1/*
2 * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3 * SPDX-License-Identifier: Apache-2.0
4 */
56use aws_credential_types::provider::{self, error::CredentialsError};
7use aws_credential_types::Credentials as AwsCredentials;
8use aws_sdk_sts::types::Credentials as StsCredentials;
910use std::time::{SystemTime, UNIX_EPOCH};
1112/// Convert STS credentials to aws_auth::Credentials
13pub(crate) fn into_credentials(
14 sts_credentials: Option<StsCredentials>,
15 provider_name: &'static str,
16) -> provider::Result {
17let sts_credentials = sts_credentials
18 .ok_or_else(|| CredentialsError::unhandled("STS credentials must be defined"))?;
19let expiration = SystemTime::try_from(sts_credentials.expiration).map_err(|_| {
20 CredentialsError::unhandled(
21"credential expiration time cannot be represented by a SystemTime",
22 )
23 })?;
24Ok(AwsCredentials::new(
25 sts_credentials.access_key_id,
26 sts_credentials.secret_access_key,
27Some(sts_credentials.session_token),
28Some(expiration),
29 provider_name,
30 ))
31}
3233/// Create a default STS session name
34///
35/// STS Assume Role providers MUST assign a name to their generated session. When a user does not
36/// provide a name for the session, the provider will choose a name composed of a base + a timestamp,
37/// e.g. `profile-file-provider-123456789`
38pub(crate) fn default_session_name(base: &str, ts: SystemTime) -> String {
39let now = ts.duration_since(UNIX_EPOCH).expect("post epoch");
40format!("{}-{}", base, now.as_millis())
41}