Github user JPercivall commented on a diff in the pull request:

    https://github.com/apache/nifi/pull/1233#discussion_r88337395
  
    --- Diff: 
nifi-nar-bundles/nifi-elasticsearch-5-bundle/nifi-elasticsearch-5-processors/src/main/java/org/apache/nifi/processors/elasticsearch/AbstractElasticsearch5TransportClientProcessor.java
 ---
    @@ -0,0 +1,289 @@
    +/*
    + * Licensed to the Apache Software Foundation (ASF) under one or more
    + * contributor license agreements.  See the NOTICE file distributed with
    + * this work for additional information regarding copyright ownership.
    + * The ASF licenses this file to You under the Apache License, Version 2.0
    + * (the "License"); you may not use this file except in compliance with
    + * the License.  You may obtain a copy of the License at
    + *
    + *     http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +package org.apache.nifi.processors.elasticsearch;
    +
    +import org.apache.nifi.components.PropertyDescriptor;
    +import org.apache.nifi.components.ValidationResult;
    +import org.apache.nifi.components.Validator;
    +import org.apache.nifi.logging.ComponentLog;
    +import org.apache.nifi.processor.ProcessContext;
    +import org.apache.nifi.processor.exception.ProcessException;
    +import org.apache.nifi.processor.util.StandardValidators;
    +import org.apache.nifi.ssl.SSLContextService;
    +import org.apache.nifi.util.StringUtils;
    +import org.elasticsearch.client.Client;
    +import org.elasticsearch.client.transport.TransportClient;
    +import org.elasticsearch.common.settings.Settings;
    +import org.elasticsearch.common.transport.InetSocketTransportAddress;
    +import org.elasticsearch.transport.client.PreBuiltTransportClient;
    +
    +import java.lang.reflect.Constructor;
    +import java.lang.reflect.InvocationTargetException;
    +import java.lang.reflect.Method;
    +import java.net.InetSocketAddress;
    +import java.net.MalformedURLException;
    +import java.util.ArrayList;
    +import java.util.Arrays;
    +import java.util.HashMap;
    +import java.util.List;
    +import java.util.Map;
    +import java.util.concurrent.atomic.AtomicReference;
    +
    +
    +abstract class AbstractElasticsearch5TransportClientProcessor extends 
AbstractElasticsearch5Processor {
    +
    +    /**
    +     * This validator ensures the Elasticsearch hosts property is a valid 
list of hostname:port entries
    +     */
    +    private static final Validator HOSTNAME_PORT_VALIDATOR = (subject, 
input, context) -> {
    +        final List<String> esList = Arrays.asList(input.split(","));
    +        for (String hostnamePort : esList) {
    +            String[] addresses = hostnamePort.split(":");
    +            // Protect against invalid input like http://127.0.0.1:9300 
(URL scheme should not be there)
    +            if (addresses.length != 2) {
    +                return new 
ValidationResult.Builder().subject(subject).input(input).explanation(
    +                        "Must be in hostname:port form (no scheme such as 
http://";).valid(false).build();
    +            }
    +        }
    +        return new 
ValidationResult.Builder().subject(subject).input(input).explanation(
    +                "Valid cluster definition").valid(true).build();
    +    };
    +
    +    protected static final PropertyDescriptor CLUSTER_NAME = new 
PropertyDescriptor.Builder()
    +            .name("el5-cluster-name")
    +            .displayName("Cluster Name")
    +            .description("Name of the ES cluster (for example, 
elasticsearch_brew). Defaults to 'elasticsearch'")
    +            .required(true)
    +            .addValidator(StandardValidators.NON_EMPTY_VALIDATOR)
    +            .defaultValue("elasticsearch")
    +            .build();
    +
    +    protected static final PropertyDescriptor HOSTS = new 
PropertyDescriptor.Builder()
    +            .name("el5-hosts")
    +            .displayName("ElasticSearch Hosts")
    +            .description("ElasticSearch Hosts, which should be comma 
separated and colon for hostname/port "
    +                    + "host1:port,host2:port,....  For example 
testcluster:9300. This processor uses the Transport Client to "
    +                    + "connect to hosts. The default transport client port 
is 9300.")
    +            .required(true)
    +            .expressionLanguageSupported(false)
    +            .addValidator(HOSTNAME_PORT_VALIDATOR)
    +            .build();
    +
    +    public static final PropertyDescriptor PROP_XPACK_LOCATION = new 
PropertyDescriptor.Builder()
    +            .name("el5-xpack-location")
    +            .displayName("X-Pack Transport Location")
    +            .description("Specifies the path to the JAR(s) for the 
Elasticsearch X-Pack Transport feature. At a minimum, this must be a "
    +                    + "folder and/or comma-separated list of JARs that 
include x-pack-transport and x-pack-api JARs. "
    +                    + "If the Elasticsearch cluster has been secured with 
the X-Pack plugin, then the X-Pack Transport "
    +                    + "JARs must also be available to this processor. 
Note: Do NOT place the X-Pack JARs into NiFi's "
    +                    + "lib/ directory, doing so will prevent the X-Pack 
Transport JARs from being loaded.")
    +            .required(false)
    +            .addValidator(StandardValidators.NON_EMPTY_VALIDATOR)
    +            .dynamicallyModifiesClasspath(true)
    +            .build();
    +
    +    protected static final PropertyDescriptor PING_TIMEOUT = new 
PropertyDescriptor.Builder()
    +            .name("el5-ping-timeout")
    +            .displayName("ElasticSearch Ping Timeout")
    +            .description("The ping timeout used to determine when a node 
is unreachable. " +
    +                    "For example, 5s (5 seconds). If non-local recommended 
is 30s")
    +            .required(true)
    +            .defaultValue("5s")
    +            .addValidator(StandardValidators.NON_EMPTY_VALIDATOR)
    +            .build();
    +
    +    protected static final PropertyDescriptor SAMPLER_INTERVAL = new 
PropertyDescriptor.Builder()
    +            .name("el5-sampler-interval")
    +            .displayName("Sampler Interval")
    +            .description("How often to sample / ping the nodes listed and 
connected. For example, 5s (5 seconds). "
    +                    + "If non-local recommended is 30s.")
    +            .required(true)
    +            .defaultValue("5s")
    +            .addValidator(StandardValidators.NON_EMPTY_VALIDATOR)
    +            .build();
    +
    +    protected AtomicReference<Client> esClient = new AtomicReference<>();
    +    protected List<InetSocketAddress> esHosts;
    +
    +    /**
    +     * Instantiate ElasticSearch Client. This should be called by 
subclasses' @OnScheduled method to create a client
    +     * if one does not yet exist. If called when scheduled, closeClient() 
should be called by the subclasses' @OnStopped
    +     * method so the client will be destroyed when the processor is 
stopped.
    +     *
    +     * @param context The context for this processor
    +     * @throws ProcessException if an error occurs while creating an 
Elasticsearch client
    +     */
    +    @Override
    +    protected void createElasticsearchClient(ProcessContext context) 
throws ProcessException {
    +
    +        ComponentLog log = getLogger();
    +        if (esClient.get() != null) {
    +            return;
    +        }
    +
    +        log.debug("Creating ElasticSearch Client");
    +        try {
    +            final String clusterName = 
context.getProperty(CLUSTER_NAME).getValue();
    +            final String pingTimeout = 
context.getProperty(PING_TIMEOUT).getValue();
    +            final String samplerInterval = 
context.getProperty(SAMPLER_INTERVAL).getValue();
    +            final String username = 
context.getProperty(USERNAME).getValue();
    +            final String password = 
context.getProperty(PASSWORD).getValue();
    +
    +            final SSLContextService sslService =
    +                    
context.getProperty(PROP_SSL_CONTEXT_SERVICE).asControllerService(SSLContextService.class);
    +
    +            Settings.Builder settingsBuilder = Settings.builder()
    +                    .put("cluster.name", clusterName)
    +                    .put("client.transport.ping_timeout", pingTimeout)
    +                    .put("client.transport.nodes_sampler_interval", 
samplerInterval);
    +
    +            String xPackUrl = 
context.getProperty(PROP_XPACK_LOCATION).getValue();
    +            if (sslService != null) {
    +                
settingsBuilder.put("xpack.security.transport.ssl.enabled", "true")
    +                        .put("xpack.ssl.keystore.path", 
sslService.getKeyStoreFile())
    +                        .put("xpack.ssl.keystore.password", 
sslService.getKeyStorePassword())
    +                        .put("xpack.ssl.truststore.path", 
sslService.getTrustStoreFile())
    +                        .put("xpack.ssl.truststore.password", 
sslService.getTrustStorePassword());
    +            }
    +
    +            // Set username and password for X-Pack
    +            if (!StringUtils.isEmpty(username)) {
    +                StringBuffer secureUser = new StringBuffer(username);
    +                if (!StringUtils.isEmpty(password)) {
    +                    secureUser.append(":");
    +                    secureUser.append(password);
    +                }
    +                settingsBuilder.put("xpack.security.user", secureUser);
    +            }
    +
    +            final String hosts = context.getProperty(HOSTS).getValue();
    +            esHosts = getEsHosts(hosts);
    +            Client transportClient = getTransportClient(settingsBuilder, 
xPackUrl, username, password, esHosts, log);
    +            esClient.set(transportClient);
    +
    +        } catch (Exception e) {
    +            log.error("Failed to create Elasticsearch client due to {}", 
new Object[]{e}, e);
    +            throw new ProcessException(e);
    +        }
    +    }
    +
    +    protected Client getTransportClient(Settings.Builder settingsBuilder, 
String xPackPath,
    +                                        String username, String password,
    +                                        List<InetSocketAddress> esHosts, 
ComponentLog log)
    +            throws MalformedURLException {
    +
    +        // Map of headers
    +        Map<String, String> headers = new HashMap<>();
    +
    +        TransportClient transportClient = null;
    +
    +        // See if the Elasticsearch X-Pack JAR locations were specified, 
and create the
    +        // authorization token if username and password are supplied.
    +        if (!StringUtils.isBlank(xPackPath)) {
    +            ClassLoader xPackClassloader = 
Thread.currentThread().getContextClassLoader();
    +            try {
    +                // Get the plugin class
    +                Class xPackTransportClientClass = 
Class.forName("org.elasticsearch.xpack.client.PreBuiltXPackTransportClient", 
true, xPackClassloader);
    +                Constructor<?> ctor = 
xPackTransportClientClass.getConstructor(Settings.class, Class[].class);
    +
    +                if (!StringUtils.isEmpty(username) && 
!StringUtils.isEmpty(password)) {
    +
    +                    // Need a couple of classes from the X-Path Transport 
JAR to build the token
    +                    Class usernamePasswordTokenClass =
    +                            
Class.forName("org.elasticsearch.xpack.security.authc.support.UsernamePasswordToken",
 true, xPackClassloader);
    +
    +                    Class securedStringClass =
    +                            
Class.forName("org.elasticsearch.xpack.security.authc.support.SecuredString", 
true, xPackClassloader);
    +
    +                    Constructor<?> securedStringCtor = 
securedStringClass.getConstructor(char[].class);
    +                    Object securePasswordString = 
securedStringCtor.newInstance(password.toCharArray());
    +
    +                    Method basicAuthHeaderValue = 
usernamePasswordTokenClass.getMethod("basicAuthHeaderValue", String.class, 
securedStringClass);
    +                    String authToken = (String) 
basicAuthHeaderValue.invoke(null, username, securePasswordString);
    +                    if (authToken != null) {
    +                        headers.put("Authorization", authToken);
    +                    }
    +                    transportClient = (TransportClient) 
ctor.newInstance(settingsBuilder.build(), new Class[0]);
    +                }
    +            } catch (ClassNotFoundException
    +                    | NoSuchMethodException
    +                    | InstantiationException
    +                    | IllegalAccessException
    +                    | InvocationTargetException xPackLoadException) {
    +                throw new ProcessException("X-Pack plugin could not be 
loaded and/or configured", xPackLoadException);
    +            }
    +        } else {
    +            getLogger().debug("No X-Pack Transport location specified, 
secure connections and/or authorization will not be available");
    +        }
    +        // If transportClient is null, either the processor is not 
configured for secure connections or there is a problem with config
    +        // (which is logged), so continue with a non-secure client
    +        if (transportClient == null) {
    +            transportClient = new 
PreBuiltTransportClient(settingsBuilder.build());
    --- End diff --
    
    If the processor is configured to run securely and it fails, why would we 
proceed to create an unsecure client? Seems like it would very easily lead to 
confounding errors.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---

Reply via email to