Struct aws_config::profile::credentials::ProfileFileCredentialsProvider [−][src]
pub struct ProfileFileCredentialsProvider { /* fields omitted */ }Expand description
AWS Profile based credentials provider
This credentials provider will load credentials from ~/.aws/config and ~/.aws/credentials.
The locations of these files are configurable via environment variables, see below.
Generally, this will be constructed via the default provider chain, however, it can be manually constructed with the builder:
use aws_config::profile::ProfileFileCredentialsProvider;
let provider = ProfileFileCredentialsProvider::builder().build();Note: Profile providers to not implement any caching. They will reload and reparse the profile from the file system when called. See lazy_caching for more information about caching.
This provider supports several different credentials formats:
Credentials defined explicitly within the file
[default]
aws_access_key_id = 123
aws_secret_access_key = 456Assume Role Credentials loaded from a credential source
[default]
role_arn = arn:aws:iam::123456789:role/RoleA
credential_source = EnvironmentNOTE: Currently only the Environment credential source is supported although it is possible to
provide custom sources:
use aws_types::credentials::{self, ProvideCredentials, future};
use aws_config::profile::ProfileFileCredentialsProvider;
#[derive(Debug)]
struct MyCustomProvider;
impl MyCustomProvider {
async fn load_credentials(&self) -> credentials::Result {
todo!()
}
}
impl ProvideCredentials for MyCustomProvider {
fn provide_credentials<'a>(&'a self) -> future::ProvideCredentials where Self: 'a {
future::ProvideCredentials::new(self.load_credentials())
}
}
let provider = ProfileFileCredentialsProvider::builder()
.with_custom_provider("Custom", MyCustomProvider)
.build();
}Assume role credentials from a source profile
[default]
role_arn = arn:aws:iam::123456789:role/RoleA
source_profile = base
[profile base]
aws_access_key_id = 123
aws_secret_access_key = 456Other more complex configurations are possible, consult test-data/assume-role-tests.json.
Location of Profile Files
- The location of the config file will be loaded from the
AWS_CONFIG_FILEenvironment variable with a fallback to~/.aws/config - The location of the credentials file will be loaded from the
AWS_SHARED_CREDENTIALS_FILEenvironment variable with a fallback to~/.aws/credentials
Home directory resolution
Home directory resolution is implemented to match the behavior of the CLI & Python. ~ is only
used for home directory resolution when it:
- Starts the path
- Is followed immediately by
/or a platform specific separator. (On windows,~/and~\both resolve to the home directory.
When determining the home directory, the following environment variables are checked:
HOMEon all platformsUSERPROFILEon Windows- The concatenation of
HOMEDRIVEandHOMEPATHon Windows ($HOMEDRIVE$HOMEPATH)
Implementations
Trait Implementations
Returns a future that provides credentials.
Auto Trait Implementations
impl !RefUnwindSafe for ProfileFileCredentialsProvider
impl Send for ProfileFileCredentialsProvider
impl Sync for ProfileFileCredentialsProvider
impl Unpin for ProfileFileCredentialsProvider
impl !UnwindSafe for ProfileFileCredentialsProvider
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber to this type, returning a
WithDispatch wrapper. Read more
Attaches the current default Subscriber to this type, returning a
WithDispatch wrapper. Read more