Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

aws-rum-web

Package Overview
Dependencies
Maintainers
0
Versions
33
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

aws-rum-web - npm Package Compare versions

Comparing version 1.18.0 to 1.19.0

12

CHANGELOG.md

@@ -5,2 +5,14 @@ # Changelog

## [1.19.0](https://github.com/aws-observability/aws-rum-web/compare/v1.18.0...v1.19.0) (2024-07-09)
### Features
* support unique credential cookie names ([#560](https://github.com/aws-observability/aws-rum-web/issues/560)) ([a440016](https://github.com/aws-observability/aws-rum-web/commit/a440016e402ed03e5fb463e13d1bdde13dfe5f40))
### Bug Fixes
* reduce CDN size by tree shaking ([#563](https://github.com/aws-observability/aws-rum-web/issues/563)) ([c2da86e](https://github.com/aws-observability/aws-rum-web/commit/c2da86e8e92b8ca294f32de1d8ed8ded654762ca))
## [1.18.0](https://github.com/aws-observability/aws-rum-web/compare/v1.17.0...v1.18.0) (2024-05-29)

@@ -7,0 +19,0 @@

3

dist/cjs/dispatch/Authentication.d.ts

@@ -8,3 +8,4 @@ import { CognitoIdentityClient } from './CognitoIdentityClient';

protected credentials: AwsCredentialIdentity | undefined;
constructor(config: Config);
protected credentialStorageKey: string;
constructor(config: Config, applicationId: string);
/**

@@ -11,0 +12,0 @@ * A credential provider which provides AWS credentials for an anonymous

@@ -55,3 +55,3 @@ "use strict";

var Authentication = /** @class */ (function () {
function Authentication(config) {
function Authentication(config, applicationId) {
var _this = this;

@@ -122,3 +122,3 @@ /**

try {
credentials = JSON.parse(localStorage.getItem(constants_1.CRED_KEY));
credentials = JSON.parse(localStorage.getItem(_this.credentialStorageKey));
}

@@ -145,4 +145,9 @@ catch (e) {

fetchRequestHandler: new fetch_http_handler_1.FetchHttpHandler(),
region: region
region: region,
clientConfig: config,
applicationId: applicationId
});
this.credentialStorageKey = this.config.cookieAttributes.unique
? "".concat(constants_1.CRED_KEY, "_").concat(applicationId)
: constants_1.CRED_KEY;
}

@@ -149,0 +154,0 @@ /**

@@ -6,3 +6,3 @@ import { Config } from '../orchestration/Orchestration';

private stsClient;
constructor(config: Config);
constructor(config: Config, applicationId: string);
/**

@@ -9,0 +9,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic

@@ -57,8 +57,7 @@ "use strict";

var StsClient_1 = require("./StsClient");
var constants_1 = require("../utils/constants");
var Authentication_1 = require("./Authentication");
var BasicAuthentication = /** @class */ (function (_super) {
__extends(BasicAuthentication, _super);
function BasicAuthentication(config) {
var _this = _super.call(this, config) || this;
function BasicAuthentication(config, applicationId) {
var _this = _super.call(this, config, applicationId) || this;
/**

@@ -101,3 +100,3 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic

try {
localStorage.setItem(constants_1.CRED_KEY, JSON.stringify(credentials));
localStorage.setItem(this.credentialStorageKey, JSON.stringify(credentials));
}

@@ -104,0 +103,0 @@ catch (e) {

import { HttpHandler } from '@aws-sdk/protocol-http';
import { AwsCredentialIdentity } from '@aws-sdk/types';
import { Config } from '../orchestration/Orchestration';
interface OpenIdTokenResponse {

@@ -13,2 +14,4 @@ IdentityId: string;

region?: string;
clientConfig?: Config;
applicationId?: string;
};

@@ -18,2 +21,3 @@ export declare class CognitoIdentityClient {

private hostname;
private identityStorageKey;
constructor(config: CognitoIdentityClientConfig);

@@ -20,0 +24,0 @@ getId: (request: {

@@ -54,2 +54,3 @@ "use strict";

var _this = this;
var _a;
this.getId = function (request) { return __awaiter(_this, void 0, void 0, function () {

@@ -62,3 +63,3 @@ var getIdResponse, requestPayload, idRequest, getIdResponse_1, _a, e_1;

try {
getIdResponse = JSON.parse(localStorage.getItem(constants_1.IDENTITY_KEY));
getIdResponse = JSON.parse(localStorage.getItem(this.identityStorageKey));
}

@@ -82,3 +83,3 @@ catch (e) {

try {
localStorage.setItem(constants_1.IDENTITY_KEY, JSON.stringify({ IdentityId: getIdResponse_1.IdentityId }));
localStorage.setItem(this.identityStorageKey, JSON.stringify({ IdentityId: getIdResponse_1.IdentityId }));
}

@@ -112,3 +113,3 @@ catch (e) {

e_2 = _b.sent();
localStorage.removeItem(constants_1.IDENTITY_KEY);
localStorage.removeItem(this.identityStorageKey);
throw new Error("CWR: Failed to retrieve Cognito OpenId token: ".concat(e_2));

@@ -142,3 +143,3 @@ case 4: return [2 /*return*/];

e_3 = _c.sent();
localStorage.removeItem(constants_1.IDENTITY_KEY);
localStorage.removeItem(this.identityStorageKey);
throw new Error("CWR: Failed to retrieve credentials for Cognito identity: ".concat(e_3));

@@ -195,2 +196,5 @@ case 4: return [2 /*return*/];

this.fetchRequestHandler = config.fetchRequestHandler;
this.identityStorageKey = ((_a = config.clientConfig) === null || _a === void 0 ? void 0 : _a.cookieAttributes.unique)
? "".concat(constants_1.IDENTITY_KEY, "_").concat(config.applicationId)
: constants_1.IDENTITY_KEY;
}

@@ -197,0 +201,0 @@ return CognitoIdentityClient;

@@ -1,2 +0,2 @@

import { CredentialProvider, Credentials, HttpResponse } from '@aws-sdk/types';
import { AwsCredentialIdentityProvider, AwsCredentialIdentity, HttpResponse } from '@aws-sdk/types';
import { HttpHandler } from '@aws-sdk/protocol-http';

@@ -9,3 +9,3 @@ import { PutRumEventsRequest } from './dataplane';

region: string;
credentials: CredentialProvider | Credentials | undefined;
credentials: AwsCredentialIdentityProvider | AwsCredentialIdentity | undefined;
};

@@ -12,0 +12,0 @@ export declare class DataPlaneClient {

@@ -5,3 +5,3 @@ import { Config } from '../orchestration/Orchestration';

export declare class EnhancedAuthentication extends Authentication {
constructor(config: Config);
constructor(config: Config, applicationId: string);
/**

@@ -8,0 +8,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced

@@ -55,8 +55,7 @@ "use strict";

exports.EnhancedAuthentication = void 0;
var constants_1 = require("../utils/constants");
var Authentication_1 = require("./Authentication");
var EnhancedAuthentication = /** @class */ (function (_super) {
__extends(EnhancedAuthentication, _super);
function EnhancedAuthentication(config) {
var _this = _super.call(this, config) || this;
function EnhancedAuthentication(config, applicationId) {
var _this = _super.call(this, config, applicationId) || this;
/**

@@ -92,3 +91,3 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced

try {
localStorage.setItem(constants_1.CRED_KEY, JSON.stringify(credentials));
localStorage.setItem(this.credentialStorageKey, JSON.stringify(credentials));
}

@@ -95,0 +94,0 @@ catch (e) {

@@ -19,3 +19,3 @@ "use strict";

var EventBus_1 = require("../event-bus/EventBus");
var webClientVersion = '1.18.0';
var webClientVersion = '1.19.0';
/**

@@ -22,0 +22,0 @@ * A cache which stores events generated by telemetry plugins.

@@ -152,3 +152,3 @@ "use strict";

this.eventCache = this.initEventCache(applicationId, applicationVersion);
this.dispatchManager = this.initDispatch(region);
this.dispatchManager = this.initDispatch(region, applicationId);
this.pluginManager = this.initPluginManager(applicationId, applicationVersion);

@@ -262,3 +262,3 @@ if (this.config.enableRumClient) {

};
Orchestration.prototype.initDispatch = function (region) {
Orchestration.prototype.initDispatch = function (region, applicationId) {
var dispatch = new Dispatch_1.Dispatch(region, this.config.endpointUrl, this.eventCache, this.config);

@@ -272,7 +272,7 @@ // Only retrieves and sets credentials if the session is sampled.

if (this.config.identityPoolId && this.config.guestRoleArn) {
dispatch.setAwsCredentials(new BasicAuthentication_1.BasicAuthentication(this.config)
dispatch.setAwsCredentials(new BasicAuthentication_1.BasicAuthentication(this.config, applicationId)
.ChainAnonymousCredentialsProvider);
}
else if (this.config.identityPoolId) {
dispatch.setAwsCredentials(new EnhancedAuthentication_1.EnhancedAuthentication(this.config)
dispatch.setAwsCredentials(new EnhancedAuthentication_1.EnhancedAuthentication(this.config, applicationId)
.ChainAnonymousCredentialsProvider);

@@ -279,0 +279,0 @@ }

@@ -48,2 +48,3 @@ import { Config } from '../orchestration/Orchestration';

private attributes;
private sessionCookieName;
constructor(appMonitorDetails: AppMonitorDetails, config: Config, record: RecordSessionInitEvent, pageManager: PageManager);

@@ -86,3 +87,2 @@ /**

private sample;
private sessionCookieName;
}

@@ -41,2 +41,5 @@ "use strict";

this.pageManager = pageManager;
this.sessionCookieName = this.config.cookieAttributes.unique
? "".concat(constants_1.SESSION_COOKIE_NAME, "_").concat(this.appMonitorDetails.id)
: constants_1.SESSION_COOKIE_NAME;
// Initialize the session to the nil session

@@ -120,3 +123,3 @@ this.session = {

if (btoa) {
(0, cookies_utils_1.storeCookie)(this.sessionCookieName(), btoa(JSON.stringify(session)), this.config.cookieAttributes, undefined, expires);
(0, cookies_utils_1.storeCookie)(this.sessionCookieName, btoa(JSON.stringify(session)), this.config.cookieAttributes, undefined, expires);
}

@@ -132,3 +135,3 @@ };

if (this.useCookies()) {
var cookie = (0, cookies_utils_1.getCookie)(this.sessionCookieName());
var cookie = (0, cookies_utils_1.getCookie)(this.sessionCookieName);
if (cookie && atob) {

@@ -206,10 +209,4 @@ try {

};
SessionManager.prototype.sessionCookieName = function () {
if (this.config.cookieAttributes.unique) {
return "".concat(constants_1.SESSION_COOKIE_NAME, "_").concat(this.appMonitorDetails.id);
}
return constants_1.SESSION_COOKIE_NAME;
};
return SessionManager;
}());
exports.SessionManager = SessionManager;

@@ -8,3 +8,4 @@ import { CognitoIdentityClient } from './CognitoIdentityClient';

protected credentials: AwsCredentialIdentity | undefined;
constructor(config: Config);
protected credentialStorageKey: string;
constructor(config: Config, applicationId: string);
/**

@@ -11,0 +12,0 @@ * A credential provider which provides AWS credentials for an anonymous

@@ -52,3 +52,3 @@ var __assign = (this && this.__assign) || function () {

var Authentication = /** @class */ (function () {
function Authentication(config) {
function Authentication(config, applicationId) {
var _this = this;

@@ -119,3 +119,3 @@ /**

try {
credentials = JSON.parse(localStorage.getItem(CRED_KEY));
credentials = JSON.parse(localStorage.getItem(_this.credentialStorageKey));
}

@@ -142,4 +142,9 @@ catch (e) {

fetchRequestHandler: new FetchHttpHandler(),
region: region
region: region,
clientConfig: config,
applicationId: applicationId
});
this.credentialStorageKey = this.config.cookieAttributes.unique
? "".concat(CRED_KEY, "_").concat(applicationId)
: CRED_KEY;
}

@@ -146,0 +151,0 @@ /**

@@ -6,3 +6,3 @@ import { Config } from '../orchestration/Orchestration';

private stsClient;
constructor(config: Config);
constructor(config: Config, applicationId: string);
/**

@@ -9,0 +9,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic

@@ -54,8 +54,7 @@ var __extends = (this && this.__extends) || (function () {

import { StsClient } from './StsClient';
import { CRED_KEY } from '../utils/constants';
import { Authentication } from './Authentication';
var BasicAuthentication = /** @class */ (function (_super) {
__extends(BasicAuthentication, _super);
function BasicAuthentication(config) {
var _this = _super.call(this, config) || this;
function BasicAuthentication(config, applicationId) {
var _this = _super.call(this, config, applicationId) || this;
/**

@@ -98,3 +97,3 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic

try {
localStorage.setItem(CRED_KEY, JSON.stringify(credentials));
localStorage.setItem(this.credentialStorageKey, JSON.stringify(credentials));
}

@@ -101,0 +100,0 @@ catch (e) {

import { HttpHandler } from '@aws-sdk/protocol-http';
import { AwsCredentialIdentity } from '@aws-sdk/types';
import { Config } from '../orchestration/Orchestration';
interface OpenIdTokenResponse {

@@ -13,2 +14,4 @@ IdentityId: string;

region?: string;
clientConfig?: Config;
applicationId?: string;
};

@@ -18,2 +21,3 @@ export declare class CognitoIdentityClient {

private hostname;
private identityStorageKey;
constructor(config: CognitoIdentityClientConfig);

@@ -20,0 +24,0 @@ getId: (request: {

@@ -51,2 +51,3 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {

var _this = this;
var _a;
this.getId = function (request) { return __awaiter(_this, void 0, void 0, function () {

@@ -59,3 +60,3 @@ var getIdResponse, requestPayload, idRequest, getIdResponse_1, _a, e_1;

try {
getIdResponse = JSON.parse(localStorage.getItem(IDENTITY_KEY));
getIdResponse = JSON.parse(localStorage.getItem(this.identityStorageKey));
}

@@ -79,3 +80,3 @@ catch (e) {

try {
localStorage.setItem(IDENTITY_KEY, JSON.stringify({ IdentityId: getIdResponse_1.IdentityId }));
localStorage.setItem(this.identityStorageKey, JSON.stringify({ IdentityId: getIdResponse_1.IdentityId }));
}

@@ -109,3 +110,3 @@ catch (e) {

e_2 = _b.sent();
localStorage.removeItem(IDENTITY_KEY);
localStorage.removeItem(this.identityStorageKey);
throw new Error("CWR: Failed to retrieve Cognito OpenId token: ".concat(e_2));

@@ -139,3 +140,3 @@ case 4: return [2 /*return*/];

e_3 = _c.sent();
localStorage.removeItem(IDENTITY_KEY);
localStorage.removeItem(this.identityStorageKey);
throw new Error("CWR: Failed to retrieve credentials for Cognito identity: ".concat(e_3));

@@ -192,2 +193,5 @@ case 4: return [2 /*return*/];

this.fetchRequestHandler = config.fetchRequestHandler;
this.identityStorageKey = ((_a = config.clientConfig) === null || _a === void 0 ? void 0 : _a.cookieAttributes.unique)
? "".concat(IDENTITY_KEY, "_").concat(config.applicationId)
: IDENTITY_KEY;
}

@@ -194,0 +198,0 @@ return CognitoIdentityClient;

@@ -1,2 +0,2 @@

import { CredentialProvider, Credentials, HttpResponse } from '@aws-sdk/types';
import { AwsCredentialIdentityProvider, AwsCredentialIdentity, HttpResponse } from '@aws-sdk/types';
import { HttpHandler } from '@aws-sdk/protocol-http';

@@ -9,3 +9,3 @@ import { PutRumEventsRequest } from './dataplane';

region: string;
credentials: CredentialProvider | Credentials | undefined;
credentials: AwsCredentialIdentityProvider | AwsCredentialIdentity | undefined;
};

@@ -12,0 +12,0 @@ export declare class DataPlaneClient {

@@ -5,3 +5,3 @@ import { Config } from '../orchestration/Orchestration';

export declare class EnhancedAuthentication extends Authentication {
constructor(config: Config);
constructor(config: Config, applicationId: string);
/**

@@ -8,0 +8,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced

@@ -52,8 +52,7 @@ var __extends = (this && this.__extends) || (function () {

};
import { CRED_KEY } from '../utils/constants';
import { Authentication } from './Authentication';
var EnhancedAuthentication = /** @class */ (function (_super) {
__extends(EnhancedAuthentication, _super);
function EnhancedAuthentication(config) {
var _this = _super.call(this, config) || this;
function EnhancedAuthentication(config, applicationId) {
var _this = _super.call(this, config, applicationId) || this;
/**

@@ -89,3 +88,3 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced

try {
localStorage.setItem(CRED_KEY, JSON.stringify(credentials));
localStorage.setItem(this.credentialStorageKey, JSON.stringify(credentials));
}

@@ -92,0 +91,0 @@ catch (e) {

@@ -16,3 +16,3 @@ var __assign = (this && this.__assign) || function () {

import EventBus, { Topic } from '../event-bus/EventBus';
var webClientVersion = '1.18.0';
var webClientVersion = '1.19.0';
/**

@@ -19,0 +19,0 @@ * A cache which stores events generated by telemetry plugins.

@@ -147,3 +147,3 @@ var __assign = (this && this.__assign) || function () {

this.eventCache = this.initEventCache(applicationId, applicationVersion);
this.dispatchManager = this.initDispatch(region);
this.dispatchManager = this.initDispatch(region, applicationId);
this.pluginManager = this.initPluginManager(applicationId, applicationVersion);

@@ -257,3 +257,3 @@ if (this.config.enableRumClient) {

};
Orchestration.prototype.initDispatch = function (region) {
Orchestration.prototype.initDispatch = function (region, applicationId) {
var dispatch = new Dispatch(region, this.config.endpointUrl, this.eventCache, this.config);

@@ -267,7 +267,7 @@ // Only retrieves and sets credentials if the session is sampled.

if (this.config.identityPoolId && this.config.guestRoleArn) {
dispatch.setAwsCredentials(new BasicAuthentication(this.config)
dispatch.setAwsCredentials(new BasicAuthentication(this.config, applicationId)
.ChainAnonymousCredentialsProvider);
}
else if (this.config.identityPoolId) {
dispatch.setAwsCredentials(new EnhancedAuthentication(this.config)
dispatch.setAwsCredentials(new EnhancedAuthentication(this.config, applicationId)
.ChainAnonymousCredentialsProvider);

@@ -274,0 +274,0 @@ }

@@ -48,2 +48,3 @@ import { Config } from '../orchestration/Orchestration';

private attributes;
private sessionCookieName;
constructor(appMonitorDetails: AppMonitorDetails, config: Config, record: RecordSessionInitEvent, pageManager: PageManager);

@@ -86,3 +87,2 @@ /**

private sample;
private sessionCookieName;
}

@@ -38,2 +38,5 @@ var __assign = (this && this.__assign) || function () {

this.pageManager = pageManager;
this.sessionCookieName = this.config.cookieAttributes.unique
? "".concat(SESSION_COOKIE_NAME, "_").concat(this.appMonitorDetails.id)
: SESSION_COOKIE_NAME;
// Initialize the session to the nil session

@@ -117,3 +120,3 @@ this.session = {

if (btoa) {
storeCookie(this.sessionCookieName(), btoa(JSON.stringify(session)), this.config.cookieAttributes, undefined, expires);
storeCookie(this.sessionCookieName, btoa(JSON.stringify(session)), this.config.cookieAttributes, undefined, expires);
}

@@ -129,3 +132,3 @@ };

if (this.useCookies()) {
var cookie = getCookie(this.sessionCookieName());
var cookie = getCookie(this.sessionCookieName);
if (cookie && atob) {

@@ -203,10 +206,4 @@ try {

};
SessionManager.prototype.sessionCookieName = function () {
if (this.config.cookieAttributes.unique) {
return "".concat(SESSION_COOKIE_NAME, "_").concat(this.appMonitorDetails.id);
}
return SESSION_COOKIE_NAME;
};
return SessionManager;
}());
export { SessionManager };

@@ -8,3 +8,4 @@ import { CognitoIdentityClient } from './CognitoIdentityClient';

protected credentials: AwsCredentialIdentity | undefined;
constructor(config: Config);
protected credentialStorageKey: string;
constructor(config: Config, applicationId: string);
/**

@@ -11,0 +12,0 @@ * A credential provider which provides AWS credentials for an anonymous

@@ -6,3 +6,3 @@ import { Config } from '../orchestration/Orchestration';

private stsClient;
constructor(config: Config);
constructor(config: Config, applicationId: string);
/**

@@ -9,0 +9,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's basic

import { HttpHandler } from '@aws-sdk/protocol-http';
import { AwsCredentialIdentity } from '@aws-sdk/types';
import { Config } from '../orchestration/Orchestration';
interface OpenIdTokenResponse {

@@ -13,2 +14,4 @@ IdentityId: string;

region?: string;
clientConfig?: Config;
applicationId?: string;
};

@@ -18,2 +21,3 @@ export declare class CognitoIdentityClient {

private hostname;
private identityStorageKey;
constructor(config: CognitoIdentityClientConfig);

@@ -20,0 +24,0 @@ getId: (request: {

@@ -1,2 +0,2 @@

import { CredentialProvider, Credentials, HttpResponse } from '@aws-sdk/types';
import { AwsCredentialIdentityProvider, AwsCredentialIdentity, HttpResponse } from '@aws-sdk/types';
import { HttpHandler } from '@aws-sdk/protocol-http';

@@ -9,3 +9,3 @@ import { PutRumEventsRequest } from './dataplane';

region: string;
credentials: CredentialProvider | Credentials | undefined;
credentials: AwsCredentialIdentityProvider | AwsCredentialIdentity | undefined;
};

@@ -12,0 +12,0 @@ export declare class DataPlaneClient {

@@ -5,3 +5,3 @@ import { Config } from '../orchestration/Orchestration';

export declare class EnhancedAuthentication extends Authentication {
constructor(config: Config);
constructor(config: Config, applicationId: string);
/**

@@ -8,0 +8,0 @@ * Provides credentials for an anonymous (guest) user. These credentials are retrieved from Cognito's enhanced

@@ -48,2 +48,3 @@ import { Config } from '../orchestration/Orchestration';

private attributes;
private sessionCookieName;
constructor(appMonitorDetails: AppMonitorDetails, config: Config, record: RecordSessionInitEvent, pageManager: PageManager);

@@ -86,3 +87,2 @@ /**

private sample;
private sessionCookieName;
}
{
"name": "aws-rum-web",
"version": "1.18.0",
"version": "1.19.0",
"sideEffects": false,

@@ -57,5 +57,5 @@ "description": "The Amazon CloudWatch RUM web client.",

"postinteg:local:nightwatch:firefox": "kill $(lsof -t -i:8080)",
"smoke:local:headless": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version npx playwright test --config=playwright.local.config.ts",
"smoke:local": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version npx playwright test --config=playwright.local.config.ts --headed",
"smoke:headless": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version INSTALL_METHOD=$INSTALL_METHOD npx playwright test --config=playwright.config.ts",
"smoke:local:headless": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version MONITOR_ID_2=$MONITOR_ID_2 npx playwright test --config=playwright.local.config.ts",
"smoke:local": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version MONITOR_ID_2=$MONITOR_ID_2 npx playwright test --config=playwright.local.config.ts --headed",
"smoke:headless": "cross-env URL=$URL MONITOR_ID=$MONITOR ENDPOINT=$ENDPOINT NAME=$NAME VERSION=$npm_package_version INSTALL_METHOD=$INSTALL_METHOD MONITOR_ID_2=$MONITOR_ID_2 npx playwright test --config=playwright.config.ts",
"prepare": "husky install"

@@ -65,3 +65,2 @@ },

"@aws-sdk/client-rum": "^3.76.0",
"@babel/plugin-transform-modules-commonjs": "^7.21.2",
"@babel/plugin-transform-runtime": "^7.16.0",

@@ -151,5 +150,4 @@ "@babel/preset-env": "~7.20.2",

"browserslist": [
"defaults",
"ie 11"
"defaults"
]
}
# Amazon CloudWatch RUM Web Client
This is the CloudWatch RUM web client source code repository. It hosts a
JavaScript library which performs real user monitoring (RUM) telemetry on web
applications. Data collected by the RUM web client includes page load timing,
JavaScript errors and HTTP requests.
This is the CloudWatch RUM web client source code repository. It hosts a JavaScript library which performs real user monitoring (RUM) telemetry on web applications. Data collected by the RUM web client includes page load timing, JavaScript errors and HTTP requests.

@@ -35,13 +32,5 @@ ## Install as a JavaScript Module

If you encounter a bug with the CloudWatch RUM web client, we want to hear about
it. Before opening a new issue, [search the existing
issues](https://github.com/aws-observability/aws-rum-web/issues?q=is%3Aissue) to
see if others are also experiencing the issue. Include the version of the
CloudWatch RUM web client, Node.js runtime, and other dependencies if
applicable. In addition, include the repro case when appropriate.
If you encounter a bug with the CloudWatch RUM web client, we want to hear about it. Before opening a new issue, [search the existing issues](https://github.com/aws-observability/aws-rum-web/issues?q=is%3Aissue) to see if others are also experiencing the issue. Include the version of the CloudWatch RUM web client, Node.js runtime, and other dependencies if applicable. In addition, include the repro case when appropriate.
The GitHub issues are intended for bug reports and feature requests. For help
and questions about using the CloudWatch RUM web client, use the resources
listed in the Getting Help section. Keeping the list of open issues lean helps
us respond in a timely manner.
The GitHub issues are intended for bug reports and feature requests. For help and questions about using the CloudWatch RUM web client, use the resources listed in the Getting Help section. Keeping the list of open issues lean helps us respond in a timely manner.

@@ -116,4 +105,3 @@ ## Contributing

Some features perform monkey patching which is incompatible with TestCafe. In
these cases, run Nightwatch as a separate browser integration test target:
Some features perform monkey patching which is incompatible with TestCafe. In these cases, run Nightwatch as a separate browser integration test target:

@@ -126,5 +114,3 @@ ```

The CloudWatch RUM web client uses pre-commit tasks to lint and format its
source code. Before submitting code, check that all linter and formatter
warnings have been resolved.
The CloudWatch RUM web client uses pre-commit tasks to lint and format its source code. Before submitting code, check that all linter and formatter warnings have been resolved.

@@ -145,4 +131,3 @@ Attempt to automatically repair linter warnings:

See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more
information.
See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.

@@ -149,0 +134,0 @@ ## License

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc