Socket
Socket
Sign inDemoInstall

@aws-sdk/token-providers

Package Overview
Dependencies
6
Maintainers
5
Versions
178
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

Comparing version 3.501.0 to 3.502.0

dist-cjs/loadSsoOidc.js

51

dist-cjs/index.js

@@ -6,2 +6,5 @@ var __defProp = Object.defineProperty;

var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
var __esm = (fn, res) => function __init() {
return fn && (res = (0, fn[__getOwnPropNames(fn)[0]])(fn = 0)), res;
};
var __export = (target, all) => {

@@ -19,5 +22,17 @@ for (var name in all)

};
var __reExport = (target, mod, secondTarget) => (__copyProps(target, mod, "default"), secondTarget && __copyProps(secondTarget, mod, "default"));
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
// src/loadSsoOidc.ts
var loadSsoOidc_exports = {};
__export(loadSsoOidc_exports, {
CreateTokenCommand: () => import_client_sso_oidc.CreateTokenCommand,
SSOOIDCClient: () => import_client_sso_oidc.SSOOIDCClient
});
var import_client_sso_oidc;
var init_loadSsoOidc = __esm({
"src/loadSsoOidc.ts"() {
import_client_sso_oidc = require("@aws-sdk/client-sso-oidc");
}
});
// src/index.ts

@@ -31,3 +46,2 @@ var src_exports = {};

module.exports = __toCommonJS(src_exports);
__reExport(src_exports, require("./bundle/client-sso-oidc-node"), module.exports);

@@ -42,13 +56,10 @@ // src/fromSso.ts

// src/getNewSsoOidcToken.ts
var import_client_sso_oidc_node2 = require("./bundle/client-sso-oidc-node");
// src/getSsoOidcClient.ts
var import_client_sso_oidc_node = require("./bundle/client-sso-oidc-node");
var ssoOidcClientsHash = {};
var getSsoOidcClient = /* @__PURE__ */ __name((ssoRegion) => {
var getSsoOidcClient = /* @__PURE__ */ __name(async (ssoRegion) => {
const { SSOOIDCClient: SSOOIDCClient2 } = await Promise.resolve().then(() => (init_loadSsoOidc(), loadSsoOidc_exports));
if (ssoOidcClientsHash[ssoRegion]) {
return ssoOidcClientsHash[ssoRegion];
}
const ssoOidcClient = new import_client_sso_oidc_node.SSOOIDCClient({ region: ssoRegion });
const ssoOidcClient = new SSOOIDCClient2({ region: ssoRegion });
ssoOidcClientsHash[ssoRegion] = ssoOidcClient;

@@ -59,6 +70,7 @@ return ssoOidcClient;

// src/getNewSsoOidcToken.ts
var getNewSsoOidcToken = /* @__PURE__ */ __name((ssoToken, ssoRegion) => {
const ssoOidcClient = getSsoOidcClient(ssoRegion);
var getNewSsoOidcToken = /* @__PURE__ */ __name(async (ssoToken, ssoRegion) => {
const { CreateTokenCommand: CreateTokenCommand2 } = await Promise.resolve().then(() => (init_loadSsoOidc(), loadSsoOidc_exports));
const ssoOidcClient = await getSsoOidcClient(ssoRegion);
return ssoOidcClient.send(
new import_client_sso_oidc_node2.CreateTokenCommand({
new CreateTokenCommand2({
clientId: ssoToken.clientId,

@@ -104,2 +116,4 @@ clientSecret: ssoToken.clientSecret,

var fromSso = /* @__PURE__ */ __name((init = {}) => async () => {
var _a;
(_a = init.logger) == null ? void 0 : _a.debug("@aws-sdk/token-providers", "fromSso");
const profiles = await (0, import_shared_ini_file_loader.parseKnownFiles)(init);

@@ -182,3 +196,4 @@ const profileName = (0, import_shared_ini_file_loader.getProfileName)(init);

var fromStatic = /* @__PURE__ */ __name(({ token }) => async () => {
var fromStatic = /* @__PURE__ */ __name(({ token, logger }) => async () => {
logger == null ? void 0 : logger.debug("@aws-sdk/token-providers", "fromStatic");
if (!token || !token.token) {

@@ -202,14 +217,2 @@ throw new import_property_provider.TokenProviderError(`Please pass a valid token to fromStatic`, false);

0 && (module.exports = {
AccessDeniedException,
AuthorizationPendingException,
CreateTokenCommand,
ExpiredTokenException,
InternalServerException,
InvalidClientException,
InvalidRequestException,
InvalidScopeException,
SSOOIDCClient,
SlowDownException,
UnauthorizedClientException,
UnsupportedGrantTypeException,
fromSso,

@@ -216,0 +219,0 @@ fromStatic,

@@ -10,2 +10,3 @@ import { TokenProviderError } from "@smithy/property-provider";

export const fromSso = (init = {}) => async () => {
init.logger?.debug("@aws-sdk/token-providers", "fromSso");
const profiles = await parseKnownFiles(init);

@@ -12,0 +13,0 @@ const profileName = getProfileName(init);

import { TokenProviderError } from "@smithy/property-provider";
export const fromStatic = ({ token }) => async () => {
export const fromStatic = ({ token, logger }) => async () => {
logger?.debug("@aws-sdk/token-providers", "fromStatic");
if (!token || !token.token) {

@@ -4,0 +5,0 @@ throw new TokenProviderError(`Please pass a valid token to fromStatic`, false);

@@ -1,5 +0,5 @@

import { CreateTokenCommand } from "./bundle/client-sso-oidc-node";
import { getSsoOidcClient } from "./getSsoOidcClient";
export const getNewSsoOidcToken = (ssoToken, ssoRegion) => {
const ssoOidcClient = getSsoOidcClient(ssoRegion);
export const getNewSsoOidcToken = async (ssoToken, ssoRegion) => {
const { CreateTokenCommand } = await import("./loadSsoOidc");
const ssoOidcClient = await getSsoOidcClient(ssoRegion);
return ssoOidcClient.send(new CreateTokenCommand({

@@ -6,0 +6,0 @@ clientId: ssoToken.clientId,

@@ -1,4 +0,4 @@

import { SSOOIDCClient } from "./bundle/client-sso-oidc-node";
const ssoOidcClientsHash = {};
export const getSsoOidcClient = (ssoRegion) => {
export const getSsoOidcClient = async (ssoRegion) => {
const { SSOOIDCClient } = await import("./loadSsoOidc");
if (ssoOidcClientsHash[ssoRegion]) {

@@ -5,0 +5,0 @@ return ssoOidcClientsHash[ssoRegion];

@@ -1,4 +0,3 @@

export * from "./bundle/client-sso-oidc-node";
export * from "./fromSso";
export * from "./fromStatic";
export * from "./nodeProvider";

@@ -1,4 +0,4 @@

import { TokenIdentityProvider } from "@aws-sdk/types";
import { CredentialProviderOptions, TokenIdentityProvider } from "@aws-sdk/types";
import { SourceProfileInit } from "@smithy/shared-ini-file-loader";
export interface FromSsoInit extends SourceProfileInit {
export interface FromSsoInit extends SourceProfileInit, CredentialProviderOptions {
}

@@ -5,0 +5,0 @@ /**

@@ -1,3 +0,3 @@

import { TokenIdentity, TokenIdentityProvider } from "@aws-sdk/types";
export interface FromStaticInit {
import { CredentialProviderOptions, TokenIdentity, TokenIdentityProvider } from "@aws-sdk/types";
export interface FromStaticInit extends CredentialProviderOptions {
token?: TokenIdentity;

@@ -8,2 +8,2 @@ }

*/
export declare const fromStatic: ({ token }: FromStaticInit) => TokenIdentityProvider;
export declare const fromStatic: ({ token, logger }: FromStaticInit) => TokenIdentityProvider;
import { SSOToken } from "@smithy/shared-ini-file-loader";
/**
* Returns a new SSO OIDC token from ssoOids.createToken() API call.
* @internal
*/
export declare const getNewSsoOidcToken: (ssoToken: SSOToken, ssoRegion: string) => any;
export declare const getNewSsoOidcToken: (ssoToken: SSOToken, ssoRegion: string) => Promise<any>;
/**
* Returns a SSOOIDC client for the given region. If the client has already been created,
* it will be returned from the hash.
* @internal
*/
export declare const getSsoOidcClient: (ssoRegion: string) => any;
export declare const getSsoOidcClient: (ssoRegion: string) => Promise<any>;

@@ -1,4 +0,3 @@

export * from "./bundle/client-sso-oidc-node";
export * from "./fromSso";
export * from "./fromStatic";
export * from "./nodeProvider";

@@ -1,4 +0,9 @@

import { TokenIdentityProvider } from "@aws-sdk/types";
import {
CredentialProviderOptions,
TokenIdentityProvider,
} from "@aws-sdk/types";
import { SourceProfileInit } from "@smithy/shared-ini-file-loader";
export interface FromSsoInit extends SourceProfileInit {}
export interface FromSsoInit
extends SourceProfileInit,
CredentialProviderOptions {}
export declare const fromSso: (init?: FromSsoInit) => TokenIdentityProvider;

@@ -1,3 +0,7 @@

import { TokenIdentity, TokenIdentityProvider } from "@aws-sdk/types";
export interface FromStaticInit {
import {
CredentialProviderOptions,
TokenIdentity,
TokenIdentityProvider,
} from "@aws-sdk/types";
export interface FromStaticInit extends CredentialProviderOptions {
token?: TokenIdentity;

@@ -7,2 +11,3 @@ }

token,
logger,
}: FromStaticInit) => TokenIdentityProvider;

@@ -5,2 +5,2 @@ import { SSOToken } from "@smithy/shared-ini-file-loader";

ssoRegion: string
) => any;
) => Promise<any>;

@@ -1,1 +0,1 @@

export declare const getSsoOidcClient: (ssoRegion: string) => any;
export declare const getSsoOidcClient: (ssoRegion: string) => Promise<any>;

@@ -1,4 +0,3 @@

export * from "./bundle/client-sso-oidc-node";
export * from "./fromSso";
export * from "./fromStatic";
export * from "./nodeProvider";
{
"name": "@aws-sdk/token-providers",
"version": "3.501.0",
"version": "3.502.0",
"description": "A collection of token providers",

@@ -9,3 +9,2 @@ "main": "./dist-cjs/index.js",

"scripts": {
"build:client-bundle": "node ./scripts/esbuild",
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",

@@ -15,3 +14,3 @@ "build:cjs": "node ../../scripts/compilation/inline token-providers",

"build:include:deps": "lerna run --scope $npm_package_name --include-dependencies build",
"build:types": "tsc -p tsconfig.types.json && node ./scripts/nocheck",
"build:types": "tsc -p tsconfig.types.json",
"build:types:downlevel": "downlevel-dts dist-types dist-types/ts3.4",

@@ -32,38 +31,7 @@ "clean": "rimraf ./dist-* && rimraf *.tsbuildinfo",

"dependencies": {
"@aws-crypto/sha256-browser": "3.0.0",
"@aws-crypto/sha256-js": "3.0.0",
"@aws-sdk/middleware-host-header": "3.496.0",
"@aws-sdk/middleware-logger": "3.496.0",
"@aws-sdk/middleware-recursion-detection": "3.496.0",
"@aws-sdk/middleware-user-agent": "3.496.0",
"@aws-sdk/region-config-resolver": "3.496.0",
"@aws-sdk/types": "3.496.0",
"@aws-sdk/util-endpoints": "3.496.0",
"@aws-sdk/util-user-agent-browser": "3.496.0",
"@aws-sdk/util-user-agent-node": "3.496.0",
"@smithy/config-resolver": "^2.1.1",
"@smithy/fetch-http-handler": "^2.4.1",
"@smithy/hash-node": "^2.1.1",
"@smithy/invalid-dependency": "^2.1.1",
"@smithy/middleware-content-length": "^2.1.1",
"@smithy/middleware-endpoint": "^2.4.1",
"@smithy/middleware-retry": "^2.1.1",
"@smithy/middleware-serde": "^2.1.1",
"@smithy/middleware-stack": "^2.1.1",
"@smithy/node-config-provider": "^2.2.1",
"@smithy/node-http-handler": "^2.3.1",
"@aws-sdk/client-sso-oidc": "3.502.0",
"@aws-sdk/types": "3.502.0",
"@smithy/property-provider": "^2.1.1",
"@smithy/protocol-http": "^3.1.1",
"@smithy/shared-ini-file-loader": "^2.3.1",
"@smithy/smithy-client": "^2.3.1",
"@smithy/types": "^2.9.1",
"@smithy/url-parser": "^2.1.1",
"@smithy/util-base64": "^2.1.1",
"@smithy/util-body-length-browser": "^2.1.1",
"@smithy/util-body-length-node": "^2.2.1",
"@smithy/util-defaults-mode-browser": "^2.1.1",
"@smithy/util-defaults-mode-node": "^2.1.1",
"@smithy/util-endpoints": "^1.1.1",
"@smithy/util-retry": "^2.1.1",
"@smithy/util-utf8": "^2.1.1",
"tslib": "^2.5.0"

@@ -93,9 +61,4 @@ },

],
"browser": {
"./dist-es/bundle/client-sso-oidc-node": "./dist-es/bundle/client-sso-oidc-browser"
},
"react-native": {
"./dist-es/bundle/client-sso-oidc-node": "./dist-es/bundle/client-sso-oidc-browser",
"./dist-cjs/bundle/client-sso-oidc-node": "./dist-cjs/bundle/client-sso-oidc-browser"
},
"browser": {},
"react-native": {},
"homepage": "https://github.com/aws/aws-sdk-js-v3/tree/main/packages/token-providers",

@@ -102,0 +65,0 @@ "repository": {

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Packages

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc