-
Notifications
You must be signed in to change notification settings - Fork 9.2k
HADOOP-18481. Don't warn on EnvironmentCredentialsProvider. #4973
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HADOOP-18481. Don't warn on EnvironmentCredentialsProvider. #4973
Conversation
|
💔 -1 overall
This message was automatically generated. |
|
@steveloughran could you please review? I'll then pick up testing for #4698 (prerequisites for upgrading to V2) against |
steveloughran
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
code looks good, just wondering if we may want to do the same for a couple more providers which we can easily migrate
| for (Class<?> aClass : awsClasses) { | ||
|
|
||
| if (aClass.getName().contains(AWS_AUTH_CLASS_PREFIX)) { | ||
| if (!aClass.getSimpleName().equals("EnvironmentVariableCredentialsProvider") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
how about having an array of simple names to skip on, with that, EC2ContainerCredentialsProviderWrapper, and InstanceProfileCredentialsProvider in. we only added our own IAMInstanceCredentialsProvider with delegation tokens, HADOOP-15449, and until then just included the aws sdk one directly. any refs to either can be mapped to IAMInstanceCredentialsProvider before trying to instantiate
|
thanks @steveloughran, have added |
|
💔 -1 overall
This message was automatically generated. |
|
and you tested it against an s3 store again, right? |
|
Yes, sorry should have mentioned! Tested by setting |
steveloughran
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1
|
merged to trunk; will backport |
…tial Providers. (#4973) The AWS SDKV2 upgrade log no longer warns about instantiation of the v1 SDK credential providers which are commonly used in s3a configurations: * com.amazonaws.auth.EnvironmentVariableCredentialsProvider * com.amazonaws.auth.EC2ContainerCredentialsProviderWrapper * com.amazonaws.auth.InstanceProfileCredentialsProvider When the hadoop-aws module moves to the v2 SDK, references to these credential providers will be rewritten to their v2 equivalents. Follow-on to HADOOP-18382. "Upgrade AWS SDK to V2 - Prerequisites" Contributed by Ahmar Suhail
…tial Providers. (#4973) The AWS SDKV2 upgrade log no longer warns about instantiation of the v1 SDK credential providers which are commonly used in s3a configurations: * com.amazonaws.auth.EnvironmentVariableCredentialsProvider * com.amazonaws.auth.EC2ContainerCredentialsProviderWrapper * com.amazonaws.auth.InstanceProfileCredentialsProvider When the hadoop-aws module moves to the v2 SDK, references to these credential providers will be rewritten to their v2 equivalents. Follow-on to HADOOP-18382. "Upgrade AWS SDK to V2 - Prerequisites" Contributed by Ahmar Suhail
…tial Providers. (apache#4973) The AWS SDKV2 upgrade log no longer warns about instantiation of the v1 SDK credential providers which are commonly used in s3a configurations: * com.amazonaws.auth.EnvironmentVariableCredentialsProvider * com.amazonaws.auth.EC2ContainerCredentialsProviderWrapper * com.amazonaws.auth.InstanceProfileCredentialsProvider When the hadoop-aws module moves to the v2 SDK, references to these credential providers will be rewritten to their v2 equivalents. Follow-on to HADOOP-18382. "Upgrade AWS SDK to V2 - Prerequisites" Contributed by Ahmar Suhail
Description of PR
JIRA
This PR prevents logging of V1 Credential provider warning for
EnvironmentCredentialsProvider.How was this patch tested?
Ran an integration test, checked what's logged. No warning logged for
EnvironmentCredentialsProvider, warning logged when I set cred provider ascom.amazonaws.auth.InstanceProfileCredentialsProvider