HADOOP-14135. Remove URI parameter in AWSCredentialProvider constructors. Contributed by Mingliang Liu

(cherry picked from commit 2e30aa72e0)
This commit is contained in:
Mingliang Liu 2017-02-28 14:51:32 -08:00
parent be58711e91
commit 45956131b9
9 changed files with 69 additions and 44 deletions

View File

@ -183,7 +183,7 @@ public void initialize(URI name, Configuration originalConf)
S3_CLIENT_FACTORY_IMPL, DEFAULT_S3_CLIENT_FACTORY_IMPL, S3_CLIENT_FACTORY_IMPL, DEFAULT_S3_CLIENT_FACTORY_IMPL,
S3ClientFactory.class); S3ClientFactory.class);
s3 = ReflectionUtils.newInstance(s3ClientFactoryClass, conf) s3 = ReflectionUtils.newInstance(s3ClientFactoryClass, conf)
.createS3Client(name, uri); .createS3Client(name);
maxKeys = intOption(conf, MAX_PAGING_KEYS, DEFAULT_MAX_PAGING_KEYS, 1); maxKeys = intOption(conf, MAX_PAGING_KEYS, DEFAULT_MAX_PAGING_KEYS, 1);
listing = new Listing(this); listing = new Listing(this);

View File

@ -318,15 +318,12 @@ public static long dateToLong(final Date date) {
* Create the AWS credentials from the providers and the URI. * Create the AWS credentials from the providers and the URI.
* @param binding Binding URI, may contain user:pass login details * @param binding Binding URI, may contain user:pass login details
* @param conf filesystem configuration * @param conf filesystem configuration
* @param fsURI fS URI after any login details have been stripped.
* @return a credentials provider list * @return a credentials provider list
* @throws IOException Problems loading the providers (including reading * @throws IOException Problems loading the providers (including reading
* secrets from credential files). * secrets from credential files).
*/ */
public static AWSCredentialProviderList createAWSCredentialProviderSet( public static AWSCredentialProviderList createAWSCredentialProviderSet(
URI binding, URI binding, Configuration conf) throws IOException {
Configuration conf,
URI fsURI) throws IOException {
AWSCredentialProviderList credentials = new AWSCredentialProviderList(); AWSCredentialProviderList credentials = new AWSCredentialProviderList();
Class<?>[] awsClasses; Class<?>[] awsClasses;
@ -351,11 +348,12 @@ public static AWSCredentialProviderList createAWSCredentialProviderSet(
SharedInstanceProfileCredentialsProvider.class.getName()); SharedInstanceProfileCredentialsProvider.class.getName());
aClass = SharedInstanceProfileCredentialsProvider.class; aClass = SharedInstanceProfileCredentialsProvider.class;
} }
credentials.add(createAWSCredentialProvider(conf, credentials.add(createAWSCredentialProvider(conf, aClass));
aClass,
fsURI));
} }
} }
// make sure the logging message strips out any auth details
LOG.debug("For URI {}, using credentials {}",
S3xLoginHelper.toString(binding), credentials);
return credentials; return credentials;
} }
@ -365,7 +363,7 @@ public static AWSCredentialProviderList createAWSCredentialProviderSet(
* attempted in order: * attempted in order:
* *
* <ol> * <ol>
* <li>a public constructor accepting java.net.URI and * <li>a public constructor accepting
* org.apache.hadoop.conf.Configuration</li> * org.apache.hadoop.conf.Configuration</li>
* <li>a public static method named getInstance that accepts no * <li>a public static method named getInstance that accepts no
* arguments and returns an instance of * arguments and returns an instance of
@ -375,14 +373,11 @@ public static AWSCredentialProviderList createAWSCredentialProviderSet(
* *
* @param conf configuration * @param conf configuration
* @param credClass credential class * @param credClass credential class
* @param uri URI of the FS
* @return the instantiated class * @return the instantiated class
* @throws IOException on any instantiation failure. * @throws IOException on any instantiation failure.
*/ */
static AWSCredentialsProvider createAWSCredentialProvider( static AWSCredentialsProvider createAWSCredentialProvider(
Configuration conf, Configuration conf, Class<?> credClass) throws IOException {
Class<?> credClass,
URI uri) throws IOException {
AWSCredentialsProvider credentials = null; AWSCredentialsProvider credentials = null;
String className = credClass.getName(); String className = credClass.getName();
if (!AWSCredentialsProvider.class.isAssignableFrom(credClass)) { if (!AWSCredentialsProvider.class.isAssignableFrom(credClass)) {
@ -394,11 +389,10 @@ static AWSCredentialsProvider createAWSCredentialProvider(
LOG.debug("Credential provider class is {}", className); LOG.debug("Credential provider class is {}", className);
try { try {
// new X(uri, conf) // new X(conf)
Constructor cons = getConstructor(credClass, URI.class, Constructor cons = getConstructor(credClass, Configuration.class);
Configuration.class);
if (cons != null) { if (cons != null) {
credentials = (AWSCredentialsProvider)cons.newInstance(uri, conf); credentials = (AWSCredentialsProvider)cons.newInstance(conf);
return credentials; return credentials;
} }
@ -420,16 +414,12 @@ static AWSCredentialsProvider createAWSCredentialProvider(
// no supported constructor or factory method found // no supported constructor or factory method found
throw new IOException(String.format("%s " + CONSTRUCTOR_EXCEPTION throw new IOException(String.format("%s " + CONSTRUCTOR_EXCEPTION
+ ". A class specified in %s must provide a public constructor " + ". A class specified in %s must provide a public constructor "
+ "accepting URI and Configuration, or a public factory method named " + "accepting Configuration, or a public factory method named "
+ "getInstance that accepts no arguments, or a public default " + "getInstance that accepts no arguments, or a public default "
+ "constructor.", className, AWS_CREDENTIALS_PROVIDER)); + "constructor.", className, AWS_CREDENTIALS_PROVIDER));
} catch (ReflectiveOperationException | IllegalArgumentException e) { } catch (ReflectiveOperationException | IllegalArgumentException e) {
// supported constructor or factory method found, but the call failed // supported constructor or factory method found, but the call failed
throw new IOException(className + " " + INSTANTIATION_EXCEPTION +".", e); throw new IOException(className + " " + INSTANTIATION_EXCEPTION +".", e);
} finally {
if (credentials != null) {
LOG.debug("Using {} for {}.", credentials, uri);
}
} }
} }

View File

@ -52,11 +52,10 @@ interface S3ClientFactory {
* because both values may be useful in logging. * because both values may be useful in logging.
* *
* @param name raw input S3A file system URI * @param name raw input S3A file system URI
* @param uri validated form of S3A file system URI
* @return S3 client * @return S3 client
* @throws IOException IO problem * @throws IOException IO problem
*/ */
AmazonS3 createS3Client(URI name, URI uri) throws IOException; AmazonS3 createS3Client(URI name) throws IOException;
/** /**
* The default factory implementation, which calls the AWS SDK to configure * The default factory implementation, which calls the AWS SDK to configure
@ -68,10 +67,10 @@ static class DefaultS3ClientFactory extends Configured
private static final Logger LOG = S3AFileSystem.LOG; private static final Logger LOG = S3AFileSystem.LOG;
@Override @Override
public AmazonS3 createS3Client(URI name, URI uri) throws IOException { public AmazonS3 createS3Client(URI name) throws IOException {
Configuration conf = getConf(); Configuration conf = getConf();
AWSCredentialsProvider credentials = AWSCredentialsProvider credentials =
createAWSCredentialProviderSet(name, conf, uri); createAWSCredentialProviderSet(name, conf);
ClientConfiguration awsConf = new ClientConfiguration(); ClientConfiguration awsConf = new ClientConfiguration();
initConnectionSettings(conf, awsConf); initConnectionSettings(conf, awsConf);
initProxySupport(conf, awsConf); initProxySupport(conf, awsConf);

View File

@ -28,7 +28,6 @@
import org.apache.hadoop.security.ProviderUtils; import org.apache.hadoop.security.ProviderUtils;
import java.io.IOException; import java.io.IOException;
import java.net.URI;
import static org.apache.hadoop.fs.s3a.Constants.ACCESS_KEY; import static org.apache.hadoop.fs.s3a.Constants.ACCESS_KEY;
import static org.apache.hadoop.fs.s3a.Constants.SECRET_KEY; import static org.apache.hadoop.fs.s3a.Constants.SECRET_KEY;
@ -51,7 +50,7 @@ public class SimpleAWSCredentialsProvider implements AWSCredentialsProvider {
private String secretKey; private String secretKey;
private IOException lookupIOE; private IOException lookupIOE;
public SimpleAWSCredentialsProvider(URI uri, Configuration conf) { public SimpleAWSCredentialsProvider(Configuration conf) {
try { try {
Configuration c = ProviderUtils.excludeIncompatibleCredentialProviders( Configuration c = ProviderUtils.excludeIncompatibleCredentialProviders(
conf, S3AFileSystem.class); conf, S3AFileSystem.class);

View File

@ -24,7 +24,6 @@
import org.apache.commons.lang.StringUtils; import org.apache.commons.lang.StringUtils;
import java.io.IOException; import java.io.IOException;
import java.net.URI;
import org.apache.hadoop.classification.InterfaceAudience; import org.apache.hadoop.classification.InterfaceAudience;
import org.apache.hadoop.classification.InterfaceStability; import org.apache.hadoop.classification.InterfaceStability;
@ -51,7 +50,7 @@ public class TemporaryAWSCredentialsProvider implements AWSCredentialsProvider {
private String sessionToken; private String sessionToken;
private IOException lookupIOE; private IOException lookupIOE;
public TemporaryAWSCredentialsProvider(URI uri, Configuration conf) { public TemporaryAWSCredentialsProvider(Configuration conf) {
try { try {
Configuration c = ProviderUtils.excludeIncompatibleCredentialProviders( Configuration c = ProviderUtils.excludeIncompatibleCredentialProviders(
conf, S3AFileSystem.class); conf, S3AFileSystem.class);

View File

@ -19,13 +19,14 @@
package org.apache.hadoop.fs.s3a; package org.apache.hadoop.fs.s3a;
import java.io.IOException; import java.io.IOException;
import java.net.URI;
import java.nio.file.AccessDeniedException; import java.nio.file.AccessDeniedException;
import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.fs.FileStatus; import org.apache.hadoop.fs.FileStatus;
import org.apache.hadoop.fs.FileSystem; import org.apache.hadoop.fs.FileSystem;
import org.apache.hadoop.fs.Path; import org.apache.hadoop.fs.Path;
import org.apache.hadoop.test.GenericTestUtils;
import org.junit.Rule; import org.junit.Rule;
import org.junit.Test; import org.junit.Test;
import org.junit.rules.Timeout; import org.junit.rules.Timeout;
@ -40,6 +41,7 @@
import static org.apache.hadoop.fs.s3a.Constants.*; import static org.apache.hadoop.fs.s3a.Constants.*;
import static org.apache.hadoop.fs.s3a.S3ATestConstants.*; import static org.apache.hadoop.fs.s3a.S3ATestConstants.*;
import static org.apache.hadoop.fs.s3a.S3AUtils.*;
import static org.junit.Assert.*; import static org.junit.Assert.*;
/** /**
@ -66,6 +68,42 @@ public void testBadConfiguration() throws IOException {
} }
} }
/**
* A bad CredentialsProvider which has no suitable constructor.
*
* This class does not provide a public constructor accepting Configuration,
* or a public factory method named getInstance that accepts no arguments,
* or a public default constructor.
*/
static class BadCredentialsProviderConstructor
implements AWSCredentialsProvider {
@SuppressWarnings("unused")
public BadCredentialsProviderConstructor(String fsUri, Configuration conf) {
}
@Override
public AWSCredentials getCredentials() {
return new BasicAWSCredentials("dummy_key", "dummy_secret");
}
@Override
public void refresh() {
}
}
@Test
public void testBadCredentialsConstructor() throws Exception {
Configuration conf = new Configuration();
conf.set(AWS_CREDENTIALS_PROVIDER,
BadCredentialsProviderConstructor.class.getName());
try {
createFailingFS(conf);
} catch (IOException e) {
GenericTestUtils.assertExceptionContains(CONSTRUCTOR_EXCEPTION, e);
}
}
/** /**
* Create a filesystem, expect it to fail by raising an IOException. * Create a filesystem, expect it to fail by raising an IOException.
* Raises an assertion exception if in fact the FS does get instantiated. * Raises an assertion exception if in fact the FS does get instantiated.
@ -81,7 +119,7 @@ private void createFailingFS(Configuration conf) throws IOException {
static class BadCredentialsProvider implements AWSCredentialsProvider { static class BadCredentialsProvider implements AWSCredentialsProvider {
@SuppressWarnings("unused") @SuppressWarnings("unused")
public BadCredentialsProvider(URI name, Configuration conf) { public BadCredentialsProvider(Configuration conf) {
} }
@Override @Override
@ -108,7 +146,7 @@ public void testBadCredentials() throws Exception {
static class GoodCredentialsProvider extends AWSCredentialsProviderChain { static class GoodCredentialsProvider extends AWSCredentialsProviderChain {
@SuppressWarnings("unused") @SuppressWarnings("unused")
public GoodCredentialsProvider(URI name, Configuration conf) { public GoodCredentialsProvider(Configuration conf) {
super(new BasicAWSCredentialsProvider(conf.get(ACCESS_KEY), super(new BasicAWSCredentialsProvider(conf.get(ACCESS_KEY),
conf.get(SECRET_KEY)), new InstanceProfileCredentialsProvider()); conf.get(SECRET_KEY)), new InstanceProfileCredentialsProvider());
} }

View File

@ -126,7 +126,7 @@ public void testTemporaryCredentialValidation() throws Throwable {
conf.set(SECRET_KEY, "secretkey"); conf.set(SECRET_KEY, "secretkey");
conf.set(SESSION_TOKEN, ""); conf.set(SESSION_TOKEN, "");
TemporaryAWSCredentialsProvider provider TemporaryAWSCredentialsProvider provider
= new TemporaryAWSCredentialsProvider(getFileSystem().getUri(), conf); = new TemporaryAWSCredentialsProvider(conf);
try { try {
AWSCredentials credentials = provider.getCredentials(); AWSCredentials credentials = provider.getCredentials();
fail("Expected a CredentialInitializationException," fail("Expected a CredentialInitializationException,"

View File

@ -31,7 +31,7 @@
public class MockS3ClientFactory implements S3ClientFactory { public class MockS3ClientFactory implements S3ClientFactory {
@Override @Override
public AmazonS3 createS3Client(URI name, URI uri) { public AmazonS3 createS3Client(URI name) {
String bucket = name.getHost(); String bucket = name.getHost();
AmazonS3 s3 = mock(AmazonS3.class); AmazonS3 s3 = mock(AmazonS3.class);
when(s3.doesBucketExist(bucket)).thenReturn(true); when(s3.doesBucketExist(bucket)).thenReturn(true);

View File

@ -93,7 +93,7 @@ public void testInstantiationChain() throws Throwable {
URI uri = testFile.toUri(); URI uri = testFile.toUri();
AWSCredentialProviderList list = S3AUtils.createAWSCredentialProviderSet( AWSCredentialProviderList list = S3AUtils.createAWSCredentialProviderSet(
uri, conf, uri); uri, conf);
List<Class<? extends AWSCredentialsProvider>> expectedClasses = List<Class<? extends AWSCredentialsProvider>> expectedClasses =
Arrays.asList( Arrays.asList(
TemporaryAWSCredentialsProvider.class, TemporaryAWSCredentialsProvider.class,
@ -107,9 +107,9 @@ public void testDefaultChain() throws Exception {
URI uri1 = new URI("s3a://bucket1"), uri2 = new URI("s3a://bucket2"); URI uri1 = new URI("s3a://bucket1"), uri2 = new URI("s3a://bucket2");
Configuration conf = new Configuration(); Configuration conf = new Configuration();
AWSCredentialProviderList list1 = S3AUtils.createAWSCredentialProviderSet( AWSCredentialProviderList list1 = S3AUtils.createAWSCredentialProviderSet(
uri1, conf, uri1); uri1, conf);
AWSCredentialProviderList list2 = S3AUtils.createAWSCredentialProviderSet( AWSCredentialProviderList list2 = S3AUtils.createAWSCredentialProviderSet(
uri2, conf, uri2); uri2, conf);
List<Class<? extends AWSCredentialsProvider>> expectedClasses = List<Class<? extends AWSCredentialsProvider>> expectedClasses =
Arrays.asList( Arrays.asList(
BasicAWSCredentialsProvider.class, BasicAWSCredentialsProvider.class,
@ -132,9 +132,9 @@ public void testConfiguredChain() throws Exception {
AnonymousAWSCredentialsProvider.class); AnonymousAWSCredentialsProvider.class);
conf.set(AWS_CREDENTIALS_PROVIDER, buildClassListString(expectedClasses)); conf.set(AWS_CREDENTIALS_PROVIDER, buildClassListString(expectedClasses));
AWSCredentialProviderList list1 = S3AUtils.createAWSCredentialProviderSet( AWSCredentialProviderList list1 = S3AUtils.createAWSCredentialProviderSet(
uri1, conf, uri1); uri1, conf);
AWSCredentialProviderList list2 = S3AUtils.createAWSCredentialProviderSet( AWSCredentialProviderList list2 = S3AUtils.createAWSCredentialProviderSet(
uri2, conf, uri2); uri2, conf);
assertCredentialProviders(expectedClasses, list1); assertCredentialProviders(expectedClasses, list1);
assertCredentialProviders(expectedClasses, list2); assertCredentialProviders(expectedClasses, list2);
assertSameInstanceProfileCredentialsProvider(list1.getProviders().get(1), assertSameInstanceProfileCredentialsProvider(list1.getProviders().get(1),
@ -150,9 +150,9 @@ public void testConfiguredChainUsesSharedInstanceProfile() throws Exception {
InstanceProfileCredentialsProvider.class); InstanceProfileCredentialsProvider.class);
conf.set(AWS_CREDENTIALS_PROVIDER, buildClassListString(expectedClasses)); conf.set(AWS_CREDENTIALS_PROVIDER, buildClassListString(expectedClasses));
AWSCredentialProviderList list1 = S3AUtils.createAWSCredentialProviderSet( AWSCredentialProviderList list1 = S3AUtils.createAWSCredentialProviderSet(
uri1, conf, uri1); uri1, conf);
AWSCredentialProviderList list2 = S3AUtils.createAWSCredentialProviderSet( AWSCredentialProviderList list2 = S3AUtils.createAWSCredentialProviderSet(
uri2, conf, uri2); uri2, conf);
assertCredentialProviders(expectedClasses, list1); assertCredentialProviders(expectedClasses, list1);
assertCredentialProviders(expectedClasses, list2); assertCredentialProviders(expectedClasses, list2);
assertSameInstanceProfileCredentialsProvider(list1.getProviders().get(0), assertSameInstanceProfileCredentialsProvider(list1.getProviders().get(0),
@ -226,7 +226,7 @@ private void expectProviderInstantiationFailure(String option,
conf.getTrimmed(KEY_CSVTEST_FILE, DEFAULT_CSVTEST_FILE)); conf.getTrimmed(KEY_CSVTEST_FILE, DEFAULT_CSVTEST_FILE));
expectException(IOException.class, expectedErrorText); expectException(IOException.class, expectedErrorText);
URI uri = testFile.toUri(); URI uri = testFile.toUri();
S3AUtils.createAWSCredentialProviderSet(uri, conf, uri); S3AUtils.createAWSCredentialProviderSet(uri, conf);
} }
/** /**