[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Aaron Fabbri updated HADOOP-15141: -- Resolution: Fixed Fix Version/s: 3.1.0 Status: Resolved (was: Patch Available) Committed to trunk. Thanks for the contribution [~ste...@apache.org]. > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran >Priority: Major > Fix For: 3.1.0 > > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch, > HADOOP-15141-003.patch, HADOOP-15141-004.patch, HADOOP-15141-005.patch, > HADOOP-15141-006.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Aaron Fabbri updated HADOOP-15141: -- Attachment: HADOOP-15141-006.patch > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran >Priority: Major > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch, > HADOOP-15141-003.patch, HADOOP-15141-004.patch, HADOOP-15141-005.patch, > HADOOP-15141-006.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Attachment: HADOOP-15141-005.patch Patch 005. Fixes typo and indentation. Not fixed: the 84 char wide lines; no real need Not fixed: use of deprecated SDK methods. I did start this but ended up staging the changes as it was getting far too convoluted. Instead of *a builder you configured* it moved to *a builder you had to configure with some other builder-instantiated class plus some some structures you created*. I'd got as far as having the two separate builders being done in parallel with some other objects before concluding that it was actually making the code worse in terms of readability and hence maintainability. The existing builder will create the other classes it needs in its .build() operation, so my stance is: let it do so. > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch, > HADOOP-15141-003.patch, HADOOP-15141-004.patch, HADOOP-15141-005.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Status: Patch Available (was: Open) > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch, > HADOOP-15141-003.patch, HADOOP-15141-004.patch, HADOOP-15141-005.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Status: Open (was: Patch Available) > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch, > HADOOP-15141-003.patch, HADOOP-15141-004.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Attachment: HADOOP-15141-004.patch Patch 004; wrap up all the tests that I can think of. Being able to restrict permissions in tests is interesting, as it means that given a role ARN with the normal R/W permissions, we could have tests which assume it but with a restricted policy, such as read only access, or RW to S3 but no DDB access to see what s3guard does. A test team could have fun here. * Tests for session names + stack trace to troubleshooting if an invalid string is passed in * added a test for a restrictive policy and expecting IO to fail. * factored out duplication in tests for a tighter set of tests, and then added a description for them all * Fixed S3AFS.toString() to not NPE when the FS is unintialized, and added a test for this regular regression. (Found during debugging) * improved error message on (getFileStatus "/") to include that path, as it was just including "" as the path, which is useless. Now you get {code} java.nio.file.AccessDeniedException: s3a://hwdev-steve-ireland-new/: getFileStatus on s3a://hwdev-steve-ireland-new/: com.amazonaws.services.s3.model.AmazonS3Exception: Access Denied (Service: Amazon S3; Status Code: 403; Error Code: AccessDenied; Request ID: F57E52775EF3A83F; S3 Extended Request ID: tUs++zZ9bzNeBhT3608lk44o74uSr/JPvJw+x2inFtHFCtzvPAi3RmVaZPbwQPVH0klquaYhs1c=), S3 Extended Request ID: tUs++zZ9bzNeBhT3608lk44o74uSr/JPvJw+x2inFtHFCtzvPAi3RmVaZPbwQPVH0klquaYhs1c=:AccessDenied at org.apache.hadoop.fs.s3a.S3AUtils.translateException(S3AUtils.java:215) {code} Tested: S3 ireland > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch, > HADOOP-15141-003.patch, HADOOP-15141-004.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Status: Patch Available (was: Open) > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch, > HADOOP-15141-003.patch, HADOOP-15141-004.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Attachment: HADOOP-15141-003.patch > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch, > HADOOP-15141-003.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Status: Open (was: Patch Available) > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Status: Patch Available (was: Open) > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Attachment: HADOOP-15141-002.patch HADOOP-15141 patch 002 * Tests are done, docs are done. * Exception reporting of errors during credential provider construction now runs through translateException() if the wrapped error is of the right class, this ensures that things an STS Auth failure is mapped up to an AccessDeniedException. Tests for this too. Tested the entire test suite withh everything set to use assumed roles, at -Dscale, -Ds3guard, -Ddynamodb, s3 ireland. Some tests broke because they didn't expect fs.s3a.aws.credentials.provider to be set in the default configuration (standard fix: unset the property). This is of course harmless in the default operations; it's just making sure it always stays like this. Ready for review now, I hope > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch, HADOOP-15141-002.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Status: Open (was: Patch Available) > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Description: Add the ability to use assumed roles in S3A * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role * add a new provider which grabs that and other properties and then creates a {{STSAssumeRoleSessionCredentialsProvider}} from it. * This also needs to support building up its own list of aws credential providers, from a different property; make the changes to S3AUtils for that * Tests * docs * and have the AwsProviderList forward closeable to it. * Get picked up automatically by DDB/s3guard was: Add the ability to use assumed roles in S3A * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role * add a new provider which grabs that and other properties and then creates a {{STSAssumeRoleSessionCredentialsProvider}} from it. * This also needs to support building up its own list of aws credential providers, from a different property; make the changes to S3AUtils for that * Tests * docs * and have the AwsProviderList forward closeable to it. > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. > * Get picked up automatically by DDB/s3guard -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Status: Patch Available (was: Open) TODO: * section in testing on this * any more tests people can think of/stack traces for troubleshooting > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org
[jira] [Updated] (HADOOP-15141) Support IAM Assumed roles in S3A
[ https://issues.apache.org/jira/browse/HADOOP-15141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Steve Loughran updated HADOOP-15141: Attachment: HADOOP-15141-001.patch Patch 001 * works with S3 ireland *from the IDE* * fails with "cant auth from root resource" from the CLI Assumption, some config issue with keys > Support IAM Assumed roles in S3A > > > Key: HADOOP-15141 > URL: https://issues.apache.org/jira/browse/HADOOP-15141 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3 >Affects Versions: 3.0.0 >Reporter: Steve Loughran >Assignee: Steve Loughran > Attachments: HADOOP-15141-001.patch > > > Add the ability to use assumed roles in S3A > * Add a property fs.s3a.assumed.role.arn for the ARN of the assumed role > * add a new provider which grabs that and other properties and then creates a > {{STSAssumeRoleSessionCredentialsProvider}} from it. > * This also needs to support building up its own list of aws credential > providers, from a different property; make the changes to S3AUtils for that > * Tests > * docs > * and have the AwsProviderList forward closeable to it. -- This message was sent by Atlassian JIRA (v6.4.14#64029) - To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org