1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
use {AwsCredentials, CredentialsError, ProvideAwsCredentials};
use chrono::{Duration, UTC};
#[derive(Clone, Debug)]
pub struct StaticProvider {
aws_access_key_id: String,
aws_secret_access_key: String,
token: Option<String>,
valid_for: i64,
}
impl StaticProvider {
pub fn new(access_key: String, secret_access_key: String, token: Option<String>, valid_for: Option<i64>) -> StaticProvider {
StaticProvider {
aws_access_key_id: access_key,
aws_secret_access_key: secret_access_key,
token: token,
valid_for: valid_for.unwrap_or(600),
}
}
pub fn new_minimal(access_key: String, secret_access_key: String) -> StaticProvider {
StaticProvider {
aws_access_key_id: access_key,
aws_secret_access_key: secret_access_key,
token: None,
valid_for: 600,
}
}
pub fn get_aws_access_key_id(&self) -> &str {
&self.aws_access_key_id
}
pub fn get_aws_secret_access_key(&self) -> &str {
&self.aws_secret_access_key
}
pub fn has_token(&self) -> bool {
self.token.is_some()
}
pub fn get_token(&self) -> &Option<String> {
&self.token
}
pub fn is_valid_for(&self) -> &i64 {
&self.valid_for
}
}
impl ProvideAwsCredentials for StaticProvider {
fn credentials(&self) -> Result<AwsCredentials, CredentialsError> {
Ok(AwsCredentials::new(self.aws_access_key_id.clone(), self.aws_secret_access_key.clone(),
self.token.clone(), UTC::now() + Duration::seconds(self.valid_for)))
}
}
#[cfg(test)]
mod tests {
use {ProvideAwsCredentials};
use super::*;
#[test]
fn test_static_provider_creation() {
let result = StaticProvider::new("fake-key".to_owned(), "fake-secret".to_owned(), Some("token".to_owned()), Some(300)).credentials();
assert!(result.is_ok());
}
#[test]
fn test_static_provider_minimal_creation() {
let result = StaticProvider::new_minimal("fake-key-2".to_owned(), "fake-secret-2".to_owned()).credentials();
assert!(result.is_ok());
}
#[test]
fn test_static_provider_custom_time_expiration() {
let start_time = UTC::now();
let result = StaticProvider::new("fake-key".to_owned(), "fake-secret".to_owned(), None, Some(10000)).credentials();
assert!(result.is_ok());
let finalized = result.unwrap();
let time_diff = (finalized.expires_at().clone() - start_time).num_minutes();
assert!(time_diff > 100);
assert!(time_diff < 200);
}
}