UNPKG

lambda-live-debugger

Version:

Debug Lambda functions locally like it is running in the cloud

56 lines (55 loc) 2.48 kB
import type { FromLoginCredentialsInit } from "@aws-sdk/credential-provider-login"; import type { AssumeRoleWithWebIdentityParams } from "@aws-sdk/credential-provider-web-identity"; import type { CredentialProviderOptions, RuntimeConfigAwsCredentialIdentityProvider } from "@aws-sdk/types"; import type { SourceProfileInit } from "@smithy/shared-ini-file-loader"; import type { AwsCredentialIdentity, Pluggable } from "@smithy/types"; import type { AssumeRoleParams } from "./resolveAssumeRoleCredentials"; /** * @public */ export interface FromIniInit extends SourceProfileInit, CredentialProviderOptions, FromLoginCredentialsInit { /** * A function that returns a promise fulfilled with an MFA token code for * the provided MFA Serial code. If a profile requires an MFA code and * `mfaCodeProvider` is not a valid function, the credential provider * promise will be rejected. * * @param mfaSerial The serial code of the MFA device specified. */ mfaCodeProvider?: (mfaSerial: string) => Promise<string>; /** * A function that assumes a role and returns a promise fulfilled with * credentials for the assumed role. * * @param sourceCreds The credentials with which to assume a role. * @param params */ roleAssumer?: (sourceCreds: AwsCredentialIdentity, params: AssumeRoleParams) => Promise<AwsCredentialIdentity>; /** * A function that assumes a role with web identity and returns a promise fulfilled with * credentials for the assumed role. * * @param sourceCreds The credentials with which to assume a role. * @param params */ roleAssumerWithWebIdentity?: (params: AssumeRoleWithWebIdentityParams) => Promise<AwsCredentialIdentity>; /** * AWS SDK Client configuration to be used for creating inner client * for auth operations. Inner clients include STS, SSO, and Signin clients. * @internal */ clientConfig?: any; clientPlugins?: Pluggable<any, any>[]; /** * When true, always reload credentials from the file system instead of using cached values. * This is useful when you need to detect changes to the credentials file. */ ignoreCache?: boolean; } /** * @internal * * Creates a credential provider that will read from ini files and supports * role assumption and multi-factor authentication. */ export declare const fromIni: (init?: FromIniInit) => RuntimeConfigAwsCredentialIdentityProvider;