@aws-sdk/credential-provider-node
Advanced tools
Comparing version 3.583.0 to 3.587.0
@@ -52,3 +52,3 @@ "use strict"; | ||
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) { | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata"); | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata"); | ||
const { fromHttp } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-http"))); | ||
@@ -59,6 +59,6 @@ return (0, import_property_provider.chain)(fromHttp(init), fromContainerMetadata(init)); | ||
return async () => { | ||
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled"); | ||
throw new import_property_provider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger }); | ||
}; | ||
} | ||
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata"); | ||
(_b = init.logger) == null ? void 0 : _b.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata"); | ||
return fromInstanceMetadata(init); | ||
@@ -73,3 +73,3 @@ }, "remoteProvider"); | ||
var _a; | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv"); | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv"); | ||
return (0, import_credential_provider_env.fromEnv)(init)(); | ||
@@ -80,7 +80,8 @@ } | ||
var _a; | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO"); | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO"); | ||
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init; | ||
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) { | ||
throw new import_property_provider.CredentialsProviderError( | ||
"Skipping SSO provider in default chain (inputs do not include SSO fields)." | ||
"Skipping SSO provider in default chain (inputs do not include SSO fields).", | ||
{ logger: init.logger } | ||
); | ||
@@ -93,3 +94,3 @@ } | ||
var _a; | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni"); | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni"); | ||
const { fromIni } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-ini"))); | ||
@@ -100,3 +101,3 @@ return fromIni(init)(); | ||
var _a; | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess"); | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess"); | ||
const { fromProcess } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-process"))); | ||
@@ -107,3 +108,3 @@ return fromProcess(init)(); | ||
var _a; | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile"); | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile"); | ||
const { fromTokenFile } = await Promise.resolve().then(() => __toESM(require("@aws-sdk/credential-provider-web-identity"))); | ||
@@ -114,7 +115,10 @@ return fromTokenFile(init)(); | ||
var _a; | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider"); | ||
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider"); | ||
return (await remoteProvider(init))(); | ||
}, | ||
async () => { | ||
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", false); | ||
throw new import_property_provider.CredentialsProviderError("Could not load credentials from any providers", { | ||
tryNextLink: false, | ||
logger: init.logger | ||
}); | ||
} | ||
@@ -121,0 +125,0 @@ ), |
@@ -9,10 +9,10 @@ import { fromEnv } from "@aws-sdk/credential-provider-env"; | ||
async () => { | ||
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromEnv"); | ||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv"); | ||
return fromEnv(init)(); | ||
}, | ||
]), async () => { | ||
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromSSO"); | ||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO"); | ||
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init; | ||
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) { | ||
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields)."); | ||
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger }); | ||
} | ||
@@ -22,20 +22,23 @@ const { fromSSO } = await import("@aws-sdk/credential-provider-sso"); | ||
}, async () => { | ||
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromIni"); | ||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni"); | ||
const { fromIni } = await import("@aws-sdk/credential-provider-ini"); | ||
return fromIni(init)(); | ||
}, async () => { | ||
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromProcess"); | ||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess"); | ||
const { fromProcess } = await import("@aws-sdk/credential-provider-process"); | ||
return fromProcess(init)(); | ||
}, async () => { | ||
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::fromTokenFile"); | ||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile"); | ||
const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity"); | ||
return fromTokenFile(init)(); | ||
}, async () => { | ||
init.logger?.debug("@aws-sdk/credential-provider-node", "defaultProvider::remoteProvider"); | ||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider"); | ||
return (await remoteProvider(init))(); | ||
}, async () => { | ||
throw new CredentialsProviderError("Could not load credentials from any providers", false); | ||
throw new CredentialsProviderError("Could not load credentials from any providers", { | ||
tryNextLink: false, | ||
logger: init.logger, | ||
}); | ||
}), credentialsTreatedAsExpired, credentialsWillNeedRefresh); | ||
export const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined; | ||
export const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000; |
@@ -6,3 +6,3 @@ import { chain, CredentialsProviderError } from "@smithy/property-provider"; | ||
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) { | ||
init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromHttp/fromContainerMetadata"); | ||
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata"); | ||
const { fromHttp } = await import("@aws-sdk/credential-provider-http"); | ||
@@ -13,7 +13,7 @@ return chain(fromHttp(init), fromContainerMetadata(init)); | ||
return async () => { | ||
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled"); | ||
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger }); | ||
}; | ||
} | ||
init.logger?.debug("@aws-sdk/credential-provider-node", "remoteProvider::fromInstanceMetadata"); | ||
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata"); | ||
return fromInstanceMetadata(init); | ||
}; |
@@ -0,1 +1,2 @@ | ||
import type { FromHttpOptions } from "@aws-sdk/credential-provider-http"; | ||
import type { FromIniInit } from "@aws-sdk/credential-provider-ini"; | ||
@@ -10,3 +11,3 @@ import type { FromProcessInit } from "@aws-sdk/credential-provider-process"; | ||
*/ | ||
export type DefaultProviderInit = FromIniInit & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit; | ||
export type DefaultProviderInit = FromIniInit & FromHttpOptions & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit; | ||
/** | ||
@@ -13,0 +14,0 @@ * Creates a credential provider that will attempt to find credentials from the |
@@ -0,1 +1,2 @@ | ||
import type { FromHttpOptions } from "@aws-sdk/credential-provider-http"; | ||
import type { RemoteProviderInit } from "@smithy/credential-provider-imds"; | ||
@@ -10,2 +11,2 @@ import type { AwsCredentialIdentityProvider } from "@smithy/types"; | ||
*/ | ||
export declare const remoteProvider: (init: RemoteProviderInit) => Promise<AwsCredentialIdentityProvider>; | ||
export declare const remoteProvider: (init: RemoteProviderInit | FromHttpOptions) => Promise<AwsCredentialIdentityProvider>; |
@@ -0,1 +1,2 @@ | ||
import { FromHttpOptions } from "@aws-sdk/credential-provider-http"; | ||
import { FromIniInit } from "@aws-sdk/credential-provider-ini"; | ||
@@ -11,2 +12,3 @@ import { FromProcessInit } from "@aws-sdk/credential-provider-process"; | ||
export type DefaultProviderInit = FromIniInit & | ||
FromHttpOptions & | ||
RemoteProviderInit & | ||
@@ -13,0 +15,0 @@ FromProcessInit & |
@@ -0,1 +1,2 @@ | ||
import { FromHttpOptions } from "@aws-sdk/credential-provider-http"; | ||
import { RemoteProviderInit } from "@smithy/credential-provider-imds"; | ||
@@ -5,3 +6,3 @@ import { AwsCredentialIdentityProvider } from "@smithy/types"; | ||
export declare const remoteProvider: ( | ||
init: RemoteProviderInit | ||
init: RemoteProviderInit | FromHttpOptions | ||
) => Promise<AwsCredentialIdentityProvider>; |
{ | ||
"name": "@aws-sdk/credential-provider-node", | ||
"version": "3.583.0", | ||
"version": "3.587.0", | ||
"description": "AWS credential provider that sources credentials from a Node.JS environment. ", | ||
@@ -31,12 +31,12 @@ "engines": { | ||
"dependencies": { | ||
"@aws-sdk/credential-provider-env": "3.577.0", | ||
"@aws-sdk/credential-provider-http": "3.582.0", | ||
"@aws-sdk/credential-provider-ini": "3.583.0", | ||
"@aws-sdk/credential-provider-process": "3.577.0", | ||
"@aws-sdk/credential-provider-sso": "3.583.0", | ||
"@aws-sdk/credential-provider-web-identity": "3.577.0", | ||
"@aws-sdk/credential-provider-env": "3.587.0", | ||
"@aws-sdk/credential-provider-http": "3.587.0", | ||
"@aws-sdk/credential-provider-ini": "3.587.0", | ||
"@aws-sdk/credential-provider-process": "3.587.0", | ||
"@aws-sdk/credential-provider-sso": "3.587.0", | ||
"@aws-sdk/credential-provider-web-identity": "3.587.0", | ||
"@aws-sdk/types": "3.577.0", | ||
"@smithy/credential-provider-imds": "^3.0.0", | ||
"@smithy/property-provider": "^3.0.0", | ||
"@smithy/shared-ini-file-loader": "^3.0.0", | ||
"@smithy/credential-provider-imds": "^3.1.0", | ||
"@smithy/property-provider": "^3.1.0", | ||
"@smithy/shared-ini-file-loader": "^3.1.0", | ||
"@smithy/types": "^3.0.0", | ||
@@ -43,0 +43,0 @@ "tslib": "^2.6.2" |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
33887
286
+ Added@aws-sdk/client-sso@3.587.0(transitive)
+ Added@aws-sdk/core@3.587.0(transitive)
+ Added@aws-sdk/credential-provider-env@3.587.0(transitive)
+ Added@aws-sdk/credential-provider-http@3.587.0(transitive)
+ Added@aws-sdk/credential-provider-ini@3.587.0(transitive)
+ Added@aws-sdk/credential-provider-process@3.587.0(transitive)
+ Added@aws-sdk/credential-provider-sso@3.587.0(transitive)
+ Added@aws-sdk/credential-provider-web-identity@3.587.0(transitive)
+ Added@aws-sdk/middleware-user-agent@3.587.0(transitive)
+ Added@aws-sdk/region-config-resolver@3.587.0(transitive)
+ Added@aws-sdk/token-providers@3.587.0(transitive)
+ Added@aws-sdk/util-endpoints@3.587.0(transitive)
+ Added@aws-sdk/util-user-agent-node@3.587.0(transitive)
- Removed@aws-sdk/client-sso@3.583.0(transitive)
- Removed@aws-sdk/core@3.582.0(transitive)
- Removed@aws-sdk/credential-provider-env@3.577.0(transitive)
- Removed@aws-sdk/credential-provider-http@3.582.0(transitive)
- Removed@aws-sdk/credential-provider-ini@3.583.0(transitive)
- Removed@aws-sdk/credential-provider-process@3.577.0(transitive)
- Removed@aws-sdk/credential-provider-sso@3.583.0(transitive)
- Removed@aws-sdk/credential-provider-web-identity@3.577.0(transitive)
- Removed@aws-sdk/middleware-user-agent@3.583.0(transitive)
- Removed@aws-sdk/region-config-resolver@3.577.0(transitive)
- Removed@aws-sdk/token-providers@3.577.0(transitive)
- Removed@aws-sdk/util-endpoints@3.583.0(transitive)
- Removed@aws-sdk/util-user-agent-node@3.577.0(transitive)