|  | @@ -23,7 +23,6 @@ import com.amazonaws.ClientConfiguration;
 | 
	
		
			
				|  |  |  import com.amazonaws.Protocol;
 | 
	
		
			
				|  |  |  import com.amazonaws.auth.AWSCredentials;
 | 
	
		
			
				|  |  |  import com.amazonaws.auth.AWSCredentialsProvider;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  |  import org.elasticsearch.common.settings.MockSecureSettings;
 | 
	
		
			
				|  |  |  import org.elasticsearch.common.settings.Settings;
 | 
	
		
			
				|  |  |  import org.elasticsearch.repositories.s3.S3Repository;
 | 
	
	
		
			
				|  | @@ -65,8 +64,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(AwsS3Service.SECRET_SETTING.getKey(), "aws_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "aws_key", "aws_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + AwsS3Service.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(AwsS3Service.KEY_SETTING, AwsS3Service.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSCredentialsWithElasticsearchS3SettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -75,8 +73,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey(), "s3_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "s3_key", "s3_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + AwsS3Service.CLOUD_S3.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(AwsS3Service.CLOUD_S3.KEY_SETTING, AwsS3Service.CLOUD_S3.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSCredentialsWithElasticsearchAwsAndS3SettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -87,10 +84,11 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey(), "s3_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "s3_key", "s3_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + AwsS3Service.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.SECRET_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(
 | 
	
		
			
				|  |  | +                AwsS3Service.KEY_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.SECRET_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.KEY_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSCredentialsWithElasticsearchRepositoriesSettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -99,8 +97,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "repositories_key", "repositories_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + S3Repository.Repositories.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + S3Repository.Repositories.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(S3Repository.Repositories.KEY_SETTING, S3Repository.Repositories.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSCredentialsWithElasticsearchAwsAndRepositoriesSettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -111,10 +108,11 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "repositories_key", "repositories_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + AwsS3Service.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.SECRET_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + S3Repository.Repositories.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + S3Repository.Repositories.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(
 | 
	
		
			
				|  |  | +                AwsS3Service.KEY_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.SECRET_SETTING,
 | 
	
		
			
				|  |  | +                S3Repository.Repositories.KEY_SETTING,
 | 
	
		
			
				|  |  | +                S3Repository.Repositories.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSCredentialsWithElasticsearchAwsAndS3AndRepositoriesSettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -127,12 +125,13 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(Settings.EMPTY, settings, "repositories_key", "repositories_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + AwsS3Service.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.SECRET_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.SECRET_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + S3Repository.Repositories.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + S3Repository.Repositories.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(
 | 
	
		
			
				|  |  | +                AwsS3Service.KEY_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.SECRET_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.KEY_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.SECRET_SETTING,
 | 
	
		
			
				|  |  | +                S3Repository.Repositories.KEY_SETTING,
 | 
	
		
			
				|  |  | +                S3Repository.Repositories.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSCredentialsWithElasticsearchRepositoriesSettingsAndRepositorySettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -142,8 +141,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(repositorySettings, settings, "repository_key", "repository_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + S3Repository.Repository.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + S3Repository.Repository.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(S3Repository.Repository.KEY_SETTING, S3Repository.Repository.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSCredentialsWithElasticsearchAwsAndRepositoriesSettingsAndRepositorySettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -155,8 +153,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(repositorySettings, settings, "repository_key", "repository_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + S3Repository.Repository.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + S3Repository.Repository.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(S3Repository.Repository.KEY_SETTING, S3Repository.Repository.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSCredentialsWithElasticsearchAwsAndS3AndRepositoriesSettingsAndRepositorySettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -170,8 +167,7 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .put(S3Repository.Repositories.SECRET_SETTING.getKey(), "repositories_secret")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSCredentialsWithElasticsearchSettingsTest(repositorySettings, settings, "repository_key", "repository_secret");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + S3Repository.Repository.KEY_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + S3Repository.Repository.SECRET_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(S3Repository.Repository.KEY_SETTING, S3Repository.Repository.SECRET_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      protected void launchAWSCredentialsWithElasticsearchSettingsTest(Settings singleRepositorySettings, Settings settings,
 | 
	
	
		
			
				|  | @@ -215,13 +211,14 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSConfigurationTest(settings, Settings.EMPTY, Protocol.HTTP, "aws_proxy_host", 8080, "aws_proxy_username",
 | 
	
		
			
				|  |  |              "aws_proxy_password", "AWS3SignerType", 3, false, 10000);
 | 
	
		
			
				|  |  | -        assertWarnings("[" + AwsS3Service.PROXY_USERNAME_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.PROXY_PASSWORD_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.PROTOCOL_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.PROXY_HOST_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.PROXY_PORT_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.SIGNER_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.READ_TIMEOUT.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(
 | 
	
		
			
				|  |  | +                AwsS3Service.PROXY_USERNAME_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.PROXY_PASSWORD_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.PROTOCOL_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.PROXY_HOST_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.PROXY_PORT_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.SIGNER_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.READ_TIMEOUT);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testAWSConfigurationWithAwsAndS3SettingsBackcompat() {
 | 
	
	
		
			
				|  | @@ -243,20 +240,21 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          launchAWSConfigurationTest(settings, Settings.EMPTY, Protocol.HTTPS, "s3_proxy_host", 8081, "s3_proxy_username",
 | 
	
		
			
				|  |  |              "s3_proxy_password", "NoOpSignerType", 3, false, 10000);
 | 
	
		
			
				|  |  | -        assertWarnings("[" + AwsS3Service.PROXY_USERNAME_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.PROXY_PASSWORD_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.PROTOCOL_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.PROXY_HOST_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.PROXY_PORT_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.SIGNER_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.READ_TIMEOUT.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.PROXY_USERNAME_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.PROXY_PASSWORD_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.PROTOCOL_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.PROXY_HOST_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.PROXY_PORT_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.SIGNER_SETTING.getKey() + "] setting was deprecated",
 | 
	
		
			
				|  |  | -                       "[" + AwsS3Service.CLOUD_S3.READ_TIMEOUT.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(
 | 
	
		
			
				|  |  | +                AwsS3Service.PROXY_USERNAME_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.PROXY_PASSWORD_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.PROTOCOL_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.PROXY_HOST_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.PROXY_PORT_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.SIGNER_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.READ_TIMEOUT,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.PROXY_USERNAME_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.PROXY_PASSWORD_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.PROTOCOL_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.PROXY_HOST_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.PROXY_PORT_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.SIGNER_SETTING,
 | 
	
		
			
				|  |  | +                AwsS3Service.CLOUD_S3.READ_TIMEOUT);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      public void testGlobalMaxRetries() {
 | 
	
	
		
			
				|  | @@ -338,13 +336,13 @@ public class AwsS3ServiceImplTests extends ESTestCase {
 | 
	
		
			
				|  |  |      public void testEndpointSettingBackcompat() {
 | 
	
		
			
				|  |  |          assertEndpoint(generateRepositorySettings("repository_key", "repository_secret", "repository.endpoint", null),
 | 
	
		
			
				|  |  |              Settings.EMPTY, "repository.endpoint");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + S3Repository.Repository.ENDPOINT_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(S3Repository.Repository.ENDPOINT_SETTING);
 | 
	
		
			
				|  |  |          Settings settings = Settings.builder()
 | 
	
		
			
				|  |  |              .put(S3Repository.Repositories.ENDPOINT_SETTING.getKey(), "repositories.endpoint")
 | 
	
		
			
				|  |  |              .build();
 | 
	
		
			
				|  |  |          assertEndpoint(generateRepositorySettings("repository_key", "repository_secret", null, null), settings,
 | 
	
		
			
				|  |  |              "repositories.endpoint");
 | 
	
		
			
				|  |  | -        assertWarnings("[" + S3Repository.Repositories.ENDPOINT_SETTING.getKey() + "] setting was deprecated");
 | 
	
		
			
				|  |  | +        assertSettingDeprecations(S3Repository.Repositories.ENDPOINT_SETTING);
 | 
	
		
			
				|  |  |      }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |      private void assertEndpoint(Settings repositorySettings, Settings settings,
 |