All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.hadoop.hive.ql.secrets.AWSSecretsManagerSecretSource Maven / Gradle / Ivy

There is a newer version: 4.0.1
Show newest version
/*
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.apache.hadoop.hive.ql.secrets;

import com.amazonaws.secretsmanager.caching.SecretCache;
import com.fasterxml.jackson.core.JsonProcessingException;
import com.fasterxml.jackson.databind.JsonNode;
import com.fasterxml.jackson.databind.ObjectMapper;
import com.google.common.annotations.VisibleForTesting;
import com.google.common.base.Preconditions;

import java.io.IOException;
import java.net.URI;

/**
 * Implementation of SecretSource which loads secrets from AWS Secrets Manager.
 * The format of the uri is "aws-sm:///{key-name-or-arn}"
 * It uses aws secrets cache sdk to fetch and refresh the secret, the environment must be setup so that the default
 * client can load the secret else it will fail.
 * It expects the secret fetched to be a json string with "password" as the key for password, this is default for
 * redshift, rds or external database configs. It does not make use of any other fields.
 */
public class AWSSecretsManagerSecretSource implements SecretSource {
  // Do not create SecretCache here, it fails to initialize in non-aws aware environments.
  private volatile SecretCache cache = null;
  private final ObjectMapper mapper = new ObjectMapper();

  /**
   * @return Fixed string aws-sm.
   */
  @Override
  public String getURIScheme() {
    return "aws-sm";
  }

  /**
   * This load the secret from aws-secrets manager.
   * @param uri The uri should be of format: aws-sm:///{key-arn-or-name}
   * @return The secret fetched from AWS.
   * @throws IOException
   */
  @Override
  public String getSecret(URI uri) throws IOException {
    Preconditions.checkArgument(getURIScheme().equals(uri.getScheme()));
    initCache();
    String key = uri.getPath();
    key = key.substring(1); // remove the leading slash.

    String secretsString;
    try {
      secretsString = cache.getSecretString(key);
    } catch (Exception e) {
      // Wrap any exception from the above service call to IOException.
      throw new IOException("Error trying to get secret", e);
    }
    if (secretsString == null) {
      throw new IOException("secret was not found");
    }
    try {
      JsonNode passwd = mapper.readTree(secretsString).get("password");
      if (passwd == null) {
        throw new IOException("Expected \"password\" field in secrets json.");
      }
      return passwd.asText();
    } catch (JsonProcessingException e) {
      // Suppress the nested exception, since it may contain info from the secretsString, which should not be leaked.
      throw new IOException("Exception while parsing secretstring as json. Check secret string stored.");
    }
  }

  private void initCache() {
    // DCL based SecretCache setup, to ensure thread safety.
    if (cache == null) {
      synchronized (this) {
        if (cache == null) {
          cache = new SecretCache();
        }
      }
    }
  }

  @VisibleForTesting
  void setCache(SecretCache cache) {
    this.cache = cache;
  }

  /**
   * Clean the resources in the class.
   */
  @Override
  public void close() {
    cache.close();
  }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy