mirror of
https://github.com/tvytlx/ai-agent-deep-dive.git
synced 2026-04-05 08:34:47 +08:00
Add extracted source directory and README navigation
This commit is contained in:
45
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/createCredentialChain.js
generated
vendored
Normal file
45
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/createCredentialChain.js
generated
vendored
Normal file
@@ -0,0 +1,45 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.propertyProviderChain = exports.createCredentialChain = void 0;
|
||||
const property_provider_1 = require("@smithy/property-provider");
|
||||
const createCredentialChain = (...credentialProviders) => {
|
||||
let expireAfter = -1;
|
||||
const baseFunction = async (awsIdentityProperties) => {
|
||||
const credentials = await (0, exports.propertyProviderChain)(...credentialProviders)(awsIdentityProperties);
|
||||
if (!credentials.expiration && expireAfter !== -1) {
|
||||
credentials.expiration = new Date(Date.now() + expireAfter);
|
||||
}
|
||||
return credentials;
|
||||
};
|
||||
const withOptions = Object.assign(baseFunction, {
|
||||
expireAfter(milliseconds) {
|
||||
if (milliseconds < 5 * 60_000) {
|
||||
throw new Error("@aws-sdk/credential-providers - createCredentialChain(...).expireAfter(ms) may not be called with a duration lower than five minutes.");
|
||||
}
|
||||
expireAfter = milliseconds;
|
||||
return withOptions;
|
||||
},
|
||||
});
|
||||
return withOptions;
|
||||
};
|
||||
exports.createCredentialChain = createCredentialChain;
|
||||
const propertyProviderChain = (...providers) => async (awsIdentityProperties) => {
|
||||
if (providers.length === 0) {
|
||||
throw new property_provider_1.ProviderError("No providers in chain", { tryNextLink: false });
|
||||
}
|
||||
let lastProviderError;
|
||||
for (const provider of providers) {
|
||||
try {
|
||||
return await provider(awsIdentityProperties);
|
||||
}
|
||||
catch (err) {
|
||||
lastProviderError = err;
|
||||
if (err?.tryNextLink) {
|
||||
continue;
|
||||
}
|
||||
throw err;
|
||||
}
|
||||
}
|
||||
throw lastProviderError;
|
||||
};
|
||||
exports.propertyProviderChain = propertyProviderChain;
|
||||
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromCognitoIdentity.js
generated
vendored
Normal file
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromCognitoIdentity.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromCognitoIdentity = void 0;
|
||||
const credential_provider_cognito_identity_1 = require("@aws-sdk/credential-provider-cognito-identity");
|
||||
const fromCognitoIdentity = (options) => (0, credential_provider_cognito_identity_1.fromCognitoIdentity)({
|
||||
...options,
|
||||
});
|
||||
exports.fromCognitoIdentity = fromCognitoIdentity;
|
||||
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromCognitoIdentityPool.js
generated
vendored
Normal file
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromCognitoIdentityPool.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromCognitoIdentityPool = void 0;
|
||||
const credential_provider_cognito_identity_1 = require("@aws-sdk/credential-provider-cognito-identity");
|
||||
const fromCognitoIdentityPool = (options) => (0, credential_provider_cognito_identity_1.fromCognitoIdentityPool)({
|
||||
...options,
|
||||
});
|
||||
exports.fromCognitoIdentityPool = fromCognitoIdentityPool;
|
||||
9
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromContainerMetadata.js
generated
vendored
Normal file
9
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromContainerMetadata.js
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromContainerMetadata = void 0;
|
||||
const credential_provider_imds_1 = require("@smithy/credential-provider-imds");
|
||||
const fromContainerMetadata = (init) => {
|
||||
init?.logger?.debug("@smithy/credential-provider-imds", "fromContainerMetadata");
|
||||
return (0, credential_provider_imds_1.fromContainerMetadata)(init);
|
||||
};
|
||||
exports.fromContainerMetadata = fromContainerMetadata;
|
||||
6
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromEnv.js
generated
vendored
Normal file
6
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromEnv.js
generated
vendored
Normal file
@@ -0,0 +1,6 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromEnv = void 0;
|
||||
const credential_provider_env_1 = require("@aws-sdk/credential-provider-env");
|
||||
const fromEnv = (init) => (0, credential_provider_env_1.fromEnv)(init);
|
||||
exports.fromEnv = fromEnv;
|
||||
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromIni.js
generated
vendored
Normal file
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromIni.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromIni = void 0;
|
||||
const credential_provider_ini_1 = require("@aws-sdk/credential-provider-ini");
|
||||
const fromIni = (init = {}) => (0, credential_provider_ini_1.fromIni)({
|
||||
...init,
|
||||
});
|
||||
exports.fromIni = fromIni;
|
||||
10
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromInstanceMetadata.js
generated
vendored
Normal file
10
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromInstanceMetadata.js
generated
vendored
Normal file
@@ -0,0 +1,10 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromInstanceMetadata = void 0;
|
||||
const client_1 = require("@aws-sdk/core/client");
|
||||
const credential_provider_imds_1 = require("@smithy/credential-provider-imds");
|
||||
const fromInstanceMetadata = (init) => {
|
||||
init?.logger?.debug("@smithy/credential-provider-imds", "fromInstanceMetadata");
|
||||
return async () => (0, credential_provider_imds_1.fromInstanceMetadata)(init)().then((creds) => (0, client_1.setCredentialFeature)(creds, "CREDENTIALS_IMDS", "0"));
|
||||
};
|
||||
exports.fromInstanceMetadata = fromInstanceMetadata;
|
||||
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromLoginCredentials.js
generated
vendored
Normal file
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromLoginCredentials.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromLoginCredentials = void 0;
|
||||
const credential_provider_login_1 = require("@aws-sdk/credential-provider-login");
|
||||
const fromLoginCredentials = (init) => (0, credential_provider_login_1.fromLoginCredentials)({
|
||||
...init,
|
||||
});
|
||||
exports.fromLoginCredentials = fromLoginCredentials;
|
||||
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromNodeProviderChain.js
generated
vendored
Normal file
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromNodeProviderChain.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromNodeProviderChain = void 0;
|
||||
const credential_provider_node_1 = require("@aws-sdk/credential-provider-node");
|
||||
const fromNodeProviderChain = (init = {}) => (0, credential_provider_node_1.defaultProvider)({
|
||||
...init,
|
||||
});
|
||||
exports.fromNodeProviderChain = fromNodeProviderChain;
|
||||
6
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromProcess.js
generated
vendored
Normal file
6
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromProcess.js
generated
vendored
Normal file
@@ -0,0 +1,6 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromProcess = void 0;
|
||||
const credential_provider_process_1 = require("@aws-sdk/credential-provider-process");
|
||||
const fromProcess = (init) => (0, credential_provider_process_1.fromProcess)(init);
|
||||
exports.fromProcess = fromProcess;
|
||||
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromSSO.js
generated
vendored
Normal file
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromSSO.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromSSO = void 0;
|
||||
const credential_provider_sso_1 = require("@aws-sdk/credential-provider-sso");
|
||||
const fromSSO = (init = {}) => {
|
||||
return (0, credential_provider_sso_1.fromSSO)({ ...init });
|
||||
};
|
||||
exports.fromSSO = fromSSO;
|
||||
155
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromTemporaryCredentials.base.js
generated
vendored
Normal file
155
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromTemporaryCredentials.base.js
generated
vendored
Normal file
@@ -0,0 +1,155 @@
|
||||
"use strict";
|
||||
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
||||
if (k2 === undefined) k2 = k;
|
||||
var desc = Object.getOwnPropertyDescriptor(m, k);
|
||||
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
||||
desc = { enumerable: true, get: function() { return m[k]; } };
|
||||
}
|
||||
Object.defineProperty(o, k2, desc);
|
||||
}) : (function(o, m, k, k2) {
|
||||
if (k2 === undefined) k2 = k;
|
||||
o[k2] = m[k];
|
||||
}));
|
||||
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
||||
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
||||
}) : function(o, v) {
|
||||
o["default"] = v;
|
||||
});
|
||||
var __importStar = (this && this.__importStar) || (function () {
|
||||
var ownKeys = function(o) {
|
||||
ownKeys = Object.getOwnPropertyNames || function (o) {
|
||||
var ar = [];
|
||||
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
||||
return ar;
|
||||
};
|
||||
return ownKeys(o);
|
||||
};
|
||||
return function (mod) {
|
||||
if (mod && mod.__esModule) return mod;
|
||||
var result = {};
|
||||
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
||||
__setModuleDefault(result, mod);
|
||||
return result;
|
||||
};
|
||||
})();
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromTemporaryCredentials = void 0;
|
||||
const core_1 = require("@smithy/core");
|
||||
const property_provider_1 = require("@smithy/property-provider");
|
||||
const ASSUME_ROLE_DEFAULT_REGION = "us-east-1";
|
||||
const fromTemporaryCredentials = (options, credentialDefaultProvider, regionProvider) => {
|
||||
let stsClient;
|
||||
return async (awsIdentityProperties = {}) => {
|
||||
const { callerClientConfig } = awsIdentityProperties;
|
||||
const profile = options.clientConfig?.profile ?? callerClientConfig?.profile;
|
||||
const logger = options.logger ?? callerClientConfig?.logger;
|
||||
logger?.debug("@aws-sdk/credential-providers - fromTemporaryCredentials (STS)");
|
||||
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
|
||||
if (params?.SerialNumber) {
|
||||
if (!options.mfaCodeProvider) {
|
||||
throw new property_provider_1.CredentialsProviderError(`Temporary credential requires multi-factor authentication, but no MFA code callback was provided.`, {
|
||||
tryNextLink: false,
|
||||
logger,
|
||||
});
|
||||
}
|
||||
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
|
||||
}
|
||||
const { AssumeRoleCommand, STSClient } = await Promise.resolve().then(() => __importStar(require("./loadSts")));
|
||||
if (!stsClient) {
|
||||
const defaultCredentialsOrError = typeof credentialDefaultProvider === "function" ? credentialDefaultProvider() : undefined;
|
||||
const credentialSources = [
|
||||
options.masterCredentials,
|
||||
options.clientConfig?.credentials,
|
||||
void callerClientConfig?.credentials,
|
||||
callerClientConfig?.credentialDefaultProvider?.(),
|
||||
defaultCredentialsOrError,
|
||||
];
|
||||
let credentialSource = "STS client default credentials";
|
||||
if (credentialSources[0]) {
|
||||
credentialSource = "options.masterCredentials";
|
||||
}
|
||||
else if (credentialSources[1]) {
|
||||
credentialSource = "options.clientConfig.credentials";
|
||||
}
|
||||
else if (credentialSources[2]) {
|
||||
credentialSource = "caller client's credentials";
|
||||
throw new Error("fromTemporaryCredentials recursion in callerClientConfig.credentials");
|
||||
}
|
||||
else if (credentialSources[3]) {
|
||||
credentialSource = "caller client's credentialDefaultProvider";
|
||||
}
|
||||
else if (credentialSources[4]) {
|
||||
credentialSource = "AWS SDK default credentials";
|
||||
}
|
||||
const regionSources = [
|
||||
options.clientConfig?.region,
|
||||
callerClientConfig?.region,
|
||||
await regionProvider?.({
|
||||
profile,
|
||||
}),
|
||||
ASSUME_ROLE_DEFAULT_REGION,
|
||||
];
|
||||
let regionSource = "default partition's default region";
|
||||
if (regionSources[0]) {
|
||||
regionSource = "options.clientConfig.region";
|
||||
}
|
||||
else if (regionSources[1]) {
|
||||
regionSource = "caller client's region";
|
||||
}
|
||||
else if (regionSources[2]) {
|
||||
regionSource = "file or env region";
|
||||
}
|
||||
const requestHandlerSources = [
|
||||
filterRequestHandler(options.clientConfig?.requestHandler),
|
||||
filterRequestHandler(callerClientConfig?.requestHandler),
|
||||
];
|
||||
let requestHandlerSource = "STS default requestHandler";
|
||||
if (requestHandlerSources[0]) {
|
||||
requestHandlerSource = "options.clientConfig.requestHandler";
|
||||
}
|
||||
else if (requestHandlerSources[1]) {
|
||||
requestHandlerSource = "caller client's requestHandler";
|
||||
}
|
||||
logger?.debug?.(`@aws-sdk/credential-providers - fromTemporaryCredentials STS client init with ` +
|
||||
`${regionSource}=${await (0, core_1.normalizeProvider)(coalesce(regionSources))()}, ${credentialSource}, ${requestHandlerSource}.`);
|
||||
stsClient = new STSClient({
|
||||
userAgentAppId: callerClientConfig?.userAgentAppId,
|
||||
...options.clientConfig,
|
||||
credentials: coalesce(credentialSources),
|
||||
logger,
|
||||
profile,
|
||||
region: coalesce(regionSources),
|
||||
requestHandler: coalesce(requestHandlerSources),
|
||||
});
|
||||
}
|
||||
if (options.clientPlugins) {
|
||||
for (const plugin of options.clientPlugins) {
|
||||
stsClient.middlewareStack.use(plugin);
|
||||
}
|
||||
}
|
||||
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
|
||||
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
||||
throw new property_provider_1.CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`, {
|
||||
logger,
|
||||
});
|
||||
}
|
||||
return {
|
||||
accessKeyId: Credentials.AccessKeyId,
|
||||
secretAccessKey: Credentials.SecretAccessKey,
|
||||
sessionToken: Credentials.SessionToken,
|
||||
expiration: Credentials.Expiration,
|
||||
credentialScope: Credentials.CredentialScope,
|
||||
};
|
||||
};
|
||||
};
|
||||
exports.fromTemporaryCredentials = fromTemporaryCredentials;
|
||||
const filterRequestHandler = (requestHandler) => {
|
||||
return requestHandler?.metadata?.handlerProtocol === "h2" ? undefined : requestHandler;
|
||||
};
|
||||
const coalesce = (args) => {
|
||||
for (const item of args) {
|
||||
if (item !== undefined) {
|
||||
return item;
|
||||
}
|
||||
}
|
||||
};
|
||||
17
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromTemporaryCredentials.js
generated
vendored
Normal file
17
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromTemporaryCredentials.js
generated
vendored
Normal file
@@ -0,0 +1,17 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromTemporaryCredentials = void 0;
|
||||
const config_resolver_1 = require("@smithy/config-resolver");
|
||||
const node_config_provider_1 = require("@smithy/node-config-provider");
|
||||
const fromNodeProviderChain_1 = require("./fromNodeProviderChain");
|
||||
const fromTemporaryCredentials_base_1 = require("./fromTemporaryCredentials.base");
|
||||
const fromTemporaryCredentials = (options) => {
|
||||
return (0, fromTemporaryCredentials_base_1.fromTemporaryCredentials)(options, fromNodeProviderChain_1.fromNodeProviderChain, async ({ profile = process.env.AWS_PROFILE }) => (0, node_config_provider_1.loadConfig)({
|
||||
environmentVariableSelector: (env) => env.AWS_REGION,
|
||||
configFileSelector: (profileData) => {
|
||||
return profileData.region;
|
||||
},
|
||||
default: () => undefined,
|
||||
}, { ...config_resolver_1.NODE_REGION_CONFIG_FILE_OPTIONS, profile })());
|
||||
};
|
||||
exports.fromTemporaryCredentials = fromTemporaryCredentials;
|
||||
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromTokenFile.js
generated
vendored
Normal file
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromTokenFile.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromTokenFile = void 0;
|
||||
const credential_provider_web_identity_1 = require("@aws-sdk/credential-provider-web-identity");
|
||||
const fromTokenFile = (init = {}) => (0, credential_provider_web_identity_1.fromTokenFile)({
|
||||
...init,
|
||||
});
|
||||
exports.fromTokenFile = fromTokenFile;
|
||||
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromWebToken.js
generated
vendored
Normal file
8
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/fromWebToken.js
generated
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromWebToken = void 0;
|
||||
const credential_provider_web_identity_1 = require("@aws-sdk/credential-provider-web-identity");
|
||||
const fromWebToken = (init) => (0, credential_provider_web_identity_1.fromWebToken)({
|
||||
...init,
|
||||
});
|
||||
exports.fromWebToken = fromWebToken;
|
||||
20
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/index.js
generated
vendored
Normal file
20
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/index.js
generated
vendored
Normal file
@@ -0,0 +1,20 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.fromHttp = void 0;
|
||||
const tslib_1 = require("tslib");
|
||||
tslib_1.__exportStar(require("./createCredentialChain"), exports);
|
||||
tslib_1.__exportStar(require("./fromCognitoIdentity"), exports);
|
||||
tslib_1.__exportStar(require("./fromCognitoIdentityPool"), exports);
|
||||
tslib_1.__exportStar(require("./fromContainerMetadata"), exports);
|
||||
tslib_1.__exportStar(require("./fromEnv"), exports);
|
||||
var credential_provider_http_1 = require("@aws-sdk/credential-provider-http");
|
||||
Object.defineProperty(exports, "fromHttp", { enumerable: true, get: function () { return credential_provider_http_1.fromHttp; } });
|
||||
tslib_1.__exportStar(require("./fromIni"), exports);
|
||||
tslib_1.__exportStar(require("./fromInstanceMetadata"), exports);
|
||||
tslib_1.__exportStar(require("./fromLoginCredentials"), exports);
|
||||
tslib_1.__exportStar(require("./fromNodeProviderChain"), exports);
|
||||
tslib_1.__exportStar(require("./fromProcess"), exports);
|
||||
tslib_1.__exportStar(require("./fromSSO"), exports);
|
||||
tslib_1.__exportStar(require("./fromTemporaryCredentials"), exports);
|
||||
tslib_1.__exportStar(require("./fromTokenFile"), exports);
|
||||
tslib_1.__exportStar(require("./fromWebToken"), exports);
|
||||
6
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/loadSts.js
generated
vendored
Normal file
6
extracted-source/node_modules/@aws-sdk/credential-providers/dist-cjs/loadSts.js
generated
vendored
Normal file
@@ -0,0 +1,6 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.STSClient = exports.AssumeRoleCommand = void 0;
|
||||
const sts_1 = require("@aws-sdk/nested-clients/sts");
|
||||
Object.defineProperty(exports, "AssumeRoleCommand", { enumerable: true, get: function () { return sts_1.AssumeRoleCommand; } });
|
||||
Object.defineProperty(exports, "STSClient", { enumerable: true, get: function () { return sts_1.STSClient; } });
|
||||
Reference in New Issue
Block a user