34 lines
1.7 KiB
JavaScript
34 lines
1.7 KiB
JavaScript
|
import { CredentialsProviderError } from "@smithy/property-provider";
|
||
|
export const fromTemporaryCredentials = (options) => {
|
||
|
let stsClient;
|
||
|
return async () => {
|
||
|
options.logger?.debug("@aws-sdk/credential-providers", "fromTemporaryCredentials (STS)");
|
||
|
const params = { ...options.params, RoleSessionName: options.params.RoleSessionName ?? "aws-sdk-js-" + Date.now() };
|
||
|
if (params?.SerialNumber) {
|
||
|
if (!options.mfaCodeProvider) {
|
||
|
throw new CredentialsProviderError(`Temporary credential requires multi-factor authentication,` + ` but no MFA code callback was provided.`, false);
|
||
|
}
|
||
|
params.TokenCode = await options.mfaCodeProvider(params?.SerialNumber);
|
||
|
}
|
||
|
const { AssumeRoleCommand, STSClient } = await import("./loadSts");
|
||
|
if (!stsClient)
|
||
|
stsClient = new STSClient({ ...options.clientConfig, credentials: options.masterCredentials });
|
||
|
if (options.clientPlugins) {
|
||
|
for (const plugin of options.clientPlugins) {
|
||
|
stsClient.middlewareStack.use(plugin);
|
||
|
}
|
||
|
}
|
||
|
const { Credentials } = await stsClient.send(new AssumeRoleCommand(params));
|
||
|
if (!Credentials || !Credentials.AccessKeyId || !Credentials.SecretAccessKey) {
|
||
|
throw new CredentialsProviderError(`Invalid response from STS.assumeRole call with role ${params.RoleArn}`);
|
||
|
}
|
||
|
return {
|
||
|
accessKeyId: Credentials.AccessKeyId,
|
||
|
secretAccessKey: Credentials.SecretAccessKey,
|
||
|
sessionToken: Credentials.SessionToken,
|
||
|
expiration: Credentials.Expiration,
|
||
|
credentialScope: Credentials.CredentialScope,
|
||
|
};
|
||
|
};
|
||
|
};
|