aws-rum-web
Advanced tools
Comparing version 1.18.0 to 1.19.0
@@ -5,2 +5,14 @@ # Changelog | ||
## [1.19.0](https://github.com/aws-observability/aws-rum-web/compare/v1.18.0...v1.19.0) (2024-07-09) | ||
### Features | ||
* support unique credential cookie names ([#560](https://github.com/aws-observability/aws-rum-web/issues/560)) ([a440016](https://github.com/aws-observability/aws-rum-web/commit/a440016e402ed03e5fb463e13d1bdde13dfe5f40)) | ||
### Bug Fixes | ||
* reduce CDN size by tree shaking ([#563](https://github.com/aws-observability/aws-rum-web/issues/563)) ([c2da86e](https://github.com/aws-observability/aws-rum-web/commit/c2da86e8e92b8ca294f32de1d8ed8ded654762ca)) | ||
## [1.18.0](https://github.com/aws-observability/aws-rum-web/compare/v1.17.0...v1.18.0) (2024-05-29) | ||
@@ -7,0 +19,0 @@ |
@@ -8,3 +8,4 @@ import { CognitoIdentityClient } from './CognitoIdentityClient'; | ||
protected credentials: AwsCredentialIdentity | undefined; | ||
constructor(config: Config); | ||
protected credentialStorageKey: string; | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -11,0 +12,0 @@ * A credential provider which provides AWS credentials for an anonymous |
@@ -55,3 +55,3 @@ "use strict"; | ||
var Authentication = /** @class */ (function () { | ||
function Authentication(config) { | ||
function Authentication(config, applicationId) { | ||
var _this = this; | ||
@@ -122,3 +122,3 @@ /** | ||
try { | ||
credentials = JSON.parse(localStorage.getItem(constants_1.CRED_KEY)); | ||
credentials = JSON.parse(localStorage.getItem(_this.credentialStorageKey)); | ||
} | ||
@@ -145,4 +145,9 @@ catch (e) { | ||
fetchRequestHandler: new fetch_http_handler_1.FetchHttpHandler(), | ||
region: region | ||
region: region, | ||
clientConfig: config, | ||
applicationId: applicationId | ||
}); | ||
this.credentialStorageKey = this.config.cookieAttributes.unique | ||
? "".concat(constants_1.CRED_KEY, "_").concat(applicationId) | ||
: constants_1.CRED_KEY; | ||
} | ||
@@ -149,0 +154,0 @@ /** |
@@ -6,3 +6,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
private stsClient; | ||
constructor(config: Config); | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -9,0 +9,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic |
@@ -57,8 +57,7 @@ "use strict"; | ||
var StsClient_1 = require("./StsClient"); | ||
var constants_1 = require("../utils/constants"); | ||
var Authentication_1 = require("./Authentication"); | ||
var BasicAuthentication = /** @class */ (function (_super) { | ||
__extends(BasicAuthentication, _super); | ||
function BasicAuthentication(config) { | ||
var _this = _super.call(this, config) || this; | ||
function BasicAuthentication(config, applicationId) { | ||
var _this = _super.call(this, config, applicationId) || this; | ||
/** | ||
@@ -101,3 +100,3 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic | ||
try { | ||
localStorage.setItem(constants_1.CRED_KEY, JSON.stringify(credentials)); | ||
localStorage.setItem(this.credentialStorageKey, JSON.stringify(credentials)); | ||
} | ||
@@ -104,0 +103,0 @@ catch (e) { |
import { HttpHandler } from '@aws-sdk/protocol-http'; | ||
import { AwsCredentialIdentity } from '@aws-sdk/types'; | ||
import { Config } from '../orchestration/Orchestration'; | ||
interface OpenIdTokenResponse { | ||
@@ -13,2 +14,4 @@ IdentityId: string; | ||
region?: string; | ||
clientConfig?: Config; | ||
applicationId?: string; | ||
}; | ||
@@ -18,2 +21,3 @@ export declare class CognitoIdentityClient { | ||
private hostname; | ||
private identityStorageKey; | ||
constructor(config: CognitoIdentityClientConfig); | ||
@@ -20,0 +24,0 @@ getId: (request: { |
@@ -54,2 +54,3 @@ "use strict"; | ||
var _this = this; | ||
var _a; | ||
this.getId = function (request) { return __awaiter(_this, void 0, void 0, function () { | ||
@@ -62,3 +63,3 @@ var getIdResponse, requestPayload, idRequest, getIdResponse_1, _a, e_1; | ||
try { | ||
getIdResponse = JSON.parse(localStorage.getItem(constants_1.IDENTITY_KEY)); | ||
getIdResponse = JSON.parse(localStorage.getItem(this.identityStorageKey)); | ||
} | ||
@@ -82,3 +83,3 @@ catch (e) { | ||
try { | ||
localStorage.setItem(constants_1.IDENTITY_KEY, JSON.stringify({ IdentityId: getIdResponse_1.IdentityId })); | ||
localStorage.setItem(this.identityStorageKey, JSON.stringify({ IdentityId: getIdResponse_1.IdentityId })); | ||
} | ||
@@ -112,3 +113,3 @@ catch (e) { | ||
e_2 = _b.sent(); | ||
localStorage.removeItem(constants_1.IDENTITY_KEY); | ||
localStorage.removeItem(this.identityStorageKey); | ||
throw new Error("CWR: Failed to retrieve Cognito OpenId token: ".concat(e_2)); | ||
@@ -142,3 +143,3 @@ case 4: return [2 /*return*/]; | ||
e_3 = _c.sent(); | ||
localStorage.removeItem(constants_1.IDENTITY_KEY); | ||
localStorage.removeItem(this.identityStorageKey); | ||
throw new Error("CWR: Failed to retrieve credentials for Cognito identity: ".concat(e_3)); | ||
@@ -195,2 +196,5 @@ case 4: return [2 /*return*/]; | ||
this.fetchRequestHandler = config.fetchRequestHandler; | ||
this.identityStorageKey = ((_a = config.clientConfig) === null || _a === void 0 ? void 0 : _a.cookieAttributes.unique) | ||
? "".concat(constants_1.IDENTITY_KEY, "_").concat(config.applicationId) | ||
: constants_1.IDENTITY_KEY; | ||
} | ||
@@ -197,0 +201,0 @@ return CognitoIdentityClient; |
@@ -1,2 +0,2 @@ | ||
import { CredentialProvider, Credentials, HttpResponse } from '@aws-sdk/types'; | ||
import { AwsCredentialIdentityProvider, AwsCredentialIdentity, HttpResponse } from '@aws-sdk/types'; | ||
import { HttpHandler } from '@aws-sdk/protocol-http'; | ||
@@ -9,3 +9,3 @@ import { PutRumEventsRequest } from './dataplane'; | ||
region: string; | ||
credentials: CredentialProvider | Credentials | undefined; | ||
credentials: AwsCredentialIdentityProvider | AwsCredentialIdentity | undefined; | ||
}; | ||
@@ -12,0 +12,0 @@ export declare class DataPlaneClient { |
@@ -5,3 +5,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
export declare class EnhancedAuthentication extends Authentication { | ||
constructor(config: Config); | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -8,0 +8,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced |
@@ -55,8 +55,7 @@ "use strict"; | ||
exports.EnhancedAuthentication = void 0; | ||
var constants_1 = require("../utils/constants"); | ||
var Authentication_1 = require("./Authentication"); | ||
var EnhancedAuthentication = /** @class */ (function (_super) { | ||
__extends(EnhancedAuthentication, _super); | ||
function EnhancedAuthentication(config) { | ||
var _this = _super.call(this, config) || this; | ||
function EnhancedAuthentication(config, applicationId) { | ||
var _this = _super.call(this, config, applicationId) || this; | ||
/** | ||
@@ -92,3 +91,3 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced | ||
try { | ||
localStorage.setItem(constants_1.CRED_KEY, JSON.stringify(credentials)); | ||
localStorage.setItem(this.credentialStorageKey, JSON.stringify(credentials)); | ||
} | ||
@@ -95,0 +94,0 @@ catch (e) { |
@@ -19,3 +19,3 @@ "use strict"; | ||
var EventBus_1 = require("../event-bus/EventBus"); | ||
var webClientVersion = '1.18.0'; | ||
var webClientVersion = '1.19.0'; | ||
/** | ||
@@ -22,0 +22,0 @@ * A cache which stores events generated by telemetry plugins. |
@@ -152,3 +152,3 @@ "use strict"; | ||
this.eventCache = this.initEventCache(applicationId, applicationVersion); | ||
this.dispatchManager = this.initDispatch(region); | ||
this.dispatchManager = this.initDispatch(region, applicationId); | ||
this.pluginManager = this.initPluginManager(applicationId, applicationVersion); | ||
@@ -262,3 +262,3 @@ if (this.config.enableRumClient) { | ||
}; | ||
Orchestration.prototype.initDispatch = function (region) { | ||
Orchestration.prototype.initDispatch = function (region, applicationId) { | ||
var dispatch = new Dispatch_1.Dispatch(region, this.config.endpointUrl, this.eventCache, this.config); | ||
@@ -272,7 +272,7 @@ // Only retrieves and sets credentials if the session is sampled. | ||
if (this.config.identityPoolId && this.config.guestRoleArn) { | ||
dispatch.setAwsCredentials(new BasicAuthentication_1.BasicAuthentication(this.config) | ||
dispatch.setAwsCredentials(new BasicAuthentication_1.BasicAuthentication(this.config, applicationId) | ||
.ChainAnonymousCredentialsProvider); | ||
} | ||
else if (this.config.identityPoolId) { | ||
dispatch.setAwsCredentials(new EnhancedAuthentication_1.EnhancedAuthentication(this.config) | ||
dispatch.setAwsCredentials(new EnhancedAuthentication_1.EnhancedAuthentication(this.config, applicationId) | ||
.ChainAnonymousCredentialsProvider); | ||
@@ -279,0 +279,0 @@ } |
@@ -48,2 +48,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
private attributes; | ||
private sessionCookieName; | ||
constructor(appMonitorDetails: AppMonitorDetails, config: Config, record: RecordSessionInitEvent, pageManager: PageManager); | ||
@@ -86,3 +87,2 @@ /** | ||
private sample; | ||
private sessionCookieName; | ||
} |
@@ -41,2 +41,5 @@ "use strict"; | ||
this.pageManager = pageManager; | ||
this.sessionCookieName = this.config.cookieAttributes.unique | ||
? "".concat(constants_1.SESSION_COOKIE_NAME, "_").concat(this.appMonitorDetails.id) | ||
: constants_1.SESSION_COOKIE_NAME; | ||
// Initialize the session to the nil session | ||
@@ -120,3 +123,3 @@ this.session = { | ||
if (btoa) { | ||
(0, cookies_utils_1.storeCookie)(this.sessionCookieName(), btoa(JSON.stringify(session)), this.config.cookieAttributes, undefined, expires); | ||
(0, cookies_utils_1.storeCookie)(this.sessionCookieName, btoa(JSON.stringify(session)), this.config.cookieAttributes, undefined, expires); | ||
} | ||
@@ -132,3 +135,3 @@ }; | ||
if (this.useCookies()) { | ||
var cookie = (0, cookies_utils_1.getCookie)(this.sessionCookieName()); | ||
var cookie = (0, cookies_utils_1.getCookie)(this.sessionCookieName); | ||
if (cookie && atob) { | ||
@@ -206,10 +209,4 @@ try { | ||
}; | ||
SessionManager.prototype.sessionCookieName = function () { | ||
if (this.config.cookieAttributes.unique) { | ||
return "".concat(constants_1.SESSION_COOKIE_NAME, "_").concat(this.appMonitorDetails.id); | ||
} | ||
return constants_1.SESSION_COOKIE_NAME; | ||
}; | ||
return SessionManager; | ||
}()); | ||
exports.SessionManager = SessionManager; |
@@ -8,3 +8,4 @@ import { CognitoIdentityClient } from './CognitoIdentityClient'; | ||
protected credentials: AwsCredentialIdentity | undefined; | ||
constructor(config: Config); | ||
protected credentialStorageKey: string; | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -11,0 +12,0 @@ * A credential provider which provides AWS credentials for an anonymous |
@@ -52,3 +52,3 @@ var __assign = (this && this.__assign) || function () { | ||
var Authentication = /** @class */ (function () { | ||
function Authentication(config) { | ||
function Authentication(config, applicationId) { | ||
var _this = this; | ||
@@ -119,3 +119,3 @@ /** | ||
try { | ||
credentials = JSON.parse(localStorage.getItem(CRED_KEY)); | ||
credentials = JSON.parse(localStorage.getItem(_this.credentialStorageKey)); | ||
} | ||
@@ -142,4 +142,9 @@ catch (e) { | ||
fetchRequestHandler: new FetchHttpHandler(), | ||
region: region | ||
region: region, | ||
clientConfig: config, | ||
applicationId: applicationId | ||
}); | ||
this.credentialStorageKey = this.config.cookieAttributes.unique | ||
? "".concat(CRED_KEY, "_").concat(applicationId) | ||
: CRED_KEY; | ||
} | ||
@@ -146,0 +151,0 @@ /** |
@@ -6,3 +6,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
private stsClient; | ||
constructor(config: Config); | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -9,0 +9,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic |
@@ -54,8 +54,7 @@ var __extends = (this && this.__extends) || (function () { | ||
import { StsClient } from './StsClient'; | ||
import { CRED_KEY } from '../utils/constants'; | ||
import { Authentication } from './Authentication'; | ||
var BasicAuthentication = /** @class */ (function (_super) { | ||
__extends(BasicAuthentication, _super); | ||
function BasicAuthentication(config) { | ||
var _this = _super.call(this, config) || this; | ||
function BasicAuthentication(config, applicationId) { | ||
var _this = _super.call(this, config, applicationId) || this; | ||
/** | ||
@@ -98,3 +97,3 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic | ||
try { | ||
localStorage.setItem(CRED_KEY, JSON.stringify(credentials)); | ||
localStorage.setItem(this.credentialStorageKey, JSON.stringify(credentials)); | ||
} | ||
@@ -101,0 +100,0 @@ catch (e) { |
import { HttpHandler } from '@aws-sdk/protocol-http'; | ||
import { AwsCredentialIdentity } from '@aws-sdk/types'; | ||
import { Config } from '../orchestration/Orchestration'; | ||
interface OpenIdTokenResponse { | ||
@@ -13,2 +14,4 @@ IdentityId: string; | ||
region?: string; | ||
clientConfig?: Config; | ||
applicationId?: string; | ||
}; | ||
@@ -18,2 +21,3 @@ export declare class CognitoIdentityClient { | ||
private hostname; | ||
private identityStorageKey; | ||
constructor(config: CognitoIdentityClientConfig); | ||
@@ -20,0 +24,0 @@ getId: (request: { |
@@ -51,2 +51,3 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { | ||
var _this = this; | ||
var _a; | ||
this.getId = function (request) { return __awaiter(_this, void 0, void 0, function () { | ||
@@ -59,3 +60,3 @@ var getIdResponse, requestPayload, idRequest, getIdResponse_1, _a, e_1; | ||
try { | ||
getIdResponse = JSON.parse(localStorage.getItem(IDENTITY_KEY)); | ||
getIdResponse = JSON.parse(localStorage.getItem(this.identityStorageKey)); | ||
} | ||
@@ -79,3 +80,3 @@ catch (e) { | ||
try { | ||
localStorage.setItem(IDENTITY_KEY, JSON.stringify({ IdentityId: getIdResponse_1.IdentityId })); | ||
localStorage.setItem(this.identityStorageKey, JSON.stringify({ IdentityId: getIdResponse_1.IdentityId })); | ||
} | ||
@@ -109,3 +110,3 @@ catch (e) { | ||
e_2 = _b.sent(); | ||
localStorage.removeItem(IDENTITY_KEY); | ||
localStorage.removeItem(this.identityStorageKey); | ||
throw new Error("CWR: Failed to retrieve Cognito OpenId token: ".concat(e_2)); | ||
@@ -139,3 +140,3 @@ case 4: return [2 /*return*/]; | ||
e_3 = _c.sent(); | ||
localStorage.removeItem(IDENTITY_KEY); | ||
localStorage.removeItem(this.identityStorageKey); | ||
throw new Error("CWR: Failed to retrieve credentials for Cognito identity: ".concat(e_3)); | ||
@@ -192,2 +193,5 @@ case 4: return [2 /*return*/]; | ||
this.fetchRequestHandler = config.fetchRequestHandler; | ||
this.identityStorageKey = ((_a = config.clientConfig) === null || _a === void 0 ? void 0 : _a.cookieAttributes.unique) | ||
? "".concat(IDENTITY_KEY, "_").concat(config.applicationId) | ||
: IDENTITY_KEY; | ||
} | ||
@@ -194,0 +198,0 @@ return CognitoIdentityClient; |
@@ -1,2 +0,2 @@ | ||
import { CredentialProvider, Credentials, HttpResponse } from '@aws-sdk/types'; | ||
import { AwsCredentialIdentityProvider, AwsCredentialIdentity, HttpResponse } from '@aws-sdk/types'; | ||
import { HttpHandler } from '@aws-sdk/protocol-http'; | ||
@@ -9,3 +9,3 @@ import { PutRumEventsRequest } from './dataplane'; | ||
region: string; | ||
credentials: CredentialProvider | Credentials | undefined; | ||
credentials: AwsCredentialIdentityProvider | AwsCredentialIdentity | undefined; | ||
}; | ||
@@ -12,0 +12,0 @@ export declare class DataPlaneClient { |
@@ -5,3 +5,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
export declare class EnhancedAuthentication extends Authentication { | ||
constructor(config: Config); | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -8,0 +8,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced |
@@ -52,8 +52,7 @@ var __extends = (this && this.__extends) || (function () { | ||
}; | ||
import { CRED_KEY } from '../utils/constants'; | ||
import { Authentication } from './Authentication'; | ||
var EnhancedAuthentication = /** @class */ (function (_super) { | ||
__extends(EnhancedAuthentication, _super); | ||
function EnhancedAuthentication(config) { | ||
var _this = _super.call(this, config) || this; | ||
function EnhancedAuthentication(config, applicationId) { | ||
var _this = _super.call(this, config, applicationId) || this; | ||
/** | ||
@@ -89,3 +88,3 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced | ||
try { | ||
localStorage.setItem(CRED_KEY, JSON.stringify(credentials)); | ||
localStorage.setItem(this.credentialStorageKey, JSON.stringify(credentials)); | ||
} | ||
@@ -92,0 +91,0 @@ catch (e) { |
@@ -16,3 +16,3 @@ var __assign = (this && this.__assign) || function () { | ||
import EventBus, { Topic } from '../event-bus/EventBus'; | ||
var webClientVersion = '1.18.0'; | ||
var webClientVersion = '1.19.0'; | ||
/** | ||
@@ -19,0 +19,0 @@ * A cache which stores events generated by telemetry plugins. |
@@ -147,3 +147,3 @@ var __assign = (this && this.__assign) || function () { | ||
this.eventCache = this.initEventCache(applicationId, applicationVersion); | ||
this.dispatchManager = this.initDispatch(region); | ||
this.dispatchManager = this.initDispatch(region, applicationId); | ||
this.pluginManager = this.initPluginManager(applicationId, applicationVersion); | ||
@@ -257,3 +257,3 @@ if (this.config.enableRumClient) { | ||
}; | ||
Orchestration.prototype.initDispatch = function (region) { | ||
Orchestration.prototype.initDispatch = function (region, applicationId) { | ||
var dispatch = new Dispatch(region, this.config.endpointUrl, this.eventCache, this.config); | ||
@@ -267,7 +267,7 @@ // Only retrieves and sets credentials if the session is sampled. | ||
if (this.config.identityPoolId && this.config.guestRoleArn) { | ||
dispatch.setAwsCredentials(new BasicAuthentication(this.config) | ||
dispatch.setAwsCredentials(new BasicAuthentication(this.config, applicationId) | ||
.ChainAnonymousCredentialsProvider); | ||
} | ||
else if (this.config.identityPoolId) { | ||
dispatch.setAwsCredentials(new EnhancedAuthentication(this.config) | ||
dispatch.setAwsCredentials(new EnhancedAuthentication(this.config, applicationId) | ||
.ChainAnonymousCredentialsProvider); | ||
@@ -274,0 +274,0 @@ } |
@@ -48,2 +48,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
private attributes; | ||
private sessionCookieName; | ||
constructor(appMonitorDetails: AppMonitorDetails, config: Config, record: RecordSessionInitEvent, pageManager: PageManager); | ||
@@ -86,3 +87,2 @@ /** | ||
private sample; | ||
private sessionCookieName; | ||
} |
@@ -38,2 +38,5 @@ var __assign = (this && this.__assign) || function () { | ||
this.pageManager = pageManager; | ||
this.sessionCookieName = this.config.cookieAttributes.unique | ||
? "".concat(SESSION_COOKIE_NAME, "_").concat(this.appMonitorDetails.id) | ||
: SESSION_COOKIE_NAME; | ||
// Initialize the session to the nil session | ||
@@ -117,3 +120,3 @@ this.session = { | ||
if (btoa) { | ||
storeCookie(this.sessionCookieName(), btoa(JSON.stringify(session)), this.config.cookieAttributes, undefined, expires); | ||
storeCookie(this.sessionCookieName, btoa(JSON.stringify(session)), this.config.cookieAttributes, undefined, expires); | ||
} | ||
@@ -129,3 +132,3 @@ }; | ||
if (this.useCookies()) { | ||
var cookie = getCookie(this.sessionCookieName()); | ||
var cookie = getCookie(this.sessionCookieName); | ||
if (cookie && atob) { | ||
@@ -203,10 +206,4 @@ try { | ||
}; | ||
SessionManager.prototype.sessionCookieName = function () { | ||
if (this.config.cookieAttributes.unique) { | ||
return "".concat(SESSION_COOKIE_NAME, "_").concat(this.appMonitorDetails.id); | ||
} | ||
return SESSION_COOKIE_NAME; | ||
}; | ||
return SessionManager; | ||
}()); | ||
export { SessionManager }; |
@@ -8,3 +8,4 @@ import { CognitoIdentityClient } from './CognitoIdentityClient'; | ||
protected credentials: AwsCredentialIdentity | undefined; | ||
constructor(config: Config); | ||
protected credentialStorageKey: string; | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -11,0 +12,0 @@ * A credential provider which provides AWS credentials for an anonymous |
@@ -6,3 +6,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
private stsClient; | ||
constructor(config: Config); | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -9,0 +9,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic |
import { HttpHandler } from '@aws-sdk/protocol-http'; | ||
import { AwsCredentialIdentity } from '@aws-sdk/types'; | ||
import { Config } from '../orchestration/Orchestration'; | ||
interface OpenIdTokenResponse { | ||
@@ -13,2 +14,4 @@ IdentityId: string; | ||
region?: string; | ||
clientConfig?: Config; | ||
applicationId?: string; | ||
}; | ||
@@ -18,2 +21,3 @@ export declare class CognitoIdentityClient { | ||
private hostname; | ||
private identityStorageKey; | ||
constructor(config: CognitoIdentityClientConfig); | ||
@@ -20,0 +24,0 @@ getId: (request: { |
@@ -1,2 +0,2 @@ | ||
import { CredentialProvider, Credentials, HttpResponse } from '@aws-sdk/types'; | ||
import { AwsCredentialIdentityProvider, AwsCredentialIdentity, HttpResponse } from '@aws-sdk/types'; | ||
import { HttpHandler } from '@aws-sdk/protocol-http'; | ||
@@ -9,3 +9,3 @@ import { PutRumEventsRequest } from './dataplane'; | ||
region: string; | ||
credentials: CredentialProvider | Credentials | undefined; | ||
credentials: AwsCredentialIdentityProvider | AwsCredentialIdentity | undefined; | ||
}; | ||
@@ -12,0 +12,0 @@ export declare class DataPlaneClient { |
@@ -5,3 +5,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
export declare class EnhancedAuthentication extends Authentication { | ||
constructor(config: Config); | ||
constructor(config: Config, applicationId: string); | ||
/** | ||
@@ -8,0 +8,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced |
@@ -48,2 +48,3 @@ import { Config } from '../orchestration/Orchestration'; | ||
private attributes; | ||
private sessionCookieName; | ||
constructor(appMonitorDetails: AppMonitorDetails, config: Config, record: RecordSessionInitEvent, pageManager: PageManager); | ||
@@ -86,3 +87,2 @@ /** | ||
private sample; | ||
private sessionCookieName; | ||
} |
{ | ||
"name": "aws-rum-web", | ||
"version": "1.18.0", | ||
"version": "1.19.0", | ||
"sideEffects": false, | ||
@@ -57,5 +57,5 @@ "description": "The Amazon CloudWatch RUM web client.", | ||
"postinteg:local:nightwatch:firefox": "kill $(lsof -t -i:8080)", | ||
"smoke:local:headless": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version npx playwright test --config=playwright.local.config.ts", | ||
"smoke:local": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version npx playwright test --config=playwright.local.config.ts --headed", | ||
"smoke:headless": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version INSTALL_METHOD=$INSTALL_METHOD npx playwright test --config=playwright.config.ts", | ||
"smoke:local:headless": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version MONITOR_ID_2=$MONITOR_ID_2 npx playwright test --config=playwright.local.config.ts", | ||
"smoke:local": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version MONITOR_ID_2=$MONITOR_ID_2 npx playwright test --config=playwright.local.config.ts --headed", | ||
"smoke:headless": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version INSTALL_METHOD=$INSTALL_METHOD MONITOR_ID_2=$MONITOR_ID_2 npx playwright test --config=playwright.config.ts", | ||
"prepare": "husky install" | ||
@@ -65,3 +65,2 @@ }, | ||
"@aws-sdk/client-rum": "^3.76.0", | ||
"@babel/plugin-transform-modules-commonjs": "^7.21.2", | ||
"@babel/plugin-transform-runtime": "^7.16.0", | ||
@@ -151,5 +150,4 @@ "@babel/preset-env": "~7.20.2", | ||
"browserslist": [ | ||
"defaults", | ||
"ie 11" | ||
"defaults" | ||
] | ||
} |
# Amazon CloudWatch RUM Web Client | ||
This is the CloudWatch RUM web client source code repository. It hosts a | ||
JavaScript library which performs real user monitoring (RUM) telemetry on web | ||
applications. Data collected by the RUM web client includes page load timing, | ||
JavaScript errors and HTTP requests. | ||
This is the CloudWatch RUM web client source code repository. It hosts a JavaScript library which performs real user monitoring (RUM) telemetry on web applications. Data collected by the RUM web client includes page load timing, JavaScript errors and HTTP requests. | ||
@@ -35,13 +32,5 @@ ## Install as a JavaScript Module | ||
If you encounter a bug with the CloudWatch RUM web client, we want to hear about | ||
it. Before opening a new issue, [search the existing | ||
issues](https://github.com/aws-observability/aws-rum-web/issues?q=is%3Aissue) to | ||
see if others are also experiencing the issue. Include the version of the | ||
CloudWatch RUM web client, Node.js runtime, and other dependencies if | ||
applicable. In addition, include the repro case when appropriate. | ||
If you encounter a bug with the CloudWatch RUM web client, we want to hear about it. Before opening a new issue, [search the existing issues](https://github.com/aws-observability/aws-rum-web/issues?q=is%3Aissue) to see if others are also experiencing the issue. Include the version of the CloudWatch RUM web client, Node.js runtime, and other dependencies if applicable. In addition, include the repro case when appropriate. | ||
The GitHub issues are intended for bug reports and feature requests. For help | ||
and questions about using the CloudWatch RUM web client, use the resources | ||
listed in the Getting Help section. Keeping the list of open issues lean helps | ||
us respond in a timely manner. | ||
The GitHub issues are intended for bug reports and feature requests. For help and questions about using the CloudWatch RUM web client, use the resources listed in the Getting Help section. Keeping the list of open issues lean helps us respond in a timely manner. | ||
@@ -116,4 +105,3 @@ ## Contributing | ||
Some features perform monkey patching which is incompatible with TestCafe. In | ||
these cases, run Nightwatch as a separate browser integration test target: | ||
Some features perform monkey patching which is incompatible with TestCafe. In these cases, run Nightwatch as a separate browser integration test target: | ||
@@ -126,5 +114,3 @@ ``` | ||
The CloudWatch RUM web client uses pre-commit tasks to lint and format its | ||
source code. Before submitting code, check that all linter and formatter | ||
warnings have been resolved. | ||
The CloudWatch RUM web client uses pre-commit tasks to lint and format its source code. Before submitting code, check that all linter and formatter warnings have been resolved. | ||
@@ -145,4 +131,3 @@ Attempt to automatically repair linter warnings: | ||
See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more | ||
information. | ||
See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information. | ||
@@ -149,0 +134,0 @@ ## License |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
1362934
53
16835
133