fix: 修复配额说明重复和undefined问题
- 在editStorageForm中初始化oss_storage_quota_value和oss_quota_unit - 删除重复的旧配额说明块,保留新的当前配额设置显示 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
30
backend/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
generated
vendored
Normal file
30
backend/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromTokenFile.js
generated
vendored
Normal file
@@ -0,0 +1,30 @@
|
||||
import { setCredentialFeature } from "@aws-sdk/core/client";
|
||||
import { CredentialsProviderError } from "@smithy/property-provider";
|
||||
import { externalDataInterceptor } from "@smithy/shared-ini-file-loader";
|
||||
import { readFileSync } from "fs";
|
||||
import { fromWebToken } from "./fromWebToken";
|
||||
const ENV_TOKEN_FILE = "AWS_WEB_IDENTITY_TOKEN_FILE";
|
||||
const ENV_ROLE_ARN = "AWS_ROLE_ARN";
|
||||
const ENV_ROLE_SESSION_NAME = "AWS_ROLE_SESSION_NAME";
|
||||
export const fromTokenFile = (init = {}) => async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-web-identity - fromTokenFile");
|
||||
const webIdentityTokenFile = init?.webIdentityTokenFile ?? process.env[ENV_TOKEN_FILE];
|
||||
const roleArn = init?.roleArn ?? process.env[ENV_ROLE_ARN];
|
||||
const roleSessionName = init?.roleSessionName ?? process.env[ENV_ROLE_SESSION_NAME];
|
||||
if (!webIdentityTokenFile || !roleArn) {
|
||||
throw new CredentialsProviderError("Web identity configuration not specified", {
|
||||
logger: init.logger,
|
||||
});
|
||||
}
|
||||
const credentials = await fromWebToken({
|
||||
...init,
|
||||
webIdentityToken: externalDataInterceptor?.getTokenRecord?.()[webIdentityTokenFile] ??
|
||||
readFileSync(webIdentityTokenFile, { encoding: "ascii" }),
|
||||
roleArn,
|
||||
roleSessionName,
|
||||
})(awsIdentityProperties);
|
||||
if (webIdentityTokenFile === process.env[ENV_TOKEN_FILE]) {
|
||||
setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN", "h");
|
||||
}
|
||||
return credentials;
|
||||
};
|
||||
25
backend/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js
generated
vendored
Normal file
25
backend/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/fromWebToken.js
generated
vendored
Normal file
@@ -0,0 +1,25 @@
|
||||
export const fromWebToken = (init) => async (awsIdentityProperties) => {
|
||||
init.logger?.debug("@aws-sdk/credential-provider-web-identity - fromWebToken");
|
||||
const { roleArn, roleSessionName, webIdentityToken, providerId, policyArns, policy, durationSeconds } = init;
|
||||
let { roleAssumerWithWebIdentity } = init;
|
||||
if (!roleAssumerWithWebIdentity) {
|
||||
const { getDefaultRoleAssumerWithWebIdentity } = await import("@aws-sdk/nested-clients/sts");
|
||||
roleAssumerWithWebIdentity = getDefaultRoleAssumerWithWebIdentity({
|
||||
...init.clientConfig,
|
||||
credentialProviderLogger: init.logger,
|
||||
parentClientConfig: {
|
||||
...awsIdentityProperties?.callerClientConfig,
|
||||
...init.parentClientConfig,
|
||||
},
|
||||
}, init.clientPlugins);
|
||||
}
|
||||
return roleAssumerWithWebIdentity({
|
||||
RoleArn: roleArn,
|
||||
RoleSessionName: roleSessionName ?? `aws-sdk-js-session-${Date.now()}`,
|
||||
WebIdentityToken: webIdentityToken,
|
||||
ProviderId: providerId,
|
||||
PolicyArns: policyArns,
|
||||
Policy: policy,
|
||||
DurationSeconds: durationSeconds,
|
||||
});
|
||||
};
|
||||
2
backend/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js
generated
vendored
Normal file
2
backend/node_modules/@aws-sdk/credential-provider-web-identity/dist-es/index.js
generated
vendored
Normal file
@@ -0,0 +1,2 @@
|
||||
export * from "./fromTokenFile";
|
||||
export * from "./fromWebToken";
|
||||
Reference in New Issue
Block a user