in default chain (inputs do not include SSO fields)."
"Skipping SSO provider in default chain (inputs do not include SSO fields).",
{ logger: init.logger }
);

@@ -93,3 +94,3 @@ }

var _a;
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini")));

@@ -100,3 +101,3 @@ return fromIni(init)();

var _a;
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process")));

@@ -107,3 +108,3 @@ return fromProcess(init)();

var _a;
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity")));

@@ -114,7 +115,10 @@ return fromTokenFile(init)();

var _a;
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
return (await remoteProvider(init))();
},
async () => {
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", false);
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", {
tryNextLink: false,
logger: init.logger
});
}

@@ -121,0 +125,0 @@ ),

@@ -9,10 +9,10 @@ import { fromEnv } from "@aws-sdk/credential-provider-env";

async () => {
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv");
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
return fromEnv(init)();
},
]), async () => {
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO");
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).");
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
}

@@ -22,20 +22,23 @@ const { fromSSO } = await import("@aws-sdk/credential-provider-sso");

}, async () => {
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni");
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
const { fromIni } = await import("@aws-sdk/credential-provider-ini");
return fromIni(init)();
}, async () => {
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess");
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
const { fromProcess } = await import("@aws-sdk/credential-provider-process");
return fromProcess(init)();
}, async () => {
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile");
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity");
return fromTokenFile(init)();
}, async () => {
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider");
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
return (await remoteProvider(init))();
}, async () => {
throw new CredentialsProviderError("Could not load credentials from any providers", false);
throw new CredentialsProviderError("Could not load credentials from any providers", {
tryNextLink: false,
logger: init.logger,
});
}), credentialsTreatedAsExpired, credentialsWillNeedRefresh);
export const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
export const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;

@@ -6,3 +6,3 @@ import { chain, CredentialsProviderError } from "@smithy/property-provider";

if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata");
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
const { fromHttp } = await import("@aws-sdk/credential-provider-http");

@@ -13,7 +13,7 @@ return chain(fromHttp(init), fromContainerMetadata(init));

return async () => {
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled");
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
};
}
init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata");
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
return fromInstanceMetadata(init);
};

@@ -0,1 +1,2 @@

import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
import type { FromIniInit } from "@aws-sdk/credential-provider-ini";

@@ -10,3 +11,3 @@ import type { FromProcessInit } from "@aws-sdk/credential-provider-process";

*/
export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
export type DefaultProviderInit = FromIniInit & FromHttpOptions & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
/**

@@ -13,0 +14,0 @@ * Creates a credential provider that will attempt to find credentials from the

@@ -0,1 +1,2 @@

import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
import type { RemoteProviderInit } from "@smithy/credential-provider-imds";

@@ -10,2 +11,2 @@ import type { AwsCredentialIdentityProvider } from "@smithy/types";

*/
export declare const remoteProvider: (init: RemoteProviderInit) => Promise<AwsCredentialIdentityProvider>;
export declare const remoteProvider: (init: RemoteProviderInit | FromHttpOptions) => Promise<AwsCredentialIdentityProvider>;

@@ -0,1 +1,2 @@

import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
import { FromIniInit } from "@aws-sdk/credential-provider-ini";

@@ -11,2 +12,3 @@ import { FromProcessInit } from "@aws-sdk/credential-provider-process";

export type DefaultProviderInit = FromIniInit &
FromHttpOptions &
RemoteProviderInit &

@@ -13,0 +15,0 @@ FromProcessInit &

@@ -0,1 +1,2 @@

import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
import { RemoteProviderInit } from "@smithy/credential-provider-imds";

@@ -5,3 +6,3 @@ import { AwsCredentialIdentityProvider } from "@smithy/types";

export declare const remoteProvider: (
init: RemoteProviderInit
init: RemoteProviderInit | FromHttpOptions
) => Promise<AwsCredentialIdentityProvider>;
{
"name": "@aws-sdk/credential-provider-node",
"version": "3.583.0",
"version": "3.587.0",
"description": "AWS credential provider that sources credentials from a Node.JS environment. ",

@@ -31,12 +31,12 @@ "engines": {

"dependencies": {
"@aws-sdk/credential-provider-env": "3.577.0",
"@aws-sdk/credential-provider-http": "3.582.0",
"@aws-sdk/credential-provider-ini": "3.583.0",
"@aws-sdk/credential-provider-process": "3.577.0",
"@aws-sdk/credential-provider-sso": "3.583.0",
"@aws-sdk/credential-provider-web-identity": "3.577.0",
"@aws-sdk/credential-provider-env": "3.587.0",
"@aws-sdk/credential-provider-http": "3.587.0",
"@aws-sdk/credential-provider-ini": "3.587.0",
"@aws-sdk/credential-provider-process": "3.587.0",
"@aws-sdk/credential-provider-sso": "3.587.0",
"@aws-sdk/credential-provider-web-identity": "3.587.0",
"@aws-sdk/types": "3.577.0",
"@smithy/credential-provider-imds": "^3.0.0",
"@smithy/property-provider": "^3.0.0",
"@smithy/shared-ini-file-loader": "^3.0.0",
"@smithy/credential-provider-imds": "^3.1.0",
"@smithy/property-provider": "^3.1.0",
"@smithy/shared-ini-file-loader": "^3.1.0",
"@smithy/types": "^3.0.0",

@@ -43,0 +43,0 @@ "tslib": "^2.6.2"

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc