Skip to content

Commit 55e0390

Browse files
committed
Merge remote-tracking branch 'upstream/feature/repository-s3-sdk-v2-upgrade' into 2025/03/18/repository-s3-sdk-v2
2 parents 953bf7a + e697438 commit 55e0390

File tree

6 files changed

+50
-99
lines changed

6 files changed

+50
-99
lines changed

modules/repository-s3/qa/web-identity-token/src/test/java/org/elasticsearch/repositories/s3/CustomWebIdentityTokenCredentialsProviderTests.java

-30
Original file line numberDiff line numberDiff line change
@@ -227,34 +227,4 @@ public void testPickUpNewWebIdentityTokenWhenItsChanged() throws Exception {
227227
httpServer.stop(0);
228228
}
229229
}
230-
231-
public void testSupportRegionalizedEndpoints() throws Exception {
232-
Map<String, String> environmentVariables = Map.of(
233-
"AWS_WEB_IDENTITY_TOKEN_FILE",
234-
"/var/run/secrets/eks.amazonaws.com/serviceaccount/token",
235-
"AWS_ROLE_ARN",
236-
ROLE_ARN,
237-
"AWS_STS_REGIONAL_ENDPOINTS",
238-
"regional",
239-
"AWS_REGION",
240-
"us-west-2"
241-
);
242-
Map<String, String> systemProperties = Map.of();
243-
244-
var webIdentityTokenCredentialsProvider = new S3Service.CustomWebIdentityTokenCredentialsProvider(
245-
getEnvironment(),
246-
environmentVariables::get,
247-
systemProperties::getOrDefault,
248-
Clock.systemUTC(),
249-
resourceWatcherService
250-
);
251-
// We can't verify that webIdentityTokenCredentialsProvider's STS client uses the "https://sts.us-west-2.amazonaws.com"
252-
// endpoint in a unit test. The client depends on hardcoded RegionalEndpointsOptionResolver that in turn depends
253-
// on the system environment that we can't change in the test. So we just verify we that we called `withRegion`
254-
// on stsClientBuilder which should internally correctly configure the endpoint when the STS client is built.
255-
// TODO NOMERGE: can't access region anymore, need to rethink this.
256-
// assertEquals("us-west-2", webIdentityTokenCredentialsProvider.getStsRegion());
257-
258-
webIdentityTokenCredentialsProvider.close();
259-
}
260230
}

modules/repository-s3/src/internalClusterTest/java/org/elasticsearch/repositories/s3/S3BlobStoreRepositoryTests.java

-2
Original file line numberDiff line numberDiff line change
@@ -505,7 +505,6 @@ public void testMultipartUploadCleanup() {
505505
.bucket(blobStore.bucket())
506506
.key(blobStore.blobContainer(repository.basePath().add("test-multipart-upload")).path().buildAsString() + danglingBlobName)
507507
.overrideConfiguration(
508-
// NOMERGE: check this conversion makes sense.
509508
AwsRequestOverrideConfiguration.builder()
510509
.putRawQueryParameter(S3BlobStore.CUSTOM_QUERY_PARAMETER_PURPOSE, OperationPurpose.SNAPSHOT_DATA.getKey())
511510
.build()
@@ -518,7 +517,6 @@ public void testMultipartUploadCleanup() {
518517
.bucket(blobStore.bucket())
519518
.prefix(repository.basePath().buildAsString())
520519
.overrideConfiguration(
521-
// NOMERGE: check this conversion makes sense.
522520
AwsRequestOverrideConfiguration.builder()
523521
.putRawQueryParameter(S3BlobStore.CUSTOM_QUERY_PARAMETER_PURPOSE, OperationPurpose.SNAPSHOT_DATA.getKey())
524522
.build()

modules/repository-s3/src/main/java/org/elasticsearch/repositories/s3/S3Service.java

+6-14
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,6 @@ S3Client buildClient(final S3ClientSettings clientSettings, SdkHttpClient httpCl
234234
}
235235

236236
protected S3ClientBuilder buildClientBuilder(S3ClientSettings clientSettings, SdkHttpClient httpClient) {
237-
// TODO NOMERGE ensure this has all the same config features as the v1 SDK
238237
var s3clientBuilder = S3Client.builder();
239238
s3clientBuilder.httpClient(httpClient);
240239
s3clientBuilder.overrideConfiguration(buildConfiguration(clientSettings, isStateless));
@@ -297,6 +296,7 @@ DnsResolver getCustomDnsResolver() {
297296
static SdkHttpClient buildHttpClient(S3ClientSettings clientSettings, @Nullable /* to use default resolver */ DnsResolver dnsResolver) {
298297
ApacheHttpClient.Builder httpClientBuilder = ApacheHttpClient.builder();
299298

299+
// TODO NOMERGE: an IT test for maxConnections?
300300
httpClientBuilder.maxConnections(clientSettings.maxConnections);
301301
httpClientBuilder.socketTimeout(Duration.ofMillis(clientSettings.readTimeoutMillis));
302302

@@ -313,7 +313,7 @@ static SdkHttpClient buildHttpClient(S3ClientSettings clientSettings, @Nullable
313313
}
314314

315315
// TODO NOMERGE naming
316-
static boolean RETRYABLE_403_RETRY_PREDICATE(Throwable e) {
316+
static boolean RETRYABLE_403_PREDICATE(Throwable e) {
317317
if (e instanceof AwsServiceException ase) {
318318
return ase.statusCode() == RestStatus.FORBIDDEN.getStatus() && "InvalidAccessKeyId".equals(ase.awsErrorDetails().errorCode());
319319
}
@@ -330,7 +330,7 @@ static ClientOverrideConfiguration buildConfiguration(S3ClientSettings clientSet
330330
// Create a 403 error retryable policy. In serverless we sometimes get 403s during because of delays in propagating updated
331331
// credentials because IAM is not strongly consistent.
332332
// TODO NOMERGE this should be covered by some end-to-end test, and documented more accurately
333-
retryStrategyBuilder.retryOnException(S3Service::RETRYABLE_403_RETRY_PREDICATE);
333+
retryStrategyBuilder.retryOnException(S3Service::RETRYABLE_403_PREDICATE);
334334
}
335335
clientOverrideConfiguration.retryStrategy(retryStrategyBuilder.build());
336336
return clientOverrideConfiguration.build();
@@ -480,8 +480,6 @@ public CompletableFuture<? extends AwsCredentialsIdentity> resolveIdentity() {
480480
*/
481481
static class CustomWebIdentityTokenCredentialsProvider implements AwsCredentialsProvider {
482482

483-
private static final String STS_HOSTNAME = "https://sts.amazonaws.com";
484-
485483
static final String WEB_IDENTITY_TOKEN_FILE_LOCATION = "repository-s3/aws-web-identity-token-file";
486484

487485
private StsWebIdentityTokenFileCredentialsProvider credentialsProvider;
@@ -537,6 +535,8 @@ static class CustomWebIdentityTokenCredentialsProvider implements AwsCredentials
537535
);
538536

539537
{
538+
// TODO NOMERGE: is there any testing we need to add for this? We used to have a unit test that verified the regional stuff,
539+
// but we're using this endpoint override instead of region now.
540540
final var securityTokenServiceClientBuilder = StsClient.builder();
541541
final var endpointOverride = jvmEnvironment.getProperty("org.elasticsearch.repositories.s3.stsEndpointOverride", null);
542542
if (endpointOverride != null) {
@@ -694,17 +694,9 @@ public CompletableFuture<? extends AwsCredentialsIdentity> resolveIdentity(Consu
694694
return SocketAccess.doPrivileged(() -> delegate.resolveIdentity(consumer).handle(this::resultHandler));
695695
}
696696

697-
// TODO NOMERGE: I changed this so I could test successfully that a log message occurs.
698-
// resultHandler doesn't appear to be invoked. I'm not sure how the original code works (haven't looked yet).
699697
@Override
700698
public CompletableFuture<? extends AwsCredentialsIdentity> resolveIdentity() {
701-
try {
702-
return SocketAccess.doPrivileged(() -> delegate.resolveIdentity());
703-
} catch (Exception e) {
704-
logger.error(() -> "Unable to resolve identity from " + delegate, e);
705-
throw e;
706-
}
707-
// return SocketAccess.doPrivileged(() -> delegate.resolveIdentity().handle(this::resultHandler));
699+
return SocketAccess.doPrivileged(() -> delegate.resolveIdentity().handle(this::resultHandler));
708700
}
709701

710702
@Override

modules/repository-s3/src/test/java/org/elasticsearch/repositories/s3/AwsS3ServiceImplTests.java

+37-10
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,21 @@
1717
import software.amazon.awssdk.auth.credentials.StaticCredentialsProvider;
1818
import software.amazon.awssdk.core.client.config.ClientOverrideConfiguration;
1919
import software.amazon.awssdk.identity.spi.AwsCredentialsIdentity;
20+
import software.amazon.awssdk.regions.Region;
2021

2122
import org.apache.logging.log4j.Logger;
2223
import org.apache.logging.log4j.util.Supplier;
24+
import org.elasticsearch.cluster.metadata.RepositoryMetadata;
2325
import org.elasticsearch.common.settings.MockSecureSettings;
2426
import org.elasticsearch.common.settings.Settings;
27+
import org.elasticsearch.env.Environment;
2528
import org.elasticsearch.test.ESTestCase;
29+
import org.elasticsearch.watcher.ResourceWatcherService;
2630
import org.mockito.ArgumentCaptor;
2731
import org.mockito.Mockito;
2832
import org.mockito.stubbing.Answer;
2933

34+
import java.io.IOException;
3035
import java.util.Locale;
3136
import java.util.Map;
3237
import java.util.concurrent.CompletableFuture;
@@ -36,6 +41,7 @@
3641
import static org.hamcrest.Matchers.instanceOf;
3742
import static org.hamcrest.Matchers.is;
3843
import static org.hamcrest.Matchers.startsWith;
44+
import static org.mockito.Mockito.mock;
3945

4046
public class AwsS3ServiceImplTests extends ESTestCase {
4147

@@ -173,7 +179,7 @@ public void testAWSDefaultConfiguration() {
173179
);
174180
}
175181

176-
public void testAWSConfigurationWithAwsSettings() {
182+
public void testAwsConfigurationWithAwsSettings() {
177183
final MockSecureSettings secureSettings = new MockSecureSettings();
178184
secureSettings.setString("s3.client.default.proxy.username", "aws_proxy_username");
179185
secureSettings.setString("s3.client.default.proxy.password", "aws_proxy_password");
@@ -193,7 +199,6 @@ public void testRepositoryMaxRetries() {
193199
launchAWSConfigurationTest(settings, null, -1, null, null, null, 5, 50000);
194200
}
195201

196-
// TODO NOMERGE unused params
197202
private void launchAWSConfigurationTest(
198203
Settings settings,
199204
String expectedProxyHost,
@@ -218,9 +223,6 @@ private void launchAWSConfigurationTest(
218223

219224
final ClientOverrideConfiguration configuration = S3Service.buildConfiguration(clientSettings, false);
220225
assertThat(configuration.retryStrategy().get().maxAttempts(), is(expectedMaxRetries + 1));
221-
222-
// TODO NOMERGE: consider whether this needs to be tested elsewhere.
223-
// assertThat(configuration.getSocketTimeout(), is(expectedReadTimeout)); // set on the httpClient
224226
}
225227

226228
public void testEndpointSetting() {
@@ -234,6 +236,28 @@ private void assertEndpoint(Settings repositorySettings, Settings settings, Stri
234236
assertThat(clientSettings.endpoint, is(expectedEndpoint));
235237
}
236238

239+
public void testEndPointAndRegionOverrides() throws IOException {
240+
try (
241+
S3Service s3Service = new S3Service(
242+
mock(Environment.class),
243+
Settings.EMPTY,
244+
mock(ResourceWatcherService.class),
245+
() -> Region.of("es-test-region")
246+
)
247+
) {
248+
s3Service.start();
249+
final String endpointOverride = "http://first";
250+
final Settings settings = Settings.builder().put("endpoint", endpointOverride).build();
251+
final AmazonS3Reference reference = s3Service.client(new RepositoryMetadata("first", "s3", settings));
252+
253+
assertEquals(endpointOverride, reference.client().serviceClientConfiguration().endpointOverride().get().toString());
254+
assertEquals("es-test-region", reference.client().serviceClientConfiguration().region().toString());
255+
256+
reference.close();
257+
s3Service.doClose();
258+
}
259+
}
260+
237261
public void testLoggingCredentialsProviderCatchesErrorsOnResolveCredentials() {
238262
var mockProvider = Mockito.mock(AwsCredentialsProvider.class);
239263
String mockProviderErrorMessage = "mockProvider failed to generate credentials";
@@ -253,17 +277,20 @@ public void testLoggingCredentialsProviderCatchesErrorsOnResolveCredentials() {
253277
}
254278

255279
public void testLoggingCredentialsProviderCatchesErrorsOnResolveIdentity() {
256-
// Set up #resolveIdentity() to throw a fake exception.
280+
// Set up #resolveIdentity() to return a future with an exception.
257281
var mockCredentialsProvider = Mockito.mock(AwsCredentialsProvider.class);
258282
String mockProviderErrorMessage = "mockProvider failed to generate credentials";
259-
Mockito.when(mockCredentialsProvider.resolveIdentity()).thenThrow(new IllegalStateException(mockProviderErrorMessage));
260-
283+
Answer<CompletableFuture<? extends AwsCredentialsIdentity>> answer = invocation -> {
284+
CompletableFuture<AwsCredentialsIdentity> future = new CompletableFuture<>();
285+
future.completeExceptionally(new IllegalStateException(mockProviderErrorMessage));
286+
return future;
287+
};
288+
Mockito.when(mockCredentialsProvider.resolveIdentity()).thenAnswer(answer);
261289
var mockLogger = Mockito.mock(Logger.class);
262290
var credentialsProvider = new S3Service.ErrorLoggingCredentialsProvider(mockCredentialsProvider, mockLogger);
263291

264292
// The S3Service.ErrorLoggingCredentialsProvider should log the error.
265-
var exception = expectThrows(IllegalStateException.class, credentialsProvider::resolveIdentity);
266-
assertEquals(mockProviderErrorMessage, exception.getMessage());
293+
credentialsProvider.resolveIdentity();
267294

268295
var messageSupplierCaptor = ArgumentCaptor.forClass(Supplier.class);
269296
var throwableCaptor = ArgumentCaptor.forClass(Throwable.class);

modules/repository-s3/src/test/java/org/elasticsearch/repositories/s3/S3ClientSettingsTests.java

-17
Original file line numberDiff line numberDiff line change
@@ -209,22 +209,5 @@ public void testMaxConnectionsCanBeSet() {
209209

210210
// the default appears in the docs so let's make sure it doesn't change:
211211
assertEquals(50, S3ClientSettings.Defaults.MAX_CONNECTIONS);
212-
213-
// TODO NOMERGE: max connection setting is no longer available. Need alternative testing.
214-
/*
215-
SdkHttpClient defaultHttpClient = S3Service.buildHttpClient(settings.get("default"));
216-
assertThat(defaultHttpClient.getMaxConnections(), is(S3ClientSettings.Defaults.MAX_CONNECTIONS));
217-
SdkHttpClient otherHttpClient = S3Service.buildHttpClient(settings.get("other"));
218-
assertThat(otherHttpClient.getMaxConnections(), is(maxConnections));
219-
*/
220-
}
221-
222-
/*
223-
// TODO NOMERGE: retryability is no longer testable via unit test: policy is not accessible. Need alternative testing.
224-
public void testStatelessDefaultRetryPolicy() {
225-
final var s3ClientSettings = S3ClientSettings.load(Settings.EMPTY).get("default");
226-
final var clientConfiguration = S3Service.buildConfiguration(s3ClientSettings, true);
227-
assertThat(clientConfiguration.getRetryPolicy(), is(S3Service.RETRYABLE_403_RETRY_POLICY));
228212
}
229-
*/
230213
}

modules/repository-s3/src/test/java/org/elasticsearch/repositories/s3/S3ServiceTests.java

+7-26
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,6 @@
3131
import java.io.IOException;
3232
import java.util.concurrent.atomic.AtomicBoolean;
3333

34-
import static org.hamcrest.CoreMatchers.equalTo;
3534
import static org.mockito.Mockito.mock;
3635

3736
public class S3ServiceTests extends ESTestCase {
@@ -44,19 +43,13 @@ public void testCachedClientsAreReleased() throws IOException {
4443
() -> Region.of("es-test-region")
4544
);
4645
s3Service.start();
47-
final String endpointOverride = "http://first";
48-
final Settings settings = Settings.builder().put("endpoint", endpointOverride).build();
46+
final Settings settings = Settings.builder().put("endpoint", "http://first").build();
4947
final RepositoryMetadata metadata1 = new RepositoryMetadata("first", "s3", settings);
5048
final RepositoryMetadata metadata2 = new RepositoryMetadata("second", "s3", settings);
5149
final S3ClientSettings clientSettings = s3Service.settings(metadata2);
5250
final S3ClientSettings otherClientSettings = s3Service.settings(metadata2);
5351
assertSame(clientSettings, otherClientSettings);
5452
final AmazonS3Reference reference = s3Service.client(metadata1);
55-
56-
// TODO NOMERGE: move to its own test.
57-
assertEquals(endpointOverride, reference.client().serviceClientConfiguration().endpointOverride().get().toString());
58-
assertEquals("es-test-region", reference.client().serviceClientConfiguration().region().toString());
59-
6053
reference.close();
6154
s3Service.doClose();
6255
final AmazonS3Reference referenceReloaded = s3Service.client(metadata1);
@@ -83,28 +76,16 @@ public void testRetryOn403RetryPolicy() {
8376

8477
// The retryable 403 condition retries on 403 invalid access key id
8578
assertTrue(
86-
S3Service.RETRYABLE_403_RETRY_PREDICATE(
79+
S3Service.RETRYABLE_403_PREDICATE(
8780
RetryPolicyContext.builder().retriesAttempted(between(0, 9)).exception(s3Exception).build().exception()
8881
)
8982
);
9083

91-
if (randomBoolean()) {
92-
// Random for another error status that is not 403
93-
var non403StatusCode = randomValueOtherThan(403, () -> between(0, 600));
94-
var non403Exception = S3Exception.builder().statusCode(non403StatusCode).awsErrorDetails(awsErrorDetails).build();
95-
var retryPolicyContext = RetryPolicyContext.builder().retriesAttempted(between(0, 9)).exception(non403Exception).build();
96-
// Retryable 403 condition delegates to the AWS default retry condition. Its result must be consistent with the decision
97-
// by the AWS default, e.g. some error status like 429 is retryable by default, the retryable 403 condition respects it.
98-
boolean actual = S3Service.RETRYABLE_403_RETRY_PREDICATE(retryPolicyContext.exception());
99-
boolean expected = RetryCondition.defaultRetryCondition().shouldRetry(retryPolicyContext);
100-
assertThat(actual, equalTo(expected));
101-
} else {
102-
// Not retry for 403 with error code that is not invalid access key id
103-
String errorCode = randomAlphaOfLength(10);
104-
var exception = S3Exception.builder().awsErrorDetails(AwsErrorDetails.builder().errorCode(errorCode).build()).build();
105-
var retryPolicyContext = RetryPolicyContext.builder().retriesAttempted(between(0, 9)).exception(exception).build();
106-
assertFalse(S3Service.RETRYABLE_403_RETRY_PREDICATE(retryPolicyContext.exception()));
107-
}
84+
// Not retry for 403 with error code that is not invalid access key id
85+
String errorCode = randomAlphaOfLength(10);
86+
var exception = S3Exception.builder().awsErrorDetails(AwsErrorDetails.builder().errorCode(errorCode).build()).build();
87+
var retryPolicyContext = RetryPolicyContext.builder().retriesAttempted(between(0, 9)).exception(exception).build();
88+
assertFalse(S3Service.RETRYABLE_403_PREDICATE(retryPolicyContext.exception()));
10889
}
10990

11091
@TestLogging(reason = "testing WARN log output", value = "org.elasticsearch.repositories.s3.S3Service:WARN")

0 commit comments

Comments
 (0)