Socket
Socket
Sign inDemoInstall

@aws-sdk/credential-provider-sso

Package Overview
Dependencies
Maintainers
7
Versions
303
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-sdk/credential-provider-sso - npm Package Compare versions

Comparing version 3.21.0 to 3.22.0

16

CHANGELOG.md

@@ -6,2 +6,18 @@ # Change Log

# [3.22.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.21.0...v3.22.0) (2021-07-16)
### Bug Fixes
* **clients:** prefix `dist/` for typesVersions TS<4 ([#2580](https://github.com/aws/aws-sdk-js-v3/issues/2580)) ([dff5cd4](https://github.com/aws/aws-sdk-js-v3/commit/dff5cd4b6fa00453e938ce8f238c1542ee7ba3d6))
### Features
* **credential-provider-sso:** support sso credential when resolving shared credential file ([#2583](https://github.com/aws/aws-sdk-js-v3/issues/2583)) ([9480e70](https://github.com/aws/aws-sdk-js-v3/commit/9480e70da4ac59d4d08f01702b4e62bf42397394))
# [3.21.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.20.0...v3.21.0) (2021-07-09)

@@ -8,0 +24,0 @@

74

dist/cjs/index.js
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.fromSSO = exports.EXPIRE_WINDOW_MS = void 0;
exports.isSsoProfile = exports.validateSsoProfile = exports.fromSSO = exports.EXPIRE_WINDOW_MS = void 0;
const client_sso_1 = require("@aws-sdk/client-sso");
const credential_provider_ini_1 = require("@aws-sdk/credential-provider-ini");
const property_provider_1 = require("@aws-sdk/property-provider");
const shared_ini_file_loader_1 = require("@aws-sdk/shared-ini-file-loader");
const util_credentials_1 = require("@aws-sdk/util-credentials");
const crypto_1 = require("crypto");

@@ -24,21 +24,32 @@ const fs_1 = require("fs");

const fromSSO = (init = {}) => async () => {
const profiles = await credential_provider_ini_1.parseKnownFiles(init);
return resolveSSOCredentials(credential_provider_ini_1.getMasterProfileName(init), profiles, init);
};
exports.fromSSO = fromSSO;
const resolveSSOCredentials = async (profileName, profiles, options) => {
const profile = profiles[profileName];
if (!profile) {
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`);
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient } = init;
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName) {
// Load the SSO config from shared AWS config file.
const profiles = await util_credentials_1.parseKnownFiles(init);
const profileName = util_credentials_1.getMasterProfileName(init);
const profile = profiles[profileName];
if (!exports.isSsoProfile(profile)) {
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);
}
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = exports.validateSsoProfile(profile);
return resolveSSOCredentials({
ssoStartUrl: sso_start_url,
ssoAccountId: sso_account_id,
ssoRegion: sso_region,
ssoRoleName: sso_role_name,
ssoClient: ssoClient,
});
}
const { sso_start_url: startUrl, sso_account_id: accountId, sso_region: region, sso_role_name: roleName } = profile;
if (!startUrl && !accountId && !region && !roleName) {
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);
else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
throw new property_provider_1.CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl",' +
' "ssoAccountId", "ssoRegion", "ssoRoleName"');
}
if (!startUrl || !accountId || !region || !roleName) {
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} does not have valid SSO credentials. Required parameters "sso_account_id", "sso_region", ` +
`"sso_role_name", "sso_start_url". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, SHOULD_FAIL_CREDENTIAL_CHAIN);
else {
return resolveSSOCredentials({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient });
}
};
exports.fromSSO = fromSSO;
const resolveSSOCredentials = async ({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, }) => {
const hasher = crypto_1.createHash("sha1");
const cacheName = hasher.update(startUrl).digest("hex");
const cacheName = hasher.update(ssoStartUrl).digest("hex");
const tokenFile = path_1.join(shared_ini_file_loader_1.getHomeDir(), ".aws", "sso", "cache", `${cacheName}.json`);

@@ -57,8 +68,8 @@ let token;

const { accessToken } = token;
const sso = options.ssoClient || new client_sso_1.SSOClient({ region });
const sso = ssoClient || new client_sso_1.SSOClient({ region: ssoRegion });
let ssoResp;
try {
ssoResp = await sso.send(new client_sso_1.GetRoleCredentialsCommand({
accountId,
roleName,
accountId: ssoAccountId,
roleName: ssoRoleName,
accessToken,

@@ -76,2 +87,23 @@ }));

};
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;AAAA,oDAA4G;AAC5G,8EAA4G;AAC5G,kEAAsE;AACtE,4EAA4E;AAE5E,mCAAoC;AACpC,2BAAkC;AAClC,+BAA4B;AAE5B;;;;;GAKG;AACU,QAAA,gBAAgB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/C,MAAM,4BAA4B,GAAG,KAAK,CAAC;AAkB3C;;;GAGG;AACI,MAAM,OAAO,GAClB,CAAC,OAAoB,EAAE,EAAsB,EAAE,CAC/C,KAAK,IAAI,EAAE;IACT,MAAM,QAAQ,GAAG,MAAM,yCAAe,CAAC,IAAI,CAAC,CAAC;IAC7C,OAAO,qBAAqB,CAAC,8CAAoB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,CAAC,CAAC;AAC3E,CAAC,CAAC;AALS,QAAA,OAAO,WAKhB;AAEJ,MAAM,qBAAqB,GAAG,KAAK,EACjC,WAAmB,EACnB,QAAuB,EACvB,OAAoB,EACE,EAAE;IACxB,MAAM,OAAO,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE;QACZ,MAAM,IAAI,4CAAwB,CAAC,WAAW,WAAW,iDAAiD,CAAC,CAAC;KAC7G;IACD,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,cAAc,EAAE,SAAS,EAAE,UAAU,EAAE,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,OAAO,CAAC;IACpH,IAAI,CAAC,QAAQ,IAAI,CAAC,SAAS,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE;QACnD,MAAM,IAAI,4CAAwB,CAAC,WAAW,WAAW,0CAA0C,CAAC,CAAC;KACtG;IACD,IAAI,CAAC,QAAQ,IAAI,CAAC,SAAS,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE;QACnD,MAAM,IAAI,4CAAwB,CAChC,WAAW,WAAW,4FAA4F;YAChH,sHAAsH,EACxH,4BAA4B,CAC7B,CAAC;KACH;IACD,MAAM,MAAM,GAAG,mBAAU,CAAC,MAAM,CAAC,CAAC;IAClC,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IACxD,MAAM,SAAS,GAAG,WAAI,CAAC,mCAAU,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,SAAS,OAAO,CAAC,CAAC;IAClF,IAAI,KAAe,CAAC;IACpB,IAAI;QACF,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,iBAAY,CAAC,SAAS,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;QACnE,IAAI,IAAI,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,wBAAgB,EAAE;YACxE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;SAC1C;KACF;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,IAAI,4CAAwB,CAChC,gHAAgH;YAC9G,mDAAmD,EACrD,4BAA4B,CAC7B,CAAC;KACH;IACD,MAAM,EAAE,WAAW,EAAE,GAAG,KAAK,CAAC;IAC9B,MAAM,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,IAAI,sBAAS,CAAC,EAAE,MAAM,EAAE,CAAC,CAAC;IAC3D,IAAI,OAAwC,CAAC;IAC7C,IAAI;QACF,OAAO,GAAG,MAAM,GAAG,CAAC,IAAI,CACtB,IAAI,sCAAyB,CAAC;YAC5B,SAAS;YACT,QAAQ;YACR,WAAW;SACZ,CAAC,CACH,CAAC;KACH;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,4CAAwB,CAAC,IAAI,CAAC,CAAC,EAAE,4BAA4B,CAAC,CAAC;KACtE;IACD,MAAM,EAAE,eAAe,EAAE,EAAE,WAAW,EAAE,eAAe,EAAE,YAAY,EAAE,UAAU,EAAE,GAAG,EAAE,EAAE,GAAG,OAAO,CAAC;IACrG,IAAI,CAAC,WAAW,IAAI,CAAC,eAAe,IAAI,CAAC,YAAY,IAAI,CAAC,UAAU,EAAE;QACpE,MAAM,IAAI,4CAAwB,CAAC,8CAA8C,EAAE,4BAA4B,CAAC,CAAC;KAClH;IACD,OAAO,EAAE,WAAW,EAAE,eAAe,EAAE,YAAY,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;AAC1F,CAAC,CAAC","sourcesContent":["import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from \"@aws-sdk/client-sso\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/credential-provider-ini\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { getHomeDir, ParsedIniData } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { createHash } from \"crypto\";\nimport { readFileSync } from \"fs\";\nimport { join } from \"path\";\n\n/**\n * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.\n * This is needed because server side may have invalidated the token before the defined expiration date.\n *\n * @internal\n */\nexport const EXPIRE_WINDOW_MS = 15 * 60 * 1000;\n\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\n\n/**\n * Cached SSO token retrieved from SSO login flow.\n */\ninterface SSOToken {\n  // A base64 encoded string returned by the sso-oidc service.\n  accessToken: string;\n  // RFC3339 format timestamp\n  expiresAt: string;\n  region?: string;\n  startUrl?: string;\n}\n\nexport interface FromSSOInit extends SourceProfileInit {\n  ssoClient?: SSOClient;\n}\n\n/**\n * Creates a credential provider that will read from a credential_process specified\n * in ini files.\n */\nexport const fromSSO =\n  (init: FromSSOInit = {}): CredentialProvider =>\n  async () => {\n    const profiles = await parseKnownFiles(init);\n    return resolveSSOCredentials(getMasterProfileName(init), profiles, init);\n  };\n\nconst resolveSSOCredentials = async (\n  profileName: string,\n  profiles: ParsedIniData,\n  options: FromSSOInit\n): Promise<Credentials> => {\n  const profile = profiles[profileName];\n  if (!profile) {\n    throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`);\n  }\n  const { sso_start_url: startUrl, sso_account_id: accountId, sso_region: region, sso_role_name: roleName } = profile;\n  if (!startUrl && !accountId && !region && !roleName) {\n    throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);\n  }\n  if (!startUrl || !accountId || !region || !roleName) {\n    throw new CredentialsProviderError(\n      `Profile ${profileName} does not have valid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", ` +\n        `\"sso_role_name\", \"sso_start_url\". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const hasher = createHash(\"sha1\");\n  const cacheName = hasher.update(startUrl).digest(\"hex\");\n  const tokenFile = join(getHomeDir(), \".aws\", \"sso\", \"cache\", `${cacheName}.json`);\n  let token: SSOToken;\n  try {\n    token = JSON.parse(readFileSync(tokenFile, { encoding: \"utf-8\" }));\n    if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {\n      throw new Error(\"SSO token is expired.\");\n    }\n  } catch (e) {\n    throw new CredentialsProviderError(\n      `The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session ` +\n        `run aws sso login with the corresponding profile.`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const { accessToken } = token;\n  const sso = options.ssoClient || new SSOClient({ region });\n  let ssoResp: GetRoleCredentialsCommandOutput;\n  try {\n    ssoResp = await sso.send(\n      new GetRoleCredentialsCommand({\n        accountId,\n        roleName,\n        accessToken,\n      })\n    );\n  } catch (e) {\n    throw CredentialsProviderError.from(e, SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration } = {} } = ssoResp;\n  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n    throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  return { accessKeyId, secretAccessKey, sessionToken, expiration: new Date(expiration) };\n};\n"]}
/**
* @internal
*/
const validateSsoProfile = (profile) => {
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
throw new property_provider_1.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", ` +
`"sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, SHOULD_FAIL_CREDENTIAL_CHAIN);
}
return profile;
};
exports.validateSsoProfile = validateSsoProfile;
/**
* @internal
*/
const isSsoProfile = (arg) => arg &&
(typeof arg.sso_start_url === "string" ||
typeof arg.sso_account_id === "string" ||
typeof arg.sso_region === "string" ||
typeof arg.sso_role_name === "string");
exports.isSsoProfile = isSsoProfile;
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;AAAA,oDAA4G;AAC5G,kEAAsE;AACtE,4EAAsE;AAEtE,gEAAqG;AACrG,mCAAoC;AACpC,2BAAkC;AAClC,+BAA4B;AAE5B;;;;;GAKG;AACU,QAAA,gBAAgB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/C,MAAM,4BAA4B,GAAG,KAAK,CAAC;AAuC3C;;;GAGG;AACI,MAAM,OAAO,GAClB,CAAC,OAAwD,EAAS,EAAsB,EAAE,CAC1F,KAAK,IAAI,EAAE;IACT,MAAM,EAAE,WAAW,EAAE,YAAY,EAAE,SAAS,EAAE,WAAW,EAAE,SAAS,EAAE,GAAG,IAAI,CAAC;IAC9E,IAAI,CAAC,WAAW,IAAI,CAAC,YAAY,IAAI,CAAC,SAAS,IAAI,CAAC,WAAW,EAAE;QAC/D,mDAAmD;QACnD,MAAM,QAAQ,GAAG,MAAM,kCAAe,CAAC,IAAI,CAAC,CAAC;QAC7C,MAAM,WAAW,GAAG,uCAAoB,CAAC,IAAI,CAAC,CAAC;QAC/C,MAAM,OAAO,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;QACtC,IAAI,CAAC,oBAAY,CAAC,OAAO,CAAC,EAAE;YAC1B,MAAM,IAAI,4CAAwB,CAAC,WAAW,WAAW,0CAA0C,CAAC,CAAC;SACtG;QACD,MAAM,EAAE,aAAa,EAAE,cAAc,EAAE,UAAU,EAAE,aAAa,EAAE,GAAG,0BAAkB,CAAC,OAAO,CAAC,CAAC;QACjG,OAAO,qBAAqB,CAAC;YAC3B,WAAW,EAAE,aAAa;YAC1B,YAAY,EAAE,cAAc;YAC5B,SAAS,EAAE,UAAU;YACrB,WAAW,EAAE,aAAa;YAC1B,SAAS,EAAE,SAAS;SACrB,CAAC,CAAC;KACJ;SAAM,IAAI,CAAC,WAAW,IAAI,CAAC,YAAY,IAAI,CAAC,SAAS,IAAI,CAAC,WAAW,EAAE;QACtE,MAAM,IAAI,4CAAwB,CAChC,mFAAmF;YACjF,6CAA6C,CAChD,CAAC;KACH;SAAM;QACL,OAAO,qBAAqB,CAAC,EAAE,WAAW,EAAE,YAAY,EAAE,SAAS,EAAE,WAAW,EAAE,SAAS,EAAE,CAAC,CAAC;KAChG;AACH,CAAC,CAAC;AA5BS,QAAA,OAAO,WA4BhB;AAEJ,MAAM,qBAAqB,GAAG,KAAK,EAAE,EACnC,WAAW,EACX,YAAY,EACZ,SAAS,EACT,WAAW,EACX,SAAS,GAC8B,EAAwB,EAAE;IACjE,MAAM,MAAM,GAAG,mBAAU,CAAC,MAAM,CAAC,CAAC;IAClC,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IAC3D,MAAM,SAAS,GAAG,WAAI,CAAC,mCAAU,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,SAAS,OAAO,CAAC,CAAC;IAClF,IAAI,KAAe,CAAC;IACpB,IAAI;QACF,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,iBAAY,CAAC,SAAS,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;QACnE,IAAI,IAAI,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,wBAAgB,EAAE;YACxE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;SAC1C;KACF;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,IAAI,4CAAwB,CAChC,gHAAgH;YAC9G,mDAAmD,EACrD,4BAA4B,CAC7B,CAAC;KACH;IACD,MAAM,EAAE,WAAW,EAAE,GAAG,KAAK,CAAC;IAC9B,MAAM,GAAG,GAAG,SAAS,IAAI,IAAI,sBAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IAC9D,IAAI,OAAwC,CAAC;IAC7C,IAAI;QACF,OAAO,GAAG,MAAM,GAAG,CAAC,IAAI,CACtB,IAAI,sCAAyB,CAAC;YAC5B,SAAS,EAAE,YAAY;YACvB,QAAQ,EAAE,WAAW;YACrB,WAAW;SACZ,CAAC,CACH,CAAC;KACH;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,4CAAwB,CAAC,IAAI,CAAC,CAAC,EAAE,4BAA4B,CAAC,CAAC;KACtE;IACD,MAAM,EAAE,eAAe,EAAE,EAAE,WAAW,EAAE,eAAe,EAAE,YAAY,EAAE,UAAU,EAAE,GAAG,EAAE,EAAE,GAAG,OAAO,CAAC;IACrG,IAAI,CAAC,WAAW,IAAI,CAAC,eAAe,IAAI,CAAC,YAAY,IAAI,CAAC,UAAU,EAAE;QACpE,MAAM,IAAI,4CAAwB,CAAC,8CAA8C,EAAE,4BAA4B,CAAC,CAAC;KAClH;IACD,OAAO,EAAE,WAAW,EAAE,eAAe,EAAE,YAAY,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;AAC1F,CAAC,CAAC;AAYF;;GAEG;AACI,MAAM,kBAAkB,GAAG,CAAC,OAA4B,EAAc,EAAE;IAC7E,MAAM,EAAE,aAAa,EAAE,cAAc,EAAE,UAAU,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAC7E,IAAI,CAAC,aAAa,IAAI,CAAC,cAAc,IAAI,CAAC,UAAU,IAAI,CAAC,aAAa,EAAE;QACtE,MAAM,IAAI,4CAAwB,CAChC,0GAA0G;YACxG,yCAAyC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,IAAI,CAChE,IAAI,CACL,sFAAsF,EACzF,4BAA4B,CAC7B,CAAC;KACH;IACD,OAAO,OAAqB,CAAC;AAC/B,CAAC,CAAC;AAZW,QAAA,kBAAkB,sBAY7B;AAEF;;GAEG;AACI,MAAM,YAAY,GAAG,CAAC,GAAY,EAA8B,EAAE,CACvE,GAAG;IACH,CAAC,OAAO,GAAG,CAAC,aAAa,KAAK,QAAQ;QACpC,OAAO,GAAG,CAAC,cAAc,KAAK,QAAQ;QACtC,OAAO,GAAG,CAAC,UAAU,KAAK,QAAQ;QAClC,OAAO,GAAG,CAAC,aAAa,KAAK,QAAQ,CAAC,CAAC;AAL9B,QAAA,YAAY,gBAKkB","sourcesContent":["import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from \"@aws-sdk/client-sso\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { getHomeDir, Profile } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/util-credentials\";\nimport { createHash } from \"crypto\";\nimport { readFileSync } from \"fs\";\nimport { join } from \"path\";\n\n/**\n * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.\n * This is needed because server side may have invalidated the token before the defined expiration date.\n *\n * @internal\n */\nexport const EXPIRE_WINDOW_MS = 15 * 60 * 1000;\n\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\n\n/**\n * Cached SSO token retrieved from SSO login flow.\n */\ninterface SSOToken {\n  // A base64 encoded string returned by the sso-oidc service.\n  accessToken: string;\n  // RFC3339 format timestamp\n  expiresAt: string;\n  region?: string;\n  startUrl?: string;\n}\n\nexport interface SsoCredentialsParameters {\n  /**\n   * The URL to the AWS SSO service.\n   */\n  ssoStartUrl: string;\n\n  /**\n   * The ID of the AWS account to use for temporary credentials.\n   */\n  ssoAccountId: string;\n\n  /**\n   * The AWS region to use for temporary credentials.\n   */\n  ssoRegion: string;\n\n  /**\n   * The name of the AWS role to assume.\n   */\n  ssoRoleName: string;\n}\nexport interface FromSSOInit extends SourceProfileInit {\n  ssoClient?: SSOClient;\n}\n\n/**\n * Creates a credential provider that will read from a credential_process specified\n * in ini files.\n */\nexport const fromSSO =\n  (init: FromSSOInit & Partial<SsoCredentialsParameters> = {} as any): CredentialProvider =>\n  async () => {\n    const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient } = init;\n    if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName) {\n      // Load the SSO config from shared AWS config file.\n      const profiles = await parseKnownFiles(init);\n      const profileName = getMasterProfileName(init);\n      const profile = profiles[profileName];\n      if (!isSsoProfile(profile)) {\n        throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);\n      }\n      const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(profile);\n      return resolveSSOCredentials({\n        ssoStartUrl: sso_start_url,\n        ssoAccountId: sso_account_id,\n        ssoRegion: sso_region,\n        ssoRoleName: sso_role_name,\n        ssoClient: ssoClient,\n      });\n    } else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n      throw new CredentialsProviderError(\n        'Incomplete configuration. The fromSSO() argument hash must include \"ssoStartUrl\",' +\n          ' \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"'\n      );\n    } else {\n      return resolveSSOCredentials({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient });\n    }\n  };\n\nconst resolveSSOCredentials = async ({\n  ssoStartUrl,\n  ssoAccountId,\n  ssoRegion,\n  ssoRoleName,\n  ssoClient,\n}: FromSSOInit & SsoCredentialsParameters): Promise<Credentials> => {\n  const hasher = createHash(\"sha1\");\n  const cacheName = hasher.update(ssoStartUrl).digest(\"hex\");\n  const tokenFile = join(getHomeDir(), \".aws\", \"sso\", \"cache\", `${cacheName}.json`);\n  let token: SSOToken;\n  try {\n    token = JSON.parse(readFileSync(tokenFile, { encoding: \"utf-8\" }));\n    if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {\n      throw new Error(\"SSO token is expired.\");\n    }\n  } catch (e) {\n    throw new CredentialsProviderError(\n      `The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session ` +\n        `run aws sso login with the corresponding profile.`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const { accessToken } = token;\n  const sso = ssoClient || new SSOClient({ region: ssoRegion });\n  let ssoResp: GetRoleCredentialsCommandOutput;\n  try {\n    ssoResp = await sso.send(\n      new GetRoleCredentialsCommand({\n        accountId: ssoAccountId,\n        roleName: ssoRoleName,\n        accessToken,\n      })\n    );\n  } catch (e) {\n    throw CredentialsProviderError.from(e, SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration } = {} } = ssoResp;\n  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n    throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  return { accessKeyId, secretAccessKey, sessionToken, expiration: new Date(expiration) };\n};\n\n/**\n * @internal\n */\nexport interface SsoProfile extends Profile {\n  sso_start_url: string;\n  sso_account_id: string;\n  sso_region: string;\n  sso_role_name: string;\n}\n\n/**\n * @internal\n */\nexport const validateSsoProfile = (profile: Partial<SsoProfile>): SsoProfile => {\n  const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n  if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n    throw new CredentialsProviderError(\n      `Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", ` +\n        `\"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\n          \", \"\n        )}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  return profile as SsoProfile;\n};\n\n/**\n * @internal\n */\nexport const isSsoProfile = (arg: Profile): arg is Partial<SsoProfile> =>\n  arg &&\n  (typeof arg.sso_start_url === \"string\" ||\n    typeof arg.sso_account_id === \"string\" ||\n    typeof arg.sso_region === \"string\" ||\n    typeof arg.sso_role_name === \"string\");\n"]}
import { __awaiter, __generator } from "tslib";
import { GetRoleCredentialsCommand, SSOClient } from "@aws-sdk/client-sso";
import { getMasterProfileName, parseKnownFiles } from "@aws-sdk/credential-provider-ini";
import { CredentialsProviderError } from "@aws-sdk/property-provider";
import { getHomeDir } from "@aws-sdk/shared-ini-file-loader";
import { getMasterProfileName, parseKnownFiles } from "@aws-sdk/util-credentials";
import { createHash } from "crypto";

@@ -24,9 +24,34 @@ import { readFileSync } from "fs";

return function () { return __awaiter(void 0, void 0, void 0, function () {
var profiles;
return __generator(this, function (_a) {
switch (_a.label) {
case 0: return [4 /*yield*/, parseKnownFiles(init)];
var ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, profiles, profileName, profile, _a, sso_start_url, sso_account_id, sso_region, sso_role_name;
return __generator(this, function (_b) {
switch (_b.label) {
case 0:
ssoStartUrl = init.ssoStartUrl, ssoAccountId = init.ssoAccountId, ssoRegion = init.ssoRegion, ssoRoleName = init.ssoRoleName, ssoClient = init.ssoClient;
if (!(!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName)) return [3 /*break*/, 2];
return [4 /*yield*/, parseKnownFiles(init)];
case 1:
profiles = _a.sent();
return [2 /*return*/, resolveSSOCredentials(getMasterProfileName(init), profiles, init)];
profiles = _b.sent();
profileName = getMasterProfileName(init);
profile = profiles[profileName];
if (!isSsoProfile(profile)) {
throw new CredentialsProviderError("Profile " + profileName + " is not configured with SSO credentials.");
}
_a = validateSsoProfile(profile), sso_start_url = _a.sso_start_url, sso_account_id = _a.sso_account_id, sso_region = _a.sso_region, sso_role_name = _a.sso_role_name;
return [2 /*return*/, resolveSSOCredentials({
ssoStartUrl: sso_start_url,
ssoAccountId: sso_account_id,
ssoRegion: sso_region,
ssoRoleName: sso_role_name,
ssoClient: ssoClient,
})];
case 2:
if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
throw new CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl",' +
' "ssoAccountId", "ssoRegion", "ssoRoleName"');
}
else {
return [2 /*return*/, resolveSSOCredentials({ ssoStartUrl: ssoStartUrl, ssoAccountId: ssoAccountId, ssoRegion: ssoRegion, ssoRoleName: ssoRoleName, ssoClient: ssoClient })];
}
_b.label = 3;
case 3: return [2 /*return*/];
}

@@ -36,57 +61,69 @@ });

};
var resolveSSOCredentials = function (profileName, profiles, options) { return __awaiter(void 0, void 0, void 0, function () {
var profile, startUrl, accountId, region, roleName, hasher, cacheName, tokenFile, token, accessToken, sso, ssoResp, e_1, _a, _b, accessKeyId, secretAccessKey, sessionToken, expiration;
return __generator(this, function (_c) {
switch (_c.label) {
case 0:
profile = profiles[profileName];
if (!profile) {
throw new CredentialsProviderError("Profile " + profileName + " could not be found in shared credentials file.");
}
startUrl = profile.sso_start_url, accountId = profile.sso_account_id, region = profile.sso_region, roleName = profile.sso_role_name;
if (!startUrl && !accountId && !region && !roleName) {
throw new CredentialsProviderError("Profile " + profileName + " is not configured with SSO credentials.");
}
if (!startUrl || !accountId || !region || !roleName) {
throw new CredentialsProviderError("Profile " + profileName + " does not have valid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", " +
"\"sso_role_name\", \"sso_start_url\". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html", SHOULD_FAIL_CREDENTIAL_CHAIN);
}
hasher = createHash("sha1");
cacheName = hasher.update(startUrl).digest("hex");
tokenFile = join(getHomeDir(), ".aws", "sso", "cache", cacheName + ".json");
try {
token = JSON.parse(readFileSync(tokenFile, { encoding: "utf-8" }));
if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {
throw new Error("SSO token is expired.");
var resolveSSOCredentials = function (_a) {
var ssoStartUrl = _a.ssoStartUrl, ssoAccountId = _a.ssoAccountId, ssoRegion = _a.ssoRegion, ssoRoleName = _a.ssoRoleName, ssoClient = _a.ssoClient;
return __awaiter(void 0, void 0, void 0, function () {
var hasher, cacheName, tokenFile, token, accessToken, sso, ssoResp, e_1, _b, _c, accessKeyId, secretAccessKey, sessionToken, expiration;
return __generator(this, function (_d) {
switch (_d.label) {
case 0:
hasher = createHash("sha1");
cacheName = hasher.update(ssoStartUrl).digest("hex");
tokenFile = join(getHomeDir(), ".aws", "sso", "cache", cacheName + ".json");
try {
token = JSON.parse(readFileSync(tokenFile, { encoding: "utf-8" }));
if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {
throw new Error("SSO token is expired.");
}
}
}
catch (e) {
throw new CredentialsProviderError("The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session " +
"run aws sso login with the corresponding profile.", SHOULD_FAIL_CREDENTIAL_CHAIN);
}
accessToken = token.accessToken;
sso = options.ssoClient || new SSOClient({ region: region });
_c.label = 1;
case 1:
_c.trys.push([1, 3, , 4]);
return [4 /*yield*/, sso.send(new GetRoleCredentialsCommand({
accountId: accountId,
roleName: roleName,
accessToken: accessToken,
}))];
case 2:
ssoResp = _c.sent();
return [3 /*break*/, 4];
case 3:
e_1 = _c.sent();
throw CredentialsProviderError.from(e_1, SHOULD_FAIL_CREDENTIAL_CHAIN);
case 4:
_a = ssoResp.roleCredentials, _b = _a === void 0 ? {} : _a, accessKeyId = _b.accessKeyId, secretAccessKey = _b.secretAccessKey, sessionToken = _b.sessionToken, expiration = _b.expiration;
if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
throw new CredentialsProviderError("SSO returns an invalid temporary credential.", SHOULD_FAIL_CREDENTIAL_CHAIN);
}
return [2 /*return*/, { accessKeyId: accessKeyId, secretAccessKey: secretAccessKey, sessionToken: sessionToken, expiration: new Date(expiration) }];
}
catch (e) {
throw new CredentialsProviderError("The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session " +
"run aws sso login with the corresponding profile.", SHOULD_FAIL_CREDENTIAL_CHAIN);
}
accessToken = token.accessToken;
sso = ssoClient || new SSOClient({ region: ssoRegion });
_d.label = 1;
case 1:
_d.trys.push([1, 3, , 4]);
return [4 /*yield*/, sso.send(new GetRoleCredentialsCommand({
accountId: ssoAccountId,
roleName: ssoRoleName,
accessToken: accessToken,
}))];
case 2:
ssoResp = _d.sent();
return [3 /*break*/, 4];
case 3:
e_1 = _d.sent();
throw CredentialsProviderError.from(e_1, SHOULD_FAIL_CREDENTIAL_CHAIN);
case 4:
_b = ssoResp.roleCredentials, _c = _b === void 0 ? {} : _b, accessKeyId = _c.accessKeyId, secretAccessKey = _c.secretAccessKey, sessionToken = _c.sessionToken, expiration = _c.expiration;
if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {
throw new CredentialsProviderError("SSO returns an invalid temporary credential.", SHOULD_FAIL_CREDENTIAL_CHAIN);
}
return [2 /*return*/, { accessKeyId: accessKeyId, secretAccessKey: secretAccessKey, sessionToken: sessionToken, expiration: new Date(expiration) }];
}
});
});
}); };
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,yBAAyB,EAAmC,SAAS,EAAE,MAAM,qBAAqB,CAAC;AAC5G,OAAO,EAAE,oBAAoB,EAAE,eAAe,EAAqB,MAAM,kCAAkC,CAAC;AAC5G,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,UAAU,EAAiB,MAAM,iCAAiC,CAAC;AAE5E,OAAO,EAAE,UAAU,EAAE,MAAM,QAAQ,CAAC;AACpC,OAAO,EAAE,YAAY,EAAE,MAAM,IAAI,CAAC;AAClC,OAAO,EAAE,IAAI,EAAE,MAAM,MAAM,CAAC;AAE5B;;;;;GAKG;AACH,MAAM,CAAC,IAAM,gBAAgB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/C,IAAM,4BAA4B,GAAG,KAAK,CAAC;AAkB3C;;;GAGG;AACH,MAAM,CAAC,IAAM,OAAO,GAClB,UAAC,IAAsB;IAAtB,qBAAA,EAAA,SAAsB;IACvB,OAAA;;;;wBACmB,qBAAM,eAAe,CAAC,IAAI,CAAC,EAAA;;oBAAtC,QAAQ,GAAG,SAA2B;oBAC5C,sBAAO,qBAAqB,CAAC,oBAAoB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,CAAC,EAAC;;;SAC1E;AAHD,CAGC,CAAC;AAEJ,IAAM,qBAAqB,GAAG,UAC5B,WAAmB,EACnB,QAAuB,EACvB,OAAoB;;;;;gBAEd,OAAO,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;gBACtC,IAAI,CAAC,OAAO,EAAE;oBACZ,MAAM,IAAI,wBAAwB,CAAC,aAAW,WAAW,oDAAiD,CAAC,CAAC;iBAC7G;gBACsB,QAAQ,GAA6E,OAAO,cAApF,EAAkB,SAAS,GAAkD,OAAO,eAAzD,EAAc,MAAM,GAA8B,OAAO,WAArC,EAAiB,QAAQ,GAAK,OAAO,cAAZ,CAAa;gBACpH,IAAI,CAAC,QAAQ,IAAI,CAAC,SAAS,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE;oBACnD,MAAM,IAAI,wBAAwB,CAAC,aAAW,WAAW,6CAA0C,CAAC,CAAC;iBACtG;gBACD,IAAI,CAAC,QAAQ,IAAI,CAAC,SAAS,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE;oBACnD,MAAM,IAAI,wBAAwB,CAChC,aAAW,WAAW,mGAA4F;wBAChH,0HAAsH,EACxH,4BAA4B,CAC7B,CAAC;iBACH;gBACK,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC;gBAC5B,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;gBAClD,SAAS,GAAG,IAAI,CAAC,UAAU,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAK,SAAS,UAAO,CAAC,CAAC;gBAElF,IAAI;oBACF,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,SAAS,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;oBACnE,IAAI,IAAI,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,gBAAgB,EAAE;wBACxE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;qBAC1C;iBACF;gBAAC,OAAO,CAAC,EAAE;oBACV,MAAM,IAAI,wBAAwB,CAChC,gHAAgH;wBAC9G,mDAAmD,EACrD,4BAA4B,CAC7B,CAAC;iBACH;gBACO,WAAW,GAAK,KAAK,YAAV,CAAW;gBACxB,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,IAAI,SAAS,CAAC,EAAE,MAAM,QAAA,EAAE,CAAC,CAAC;;;;gBAG/C,qBAAM,GAAG,CAAC,IAAI,CACtB,IAAI,yBAAyB,CAAC;wBAC5B,SAAS,WAAA;wBACT,QAAQ,UAAA;wBACR,WAAW,aAAA;qBACZ,CAAC,CACH,EAAA;;gBAND,OAAO,GAAG,SAMT,CAAC;;;;gBAEF,MAAM,wBAAwB,CAAC,IAAI,CAAC,GAAC,EAAE,4BAA4B,CAAC,CAAC;;gBAE/D,KAAqF,OAAO,gBAAZ,EAAhF,qBAA8E,EAAE,KAAA,EAA7D,WAAW,iBAAA,EAAE,eAAe,qBAAA,EAAE,YAAY,kBAAA,EAAE,UAAU,gBAAA,CAAoB;gBACrG,IAAI,CAAC,WAAW,IAAI,CAAC,eAAe,IAAI,CAAC,YAAY,IAAI,CAAC,UAAU,EAAE;oBACpE,MAAM,IAAI,wBAAwB,CAAC,8CAA8C,EAAE,4BAA4B,CAAC,CAAC;iBAClH;gBACD,sBAAO,EAAE,WAAW,aAAA,EAAE,eAAe,iBAAA,EAAE,YAAY,cAAA,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,UAAU,CAAC,EAAE,EAAC;;;KACzF,CAAC","sourcesContent":["import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from \"@aws-sdk/client-sso\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/credential-provider-ini\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { getHomeDir, ParsedIniData } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { createHash } from \"crypto\";\nimport { readFileSync } from \"fs\";\nimport { join } from \"path\";\n\n/**\n * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.\n * This is needed because server side may have invalidated the token before the defined expiration date.\n *\n * @internal\n */\nexport const EXPIRE_WINDOW_MS = 15 * 60 * 1000;\n\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\n\n/**\n * Cached SSO token retrieved from SSO login flow.\n */\ninterface SSOToken {\n  // A base64 encoded string returned by the sso-oidc service.\n  accessToken: string;\n  // RFC3339 format timestamp\n  expiresAt: string;\n  region?: string;\n  startUrl?: string;\n}\n\nexport interface FromSSOInit extends SourceProfileInit {\n  ssoClient?: SSOClient;\n}\n\n/**\n * Creates a credential provider that will read from a credential_process specified\n * in ini files.\n */\nexport const fromSSO =\n  (init: FromSSOInit = {}): CredentialProvider =>\n  async () => {\n    const profiles = await parseKnownFiles(init);\n    return resolveSSOCredentials(getMasterProfileName(init), profiles, init);\n  };\n\nconst resolveSSOCredentials = async (\n  profileName: string,\n  profiles: ParsedIniData,\n  options: FromSSOInit\n): Promise<Credentials> => {\n  const profile = profiles[profileName];\n  if (!profile) {\n    throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`);\n  }\n  const { sso_start_url: startUrl, sso_account_id: accountId, sso_region: region, sso_role_name: roleName } = profile;\n  if (!startUrl && !accountId && !region && !roleName) {\n    throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);\n  }\n  if (!startUrl || !accountId || !region || !roleName) {\n    throw new CredentialsProviderError(\n      `Profile ${profileName} does not have valid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", ` +\n        `\"sso_role_name\", \"sso_start_url\". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const hasher = createHash(\"sha1\");\n  const cacheName = hasher.update(startUrl).digest(\"hex\");\n  const tokenFile = join(getHomeDir(), \".aws\", \"sso\", \"cache\", `${cacheName}.json`);\n  let token: SSOToken;\n  try {\n    token = JSON.parse(readFileSync(tokenFile, { encoding: \"utf-8\" }));\n    if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {\n      throw new Error(\"SSO token is expired.\");\n    }\n  } catch (e) {\n    throw new CredentialsProviderError(\n      `The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session ` +\n        `run aws sso login with the corresponding profile.`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const { accessToken } = token;\n  const sso = options.ssoClient || new SSOClient({ region });\n  let ssoResp: GetRoleCredentialsCommandOutput;\n  try {\n    ssoResp = await sso.send(\n      new GetRoleCredentialsCommand({\n        accountId,\n        roleName,\n        accessToken,\n      })\n    );\n  } catch (e) {\n    throw CredentialsProviderError.from(e, SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration } = {} } = ssoResp;\n  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n    throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  return { accessKeyId, secretAccessKey, sessionToken, expiration: new Date(expiration) };\n};\n"]}
};
/**
* @internal
*/
export var validateSsoProfile = function (profile) {
var sso_start_url = profile.sso_start_url, sso_account_id = profile.sso_account_id, sso_region = profile.sso_region, sso_role_name = profile.sso_role_name;
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
throw new CredentialsProviderError("Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", " +
("\"sso_role_name\", \"sso_start_url\". Got " + Object.keys(profile).join(", ") + "\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html"), SHOULD_FAIL_CREDENTIAL_CHAIN);
}
return profile;
};
/**
* @internal
*/
export var isSsoProfile = function (arg) {
return arg &&
(typeof arg.sso_start_url === "string" ||
typeof arg.sso_account_id === "string" ||
typeof arg.sso_region === "string" ||
typeof arg.sso_role_name === "string");
};
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,yBAAyB,EAAmC,SAAS,EAAE,MAAM,qBAAqB,CAAC;AAC5G,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,UAAU,EAAW,MAAM,iCAAiC,CAAC;AAEtE,OAAO,EAAE,oBAAoB,EAAE,eAAe,EAAqB,MAAM,2BAA2B,CAAC;AACrG,OAAO,EAAE,UAAU,EAAE,MAAM,QAAQ,CAAC;AACpC,OAAO,EAAE,YAAY,EAAE,MAAM,IAAI,CAAC;AAClC,OAAO,EAAE,IAAI,EAAE,MAAM,MAAM,CAAC;AAE5B;;;;;GAKG;AACH,MAAM,CAAC,IAAM,gBAAgB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/C,IAAM,4BAA4B,GAAG,KAAK,CAAC;AAuC3C;;;GAGG;AACH,MAAM,CAAC,IAAM,OAAO,GAClB,UAAC,IAAiE;IAAjE,qBAAA,EAAA,OAAwD,EAAS;IAClE,OAAA;;;;;oBACU,WAAW,GAAsD,IAAI,YAA1D,EAAE,YAAY,GAAwC,IAAI,aAA5C,EAAE,SAAS,GAA6B,IAAI,UAAjC,EAAE,WAAW,GAAgB,IAAI,YAApB,EAAE,SAAS,GAAK,IAAI,UAAT,CAAU;yBAC1E,CAAA,CAAC,WAAW,IAAI,CAAC,YAAY,IAAI,CAAC,SAAS,IAAI,CAAC,WAAW,CAAA,EAA3D,wBAA2D;oBAE5C,qBAAM,eAAe,CAAC,IAAI,CAAC,EAAA;;oBAAtC,QAAQ,GAAG,SAA2B;oBACtC,WAAW,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACzC,OAAO,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;oBACtC,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,EAAE;wBAC1B,MAAM,IAAI,wBAAwB,CAAC,aAAW,WAAW,6CAA0C,CAAC,CAAC;qBACtG;oBACK,KAA+D,kBAAkB,CAAC,OAAO,CAAC,EAAxF,aAAa,mBAAA,EAAE,cAAc,oBAAA,EAAE,UAAU,gBAAA,EAAE,aAAa,mBAAA,CAAiC;oBACjG,sBAAO,qBAAqB,CAAC;4BAC3B,WAAW,EAAE,aAAa;4BAC1B,YAAY,EAAE,cAAc;4BAC5B,SAAS,EAAE,UAAU;4BACrB,WAAW,EAAE,aAAa;4BAC1B,SAAS,EAAE,SAAS;yBACrB,CAAC,EAAC;;oBACE,IAAI,CAAC,WAAW,IAAI,CAAC,YAAY,IAAI,CAAC,SAAS,IAAI,CAAC,WAAW,EAAE;wBACtE,MAAM,IAAI,wBAAwB,CAChC,mFAAmF;4BACjF,6CAA6C,CAChD,CAAC;qBACH;yBAAM;wBACL,sBAAO,qBAAqB,CAAC,EAAE,WAAW,aAAA,EAAE,YAAY,cAAA,EAAE,SAAS,WAAA,EAAE,WAAW,aAAA,EAAE,SAAS,WAAA,EAAE,CAAC,EAAC;qBAChG;;;;;SACF;AA1BD,CA0BC,CAAC;AAEJ,IAAM,qBAAqB,GAAG,UAAO,EAMI;QALvC,WAAW,iBAAA,EACX,YAAY,kBAAA,EACZ,SAAS,eAAA,EACT,WAAW,iBAAA,EACX,SAAS,eAAA;;;;;;oBAEH,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC;oBAC5B,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;oBACrD,SAAS,GAAG,IAAI,CAAC,UAAU,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAK,SAAS,UAAO,CAAC,CAAC;oBAElF,IAAI;wBACF,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,SAAS,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;wBACnE,IAAI,IAAI,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,gBAAgB,EAAE;4BACxE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;yBAC1C;qBACF;oBAAC,OAAO,CAAC,EAAE;wBACV,MAAM,IAAI,wBAAwB,CAChC,gHAAgH;4BAC9G,mDAAmD,EACrD,4BAA4B,CAC7B,CAAC;qBACH;oBACO,WAAW,GAAK,KAAK,YAAV,CAAW;oBACxB,GAAG,GAAG,SAAS,IAAI,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;;;;oBAGlD,qBAAM,GAAG,CAAC,IAAI,CACtB,IAAI,yBAAyB,CAAC;4BAC5B,SAAS,EAAE,YAAY;4BACvB,QAAQ,EAAE,WAAW;4BACrB,WAAW,aAAA;yBACZ,CAAC,CACH,EAAA;;oBAND,OAAO,GAAG,SAMT,CAAC;;;;oBAEF,MAAM,wBAAwB,CAAC,IAAI,CAAC,GAAC,EAAE,4BAA4B,CAAC,CAAC;;oBAE/D,KAAqF,OAAO,gBAAZ,EAAhF,qBAA8E,EAAE,KAAA,EAA7D,WAAW,iBAAA,EAAE,eAAe,qBAAA,EAAE,YAAY,kBAAA,EAAE,UAAU,gBAAA,CAAoB;oBACrG,IAAI,CAAC,WAAW,IAAI,CAAC,eAAe,IAAI,CAAC,YAAY,IAAI,CAAC,UAAU,EAAE;wBACpE,MAAM,IAAI,wBAAwB,CAAC,8CAA8C,EAAE,4BAA4B,CAAC,CAAC;qBAClH;oBACD,sBAAO,EAAE,WAAW,aAAA,EAAE,eAAe,iBAAA,EAAE,YAAY,cAAA,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,UAAU,CAAC,EAAE,EAAC;;;;CACzF,CAAC;AAYF;;GAEG;AACH,MAAM,CAAC,IAAM,kBAAkB,GAAG,UAAC,OAA4B;IACrD,IAAA,aAAa,GAAgD,OAAO,cAAvD,EAAE,cAAc,GAAgC,OAAO,eAAvC,EAAE,UAAU,GAAoB,OAAO,WAA3B,EAAE,aAAa,GAAK,OAAO,cAAZ,CAAa;IAC7E,IAAI,CAAC,aAAa,IAAI,CAAC,cAAc,IAAI,CAAC,UAAU,IAAI,CAAC,aAAa,EAAE;QACtE,MAAM,IAAI,wBAAwB,CAChC,8GAA0G;aACxG,+CAAyC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,IAAI,CAChE,IAAI,CACL,yFAAsF,CAAA,EACzF,4BAA4B,CAC7B,CAAC;KACH;IACD,OAAO,OAAqB,CAAC;AAC/B,CAAC,CAAC;AAEF;;GAEG;AACH,MAAM,CAAC,IAAM,YAAY,GAAG,UAAC,GAAY;IACvC,OAAA,GAAG;QACH,CAAC,OAAO,GAAG,CAAC,aAAa,KAAK,QAAQ;YACpC,OAAO,GAAG,CAAC,cAAc,KAAK,QAAQ;YACtC,OAAO,GAAG,CAAC,UAAU,KAAK,QAAQ;YAClC,OAAO,GAAG,CAAC,aAAa,KAAK,QAAQ,CAAC;AAJxC,CAIwC,CAAC","sourcesContent":["import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from \"@aws-sdk/client-sso\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { getHomeDir, Profile } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/util-credentials\";\nimport { createHash } from \"crypto\";\nimport { readFileSync } from \"fs\";\nimport { join } from \"path\";\n\n/**\n * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.\n * This is needed because server side may have invalidated the token before the defined expiration date.\n *\n * @internal\n */\nexport const EXPIRE_WINDOW_MS = 15 * 60 * 1000;\n\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\n\n/**\n * Cached SSO token retrieved from SSO login flow.\n */\ninterface SSOToken {\n  // A base64 encoded string returned by the sso-oidc service.\n  accessToken: string;\n  // RFC3339 format timestamp\n  expiresAt: string;\n  region?: string;\n  startUrl?: string;\n}\n\nexport interface SsoCredentialsParameters {\n  /**\n   * The URL to the AWS SSO service.\n   */\n  ssoStartUrl: string;\n\n  /**\n   * The ID of the AWS account to use for temporary credentials.\n   */\n  ssoAccountId: string;\n\n  /**\n   * The AWS region to use for temporary credentials.\n   */\n  ssoRegion: string;\n\n  /**\n   * The name of the AWS role to assume.\n   */\n  ssoRoleName: string;\n}\nexport interface FromSSOInit extends SourceProfileInit {\n  ssoClient?: SSOClient;\n}\n\n/**\n * Creates a credential provider that will read from a credential_process specified\n * in ini files.\n */\nexport const fromSSO =\n  (init: FromSSOInit & Partial<SsoCredentialsParameters> = {} as any): CredentialProvider =>\n  async () => {\n    const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient } = init;\n    if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName) {\n      // Load the SSO config from shared AWS config file.\n      const profiles = await parseKnownFiles(init);\n      const profileName = getMasterProfileName(init);\n      const profile = profiles[profileName];\n      if (!isSsoProfile(profile)) {\n        throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);\n      }\n      const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(profile);\n      return resolveSSOCredentials({\n        ssoStartUrl: sso_start_url,\n        ssoAccountId: sso_account_id,\n        ssoRegion: sso_region,\n        ssoRoleName: sso_role_name,\n        ssoClient: ssoClient,\n      });\n    } else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n      throw new CredentialsProviderError(\n        'Incomplete configuration. The fromSSO() argument hash must include \"ssoStartUrl\",' +\n          ' \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"'\n      );\n    } else {\n      return resolveSSOCredentials({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient });\n    }\n  };\n\nconst resolveSSOCredentials = async ({\n  ssoStartUrl,\n  ssoAccountId,\n  ssoRegion,\n  ssoRoleName,\n  ssoClient,\n}: FromSSOInit & SsoCredentialsParameters): Promise<Credentials> => {\n  const hasher = createHash(\"sha1\");\n  const cacheName = hasher.update(ssoStartUrl).digest(\"hex\");\n  const tokenFile = join(getHomeDir(), \".aws\", \"sso\", \"cache\", `${cacheName}.json`);\n  let token: SSOToken;\n  try {\n    token = JSON.parse(readFileSync(tokenFile, { encoding: \"utf-8\" }));\n    if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {\n      throw new Error(\"SSO token is expired.\");\n    }\n  } catch (e) {\n    throw new CredentialsProviderError(\n      `The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session ` +\n        `run aws sso login with the corresponding profile.`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const { accessToken } = token;\n  const sso = ssoClient || new SSOClient({ region: ssoRegion });\n  let ssoResp: GetRoleCredentialsCommandOutput;\n  try {\n    ssoResp = await sso.send(\n      new GetRoleCredentialsCommand({\n        accountId: ssoAccountId,\n        roleName: ssoRoleName,\n        accessToken,\n      })\n    );\n  } catch (e) {\n    throw CredentialsProviderError.from(e, SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration } = {} } = ssoResp;\n  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n    throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  return { accessKeyId, secretAccessKey, sessionToken, expiration: new Date(expiration) };\n};\n\n/**\n * @internal\n */\nexport interface SsoProfile extends Profile {\n  sso_start_url: string;\n  sso_account_id: string;\n  sso_region: string;\n  sso_role_name: string;\n}\n\n/**\n * @internal\n */\nexport const validateSsoProfile = (profile: Partial<SsoProfile>): SsoProfile => {\n  const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n  if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n    throw new CredentialsProviderError(\n      `Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", ` +\n        `\"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\n          \", \"\n        )}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  return profile as SsoProfile;\n};\n\n/**\n * @internal\n */\nexport const isSsoProfile = (arg: Profile): arg is Partial<SsoProfile> =>\n  arg &&\n  (typeof arg.sso_start_url === \"string\" ||\n    typeof arg.sso_account_id === \"string\" ||\n    typeof arg.sso_region === \"string\" ||\n    typeof arg.sso_role_name === \"string\");\n"]}
import { SSOClient } from "@aws-sdk/client-sso";
import { SourceProfileInit } from "@aws-sdk/credential-provider-ini";
import { Profile } from "@aws-sdk/shared-ini-file-loader";
import { CredentialProvider } from "@aws-sdk/types";
import { SourceProfileInit } from "@aws-sdk/util-credentials";
/**

@@ -11,2 +12,20 @@ * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.

export declare const EXPIRE_WINDOW_MS: number;
export interface SsoCredentialsParameters {
/**
* The URL to the AWS SSO service.
*/
ssoStartUrl: string;
/**
* The ID of the AWS account to use for temporary credentials.
*/
ssoAccountId: string;
/**
* The AWS region to use for temporary credentials.
*/
ssoRegion: string;
/**
* The name of the AWS role to assume.
*/
ssoRoleName: string;
}
export interface FromSSOInit extends SourceProfileInit {

@@ -19,2 +38,19 @@ ssoClient?: SSOClient;

*/
export declare const fromSSO: (init?: FromSSOInit) => CredentialProvider;
export declare const fromSSO: (init?: FromSSOInit & Partial<SsoCredentialsParameters>) => CredentialProvider;
/**
* @internal
*/
export interface SsoProfile extends Profile {
sso_start_url: string;
sso_account_id: string;
sso_region: string;
sso_role_name: string;
}
/**
* @internal
*/
export declare const validateSsoProfile: (profile: Partial<SsoProfile>) => SsoProfile;
/**
* @internal
*/
export declare const isSsoProfile: (arg: Profile) => arg is Partial<SsoProfile>;
import { SSOClient } from "@aws-sdk/client-sso";
import { SourceProfileInit } from "@aws-sdk/credential-provider-ini";
import { Profile } from "@aws-sdk/shared-ini-file-loader";
import { CredentialProvider } from "@aws-sdk/types";
import { SourceProfileInit } from "@aws-sdk/util-credentials";
/**

@@ -11,2 +12,20 @@ * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.

export declare const EXPIRE_WINDOW_MS: number;
export interface SsoCredentialsParameters {
/**
* The URL to the AWS SSO service.
*/
ssoStartUrl: string;
/**
* The ID of the AWS account to use for temporary credentials.
*/
ssoAccountId: string;
/**
* The AWS region to use for temporary credentials.
*/
ssoRegion: string;
/**
* The name of the AWS role to assume.
*/
ssoRoleName: string;
}
export interface FromSSOInit extends SourceProfileInit {

@@ -19,2 +38,19 @@ ssoClient?: SSOClient;

*/
export declare const fromSSO: (init?: FromSSOInit) => CredentialProvider;
export declare const fromSSO: (init?: FromSSOInit & Partial<SsoCredentialsParameters>) => CredentialProvider;
/**
* @internal
*/
export interface SsoProfile extends Profile {
sso_start_url: string;
sso_account_id: string;
sso_region: string;
sso_role_name: string;
}
/**
* @internal
*/
export declare const validateSsoProfile: (profile: Partial<SsoProfile>) => SsoProfile;
/**
* @internal
*/
export declare const isSsoProfile: (arg: Profile) => arg is Partial<SsoProfile>;
{
"name": "@aws-sdk/credential-provider-sso",
"version": "3.21.0",
"version": "3.22.0",
"description": "AWS credential provider that exchanges a resolved SSO login token file for temporary AWS credentials",

@@ -24,7 +24,7 @@ "main": "./dist/cjs/index.js",

"dependencies": {
"@aws-sdk/client-sso": "3.21.0",
"@aws-sdk/credential-provider-ini": "3.20.0",
"@aws-sdk/property-provider": "3.20.0",
"@aws-sdk/shared-ini-file-loader": "3.20.0",
"@aws-sdk/types": "3.20.0",
"@aws-sdk/client-sso": "3.22.0",
"@aws-sdk/property-provider": "3.22.0",
"@aws-sdk/shared-ini-file-loader": "3.22.0",
"@aws-sdk/types": "3.22.0",
"@aws-sdk/util-credentials": "3.22.0",
"tslib": "^2.0.0"

@@ -44,4 +44,4 @@ },

"<4.0": {
"types/*": [
"types/ts3.4/*"
"dist/types/*": [
"dist/types/ts3.4/*"
]

@@ -48,0 +48,0 @@ }

@@ -9,7 +9,3 @@ # @aws-sdk/credential-provider-sso

This module provides a function, `fromSSO`, that creates
`CredentialProvider` functions that read from [AWS SDKs and Tools
shared configuration and credentials
files](https://docs.aws.amazon.com/credref/latest/refdocs/creds-config-files.html).
Profiles in the `credentials` file are given precedence over
profiles in the `config` file. This provider loads the
`CredentialProvider` functions that read from the
_resolved_ access token from local disk then requests temporary AWS

@@ -19,2 +15,15 @@ credentials. For guidance on the AWS Single Sign-On service, please

You can create the `CredentialProvider` functions using the inline SSO
parameters(`ssoStartUrl`, `ssoAccountId`, `ssoRegion`, `ssoRoleName`) or load
them from [AWS SDKs and Tools shared configuration and credentials files](https://docs.aws.amazon.com/credref/latest/refdocs/creds-config-files.html).
Profiles in the `credentials` file are given precedence over
profiles in the `config` file.
This credential provider is intended for use with the AWS SDK for Node.js.
This credential provider **ONLY** supports profiles using the SSO credential. If
you have a profile that assumes a role which derived from the SSO credential,
you should use the `@aws-sdk/credential-provider-ini`, or
`@aws-sdk/credential-provider-node` package.
## Supported configuration

@@ -25,2 +34,10 @@

- `ssoStartUrl`: The URL to the AWS SSO service. Required if any of the `sso*`
options(except for `ssoClient`) is provided.
- `ssoAccountId`: The ID of the AWS account to use for temporary credentials.
Required if any of the `sso*` options(except for `ssoClient`) is provided.
- `ssoRegion`: The AWS region to use for temporary credentials. Required if any
of the `sso*` options(except for `ssoClient`) is provided.
- `ssoRoleName`: The name of the AWS role to assume. Required if any of the
`sso*` options(except for `ssoClient`) is provided.
- `profile` - The configuration profile to use. If not specified, the provider

@@ -27,0 +44,0 @@ will use the value in the `AWS_PROFILE` environment variable or `default` by

@@ -5,6 +5,6 @@ jest.useFakeTimers("modern");

const mockParseKnowFiles = jest.fn();
const mockParseKnownFiles = jest.fn();
const mockGetMasterProfileName = jest.fn();
jest.mock("@aws-sdk/credential-provider-ini", () => ({
parseKnownFiles: mockParseKnowFiles,
jest.mock("@aws-sdk/util-credentials", () => ({
parseKnownFiles: mockParseKnownFiles,
getMasterProfileName: mockGetMasterProfileName,

@@ -40,17 +40,16 @@ }));

describe("fromSSO", () => {
const ssoConfig = {
sso_start_url: "https:some-url/start",
sso_account_id: "1234567890",
sso_region: "us-foo-1",
sso_role_name: "some-role",
};
describe("fromSSO()", () => {
const ssoStartUrl = "https:some-url/start";
const ssoAccountId = "1234567890";
const ssoRegion = "us-foo-1";
const ssoRoleName = "some-role";
const token = {
startUrl: ssoConfig.sso_start_url,
region: ssoConfig.sso_region,
startUrl: ssoStartUrl,
region: ssoRegion,
accessToken: "base64 encoded string",
expiresAt: toRFC3339String(now + 60 * 60 * 1000),
};
beforeEach(() => {
mockParseKnowFiles.mockClear();
mockParseKnownFiles.mockClear();
mockGetMasterProfileName.mockClear();

@@ -61,57 +60,64 @@ mockReadFileSync.mockClear();

it("should fetch credentials from resolved token file", async () => {
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
mockReadFileSync.mockReturnValue(JSON.stringify(token));
const { roleCredentials } = mockRoleCredentials;
expect(await fromSSO()()).toEqual({ ...roleCredentials, expiration: new Date(roleCredentials.expiration) });
expect(mockReadFileSync.mock.calls[0][0]).toEqual(
expect.stringMatching(/fcab95d6966151d97d9ee7776a90d895b5e5fbe6.json$/)
);
expect(mockReadFileSync.mock.calls[0][1]).toMatchObject({ encoding: "utf-8" });
expect(mockGetRoleCredentialsCommand).toHaveBeenCalledWith({
accountId: ssoConfig.sso_account_id,
roleName: ssoConfig.sso_role_name,
accessToken: token.accessToken,
describe("load from shared config file", () => {
const ssoConfig = {
sso_start_url: ssoStartUrl,
sso_account_id: ssoAccountId,
sso_region: ssoRegion,
sso_role_name: ssoRoleName,
};
it("should fetch credentials from resolved token file", async () => {
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
mockReadFileSync.mockReturnValue(JSON.stringify(token));
const { roleCredentials } = mockRoleCredentials;
expect(await fromSSO()()).toEqual({ ...roleCredentials, expiration: new Date(roleCredentials.expiration) });
expect(mockReadFileSync.mock.calls[0][0]).toEqual(
expect.stringMatching(/fcab95d6966151d97d9ee7776a90d895b5e5fbe6.json$/)
);
expect(mockReadFileSync.mock.calls[0][1]).toMatchObject({ encoding: "utf-8" });
expect(mockGetRoleCredentialsCommand).toHaveBeenCalledWith({
accountId: ssoConfig.sso_account_id,
roleName: ssoConfig.sso_role_name,
accessToken: token.accessToken,
});
});
});
it("should allow supplying custom client", async () => {
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
mockReadFileSync.mockReturnValue(JSON.stringify(token));
const newSSOClient = { send: jest.fn().mockReturnValue(Promise.resolve(mockRoleCredentials)) };
//@ts-expect-error
await fromSSO({ ssoClient: newSSOClient })();
expect(newSSOClient.send).toHaveBeenCalled();
expect(mockSSOSend).not.toHaveBeenCalled();
});
it("should allow supplying custom client", async () => {
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
mockReadFileSync.mockReturnValue(JSON.stringify(token));
const newSSOClient = { send: jest.fn().mockReturnValue(Promise.resolve(mockRoleCredentials)) };
//@ts-expect-error
await fromSSO({ ssoClient: newSSOClient })();
expect(newSSOClient.send).toHaveBeenCalled();
expect(mockSSOSend).not.toHaveBeenCalled();
});
it("should throw if profile doesn't exist in the config files", () => {
const profile = "exist";
mockParseKnowFiles.mockReturnValue(Promise.resolve({ non_exist: { foo: "bar" } }));
mockGetMasterProfileName.mockReturnValue(profile);
return expect(async () => {
await fromSSO()();
}).rejects.toMatchObject({
message: `Profile ${profile} could not be found in shared credentials file.`,
tryNextLink: true,
it("should throw if profile doesn't exist in the config files", () => {
const profile = "exist";
mockParseKnownFiles.mockReturnValue(Promise.resolve({ non_exist: { foo: "bar" } }));
mockGetMasterProfileName.mockReturnValue(profile);
return expect(async () => {
await fromSSO()();
}).rejects.toMatchObject({
name: "CredentialsProviderError",
message: expect.stringContaining("Profile exist is not configured with SSO credentials"),
tryNextLink: true,
});
});
});
it("should throw if profile is not configured with SSO credential", () => {
const profile = "exist";
mockParseKnowFiles.mockReturnValue(Promise.resolve({ [profile]: { foo: "bar" } }));
mockGetMasterProfileName.mockReturnValue(profile);
return expect(async () => {
await fromSSO()();
}).rejects.toMatchObject({
message: `Profile ${profile} is not configured with SSO credentials.`,
tryNextLink: true,
it("should throw if profile is not configured with SSO credential", () => {
const profile = "exist";
mockParseKnownFiles.mockReturnValue(Promise.resolve({ [profile]: { foo: "bar" } }));
mockGetMasterProfileName.mockReturnValue(profile);
return expect(async () => {
await fromSSO()();
}).rejects.toMatchObject({
message: `Profile ${profile} is not configured with SSO credentials.`,
tryNextLink: true,
});
});
});
for (let i = 0; i < Object.keys(ssoConfig).length; i++) {
const keyToRemove = Object.keys(ssoConfig)[i];
it(`should throw if sso configuration is missing ${keyToRemove}`, async () => {
it.each(Object.keys(ssoConfig))("should throw if sso configuration is missing %s", async (keyToRemove) => {
expect.assertions(2);

@@ -121,3 +127,3 @@ const config = { ...ssoConfig };

delete config[keyToRemove];
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: config }));
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: config }));
mockGetMasterProfileName.mockReturnValue("default");

@@ -127,84 +133,140 @@ try {

} catch (e) {
expect(e.message).toContain("Profile default does not have valid SSO credentials.");
expect(e.message).toContain("Profile is configured with invalid SSO credentials.");
expect(e.tryNextLink).toBeFalsy();
}
});
}
it("should throw if token cache file is not found", async () => {
expect.assertions(2);
mockReadFileSync.mockImplementation(() => {
throw new Error("File not found.");
it("should throw if token cache file is not found", async () => {
expect.assertions(2);
mockReadFileSync.mockImplementation(() => {
throw new Error("File not found.");
});
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain(
"The SSO session associated with this profile has expired or is otherwise invalid."
);
expect(e.tryNextLink).toBeFalsy();
}
});
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain("The SSO session associated with this profile has expired or is otherwise invalid.");
expect(e.tryNextLink).toBeFalsy();
}
});
it("should throw if token cache file is invalid", async () => {
expect.assertions(2);
mockReadFileSync.mockReturnValue("invalid JSON content");
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain("The SSO session associated with this profile has expired or is otherwise invalid.");
expect(e.tryNextLink).toBeFalsy();
}
});
it("should throw if token cache file is invalid", async () => {
expect.assertions(2);
mockReadFileSync.mockReturnValue("invalid JSON content");
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain(
"The SSO session associated with this profile has expired or is otherwise invalid."
);
expect(e.tryNextLink).toBeFalsy();
}
});
it("should throw if token cache is expired", async () => {
expect.assertions(2);
mockReadFileSync.mockReturnValue({ ...token, expiration: toRFC3339String(now + EXPIRE_WINDOW_MS - 2) });
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain("The SSO session associated with this profile has expired or is otherwise invalid.");
expect(e.tryNextLink).toBeFalsy();
}
});
it("should throw if token cache is expired", async () => {
expect.assertions(2);
mockReadFileSync.mockReturnValue({ ...token, expiration: toRFC3339String(now + EXPIRE_WINDOW_MS - 2) });
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain(
"The SSO session associated with this profile has expired or is otherwise invalid."
);
expect(e.tryNextLink).toBeFalsy();
}
});
it("should throw if SSO client throws", async () => {
expect.assertions(3);
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
mockReadFileSync.mockReturnValue(JSON.stringify(token));
const clientError = new Error("No account is found for the user");
//@ts-ignore
clientError.$fault = "client";
mockSSOSend.mockImplementation(async () => {
throw clientError;
it("should throw if SSO client throws", async () => {
expect.assertions(3);
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
mockReadFileSync.mockReturnValue(JSON.stringify(token));
const clientError = new Error("No account is found for the user");
//@ts-ignore
clientError.$fault = "client";
mockSSOSend.mockImplementation(async () => {
throw clientError;
});
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain(clientError.message);
expect(e.tryNextLink).toBeFalsy();
expect(e.$fault).toBe("client");
}
});
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain(clientError.message);
expect(e.tryNextLink).toBeFalsy();
expect(e.$fault).toBe("client");
}
it("should throw if credentials from SSO client is invalid", async () => {
expect.assertions(2);
mockReadFileSync.mockReturnValue(JSON.stringify(token));
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
mockSSOSend.mockResolvedValue({
roleCredentials: { ...mockRoleCredentials.roleCredentials, accessKeyId: undefined },
});
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain("SSO returns an invalid temporary credential.");
expect(e.tryNextLink).toBeFalsy();
} finally {
mockSSOSend.mockResolvedValue(mockRoleCredentials);
}
});
});
it("should throw if credentials from SSO client is invalid", async () => {
expect.assertions(2);
mockReadFileSync.mockReturnValue(JSON.stringify(token));
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig }));
mockGetMasterProfileName.mockReturnValue("default");
mockSSOSend.mockResolvedValue({
roleCredentials: { ...mockRoleCredentials.roleCredentials, accessKeyId: undefined },
describe("load with sso parameters", () => {
it("should fetch credentials from resolved token file without reading shared config file", async () => {
mockParseKnownFiles.mockRejectedValue("Should not call parseKnownFiles()");
mockGetMasterProfileName.mockRejectedValue("Should not call getMasterProfileName()");
mockReadFileSync.mockReturnValue(JSON.stringify(token));
const { roleCredentials } = mockRoleCredentials;
expect(
await fromSSO({
ssoStartUrl,
ssoAccountId,
ssoRegion,
ssoRoleName,
})()
).toEqual({ ...roleCredentials, expiration: new Date(roleCredentials.expiration) });
expect(mockReadFileSync.mock.calls[0][0]).toEqual(
expect.stringMatching(/fcab95d6966151d97d9ee7776a90d895b5e5fbe6.json$/)
);
expect(mockReadFileSync.mock.calls[0][1]).toMatchObject({ encoding: "utf-8" });
expect(mockGetRoleCredentialsCommand).toHaveBeenCalledWith({
accountId: ssoAccountId,
roleName: ssoRoleName,
accessToken: token.accessToken,
});
});
try {
await fromSSO()();
} catch (e) {
expect(e.message).toContain("SSO returns an invalid temporary credential.");
expect(e.tryNextLink).toBeFalsy();
}
it.each(["ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"])(
"should throw for incomplete sso parameters(missing %s)",
(undefinedKey) => {
mockParseKnownFiles.mockRejectedValue("Should not call parseKnownFiles()");
mockGetMasterProfileName.mockRejectedValue("Should not call getMasterProfileName()");
mockReadFileSync.mockReturnValue(JSON.stringify(token));
return expect(
async () =>
await fromSSO({
ssoStartUrl,
ssoAccountId,
ssoRegion,
ssoRoleName,
...{ [undefinedKey]: undefined },
} as any)()
).rejects.toMatchObject({
name: "CredentialsProviderError",
message: expect.stringMatching("Incomplete configuration"),
});
}
);
});
});
import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from "@aws-sdk/client-sso";
import { getMasterProfileName, parseKnownFiles, SourceProfileInit } from "@aws-sdk/credential-provider-ini";
import { CredentialsProviderError } from "@aws-sdk/property-provider";
import { getHomeDir, ParsedIniData } from "@aws-sdk/shared-ini-file-loader";
import { getHomeDir, Profile } from "@aws-sdk/shared-ini-file-loader";
import { CredentialProvider, Credentials } from "@aws-sdk/types";
import { getMasterProfileName, parseKnownFiles, SourceProfileInit } from "@aws-sdk/util-credentials";
import { createHash } from "crypto";

@@ -32,2 +32,23 @@ import { readFileSync } from "fs";

export interface SsoCredentialsParameters {
/**
* The URL to the AWS SSO service.
*/
ssoStartUrl: string;
/**
* The ID of the AWS account to use for temporary credentials.
*/
ssoAccountId: string;
/**
* The AWS region to use for temporary credentials.
*/
ssoRegion: string;
/**
* The name of the AWS role to assume.
*/
ssoRoleName: string;
}
export interface FromSSOInit extends SourceProfileInit {

@@ -42,30 +63,40 @@ ssoClient?: SSOClient;

export const fromSSO =
(init: FromSSOInit = {}): CredentialProvider =>
(init: FromSSOInit & Partial<SsoCredentialsParameters> = {} as any): CredentialProvider =>
async () => {
const profiles = await parseKnownFiles(init);
return resolveSSOCredentials(getMasterProfileName(init), profiles, init);
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient } = init;
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName) {
// Load the SSO config from shared AWS config file.
const profiles = await parseKnownFiles(init);
const profileName = getMasterProfileName(init);
const profile = profiles[profileName];
if (!isSsoProfile(profile)) {
throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);
}
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(profile);
return resolveSSOCredentials({
ssoStartUrl: sso_start_url,
ssoAccountId: sso_account_id,
ssoRegion: sso_region,
ssoRoleName: sso_role_name,
ssoClient: ssoClient,
});
} else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {
throw new CredentialsProviderError(
'Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl",' +
' "ssoAccountId", "ssoRegion", "ssoRoleName"'
);
} else {
return resolveSSOCredentials({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient });
}
};
const resolveSSOCredentials = async (
profileName: string,
profiles: ParsedIniData,
options: FromSSOInit
): Promise<Credentials> => {
const profile = profiles[profileName];
if (!profile) {
throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`);
}
const { sso_start_url: startUrl, sso_account_id: accountId, sso_region: region, sso_role_name: roleName } = profile;
if (!startUrl && !accountId && !region && !roleName) {
throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);
}
if (!startUrl || !accountId || !region || !roleName) {
throw new CredentialsProviderError(
`Profile ${profileName} does not have valid SSO credentials. Required parameters "sso_account_id", "sso_region", ` +
`"sso_role_name", "sso_start_url". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,
SHOULD_FAIL_CREDENTIAL_CHAIN
);
}
const resolveSSOCredentials = async ({
ssoStartUrl,
ssoAccountId,
ssoRegion,
ssoRoleName,
ssoClient,
}: FromSSOInit & SsoCredentialsParameters): Promise<Credentials> => {
const hasher = createHash("sha1");
const cacheName = hasher.update(startUrl).digest("hex");
const cacheName = hasher.update(ssoStartUrl).digest("hex");
const tokenFile = join(getHomeDir(), ".aws", "sso", "cache", `${cacheName}.json`);

@@ -86,3 +117,3 @@ let token: SSOToken;

const { accessToken } = token;
const sso = options.ssoClient || new SSOClient({ region });
const sso = ssoClient || new SSOClient({ region: ssoRegion });
let ssoResp: GetRoleCredentialsCommandOutput;

@@ -92,4 +123,4 @@ try {

new GetRoleCredentialsCommand({
accountId,
roleName,
accountId: ssoAccountId,
roleName: ssoRoleName,
accessToken,

@@ -107,1 +138,38 @@ })

};
/**
* @internal
*/
export interface SsoProfile extends Profile {
sso_start_url: string;
sso_account_id: string;
sso_region: string;
sso_role_name: string;
}
/**
* @internal
*/
export const validateSsoProfile = (profile: Partial<SsoProfile>): SsoProfile => {
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {
throw new CredentialsProviderError(
`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", ` +
`"sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(
", "
)}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,
SHOULD_FAIL_CREDENTIAL_CHAIN
);
}
return profile as SsoProfile;
};
/**
* @internal
*/
export const isSsoProfile = (arg: Profile): arg is Partial<SsoProfile> =>
arg &&
(typeof arg.sso_start_url === "string" ||
typeof arg.sso_account_id === "string" ||
typeof arg.sso_region === "string" ||
typeof arg.sso_role_name === "string");

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc