|
@@ -23,7 +23,6 @@ import com.amazonaws.ClientConfiguration;
|
|
|
import com.amazonaws.Protocol;
|
|
|
import com.amazonaws.auth.AWSCredentials;
|
|
|
import com.amazonaws.auth.AWSCredentialsProvider;
|
|
|
-
|
|
|
import org.elasticsearch.common.settings.MockSecureSettings;
|
|
|
import org.elasticsearch.common.settings.Settings;
|
|
|
import org.elasticsearch.repositories.s3.S3Repository;
|
|
@@ -65,8 +64,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(AwsS3Service.SECRET_SETTING.getKey(), "aws_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "aws_key", "aws_secret");
|
|
|
- assertWarnings("[" + AwsS3Service.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(AwsS3Service.KEY_SETTING, AwsS3Service.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
public void testAWSCredentialsWithElasticsearchS3SettingsBackcompat() {
|
|
@@ -75,8 +73,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey(), "s3_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "s3_key", "s3_secret");
|
|
|
- assertWarnings("[" + AwsS3Service.CLOUD_S3.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(AwsS3Service.CLOUD_S3.KEY_SETTING, AwsS3Service.CLOUD_S3.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
public void testAWSCredentialsWithElasticsearchAwsAndS3SettingsBackcompat() {
|
|
@@ -87,10 +84,11 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey(), "s3_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "s3_key", "s3_secret");
|
|
|
- assertWarnings("[" + AwsS3Service.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.SECRET_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(
|
|
|
+ AwsS3Service.KEY_SETTING,
|
|
|
+ AwsS3Service.SECRET_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.KEY_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
public void testAWSCredentialsWithElasticsearchRepositoriesSettingsBackcompat() {
|
|
@@ -99,8 +97,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "repositories_key", "repositories_secret");
|
|
|
- assertWarnings("[" + S3Repository.Repositories.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + S3Repository.Repositories.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(S3Repository.Repositories.KEY_SETTING, S3Repository.Repositories.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
public void testAWSCredentialsWithElasticsearchAwsAndRepositoriesSettingsBackcompat() {
|
|
@@ -111,10 +108,11 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "repositories_key", "repositories_secret");
|
|
|
- assertWarnings("[" + AwsS3Service.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.SECRET_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + S3Repository.Repositories.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + S3Repository.Repositories.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(
|
|
|
+ AwsS3Service.KEY_SETTING,
|
|
|
+ AwsS3Service.SECRET_SETTING,
|
|
|
+ S3Repository.Repositories.KEY_SETTING,
|
|
|
+ S3Repository.Repositories.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
public void testAWSCredentialsWithElasticsearchAwsAndS3AndRepositoriesSettingsBackcompat() {
|
|
@@ -127,12 +125,13 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "repositories_key", "repositories_secret");
|
|
|
- assertWarnings("[" + AwsS3Service.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.SECRET_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + S3Repository.Repositories.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + S3Repository.Repositories.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(
|
|
|
+ AwsS3Service.KEY_SETTING,
|
|
|
+ AwsS3Service.SECRET_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.KEY_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.SECRET_SETTING,
|
|
|
+ S3Repository.Repositories.KEY_SETTING,
|
|
|
+ S3Repository.Repositories.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
public void testAWSCredentialsWithElasticsearchRepositoriesSettingsAndRepositorySettingsBackcompat() {
|
|
@@ -142,8 +141,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(repositorySettings, settings, "repository_key", "repository_secret");
|
|
|
- assertWarnings("[" + S3Repository.Repository.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + S3Repository.Repository.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(S3Repository.Repository.KEY_SETTING, S3Repository.Repository.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
public void testAWSCredentialsWithElasticsearchAwsAndRepositoriesSettingsAndRepositorySettingsBackcompat() {
|
|
@@ -155,8 +153,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(repositorySettings, settings, "repository_key", "repository_secret");
|
|
|
- assertWarnings("[" + S3Repository.Repository.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + S3Repository.Repository.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(S3Repository.Repository.KEY_SETTING, S3Repository.Repository.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
public void testAWSCredentialsWithElasticsearchAwsAndS3AndRepositoriesSettingsAndRepositorySettingsBackcompat() {
|
|
@@ -170,8 +167,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
|
|
|
.build();
|
|
|
launchAWSCredentialsWithElasticsearchSettingsTest(repositorySettings, settings, "repository_key", "repository_secret");
|
|
|
- assertWarnings("[" + S3Repository.Repository.KEY_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + S3Repository.Repository.SECRET_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(S3Repository.Repository.KEY_SETTING, S3Repository.Repository.SECRET_SETTING);
|
|
|
}
|
|
|
|
|
|
protected void launchAWSCredentialsWithElasticsearchSettingsTest(Settings singleRepositorySettings, Settings settings,
|
|
@@ -215,13 +211,14 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.build();
|
|
|
launchAWSConfigurationTest(settings, Settings.EMPTY, Protocol.HTTP, "aws_proxy_host", 8080, "aws_proxy_username",
|
|
|
"aws_proxy_password", "AWS3SignerType", 3, false, 10000);
|
|
|
- assertWarnings("[" + AwsS3Service.PROXY_USERNAME_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.PROXY_PASSWORD_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.PROTOCOL_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.PROXY_HOST_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.PROXY_PORT_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.SIGNER_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.READ_TIMEOUT.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(
|
|
|
+ AwsS3Service.PROXY_USERNAME_SETTING,
|
|
|
+ AwsS3Service.PROXY_PASSWORD_SETTING,
|
|
|
+ AwsS3Service.PROTOCOL_SETTING,
|
|
|
+ AwsS3Service.PROXY_HOST_SETTING,
|
|
|
+ AwsS3Service.PROXY_PORT_SETTING,
|
|
|
+ AwsS3Service.SIGNER_SETTING,
|
|
|
+ AwsS3Service.READ_TIMEOUT);
|
|
|
}
|
|
|
|
|
|
public void testAWSConfigurationWithAwsAndS3SettingsBackcompat() {
|
|
@@ -243,20 +240,21 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
.build();
|
|
|
launchAWSConfigurationTest(settings, Settings.EMPTY, Protocol.HTTPS, "s3_proxy_host", 8081, "s3_proxy_username",
|
|
|
"s3_proxy_password", "NoOpSignerType", 3, false, 10000);
|
|
|
- assertWarnings("[" + AwsS3Service.PROXY_USERNAME_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.PROXY_PASSWORD_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.PROTOCOL_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.PROXY_HOST_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.PROXY_PORT_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.SIGNER_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.READ_TIMEOUT.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.PROXY_USERNAME_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.PROXY_PASSWORD_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.PROTOCOL_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.PROXY_HOST_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.PROXY_PORT_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.SIGNER_SETTING.getKey() + "] setting was deprecated",
|
|
|
- "[" + AwsS3Service.CLOUD_S3.READ_TIMEOUT.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(
|
|
|
+ AwsS3Service.PROXY_USERNAME_SETTING,
|
|
|
+ AwsS3Service.PROXY_PASSWORD_SETTING,
|
|
|
+ AwsS3Service.PROTOCOL_SETTING,
|
|
|
+ AwsS3Service.PROXY_HOST_SETTING,
|
|
|
+ AwsS3Service.PROXY_PORT_SETTING,
|
|
|
+ AwsS3Service.SIGNER_SETTING,
|
|
|
+ AwsS3Service.READ_TIMEOUT,
|
|
|
+ AwsS3Service.CLOUD_S3.PROXY_USERNAME_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.PROXY_PASSWORD_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.PROTOCOL_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.PROXY_HOST_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.PROXY_PORT_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.SIGNER_SETTING,
|
|
|
+ AwsS3Service.CLOUD_S3.READ_TIMEOUT);
|
|
|
}
|
|
|
|
|
|
public void testGlobalMaxRetries() {
|
|
@@ -338,13 +336,13 @@ public class AwsS3ServiceImplTests extends ESTestCase {
|
|
|
public void testEndpointSettingBackcompat() {
|
|
|
assertEndpoint(generateRepositorySettings("repository_key", "repository_secret", "repository.endpoint", null),
|
|
|
Settings.EMPTY, "repository.endpoint");
|
|
|
- assertWarnings("[" + S3Repository.Repository.ENDPOINT_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(S3Repository.Repository.ENDPOINT_SETTING);
|
|
|
Settings settings = Settings.builder()
|
|
|
.put(S3Repository.Repositories.ENDPOINT_SETTING.getKey(), "repositories.endpoint")
|
|
|
.build();
|
|
|
assertEndpoint(generateRepositorySettings("repository_key", "repository_secret", null, null), settings,
|
|
|
"repositories.endpoint");
|
|
|
- assertWarnings("[" + S3Repository.Repositories.ENDPOINT_SETTING.getKey() + "] setting was deprecated");
|
|
|
+ assertSettingDeprecations(S3Repository.Repositories.ENDPOINT_SETTING);
|
|
|
}
|
|
|
|
|
|
private void assertEndpoint(Settings repositorySettings, Settings settings,
|