fix: 修复配额说明重复和undefined问题
- 在editStorageForm中初始化oss_storage_quota_value和oss_quota_unit - 删除重复的旧配额说明块,保留新的当前配额设置显示 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
201
backend/node_modules/@aws-sdk/credential-provider-node/LICENSE
generated
vendored
Normal file
201
backend/node_modules/@aws-sdk/credential-provider-node/LICENSE
generated
vendored
Normal file
@@ -0,0 +1,201 @@
|
||||
Apache License
|
||||
Version 2.0, January 2004
|
||||
http://www.apache.org/licenses/
|
||||
|
||||
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||
|
||||
1. Definitions.
|
||||
|
||||
"License" shall mean the terms and conditions for use, reproduction,
|
||||
and distribution as defined by Sections 1 through 9 of this document.
|
||||
|
||||
"Licensor" shall mean the copyright owner or entity authorized by
|
||||
the copyright owner that is granting the License.
|
||||
|
||||
"Legal Entity" shall mean the union of the acting entity and all
|
||||
other entities that control, are controlled by, or are under common
|
||||
control with that entity. For the purposes of this definition,
|
||||
"control" means (i) the power, direct or indirect, to cause the
|
||||
direction or management of such entity, whether by contract or
|
||||
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||
|
||||
"You" (or "Your") shall mean an individual or Legal Entity
|
||||
exercising permissions granted by this License.
|
||||
|
||||
"Source" form shall mean the preferred form for making modifications,
|
||||
including but not limited to software source code, documentation
|
||||
source, and configuration files.
|
||||
|
||||
"Object" form shall mean any form resulting from mechanical
|
||||
transformation or translation of a Source form, including but
|
||||
not limited to compiled object code, generated documentation,
|
||||
and conversions to other media types.
|
||||
|
||||
"Work" shall mean the work of authorship, whether in Source or
|
||||
Object form, made available under the License, as indicated by a
|
||||
copyright notice that is included in or attached to the work
|
||||
(an example is provided in the Appendix below).
|
||||
|
||||
"Derivative Works" shall mean any work, whether in Source or Object
|
||||
form, that is based on (or derived from) the Work and for which the
|
||||
editorial revisions, annotations, elaborations, or other modifications
|
||||
represent, as a whole, an original work of authorship. For the purposes
|
||||
of this License, Derivative Works shall not include works that remain
|
||||
separable from, or merely link (or bind by name) to the interfaces of,
|
||||
the Work and Derivative Works thereof.
|
||||
|
||||
"Contribution" shall mean any work of authorship, including
|
||||
the original version of the Work and any modifications or additions
|
||||
to that Work or Derivative Works thereof, that is intentionally
|
||||
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||
or by an individual or Legal Entity authorized to submit on behalf of
|
||||
the copyright owner. For the purposes of this definition, "submitted"
|
||||
means any form of electronic, verbal, or written communication sent
|
||||
to the Licensor or its representatives, including but not limited to
|
||||
communication on electronic mailing lists, source code control systems,
|
||||
and issue tracking systems that are managed by, or on behalf of, the
|
||||
Licensor for the purpose of discussing and improving the Work, but
|
||||
excluding communication that is conspicuously marked or otherwise
|
||||
designated in writing by the copyright owner as "Not a Contribution."
|
||||
|
||||
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||
on behalf of whom a Contribution has been received by Licensor and
|
||||
subsequently incorporated within the Work.
|
||||
|
||||
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||
this License, each Contributor hereby grants to You a perpetual,
|
||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||
copyright license to reproduce, prepare Derivative Works of,
|
||||
publicly display, publicly perform, sublicense, and distribute the
|
||||
Work and such Derivative Works in Source or Object form.
|
||||
|
||||
3. Grant of Patent License. Subject to the terms and conditions of
|
||||
this License, each Contributor hereby grants to You a perpetual,
|
||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||
(except as stated in this section) patent license to make, have made,
|
||||
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||
where such license applies only to those patent claims licensable
|
||||
by such Contributor that are necessarily infringed by their
|
||||
Contribution(s) alone or by combination of their Contribution(s)
|
||||
with the Work to which such Contribution(s) was submitted. If You
|
||||
institute patent litigation against any entity (including a
|
||||
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||
or a Contribution incorporated within the Work constitutes direct
|
||||
or contributory patent infringement, then any patent licenses
|
||||
granted to You under this License for that Work shall terminate
|
||||
as of the date such litigation is filed.
|
||||
|
||||
4. Redistribution. You may reproduce and distribute copies of the
|
||||
Work or Derivative Works thereof in any medium, with or without
|
||||
modifications, and in Source or Object form, provided that You
|
||||
meet the following conditions:
|
||||
|
||||
(a) You must give any other recipients of the Work or
|
||||
Derivative Works a copy of this License; and
|
||||
|
||||
(b) You must cause any modified files to carry prominent notices
|
||||
stating that You changed the files; and
|
||||
|
||||
(c) You must retain, in the Source form of any Derivative Works
|
||||
that You distribute, all copyright, patent, trademark, and
|
||||
attribution notices from the Source form of the Work,
|
||||
excluding those notices that do not pertain to any part of
|
||||
the Derivative Works; and
|
||||
|
||||
(d) If the Work includes a "NOTICE" text file as part of its
|
||||
distribution, then any Derivative Works that You distribute must
|
||||
include a readable copy of the attribution notices contained
|
||||
within such NOTICE file, excluding those notices that do not
|
||||
pertain to any part of the Derivative Works, in at least one
|
||||
of the following places: within a NOTICE text file distributed
|
||||
as part of the Derivative Works; within the Source form or
|
||||
documentation, if provided along with the Derivative Works; or,
|
||||
within a display generated by the Derivative Works, if and
|
||||
wherever such third-party notices normally appear. The contents
|
||||
of the NOTICE file are for informational purposes only and
|
||||
do not modify the License. You may add Your own attribution
|
||||
notices within Derivative Works that You distribute, alongside
|
||||
or as an addendum to the NOTICE text from the Work, provided
|
||||
that such additional attribution notices cannot be construed
|
||||
as modifying the License.
|
||||
|
||||
You may add Your own copyright statement to Your modifications and
|
||||
may provide additional or different license terms and conditions
|
||||
for use, reproduction, or distribution of Your modifications, or
|
||||
for any such Derivative Works as a whole, provided Your use,
|
||||
reproduction, and distribution of the Work otherwise complies with
|
||||
the conditions stated in this License.
|
||||
|
||||
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||
any Contribution intentionally submitted for inclusion in the Work
|
||||
by You to the Licensor shall be under the terms and conditions of
|
||||
this License, without any additional terms or conditions.
|
||||
Notwithstanding the above, nothing herein shall supersede or modify
|
||||
the terms of any separate license agreement you may have executed
|
||||
with Licensor regarding such Contributions.
|
||||
|
||||
6. Trademarks. This License does not grant permission to use the trade
|
||||
names, trademarks, service marks, or product names of the Licensor,
|
||||
except as required for reasonable and customary use in describing the
|
||||
origin of the Work and reproducing the content of the NOTICE file.
|
||||
|
||||
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||
agreed to in writing, Licensor provides the Work (and each
|
||||
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||
implied, including, without limitation, any warranties or conditions
|
||||
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||
appropriateness of using or redistributing the Work and assume any
|
||||
risks associated with Your exercise of permissions under this License.
|
||||
|
||||
8. Limitation of Liability. In no event and under no legal theory,
|
||||
whether in tort (including negligence), contract, or otherwise,
|
||||
unless required by applicable law (such as deliberate and grossly
|
||||
negligent acts) or agreed to in writing, shall any Contributor be
|
||||
liable to You for damages, including any direct, indirect, special,
|
||||
incidental, or consequential damages of any character arising as a
|
||||
result of this License or out of the use or inability to use the
|
||||
Work (including but not limited to damages for loss of goodwill,
|
||||
work stoppage, computer failure or malfunction, or any and all
|
||||
other commercial damages or losses), even if such Contributor
|
||||
has been advised of the possibility of such damages.
|
||||
|
||||
9. Accepting Warranty or Additional Liability. While redistributing
|
||||
the Work or Derivative Works thereof, You may choose to offer,
|
||||
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||
or other liability obligations and/or rights consistent with this
|
||||
License. However, in accepting such obligations, You may act only
|
||||
on Your own behalf and on Your sole responsibility, not on behalf
|
||||
of any other Contributor, and only if You agree to indemnify,
|
||||
defend, and hold each Contributor harmless for any liability
|
||||
incurred by, or claims asserted against, such Contributor by reason
|
||||
of your accepting any such warranty or additional liability.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
APPENDIX: How to apply the Apache License to your work.
|
||||
|
||||
To apply the Apache License to your work, attach the following
|
||||
boilerplate notice, with the fields enclosed by brackets "{}"
|
||||
replaced with your own identifying information. (Don't include
|
||||
the brackets!) The text should be enclosed in the appropriate
|
||||
comment syntax for the file format. We also recommend that a
|
||||
file or class name and description of purpose be included on the
|
||||
same "printed page" as the copyright notice for easier
|
||||
identification within third-party archives.
|
||||
|
||||
Copyright 2018-2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
104
backend/node_modules/@aws-sdk/credential-provider-node/README.md
generated
vendored
Normal file
104
backend/node_modules/@aws-sdk/credential-provider-node/README.md
generated
vendored
Normal file
@@ -0,0 +1,104 @@
|
||||
# @aws-sdk/credential-provider-node
|
||||
|
||||
[](https://www.npmjs.com/package/@aws-sdk/credential-provider-node)
|
||||
[](https://www.npmjs.com/package/@aws-sdk/credential-provider-node)
|
||||
|
||||
## AWS Credential Provider for Node.JS
|
||||
|
||||
This module provides a factory function, `defaultProvider`, that will attempt to
|
||||
source AWS credentials from a Node.JS environment. It will attempt to find
|
||||
credentials from the following sources (listed in order of precedence):
|
||||
|
||||
- Environment variables exposed via `process.env`
|
||||
- SSO credentials from token cache
|
||||
- Web identity token credentials
|
||||
- Shared credentials and config ini files
|
||||
- The EC2/ECS Instance Metadata Service
|
||||
|
||||
The default credential provider will invoke one provider at a time and only
|
||||
continue to the next if no credentials have been located. For example, if the
|
||||
process finds values defined via the `AWS_ACCESS_KEY_ID` and
|
||||
`AWS_SECRET_ACCESS_KEY` environment variables, the files at `~/.aws/credentials`
|
||||
and `~/.aws/config` will not be read, nor will any messages be sent to the
|
||||
Instance Metadata Service.
|
||||
|
||||
If invalid configuration is encountered (such as a profile in
|
||||
`~/.aws/credentials` specifying as its `source_profile` the name of a profile
|
||||
that does not exist), then the chained provider will be rejected with an error
|
||||
and will not invoke the next provider in the list.
|
||||
|
||||
_IMPORTANT_: if you intend to acquire credentials using EKS
|
||||
[IAM Roles for Service Accounts](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html),
|
||||
then you must explicitly specify a value for `roleAssumerWithWebIdentity`. There is a
|
||||
default function available in `@aws-sdk/client-sts` package. An example of using
|
||||
this:
|
||||
|
||||
```js
|
||||
const { getDefaultRoleAssumerWithWebIdentity } = require("@aws-sdk/client-sts");
|
||||
const { defaultProvider } = require("@aws-sdk/credential-provider-node");
|
||||
const { S3Client, GetObjectCommand } = require("@aws-sdk/client-s3");
|
||||
|
||||
const provider = defaultProvider({
|
||||
roleAssumerWithWebIdentity: getDefaultRoleAssumerWithWebIdentity({
|
||||
// You must explicitly pass a region if you are not using us-east-1
|
||||
region: "eu-west-1"
|
||||
}),
|
||||
});
|
||||
|
||||
const client = new S3Client({ credentialDefaultProvider: provider });
|
||||
```
|
||||
|
||||
_IMPORTANT_: We provide a wrapper of this provider in `@aws-sdk/credential-providers`
|
||||
package to save you from importing `getDefaultRoleAssumerWithWebIdentity()` or
|
||||
`getDefaultRoleAssume()` from STS package. Similarly, you can do:
|
||||
|
||||
```js
|
||||
const { fromNodeProviderChain } = require("@aws-sdk/credential-providers");
|
||||
|
||||
const credentials = fromNodeProviderChain();
|
||||
|
||||
const client = new S3Client({ credentials });
|
||||
```
|
||||
|
||||
## Supported configuration
|
||||
|
||||
You may customize how credentials are resolved by providing an options hash to
|
||||
the `defaultProvider` factory function. The following options are
|
||||
supported:
|
||||
|
||||
- `profile` - The configuration profile to use. If not specified, the provider
|
||||
will use the value in the `AWS_PROFILE` environment variable or a default of
|
||||
`default`.
|
||||
- `filepath` - The path to the shared credentials file. If not specified, the
|
||||
provider will use the value in the `AWS_SHARED_CREDENTIALS_FILE` environment
|
||||
variable or a default of `~/.aws/credentials`.
|
||||
- `configFilepath` - The path to the shared config file. If not specified, the
|
||||
provider will use the value in the `AWS_CONFIG_FILE` environment variable or a
|
||||
default of `~/.aws/config`.
|
||||
- `mfaCodeProvider` - A function that returns a a promise fulfilled with an
|
||||
MFA token code for the provided MFA Serial code. If a profile requires an MFA
|
||||
code and `mfaCodeProvider` is not a valid function, the credential provider
|
||||
promise will be rejected.
|
||||
- `roleAssumer` - A function that assumes a role and returns a promise
|
||||
fulfilled with credentials for the assumed role. If not specified, no role
|
||||
will be assumed, and an error will be thrown.
|
||||
- `roleArn` - ARN to assume. If not specified, the provider will use the value
|
||||
in the `AWS_ROLE_ARN` environment variable.
|
||||
- `webIdentityTokenFile` - File location of where the `OIDC` token is stored.
|
||||
If not specified, the provider will use the value in the `AWS_WEB_IDENTITY_TOKEN_FILE`
|
||||
environment variable.
|
||||
- `roleAssumerWithWebIdentity` - A function that assumes a role with web identity and
|
||||
returns a promise fulfilled with credentials for the assumed role.
|
||||
- `timeout` - The connection timeout (in milliseconds) to apply to any remote
|
||||
requests. If not specified, a default value of `1000` (one second) is used.
|
||||
- `maxRetries` - The maximum number of times any HTTP connections should be
|
||||
retried. If not specified, a default value of `0` will be used.
|
||||
|
||||
## Related packages:
|
||||
|
||||
- [AWS Credential Provider for Node.JS - Environment Variables](../credential-provider-env)
|
||||
- [AWS Credential Provider for Node.JS - SSO](../credential-provider-sso)
|
||||
- [AWS Credential Provider for Node.JS - Web Identity](../credential-provider-web-identity)
|
||||
- [AWS Credential Provider for Node.JS - Shared Configuration Files](../credential-provider-ini)
|
||||
- [AWS Credential Provider for Node.JS - Instance and Container Metadata](../credential-provider-imds)
|
||||
- [AWS Shared Configuration File Loader](../shared-ini-file-loader)
|
||||
150
backend/node_modules/@aws-sdk/credential-provider-node/dist-cjs/index.js
generated
vendored
Normal file
150
backend/node_modules/@aws-sdk/credential-provider-node/dist-cjs/index.js
generated
vendored
Normal file
@@ -0,0 +1,150 @@
|
||||
'use strict';
|
||||
|
||||
var credentialProviderEnv = require('@aws-sdk/credential-provider-env');
|
||||
var propertyProvider = require('@smithy/property-provider');
|
||||
var sharedIniFileLoader = require('@smithy/shared-ini-file-loader');
|
||||
|
||||
const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
||||
const remoteProvider = async (init) => {
|
||||
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import('@smithy/credential-provider-imds');
|
||||
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
|
||||
const { fromHttp } = await import('@aws-sdk/credential-provider-http');
|
||||
return propertyProvider.chain(fromHttp(init), fromContainerMetadata(init));
|
||||
}
|
||||
if (process.env[ENV_IMDS_DISABLED] && process.env[ENV_IMDS_DISABLED] !== "false") {
|
||||
return async () => {
|
||||
throw new propertyProvider.CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
|
||||
};
|
||||
}
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
|
||||
return fromInstanceMetadata(init);
|
||||
};
|
||||
|
||||
function memoizeChain(providers, treatAsExpired) {
|
||||
const chain = internalCreateChain(providers);
|
||||
let activeLock;
|
||||
let passiveLock;
|
||||
let credentials;
|
||||
const provider = async (options) => {
|
||||
if (options?.forceRefresh) {
|
||||
return await chain(options);
|
||||
}
|
||||
if (credentials?.expiration) {
|
||||
if (credentials?.expiration?.getTime() < Date.now()) {
|
||||
credentials = undefined;
|
||||
}
|
||||
}
|
||||
if (activeLock) {
|
||||
await activeLock;
|
||||
}
|
||||
else if (!credentials || treatAsExpired?.(credentials)) {
|
||||
if (credentials) {
|
||||
if (!passiveLock) {
|
||||
passiveLock = chain(options).then((c) => {
|
||||
credentials = c;
|
||||
passiveLock = undefined;
|
||||
});
|
||||
}
|
||||
}
|
||||
else {
|
||||
activeLock = chain(options).then((c) => {
|
||||
credentials = c;
|
||||
activeLock = undefined;
|
||||
});
|
||||
return provider(options);
|
||||
}
|
||||
}
|
||||
return credentials;
|
||||
};
|
||||
return provider;
|
||||
}
|
||||
const internalCreateChain = (providers) => async (awsIdentityProperties) => {
|
||||
let lastProviderError;
|
||||
for (const provider of providers) {
|
||||
try {
|
||||
return await provider(awsIdentityProperties);
|
||||
}
|
||||
catch (err) {
|
||||
lastProviderError = err;
|
||||
if (err?.tryNextLink) {
|
||||
continue;
|
||||
}
|
||||
throw err;
|
||||
}
|
||||
}
|
||||
throw lastProviderError;
|
||||
};
|
||||
|
||||
let multipleCredentialSourceWarningEmitted = false;
|
||||
const defaultProvider = (init = {}) => memoizeChain([
|
||||
async () => {
|
||||
const profile = init.profile ?? process.env[sharedIniFileLoader.ENV_PROFILE];
|
||||
if (profile) {
|
||||
const envStaticCredentialsAreSet = process.env[credentialProviderEnv.ENV_KEY] && process.env[credentialProviderEnv.ENV_SECRET];
|
||||
if (envStaticCredentialsAreSet) {
|
||||
if (!multipleCredentialSourceWarningEmitted) {
|
||||
const warnFn = init.logger?.warn && init.logger?.constructor?.name !== "NoOpLogger"
|
||||
? init.logger.warn.bind(init.logger)
|
||||
: console.warn;
|
||||
warnFn(`@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:
|
||||
Multiple credential sources detected:
|
||||
Both AWS_PROFILE and the pair AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY static credentials are set.
|
||||
This SDK will proceed with the AWS_PROFILE value.
|
||||
|
||||
However, a future version may change this behavior to prefer the ENV static credentials.
|
||||
Please ensure that your environment only sets either the AWS_PROFILE or the
|
||||
AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.
|
||||
`);
|
||||
multipleCredentialSourceWarningEmitted = true;
|
||||
}
|
||||
}
|
||||
throw new propertyProvider.CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.", {
|
||||
logger: init.logger,
|
||||
tryNextLink: true,
|
||||
});
|
||||
}
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
|
||||
return credentialProviderEnv.fromEnv(init)();
|
||||
},
|
||||
async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
|
||||
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
||||
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
||||
throw new propertyProvider.CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
|
||||
}
|
||||
const { fromSSO } = await import('@aws-sdk/credential-provider-sso');
|
||||
return fromSSO(init)(awsIdentityProperties);
|
||||
},
|
||||
async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
|
||||
const { fromIni } = await import('@aws-sdk/credential-provider-ini');
|
||||
return fromIni(init)(awsIdentityProperties);
|
||||
},
|
||||
async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
|
||||
const { fromProcess } = await import('@aws-sdk/credential-provider-process');
|
||||
return fromProcess(init)(awsIdentityProperties);
|
||||
},
|
||||
async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
|
||||
const { fromTokenFile } = await import('@aws-sdk/credential-provider-web-identity');
|
||||
return fromTokenFile(init)(awsIdentityProperties);
|
||||
},
|
||||
async () => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
|
||||
return (await remoteProvider(init))();
|
||||
},
|
||||
async () => {
|
||||
throw new propertyProvider.CredentialsProviderError("Could not load credentials from any providers", {
|
||||
tryNextLink: false,
|
||||
logger: init.logger,
|
||||
});
|
||||
},
|
||||
], credentialsTreatedAsExpired);
|
||||
const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
|
||||
const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;
|
||||
|
||||
exports.credentialsTreatedAsExpired = credentialsTreatedAsExpired;
|
||||
exports.credentialsWillNeedRefresh = credentialsWillNeedRefresh;
|
||||
exports.defaultProvider = defaultProvider;
|
||||
73
backend/node_modules/@aws-sdk/credential-provider-node/dist-es/defaultProvider.js
generated
vendored
Normal file
73
backend/node_modules/@aws-sdk/credential-provider-node/dist-es/defaultProvider.js
generated
vendored
Normal file
@@ -0,0 +1,73 @@
|
||||
import { ENV_KEY, ENV_SECRET, fromEnv } from "@aws-sdk/credential-provider-env";
|
||||
import { CredentialsProviderError } from "@smithy/property-provider";
|
||||
import { ENV_PROFILE } from "@smithy/shared-ini-file-loader";
|
||||
import { remoteProvider } from "./remoteProvider";
|
||||
import { memoizeChain } from "./runtime/memoize-chain";
|
||||
let multipleCredentialSourceWarningEmitted = false;
|
||||
export const defaultProvider = (init = {}) => memoizeChain([
|
||||
async () => {
|
||||
const profile = init.profile ?? process.env[ENV_PROFILE];
|
||||
if (profile) {
|
||||
const envStaticCredentialsAreSet = process.env[ENV_KEY] && process.env[ENV_SECRET];
|
||||
if (envStaticCredentialsAreSet) {
|
||||
if (!multipleCredentialSourceWarningEmitted) {
|
||||
const warnFn = init.logger?.warn && init.logger?.constructor?.name !== "NoOpLogger"
|
||||
? init.logger.warn.bind(init.logger)
|
||||
: console.warn;
|
||||
warnFn(`@aws-sdk/credential-provider-node - defaultProvider::fromEnv WARNING:
|
||||
Multiple credential sources detected:
|
||||
Both AWS_PROFILE and the pair AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY static credentials are set.
|
||||
This SDK will proceed with the AWS_PROFILE value.
|
||||
|
||||
However, a future version may change this behavior to prefer the ENV static credentials.
|
||||
Please ensure that your environment only sets either the AWS_PROFILE or the
|
||||
AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY pair.
|
||||
`);
|
||||
multipleCredentialSourceWarningEmitted = true;
|
||||
}
|
||||
}
|
||||
throw new CredentialsProviderError("AWS_PROFILE is set, skipping fromEnv provider.", {
|
||||
logger: init.logger,
|
||||
tryNextLink: true,
|
||||
});
|
||||
}
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromEnv");
|
||||
return fromEnv(init)();
|
||||
},
|
||||
async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromSSO");
|
||||
const { ssoStartUrl, ssoAccountId, ssoRegion, ssoRoleName, ssoSession } = init;
|
||||
if (!ssoStartUrl && !ssoAccountId && !ssoRegion && !ssoRoleName && !ssoSession) {
|
||||
throw new CredentialsProviderError("Skipping SSO provider in default chain (inputs do not include SSO fields).", { logger: init.logger });
|
||||
}
|
||||
const { fromSSO } = await import("@aws-sdk/credential-provider-sso");
|
||||
return fromSSO(init)(awsIdentityProperties);
|
||||
},
|
||||
async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromIni");
|
||||
const { fromIni } = await import("@aws-sdk/credential-provider-ini");
|
||||
return fromIni(init)(awsIdentityProperties);
|
||||
},
|
||||
async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromProcess");
|
||||
const { fromProcess } = await import("@aws-sdk/credential-provider-process");
|
||||
return fromProcess(init)(awsIdentityProperties);
|
||||
},
|
||||
async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::fromTokenFile");
|
||||
const { fromTokenFile } = await import("@aws-sdk/credential-provider-web-identity");
|
||||
return fromTokenFile(init)(awsIdentityProperties);
|
||||
},
|
||||
async () => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - defaultProvider::remoteProvider");
|
||||
return (await remoteProvider(init))();
|
||||
},
|
||||
async () => {
|
||||
throw new CredentialsProviderError("Could not load credentials from any providers", {
|
||||
tryNextLink: false,
|
||||
logger: init.logger,
|
||||
});
|
||||
},
|
||||
], credentialsTreatedAsExpired);
|
||||
export const credentialsWillNeedRefresh = (credentials) => credentials?.expiration !== undefined;
|
||||
export const credentialsTreatedAsExpired = (credentials) => credentials?.expiration !== undefined && credentials.expiration.getTime() - Date.now() < 300000;
|
||||
1
backend/node_modules/@aws-sdk/credential-provider-node/dist-es/index.js
generated
vendored
Normal file
1
backend/node_modules/@aws-sdk/credential-provider-node/dist-es/index.js
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
export * from "./defaultProvider";
|
||||
17
backend/node_modules/@aws-sdk/credential-provider-node/dist-es/remoteProvider.js
generated
vendored
Normal file
17
backend/node_modules/@aws-sdk/credential-provider-node/dist-es/remoteProvider.js
generated
vendored
Normal file
@@ -0,0 +1,17 @@
|
||||
import { chain, CredentialsProviderError } from "@smithy/property-provider";
|
||||
export const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
||||
export const remoteProvider = async (init) => {
|
||||
const { ENV_CMDS_FULL_URI, ENV_CMDS_RELATIVE_URI, fromContainerMetadata, fromInstanceMetadata } = await import("@smithy/credential-provider-imds");
|
||||
if (process.env[ENV_CMDS_RELATIVE_URI] || process.env[ENV_CMDS_FULL_URI]) {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromHttp/fromContainerMetadata");
|
||||
const { fromHttp } = await import("@aws-sdk/credential-provider-http");
|
||||
return chain(fromHttp(init), fromContainerMetadata(init));
|
||||
}
|
||||
if (process.env[ENV_IMDS_DISABLED] && process.env[ENV_IMDS_DISABLED] !== "false") {
|
||||
return async () => {
|
||||
throw new CredentialsProviderError("EC2 Instance Metadata Service access disabled", { logger: init.logger });
|
||||
};
|
||||
}
|
||||
init.logger?.debug("@aws-sdk/credential-provider-node - remoteProvider::fromInstanceMetadata");
|
||||
return fromInstanceMetadata(init);
|
||||
};
|
||||
54
backend/node_modules/@aws-sdk/credential-provider-node/dist-es/runtime/memoize-chain.js
generated
vendored
Normal file
54
backend/node_modules/@aws-sdk/credential-provider-node/dist-es/runtime/memoize-chain.js
generated
vendored
Normal file
@@ -0,0 +1,54 @@
|
||||
export function memoizeChain(providers, treatAsExpired) {
|
||||
const chain = internalCreateChain(providers);
|
||||
let activeLock;
|
||||
let passiveLock;
|
||||
let credentials;
|
||||
const provider = async (options) => {
|
||||
if (options?.forceRefresh) {
|
||||
return await chain(options);
|
||||
}
|
||||
if (credentials?.expiration) {
|
||||
if (credentials?.expiration?.getTime() < Date.now()) {
|
||||
credentials = undefined;
|
||||
}
|
||||
}
|
||||
if (activeLock) {
|
||||
await activeLock;
|
||||
}
|
||||
else if (!credentials || treatAsExpired?.(credentials)) {
|
||||
if (credentials) {
|
||||
if (!passiveLock) {
|
||||
passiveLock = chain(options).then((c) => {
|
||||
credentials = c;
|
||||
passiveLock = undefined;
|
||||
});
|
||||
}
|
||||
}
|
||||
else {
|
||||
activeLock = chain(options).then((c) => {
|
||||
credentials = c;
|
||||
activeLock = undefined;
|
||||
});
|
||||
return provider(options);
|
||||
}
|
||||
}
|
||||
return credentials;
|
||||
};
|
||||
return provider;
|
||||
}
|
||||
export const internalCreateChain = (providers) => async (awsIdentityProperties) => {
|
||||
let lastProviderError;
|
||||
for (const provider of providers) {
|
||||
try {
|
||||
return await provider(awsIdentityProperties);
|
||||
}
|
||||
catch (err) {
|
||||
lastProviderError = err;
|
||||
if (err?.tryNextLink) {
|
||||
continue;
|
||||
}
|
||||
throw err;
|
||||
}
|
||||
}
|
||||
throw lastProviderError;
|
||||
};
|
||||
59
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/defaultProvider.d.ts
generated
vendored
Normal file
59
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/defaultProvider.d.ts
generated
vendored
Normal file
@@ -0,0 +1,59 @@
|
||||
import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
||||
import type { FromIniInit } from "@aws-sdk/credential-provider-ini";
|
||||
import type { FromProcessInit } from "@aws-sdk/credential-provider-process";
|
||||
import type { FromSSOInit, SsoCredentialsParameters } from "@aws-sdk/credential-provider-sso";
|
||||
import type { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
|
||||
import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
||||
import type { AwsCredentialIdentity } from "@smithy/types";
|
||||
import { type MemoizedRuntimeConfigAwsCredentialIdentityProvider } from "./runtime/memoize-chain";
|
||||
/**
|
||||
* @public
|
||||
*/
|
||||
export type DefaultProviderInit = FromIniInit & FromHttpOptions & RemoteProviderInit & FromProcessInit & (FromSSOInit & Partial<SsoCredentialsParameters>) & FromTokenFileInit;
|
||||
/**
|
||||
* Creates a credential provider that will attempt to find credentials from the
|
||||
* following sources (listed in order of precedence):
|
||||
* * Environment variables exposed via `process.env`
|
||||
* * SSO credentials from token cache
|
||||
* * Web identity token credentials
|
||||
* * Shared credentials and config ini files
|
||||
* * The EC2/ECS Instance Metadata Service
|
||||
*
|
||||
* The default credential provider will invoke one provider at a time and only
|
||||
* continue to the next if no credentials have been located. For example, if
|
||||
* the process finds values defined via the `AWS_ACCESS_KEY_ID` and
|
||||
* `AWS_SECRET_ACCESS_KEY` environment variables, the files at
|
||||
* `~/.aws/credentials` and `~/.aws/config` will not be read, nor will any
|
||||
* messages be sent to the Instance Metadata Service.
|
||||
*
|
||||
* @param init Configuration that is passed to each individual
|
||||
* provider
|
||||
*
|
||||
* @see {@link fromEnv} The function used to source credentials from
|
||||
* environment variables.
|
||||
* @see {@link fromSSO} The function used to source credentials from
|
||||
* resolved SSO token cache.
|
||||
* @see {@link fromTokenFile} The function used to source credentials from
|
||||
* token file.
|
||||
* @see {@link fromIni} The function used to source credentials from INI
|
||||
* files.
|
||||
* @see {@link fromProcess} The function used to sources credentials from
|
||||
* credential_process in INI files.
|
||||
* @see {@link fromInstanceMetadata} The function used to source credentials from the
|
||||
* EC2 Instance Metadata Service.
|
||||
* @see {@link fromContainerMetadata} The function used to source credentials from the
|
||||
* ECS Container Metadata Service.
|
||||
*/
|
||||
export declare const defaultProvider: (init?: DefaultProviderInit) => MemoizedRuntimeConfigAwsCredentialIdentityProvider;
|
||||
/**
|
||||
* @internal
|
||||
*
|
||||
* @returns credentials have expiration.
|
||||
*/
|
||||
export declare const credentialsWillNeedRefresh: (credentials: AwsCredentialIdentity) => boolean;
|
||||
/**
|
||||
* @internal
|
||||
*
|
||||
* @returns credentials with less than 5 minutes left.
|
||||
*/
|
||||
export declare const credentialsTreatedAsExpired: (credentials: AwsCredentialIdentity) => boolean;
|
||||
1
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/index.d.ts
generated
vendored
Normal file
1
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/index.d.ts
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
export * from "./defaultProvider";
|
||||
11
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/remoteProvider.d.ts
generated
vendored
Normal file
11
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/remoteProvider.d.ts
generated
vendored
Normal file
@@ -0,0 +1,11 @@
|
||||
import type { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
||||
import type { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
||||
import type { AwsCredentialIdentityProvider } from "@smithy/types";
|
||||
/**
|
||||
* @internal
|
||||
*/
|
||||
export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
||||
/**
|
||||
* @internal
|
||||
*/
|
||||
export declare const remoteProvider: (init: RemoteProviderInit | FromHttpOptions) => Promise<AwsCredentialIdentityProvider>;
|
||||
18
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/runtime/memoize-chain.d.ts
generated
vendored
Normal file
18
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/runtime/memoize-chain.d.ts
generated
vendored
Normal file
@@ -0,0 +1,18 @@
|
||||
import type { AwsCredentialIdentity, AwsIdentityProperties, RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
|
||||
/**
|
||||
* Memoized provider chain for AWS credentials.
|
||||
* The options are only reevaluated if forceRefresh=true is passed or a natural
|
||||
* refresh occurs.
|
||||
*
|
||||
* @public
|
||||
*/
|
||||
export interface MemoizedRuntimeConfigAwsCredentialIdentityProvider {
|
||||
(options?: AwsIdentityProperties & {
|
||||
forceRefresh?: boolean;
|
||||
}): Promise<AwsCredentialIdentity>;
|
||||
}
|
||||
/**
|
||||
* @internal
|
||||
*/
|
||||
export declare function memoizeChain(providers: RuntimeConfigAwsCredentialIdentityProvider[], treatAsExpired: (resolved: AwsCredentialIdentity) => boolean): MemoizedRuntimeConfigAwsCredentialIdentityProvider;
|
||||
export declare const internalCreateChain: (providers: RuntimeConfigAwsCredentialIdentityProvider[]) => RuntimeConfigAwsCredentialIdentityProvider;
|
||||
26
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/defaultProvider.d.ts
generated
vendored
Normal file
26
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/defaultProvider.d.ts
generated
vendored
Normal file
@@ -0,0 +1,26 @@
|
||||
import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
||||
import { FromIniInit } from "@aws-sdk/credential-provider-ini";
|
||||
import { FromProcessInit } from "@aws-sdk/credential-provider-process";
|
||||
import {
|
||||
FromSSOInit,
|
||||
SsoCredentialsParameters,
|
||||
} from "@aws-sdk/credential-provider-sso";
|
||||
import { FromTokenFileInit } from "@aws-sdk/credential-provider-web-identity";
|
||||
import { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
||||
import { AwsCredentialIdentity } from "@smithy/types";
|
||||
import { MemoizedRuntimeConfigAwsCredentialIdentityProvider } from "./runtime/memoize-chain";
|
||||
export type DefaultProviderInit = FromIniInit &
|
||||
FromHttpOptions &
|
||||
RemoteProviderInit &
|
||||
FromProcessInit &
|
||||
(FromSSOInit & Partial<SsoCredentialsParameters>) &
|
||||
FromTokenFileInit;
|
||||
export declare const defaultProvider: (
|
||||
init?: DefaultProviderInit
|
||||
) => MemoizedRuntimeConfigAwsCredentialIdentityProvider;
|
||||
export declare const credentialsWillNeedRefresh: (
|
||||
credentials: AwsCredentialIdentity
|
||||
) => boolean;
|
||||
export declare const credentialsTreatedAsExpired: (
|
||||
credentials: AwsCredentialIdentity
|
||||
) => boolean;
|
||||
1
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/index.d.ts
generated
vendored
Normal file
1
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/index.d.ts
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
export * from "./defaultProvider";
|
||||
7
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/remoteProvider.d.ts
generated
vendored
Normal file
7
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/remoteProvider.d.ts
generated
vendored
Normal file
@@ -0,0 +1,7 @@
|
||||
import { FromHttpOptions } from "@aws-sdk/credential-provider-http";
|
||||
import { RemoteProviderInit } from "@smithy/credential-provider-imds";
|
||||
import { AwsCredentialIdentityProvider } from "@smithy/types";
|
||||
export declare const ENV_IMDS_DISABLED = "AWS_EC2_METADATA_DISABLED";
|
||||
export declare const remoteProvider: (
|
||||
init: RemoteProviderInit | FromHttpOptions
|
||||
) => Promise<AwsCredentialIdentityProvider>;
|
||||
19
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/runtime/memoize-chain.d.ts
generated
vendored
Normal file
19
backend/node_modules/@aws-sdk/credential-provider-node/dist-types/ts3.4/runtime/memoize-chain.d.ts
generated
vendored
Normal file
@@ -0,0 +1,19 @@
|
||||
import {
|
||||
AwsCredentialIdentity,
|
||||
AwsIdentityProperties,
|
||||
RuntimeConfigAwsCredentialIdentityProvider,
|
||||
} from "@aws-sdk/types";
|
||||
export interface MemoizedRuntimeConfigAwsCredentialIdentityProvider {
|
||||
(
|
||||
options?: AwsIdentityProperties & {
|
||||
forceRefresh?: boolean;
|
||||
}
|
||||
): Promise<AwsCredentialIdentity>;
|
||||
}
|
||||
export declare function memoizeChain(
|
||||
providers: RuntimeConfigAwsCredentialIdentityProvider[],
|
||||
treatAsExpired: (resolved: AwsCredentialIdentity) => boolean
|
||||
): MemoizedRuntimeConfigAwsCredentialIdentityProvider;
|
||||
export declare const internalCreateChain: (
|
||||
providers: RuntimeConfigAwsCredentialIdentityProvider[]
|
||||
) => RuntimeConfigAwsCredentialIdentityProvider;
|
||||
72
backend/node_modules/@aws-sdk/credential-provider-node/package.json
generated
vendored
Normal file
72
backend/node_modules/@aws-sdk/credential-provider-node/package.json
generated
vendored
Normal file
@@ -0,0 +1,72 @@
|
||||
{
|
||||
"name": "@aws-sdk/credential-provider-node",
|
||||
"version": "3.971.0",
|
||||
"description": "AWS credential provider that sources credentials from a Node.JS environment. ",
|
||||
"engines": {
|
||||
"node": ">=20.0.0"
|
||||
},
|
||||
"main": "./dist-cjs/index.js",
|
||||
"module": "./dist-es/index.js",
|
||||
"scripts": {
|
||||
"build": "concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs",
|
||||
"build:cjs": "node ../../scripts/compilation/inline credential-provider-node",
|
||||
"build:es": "tsc -p tsconfig.es.json",
|
||||
"build:include:deps": "yarn g:turbo run build -F=\"$npm_package_name\"",
|
||||
"build:types": "tsc -p tsconfig.types.json",
|
||||
"build:types:downlevel": "downlevel-dts dist-types dist-types/ts3.4",
|
||||
"clean": "rimraf ./dist-* && rimraf *.tsbuildinfo",
|
||||
"test": "yarn g:vitest run --reporter verbose",
|
||||
"test:watch": "yarn g:vitest watch",
|
||||
"test:integration": "yarn g:vitest run -c vitest.config.integ.mts",
|
||||
"test:integration:watch": "yarn g:vitest watch -c vitest.config.integ.mts"
|
||||
},
|
||||
"keywords": [
|
||||
"aws",
|
||||
"credentials"
|
||||
],
|
||||
"sideEffects": false,
|
||||
"author": {
|
||||
"name": "AWS SDK for JavaScript Team",
|
||||
"url": "https://aws.amazon.com/javascript/"
|
||||
},
|
||||
"license": "Apache-2.0",
|
||||
"dependencies": {
|
||||
"@aws-sdk/credential-provider-env": "3.970.0",
|
||||
"@aws-sdk/credential-provider-http": "3.970.0",
|
||||
"@aws-sdk/credential-provider-ini": "3.971.0",
|
||||
"@aws-sdk/credential-provider-process": "3.970.0",
|
||||
"@aws-sdk/credential-provider-sso": "3.971.0",
|
||||
"@aws-sdk/credential-provider-web-identity": "3.971.0",
|
||||
"@aws-sdk/types": "3.969.0",
|
||||
"@smithy/credential-provider-imds": "^4.2.8",
|
||||
"@smithy/property-provider": "^4.2.8",
|
||||
"@smithy/shared-ini-file-loader": "^4.4.3",
|
||||
"@smithy/types": "^4.12.0",
|
||||
"tslib": "^2.6.2"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@tsconfig/recommended": "1.0.1",
|
||||
"@types/node": "^20.14.8",
|
||||
"concurrently": "7.0.0",
|
||||
"downlevel-dts": "0.10.1",
|
||||
"rimraf": "5.0.10",
|
||||
"typescript": "~5.8.3"
|
||||
},
|
||||
"types": "./dist-types/index.d.ts",
|
||||
"typesVersions": {
|
||||
"<4.0": {
|
||||
"dist-types/*": [
|
||||
"dist-types/ts3.4/*"
|
||||
]
|
||||
}
|
||||
},
|
||||
"files": [
|
||||
"dist-*/**"
|
||||
],
|
||||
"homepage": "https://github.com/aws/aws-sdk-js-v3/tree/main/packages/credential-provider-node",
|
||||
"repository": {
|
||||
"type": "git",
|
||||
"url": "https://github.com/aws/aws-sdk-js-v3.git",
|
||||
"directory": "packages/credential-provider-node"
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user