Description
I suspect this is not a common use case. But I was looking at using
https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/UsingWithRDS.IAMDBAuth.html
To authentic to an AWS Aurora Postgres server, instead of playing hide the keys in the cloud. But the generated tokens are only valid for 15min, which I'm pretty sure can't work with a static connection string. The best I can think of is to extend the Pool API to have a closure that generates the connection string, maybe for every connection or just if the connection attempt fails with a bad password.
Some code for generating such a token can be found in the comments for
rusoto/rusoto#1733
But there's some async calls in there (wrapped in block_on), so maybe a connection string generating closure should return a future instead of the string.