Details
-
Sub-task
-
Status: Resolved
-
Minor
-
Resolution: Fixed
-
2.8.0
-
None
-
Reviewed
-
Description
We've now got some fairly complex auth mechanisms going on: -hadoop config, KMS, env vars, "none". IF something isn't working, it's going to be a lot harder to debug.
Review and tune the S3A provider point
- add logging of what's going on in s3 auth to help debug problems
- make a whole chain of logins expressible
- allow the anonymous credentials to be included in the list
- review and updated documents.
I propose carefully adding some debug messages to identify which auth provider is doing the auth, so we can see if the env vars were kicking in, sysprops, etc.
What we mustn't do is leak any secrets: this should be identifying whether properties and env vars are set, not what their values are. I don't believe that this will generate a security risk.
Attachments
Attachments
Issue Links
- incorporates
-
HADOOP-13313 S3A TemporaryAWSCredentialsProvider to support Hadoop Credential providers for secrets
- Resolved
- is duplicated by
-
HADOOP-13319 S3A to list InstanceProfileCredentialsProvider after EnvironmentVariableCredentialsProvider
- Resolved
- is related to
-
HADOOP-14833 Remove s3a user:secret authentication
- Resolved