mirror of
https://github.com/aws-actions/configure-aws-credentials.git
synced 2026-03-13 18:17:11 -04:00
chore: Update dist
This commit is contained in:
56
dist/121.index.js
generated
vendored
Normal file
56
dist/121.index.js
generated
vendored
Normal file
@@ -0,0 +1,56 @@
|
||||
"use strict";
|
||||
exports.id = 121;
|
||||
exports.ids = [121];
|
||||
exports.modules = {
|
||||
|
||||
/***/ 7121:
|
||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||
|
||||
var __webpack_unused_export__;
|
||||
|
||||
|
||||
var client = __webpack_require__(5152);
|
||||
var propertyProvider = __webpack_require__(1238);
|
||||
|
||||
const ENV_KEY = "AWS_ACCESS_KEY_ID";
|
||||
const ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
|
||||
const ENV_SESSION = "AWS_SESSION_TOKEN";
|
||||
const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION";
|
||||
const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE";
|
||||
const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID";
|
||||
const fromEnv = (init) => async () => {
|
||||
init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");
|
||||
const accessKeyId = process.env[ENV_KEY];
|
||||
const secretAccessKey = process.env[ENV_SECRET];
|
||||
const sessionToken = process.env[ENV_SESSION];
|
||||
const expiry = process.env[ENV_EXPIRATION];
|
||||
const credentialScope = process.env[ENV_CREDENTIAL_SCOPE];
|
||||
const accountId = process.env[ENV_ACCOUNT_ID];
|
||||
if (accessKeyId && secretAccessKey) {
|
||||
const credentials = {
|
||||
accessKeyId,
|
||||
secretAccessKey,
|
||||
...(sessionToken && { sessionToken }),
|
||||
...(expiry && { expiration: new Date(expiry) }),
|
||||
...(credentialScope && { credentialScope }),
|
||||
...(accountId && { accountId }),
|
||||
};
|
||||
client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g");
|
||||
return credentials;
|
||||
}
|
||||
throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger });
|
||||
};
|
||||
|
||||
__webpack_unused_export__ = ENV_ACCOUNT_ID;
|
||||
__webpack_unused_export__ = ENV_CREDENTIAL_SCOPE;
|
||||
__webpack_unused_export__ = ENV_EXPIRATION;
|
||||
__webpack_unused_export__ = ENV_KEY;
|
||||
__webpack_unused_export__ = ENV_SECRET;
|
||||
__webpack_unused_export__ = ENV_SESSION;
|
||||
exports.fromEnv = fromEnv;
|
||||
|
||||
|
||||
/***/ })
|
||||
|
||||
};
|
||||
;
|
||||
2
dist/869.index.js
generated
vendored
2
dist/869.index.js
generated
vendored
@@ -27,7 +27,7 @@ const resolveCredentialSource = (credentialSource, profileName, logger) => {
|
||||
},
|
||||
Environment: async (options) => {
|
||||
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
|
||||
const { fromEnv } = await Promise.resolve(/* import() */).then(__webpack_require__.t.bind(__webpack_require__, 5606, 19));
|
||||
const { fromEnv } = await __webpack_require__.e(/* import() */ 121).then(__webpack_require__.t.bind(__webpack_require__, 7121, 19));
|
||||
return async () => fromEnv(options)().then(setNamedProvider);
|
||||
},
|
||||
};
|
||||
|
||||
56
dist/cleanup/121.index.js
generated
vendored
Normal file
56
dist/cleanup/121.index.js
generated
vendored
Normal file
@@ -0,0 +1,56 @@
|
||||
"use strict";
|
||||
exports.id = 121;
|
||||
exports.ids = [121];
|
||||
exports.modules = {
|
||||
|
||||
/***/ 7121:
|
||||
/***/ ((__unused_webpack_module, exports, __webpack_require__) => {
|
||||
|
||||
var __webpack_unused_export__;
|
||||
|
||||
|
||||
var client = __webpack_require__(5152);
|
||||
var propertyProvider = __webpack_require__(1238);
|
||||
|
||||
const ENV_KEY = "AWS_ACCESS_KEY_ID";
|
||||
const ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
|
||||
const ENV_SESSION = "AWS_SESSION_TOKEN";
|
||||
const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION";
|
||||
const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE";
|
||||
const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID";
|
||||
const fromEnv = (init) => async () => {
|
||||
init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");
|
||||
const accessKeyId = process.env[ENV_KEY];
|
||||
const secretAccessKey = process.env[ENV_SECRET];
|
||||
const sessionToken = process.env[ENV_SESSION];
|
||||
const expiry = process.env[ENV_EXPIRATION];
|
||||
const credentialScope = process.env[ENV_CREDENTIAL_SCOPE];
|
||||
const accountId = process.env[ENV_ACCOUNT_ID];
|
||||
if (accessKeyId && secretAccessKey) {
|
||||
const credentials = {
|
||||
accessKeyId,
|
||||
secretAccessKey,
|
||||
...(sessionToken && { sessionToken }),
|
||||
...(expiry && { expiration: new Date(expiry) }),
|
||||
...(credentialScope && { credentialScope }),
|
||||
...(accountId && { accountId }),
|
||||
};
|
||||
client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g");
|
||||
return credentials;
|
||||
}
|
||||
throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger });
|
||||
};
|
||||
|
||||
__webpack_unused_export__ = ENV_ACCOUNT_ID;
|
||||
__webpack_unused_export__ = ENV_CREDENTIAL_SCOPE;
|
||||
__webpack_unused_export__ = ENV_EXPIRATION;
|
||||
__webpack_unused_export__ = ENV_KEY;
|
||||
__webpack_unused_export__ = ENV_SECRET;
|
||||
__webpack_unused_export__ = ENV_SESSION;
|
||||
exports.fromEnv = fromEnv;
|
||||
|
||||
|
||||
/***/ })
|
||||
|
||||
};
|
||||
;
|
||||
2
dist/cleanup/869.index.js
generated
vendored
2
dist/cleanup/869.index.js
generated
vendored
@@ -27,7 +27,7 @@ const resolveCredentialSource = (credentialSource, profileName, logger) => {
|
||||
},
|
||||
Environment: async (options) => {
|
||||
logger?.debug("@aws-sdk/credential-provider-ini - credential_source is Environment");
|
||||
const { fromEnv } = await Promise.resolve(/* import() */).then(__webpack_require__.t.bind(__webpack_require__, 5606, 19));
|
||||
const { fromEnv } = await __webpack_require__.e(/* import() */ 121).then(__webpack_require__.t.bind(__webpack_require__, 7121, 19));
|
||||
return async () => fromEnv(options)().then(setNamedProvider);
|
||||
},
|
||||
};
|
||||
|
||||
100
dist/cleanup/index.js
generated
vendored
100
dist/cleanup/index.js
generated
vendored
@@ -7047,55 +7047,6 @@ exports.setTokenFeature = setTokenFeature;
|
||||
exports.state = state;
|
||||
|
||||
|
||||
/***/ }),
|
||||
|
||||
/***/ 5606:
|
||||
/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => {
|
||||
|
||||
"use strict";
|
||||
|
||||
|
||||
var client = __nccwpck_require__(5152);
|
||||
var propertyProvider = __nccwpck_require__(1238);
|
||||
|
||||
const ENV_KEY = "AWS_ACCESS_KEY_ID";
|
||||
const ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
|
||||
const ENV_SESSION = "AWS_SESSION_TOKEN";
|
||||
const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION";
|
||||
const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE";
|
||||
const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID";
|
||||
const fromEnv = (init) => async () => {
|
||||
init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");
|
||||
const accessKeyId = process.env[ENV_KEY];
|
||||
const secretAccessKey = process.env[ENV_SECRET];
|
||||
const sessionToken = process.env[ENV_SESSION];
|
||||
const expiry = process.env[ENV_EXPIRATION];
|
||||
const credentialScope = process.env[ENV_CREDENTIAL_SCOPE];
|
||||
const accountId = process.env[ENV_ACCOUNT_ID];
|
||||
if (accessKeyId && secretAccessKey) {
|
||||
const credentials = {
|
||||
accessKeyId,
|
||||
secretAccessKey,
|
||||
...(sessionToken && { sessionToken }),
|
||||
...(expiry && { expiration: new Date(expiry) }),
|
||||
...(credentialScope && { credentialScope }),
|
||||
...(accountId && { accountId }),
|
||||
};
|
||||
client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g");
|
||||
return credentials;
|
||||
}
|
||||
throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger });
|
||||
};
|
||||
|
||||
exports.ENV_ACCOUNT_ID = ENV_ACCOUNT_ID;
|
||||
exports.ENV_CREDENTIAL_SCOPE = ENV_CREDENTIAL_SCOPE;
|
||||
exports.ENV_EXPIRATION = ENV_EXPIRATION;
|
||||
exports.ENV_KEY = ENV_KEY;
|
||||
exports.ENV_SECRET = ENV_SECRET;
|
||||
exports.ENV_SESSION = ENV_SESSION;
|
||||
exports.fromEnv = fromEnv;
|
||||
|
||||
|
||||
/***/ }),
|
||||
|
||||
/***/ 5861:
|
||||
@@ -7104,7 +7055,7 @@ exports.fromEnv = fromEnv;
|
||||
"use strict";
|
||||
|
||||
|
||||
var credentialProviderEnv = __nccwpck_require__(5606);
|
||||
var credentialProviderEnv = __nccwpck_require__(6153);
|
||||
var propertyProvider = __nccwpck_require__(1238);
|
||||
var sharedIniFileLoader = __nccwpck_require__(4964);
|
||||
|
||||
@@ -7254,6 +7205,55 @@ exports.credentialsWillNeedRefresh = credentialsWillNeedRefresh;
|
||||
exports.defaultProvider = defaultProvider;
|
||||
|
||||
|
||||
/***/ }),
|
||||
|
||||
/***/ 6153:
|
||||
/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => {
|
||||
|
||||
"use strict";
|
||||
|
||||
|
||||
var client = __nccwpck_require__(5152);
|
||||
var propertyProvider = __nccwpck_require__(1238);
|
||||
|
||||
const ENV_KEY = "AWS_ACCESS_KEY_ID";
|
||||
const ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
|
||||
const ENV_SESSION = "AWS_SESSION_TOKEN";
|
||||
const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION";
|
||||
const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE";
|
||||
const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID";
|
||||
const fromEnv = (init) => async () => {
|
||||
init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");
|
||||
const accessKeyId = process.env[ENV_KEY];
|
||||
const secretAccessKey = process.env[ENV_SECRET];
|
||||
const sessionToken = process.env[ENV_SESSION];
|
||||
const expiry = process.env[ENV_EXPIRATION];
|
||||
const credentialScope = process.env[ENV_CREDENTIAL_SCOPE];
|
||||
const accountId = process.env[ENV_ACCOUNT_ID];
|
||||
if (accessKeyId && secretAccessKey) {
|
||||
const credentials = {
|
||||
accessKeyId,
|
||||
secretAccessKey,
|
||||
...(sessionToken && { sessionToken }),
|
||||
...(expiry && { expiration: new Date(expiry) }),
|
||||
...(credentialScope && { credentialScope }),
|
||||
...(accountId && { accountId }),
|
||||
};
|
||||
client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g");
|
||||
return credentials;
|
||||
}
|
||||
throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger });
|
||||
};
|
||||
|
||||
exports.ENV_ACCOUNT_ID = ENV_ACCOUNT_ID;
|
||||
exports.ENV_CREDENTIAL_SCOPE = ENV_CREDENTIAL_SCOPE;
|
||||
exports.ENV_EXPIRATION = ENV_EXPIRATION;
|
||||
exports.ENV_KEY = ENV_KEY;
|
||||
exports.ENV_SECRET = ENV_SECRET;
|
||||
exports.ENV_SESSION = ENV_SESSION;
|
||||
exports.fromEnv = fromEnv;
|
||||
|
||||
|
||||
/***/ }),
|
||||
|
||||
/***/ 2590:
|
||||
|
||||
100
dist/index.js
generated
vendored
100
dist/index.js
generated
vendored
@@ -7908,55 +7908,6 @@ exports.setTokenFeature = setTokenFeature;
|
||||
exports.state = state;
|
||||
|
||||
|
||||
/***/ }),
|
||||
|
||||
/***/ 5606:
|
||||
/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => {
|
||||
|
||||
"use strict";
|
||||
|
||||
|
||||
var client = __nccwpck_require__(5152);
|
||||
var propertyProvider = __nccwpck_require__(1238);
|
||||
|
||||
const ENV_KEY = "AWS_ACCESS_KEY_ID";
|
||||
const ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
|
||||
const ENV_SESSION = "AWS_SESSION_TOKEN";
|
||||
const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION";
|
||||
const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE";
|
||||
const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID";
|
||||
const fromEnv = (init) => async () => {
|
||||
init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");
|
||||
const accessKeyId = process.env[ENV_KEY];
|
||||
const secretAccessKey = process.env[ENV_SECRET];
|
||||
const sessionToken = process.env[ENV_SESSION];
|
||||
const expiry = process.env[ENV_EXPIRATION];
|
||||
const credentialScope = process.env[ENV_CREDENTIAL_SCOPE];
|
||||
const accountId = process.env[ENV_ACCOUNT_ID];
|
||||
if (accessKeyId && secretAccessKey) {
|
||||
const credentials = {
|
||||
accessKeyId,
|
||||
secretAccessKey,
|
||||
...(sessionToken && { sessionToken }),
|
||||
...(expiry && { expiration: new Date(expiry) }),
|
||||
...(credentialScope && { credentialScope }),
|
||||
...(accountId && { accountId }),
|
||||
};
|
||||
client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g");
|
||||
return credentials;
|
||||
}
|
||||
throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger });
|
||||
};
|
||||
|
||||
exports.ENV_ACCOUNT_ID = ENV_ACCOUNT_ID;
|
||||
exports.ENV_CREDENTIAL_SCOPE = ENV_CREDENTIAL_SCOPE;
|
||||
exports.ENV_EXPIRATION = ENV_EXPIRATION;
|
||||
exports.ENV_KEY = ENV_KEY;
|
||||
exports.ENV_SECRET = ENV_SECRET;
|
||||
exports.ENV_SESSION = ENV_SESSION;
|
||||
exports.fromEnv = fromEnv;
|
||||
|
||||
|
||||
/***/ }),
|
||||
|
||||
/***/ 5861:
|
||||
@@ -7965,7 +7916,7 @@ exports.fromEnv = fromEnv;
|
||||
"use strict";
|
||||
|
||||
|
||||
var credentialProviderEnv = __nccwpck_require__(5606);
|
||||
var credentialProviderEnv = __nccwpck_require__(6153);
|
||||
var propertyProvider = __nccwpck_require__(1238);
|
||||
var sharedIniFileLoader = __nccwpck_require__(4964);
|
||||
|
||||
@@ -8115,6 +8066,55 @@ exports.credentialsWillNeedRefresh = credentialsWillNeedRefresh;
|
||||
exports.defaultProvider = defaultProvider;
|
||||
|
||||
|
||||
/***/ }),
|
||||
|
||||
/***/ 6153:
|
||||
/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => {
|
||||
|
||||
"use strict";
|
||||
|
||||
|
||||
var client = __nccwpck_require__(5152);
|
||||
var propertyProvider = __nccwpck_require__(1238);
|
||||
|
||||
const ENV_KEY = "AWS_ACCESS_KEY_ID";
|
||||
const ENV_SECRET = "AWS_SECRET_ACCESS_KEY";
|
||||
const ENV_SESSION = "AWS_SESSION_TOKEN";
|
||||
const ENV_EXPIRATION = "AWS_CREDENTIAL_EXPIRATION";
|
||||
const ENV_CREDENTIAL_SCOPE = "AWS_CREDENTIAL_SCOPE";
|
||||
const ENV_ACCOUNT_ID = "AWS_ACCOUNT_ID";
|
||||
const fromEnv = (init) => async () => {
|
||||
init?.logger?.debug("@aws-sdk/credential-provider-env - fromEnv");
|
||||
const accessKeyId = process.env[ENV_KEY];
|
||||
const secretAccessKey = process.env[ENV_SECRET];
|
||||
const sessionToken = process.env[ENV_SESSION];
|
||||
const expiry = process.env[ENV_EXPIRATION];
|
||||
const credentialScope = process.env[ENV_CREDENTIAL_SCOPE];
|
||||
const accountId = process.env[ENV_ACCOUNT_ID];
|
||||
if (accessKeyId && secretAccessKey) {
|
||||
const credentials = {
|
||||
accessKeyId,
|
||||
secretAccessKey,
|
||||
...(sessionToken && { sessionToken }),
|
||||
...(expiry && { expiration: new Date(expiry) }),
|
||||
...(credentialScope && { credentialScope }),
|
||||
...(accountId && { accountId }),
|
||||
};
|
||||
client.setCredentialFeature(credentials, "CREDENTIALS_ENV_VARS", "g");
|
||||
return credentials;
|
||||
}
|
||||
throw new propertyProvider.CredentialsProviderError("Unable to find environment variable credentials.", { logger: init?.logger });
|
||||
};
|
||||
|
||||
exports.ENV_ACCOUNT_ID = ENV_ACCOUNT_ID;
|
||||
exports.ENV_CREDENTIAL_SCOPE = ENV_CREDENTIAL_SCOPE;
|
||||
exports.ENV_EXPIRATION = ENV_EXPIRATION;
|
||||
exports.ENV_KEY = ENV_KEY;
|
||||
exports.ENV_SECRET = ENV_SECRET;
|
||||
exports.ENV_SESSION = ENV_SESSION;
|
||||
exports.fromEnv = fromEnv;
|
||||
|
||||
|
||||
/***/ }),
|
||||
|
||||
/***/ 2590:
|
||||
|
||||
Reference in New Issue
Block a user