New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

@aws-sdk/credential-providers

Package Overview
Dependencies
Maintainers
5
Versions
365
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-sdk/credential-providers - npm Package Compare versions

Comparing version 3.730.0 to 3.731.0

dist-cjs/fromTemporaryCredentials.browser.js

62

dist-cjs/fromTemporaryCredentials.js
"use strict";
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
var desc = Object.getOwnPropertyDescriptor(m, k);
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
desc = { enumerable: true, get: function() { return m[k]; } };
}
Object.defineProperty(o, k2, desc);
}) : (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
o[k2] = m[k];
}));
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
Object.defineProperty(o, "default", { enumerable: true, value: v });
}) : function(o, v) {
o["default"] = v;
});
var __importStar = (this && this.__importStar) || function (mod) {
if (mod && mod.__esModule) return mod;
var result = {};
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
__setModuleDefault(result, mod);
return result;
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.fromTemporaryCredentials = void 0;
const property_provider_1 = require("@smithy/property-provider");
const fromNodeProviderChain_1 = require("./fromNodeProviderChain");
const fromTemporaryCredentials_browser_1 = require("./fromTemporaryCredentials.browser");
const fromTemporaryCredentials = (options) => {
let stsClient;
return async () => {
options.logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
if (params?.SerialNumber) {
if (!options.mfaCodeProvider) {
throw new property_provider_1.CredentialsProviderError(`Temporary credential requires multi-factor authentication,` + ` but no MFA code callback was provided.`, {
tryNextLink: false,
logger: options.logger,
});
}
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
}
const { AssumeRoleCommand, STSClient } = await Promise.resolve().then(() => __importStar(require("./loadSts")));
if (!stsClient)
stsClient = new STSClient({ ...options.clientConfig, credentials: options.masterCredentials });
if (options.clientPlugins) {
for (const plugin of options.clientPlugins) {
stsClient.middlewareStack.use(plugin);
}
}
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
throw new property_provider_1.CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
logger: options.logger,
});
}
return {
accessKeyId: Credentials.AccessKeyId,
secretAccessKey: Credentials.SecretAccessKey,
sessionToken: Credentials.SessionToken,
expiration: Credentials.Expiration,
credentialScope: Credentials.CredentialScope,
};
};
return (0, fromTemporaryCredentials_browser_1.fromTemporaryCredentials)(options, fromNodeProviderChain_1.fromNodeProviderChain);
};
exports.fromTemporaryCredentials = fromTemporaryCredentials;

@@ -9,3 +9,3 @@ "use strict";

Object.defineProperty(exports, "fromHttp", { enumerable: true, get: function () { return credential_provider_http_1.fromHttp; } });
tslib_1.__exportStar(require("./fromTemporaryCredentials"), exports);
tslib_1.__exportStar(require("./fromTemporaryCredentials.browser"), exports);
tslib_1.__exportStar(require("./fromWebToken"), exports);

@@ -1,38 +0,5 @@

import { CredentialsProviderError } from "@smithy/property-provider";
import { fromNodeProviderChain } from "./fromNodeProviderChain";
import { fromTemporaryCredentials as fromTemporaryCredentialsBase } from "./fromTemporaryCredentials.browser";
export const fromTemporaryCredentials = (options) => {
let stsClient;
return async () => {
options.logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
if (params?.SerialNumber) {
if (!options.mfaCodeProvider) {
throw new CredentialsProviderError(`Temporary credential requires multi-factor authentication,` + ` but no MFA code callback was provided.`, {
tryNextLink: false,
logger: options.logger,
});
}
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
}
const { AssumeRoleCommand, STSClient } = await import("./loadSts");
if (!stsClient)
stsClient = new STSClient({ ...options.clientConfig, credentials: options.masterCredentials });
if (options.clientPlugins) {
for (const plugin of options.clientPlugins) {
stsClient.middlewareStack.use(plugin);
}
}
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
throw new CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
logger: options.logger,
});
}
return {
accessKeyId: Credentials.AccessKeyId,
secretAccessKey: Credentials.SecretAccessKey,
sessionToken: Credentials.SessionToken,
expiration: Credentials.Expiration,
credentialScope: Credentials.CredentialScope,
};
};
return fromTemporaryCredentialsBase(options, fromNodeProviderChain);
};
export * from "./fromCognitoIdentity";
export * from "./fromCognitoIdentityPool";
export { fromHttp } from "@aws-sdk/credential-provider-http";
export * from "./fromTemporaryCredentials";
export * from "./fromTemporaryCredentials.browser";
export * from "./fromWebToken";

@@ -1,14 +0,8 @@

import type { AssumeRoleCommandInput, STSClientConfig } from "@aws-sdk/nested-clients/sts";
import type { CredentialProviderOptions } from "@aws-sdk/types";
import { AwsCredentialIdentity, AwsCredentialIdentityProvider, Pluggable } from "@smithy/types";
export interface FromTemporaryCredentialsOptions extends CredentialProviderOptions {
params: Omit<AssumeRoleCommandInput, "RoleSessionName"> & {
RoleSessionName?: string;
};
masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
clientConfig?: STSClientConfig;
clientPlugins?: Pluggable<any, any>[];
mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
}
import type { RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
import type { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.browser";
/**
* @public
*/
export { FromTemporaryCredentialsOptions };
/**
* Creates a credential provider function that retrieves temporary credentials from STS AssumeRole API.

@@ -55,2 +49,2 @@ *

*/
export declare const fromTemporaryCredentials: (options: FromTemporaryCredentialsOptions) => AwsCredentialIdentityProvider;
export declare const fromTemporaryCredentials: (options: FromTemporaryCredentialsOptions) => RuntimeConfigAwsCredentialIdentityProvider;

@@ -5,3 +5,3 @@ export * from "./fromCognitoIdentity";

export type { FromHttpOptions, HttpProviderCredentials } from "@aws-sdk/credential-provider-http";
export * from "./fromTemporaryCredentials";
export * from "./fromTemporaryCredentials.browser";
export * from "./fromWebToken";

@@ -1,26 +0,6 @@

import {
AssumeRoleCommandInput,
STSClientConfig,
} from "@aws-sdk/nested-clients/sts";
import { CredentialProviderOptions } from "@aws-sdk/types";
import {
AwsCredentialIdentity,
AwsCredentialIdentityProvider,
Pluggable,
} from "@smithy/types";
export interface FromTemporaryCredentialsOptions
extends CredentialProviderOptions {
params: Pick<
AssumeRoleCommandInput,
Exclude<keyof AssumeRoleCommandInput, "RoleSessionName">
> & {
RoleSessionName?: string;
};
masterCredentials?: AwsCredentialIdentity | AwsCredentialIdentityProvider;
clientConfig?: STSClientConfig;
clientPlugins?: Pluggable<any, any>[];
mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
}
import { RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
import { FromTemporaryCredentialsOptions } from "./fromTemporaryCredentials.browser";
export { FromTemporaryCredentialsOptions };
export declare const fromTemporaryCredentials: (
options: FromTemporaryCredentialsOptions
) => AwsCredentialIdentityProvider;
) => RuntimeConfigAwsCredentialIdentityProvider;

@@ -8,3 +8,3 @@ export * from "./fromCognitoIdentity";

} from "@aws-sdk/credential-provider-http";
export * from "./fromTemporaryCredentials";
export * from "./fromTemporaryCredentials.browser";
export * from "./fromWebToken";
{
"name": "@aws-sdk/credential-providers",
"version": "3.730.0",
"version": "3.731.0",
"description": "A collection of credential providers, without requiring service clients like STS, Cognito",

@@ -33,14 +33,14 @@ "main": "./dist-cjs/index.js",

"dependencies": {
"@aws-sdk/client-cognito-identity": "3.730.0",
"@aws-sdk/core": "3.730.0",
"@aws-sdk/credential-provider-cognito-identity": "3.730.0",
"@aws-sdk/credential-provider-env": "3.730.0",
"@aws-sdk/credential-provider-http": "3.730.0",
"@aws-sdk/credential-provider-ini": "3.730.0",
"@aws-sdk/credential-provider-node": "3.730.0",
"@aws-sdk/credential-provider-process": "3.730.0",
"@aws-sdk/credential-provider-sso": "3.730.0",
"@aws-sdk/credential-provider-web-identity": "3.730.0",
"@aws-sdk/nested-clients": "3.730.0",
"@aws-sdk/types": "3.723.0",
"@aws-sdk/client-cognito-identity": "3.731.0",
"@aws-sdk/core": "3.731.0",
"@aws-sdk/credential-provider-cognito-identity": "3.731.0",
"@aws-sdk/credential-provider-env": "3.731.0",
"@aws-sdk/credential-provider-http": "3.731.0",
"@aws-sdk/credential-provider-ini": "3.731.0",
"@aws-sdk/credential-provider-node": "3.731.0",
"@aws-sdk/credential-provider-process": "3.731.0",
"@aws-sdk/credential-provider-sso": "3.731.0",
"@aws-sdk/credential-provider-web-identity": "3.731.0",
"@aws-sdk/nested-clients": "3.731.0",
"@aws-sdk/types": "3.731.0",
"@smithy/credential-provider-imds": "^4.0.0",

@@ -47,0 +47,0 @@ "@smithy/property-provider": "^4.0.0",

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc