Metzploreur/node_modules/@aws-sdk/credential-providers/dist-cjs/fromTemporaryCredentials.js

37 lines
1.9 KiB
JavaScript
Raw Normal View History

2023-11-01 16:33:25 +00:00
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
exports.fromTemporaryCredentials = void 0;
const client_sts_1 = require("@aws-sdk/client-sts");
const property_provider_1 = require("@smithy/property-provider");
const fromTemporaryCredentials = (options) => {
let stsClient;
return async () => {
var _a;
const params = { ...options.params, RoleSessionName: (_a = options.params.RoleSessionName) !== null && _a !== void 0 ? _a : "aws-sdk-js-" + Date.now() };
if (params === null || params === void 0 ? void 0 : params.SerialNumber) {
if (!options.mfaCodeProvider) {
throw new property_provider_1.CredentialsProviderError(`Temporary credential requires multi-factor authentication,` + ` but no MFA code callback was provided.`, false);
}
params.TokenCode = await options.mfaCodeProvider(params === null || params === void 0 ? void 0 : params.SerialNumber);
}
if (!stsClient)
stsClient = new client_sts_1.STSClient({ ...options.clientConfig, credentials: options.masterCredentials });
if (options.clientPlugins) {
for (const plugin of options.clientPlugins) {
stsClient.middlewareStack.use(plugin);
}
}
const { Credentials } = await stsClient.send(new client_sts_1.AssumeRoleCommand(params));
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
throw new property_provider_1.CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);
}
return {
accessKeyId: Credentials.AccessKeyId,
secretAccessKey: Credentials.SecretAccessKey,
sessionToken: Credentials.SessionToken,
expiration: Credentials.Expiration,
};
};
};
exports.fromTemporaryCredentials = fromTemporaryCredentials;