@@ -26,15 +26,12 @@ use url::Url;
26
26
/// use awscreds::Credentials;
27
27
///
28
28
/// // Load credentials from `[default]` profile
29
- /// #[cfg(feature="http-credentials")]
30
29
/// let credentials = Credentials::default();
31
30
///
32
31
/// // Also loads credentials from `[default]` profile
33
- /// #[cfg(feature="http-credentials")]
34
32
/// let credentials = Credentials::new(None, None, None, None, None);
35
33
///
36
34
/// // Load credentials from `[my-profile]` profile
37
- /// #[cfg(feature="http-credentials")]
38
35
/// let credentials = Credentials::new(None, None, None, None, Some("my-profile".into()));
39
36
///
40
37
/// // Use anonymous credentials for public objects
@@ -56,14 +53,12 @@ use url::Url;
56
53
/// // Load credentials directly
57
54
/// let access_key = "AKIAIOSFODNN7EXAMPLE";
58
55
/// let secret_key = "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY";
59
- /// #[cfg(feature="http-credentials")]
60
56
/// let credentials = Credentials::new(Some(access_key), Some(secret_key), None, None, None);
61
57
///
62
58
/// // Load credentials from the environment
63
59
/// use std::env;
64
60
/// env::set_var("AWS_ACCESS_KEY_ID", "AKIAIOSFODNN7EXAMPLE");
65
61
/// env::set_var("AWS_SECRET_ACCESS_KEY", "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY");
66
- /// #[cfg(feature="http-credentials")]
67
62
/// let credentials = Credentials::new(None, None, None, None, None);
68
63
/// ```
69
64
#[ derive( Clone , Debug , Eq , PartialEq , Serialize , Deserialize ) ]
@@ -192,7 +187,6 @@ fn http_get(url: &str) -> attohttpc::Result<attohttpc::Response> {
192
187
}
193
188
194
189
impl Credentials {
195
- #[ cfg( feature = "http-credentials" ) ]
196
190
pub fn refresh ( & mut self ) -> Result < ( ) , CredentialsError > {
197
191
if let Some ( expiration) = self . expiration {
198
192
if expiration. 0 <= OffsetDateTime :: now_utc ( ) {
@@ -262,7 +256,6 @@ impl Credentials {
262
256
} )
263
257
}
264
258
265
- #[ cfg( feature = "http-credentials" ) ]
266
259
#[ allow( clippy:: should_implement_trait) ]
267
260
pub fn default ( ) -> Result < Credentials , CredentialsError > {
268
261
Credentials :: new ( None , None , None , None , None )
@@ -280,7 +273,6 @@ impl Credentials {
280
273
281
274
/// Initialize Credentials directly with key ID, secret key, and optional
282
275
/// token.
283
- #[ cfg( feature = "http-credentials" ) ]
284
276
pub fn new (
285
277
access_key : Option < & str > ,
286
278
secret_key : Option < & str > ,
@@ -298,12 +290,15 @@ impl Credentials {
298
290
} ) ;
299
291
}
300
292
301
- Credentials :: from_sts_env ( "aws-creds" )
302
- . or_else ( |_| Credentials :: from_env ( ) )
303
- . or_else ( |_| Credentials :: from_profile ( profile) )
293
+ let credentials = Credentials :: from_env ( ) . or_else ( |_| Credentials :: from_profile ( profile) ) ;
294
+
295
+ #[ cfg( feature = "http-credentials" ) ]
296
+ let credentials = credentials
297
+ . or_else ( |_| Credentials :: from_sts_env ( "aws-creds" ) )
304
298
. or_else ( |_| Credentials :: from_instance_metadata_v2 ( false ) )
305
- . or_else ( |_| Credentials :: from_instance_metadata ( false ) )
306
- . map_err ( |_| CredentialsError :: NoCredentials )
299
+ . or_else ( |_| Credentials :: from_instance_metadata ( false ) ) ;
300
+
301
+ credentials. map_err ( |_| CredentialsError :: NoCredentials )
307
302
}
308
303
309
304
pub fn from_env_specific (
0 commit comments