com.amazon.redshift.core.PluginProfilesConfigFile Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of redshift-jdbc42 Show documentation
Show all versions of redshift-jdbc42 Show documentation
Java JDBC 4.2 (JRE 8+) driver for Redshift database
package com.amazon.redshift.core;
import java.util.Date;
import java.util.Locale;
import java.util.Map;
import java.util.Set;
import java.util.concurrent.ConcurrentHashMap;
import com.amazonaws.SdkClientException;
import com.amazonaws.auth.AWSCredentials;
import com.amazonaws.auth.AWSCredentialsProvider;
import com.amazonaws.auth.AWSSessionCredentials;
import com.amazonaws.auth.AWSStaticCredentialsProvider;
import com.amazonaws.auth.BasicSessionCredentials;
import com.amazonaws.auth.ProcessCredentialsProvider;
import com.amazonaws.auth.profile.ProfilesConfigFile;
import com.amazonaws.auth.profile.internal.BasicProfile;
import com.amazonaws.auth.profile.internal.ProfileStaticCredentialsProvider;
import com.amazonaws.services.securitytoken.AWSSecurityTokenService;
import com.amazonaws.services.securitytoken.AWSSecurityTokenServiceClientBuilder;
import com.amazonaws.services.securitytoken.model.AssumeRoleRequest;
import com.amazonaws.services.securitytoken.model.AssumeRoleResult;
import com.amazonaws.services.securitytoken.model.Credentials;
import com.amazonaws.util.StringUtils;
import com.amazon.redshift.CredentialsHolder;
import com.amazon.redshift.IPlugin;
import com.amazon.redshift.RedshiftProperty;
import com.amazon.redshift.logger.RedshiftLogger;
import com.amazon.redshift.plugin.utils.RequestUtils;
public class PluginProfilesConfigFile extends ProfilesConfigFile
{
private Map cache = new ConcurrentHashMap();
private RedshiftJDBCSettings m_settings;
private RedshiftLogger m_log;
private static final String PROFILE_PREFIX = "profile ";
public PluginProfilesConfigFile(RedshiftJDBCSettings settings, RedshiftLogger log)
{
m_settings = settings;
m_log = log;
}
/**
* Returns the AWS credentials for the specified profile.
*/
public CredentialsHolder getCredentials(String profileName)
{
CredentialsHolder credentials = cache.get(profileName);
if (credentials == null)
{
// in case if profile is in ~/.aws/config file, check for 'profile ' prefix
credentials = cache.get(PROFILE_PREFIX+profileName);
}
if (credentials != null && !credentials.isExpired())
{
if(RedshiftLogger.isEnable()) {
Date now = new Date();
m_log.logInfo(now + ": Using existing entry for PluginProfilesConfigFile.getCredentials cache with expiration " + credentials.getExpiration());
}
return credentials;
}
Map map = getAllBasicProfiles();
if(RedshiftLogger.isEnable()) {
Set profiles = map.keySet();
m_log.logInfo("profiles:" + profiles.toString());
}
BasicProfile profile = map.get(profileName);
if (profile == null)
{
// in case if profile is in ~/.aws/config file, check for 'profile ' prefix
profile = map.get(PROFILE_PREFIX+profileName);
}
if (profile == null)
{
throw new SdkClientException("No AWS profile named '" + profileName + "'");
}
if (profile.isRoleBasedProfile())
{
String srcProfile = profile.getRoleSourceProfile();
if (StringUtils.isNullOrEmpty(srcProfile))
{
throw new SdkClientException("Unable to load credentials from role based profile [" + profileName + "]: Source profile name is not specified");
}
CredentialsHolder srcCred = getCredentials(srcProfile);
AWSCredentialsProvider provider = new AWSStaticCredentialsProvider(srcCred);
credentials = assumeRole(profile, provider);
credentials.setMetadata(srcCred.getMetadata());
cache.put(profileName, credentials);
if(RedshiftLogger.isEnable()) {
Date now = new Date();
m_log.logInfo(now + ": Adding new role based entry for PluginProfilesConfigFile.getCredentials cache with expiration " + credentials.getExpiration());
}
return credentials;
}
String dbUser = null;
String autoCreate = null;
String dbGroups = null;
String forceLowercase = null;
String pluginName = profile.getPropertyValue("plugin_name");
if (!StringUtils.isNullOrEmpty(pluginName))
{
try
{
Class extends AWSCredentialsProvider> clazz =
(Class.forName(pluginName).asSubclass(AWSCredentialsProvider.class));
AWSCredentialsProvider p = clazz.newInstance();
if (p instanceof IPlugin)
{
IPlugin plugin = (IPlugin)p;
plugin.setLogger(m_log);
Map prop = profile.getProperties();
for (Map.Entry entry : prop.entrySet())
{
String key = entry.getKey().toLowerCase(Locale.getDefault());
if (!"plugin_name".equals(key))
{
String value = entry.getValue();
plugin.addParameter(key, value);
// DbUser value in connection string
if (RedshiftProperty.DB_USER.getName().equalsIgnoreCase(key))
{
dbUser = value;
}
else if (RedshiftProperty.DB_GROUPS.getName().equalsIgnoreCase(key))
{
dbGroups = value;
}
else if (RedshiftProperty.FORCE_LOWERCASE.getName().equalsIgnoreCase(key))
{
forceLowercase = value;
}
else if (RedshiftProperty.USER_AUTOCREATE.getName().equalsIgnoreCase(key))
{
autoCreate = value;
}
}
}
// Add parameters from URL to plugin, override parameters from profile
for (Map.Entry entry : m_settings.m_pluginArgs.entrySet())
{
String key = entry.getKey().toLowerCase(Locale.getDefault());
if (!"plugin_name".equals(key))
{
plugin.addParameter(entry.getKey(), entry.getValue());
}
}
}
credentials = CredentialsHolder.newInstance(p.getCredentials());
}
catch (InstantiationException e)
{
throw new SdkClientException("Invalid plugin: '" + pluginName + "'");
}
catch (IllegalAccessException e)
{
throw new SdkClientException("Invalid plugin: '" + pluginName + "'");
}
catch (ClassNotFoundException e)
{
throw new SdkClientException("Invalid plugin: '" + pluginName + "'");
}
}
else if (profile.isProcessBasedProfile())
{
ProcessCredentialsProvider provider = ProcessCredentialsProvider.builder()
.withCommand(profile.getCredentialProcess())
.build();
AWSCredentials c = provider.getCredentials();
Date expirationTime = provider.getCredentialExpirationTime().toDate();
credentials = CredentialsHolder.newInstance(c, expirationTime);
}
else
{
AWSCredentials c = new ProfileStaticCredentialsProvider(profile).getCredentials();
credentials = CredentialsHolder.newInstance(c);
}
// override DbUser, AutoCreate , DbGroups, and ForceLowercase if null and defined in profile
CredentialsHolder.IamMetadata metadata = credentials.getMetadata();
if (null == metadata)
{
metadata = new CredentialsHolder.IamMetadata();
}
if (null != dbUser)
{
metadata.setProfileDbUser(dbUser);
}
if (null != autoCreate)
{
metadata.setAutoCreate(Boolean.valueOf(autoCreate));
}
if (null != dbGroups)
{
metadata.setDbGroups(dbGroups);
}
if (null != forceLowercase)
{
metadata.setForceLowercase(Boolean.valueOf(forceLowercase));
}
credentials.setMetadata(metadata);
cache.put(profileName, credentials);
if(RedshiftLogger.isEnable()) {
Date now = new Date();
m_log.logInfo(now + ": Using entry for PluginProfilesConfigFile.getCredentials cache with expiration " + credentials.getExpiration());
}
return credentials;
}
private CredentialsHolder assumeRole(BasicProfile profile, AWSCredentialsProvider provider)
{
AWSSecurityTokenServiceClientBuilder builder = AWSSecurityTokenServiceClientBuilder.standard();
AWSSecurityTokenService stsSvc;
try {
stsSvc = RequestUtils.buildSts(m_settings.m_stsEndpoint, m_settings.m_awsRegion, builder, provider,m_log);
} catch (Exception e) {
throw new SdkClientException("Profile Plugin error: " + e.getMessage(), e);
}
String roleArn = profile.getRoleArn();
String roleSessionName = profile.getRoleSessionName();
if (StringUtils.isNullOrEmpty(roleSessionName))
{
roleSessionName = "redshift-jdbc-" + System.currentTimeMillis();
}
String externalId = profile.getRoleExternalId();
AssumeRoleRequest assumeRoleRequest =
new AssumeRoleRequest().withRoleArn(roleArn).withRoleSessionName(roleSessionName);
if (!StringUtils.isNullOrEmpty(externalId))
{
assumeRoleRequest = assumeRoleRequest.withExternalId(externalId);
}
AssumeRoleResult result = stsSvc.assumeRole(assumeRoleRequest);
Credentials cred = result.getCredentials();
Date expiration = cred.getExpiration();
AWSSessionCredentials c = new BasicSessionCredentials(
cred.getAccessKeyId(),
cred.getSecretAccessKey(),
cred.getSessionToken());
return CredentialsHolder.newInstance(c, expiration);
}
}