1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
use aws_credential_types::provider::{self, error::CredentialsError};
use aws_credential_types::Credentials as AwsCredentials;
use aws_sdk_sts::model::Credentials as StsCredentials;
use std::convert::TryFrom;
use std::time::{SystemTime, UNIX_EPOCH};
pub(crate) fn into_credentials(
sts_credentials: Option<StsCredentials>,
provider_name: &'static str,
) -> provider::Result {
let sts_credentials = sts_credentials
.ok_or_else(|| CredentialsError::unhandled("STS credentials must be defined"))?;
let expiration = SystemTime::try_from(
sts_credentials
.expiration
.ok_or_else(|| CredentialsError::unhandled("missing expiration"))?,
)
.map_err(|_| {
CredentialsError::unhandled(
"credential expiration time cannot be represented by a SystemTime",
)
})?;
Ok(AwsCredentials::new(
sts_credentials
.access_key_id
.ok_or_else(|| CredentialsError::unhandled("access key id missing from result"))?,
sts_credentials
.secret_access_key
.ok_or_else(|| CredentialsError::unhandled("secret access token missing"))?,
sts_credentials.session_token,
Some(expiration),
provider_name,
))
}
pub(crate) fn default_session_name(base: &str) -> String {
let now = SystemTime::now()
.duration_since(UNIX_EPOCH)
.expect("post epoch");
format!("{}-{}", base, now.as_millis())
}