lambda-live-debugger
Version:
Debug Lambda functions locally like it is running in the cloud
56 lines (55 loc) • 2.48 kB
TypeScript
import type { FromLoginCredentialsInit } from "@aws-sdk/credential-provider-login";
import type { AssumeRoleWithWebIdentityParams } from "@aws-sdk/credential-provider-web-identity";
import type { CredentialProviderOptions, RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types";
import type { SourceProfileInit } from "@smithy/shared-ini-file-loader";
import type { AwsCredentialIdentity, Pluggable } from "@smithy/types";
import type { AssumeRoleParams } from "./resolveAssumeRoleCredentials";
/**
* @public
*/
export interface FromIniInit extends SourceProfileInit, CredentialProviderOptions, FromLoginCredentialsInit {
/**
* A function that returns a promise fulfilled with an MFA token code for
* the provided MFA Serial code. If a profile requires an MFA code and
* `mfaCodeProvider` is not a valid function, the credential provider
* promise will be rejected.
*
* @param mfaSerial The serial code of the MFA device specified.
*/
mfaCodeProvider?: (mfaSerial: string) => Promise<string>;
/**
* A function that assumes a role and returns a promise fulfilled with
* credentials for the assumed role.
*
* @param sourceCreds The credentials with which to assume a role.
* @param params
*/
roleAssumer?: (sourceCreds: AwsCredentialIdentity, params: AssumeRoleParams) => Promise<AwsCredentialIdentity>;
/**
* A function that assumes a role with web identity and returns a promise fulfilled with
* credentials for the assumed role.
*
* @param sourceCreds The credentials with which to assume a role.
* @param params
*/
roleAssumerWithWebIdentity?: (params: AssumeRoleWithWebIdentityParams) => Promise<AwsCredentialIdentity>;
/**
* AWS SDK Client configuration to be used for creating inner client
* for auth operations. Inner clients include STS, SSO, and Signin clients.
* @internal
*/
clientConfig?: any;
clientPlugins?: Pluggable<any, any>[];
/**
* When true, always reload credentials from the file system instead of using cached values.
* This is useful when you need to detect changes to the credentials file.
*/
ignoreCache?: boolean;
}
/**
* @internal
*
* Creates a credential provider that will read from ini files and supports
* role assumption and multi-factor authentication.
*/
export declare const fromIni: (init?: FromIniInit) => RuntimeConfigAwsCredentialIdentityProvider;