/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.nifi.processors.aws.credentials.provider.service; import java.util.ArrayList; import java.util.Collection; import java.util.Collections; import java.util.List; import java.util.Map; import org.apache.nifi.annotation.documentation.CapabilityDescription; import org.apache.nifi.annotation.documentation.Tags; import org.apache.nifi.annotation.lifecycle.OnEnabled; import org.apache.nifi.components.PropertyDescriptor; import org.apache.nifi.components.ValidationContext; import org.apache.nifi.components.ValidationResult; import org.apache.nifi.controller.AbstractControllerService; import org.apache.nifi.controller.ConfigurationContext; import org.apache.nifi.processor.exception.ProcessException; import org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors; import org.apache.nifi.processors.aws.credentials.provider.factory.CredentialsProviderFactory; import org.apache.nifi.reporting.InitializationException; import com.amazonaws.auth.AWSCredentialsProvider; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.ACCESS_KEY; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.ASSUME_ROLE_EXTERNAL_ID; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.ASSUME_ROLE_PROXY_PORT; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.ASSUME_ROLE_PROXY_HOST; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.CREDENTIALS_FILE; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.PROFILE_NAME; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.SECRET_KEY; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.USE_ANONYMOUS_CREDENTIALS; import static org.apache.nifi.processors.aws.credentials.provider.factory.CredentialPropertyDescriptors.USE_DEFAULT_CREDENTIALS; /** * Implementation of AWSCredentialsProviderService interface * * @see AWSCredentialsProviderService */ @CapabilityDescription("Defines credentials for Amazon Web Services processors. " + "Uses default credentials without configuration. " + "Default credentials support EC2 instance profile/role, default user profile, environment variables, etc. " + "Additional options include access key / secret key pairs, credentials file, named profile, and assume role credentials.") @Tags({ "aws", "credentials","provider" }) public class AWSCredentialsProviderControllerService extends AbstractControllerService implements AWSCredentialsProviderService { public static final PropertyDescriptor ASSUME_ROLE_ARN = CredentialPropertyDescriptors.ASSUME_ROLE_ARN; public static final PropertyDescriptor ASSUME_ROLE_NAME = CredentialPropertyDescriptors.ASSUME_ROLE_NAME; public static final PropertyDescriptor MAX_SESSION_TIME = CredentialPropertyDescriptors.MAX_SESSION_TIME; private static final List<PropertyDescriptor> properties; static { final List<PropertyDescriptor> props = new ArrayList<>(); props.add(USE_DEFAULT_CREDENTIALS); props.add(ACCESS_KEY); props.add(SECRET_KEY); props.add(CREDENTIALS_FILE); props.add(PROFILE_NAME); props.add(USE_ANONYMOUS_CREDENTIALS); props.add(ASSUME_ROLE_ARN); props.add(ASSUME_ROLE_NAME); props.add(MAX_SESSION_TIME); props.add(ASSUME_ROLE_EXTERNAL_ID); props.add(ASSUME_ROLE_PROXY_HOST); props.add(ASSUME_ROLE_PROXY_PORT); properties = Collections.unmodifiableList(props); } private volatile AWSCredentialsProvider credentialsProvider; protected final CredentialsProviderFactory credentialsProviderFactory = new CredentialsProviderFactory(); @Override protected List<PropertyDescriptor> getSupportedPropertyDescriptors() { return properties; } @Override public AWSCredentialsProvider getCredentialsProvider() throws ProcessException { return credentialsProvider; } @Override protected Collection<ValidationResult> customValidate(final ValidationContext validationContext) { final Collection<ValidationResult> validationFailureResults = credentialsProviderFactory.validate(validationContext); return validationFailureResults; } @OnEnabled public void onConfigured(final ConfigurationContext context) throws InitializationException { final Map<PropertyDescriptor, String> properties = context.getProperties(); credentialsProvider = credentialsProviderFactory.getCredentialsProvider(context.getProperties()); getLogger().debug("Using credentials provider: " + credentialsProvider.getClass()); } @Override public String toString() { return "AWSCredentialsProviderService[id=" + getIdentifier() + "]"; } }