HADOOP-12963 Allow using path style addressing for accessing the s3 endpoint. (Stephen Montgomery via stevel)
This commit is contained in:
parent
40211d1f0a
commit
df18b6e984
|
@ -765,6 +765,13 @@
|
||||||
</description>
|
</description>
|
||||||
</property>
|
</property>
|
||||||
|
|
||||||
|
<property>
|
||||||
|
<name>fs.s3a.path.style.access</name>
|
||||||
|
<description>Enable S3 path style access ie disabling the default virtual hosting behaviour.
|
||||||
|
Useful for S3A-compliant storage providers as it removes the need to set up DNS for virtual hosting.
|
||||||
|
</description>
|
||||||
|
</property>
|
||||||
|
|
||||||
<property>
|
<property>
|
||||||
<name>fs.s3a.proxy.host</name>
|
<name>fs.s3a.proxy.host</name>
|
||||||
<description>Hostname of the (optional) proxy server for S3 connections.</description>
|
<description>Hostname of the (optional) proxy server for S3 connections.</description>
|
||||||
|
|
|
@ -35,6 +35,10 @@ public class Constants {
|
||||||
|
|
||||||
//use a custom endpoint?
|
//use a custom endpoint?
|
||||||
public static final String ENDPOINT = "fs.s3a.endpoint";
|
public static final String ENDPOINT = "fs.s3a.endpoint";
|
||||||
|
|
||||||
|
//Enable path style access? Overrides default virtual hosting
|
||||||
|
public static final String PATH_STYLE_ACCESS = "fs.s3a.path.style.access";
|
||||||
|
|
||||||
//connect to s3 through a proxy server?
|
//connect to s3 through a proxy server?
|
||||||
public static final String PROXY_HOST = "fs.s3a.proxy.host";
|
public static final String PROXY_HOST = "fs.s3a.proxy.host";
|
||||||
public static final String PROXY_PORT = "fs.s3a.proxy.port";
|
public static final String PROXY_PORT = "fs.s3a.proxy.port";
|
||||||
|
|
|
@ -38,6 +38,7 @@ import com.amazonaws.auth.AWSCredentialsProviderChain;
|
||||||
|
|
||||||
import com.amazonaws.auth.InstanceProfileCredentialsProvider;
|
import com.amazonaws.auth.InstanceProfileCredentialsProvider;
|
||||||
import com.amazonaws.services.s3.AmazonS3Client;
|
import com.amazonaws.services.s3.AmazonS3Client;
|
||||||
|
import com.amazonaws.services.s3.S3ClientOptions;
|
||||||
import com.amazonaws.services.s3.model.CannedAccessControlList;
|
import com.amazonaws.services.s3.model.CannedAccessControlList;
|
||||||
import com.amazonaws.services.s3.model.DeleteObjectRequest;
|
import com.amazonaws.services.s3.model.DeleteObjectRequest;
|
||||||
import com.amazonaws.services.s3.model.DeleteObjectsRequest;
|
import com.amazonaws.services.s3.model.DeleteObjectsRequest;
|
||||||
|
@ -244,6 +245,15 @@ public class S3AFileSystem extends FileSystem {
|
||||||
throw new IllegalArgumentException(msg, e);
|
throw new IllegalArgumentException(msg, e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
enablePathStyleAccessIfRequired(conf);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void enablePathStyleAccessIfRequired(Configuration conf) {
|
||||||
|
final boolean pathStyleAccess = conf.getBoolean(PATH_STYLE_ACCESS, false);
|
||||||
|
if (pathStyleAccess) {
|
||||||
|
LOG.debug("Enabling path style access!");
|
||||||
|
s3.setS3ClientOptions(new S3ClientOptions().withPathStyleAccess(true));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void initTransferManager() {
|
private void initTransferManager() {
|
||||||
|
|
|
@ -224,6 +224,13 @@ this capability.
|
||||||
</description>
|
</description>
|
||||||
</property>
|
</property>
|
||||||
|
|
||||||
|
<property>
|
||||||
|
<name>fs.s3a.path.style.access</name>
|
||||||
|
<description>Enable S3 path style access ie disabling the default virtual hosting behaviour.
|
||||||
|
Useful for S3A-compliant storage providers as it removes the need to set up DNS for virtual hosting.
|
||||||
|
</description>
|
||||||
|
</property>
|
||||||
|
|
||||||
<property>
|
<property>
|
||||||
<name>fs.s3a.proxy.host</name>
|
<name>fs.s3a.proxy.host</name>
|
||||||
<description>Hostname of the (optional) proxy server for S3 connections.</description>
|
<description>Hostname of the (optional) proxy server for S3 connections.</description>
|
||||||
|
|
|
@ -19,10 +19,14 @@
|
||||||
package org.apache.hadoop.fs.s3a;
|
package org.apache.hadoop.fs.s3a;
|
||||||
|
|
||||||
import com.amazonaws.services.s3.AmazonS3Client;
|
import com.amazonaws.services.s3.AmazonS3Client;
|
||||||
|
import com.amazonaws.services.s3.S3ClientOptions;
|
||||||
|
import com.amazonaws.services.s3.model.AmazonS3Exception;
|
||||||
|
|
||||||
import org.apache.commons.lang.StringUtils;
|
import org.apache.commons.lang.StringUtils;
|
||||||
import com.amazonaws.AmazonClientException;
|
import com.amazonaws.AmazonClientException;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.fs.Path;
|
||||||
|
import org.apache.hadoop.fs.contract.ContractTestUtils;
|
||||||
import org.junit.Rule;
|
import org.junit.Rule;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.junit.rules.Timeout;
|
import org.junit.rules.Timeout;
|
||||||
|
@ -30,17 +34,19 @@ import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import static org.junit.Assert.assertFalse;
|
import static org.junit.Assert.assertFalse;
|
||||||
|
import static org.junit.Assert.assertNotNull;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
import static org.junit.Assert.assertEquals;
|
import static org.junit.Assert.assertEquals;
|
||||||
import static org.junit.Assert.fail;
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
import java.io.IOException;
|
import java.lang.reflect.Field;
|
||||||
|
|
||||||
import org.apache.hadoop.security.ProviderUtils;
|
import org.apache.hadoop.security.ProviderUtils;
|
||||||
import org.apache.hadoop.security.alias.CredentialProvider;
|
import org.apache.hadoop.security.alias.CredentialProvider;
|
||||||
import org.apache.hadoop.security.alias.CredentialProviderFactory;
|
import org.apache.hadoop.security.alias.CredentialProviderFactory;
|
||||||
|
import org.apache.http.HttpStatus;
|
||||||
import org.junit.rules.TemporaryFolder;
|
import org.junit.rules.TemporaryFolder;
|
||||||
|
|
||||||
public class TestS3AConfiguration {
|
public class TestS3AConfiguration {
|
||||||
|
@ -354,4 +360,39 @@ public class TestS3AConfiguration {
|
||||||
assertEquals("SecretKey incorrect.", "456", creds.getAccessSecret());
|
assertEquals("SecretKey incorrect.", "456", creds.getAccessSecret());
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void shouldBeAbleToSwitchOnS3PathStyleAccessViaConfigProperty() throws Exception {
|
||||||
|
|
||||||
|
conf = new Configuration();
|
||||||
|
conf.set(Constants.PATH_STYLE_ACCESS, Boolean.toString(true));
|
||||||
|
assertTrue(conf.getBoolean(Constants.PATH_STYLE_ACCESS, false));
|
||||||
|
|
||||||
|
try {
|
||||||
|
fs = S3ATestUtils.createTestFileSystem(conf);
|
||||||
|
final Object object = getClientOptionsField(fs.getAmazonS3Client(), "clientOptions");
|
||||||
|
assertNotNull(object);
|
||||||
|
assertTrue("Unexpected type found for clientOptions!", object instanceof S3ClientOptions);
|
||||||
|
assertTrue("Expected to find path style access to be switched on!", ((S3ClientOptions) object).isPathStyleAccess());
|
||||||
|
byte[] file = ContractTestUtils.toAsciiByteArray("test file");
|
||||||
|
ContractTestUtils.writeAndRead(fs, new Path("/path/style/access/testFile"), file, file.length, conf.getInt(Constants.FS_S3A_BLOCK_SIZE, file.length), false, true);
|
||||||
|
} catch (final AmazonS3Exception e) {
|
||||||
|
LOG.error("Caught exception: ", e);
|
||||||
|
// Catch/pass standard path style access behaviour when live bucket
|
||||||
|
// isn't in the same region as the s3 client default. See
|
||||||
|
// http://docs.aws.amazon.com/AmazonS3/latest/dev/VirtualHosting.html
|
||||||
|
assertEquals(e.getStatusCode(), HttpStatus.SC_MOVED_PERMANENTLY);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private Object getClientOptionsField(AmazonS3Client s3client, String field)
|
||||||
|
throws NoSuchFieldException, IllegalAccessException {
|
||||||
|
final Field clientOptionsProps = s3client.getClass().getDeclaredField(field);
|
||||||
|
assertNotNull(clientOptionsProps);
|
||||||
|
if (!clientOptionsProps.isAccessible()) {
|
||||||
|
clientOptionsProps.setAccessible(true);
|
||||||
|
}
|
||||||
|
final Object object = clientOptionsProps.get(s3client);
|
||||||
|
return object;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue