1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
use std::env;
use std::fmt::{self, Debug, Formatter};
pub use self::rotating::RotatingCredentials;
#[cfg(feature = "full")]
pub use self::serde::Ec2SecurityCredentialsMetadataResponse;
use zeroize::Zeroizing;
mod rotating;
#[cfg(feature = "full")]
mod serde;
#[derive(Clone, PartialEq, Eq)]
pub struct Credentials {
key: String,
secret: Zeroizing<String>,
token: Option<String>,
}
impl Credentials {
#[inline]
pub fn new(key: impl Into<String>, secret: impl Into<String>) -> Self {
Self::new_with_maybe_token(key.into(), secret.into(), None)
}
#[inline]
pub fn new_with_token(
key: impl Into<String>,
secret: impl Into<String>,
token: impl Into<String>,
) -> Self {
Self::new_with_maybe_token(key.into(), secret.into(), Some(token.into()))
}
#[inline]
pub(super) fn new_with_maybe_token(key: String, secret: String, token: Option<String>) -> Self {
Self {
key,
secret: Zeroizing::new(secret),
token,
}
}
pub fn from_env() -> Option<Self> {
let key = env::var("AWS_ACCESS_KEY_ID").ok()?;
let secret = env::var("AWS_SECRET_ACCESS_KEY").ok()?;
let token = env::var("AWS_SESSION_TOKEN").ok();
Some(Self::new_with_maybe_token(key, secret, token))
}
#[inline]
pub fn key(&self) -> &str {
&self.key
}
#[inline]
pub fn secret(&self) -> &str {
&self.secret
}
#[inline]
pub fn token(&self) -> Option<&str> {
self.token.as_deref()
}
}
impl Debug for Credentials {
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
f.debug_struct("Credentials")
.field("key", &self.key)
.finish()
}
}
#[cfg(test)]
mod tests {
use pretty_assertions::assert_eq;
use super::*;
#[test]
fn key_secret() {
let credentials = Credentials::new("abcd", "1234");
assert_eq!(credentials.key(), "abcd");
assert_eq!(credentials.secret(), "1234");
assert!(credentials.token().is_none());
}
#[test]
fn key_secret_token() {
let credentials = Credentials::new_with_token("abcd", "1234", "xyz");
assert_eq!(credentials.key(), "abcd");
assert_eq!(credentials.secret(), "1234");
assert_eq!(credentials.token(), Some("xyz"));
}
#[test]
fn debug() {
let credentials = Credentials::new("abcd", "1234");
let debug_output = format!("{:?}", credentials);
assert_eq!(debug_output, "Credentials { key: \"abcd\" }");
}
#[test]
fn debug_token() {
let credentials = Credentials::new_with_token("abcd", "1234", "xyz");
let debug_output = format!("{:?}", credentials);
assert_eq!(debug_output, "Credentials { key: \"abcd\" }");
}
#[test]
fn from_env() {
env::set_var("AWS_ACCESS_KEY_ID", "key");
env::set_var("AWS_SECRET_ACCESS_KEY", "secret");
let credentials = Credentials::from_env().unwrap();
assert_eq!(credentials.key(), "key");
assert_eq!(credentials.secret(), "secret");
assert!(credentials.token().is_none());
env::remove_var("AWS_ACCESS_KEY_ID");
env::remove_var("AWS_SECRET_ACCESS_KEY");
assert!(Credentials::from_env().is_none());
}
}