New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details
Socket
Book a DemoSign in
Socket

assumer

Package Overview
Dependencies
Maintainers
1
Versions
5
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

assumer - npm Package Compare versions

Comparing version
0.1.1
to
0.2.0
+13
-11
index.js

@@ -25,16 +25,18 @@ const AWS = require('aws-sdk');

ctrlSTS.assumeRole(ctrlParams, (ctrErr, ctrlCreds) => {
if (ctrErr) reject(ctrErr);
if (ctrErr) {
reject(ctrErr);
} else {
AWS.config.credentials = ctrlSTS.credentialsFrom(ctrlCreds);
AWS.config.credentials = ctrlSTS.credentialsFrom(ctrlCreds);
const trgtParams = {
RoleArn: `arn:aws:iam::${targetAccount}:role/${targetRole}`,
RoleSessionName: 'AssumedRole',
};
const trgtParams = {
RoleArn: `arn:aws:iam::${targetAccount}:role/${targetRole}`,
RoleSessionName: 'AssumedRole',
};
new AWS.STS().assumeRole(trgtParams, (trgtErr, trgtCreds) => {
if (trgtErr) reject(trgtErr);
resolve(trgtCreds.Credentials);
});
new AWS.STS().assumeRole(trgtParams, (trgtErr, trgtCreds) => {
if (trgtErr) reject(trgtErr);
resolve(trgtCreds.Credentials);
});
}
});
});
{
"name": "assumer",
"version": "0.1.1",
"version": "0.2.0",
"description": "Assume AWS IAM roles between Control account and Target accounts",

@@ -5,0 +5,0 @@ "main": "index.js",