[jira] Created: (HADOOP-6842) "hadoop fs -text" does not give a useful text representation of MapWritable objects

2010-06-25 Thread Steven Wong (JIRA)
"hadoop fs -text" does not give a useful text representation of MapWritable 
objects
---

 Key: HADOOP-6842
 URL: https://issues.apache.org/jira/browse/HADOOP-6842
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 0.20.0
Reporter: Steven Wong


If a sequence file contains MapWritable objects, running "hadoop fs -text" on 
the file prints the following for each MapWritable:

org.apache.hadoop.io.mapwrita...@4f8235ed

To be more useful, it should print out the contents of the map instead. This 
can be done by adding a toString method to MapWritable, i.e. something like:

public String toString() {
return (new TreeMap(instance)).toString();
}


-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] [Created] (HADOOP-12723) S3A: Add ability to plug in any AWSCredentialsProvider

2016-01-20 Thread Steven Wong (JIRA)
Steven Wong created HADOOP-12723:


 Summary: S3A: Add ability to plug in any AWSCredentialsProvider
 Key: HADOOP-12723
 URL: https://issues.apache.org/jira/browse/HADOOP-12723
 Project: Hadoop Common
  Issue Type: New Feature
  Components: fs/s3
Affects Versions: 2.7.1
Reporter: Steven Wong
Assignee: Steven Wong


Although S3A currently has built-in support for 
{{org.apache.hadoop.fs.s3a.BasicAWSCredentialsProvider.BasicAWSCredentialsProvider}},
 
{{com.amazonaws.auth.InstanceProfileCredentialsProvider.InstanceProfileCredentialsProvider}},
 and 
{{org.apache.hadoop.fs.s3a.AnonymousAWSCredentialsProvider.AnonymousAWSCredentialsProvider}},
 it does not support any other credentials provider that implements the 
{{com.amazonaws.auth.AWSCredentialsProvider}} interface. Supporting the ability 
to plug in any {{com.amazonaws.auth.AWSCredentialsProvider}} instance will 
expand the options for S3 credentials, such as:

* temporary credentials from STS, e.g. via 
{{com.amazonaws.auth.STSSessionCredentialsProvider}}
* IAM role-based credentials, e.g. via 
{{com.amazonaws.auth.STSAssumeRoleSessionCredentialsProvider}}
* a custom credentials provider that satisfies one's own needs, e.g. 
bucket-specific credentials, user-specific credentials, etc.

To support this, we can add a configuration for the fully qualified class name 
of a credentials provider, to be loaded by {{S3AFileSystem.initialize}} and 
added to its credentials provider chain.

The configured credentials provider should implement 
{{com.amazonaws.auth.AWSCredentialsProvider}} and have a constructor that 
accepts {{(URI name, Configuration conf)}}.





--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (HADOOP-13012) yetus-wrapper should fail sooner when download fails

2016-04-09 Thread Steven Wong (JIRA)
Steven Wong created HADOOP-13012:


 Summary: yetus-wrapper should fail sooner when download fails
 Key: HADOOP-13012
 URL: https://issues.apache.org/jira/browse/HADOOP-13012
 Project: Hadoop Common
  Issue Type: Bug
  Components: yetus
Reporter: Steven Wong
Assignee: Steven Wong
Priority: Minor


When yetus-wrapper cannot download the Yetus tarball (because the download 
server is down, for example), currently it fails during the later gunzip step. 
It's better if it fails right away during the download (curl) step.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)