@aws-sdk/credential-provider-sso
Advanced tools
Comparing version 3.21.0 to 3.22.0
@@ -6,2 +6,18 @@ # Change Log | ||
# [3.22.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.21.0...v3.22.0) (2021-07-16) | ||
### Bug Fixes | ||
* **clients:** prefix `dist/` for typesVersions TS<4 ([#2580](https://github.com/aws/aws-sdk-js-v3/issues/2580)) ([dff5cd4](https://github.com/aws/aws-sdk-js-v3/commit/dff5cd4b6fa00453e938ce8f238c1542ee7ba3d6)) | ||
### Features | ||
* **credential-provider-sso:** support sso credential when resolving shared credential file ([#2583](https://github.com/aws/aws-sdk-js-v3/issues/2583)) ([9480e70](https://github.com/aws/aws-sdk-js-v3/commit/9480e70da4ac59d4d08f01702b4e62bf42397394)) | ||
# [3.21.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.20.0...v3.21.0) (2021-07-09) | ||
@@ -8,0 +24,0 @@ |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.fromSSO = exports.EXPIRE_WINDOW_MS = void 0; | ||
exports.isSsoProfile = exports.validateSsoProfile = exports.fromSSO = exports.EXPIRE_WINDOW_MS = void 0; | ||
const client_sso_1 = require("@aws-sdk/client-sso"); | ||
const credential_provider_ini_1 = require("@aws-sdk/credential-provider-ini"); | ||
const property_provider_1 = require("@aws-sdk/property-provider"); | ||
const shared_ini_file_loader_1 = require("@aws-sdk/shared-ini-file-loader"); | ||
const util_credentials_1 = require("@aws-sdk/util-credentials"); | ||
const crypto_1 = require("crypto"); | ||
@@ -24,21 +24,32 @@ const fs_1 = require("fs"); | ||
const fromSSO = (init = {}) => async () => { | ||
const profiles = await credential_provider_ini_1.parseKnownFiles(init); | ||
return resolveSSOCredentials(credential_provider_ini_1.getMasterProfileName(init), profiles, init); | ||
}; | ||
exports.fromSSO = fromSSO; | ||
const resolveSSOCredentials = async (profileName, profiles, options) => { | ||
const profile = profiles[profileName]; | ||
if (!profile) { | ||
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`); | ||
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient } = init; | ||
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName) { | ||
// Load the SSO config from shared AWS config file. | ||
const profiles = await util_credentials_1.parseKnownFiles(init); | ||
const profileName = util_credentials_1.getMasterProfileName(init); | ||
const profile = profiles[profileName]; | ||
if (!exports.isSsoProfile(profile)) { | ||
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`); | ||
} | ||
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = exports.validateSsoProfile(profile); | ||
return resolveSSOCredentials({ | ||
ssoStartUrl: sso_start_url, | ||
ssoAccountId: sso_account_id, | ||
ssoRegion: sso_region, | ||
ssoRoleName: sso_role_name, | ||
ssoClient: ssoClient, | ||
}); | ||
} | ||
const { sso_start_url: startUrl, sso_account_id: accountId, sso_region: region, sso_role_name: roleName } = profile; | ||
if (!startUrl && !accountId && !region && !roleName) { | ||
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`); | ||
else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) { | ||
throw new property_provider_1.CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl",' + | ||
' "ssoAccountId", "ssoRegion", "ssoRoleName"'); | ||
} | ||
if (!startUrl || !accountId || !region || !roleName) { | ||
throw new property_provider_1.CredentialsProviderError(`Profile ${profileName} does not have valid SSO credentials. Required parameters "sso_account_id", "sso_region", ` + | ||
`"sso_role_name", "sso_start_url". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
else { | ||
return resolveSSOCredentials({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient }); | ||
} | ||
}; | ||
exports.fromSSO = fromSSO; | ||
const resolveSSOCredentials = async ({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, }) => { | ||
const hasher = crypto_1.createHash("sha1"); | ||
const cacheName = hasher.update(startUrl).digest("hex"); | ||
const cacheName = hasher.update(ssoStartUrl).digest("hex"); | ||
const tokenFile = path_1.join(shared_ini_file_loader_1.getHomeDir(), ".aws", "sso", "cache", `${cacheName}.json`); | ||
@@ -57,8 +68,8 @@ let token; | ||
const { accessToken } = token; | ||
const sso = options.ssoClient || new client_sso_1.SSOClient({ region }); | ||
const sso = ssoClient || new client_sso_1.SSOClient({ region: ssoRegion }); | ||
let ssoResp; | ||
try { | ||
ssoResp = await sso.send(new client_sso_1.GetRoleCredentialsCommand({ | ||
accountId, | ||
roleName, | ||
accountId: ssoAccountId, | ||
roleName: ssoRoleName, | ||
accessToken, | ||
@@ -76,2 +87,23 @@ })); | ||
}; | ||
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;AAAA,oDAA4G;AAC5G,8EAA4G;AAC5G,kEAAsE;AACtE,4EAA4E;AAE5E,mCAAoC;AACpC,2BAAkC;AAClC,+BAA4B;AAE5B;;;;;GAKG;AACU,QAAA,gBAAgB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/C,MAAM,4BAA4B,GAAG,KAAK,CAAC;AAkB3C;;;GAGG;AACI,MAAM,OAAO,GAClB,CAAC,OAAoB,EAAE,EAAsB,EAAE,CAC/C,KAAK,IAAI,EAAE;IACT,MAAM,QAAQ,GAAG,MAAM,yCAAe,CAAC,IAAI,CAAC,CAAC;IAC7C,OAAO,qBAAqB,CAAC,8CAAoB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,CAAC,CAAC;AAC3E,CAAC,CAAC;AALS,QAAA,OAAO,WAKhB;AAEJ,MAAM,qBAAqB,GAAG,KAAK,EACjC,WAAmB,EACnB,QAAuB,EACvB,OAAoB,EACE,EAAE;IACxB,MAAM,OAAO,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE;QACZ,MAAM,IAAI,4CAAwB,CAAC,WAAW,WAAW,iDAAiD,CAAC,CAAC;KAC7G;IACD,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,cAAc,EAAE,SAAS,EAAE,UAAU,EAAE,MAAM,EAAE,aAAa,EAAE,QAAQ,EAAE,GAAG,OAAO,CAAC;IACpH,IAAI,CAAC,QAAQ,IAAI,CAAC,SAAS,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE;QACnD,MAAM,IAAI,4CAAwB,CAAC,WAAW,WAAW,0CAA0C,CAAC,CAAC;KACtG;IACD,IAAI,CAAC,QAAQ,IAAI,CAAC,SAAS,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE;QACnD,MAAM,IAAI,4CAAwB,CAChC,WAAW,WAAW,4FAA4F;YAChH,sHAAsH,EACxH,4BAA4B,CAC7B,CAAC;KACH;IACD,MAAM,MAAM,GAAG,mBAAU,CAAC,MAAM,CAAC,CAAC;IAClC,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IACxD,MAAM,SAAS,GAAG,WAAI,CAAC,mCAAU,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,SAAS,OAAO,CAAC,CAAC;IAClF,IAAI,KAAe,CAAC;IACpB,IAAI;QACF,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,iBAAY,CAAC,SAAS,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;QACnE,IAAI,IAAI,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,wBAAgB,EAAE;YACxE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;SAC1C;KACF;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,IAAI,4CAAwB,CAChC,gHAAgH;YAC9G,mDAAmD,EACrD,4BAA4B,CAC7B,CAAC;KACH;IACD,MAAM,EAAE,WAAW,EAAE,GAAG,KAAK,CAAC;IAC9B,MAAM,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,IAAI,sBAAS,CAAC,EAAE,MAAM,EAAE,CAAC,CAAC;IAC3D,IAAI,OAAwC,CAAC;IAC7C,IAAI;QACF,OAAO,GAAG,MAAM,GAAG,CAAC,IAAI,CACtB,IAAI,sCAAyB,CAAC;YAC5B,SAAS;YACT,QAAQ;YACR,WAAW;SACZ,CAAC,CACH,CAAC;KACH;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,4CAAwB,CAAC,IAAI,CAAC,CAAC,EAAE,4BAA4B,CAAC,CAAC;KACtE;IACD,MAAM,EAAE,eAAe,EAAE,EAAE,WAAW,EAAE,eAAe,EAAE,YAAY,EAAE,UAAU,EAAE,GAAG,EAAE,EAAE,GAAG,OAAO,CAAC;IACrG,IAAI,CAAC,WAAW,IAAI,CAAC,eAAe,IAAI,CAAC,YAAY,IAAI,CAAC,UAAU,EAAE;QACpE,MAAM,IAAI,4CAAwB,CAAC,8CAA8C,EAAE,4BAA4B,CAAC,CAAC;KAClH;IACD,OAAO,EAAE,WAAW,EAAE,eAAe,EAAE,YAAY,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;AAC1F,CAAC,CAAC","sourcesContent":["import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from \"@aws-sdk/client-sso\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/credential-provider-ini\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { getHomeDir, ParsedIniData } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { createHash } from \"crypto\";\nimport { readFileSync } from \"fs\";\nimport { join } from \"path\";\n\n/**\n * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.\n * This is needed because server side may have invalidated the token before the defined expiration date.\n *\n * @internal\n */\nexport const EXPIRE_WINDOW_MS = 15 * 60 * 1000;\n\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\n\n/**\n * Cached SSO token retrieved from SSO login flow.\n */\ninterface SSOToken {\n  // A base64 encoded string returned by the sso-oidc service.\n  accessToken: string;\n  // RFC3339 format timestamp\n  expiresAt: string;\n  region?: string;\n  startUrl?: string;\n}\n\nexport interface FromSSOInit extends SourceProfileInit {\n  ssoClient?: SSOClient;\n}\n\n/**\n * Creates a credential provider that will read from a credential_process specified\n * in ini files.\n */\nexport const fromSSO =\n  (init: FromSSOInit = {}): CredentialProvider =>\n  async () => {\n    const profiles = await parseKnownFiles(init);\n    return resolveSSOCredentials(getMasterProfileName(init), profiles, init);\n  };\n\nconst resolveSSOCredentials = async (\n  profileName: string,\n  profiles: ParsedIniData,\n  options: FromSSOInit\n): Promise<Credentials> => {\n  const profile = profiles[profileName];\n  if (!profile) {\n    throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`);\n  }\n  const { sso_start_url: startUrl, sso_account_id: accountId, sso_region: region, sso_role_name: roleName } = profile;\n  if (!startUrl && !accountId && !region && !roleName) {\n    throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);\n  }\n  if (!startUrl || !accountId || !region || !roleName) {\n    throw new CredentialsProviderError(\n      `Profile ${profileName} does not have valid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", ` +\n        `\"sso_role_name\", \"sso_start_url\". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const hasher = createHash(\"sha1\");\n  const cacheName = hasher.update(startUrl).digest(\"hex\");\n  const tokenFile = join(getHomeDir(), \".aws\", \"sso\", \"cache\", `${cacheName}.json`);\n  let token: SSOToken;\n  try {\n    token = JSON.parse(readFileSync(tokenFile, { encoding: \"utf-8\" }));\n    if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {\n      throw new Error(\"SSO token is expired.\");\n    }\n  } catch (e) {\n    throw new CredentialsProviderError(\n      `The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session ` +\n        `run aws sso login with the corresponding profile.`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const { accessToken } = token;\n  const sso = options.ssoClient || new SSOClient({ region });\n  let ssoResp: GetRoleCredentialsCommandOutput;\n  try {\n    ssoResp = await sso.send(\n      new GetRoleCredentialsCommand({\n        accountId,\n        roleName,\n        accessToken,\n      })\n    );\n  } catch (e) {\n    throw CredentialsProviderError.from(e, SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration } = {} } = ssoResp;\n  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n    throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  return { accessKeyId, secretAccessKey, sessionToken, expiration: new Date(expiration) };\n};\n"]} | ||
/** | ||
* @internal | ||
*/ | ||
const validateSsoProfile = (profile) => { | ||
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile; | ||
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) { | ||
throw new property_provider_1.CredentialsProviderError(`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", ` + | ||
`"sso_role_name", "sso_start_url". Got ${Object.keys(profile).join(", ")}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
} | ||
return profile; | ||
}; | ||
exports.validateSsoProfile = validateSsoProfile; | ||
/** | ||
* @internal | ||
*/ | ||
const isSsoProfile = (arg) => arg && | ||
(typeof arg.sso_start_url === "string" || | ||
typeof arg.sso_account_id === "string" || | ||
typeof arg.sso_region === "string" || | ||
typeof arg.sso_role_name === "string"); | ||
exports.isSsoProfile = isSsoProfile; | ||
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";;;AAAA,oDAA4G;AAC5G,kEAAsE;AACtE,4EAAsE;AAEtE,gEAAqG;AACrG,mCAAoC;AACpC,2BAAkC;AAClC,+BAA4B;AAE5B;;;;;GAKG;AACU,QAAA,gBAAgB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/C,MAAM,4BAA4B,GAAG,KAAK,CAAC;AAuC3C;;;GAGG;AACI,MAAM,OAAO,GAClB,CAAC,OAAwD,EAAS,EAAsB,EAAE,CAC1F,KAAK,IAAI,EAAE;IACT,MAAM,EAAE,WAAW,EAAE,YAAY,EAAE,SAAS,EAAE,WAAW,EAAE,SAAS,EAAE,GAAG,IAAI,CAAC;IAC9E,IAAI,CAAC,WAAW,IAAI,CAAC,YAAY,IAAI,CAAC,SAAS,IAAI,CAAC,WAAW,EAAE;QAC/D,mDAAmD;QACnD,MAAM,QAAQ,GAAG,MAAM,kCAAe,CAAC,IAAI,CAAC,CAAC;QAC7C,MAAM,WAAW,GAAG,uCAAoB,CAAC,IAAI,CAAC,CAAC;QAC/C,MAAM,OAAO,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;QACtC,IAAI,CAAC,oBAAY,CAAC,OAAO,CAAC,EAAE;YAC1B,MAAM,IAAI,4CAAwB,CAAC,WAAW,WAAW,0CAA0C,CAAC,CAAC;SACtG;QACD,MAAM,EAAE,aAAa,EAAE,cAAc,EAAE,UAAU,EAAE,aAAa,EAAE,GAAG,0BAAkB,CAAC,OAAO,CAAC,CAAC;QACjG,OAAO,qBAAqB,CAAC;YAC3B,WAAW,EAAE,aAAa;YAC1B,YAAY,EAAE,cAAc;YAC5B,SAAS,EAAE,UAAU;YACrB,WAAW,EAAE,aAAa;YAC1B,SAAS,EAAE,SAAS;SACrB,CAAC,CAAC;KACJ;SAAM,IAAI,CAAC,WAAW,IAAI,CAAC,YAAY,IAAI,CAAC,SAAS,IAAI,CAAC,WAAW,EAAE;QACtE,MAAM,IAAI,4CAAwB,CAChC,mFAAmF;YACjF,6CAA6C,CAChD,CAAC;KACH;SAAM;QACL,OAAO,qBAAqB,CAAC,EAAE,WAAW,EAAE,YAAY,EAAE,SAAS,EAAE,WAAW,EAAE,SAAS,EAAE,CAAC,CAAC;KAChG;AACH,CAAC,CAAC;AA5BS,QAAA,OAAO,WA4BhB;AAEJ,MAAM,qBAAqB,GAAG,KAAK,EAAE,EACnC,WAAW,EACX,YAAY,EACZ,SAAS,EACT,WAAW,EACX,SAAS,GAC8B,EAAwB,EAAE;IACjE,MAAM,MAAM,GAAG,mBAAU,CAAC,MAAM,CAAC,CAAC;IAClC,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IAC3D,MAAM,SAAS,GAAG,WAAI,CAAC,mCAAU,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAE,GAAG,SAAS,OAAO,CAAC,CAAC;IAClF,IAAI,KAAe,CAAC;IACpB,IAAI;QACF,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,iBAAY,CAAC,SAAS,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;QACnE,IAAI,IAAI,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,wBAAgB,EAAE;YACxE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;SAC1C;KACF;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,IAAI,4CAAwB,CAChC,gHAAgH;YAC9G,mDAAmD,EACrD,4BAA4B,CAC7B,CAAC;KACH;IACD,MAAM,EAAE,WAAW,EAAE,GAAG,KAAK,CAAC;IAC9B,MAAM,GAAG,GAAG,SAAS,IAAI,IAAI,sBAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IAC9D,IAAI,OAAwC,CAAC;IAC7C,IAAI;QACF,OAAO,GAAG,MAAM,GAAG,CAAC,IAAI,CACtB,IAAI,sCAAyB,CAAC;YAC5B,SAAS,EAAE,YAAY;YACvB,QAAQ,EAAE,WAAW;YACrB,WAAW;SACZ,CAAC,CACH,CAAC;KACH;IAAC,OAAO,CAAC,EAAE;QACV,MAAM,4CAAwB,CAAC,IAAI,CAAC,CAAC,EAAE,4BAA4B,CAAC,CAAC;KACtE;IACD,MAAM,EAAE,eAAe,EAAE,EAAE,WAAW,EAAE,eAAe,EAAE,YAAY,EAAE,UAAU,EAAE,GAAG,EAAE,EAAE,GAAG,OAAO,CAAC;IACrG,IAAI,CAAC,WAAW,IAAI,CAAC,eAAe,IAAI,CAAC,YAAY,IAAI,CAAC,UAAU,EAAE;QACpE,MAAM,IAAI,4CAAwB,CAAC,8CAA8C,EAAE,4BAA4B,CAAC,CAAC;KAClH;IACD,OAAO,EAAE,WAAW,EAAE,eAAe,EAAE,YAAY,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;AAC1F,CAAC,CAAC;AAYF;;GAEG;AACI,MAAM,kBAAkB,GAAG,CAAC,OAA4B,EAAc,EAAE;IAC7E,MAAM,EAAE,aAAa,EAAE,cAAc,EAAE,UAAU,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAC7E,IAAI,CAAC,aAAa,IAAI,CAAC,cAAc,IAAI,CAAC,UAAU,IAAI,CAAC,aAAa,EAAE;QACtE,MAAM,IAAI,4CAAwB,CAChC,0GAA0G;YACxG,yCAAyC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,IAAI,CAChE,IAAI,CACL,sFAAsF,EACzF,4BAA4B,CAC7B,CAAC;KACH;IACD,OAAO,OAAqB,CAAC;AAC/B,CAAC,CAAC;AAZW,QAAA,kBAAkB,sBAY7B;AAEF;;GAEG;AACI,MAAM,YAAY,GAAG,CAAC,GAAY,EAA8B,EAAE,CACvE,GAAG;IACH,CAAC,OAAO,GAAG,CAAC,aAAa,KAAK,QAAQ;QACpC,OAAO,GAAG,CAAC,cAAc,KAAK,QAAQ;QACtC,OAAO,GAAG,CAAC,UAAU,KAAK,QAAQ;QAClC,OAAO,GAAG,CAAC,aAAa,KAAK,QAAQ,CAAC,CAAC;AAL9B,QAAA,YAAY,gBAKkB","sourcesContent":["import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from \"@aws-sdk/client-sso\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { getHomeDir, Profile } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/util-credentials\";\nimport { createHash } from \"crypto\";\nimport { readFileSync } from \"fs\";\nimport { join } from \"path\";\n\n/**\n * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.\n * This is needed because server side may have invalidated the token before the defined expiration date.\n *\n * @internal\n */\nexport const EXPIRE_WINDOW_MS = 15 * 60 * 1000;\n\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\n\n/**\n * Cached SSO token retrieved from SSO login flow.\n */\ninterface SSOToken {\n  // A base64 encoded string returned by the sso-oidc service.\n  accessToken: string;\n  // RFC3339 format timestamp\n  expiresAt: string;\n  region?: string;\n  startUrl?: string;\n}\n\nexport interface SsoCredentialsParameters {\n  /**\n   * The URL to the AWS SSO service.\n   */\n  ssoStartUrl: string;\n\n  /**\n   * The ID of the AWS account to use for temporary credentials.\n   */\n  ssoAccountId: string;\n\n  /**\n   * The AWS region to use for temporary credentials.\n   */\n  ssoRegion: string;\n\n  /**\n   * The name of the AWS role to assume.\n   */\n  ssoRoleName: string;\n}\nexport interface FromSSOInit extends SourceProfileInit {\n  ssoClient?: SSOClient;\n}\n\n/**\n * Creates a credential provider that will read from a credential_process specified\n * in ini files.\n */\nexport const fromSSO =\n  (init: FromSSOInit & Partial<SsoCredentialsParameters> = {} as any): CredentialProvider =>\n  async () => {\n    const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient } = init;\n    if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName) {\n      // Load the SSO config from shared AWS config file.\n      const profiles = await parseKnownFiles(init);\n      const profileName = getMasterProfileName(init);\n      const profile = profiles[profileName];\n      if (!isSsoProfile(profile)) {\n        throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);\n      }\n      const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(profile);\n      return resolveSSOCredentials({\n        ssoStartUrl: sso_start_url,\n        ssoAccountId: sso_account_id,\n        ssoRegion: sso_region,\n        ssoRoleName: sso_role_name,\n        ssoClient: ssoClient,\n      });\n    } else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n      throw new CredentialsProviderError(\n        'Incomplete configuration. The fromSSO() argument hash must include \"ssoStartUrl\",' +\n          ' \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"'\n      );\n    } else {\n      return resolveSSOCredentials({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient });\n    }\n  };\n\nconst resolveSSOCredentials = async ({\n  ssoStartUrl,\n  ssoAccountId,\n  ssoRegion,\n  ssoRoleName,\n  ssoClient,\n}: FromSSOInit & SsoCredentialsParameters): Promise<Credentials> => {\n  const hasher = createHash(\"sha1\");\n  const cacheName = hasher.update(ssoStartUrl).digest(\"hex\");\n  const tokenFile = join(getHomeDir(), \".aws\", \"sso\", \"cache\", `${cacheName}.json`);\n  let token: SSOToken;\n  try {\n    token = JSON.parse(readFileSync(tokenFile, { encoding: \"utf-8\" }));\n    if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {\n      throw new Error(\"SSO token is expired.\");\n    }\n  } catch (e) {\n    throw new CredentialsProviderError(\n      `The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session ` +\n        `run aws sso login with the corresponding profile.`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const { accessToken } = token;\n  const sso = ssoClient || new SSOClient({ region: ssoRegion });\n  let ssoResp: GetRoleCredentialsCommandOutput;\n  try {\n    ssoResp = await sso.send(\n      new GetRoleCredentialsCommand({\n        accountId: ssoAccountId,\n        roleName: ssoRoleName,\n        accessToken,\n      })\n    );\n  } catch (e) {\n    throw CredentialsProviderError.from(e, SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration } = {} } = ssoResp;\n  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n    throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  return { accessKeyId, secretAccessKey, sessionToken, expiration: new Date(expiration) };\n};\n\n/**\n * @internal\n */\nexport interface SsoProfile extends Profile {\n  sso_start_url: string;\n  sso_account_id: string;\n  sso_region: string;\n  sso_role_name: string;\n}\n\n/**\n * @internal\n */\nexport const validateSsoProfile = (profile: Partial<SsoProfile>): SsoProfile => {\n  const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n  if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n    throw new CredentialsProviderError(\n      `Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", ` +\n        `\"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\n          \", \"\n        )}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  return profile as SsoProfile;\n};\n\n/**\n * @internal\n */\nexport const isSsoProfile = (arg: Profile): arg is Partial<SsoProfile> =>\n  arg &&\n  (typeof arg.sso_start_url === \"string\" ||\n    typeof arg.sso_account_id === \"string\" ||\n    typeof arg.sso_region === \"string\" ||\n    typeof arg.sso_role_name === \"string\");\n"]} |
import { __awaiter, __generator } from "tslib"; | ||
import { GetRoleCredentialsCommand, SSOClient } from "@aws-sdk/client-sso"; | ||
import { getMasterProfileName, parseKnownFiles } from "@aws-sdk/credential-provider-ini"; | ||
import { CredentialsProviderError } from "@aws-sdk/property-provider"; | ||
import { getHomeDir } from "@aws-sdk/shared-ini-file-loader"; | ||
import { getMasterProfileName, parseKnownFiles } from "@aws-sdk/util-credentials"; | ||
import { createHash } from "crypto"; | ||
@@ -24,9 +24,34 @@ import { readFileSync } from "fs"; | ||
return function () { return __awaiter(void 0, void 0, void 0, function () { | ||
var profiles; | ||
return __generator(this, function (_a) { | ||
switch (_a.label) { | ||
case 0: return [4 /*yield*/, parseKnownFiles(init)]; | ||
var ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient, profiles, profileName, profile, _a, sso_start_url, sso_account_id, sso_region, sso_role_name; | ||
return __generator(this, function (_b) { | ||
switch (_b.label) { | ||
case 0: | ||
ssoStartUrl = init.ssoStartUrl, ssoAccountId = init.ssoAccountId, ssoRegion = init.ssoRegion, ssoRoleName = init.ssoRoleName, ssoClient = init.ssoClient; | ||
if (!(!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName)) return [3 /*break*/, 2]; | ||
return [4 /*yield*/, parseKnownFiles(init)]; | ||
case 1: | ||
profiles = _a.sent(); | ||
return [2 /*return*/, resolveSSOCredentials(getMasterProfileName(init), profiles, init)]; | ||
profiles = _b.sent(); | ||
profileName = getMasterProfileName(init); | ||
profile = profiles[profileName]; | ||
if (!isSsoProfile(profile)) { | ||
throw new CredentialsProviderError("Profile " + profileName + " is not configured with SSO credentials."); | ||
} | ||
_a = validateSsoProfile(profile), sso_start_url = _a.sso_start_url, sso_account_id = _a.sso_account_id, sso_region = _a.sso_region, sso_role_name = _a.sso_role_name; | ||
return [2 /*return*/, resolveSSOCredentials({ | ||
ssoStartUrl: sso_start_url, | ||
ssoAccountId: sso_account_id, | ||
ssoRegion: sso_region, | ||
ssoRoleName: sso_role_name, | ||
ssoClient: ssoClient, | ||
})]; | ||
case 2: | ||
if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) { | ||
throw new CredentialsProviderError('Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl",' + | ||
' "ssoAccountId", "ssoRegion", "ssoRoleName"'); | ||
} | ||
else { | ||
return [2 /*return*/, resolveSSOCredentials({ ssoStartUrl: ssoStartUrl, ssoAccountId: ssoAccountId, ssoRegion: ssoRegion, ssoRoleName: ssoRoleName, ssoClient: ssoClient })]; | ||
} | ||
_b.label = 3; | ||
case 3: return [2 /*return*/]; | ||
} | ||
@@ -36,57 +61,69 @@ }); | ||
}; | ||
var resolveSSOCredentials = function (profileName, profiles, options) { return __awaiter(void 0, void 0, void 0, function () { | ||
var profile, startUrl, accountId, region, roleName, hasher, cacheName, tokenFile, token, accessToken, sso, ssoResp, e_1, _a, _b, accessKeyId, secretAccessKey, sessionToken, expiration; | ||
return __generator(this, function (_c) { | ||
switch (_c.label) { | ||
case 0: | ||
profile = profiles[profileName]; | ||
if (!profile) { | ||
throw new CredentialsProviderError("Profile " + profileName + " could not be found in shared credentials file."); | ||
} | ||
startUrl = profile.sso_start_url, accountId = profile.sso_account_id, region = profile.sso_region, roleName = profile.sso_role_name; | ||
if (!startUrl && !accountId && !region && !roleName) { | ||
throw new CredentialsProviderError("Profile " + profileName + " is not configured with SSO credentials."); | ||
} | ||
if (!startUrl || !accountId || !region || !roleName) { | ||
throw new CredentialsProviderError("Profile " + profileName + " does not have valid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", " + | ||
"\"sso_role_name\", \"sso_start_url\". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html", SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
} | ||
hasher = createHash("sha1"); | ||
cacheName = hasher.update(startUrl).digest("hex"); | ||
tokenFile = join(getHomeDir(), ".aws", "sso", "cache", cacheName + ".json"); | ||
try { | ||
token = JSON.parse(readFileSync(tokenFile, { encoding: "utf-8" })); | ||
if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) { | ||
throw new Error("SSO token is expired."); | ||
var resolveSSOCredentials = function (_a) { | ||
var ssoStartUrl = _a.ssoStartUrl, ssoAccountId = _a.ssoAccountId, ssoRegion = _a.ssoRegion, ssoRoleName = _a.ssoRoleName, ssoClient = _a.ssoClient; | ||
return __awaiter(void 0, void 0, void 0, function () { | ||
var hasher, cacheName, tokenFile, token, accessToken, sso, ssoResp, e_1, _b, _c, accessKeyId, secretAccessKey, sessionToken, expiration; | ||
return __generator(this, function (_d) { | ||
switch (_d.label) { | ||
case 0: | ||
hasher = createHash("sha1"); | ||
cacheName = hasher.update(ssoStartUrl).digest("hex"); | ||
tokenFile = join(getHomeDir(), ".aws", "sso", "cache", cacheName + ".json"); | ||
try { | ||
token = JSON.parse(readFileSync(tokenFile, { encoding: "utf-8" })); | ||
if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) { | ||
throw new Error("SSO token is expired."); | ||
} | ||
} | ||
} | ||
catch (e) { | ||
throw new CredentialsProviderError("The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session " + | ||
"run aws sso login with the corresponding profile.", SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
} | ||
accessToken = token.accessToken; | ||
sso = options.ssoClient || new SSOClient({ region: region }); | ||
_c.label = 1; | ||
case 1: | ||
_c.trys.push([1, 3, , 4]); | ||
return [4 /*yield*/, sso.send(new GetRoleCredentialsCommand({ | ||
accountId: accountId, | ||
roleName: roleName, | ||
accessToken: accessToken, | ||
}))]; | ||
case 2: | ||
ssoResp = _c.sent(); | ||
return [3 /*break*/, 4]; | ||
case 3: | ||
e_1 = _c.sent(); | ||
throw CredentialsProviderError.from(e_1, SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
case 4: | ||
_a = ssoResp.roleCredentials, _b = _a === void 0 ? {} : _a, accessKeyId = _b.accessKeyId, secretAccessKey = _b.secretAccessKey, sessionToken = _b.sessionToken, expiration = _b.expiration; | ||
if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) { | ||
throw new CredentialsProviderError("SSO returns an invalid temporary credential.", SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
} | ||
return [2 /*return*/, { accessKeyId: accessKeyId, secretAccessKey: secretAccessKey, sessionToken: sessionToken, expiration: new Date(expiration) }]; | ||
} | ||
catch (e) { | ||
throw new CredentialsProviderError("The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session " + | ||
"run aws sso login with the corresponding profile.", SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
} | ||
accessToken = token.accessToken; | ||
sso = ssoClient || new SSOClient({ region: ssoRegion }); | ||
_d.label = 1; | ||
case 1: | ||
_d.trys.push([1, 3, , 4]); | ||
return [4 /*yield*/, sso.send(new GetRoleCredentialsCommand({ | ||
accountId: ssoAccountId, | ||
roleName: ssoRoleName, | ||
accessToken: accessToken, | ||
}))]; | ||
case 2: | ||
ssoResp = _d.sent(); | ||
return [3 /*break*/, 4]; | ||
case 3: | ||
e_1 = _d.sent(); | ||
throw CredentialsProviderError.from(e_1, SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
case 4: | ||
_b = ssoResp.roleCredentials, _c = _b === void 0 ? {} : _b, accessKeyId = _c.accessKeyId, secretAccessKey = _c.secretAccessKey, sessionToken = _c.sessionToken, expiration = _c.expiration; | ||
if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) { | ||
throw new CredentialsProviderError("SSO returns an invalid temporary credential.", SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
} | ||
return [2 /*return*/, { accessKeyId: accessKeyId, secretAccessKey: secretAccessKey, sessionToken: sessionToken, expiration: new Date(expiration) }]; | ||
} | ||
}); | ||
}); | ||
}); }; | ||
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,yBAAyB,EAAmC,SAAS,EAAE,MAAM,qBAAqB,CAAC;AAC5G,OAAO,EAAE,oBAAoB,EAAE,eAAe,EAAqB,MAAM,kCAAkC,CAAC;AAC5G,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,UAAU,EAAiB,MAAM,iCAAiC,CAAC;AAE5E,OAAO,EAAE,UAAU,EAAE,MAAM,QAAQ,CAAC;AACpC,OAAO,EAAE,YAAY,EAAE,MAAM,IAAI,CAAC;AAClC,OAAO,EAAE,IAAI,EAAE,MAAM,MAAM,CAAC;AAE5B;;;;;GAKG;AACH,MAAM,CAAC,IAAM,gBAAgB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/C,IAAM,4BAA4B,GAAG,KAAK,CAAC;AAkB3C;;;GAGG;AACH,MAAM,CAAC,IAAM,OAAO,GAClB,UAAC,IAAsB;IAAtB,qBAAA,EAAA,SAAsB;IACvB,OAAA;;;;wBACmB,qBAAM,eAAe,CAAC,IAAI,CAAC,EAAA;;oBAAtC,QAAQ,GAAG,SAA2B;oBAC5C,sBAAO,qBAAqB,CAAC,oBAAoB,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,IAAI,CAAC,EAAC;;;SAC1E;AAHD,CAGC,CAAC;AAEJ,IAAM,qBAAqB,GAAG,UAC5B,WAAmB,EACnB,QAAuB,EACvB,OAAoB;;;;;gBAEd,OAAO,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;gBACtC,IAAI,CAAC,OAAO,EAAE;oBACZ,MAAM,IAAI,wBAAwB,CAAC,aAAW,WAAW,oDAAiD,CAAC,CAAC;iBAC7G;gBACsB,QAAQ,GAA6E,OAAO,cAApF,EAAkB,SAAS,GAAkD,OAAO,eAAzD,EAAc,MAAM,GAA8B,OAAO,WAArC,EAAiB,QAAQ,GAAK,OAAO,cAAZ,CAAa;gBACpH,IAAI,CAAC,QAAQ,IAAI,CAAC,SAAS,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE;oBACnD,MAAM,IAAI,wBAAwB,CAAC,aAAW,WAAW,6CAA0C,CAAC,CAAC;iBACtG;gBACD,IAAI,CAAC,QAAQ,IAAI,CAAC,SAAS,IAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,EAAE;oBACnD,MAAM,IAAI,wBAAwB,CAChC,aAAW,WAAW,mGAA4F;wBAChH,0HAAsH,EACxH,4BAA4B,CAC7B,CAAC;iBACH;gBACK,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC;gBAC5B,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;gBAClD,SAAS,GAAG,IAAI,CAAC,UAAU,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAK,SAAS,UAAO,CAAC,CAAC;gBAElF,IAAI;oBACF,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,SAAS,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;oBACnE,IAAI,IAAI,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,gBAAgB,EAAE;wBACxE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;qBAC1C;iBACF;gBAAC,OAAO,CAAC,EAAE;oBACV,MAAM,IAAI,wBAAwB,CAChC,gHAAgH;wBAC9G,mDAAmD,EACrD,4BAA4B,CAC7B,CAAC;iBACH;gBACO,WAAW,GAAK,KAAK,YAAV,CAAW;gBACxB,GAAG,GAAG,OAAO,CAAC,SAAS,IAAI,IAAI,SAAS,CAAC,EAAE,MAAM,QAAA,EAAE,CAAC,CAAC;;;;gBAG/C,qBAAM,GAAG,CAAC,IAAI,CACtB,IAAI,yBAAyB,CAAC;wBAC5B,SAAS,WAAA;wBACT,QAAQ,UAAA;wBACR,WAAW,aAAA;qBACZ,CAAC,CACH,EAAA;;gBAND,OAAO,GAAG,SAMT,CAAC;;;;gBAEF,MAAM,wBAAwB,CAAC,IAAI,CAAC,GAAC,EAAE,4BAA4B,CAAC,CAAC;;gBAE/D,KAAqF,OAAO,gBAAZ,EAAhF,qBAA8E,EAAE,KAAA,EAA7D,WAAW,iBAAA,EAAE,eAAe,qBAAA,EAAE,YAAY,kBAAA,EAAE,UAAU,gBAAA,CAAoB;gBACrG,IAAI,CAAC,WAAW,IAAI,CAAC,eAAe,IAAI,CAAC,YAAY,IAAI,CAAC,UAAU,EAAE;oBACpE,MAAM,IAAI,wBAAwB,CAAC,8CAA8C,EAAE,4BAA4B,CAAC,CAAC;iBAClH;gBACD,sBAAO,EAAE,WAAW,aAAA,EAAE,eAAe,iBAAA,EAAE,YAAY,cAAA,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,UAAU,CAAC,EAAE,EAAC;;;KACzF,CAAC","sourcesContent":["import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from \"@aws-sdk/client-sso\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/credential-provider-ini\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { getHomeDir, ParsedIniData } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { createHash } from \"crypto\";\nimport { readFileSync } from \"fs\";\nimport { join } from \"path\";\n\n/**\n * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.\n * This is needed because server side may have invalidated the token before the defined expiration date.\n *\n * @internal\n */\nexport const EXPIRE_WINDOW_MS = 15 * 60 * 1000;\n\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\n\n/**\n * Cached SSO token retrieved from SSO login flow.\n */\ninterface SSOToken {\n  // A base64 encoded string returned by the sso-oidc service.\n  accessToken: string;\n  // RFC3339 format timestamp\n  expiresAt: string;\n  region?: string;\n  startUrl?: string;\n}\n\nexport interface FromSSOInit extends SourceProfileInit {\n  ssoClient?: SSOClient;\n}\n\n/**\n * Creates a credential provider that will read from a credential_process specified\n * in ini files.\n */\nexport const fromSSO =\n  (init: FromSSOInit = {}): CredentialProvider =>\n  async () => {\n    const profiles = await parseKnownFiles(init);\n    return resolveSSOCredentials(getMasterProfileName(init), profiles, init);\n  };\n\nconst resolveSSOCredentials = async (\n  profileName: string,\n  profiles: ParsedIniData,\n  options: FromSSOInit\n): Promise<Credentials> => {\n  const profile = profiles[profileName];\n  if (!profile) {\n    throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`);\n  }\n  const { sso_start_url: startUrl, sso_account_id: accountId, sso_region: region, sso_role_name: roleName } = profile;\n  if (!startUrl && !accountId && !region && !roleName) {\n    throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);\n  }\n  if (!startUrl || !accountId || !region || !roleName) {\n    throw new CredentialsProviderError(\n      `Profile ${profileName} does not have valid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", ` +\n        `\"sso_role_name\", \"sso_start_url\". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const hasher = createHash(\"sha1\");\n  const cacheName = hasher.update(startUrl).digest(\"hex\");\n  const tokenFile = join(getHomeDir(), \".aws\", \"sso\", \"cache\", `${cacheName}.json`);\n  let token: SSOToken;\n  try {\n    token = JSON.parse(readFileSync(tokenFile, { encoding: \"utf-8\" }));\n    if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {\n      throw new Error(\"SSO token is expired.\");\n    }\n  } catch (e) {\n    throw new CredentialsProviderError(\n      `The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session ` +\n        `run aws sso login with the corresponding profile.`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const { accessToken } = token;\n  const sso = options.ssoClient || new SSOClient({ region });\n  let ssoResp: GetRoleCredentialsCommandOutput;\n  try {\n    ssoResp = await sso.send(\n      new GetRoleCredentialsCommand({\n        accountId,\n        roleName,\n        accessToken,\n      })\n    );\n  } catch (e) {\n    throw CredentialsProviderError.from(e, SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration } = {} } = ssoResp;\n  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n    throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  return { accessKeyId, secretAccessKey, sessionToken, expiration: new Date(expiration) };\n};\n"]} | ||
}; | ||
/** | ||
* @internal | ||
*/ | ||
export var validateSsoProfile = function (profile) { | ||
var sso_start_url = profile.sso_start_url, sso_account_id = profile.sso_account_id, sso_region = profile.sso_region, sso_role_name = profile.sso_role_name; | ||
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) { | ||
throw new CredentialsProviderError("Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", " + | ||
("\"sso_role_name\", \"sso_start_url\". Got " + Object.keys(profile).join(", ") + "\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html"), SHOULD_FAIL_CREDENTIAL_CHAIN); | ||
} | ||
return profile; | ||
}; | ||
/** | ||
* @internal | ||
*/ | ||
export var isSsoProfile = function (arg) { | ||
return arg && | ||
(typeof arg.sso_start_url === "string" || | ||
typeof arg.sso_account_id === "string" || | ||
typeof arg.sso_region === "string" || | ||
typeof arg.sso_role_name === "string"); | ||
}; | ||
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,yBAAyB,EAAmC,SAAS,EAAE,MAAM,qBAAqB,CAAC;AAC5G,OAAO,EAAE,wBAAwB,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,UAAU,EAAW,MAAM,iCAAiC,CAAC;AAEtE,OAAO,EAAE,oBAAoB,EAAE,eAAe,EAAqB,MAAM,2BAA2B,CAAC;AACrG,OAAO,EAAE,UAAU,EAAE,MAAM,QAAQ,CAAC;AACpC,OAAO,EAAE,YAAY,EAAE,MAAM,IAAI,CAAC;AAClC,OAAO,EAAE,IAAI,EAAE,MAAM,MAAM,CAAC;AAE5B;;;;;GAKG;AACH,MAAM,CAAC,IAAM,gBAAgB,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/C,IAAM,4BAA4B,GAAG,KAAK,CAAC;AAuC3C;;;GAGG;AACH,MAAM,CAAC,IAAM,OAAO,GAClB,UAAC,IAAiE;IAAjE,qBAAA,EAAA,OAAwD,EAAS;IAClE,OAAA;;;;;oBACU,WAAW,GAAsD,IAAI,YAA1D,EAAE,YAAY,GAAwC,IAAI,aAA5C,EAAE,SAAS,GAA6B,IAAI,UAAjC,EAAE,WAAW,GAAgB,IAAI,YAApB,EAAE,SAAS,GAAK,IAAI,UAAT,CAAU;yBAC1E,CAAA,CAAC,WAAW,IAAI,CAAC,YAAY,IAAI,CAAC,SAAS,IAAI,CAAC,WAAW,CAAA,EAA3D,wBAA2D;oBAE5C,qBAAM,eAAe,CAAC,IAAI,CAAC,EAAA;;oBAAtC,QAAQ,GAAG,SAA2B;oBACtC,WAAW,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC;oBACzC,OAAO,GAAG,QAAQ,CAAC,WAAW,CAAC,CAAC;oBACtC,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC,EAAE;wBAC1B,MAAM,IAAI,wBAAwB,CAAC,aAAW,WAAW,6CAA0C,CAAC,CAAC;qBACtG;oBACK,KAA+D,kBAAkB,CAAC,OAAO,CAAC,EAAxF,aAAa,mBAAA,EAAE,cAAc,oBAAA,EAAE,UAAU,gBAAA,EAAE,aAAa,mBAAA,CAAiC;oBACjG,sBAAO,qBAAqB,CAAC;4BAC3B,WAAW,EAAE,aAAa;4BAC1B,YAAY,EAAE,cAAc;4BAC5B,SAAS,EAAE,UAAU;4BACrB,WAAW,EAAE,aAAa;4BAC1B,SAAS,EAAE,SAAS;yBACrB,CAAC,EAAC;;oBACE,IAAI,CAAC,WAAW,IAAI,CAAC,YAAY,IAAI,CAAC,SAAS,IAAI,CAAC,WAAW,EAAE;wBACtE,MAAM,IAAI,wBAAwB,CAChC,mFAAmF;4BACjF,6CAA6C,CAChD,CAAC;qBACH;yBAAM;wBACL,sBAAO,qBAAqB,CAAC,EAAE,WAAW,aAAA,EAAE,YAAY,cAAA,EAAE,SAAS,WAAA,EAAE,WAAW,aAAA,EAAE,SAAS,WAAA,EAAE,CAAC,EAAC;qBAChG;;;;;SACF;AA1BD,CA0BC,CAAC;AAEJ,IAAM,qBAAqB,GAAG,UAAO,EAMI;QALvC,WAAW,iBAAA,EACX,YAAY,kBAAA,EACZ,SAAS,eAAA,EACT,WAAW,iBAAA,EACX,SAAS,eAAA;;;;;;oBAEH,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC;oBAC5B,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;oBACrD,SAAS,GAAG,IAAI,CAAC,UAAU,EAAE,EAAE,MAAM,EAAE,KAAK,EAAE,OAAO,EAAK,SAAS,UAAO,CAAC,CAAC;oBAElF,IAAI;wBACF,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,SAAS,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;wBACnE,IAAI,IAAI,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,gBAAgB,EAAE;4BACxE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;yBAC1C;qBACF;oBAAC,OAAO,CAAC,EAAE;wBACV,MAAM,IAAI,wBAAwB,CAChC,gHAAgH;4BAC9G,mDAAmD,EACrD,4BAA4B,CAC7B,CAAC;qBACH;oBACO,WAAW,GAAK,KAAK,YAAV,CAAW;oBACxB,GAAG,GAAG,SAAS,IAAI,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;;;;oBAGlD,qBAAM,GAAG,CAAC,IAAI,CACtB,IAAI,yBAAyB,CAAC;4BAC5B,SAAS,EAAE,YAAY;4BACvB,QAAQ,EAAE,WAAW;4BACrB,WAAW,aAAA;yBACZ,CAAC,CACH,EAAA;;oBAND,OAAO,GAAG,SAMT,CAAC;;;;oBAEF,MAAM,wBAAwB,CAAC,IAAI,CAAC,GAAC,EAAE,4BAA4B,CAAC,CAAC;;oBAE/D,KAAqF,OAAO,gBAAZ,EAAhF,qBAA8E,EAAE,KAAA,EAA7D,WAAW,iBAAA,EAAE,eAAe,qBAAA,EAAE,YAAY,kBAAA,EAAE,UAAU,gBAAA,CAAoB;oBACrG,IAAI,CAAC,WAAW,IAAI,CAAC,eAAe,IAAI,CAAC,YAAY,IAAI,CAAC,UAAU,EAAE;wBACpE,MAAM,IAAI,wBAAwB,CAAC,8CAA8C,EAAE,4BAA4B,CAAC,CAAC;qBAClH;oBACD,sBAAO,EAAE,WAAW,aAAA,EAAE,eAAe,iBAAA,EAAE,YAAY,cAAA,EAAE,UAAU,EAAE,IAAI,IAAI,CAAC,UAAU,CAAC,EAAE,EAAC;;;;CACzF,CAAC;AAYF;;GAEG;AACH,MAAM,CAAC,IAAM,kBAAkB,GAAG,UAAC,OAA4B;IACrD,IAAA,aAAa,GAAgD,OAAO,cAAvD,EAAE,cAAc,GAAgC,OAAO,eAAvC,EAAE,UAAU,GAAoB,OAAO,WAA3B,EAAE,aAAa,GAAK,OAAO,cAAZ,CAAa;IAC7E,IAAI,CAAC,aAAa,IAAI,CAAC,cAAc,IAAI,CAAC,UAAU,IAAI,CAAC,aAAa,EAAE;QACtE,MAAM,IAAI,wBAAwB,CAChC,8GAA0G;aACxG,+CAAyC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,IAAI,CAChE,IAAI,CACL,yFAAsF,CAAA,EACzF,4BAA4B,CAC7B,CAAC;KACH;IACD,OAAO,OAAqB,CAAC;AAC/B,CAAC,CAAC;AAEF;;GAEG;AACH,MAAM,CAAC,IAAM,YAAY,GAAG,UAAC,GAAY;IACvC,OAAA,GAAG;QACH,CAAC,OAAO,GAAG,CAAC,aAAa,KAAK,QAAQ;YACpC,OAAO,GAAG,CAAC,cAAc,KAAK,QAAQ;YACtC,OAAO,GAAG,CAAC,UAAU,KAAK,QAAQ;YAClC,OAAO,GAAG,CAAC,aAAa,KAAK,QAAQ,CAAC;AAJxC,CAIwC,CAAC","sourcesContent":["import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from \"@aws-sdk/client-sso\";\nimport { CredentialsProviderError } from \"@aws-sdk/property-provider\";\nimport { getHomeDir, Profile } from \"@aws-sdk/shared-ini-file-loader\";\nimport { CredentialProvider, Credentials } from \"@aws-sdk/types\";\nimport { getMasterProfileName, parseKnownFiles, SourceProfileInit } from \"@aws-sdk/util-credentials\";\nimport { createHash } from \"crypto\";\nimport { readFileSync } from \"fs\";\nimport { join } from \"path\";\n\n/**\n * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token.\n * This is needed because server side may have invalidated the token before the defined expiration date.\n *\n * @internal\n */\nexport const EXPIRE_WINDOW_MS = 15 * 60 * 1000;\n\nconst SHOULD_FAIL_CREDENTIAL_CHAIN = false;\n\n/**\n * Cached SSO token retrieved from SSO login flow.\n */\ninterface SSOToken {\n  // A base64 encoded string returned by the sso-oidc service.\n  accessToken: string;\n  // RFC3339 format timestamp\n  expiresAt: string;\n  region?: string;\n  startUrl?: string;\n}\n\nexport interface SsoCredentialsParameters {\n  /**\n   * The URL to the AWS SSO service.\n   */\n  ssoStartUrl: string;\n\n  /**\n   * The ID of the AWS account to use for temporary credentials.\n   */\n  ssoAccountId: string;\n\n  /**\n   * The AWS region to use for temporary credentials.\n   */\n  ssoRegion: string;\n\n  /**\n   * The name of the AWS role to assume.\n   */\n  ssoRoleName: string;\n}\nexport interface FromSSOInit extends SourceProfileInit {\n  ssoClient?: SSOClient;\n}\n\n/**\n * Creates a credential provider that will read from a credential_process specified\n * in ini files.\n */\nexport const fromSSO =\n  (init: FromSSOInit & Partial<SsoCredentialsParameters> = {} as any): CredentialProvider =>\n  async () => {\n    const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient } = init;\n    if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName) {\n      // Load the SSO config from shared AWS config file.\n      const profiles = await parseKnownFiles(init);\n      const profileName = getMasterProfileName(init);\n      const profile = profiles[profileName];\n      if (!isSsoProfile(profile)) {\n        throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`);\n      }\n      const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(profile);\n      return resolveSSOCredentials({\n        ssoStartUrl: sso_start_url,\n        ssoAccountId: sso_account_id,\n        ssoRegion: sso_region,\n        ssoRoleName: sso_role_name,\n        ssoClient: ssoClient,\n      });\n    } else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) {\n      throw new CredentialsProviderError(\n        'Incomplete configuration. The fromSSO() argument hash must include \"ssoStartUrl\",' +\n          ' \"ssoAccountId\", \"ssoRegion\", \"ssoRoleName\"'\n      );\n    } else {\n      return resolveSSOCredentials({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient });\n    }\n  };\n\nconst resolveSSOCredentials = async ({\n  ssoStartUrl,\n  ssoAccountId,\n  ssoRegion,\n  ssoRoleName,\n  ssoClient,\n}: FromSSOInit & SsoCredentialsParameters): Promise<Credentials> => {\n  const hasher = createHash(\"sha1\");\n  const cacheName = hasher.update(ssoStartUrl).digest(\"hex\");\n  const tokenFile = join(getHomeDir(), \".aws\", \"sso\", \"cache\", `${cacheName}.json`);\n  let token: SSOToken;\n  try {\n    token = JSON.parse(readFileSync(tokenFile, { encoding: \"utf-8\" }));\n    if (new Date(token.expiresAt).getTime() - Date.now() <= EXPIRE_WINDOW_MS) {\n      throw new Error(\"SSO token is expired.\");\n    }\n  } catch (e) {\n    throw new CredentialsProviderError(\n      `The SSO session associated with this profile has expired or is otherwise invalid. To refresh this SSO session ` +\n        `run aws sso login with the corresponding profile.`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  const { accessToken } = token;\n  const sso = ssoClient || new SSOClient({ region: ssoRegion });\n  let ssoResp: GetRoleCredentialsCommandOutput;\n  try {\n    ssoResp = await sso.send(\n      new GetRoleCredentialsCommand({\n        accountId: ssoAccountId,\n        roleName: ssoRoleName,\n        accessToken,\n      })\n    );\n  } catch (e) {\n    throw CredentialsProviderError.from(e, SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  const { roleCredentials: { accessKeyId, secretAccessKey, sessionToken, expiration } = {} } = ssoResp;\n  if (!accessKeyId || !secretAccessKey || !sessionToken || !expiration) {\n    throw new CredentialsProviderError(\"SSO returns an invalid temporary credential.\", SHOULD_FAIL_CREDENTIAL_CHAIN);\n  }\n  return { accessKeyId, secretAccessKey, sessionToken, expiration: new Date(expiration) };\n};\n\n/**\n * @internal\n */\nexport interface SsoProfile extends Profile {\n  sso_start_url: string;\n  sso_account_id: string;\n  sso_region: string;\n  sso_role_name: string;\n}\n\n/**\n * @internal\n */\nexport const validateSsoProfile = (profile: Partial<SsoProfile>): SsoProfile => {\n  const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile;\n  if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) {\n    throw new CredentialsProviderError(\n      `Profile is configured with invalid SSO credentials. Required parameters \"sso_account_id\", \"sso_region\", ` +\n        `\"sso_role_name\", \"sso_start_url\". Got ${Object.keys(profile).join(\n          \", \"\n        )}\\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`,\n      SHOULD_FAIL_CREDENTIAL_CHAIN\n    );\n  }\n  return profile as SsoProfile;\n};\n\n/**\n * @internal\n */\nexport const isSsoProfile = (arg: Profile): arg is Partial<SsoProfile> =>\n  arg &&\n  (typeof arg.sso_start_url === \"string\" ||\n    typeof arg.sso_account_id === \"string\" ||\n    typeof arg.sso_region === \"string\" ||\n    typeof arg.sso_role_name === \"string\");\n"]} |
import { SSOClient } from "@aws-sdk/client-sso"; | ||
import { SourceProfileInit } from "@aws-sdk/credential-provider-ini"; | ||
import { Profile } from "@aws-sdk/shared-ini-file-loader"; | ||
import { CredentialProvider } from "@aws-sdk/types"; | ||
import { SourceProfileInit } from "@aws-sdk/util-credentials"; | ||
/** | ||
@@ -11,2 +12,20 @@ * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token. | ||
export declare const EXPIRE_WINDOW_MS: number; | ||
export interface SsoCredentialsParameters { | ||
/** | ||
* The URL to the AWS SSO service. | ||
*/ | ||
ssoStartUrl: string; | ||
/** | ||
* The ID of the AWS account to use for temporary credentials. | ||
*/ | ||
ssoAccountId: string; | ||
/** | ||
* The AWS region to use for temporary credentials. | ||
*/ | ||
ssoRegion: string; | ||
/** | ||
* The name of the AWS role to assume. | ||
*/ | ||
ssoRoleName: string; | ||
} | ||
export interface FromSSOInit extends SourceProfileInit { | ||
@@ -19,2 +38,19 @@ ssoClient?: SSOClient; | ||
*/ | ||
export declare const fromSSO: (init?: FromSSOInit) => CredentialProvider; | ||
export declare const fromSSO: (init?: FromSSOInit & Partial<SsoCredentialsParameters>) => CredentialProvider; | ||
/** | ||
* @internal | ||
*/ | ||
export interface SsoProfile extends Profile { | ||
sso_start_url: string; | ||
sso_account_id: string; | ||
sso_region: string; | ||
sso_role_name: string; | ||
} | ||
/** | ||
* @internal | ||
*/ | ||
export declare const validateSsoProfile: (profile: Partial<SsoProfile>) => SsoProfile; | ||
/** | ||
* @internal | ||
*/ | ||
export declare const isSsoProfile: (arg: Profile) => arg is Partial<SsoProfile>; |
import { SSOClient } from "@aws-sdk/client-sso"; | ||
import { SourceProfileInit } from "@aws-sdk/credential-provider-ini"; | ||
import { Profile } from "@aws-sdk/shared-ini-file-loader"; | ||
import { CredentialProvider } from "@aws-sdk/types"; | ||
import { SourceProfileInit } from "@aws-sdk/util-credentials"; | ||
/** | ||
@@ -11,2 +12,20 @@ * The time window (15 mins) that SDK will treat the SSO token expires in before the defined expiration date in token. | ||
export declare const EXPIRE_WINDOW_MS: number; | ||
export interface SsoCredentialsParameters { | ||
/** | ||
* The URL to the AWS SSO service. | ||
*/ | ||
ssoStartUrl: string; | ||
/** | ||
* The ID of the AWS account to use for temporary credentials. | ||
*/ | ||
ssoAccountId: string; | ||
/** | ||
* The AWS region to use for temporary credentials. | ||
*/ | ||
ssoRegion: string; | ||
/** | ||
* The name of the AWS role to assume. | ||
*/ | ||
ssoRoleName: string; | ||
} | ||
export interface FromSSOInit extends SourceProfileInit { | ||
@@ -19,2 +38,19 @@ ssoClient?: SSOClient; | ||
*/ | ||
export declare const fromSSO: (init?: FromSSOInit) => CredentialProvider; | ||
export declare const fromSSO: (init?: FromSSOInit & Partial<SsoCredentialsParameters>) => CredentialProvider; | ||
/** | ||
* @internal | ||
*/ | ||
export interface SsoProfile extends Profile { | ||
sso_start_url: string; | ||
sso_account_id: string; | ||
sso_region: string; | ||
sso_role_name: string; | ||
} | ||
/** | ||
* @internal | ||
*/ | ||
export declare const validateSsoProfile: (profile: Partial<SsoProfile>) => SsoProfile; | ||
/** | ||
* @internal | ||
*/ | ||
export declare const isSsoProfile: (arg: Profile) => arg is Partial<SsoProfile>; |
{ | ||
"name": "@aws-sdk/credential-provider-sso", | ||
"version": "3.21.0", | ||
"version": "3.22.0", | ||
"description": "AWS credential provider that exchanges a resolved SSO login token file for temporary AWS credentials", | ||
@@ -24,7 +24,7 @@ "main": "./dist/cjs/index.js", | ||
"dependencies": { | ||
"@aws-sdk/client-sso": "3.21.0", | ||
"@aws-sdk/credential-provider-ini": "3.20.0", | ||
"@aws-sdk/property-provider": "3.20.0", | ||
"@aws-sdk/shared-ini-file-loader": "3.20.0", | ||
"@aws-sdk/types": "3.20.0", | ||
"@aws-sdk/client-sso": "3.22.0", | ||
"@aws-sdk/property-provider": "3.22.0", | ||
"@aws-sdk/shared-ini-file-loader": "3.22.0", | ||
"@aws-sdk/types": "3.22.0", | ||
"@aws-sdk/util-credentials": "3.22.0", | ||
"tslib": "^2.0.0" | ||
@@ -44,4 +44,4 @@ }, | ||
"<4.0": { | ||
"types/*": [ | ||
"types/ts3.4/*" | ||
"dist/types/*": [ | ||
"dist/types/ts3.4/*" | ||
] | ||
@@ -48,0 +48,0 @@ } |
@@ -9,7 +9,3 @@ # @aws-sdk/credential-provider-sso | ||
This module provides a function, `fromSSO`, that creates | ||
`CredentialProvider` functions that read from [AWS SDKs and Tools | ||
shared configuration and credentials | ||
files](https://docs.aws.amazon.com/credref/latest/refdocs/creds-config-files.html). | ||
Profiles in the `credentials` file are given precedence over | ||
profiles in the `config` file. This provider loads the | ||
`CredentialProvider` functions that read from the | ||
_resolved_ access token from local disk then requests temporary AWS | ||
@@ -19,2 +15,15 @@ credentials. For guidance on the AWS Single Sign-On service, please | ||
You can create the `CredentialProvider` functions using the inline SSO | ||
parameters(`ssoStartUrl`, `ssoAccountId`, `ssoRegion`, `ssoRoleName`) or load | ||
them from [AWS SDKs and Tools shared configuration and credentials files](https://docs.aws.amazon.com/credref/latest/refdocs/creds-config-files.html). | ||
Profiles in the `credentials` file are given precedence over | ||
profiles in the `config` file. | ||
This credential provider is intended for use with the AWS SDK for Node.js. | ||
This credential provider **ONLY** supports profiles using the SSO credential. If | ||
you have a profile that assumes a role which derived from the SSO credential, | ||
you should use the `@aws-sdk/credential-provider-ini`, or | ||
`@aws-sdk/credential-provider-node` package. | ||
## Supported configuration | ||
@@ -25,2 +34,10 @@ | ||
- `ssoStartUrl`: The URL to the AWS SSO service. Required if any of the `sso*` | ||
options(except for `ssoClient`) is provided. | ||
- `ssoAccountId`: The ID of the AWS account to use for temporary credentials. | ||
Required if any of the `sso*` options(except for `ssoClient`) is provided. | ||
- `ssoRegion`: The AWS region to use for temporary credentials. Required if any | ||
of the `sso*` options(except for `ssoClient`) is provided. | ||
- `ssoRoleName`: The name of the AWS role to assume. Required if any of the | ||
`sso*` options(except for `ssoClient`) is provided. | ||
- `profile` - The configuration profile to use. If not specified, the provider | ||
@@ -27,0 +44,0 @@ will use the value in the `AWS_PROFILE` environment variable or `default` by |
@@ -5,6 +5,6 @@ jest.useFakeTimers("modern"); | ||
const mockParseKnowFiles = jest.fn(); | ||
const mockParseKnownFiles = jest.fn(); | ||
const mockGetMasterProfileName = jest.fn(); | ||
jest.mock("@aws-sdk/credential-provider-ini", () => ({ | ||
parseKnownFiles: mockParseKnowFiles, | ||
jest.mock("@aws-sdk/util-credentials", () => ({ | ||
parseKnownFiles: mockParseKnownFiles, | ||
getMasterProfileName: mockGetMasterProfileName, | ||
@@ -40,17 +40,16 @@ })); | ||
describe("fromSSO", () => { | ||
const ssoConfig = { | ||
sso_start_url: "https:some-url/start", | ||
sso_account_id: "1234567890", | ||
sso_region: "us-foo-1", | ||
sso_role_name: "some-role", | ||
}; | ||
describe("fromSSO()", () => { | ||
const ssoStartUrl = "https:some-url/start"; | ||
const ssoAccountId = "1234567890"; | ||
const ssoRegion = "us-foo-1"; | ||
const ssoRoleName = "some-role"; | ||
const token = { | ||
startUrl: ssoConfig.sso_start_url, | ||
region: ssoConfig.sso_region, | ||
startUrl: ssoStartUrl, | ||
region: ssoRegion, | ||
accessToken: "base64 encoded string", | ||
expiresAt: toRFC3339String(now + 60 * 60 * 1000), | ||
}; | ||
beforeEach(() => { | ||
mockParseKnowFiles.mockClear(); | ||
mockParseKnownFiles.mockClear(); | ||
mockGetMasterProfileName.mockClear(); | ||
@@ -61,57 +60,64 @@ mockReadFileSync.mockClear(); | ||
it("should fetch credentials from resolved token file", async () => { | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
const { roleCredentials } = mockRoleCredentials; | ||
expect(await fromSSO()()).toEqual({ ...roleCredentials, expiration: new Date(roleCredentials.expiration) }); | ||
expect(mockReadFileSync.mock.calls[0][0]).toEqual( | ||
expect.stringMatching(/fcab95d6966151d97d9ee7776a90d895b5e5fbe6.json$/) | ||
); | ||
expect(mockReadFileSync.mock.calls[0][1]).toMatchObject({ encoding: "utf-8" }); | ||
expect(mockGetRoleCredentialsCommand).toHaveBeenCalledWith({ | ||
accountId: ssoConfig.sso_account_id, | ||
roleName: ssoConfig.sso_role_name, | ||
accessToken: token.accessToken, | ||
describe("load from shared config file", () => { | ||
const ssoConfig = { | ||
sso_start_url: ssoStartUrl, | ||
sso_account_id: ssoAccountId, | ||
sso_region: ssoRegion, | ||
sso_role_name: ssoRoleName, | ||
}; | ||
it("should fetch credentials from resolved token file", async () => { | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
const { roleCredentials } = mockRoleCredentials; | ||
expect(await fromSSO()()).toEqual({ ...roleCredentials, expiration: new Date(roleCredentials.expiration) }); | ||
expect(mockReadFileSync.mock.calls[0][0]).toEqual( | ||
expect.stringMatching(/fcab95d6966151d97d9ee7776a90d895b5e5fbe6.json$/) | ||
); | ||
expect(mockReadFileSync.mock.calls[0][1]).toMatchObject({ encoding: "utf-8" }); | ||
expect(mockGetRoleCredentialsCommand).toHaveBeenCalledWith({ | ||
accountId: ssoConfig.sso_account_id, | ||
roleName: ssoConfig.sso_role_name, | ||
accessToken: token.accessToken, | ||
}); | ||
}); | ||
}); | ||
it("should allow supplying custom client", async () => { | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
const newSSOClient = { send: jest.fn().mockReturnValue(Promise.resolve(mockRoleCredentials)) }; | ||
//@ts-expect-error | ||
await fromSSO({ ssoClient: newSSOClient })(); | ||
expect(newSSOClient.send).toHaveBeenCalled(); | ||
expect(mockSSOSend).not.toHaveBeenCalled(); | ||
}); | ||
it("should allow supplying custom client", async () => { | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
const newSSOClient = { send: jest.fn().mockReturnValue(Promise.resolve(mockRoleCredentials)) }; | ||
//@ts-expect-error | ||
await fromSSO({ ssoClient: newSSOClient })(); | ||
expect(newSSOClient.send).toHaveBeenCalled(); | ||
expect(mockSSOSend).not.toHaveBeenCalled(); | ||
}); | ||
it("should throw if profile doesn't exist in the config files", () => { | ||
const profile = "exist"; | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ non_exist: { foo: "bar" } })); | ||
mockGetMasterProfileName.mockReturnValue(profile); | ||
return expect(async () => { | ||
await fromSSO()(); | ||
}).rejects.toMatchObject({ | ||
message: `Profile ${profile} could not be found in shared credentials file.`, | ||
tryNextLink: true, | ||
it("should throw if profile doesn't exist in the config files", () => { | ||
const profile = "exist"; | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ non_exist: { foo: "bar" } })); | ||
mockGetMasterProfileName.mockReturnValue(profile); | ||
return expect(async () => { | ||
await fromSSO()(); | ||
}).rejects.toMatchObject({ | ||
name: "CredentialsProviderError", | ||
message: expect.stringContaining("Profile exist is not configured with SSO credentials"), | ||
tryNextLink: true, | ||
}); | ||
}); | ||
}); | ||
it("should throw if profile is not configured with SSO credential", () => { | ||
const profile = "exist"; | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ [profile]: { foo: "bar" } })); | ||
mockGetMasterProfileName.mockReturnValue(profile); | ||
return expect(async () => { | ||
await fromSSO()(); | ||
}).rejects.toMatchObject({ | ||
message: `Profile ${profile} is not configured with SSO credentials.`, | ||
tryNextLink: true, | ||
it("should throw if profile is not configured with SSO credential", () => { | ||
const profile = "exist"; | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ [profile]: { foo: "bar" } })); | ||
mockGetMasterProfileName.mockReturnValue(profile); | ||
return expect(async () => { | ||
await fromSSO()(); | ||
}).rejects.toMatchObject({ | ||
message: `Profile ${profile} is not configured with SSO credentials.`, | ||
tryNextLink: true, | ||
}); | ||
}); | ||
}); | ||
for (let i = 0; i < Object.keys(ssoConfig).length; i++) { | ||
const keyToRemove = Object.keys(ssoConfig)[i]; | ||
it(`should throw if sso configuration is missing ${keyToRemove}`, async () => { | ||
it.each(Object.keys(ssoConfig))("should throw if sso configuration is missing %s", async (keyToRemove) => { | ||
expect.assertions(2); | ||
@@ -121,3 +127,3 @@ const config = { ...ssoConfig }; | ||
delete config[keyToRemove]; | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: config })); | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: config })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
@@ -127,84 +133,140 @@ try { | ||
} catch (e) { | ||
expect(e.message).toContain("Profile default does not have valid SSO credentials."); | ||
expect(e.message).toContain("Profile is configured with invalid SSO credentials."); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} | ||
}); | ||
} | ||
it("should throw if token cache file is not found", async () => { | ||
expect.assertions(2); | ||
mockReadFileSync.mockImplementation(() => { | ||
throw new Error("File not found."); | ||
it("should throw if token cache file is not found", async () => { | ||
expect.assertions(2); | ||
mockReadFileSync.mockImplementation(() => { | ||
throw new Error("File not found."); | ||
}); | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain( | ||
"The SSO session associated with this profile has expired or is otherwise invalid." | ||
); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} | ||
}); | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain("The SSO session associated with this profile has expired or is otherwise invalid."); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} | ||
}); | ||
it("should throw if token cache file is invalid", async () => { | ||
expect.assertions(2); | ||
mockReadFileSync.mockReturnValue("invalid JSON content"); | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain("The SSO session associated with this profile has expired or is otherwise invalid."); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} | ||
}); | ||
it("should throw if token cache file is invalid", async () => { | ||
expect.assertions(2); | ||
mockReadFileSync.mockReturnValue("invalid JSON content"); | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain( | ||
"The SSO session associated with this profile has expired or is otherwise invalid." | ||
); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} | ||
}); | ||
it("should throw if token cache is expired", async () => { | ||
expect.assertions(2); | ||
mockReadFileSync.mockReturnValue({ ...token, expiration: toRFC3339String(now + EXPIRE_WINDOW_MS - 2) }); | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain("The SSO session associated with this profile has expired or is otherwise invalid."); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} | ||
}); | ||
it("should throw if token cache is expired", async () => { | ||
expect.assertions(2); | ||
mockReadFileSync.mockReturnValue({ ...token, expiration: toRFC3339String(now + EXPIRE_WINDOW_MS - 2) }); | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain( | ||
"The SSO session associated with this profile has expired or is otherwise invalid." | ||
); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} | ||
}); | ||
it("should throw if SSO client throws", async () => { | ||
expect.assertions(3); | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
const clientError = new Error("No account is found for the user"); | ||
//@ts-ignore | ||
clientError.$fault = "client"; | ||
mockSSOSend.mockImplementation(async () => { | ||
throw clientError; | ||
it("should throw if SSO client throws", async () => { | ||
expect.assertions(3); | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
const clientError = new Error("No account is found for the user"); | ||
//@ts-ignore | ||
clientError.$fault = "client"; | ||
mockSSOSend.mockImplementation(async () => { | ||
throw clientError; | ||
}); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain(clientError.message); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
expect(e.$fault).toBe("client"); | ||
} | ||
}); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain(clientError.message); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
expect(e.$fault).toBe("client"); | ||
} | ||
it("should throw if credentials from SSO client is invalid", async () => { | ||
expect.assertions(2); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
mockParseKnownFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
mockSSOSend.mockResolvedValue({ | ||
roleCredentials: { ...mockRoleCredentials.roleCredentials, accessKeyId: undefined }, | ||
}); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain("SSO returns an invalid temporary credential."); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} finally { | ||
mockSSOSend.mockResolvedValue(mockRoleCredentials); | ||
} | ||
}); | ||
}); | ||
it("should throw if credentials from SSO client is invalid", async () => { | ||
expect.assertions(2); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
mockParseKnowFiles.mockReturnValue(Promise.resolve({ default: ssoConfig })); | ||
mockGetMasterProfileName.mockReturnValue("default"); | ||
mockSSOSend.mockResolvedValue({ | ||
roleCredentials: { ...mockRoleCredentials.roleCredentials, accessKeyId: undefined }, | ||
describe("load with sso parameters", () => { | ||
it("should fetch credentials from resolved token file without reading shared config file", async () => { | ||
mockParseKnownFiles.mockRejectedValue("Should not call parseKnownFiles()"); | ||
mockGetMasterProfileName.mockRejectedValue("Should not call getMasterProfileName()"); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
const { roleCredentials } = mockRoleCredentials; | ||
expect( | ||
await fromSSO({ | ||
ssoStartUrl, | ||
ssoAccountId, | ||
ssoRegion, | ||
ssoRoleName, | ||
})() | ||
).toEqual({ ...roleCredentials, expiration: new Date(roleCredentials.expiration) }); | ||
expect(mockReadFileSync.mock.calls[0][0]).toEqual( | ||
expect.stringMatching(/fcab95d6966151d97d9ee7776a90d895b5e5fbe6.json$/) | ||
); | ||
expect(mockReadFileSync.mock.calls[0][1]).toMatchObject({ encoding: "utf-8" }); | ||
expect(mockGetRoleCredentialsCommand).toHaveBeenCalledWith({ | ||
accountId: ssoAccountId, | ||
roleName: ssoRoleName, | ||
accessToken: token.accessToken, | ||
}); | ||
}); | ||
try { | ||
await fromSSO()(); | ||
} catch (e) { | ||
expect(e.message).toContain("SSO returns an invalid temporary credential."); | ||
expect(e.tryNextLink).toBeFalsy(); | ||
} | ||
it.each(["ssoStartUrl", "ssoAccountId", "ssoRegion", "ssoRoleName"])( | ||
"should throw for incomplete sso parameters(missing %s)", | ||
(undefinedKey) => { | ||
mockParseKnownFiles.mockRejectedValue("Should not call parseKnownFiles()"); | ||
mockGetMasterProfileName.mockRejectedValue("Should not call getMasterProfileName()"); | ||
mockReadFileSync.mockReturnValue(JSON.stringify(token)); | ||
return expect( | ||
async () => | ||
await fromSSO({ | ||
ssoStartUrl, | ||
ssoAccountId, | ||
ssoRegion, | ||
ssoRoleName, | ||
...{ [undefinedKey]: undefined }, | ||
} as any)() | ||
).rejects.toMatchObject({ | ||
name: "CredentialsProviderError", | ||
message: expect.stringMatching("Incomplete configuration"), | ||
}); | ||
} | ||
); | ||
}); | ||
}); |
126
src/index.ts
import { GetRoleCredentialsCommand, GetRoleCredentialsCommandOutput, SSOClient } from "@aws-sdk/client-sso"; | ||
import { getMasterProfileName, parseKnownFiles, SourceProfileInit } from "@aws-sdk/credential-provider-ini"; | ||
import { CredentialsProviderError } from "@aws-sdk/property-provider"; | ||
import { getHomeDir, ParsedIniData } from "@aws-sdk/shared-ini-file-loader"; | ||
import { getHomeDir, Profile } from "@aws-sdk/shared-ini-file-loader"; | ||
import { CredentialProvider, Credentials } from "@aws-sdk/types"; | ||
import { getMasterProfileName, parseKnownFiles, SourceProfileInit } from "@aws-sdk/util-credentials"; | ||
import { createHash } from "crypto"; | ||
@@ -32,2 +32,23 @@ import { readFileSync } from "fs"; | ||
export interface SsoCredentialsParameters { | ||
/** | ||
* The URL to the AWS SSO service. | ||
*/ | ||
ssoStartUrl: string; | ||
/** | ||
* The ID of the AWS account to use for temporary credentials. | ||
*/ | ||
ssoAccountId: string; | ||
/** | ||
* The AWS region to use for temporary credentials. | ||
*/ | ||
ssoRegion: string; | ||
/** | ||
* The name of the AWS role to assume. | ||
*/ | ||
ssoRoleName: string; | ||
} | ||
export interface FromSSOInit extends SourceProfileInit { | ||
@@ -42,30 +63,40 @@ ssoClient?: SSOClient; | ||
export const fromSSO = | ||
(init: FromSSOInit = {}): CredentialProvider => | ||
(init: FromSSOInit & Partial<SsoCredentialsParameters> = {} as any): CredentialProvider => | ||
async () => { | ||
const profiles = await parseKnownFiles(init); | ||
return resolveSSOCredentials(getMasterProfileName(init), profiles, init); | ||
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient } = init; | ||
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName) { | ||
// Load the SSO config from shared AWS config file. | ||
const profiles = await parseKnownFiles(init); | ||
const profileName = getMasterProfileName(init); | ||
const profile = profiles[profileName]; | ||
if (!isSsoProfile(profile)) { | ||
throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`); | ||
} | ||
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = validateSsoProfile(profile); | ||
return resolveSSOCredentials({ | ||
ssoStartUrl: sso_start_url, | ||
ssoAccountId: sso_account_id, | ||
ssoRegion: sso_region, | ||
ssoRoleName: sso_role_name, | ||
ssoClient: ssoClient, | ||
}); | ||
} else if (!ssoStartUrl || !ssoAccountId || !ssoRegion || !ssoRoleName) { | ||
throw new CredentialsProviderError( | ||
'Incomplete configuration. The fromSSO() argument hash must include "ssoStartUrl",' + | ||
' "ssoAccountId", "ssoRegion", "ssoRoleName"' | ||
); | ||
} else { | ||
return resolveSSOCredentials({ ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoClient }); | ||
} | ||
}; | ||
const resolveSSOCredentials = async ( | ||
profileName: string, | ||
profiles: ParsedIniData, | ||
options: FromSSOInit | ||
): Promise<Credentials> => { | ||
const profile = profiles[profileName]; | ||
if (!profile) { | ||
throw new CredentialsProviderError(`Profile ${profileName} could not be found in shared credentials file.`); | ||
} | ||
const { sso_start_url: startUrl, sso_account_id: accountId, sso_region: region, sso_role_name: roleName } = profile; | ||
if (!startUrl && !accountId && !region && !roleName) { | ||
throw new CredentialsProviderError(`Profile ${profileName} is not configured with SSO credentials.`); | ||
} | ||
if (!startUrl || !accountId || !region || !roleName) { | ||
throw new CredentialsProviderError( | ||
`Profile ${profileName} does not have valid SSO credentials. Required parameters "sso_account_id", "sso_region", ` + | ||
`"sso_role_name", "sso_start_url". Reference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, | ||
SHOULD_FAIL_CREDENTIAL_CHAIN | ||
); | ||
} | ||
const resolveSSOCredentials = async ({ | ||
ssoStartUrl, | ||
ssoAccountId, | ||
ssoRegion, | ||
ssoRoleName, | ||
ssoClient, | ||
}: FromSSOInit & SsoCredentialsParameters): Promise<Credentials> => { | ||
const hasher = createHash("sha1"); | ||
const cacheName = hasher.update(startUrl).digest("hex"); | ||
const cacheName = hasher.update(ssoStartUrl).digest("hex"); | ||
const tokenFile = join(getHomeDir(), ".aws", "sso", "cache", `${cacheName}.json`); | ||
@@ -86,3 +117,3 @@ let token: SSOToken; | ||
const { accessToken } = token; | ||
const sso = options.ssoClient || new SSOClient({ region }); | ||
const sso = ssoClient || new SSOClient({ region: ssoRegion }); | ||
let ssoResp: GetRoleCredentialsCommandOutput; | ||
@@ -92,4 +123,4 @@ try { | ||
new GetRoleCredentialsCommand({ | ||
accountId, | ||
roleName, | ||
accountId: ssoAccountId, | ||
roleName: ssoRoleName, | ||
accessToken, | ||
@@ -107,1 +138,38 @@ }) | ||
}; | ||
/** | ||
* @internal | ||
*/ | ||
export interface SsoProfile extends Profile { | ||
sso_start_url: string; | ||
sso_account_id: string; | ||
sso_region: string; | ||
sso_role_name: string; | ||
} | ||
/** | ||
* @internal | ||
*/ | ||
export const validateSsoProfile = (profile: Partial<SsoProfile>): SsoProfile => { | ||
const { sso_start_url, sso_account_id, sso_region, sso_role_name } = profile; | ||
if (!sso_start_url || !sso_account_id || !sso_region || !sso_role_name) { | ||
throw new CredentialsProviderError( | ||
`Profile is configured with invalid SSO credentials. Required parameters "sso_account_id", "sso_region", ` + | ||
`"sso_role_name", "sso_start_url". Got ${Object.keys(profile).join( | ||
", " | ||
)}\nReference: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html`, | ||
SHOULD_FAIL_CREDENTIAL_CHAIN | ||
); | ||
} | ||
return profile as SsoProfile; | ||
}; | ||
/** | ||
* @internal | ||
*/ | ||
export const isSsoProfile = (arg: Profile): arg is Partial<SsoProfile> => | ||
arg && | ||
(typeof arg.sso_start_url === "string" || | ||
typeof arg.sso_account_id === "string" || | ||
typeof arg.sso_region === "string" || | ||
typeof arg.sso_role_name === "string"); |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
133566
769
118
1
+ Added@aws-sdk/abort-controller@3.22.0(transitive)
+ Added@aws-sdk/client-sso@3.22.0(transitive)
+ Added@aws-sdk/config-resolver@3.22.0(transitive)
+ Added@aws-sdk/fetch-http-handler@3.22.0(transitive)
+ Added@aws-sdk/hash-node@3.22.0(transitive)
+ Added@aws-sdk/invalid-dependency@3.22.0(transitive)
+ Added@aws-sdk/is-array-buffer@3.22.0(transitive)
+ Added@aws-sdk/middleware-content-length@3.22.0(transitive)
+ Added@aws-sdk/middleware-host-header@3.22.0(transitive)
+ Added@aws-sdk/middleware-logger@3.22.0(transitive)
+ Added@aws-sdk/middleware-retry@3.22.0(transitive)
+ Added@aws-sdk/middleware-serde@3.22.0(transitive)
+ Added@aws-sdk/middleware-stack@3.22.0(transitive)
+ Added@aws-sdk/middleware-user-agent@3.22.0(transitive)
+ Added@aws-sdk/node-config-provider@3.22.0(transitive)
+ Added@aws-sdk/node-http-handler@3.22.0(transitive)
+ Added@aws-sdk/property-provider@3.22.0(transitive)
+ Added@aws-sdk/protocol-http@3.22.0(transitive)
+ Added@aws-sdk/querystring-builder@3.22.0(transitive)
+ Added@aws-sdk/querystring-parser@3.22.0(transitive)
+ Added@aws-sdk/service-error-classification@3.22.0(transitive)
+ Added@aws-sdk/shared-ini-file-loader@3.22.0(transitive)
+ Added@aws-sdk/signature-v4@3.22.0(transitive)
+ Added@aws-sdk/smithy-client@3.22.0(transitive)
+ Added@aws-sdk/types@3.22.0(transitive)
+ Added@aws-sdk/url-parser@3.22.0(transitive)
+ Added@aws-sdk/util-base64-browser@3.22.0(transitive)
+ Added@aws-sdk/util-base64-node@3.22.0(transitive)
+ Added@aws-sdk/util-body-length-browser@3.22.0(transitive)
+ Added@aws-sdk/util-body-length-node@3.22.0(transitive)
+ Added@aws-sdk/util-buffer-from@3.22.0(transitive)
+ Added@aws-sdk/util-credentials@3.22.0(transitive)
+ Added@aws-sdk/util-hex-encoding@3.22.0(transitive)
+ Added@aws-sdk/util-uri-escape@3.22.0(transitive)
+ Added@aws-sdk/util-user-agent-browser@3.22.0(transitive)
+ Added@aws-sdk/util-user-agent-node@3.22.0(transitive)
+ Added@aws-sdk/util-utf8-browser@3.22.0(transitive)
+ Added@aws-sdk/util-utf8-node@3.22.0(transitive)
- Removed@aws-sdk/abort-controller@3.20.0(transitive)
- Removed@aws-sdk/client-sso@3.21.0(transitive)
- Removed@aws-sdk/config-resolver@3.20.0(transitive)
- Removed@aws-sdk/credential-provider-env@3.20.0(transitive)
- Removed@aws-sdk/credential-provider-imds@3.20.0(transitive)
- Removed@aws-sdk/credential-provider-ini@3.20.0(transitive)
- Removed@aws-sdk/credential-provider-web-identity@3.20.0(transitive)
- Removed@aws-sdk/fetch-http-handler@3.20.0(transitive)
- Removed@aws-sdk/hash-node@3.20.0(transitive)
- Removed@aws-sdk/invalid-dependency@3.20.0(transitive)
- Removed@aws-sdk/is-array-buffer@3.20.0(transitive)
- Removed@aws-sdk/middleware-content-length@3.20.0(transitive)
- Removed@aws-sdk/middleware-host-header@3.20.0(transitive)
- Removed@aws-sdk/middleware-logger@3.20.0(transitive)
- Removed@aws-sdk/middleware-retry@3.20.0(transitive)
- Removed@aws-sdk/middleware-serde@3.20.0(transitive)
- Removed@aws-sdk/middleware-stack@3.20.0(transitive)
- Removed@aws-sdk/middleware-user-agent@3.20.0(transitive)
- Removed@aws-sdk/node-config-provider@3.20.0(transitive)
- Removed@aws-sdk/node-http-handler@3.21.0(transitive)
- Removed@aws-sdk/property-provider@3.20.0(transitive)
- Removed@aws-sdk/protocol-http@3.20.0(transitive)
- Removed@aws-sdk/querystring-builder@3.20.0(transitive)
- Removed@aws-sdk/querystring-parser@3.20.0(transitive)
- Removed@aws-sdk/service-error-classification@3.20.0(transitive)
- Removed@aws-sdk/shared-ini-file-loader@3.20.0(transitive)
- Removed@aws-sdk/signature-v4@3.20.0(transitive)
- Removed@aws-sdk/smithy-client@3.20.0(transitive)
- Removed@aws-sdk/types@3.20.0(transitive)
- Removed@aws-sdk/url-parser@3.20.0(transitive)
- Removed@aws-sdk/util-base64-browser@3.20.0(transitive)
- Removed@aws-sdk/util-base64-node@3.20.0(transitive)
- Removed@aws-sdk/util-body-length-browser@3.20.0(transitive)
- Removed@aws-sdk/util-body-length-node@3.20.0(transitive)
- Removed@aws-sdk/util-buffer-from@3.20.0(transitive)
- Removed@aws-sdk/util-hex-encoding@3.20.0(transitive)
- Removed@aws-sdk/util-uri-escape@3.20.0(transitive)
- Removed@aws-sdk/util-user-agent-browser@3.20.0(transitive)
- Removed@aws-sdk/util-user-agent-node@3.20.0(transitive)
- Removed@aws-sdk/util-utf8-browser@3.20.0(transitive)
- Removed@aws-sdk/util-utf8-node@3.20.0(transitive)
Updated@aws-sdk/client-sso@3.22.0
Updated@aws-sdk/types@3.22.0