@@ -270,7 +270,7 @@ Load credentials from Cognito Identity service, normally used in browsers.
270270 const client = new FooClient ({
271271 region: " us-east-1" ,
272272 credentials: fromCognitoIdentityPool ({
273- clientConfig: cognitoIdentityClientConfig // Optional
273+ clientConfig: cognitoIdentityClientConfig, // Optional
274274 identityPoolId: " us-east-1:1699ebc0-7900-4099-b910-2df94f52a030" ,
275275 customRoleArn: " arn:aws:iam::1234567890:role/MYAPP-CognitoIdentity" , // Optional
276276 logins: {
@@ -401,10 +401,10 @@ Retrieves credentials using OIDC token from a file on disk. It's commonly used i
401401
402402 const client = new FooClient ({
403403 credentials: fromTokenFile ({
404- roleArn: " arn:xxxx" // Optional. Otherwise read from `AWS_ROLE_ARN` environmental variable
404+ roleArn: " arn:xxxx" , // Optional. Otherwise read from `AWS_ROLE_ARN` environmental variable
405405 roleSessionName: " session:a" , // Optional. Otherwise read from `AWS_ROLE_SESSION_NAME` environmental variable
406- clientConfig: { region } // // Optional. STS client config to make the assume role request.
407- })
406+ clientConfig: { region }, // // Optional. STS client config to make the assume role request.
407+ }),
408408 });
409409 ```
410410
@@ -421,10 +421,10 @@ Retrieves credentials from STS web identity federation support.
421421
422422 const client = new FooClient ({
423423 credentials: fromWebToken ({
424- roleArn: " arn:xxxx" // Otherwise read from `AWS_ROLE_ARN` environmental variable
424+ roleArn: " arn:xxxx" , // Otherwise read from `AWS_ROLE_ARN` environmental variable
425425 roleSessionName: " session:a" , // Otherwise read from `AWS_ROLE_SESSION_NAME` environmental variable
426- clientConfig: { region } // // Optional. STS client config to make the assume role request.
427- })
426+ clientConfig: { region }, // // Optional. STS client config to make the assume role request.
427+ }),
428428 });
429429 ```
430430
0 commit comments