HDDS-1347. In OM HA getS3Secret call Should happen only leader OM. (#670)
This commit is contained in:
parent
28fb4b527a
commit
4028cac56d
|
@ -268,6 +268,7 @@ public final class OzoneConsts {
|
||||||
public static final String PART_NUMBER_MARKER = "partNumberMarker";
|
public static final String PART_NUMBER_MARKER = "partNumberMarker";
|
||||||
public static final String MAX_PARTS = "maxParts";
|
public static final String MAX_PARTS = "maxParts";
|
||||||
public static final String S3_BUCKET = "s3Bucket";
|
public static final String S3_BUCKET = "s3Bucket";
|
||||||
|
public static final String S3_GETSECRET_USER = "S3GetSecretUser";
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -69,7 +69,9 @@ public enum OMAction implements AuditAction {
|
||||||
CREATE_DIRECTORY,
|
CREATE_DIRECTORY,
|
||||||
CREATE_FILE,
|
CREATE_FILE,
|
||||||
LOOKUP_FILE,
|
LOOKUP_FILE,
|
||||||
LIST_STATUS;
|
LIST_STATUS,
|
||||||
|
|
||||||
|
GET_S3_SECRET;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public String getAction() {
|
public String getAction() {
|
||||||
|
|
|
@ -207,7 +207,10 @@ public class OMException extends IOException {
|
||||||
|
|
||||||
RATIS_ERROR, // Error in Ratis server
|
RATIS_ERROR, // Error in Ratis server
|
||||||
|
|
||||||
INVALID_PATH_IN_ACL_REQUEST // Error code when path name is invalid during
|
INVALID_PATH_IN_ACL_REQUEST, // Error code when path name is invalid during
|
||||||
// acl requests.
|
// acl requests.
|
||||||
|
|
||||||
|
USER_MISMATCH // Error code when requested user name passed is different
|
||||||
|
// from remote user.
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -156,6 +156,8 @@ message OMRequest {
|
||||||
optional GetAclRequest getAclRequest = 78;
|
optional GetAclRequest getAclRequest = 78;
|
||||||
|
|
||||||
optional PurgeKeysRequest purgeKeysRequest = 81;
|
optional PurgeKeysRequest purgeKeysRequest = 81;
|
||||||
|
|
||||||
|
optional UpdateGetS3SecretRequest updateGetS3SecretRequest = 82;
|
||||||
}
|
}
|
||||||
|
|
||||||
message OMResponse {
|
message OMResponse {
|
||||||
|
@ -287,6 +289,9 @@ enum Status {
|
||||||
RATIS_ERROR = 52;
|
RATIS_ERROR = 52;
|
||||||
|
|
||||||
INVALID_PATH_IN_ACL_REQUEST = 53; // Invalid path name in acl request.
|
INVALID_PATH_IN_ACL_REQUEST = 53; // Invalid path name in acl request.
|
||||||
|
|
||||||
|
USER_MISMATCH = 54; // Error code when requested user name passed is
|
||||||
|
// different from remote user.
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -1050,6 +1055,15 @@ message GetS3SecretResponse {
|
||||||
required S3Secret s3Secret = 2;
|
required S3Secret s3Secret = 2;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
This will be used internally by OM to replicate S3 Secret across quorum of
|
||||||
|
OM's.
|
||||||
|
*/
|
||||||
|
message UpdateGetS3SecretRequest {
|
||||||
|
required string kerberosID = 1;
|
||||||
|
required string awsSecret = 2;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
The OM service that takes care of Ozone namespace.
|
The OM service that takes care of Ozone namespace.
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -104,6 +104,7 @@ import static org.junit.Assert.assertEquals;
|
||||||
import static org.junit.Assert.assertFalse;
|
import static org.junit.Assert.assertFalse;
|
||||||
import static org.junit.Assert.assertNull;
|
import static org.junit.Assert.assertNull;
|
||||||
import static org.junit.Assert.assertTrue;
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
import static org.slf4j.event.Level.INFO;
|
import static org.slf4j.event.Level.INFO;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -689,11 +690,11 @@ public final class TestSecureOzoneCluster {
|
||||||
|
|
||||||
//Creates a secret since it does not exist
|
//Creates a secret since it does not exist
|
||||||
S3SecretValue firstAttempt = omClient
|
S3SecretValue firstAttempt = omClient
|
||||||
.getS3Secret("HADOOP/JOHNDOE");
|
.getS3Secret(UserGroupInformation.getCurrentUser().getUserName());
|
||||||
|
|
||||||
//Fetches the secret from db since it was created in previous step
|
//Fetches the secret from db since it was created in previous step
|
||||||
S3SecretValue secondAttempt = omClient
|
S3SecretValue secondAttempt = omClient
|
||||||
.getS3Secret("HADOOP/JOHNDOE");
|
.getS3Secret(UserGroupInformation.getCurrentUser().getUserName());
|
||||||
|
|
||||||
//secret fetched on both attempts must be same
|
//secret fetched on both attempts must be same
|
||||||
assertTrue(firstAttempt.getAwsSecret()
|
assertTrue(firstAttempt.getAwsSecret()
|
||||||
|
@ -703,6 +704,13 @@ public final class TestSecureOzoneCluster {
|
||||||
assertTrue(firstAttempt.getAwsAccessKey()
|
assertTrue(firstAttempt.getAwsAccessKey()
|
||||||
.equals(secondAttempt.getAwsAccessKey()));
|
.equals(secondAttempt.getAwsAccessKey()));
|
||||||
|
|
||||||
|
|
||||||
|
try {
|
||||||
|
omClient.getS3Secret("HADOOP/JOHNDOE");
|
||||||
|
fail("testGetS3Secret failed");
|
||||||
|
} catch (IOException ex) {
|
||||||
|
GenericTestUtils.assertExceptionContains("USER_MISMATCH", ex);
|
||||||
|
}
|
||||||
} finally {
|
} finally {
|
||||||
if(om != null){
|
if(om != null){
|
||||||
om.stop();
|
om.stop();
|
||||||
|
|
|
@ -2683,6 +2683,14 @@ public final class OzoneManager extends ServiceRuntimeInfoImpl
|
||||||
* {@inheritDoc}
|
* {@inheritDoc}
|
||||||
*/
|
*/
|
||||||
public S3SecretValue getS3Secret(String kerberosID) throws IOException{
|
public S3SecretValue getS3Secret(String kerberosID) throws IOException{
|
||||||
|
UserGroupInformation user = ProtobufRpcEngine.Server.getRemoteUser();
|
||||||
|
|
||||||
|
// Check whether user name passed is matching with the current user or not.
|
||||||
|
if (!user.getUserName().equals(kerberosID)) {
|
||||||
|
throw new OMException("User mismatch. Requested user name is " +
|
||||||
|
"mismatched " + kerberosID +", with current user " +
|
||||||
|
user.getUserName(), OMException.ResultCodes.USER_MISMATCH);
|
||||||
|
}
|
||||||
return s3SecretManager.getS3Secret(kerberosID);
|
return s3SecretManager.getS3Secret(kerberosID);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,193 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
* <p>
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
* <p>
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.apache.hadoop.ozone.om.request.s3.security;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
|
import com.google.common.base.Optional;
|
||||||
|
import org.apache.commons.codec.digest.DigestUtils;
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
|
import org.apache.hadoop.ipc.ProtobufRpcEngine;
|
||||||
|
import org.apache.hadoop.ozone.OmUtils;
|
||||||
|
import org.apache.hadoop.ozone.OzoneConsts;
|
||||||
|
import org.apache.hadoop.ozone.audit.OMAction;
|
||||||
|
import org.apache.hadoop.ozone.om.OMMetadataManager;
|
||||||
|
import org.apache.hadoop.ozone.om.OzoneManager;
|
||||||
|
import org.apache.hadoop.ozone.om.exceptions.OMException;
|
||||||
|
import org.apache.hadoop.ozone.om.helpers.S3SecretValue;
|
||||||
|
import org.apache.hadoop.ozone.om.ratis.utils.OzoneManagerDoubleBufferHelper;
|
||||||
|
import org.apache.hadoop.ozone.om.request.OMClientRequest;
|
||||||
|
import org.apache.hadoop.ozone.om.response.OMClientResponse;
|
||||||
|
import org.apache.hadoop.ozone.om.response.s3.security.S3GetSecretResponse;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos.GetS3SecretRequest;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos.GetS3SecretResponse;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos.OMResponse;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos.OMRequest;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos.UpdateGetS3SecretRequest;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos.S3Secret;
|
||||||
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
|
import org.apache.hadoop.utils.db.cache.CacheKey;
|
||||||
|
import org.apache.hadoop.utils.db.cache.CacheValue;
|
||||||
|
|
||||||
|
import static org.apache.hadoop.ozone.om.lock.OzoneManagerLock.Resource.S3_SECRET_LOCK;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Handles GetS3Secret request.
|
||||||
|
*/
|
||||||
|
public class S3GetSecretRequest extends OMClientRequest {
|
||||||
|
|
||||||
|
private static final Logger LOG =
|
||||||
|
LoggerFactory.getLogger(S3GetSecretRequest.class);
|
||||||
|
|
||||||
|
public S3GetSecretRequest(OMRequest omRequest) {
|
||||||
|
super(omRequest);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public OMRequest preExecute(OzoneManager ozoneManager) throws IOException {
|
||||||
|
GetS3SecretRequest s3GetSecretRequest =
|
||||||
|
getOmRequest().getGetS3SecretRequest();
|
||||||
|
|
||||||
|
// Generate S3 Secret to be used by OM quorum.
|
||||||
|
String kerberosID = s3GetSecretRequest.getKerberosID();
|
||||||
|
|
||||||
|
UserGroupInformation user = ProtobufRpcEngine.Server.getRemoteUser();
|
||||||
|
if (!user.getUserName().equals(kerberosID)) {
|
||||||
|
throw new OMException("User mismatch. Requested user name is " +
|
||||||
|
"mismatched " + kerberosID +", with current user " +
|
||||||
|
user.getUserName(), OMException.ResultCodes.USER_MISMATCH);
|
||||||
|
}
|
||||||
|
|
||||||
|
String s3Secret = DigestUtils.sha256Hex(OmUtils.getSHADigest());
|
||||||
|
|
||||||
|
UpdateGetS3SecretRequest updateGetS3SecretRequest =
|
||||||
|
UpdateGetS3SecretRequest.newBuilder()
|
||||||
|
.setAwsSecret(s3Secret)
|
||||||
|
.setKerberosID(kerberosID).build();
|
||||||
|
|
||||||
|
// Client issues GetS3Secret request, when received by OM leader
|
||||||
|
// it will generate s3Secret. Original GetS3Secret request is
|
||||||
|
// converted to UpdateGetS3Secret request with the generated token
|
||||||
|
// information. This updated request will be submitted to Ratis. In this
|
||||||
|
// way S3Secret created by leader, will be replicated across all
|
||||||
|
// OMs. With this approach, original GetS3Secret request from
|
||||||
|
// client does not need any proto changes.
|
||||||
|
OMRequest.Builder omRequest = OMRequest.newBuilder()
|
||||||
|
.setUserInfo(getUserInfo())
|
||||||
|
.setUpdateGetS3SecretRequest(updateGetS3SecretRequest)
|
||||||
|
.setCmdType(getOmRequest().getCmdType())
|
||||||
|
.setClientId(getOmRequest().getClientId());
|
||||||
|
|
||||||
|
if (getOmRequest().hasTraceID()) {
|
||||||
|
omRequest.setTraceID(getOmRequest().getTraceID());
|
||||||
|
}
|
||||||
|
|
||||||
|
return omRequest.build();
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public OMClientResponse validateAndUpdateCache(OzoneManager ozoneManager,
|
||||||
|
long transactionLogIndex,
|
||||||
|
OzoneManagerDoubleBufferHelper ozoneManagerDoubleBufferHelper) {
|
||||||
|
|
||||||
|
|
||||||
|
OMClientResponse omClientResponse = null;
|
||||||
|
OMResponse.Builder omResponse = OMResponse.newBuilder()
|
||||||
|
.setCmdType(OzoneManagerProtocolProtos.Type.GetS3Secret)
|
||||||
|
.setStatus(OzoneManagerProtocolProtos.Status.OK)
|
||||||
|
.setSuccess(true);
|
||||||
|
boolean acquiredLock = false;
|
||||||
|
IOException exception = null;
|
||||||
|
OMMetadataManager omMetadataManager = ozoneManager.getMetadataManager();
|
||||||
|
UpdateGetS3SecretRequest updateGetS3SecretRequest =
|
||||||
|
getOmRequest().getUpdateGetS3SecretRequest();
|
||||||
|
String kerberosID = updateGetS3SecretRequest.getKerberosID();
|
||||||
|
try {
|
||||||
|
String awsSecret = updateGetS3SecretRequest.getAwsSecret();
|
||||||
|
acquiredLock =
|
||||||
|
omMetadataManager.getLock().acquireLock(S3_SECRET_LOCK, kerberosID);
|
||||||
|
|
||||||
|
S3SecretValue s3SecretValue =
|
||||||
|
omMetadataManager.getS3SecretTable().get(kerberosID);
|
||||||
|
|
||||||
|
// If s3Secret for user is not in S3Secret table, add the Secret to cache.
|
||||||
|
if (s3SecretValue == null) {
|
||||||
|
omMetadataManager.getS3SecretTable().addCacheEntry(
|
||||||
|
new CacheKey<>(kerberosID),
|
||||||
|
new CacheValue<>(Optional.of(new S3SecretValue(kerberosID,
|
||||||
|
awsSecret)), transactionLogIndex));
|
||||||
|
} else {
|
||||||
|
// If it already exists, use the existing one.
|
||||||
|
awsSecret = s3SecretValue.getAwsSecret();
|
||||||
|
}
|
||||||
|
|
||||||
|
GetS3SecretResponse.Builder getS3SecretResponse = GetS3SecretResponse
|
||||||
|
.newBuilder().setS3Secret(S3Secret.newBuilder()
|
||||||
|
.setAwsSecret(awsSecret).setKerberosID(kerberosID));
|
||||||
|
|
||||||
|
if (s3SecretValue == null) {
|
||||||
|
omClientResponse =
|
||||||
|
new S3GetSecretResponse(new S3SecretValue(kerberosID, awsSecret),
|
||||||
|
omResponse.setGetS3SecretResponse(getS3SecretResponse).build());
|
||||||
|
} else {
|
||||||
|
// As when it already exists, we don't need to add to DB again. So
|
||||||
|
// set the value to null.
|
||||||
|
omClientResponse = new S3GetSecretResponse(null,
|
||||||
|
omResponse.setGetS3SecretResponse(getS3SecretResponse).build());
|
||||||
|
}
|
||||||
|
|
||||||
|
} catch (IOException ex) {
|
||||||
|
exception = ex;
|
||||||
|
omClientResponse = new S3GetSecretResponse(null,
|
||||||
|
createErrorOMResponse(omResponse, ex));
|
||||||
|
} finally {
|
||||||
|
if (omClientResponse != null) {
|
||||||
|
omClientResponse.setFlushFuture(ozoneManagerDoubleBufferHelper.add(
|
||||||
|
omClientResponse, transactionLogIndex));
|
||||||
|
}
|
||||||
|
if (acquiredLock) {
|
||||||
|
omMetadataManager.getLock().releaseLock(S3_SECRET_LOCK, kerberosID);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
Map<String, String> auditMap = new HashMap<>();
|
||||||
|
auditMap.put(OzoneConsts.S3_GETSECRET_USER, kerberosID);
|
||||||
|
|
||||||
|
// audit log
|
||||||
|
auditLog(ozoneManager.getAuditLogger(), buildAuditMessage(
|
||||||
|
OMAction.GET_S3_SECRET, auditMap,
|
||||||
|
exception, getOmRequest().getUserInfo()));
|
||||||
|
|
||||||
|
if (exception == null) {
|
||||||
|
LOG.debug("Secret for accessKey:{} is generated Successfully",
|
||||||
|
kerberosID);
|
||||||
|
} else {
|
||||||
|
LOG.error("Secret for accessKey:{} is generation failed", kerberosID,
|
||||||
|
exception);
|
||||||
|
}
|
||||||
|
return omClientResponse;
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,22 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
* <p>
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
* <p>
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Package contains classes related to S3 security requests.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.ozone.om.request.s3.security;
|
|
@ -0,0 +1,56 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
* <p>
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
* <p>
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.apache.hadoop.ozone.om.response.s3.security;
|
||||||
|
|
||||||
|
import org.apache.hadoop.ozone.om.OMMetadataManager;
|
||||||
|
import org.apache.hadoop.ozone.om.helpers.S3SecretValue;
|
||||||
|
import org.apache.hadoop.ozone.om.response.OMClientResponse;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos;
|
||||||
|
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos.OMResponse;
|
||||||
|
import org.apache.hadoop.utils.db.BatchOperation;
|
||||||
|
|
||||||
|
import javax.annotation.Nonnull;
|
||||||
|
import javax.annotation.Nullable;
|
||||||
|
import java.io.IOException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Response for GetS3Secret request.
|
||||||
|
*/
|
||||||
|
public class S3GetSecretResponse extends OMClientResponse {
|
||||||
|
|
||||||
|
|
||||||
|
private S3SecretValue s3SecretValue;
|
||||||
|
|
||||||
|
public S3GetSecretResponse(@Nullable S3SecretValue s3SecretValue,
|
||||||
|
@Nonnull OMResponse omResponse) {
|
||||||
|
super(omResponse);
|
||||||
|
this.s3SecretValue = s3SecretValue;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void addToDBBatch(OMMetadataManager omMetadataManager,
|
||||||
|
BatchOperation batchOperation) throws IOException {
|
||||||
|
|
||||||
|
if (s3SecretValue != null &&
|
||||||
|
getOMResponse().getStatus() == OzoneManagerProtocolProtos.Status.OK) {
|
||||||
|
omMetadataManager.getS3SecretTable().putWithBatch(batchOperation,
|
||||||
|
s3SecretValue.getKerberosID(), s3SecretValue);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,22 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
* <p>
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
* <p>
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Package contains classes related to S3 security responses.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.ozone.om.request.s3.security;
|
Loading…
Reference in New Issue