This is an automated email from the ASF dual-hosted git repository.
sammichen pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ozone.git
The following commit(s) were added to refs/heads/master by this push:
new 8b27fb92b81 HDDS-12299. Merge OzoneAclConfig into OmConfig (#8383)
8b27fb92b81 is described below
commit 8b27fb92b817b5934e8c9e12e16ee0e2befbd16a
Author: Doroszlai, Attila <[email protected]>
AuthorDate: Wed May 14 04:29:39 2025 +0200
HDDS-12299. Merge OzoneAclConfig into OmConfig (#8383)
---
.../java/org/apache/hadoop/ozone/OzoneAcl.java | 7 +-
.../java/org/apache/hadoop/ozone/om/OmConfig.java | 58 +++++++++++++++++
.../hadoop/ozone/om/helpers/OzoneAclUtil.java | 17 ++---
.../ozone/security/acl/IAccessAuthorizer.java | 16 ++++-
.../hadoop/ozone/security/acl/OzoneAclConfig.java | 76 ----------------------
.../hadoop/ozone/om/helpers/TestOzoneAclUtil.java | 11 ++--
.../ozone/AbstractRootedOzoneFileSystemTest.java | 19 +++---
.../ozone/client/rpc/OzoneRpcClientTests.java | 10 ++-
.../hadoop/ozone/om/TestRecursiveAclWithFSO.java | 20 +++---
.../om/request/bucket/OMBucketCreateRequest.java | 2 +-
.../om/request/file/OMDirectoryCreateRequest.java | 2 +-
.../file/OMDirectoryCreateRequestWithFSO.java | 2 +-
.../ozone/om/request/file/OMFileCreateRequest.java | 2 +-
.../request/file/OMFileCreateRequestWithFSO.java | 2 +-
.../ozone/om/request/key/OMKeyCreateRequest.java | 2 +-
.../om/request/key/OMKeyCreateRequestWithFSO.java | 2 +-
.../hadoop/ozone/om/request/key/OMKeyRequest.java | 22 +++----
.../S3InitiateMultipartUploadRequest.java | 2 +-
.../S3InitiateMultipartUploadRequestWithFSO.java | 2 +-
.../S3MultipartUploadCompleteRequest.java | 2 +-
.../om/request/volume/OMVolumeCreateRequest.java | 2 +-
...TestOzoneManagerDoubleBufferWithOMResponse.java | 2 +
.../ozone/om/request/bucket/TestBucketRequest.java | 2 +
.../request/file/TestOMDirectoryCreateRequest.java | 2 +
.../file/TestOMDirectoryCreateRequestWithFSO.java | 2 +
.../om/request/key/TestOMKeyCreateRequest.java | 2 +
.../ozone/om/request/key/TestOMKeyRequest.java | 2 +
.../s3/multipart/TestS3MultipartRequest.java | 2 +
.../om/request/volume/TestOMVolumeRequest.java | 2 +
29 files changed, 146 insertions(+), 148 deletions(-)
diff --git
a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/OzoneAcl.java
b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/OzoneAcl.java
index 57ba7b3df69..414a217d5a5 100644
--- a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/OzoneAcl.java
+++ b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/OzoneAcl.java
@@ -33,6 +33,7 @@
import java.util.EnumSet;
import java.util.List;
import java.util.Objects;
+import java.util.Set;
import java.util.function.Function;
import java.util.function.IntFunction;
import java.util.function.Supplier;
@@ -81,7 +82,7 @@ public static OzoneAcl of(ACLIdentityType type, String name,
AclScope scope, ACL
return new OzoneAcl(type, name, scope, toInt(acls));
}
- public static OzoneAcl of(ACLIdentityType type, String name, AclScope scope,
EnumSet<ACLType> acls) {
+ public static OzoneAcl of(ACLIdentityType type, String name, AclScope scope,
Set<ACLType> acls) {
return new OzoneAcl(type, name, scope, toInt(acls));
}
@@ -321,6 +322,10 @@ public List<ACLType> getAclList() {
return getAclList(aclBits, Function.identity());
}
+ public Set<ACLType> getAclSet() {
+ return Collections.unmodifiableSet(EnumSet.copyOf(getAclList()));
+ }
+
private static <T> List<T> getAclList(int aclBits, Function<ACLType, T>
converter) {
if (aclBits == 0) {
return Collections.emptyList();
diff --git
a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/OmConfig.java
b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/OmConfig.java
index f94d05f1be9..2c3e94c9116 100644
--- a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/OmConfig.java
+++ b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/OmConfig.java
@@ -19,12 +19,16 @@
import com.google.common.base.Preconditions;
import java.time.Duration;
+import java.util.Collections;
+import java.util.EnumSet;
+import java.util.Set;
import org.apache.hadoop.hdds.conf.Config;
import org.apache.hadoop.hdds.conf.ConfigGroup;
import org.apache.hadoop.hdds.conf.ConfigTag;
import org.apache.hadoop.hdds.conf.ConfigType;
import org.apache.hadoop.hdds.conf.PostConstruct;
import org.apache.hadoop.hdds.conf.ReconfigurableConfig;
+import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer.ACLType;
/**
* Ozone Manager configuration.
@@ -81,6 +85,27 @@ public class OmConfig extends ReconfigurableConfig {
)
private long ratisBasedFinalizationTimeout =
Duration.ofSeconds(30).getSeconds();
+ // OM Default user/group permissions
+ @Config(key = "user.rights",
+ defaultValue = "ALL",
+ type = ConfigType.STRING,
+ tags = {ConfigTag.OM, ConfigTag.SECURITY},
+ description = "Default user permissions set for an object in " +
+ "OzoneManager."
+ )
+ private String userDefaultRights;
+ private Set<ACLType> userDefaultRightSet;
+
+ @Config(key = "group.rights",
+ defaultValue = "READ, LIST",
+ type = ConfigType.STRING,
+ tags = {ConfigTag.OM, ConfigTag.SECURITY},
+ description = "Default group permissions set for an object in " +
+ "OzoneManager."
+ )
+ private String groupDefaultRights;
+ private Set<ACLType> groupDefaultRightSet;
+
public long getRatisBasedFinalizationTimeout() {
return ratisBasedFinalizationTimeout;
}
@@ -111,6 +136,32 @@ public void setMaxUserVolumeCount(int newValue) {
validate();
}
+ public Set<ACLType> getUserDefaultRights() {
+ if (userDefaultRightSet == null) {
+ userDefaultRightSet = getUserDefaultRightSet();
+ }
+ return userDefaultRightSet;
+ }
+
+ private Set<ACLType> getUserDefaultRightSet() {
+ return userDefaultRights == null
+ ? Collections.singleton(ACLType.ALL)
+ : ACLType.parseList(userDefaultRights);
+ }
+
+ public Set<ACLType> getGroupDefaultRights() {
+ if (groupDefaultRightSet == null) {
+ groupDefaultRightSet = getGroupDefaultRightSet();
+ }
+ return groupDefaultRightSet;
+ }
+
+ private Set<ACLType> getGroupDefaultRightSet() {
+ return groupDefaultRights == null
+ ? Collections.unmodifiableSet(EnumSet.of(ACLType.READ, ACLType.LIST))
+ : ACLType.parseList(groupDefaultRights);
+ }
+
@PostConstruct
public void validate() {
if (maxListSize <= 0) {
@@ -119,6 +170,9 @@ public void validate() {
Preconditions.checkArgument(this.maxUserVolumeCount > 0,
Keys.USER_MAX_VOLUME + " value should be greater than zero");
+
+ userDefaultRightSet = getUserDefaultRightSet();
+ groupDefaultRightSet = getGroupDefaultRightSet();
}
public OmConfig copy() {
@@ -131,6 +185,10 @@ public void setFrom(OmConfig other) {
fileSystemPathEnabled = other.fileSystemPathEnabled;
maxListSize = other.maxListSize;
maxUserVolumeCount = other.maxUserVolumeCount;
+ userDefaultRights = other.userDefaultRights;
+ groupDefaultRights = other.groupDefaultRights;
+
+ validate();
}
/**
diff --git
a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/helpers/OzoneAclUtil.java
b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/helpers/OzoneAclUtil.java
index f3af4f73da9..d89f9282b7f 100644
---
a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/helpers/OzoneAclUtil.java
+++
b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/helpers/OzoneAclUtil.java
@@ -28,13 +28,12 @@
import java.util.Objects;
import java.util.stream.Collectors;
import java.util.stream.Stream;
-import org.apache.hadoop.hdds.conf.OzoneConfiguration;
import org.apache.hadoop.ozone.OzoneAcl;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.exceptions.OMException;
import
org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos.OzoneAclInfo;
import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer;
import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer.ACLType;
-import org.apache.hadoop.ozone.security.acl.OzoneAclConfig;
import org.apache.hadoop.ozone.security.acl.RequestContext;
import org.apache.hadoop.security.UserGroupInformation;
import org.slf4j.Logger;
@@ -46,9 +45,6 @@
public final class OzoneAclUtil {
static final Logger LOG = LoggerFactory.getLogger(OzoneAclUtil.class);
- private static ACLType[] userRights;
- private static ACLType[] groupRights;
-
private OzoneAclUtil() {
}
@@ -59,19 +55,14 @@ private OzoneAclUtil() {
* @param conf current configuration
* @return list of OzoneAcls
* */
- public static List<OzoneAcl> getDefaultAclList(UserGroupInformation ugi,
OzoneConfiguration conf) {
+ public static List<OzoneAcl> getDefaultAclList(UserGroupInformation ugi,
OmConfig conf) {
// Get default acl rights for user and group.
- if (userRights == null || groupRights == null) {
- OzoneAclConfig aclConfig = conf.getObject(OzoneAclConfig.class);
- userRights = aclConfig.getUserDefaultRights();
- groupRights = aclConfig.getGroupDefaultRights();
- }
List<OzoneAcl> listOfAcls = new ArrayList<>();
// User ACL.
- listOfAcls.add(OzoneAcl.of(USER, ugi.getShortUserName(), ACCESS,
userRights));
+ listOfAcls.add(OzoneAcl.of(USER, ugi.getShortUserName(), ACCESS,
conf.getUserDefaultRights()));
try {
String groupName = ugi.getPrimaryGroupName();
- listOfAcls.add(OzoneAcl.of(GROUP, groupName, ACCESS, groupRights));
+ listOfAcls.add(OzoneAcl.of(GROUP, groupName, ACCESS,
conf.getGroupDefaultRights()));
} catch (IOException e) {
// do nothing, since user has the permission, user can add ACL for
selected groups later.
LOG.warn("Failed to get primary group from user {}", ugi);
diff --git
a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/security/acl/IAccessAuthorizer.java
b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/security/acl/IAccessAuthorizer.java
index 128939a8714..f1218a9aa08 100644
---
a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/security/acl/IAccessAuthorizer.java
+++
b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/security/acl/IAccessAuthorizer.java
@@ -17,7 +17,13 @@
package org.apache.hadoop.ozone.security.acl;
+import java.util.Arrays;
import java.util.BitSet;
+import java.util.Collections;
+import java.util.EnumSet;
+import java.util.Objects;
+import java.util.Set;
+import java.util.stream.Collectors;
import org.apache.hadoop.hdds.annotation.InterfaceAudience;
import org.apache.hadoop.hdds.annotation.InterfaceStability;
import org.apache.hadoop.ozone.OzoneConsts;
@@ -119,7 +125,6 @@ public static ACLType getACLRight(String type) {
throw new IllegalArgumentException("[" + type + "] ACL right is not " +
"recognized");
}
-
}
/**
@@ -160,6 +165,15 @@ public static String getAclString(ACLType acl) {
throw new IllegalArgumentException("ACL right is not recognized");
}
}
+
+ public static Set<ACLType> parseList(String conf) {
+ String[] array = Objects.requireNonNull(conf, "conf == null")
+ .trim()
+ .split(",");
+ return Collections.unmodifiableSet(Arrays.stream(array)
+ .map(each -> ACLType.valueOf(each.trim()))
+ .collect(Collectors.toCollection(() ->
EnumSet.noneOf(ACLType.class))));
+ }
}
/**
diff --git
a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/security/acl/OzoneAclConfig.java
b/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/security/acl/OzoneAclConfig.java
deleted file mode 100644
index 206ba53df5f..00000000000
---
a/hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/security/acl/OzoneAclConfig.java
+++ /dev/null
@@ -1,76 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements. See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-
-package org.apache.hadoop.ozone.security.acl;
-
-import java.util.ArrayList;
-import java.util.Arrays;
-import java.util.List;
-import org.apache.hadoop.hdds.conf.Config;
-import org.apache.hadoop.hdds.conf.ConfigGroup;
-import org.apache.hadoop.hdds.conf.ConfigTag;
-import org.apache.hadoop.hdds.conf.ConfigType;
-import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer.ACLType;
-
-/**
- * Ozone ACL config pojo.
- * */
-@ConfigGroup(prefix = "ozone.om")
-public class OzoneAclConfig {
-
- // OM Default user/group permissions
- @Config(key = "user.rights",
- defaultValue = "ALL",
- type = ConfigType.STRING,
- tags = {ConfigTag.OM, ConfigTag.SECURITY},
- description = "Default user permissions set for an object in " +
- "OzoneManager."
- )
- private String userDefaultRights;
-
- @Config(key = "group.rights",
- defaultValue = "READ, LIST",
- type = ConfigType.STRING,
- tags = {ConfigTag.OM, ConfigTag.SECURITY},
- description = "Default group permissions set for an object in " +
- "OzoneManager."
- )
- private String groupDefaultRights;
-
- public ACLType[] getUserDefaultRights() {
- List<ACLType> types = new ArrayList();
- if (userDefaultRights == null) {
- types.add(ACLType.ALL);
- } else {
- String[] array = userDefaultRights.trim().split(",");
- Arrays.stream(array).forEach(t -> types.add(ACLType.valueOf(t.trim())));
- }
- return types.toArray(new ACLType[0]);
- }
-
- public ACLType[] getGroupDefaultRights() {
- List<ACLType> types = new ArrayList();
- if (groupDefaultRights == null) {
- types.add(ACLType.READ);
- types.add(ACLType.LIST);
- } else {
- String[] array = groupDefaultRights.trim().split(",");
- Arrays.stream(array).forEach(t -> types.add(ACLType.valueOf(t.trim())));
- }
- return types.toArray(new ACLType[0]);
- }
-}
diff --git
a/hadoop-ozone/common/src/test/java/org/apache/hadoop/ozone/om/helpers/TestOzoneAclUtil.java
b/hadoop-ozone/common/src/test/java/org/apache/hadoop/ozone/om/helpers/TestOzoneAclUtil.java
index ac95929cb34..20265874969 100644
---
a/hadoop-ozone/common/src/test/java/org/apache/hadoop/ozone/om/helpers/TestOzoneAclUtil.java
+++
b/hadoop-ozone/common/src/test/java/org/apache/hadoop/ozone/om/helpers/TestOzoneAclUtil.java
@@ -32,9 +32,8 @@
import java.util.Arrays;
import java.util.List;
import org.apache.hadoop.ozone.OzoneAcl;
-import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer.ACLType;
-import org.apache.hadoop.ozone.security.acl.OzoneAclConfig;
import org.apache.hadoop.security.UserGroupInformation;
import org.junit.jupiter.api.Test;
@@ -181,16 +180,14 @@ private static List<OzoneAcl> getDefaultAcls() {
ugi = UserGroupInformation.createRemoteUser("user0");
}
- OzoneAclConfig aclConfig = newInstanceOf(OzoneAclConfig.class);
- IAccessAuthorizer.ACLType[] userRights = aclConfig.getUserDefaultRights();
- IAccessAuthorizer.ACLType[] groupRights =
aclConfig.getGroupDefaultRights();
+ OmConfig omConfig = newInstanceOf(OmConfig.class);
OzoneAclUtil.addAcl(ozoneAcls, OzoneAcl.of(USER,
- ugi.getUserName(), ACCESS, userRights));
+ ugi.getUserName(), ACCESS, omConfig.getUserDefaultRights()));
//Group ACLs of the User
List<String> userGroups = Arrays.asList(ugi.getGroupNames());
userGroups.stream().forEach((group) -> OzoneAclUtil.addAcl(ozoneAcls,
- OzoneAcl.of(GROUP, group, ACCESS, groupRights)));
+ OzoneAcl.of(GROUP, group, ACCESS, omConfig.getGroupDefaultRights())));
return ozoneAcls;
}
diff --git
a/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/fs/ozone/AbstractRootedOzoneFileSystemTest.java
b/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/fs/ozone/AbstractRootedOzoneFileSystemTest.java
index 9d129435baf..6cfe5b13f55 100644
---
a/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/fs/ozone/AbstractRootedOzoneFileSystemTest.java
+++
b/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/fs/ozone/AbstractRootedOzoneFileSystemTest.java
@@ -116,13 +116,13 @@
import org.apache.hadoop.ozone.client.protocol.ClientProtocol;
import org.apache.hadoop.ozone.om.OMConfigKeys;
import org.apache.hadoop.ozone.om.OMMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.TrashPolicyOzone;
import org.apache.hadoop.ozone.om.exceptions.OMException;
import org.apache.hadoop.ozone.om.helpers.BucketLayout;
import org.apache.hadoop.ozone.om.helpers.QuotaUtil;
import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer.ACLIdentityType;
import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer.ACLType;
-import org.apache.hadoop.ozone.security.acl.OzoneAclConfig;
import org.apache.hadoop.security.UserGroupInformation;
import org.apache.hadoop.tools.DistCp;
import org.apache.hadoop.tools.DistCpOptions;
@@ -1190,8 +1190,7 @@ void testSharedTmpDir() throws IOException {
// Use ClientProtocol to pass in volume ACL, ObjectStore won't do it
ClientProtocol proxy = objectStore.getClientProxy();
// Get default acl rights for user
- OzoneAclConfig aclConfig = conf.getObject(OzoneAclConfig.class);
- ACLType[] userRights = aclConfig.getUserDefaultRights();
+ OmConfig omConfig = cluster.getOzoneManager().getConfig();
// Construct ACL for world access
// ACL admin owner, world read+write
EnumSet<ACLType> aclRights = EnumSet.of(READ, WRITE);
@@ -1202,7 +1201,7 @@ void testSharedTmpDir() throws IOException {
.setAdmin("admin")
.setOwner("admin")
.addAcl(OzoneAcl.of(ACLIdentityType.WORLD, "", ACCESS, aclRights))
- .addAcl(OzoneAcl.of(ACLIdentityType.USER, "admin", ACCESS, userRights))
+ .addAcl(OzoneAcl.of(ACLIdentityType.USER, "admin", ACCESS,
omConfig.getUserDefaultRights()))
.setQuotaInNamespace(1000)
.setQuotaInBytes(Long.MAX_VALUE).build();
// Sanity check
@@ -1237,7 +1236,7 @@ void testSharedTmpDir() throws IOException {
BucketArgs bucketArgs = new BucketArgs.Builder()
.setOwner("admin")
.addAcl(OzoneAcl.of(ACLIdentityType.WORLD, "", ACCESS, READ, WRITE,
LIST))
- .addAcl(OzoneAcl.of(ACLIdentityType.USER, "admin", ACCESS, userRights))
+ .addAcl(OzoneAcl.of(ACLIdentityType.USER, "admin", ACCESS,
omConfig.getUserDefaultRights()))
.setQuotaInNamespace(1000)
.setQuotaInBytes(Long.MAX_VALUE).build();
@@ -1293,11 +1292,10 @@ void testTempMount() throws IOException {
// Use ClientProtocol to pass in volume ACL, ObjectStore won't do it
ClientProtocol proxy = objectStore.getClientProxy();
// Get default acl rights for user
- OzoneAclConfig aclConfig = conf.getObject(OzoneAclConfig.class);
- ACLType[] userRights = aclConfig.getUserDefaultRights();
+ OmConfig omConfig = cluster.getOzoneManager().getConfig();
// Construct ACL for world access
OzoneAcl aclWorldAccess = OzoneAcl.of(ACLIdentityType.WORLD, "",
- ACCESS, userRights);
+ ACCESS, omConfig.getUserDefaultRights());
// Construct VolumeArgs
VolumeArgs volumeArgs = VolumeArgs.newBuilder()
.addAcl(aclWorldAccess)
@@ -2273,11 +2271,10 @@ void testNonPrivilegedUserMkdirCreateBucket() throws
IOException {
ClientProtocol proxy = objectStore.getClientProxy();
// Get default acl rights for user
- OzoneAclConfig aclConfig = conf.getObject(OzoneAclConfig.class);
- ACLType[] userRights = aclConfig.getUserDefaultRights();
+ OmConfig omConfig = cluster.getOzoneManager().getConfig();
// Construct ACL for world access
OzoneAcl aclWorldAccess = OzoneAcl.of(ACLIdentityType.WORLD, "",
- ACCESS, userRights);
+ ACCESS, omConfig.getUserDefaultRights());
// Construct VolumeArgs, set ACL to world access
VolumeArgs volumeArgs = VolumeArgs.newBuilder()
.addAcl(aclWorldAccess)
diff --git
a/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/client/rpc/OzoneRpcClientTests.java
b/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/client/rpc/OzoneRpcClientTests.java
index 0b26710b7e8..dbe01d94eb2 100644
---
a/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/client/rpc/OzoneRpcClientTests.java
+++
b/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/client/rpc/OzoneRpcClientTests.java
@@ -162,6 +162,7 @@
import org.apache.hadoop.ozone.container.keyvalue.KeyValueContainerData;
import org.apache.hadoop.ozone.container.keyvalue.helpers.BlockUtils;
import org.apache.hadoop.ozone.om.OMMetadataManager;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OmFailoverProxyUtil;
import org.apache.hadoop.ozone.om.OzoneManager;
import org.apache.hadoop.ozone.om.ResolvedBucket;
@@ -187,7 +188,6 @@
import org.apache.hadoop.ozone.om.ratis.OzoneManagerStateMachine;
import org.apache.hadoop.ozone.protocol.proto.OzoneManagerProtocolProtos;
import org.apache.hadoop.ozone.security.acl.IAccessAuthorizer.ACLType;
-import org.apache.hadoop.ozone.security.acl.OzoneAclConfig;
import org.apache.hadoop.ozone.security.acl.OzoneObj;
import org.apache.hadoop.ozone.security.acl.OzoneObjInfo;
import org.apache.hadoop.security.UserGroupInformation;
@@ -4108,13 +4108,11 @@ private List<OzoneAcl> getAclList(OzoneConfiguration
conf)
List<OzoneAcl> listOfAcls = new ArrayList<>();
//User ACL
UserGroupInformation ugi = UserGroupInformation.getCurrentUser();
- OzoneAclConfig aclConfig = conf.getObject(OzoneAclConfig.class);
- ACLType[] userRights = aclConfig.getUserDefaultRights();
- ACLType[] groupRights = aclConfig.getGroupDefaultRights();
+ OmConfig omConfig = conf.getObject(OmConfig.class);
- listOfAcls.add(OzoneAcl.of(USER, ugi.getShortUserName(), ACCESS,
userRights));
+ listOfAcls.add(OzoneAcl.of(USER, ugi.getShortUserName(), ACCESS,
omConfig.getUserDefaultRights()));
//Group ACL of the User
- listOfAcls.add(OzoneAcl.of(GROUP, ugi.getPrimaryGroupName(), ACCESS,
groupRights));
+ listOfAcls.add(OzoneAcl.of(GROUP, ugi.getPrimaryGroupName(), ACCESS,
omConfig.getGroupDefaultRights()));
return listOfAcls;
}
diff --git
a/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/om/TestRecursiveAclWithFSO.java
b/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/om/TestRecursiveAclWithFSO.java
index c609de6eea3..1f652cd1220 100644
---
a/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/om/TestRecursiveAclWithFSO.java
+++
b/hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/om/TestRecursiveAclWithFSO.java
@@ -19,7 +19,6 @@
import static org.apache.hadoop.ozone.TestDataUtil.createKey;
import static org.apache.hadoop.ozone.security.acl.OzoneObj.StoreType.OZONE;
-import static org.junit.jupiter.api.Assertions.assertArrayEquals;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.junit.jupiter.api.Assertions.assertThrows;
import static org.junit.jupiter.api.Assertions.assertTrue;
@@ -41,7 +40,6 @@
import org.apache.hadoop.ozone.client.OzoneVolume;
import org.apache.hadoop.ozone.client.protocol.ClientProtocol;
import org.apache.hadoop.ozone.om.exceptions.OMException;
-import org.apache.hadoop.ozone.security.acl.OzoneAclConfig;
import org.apache.hadoop.ozone.security.acl.OzoneObj;
import org.apache.hadoop.ozone.security.acl.OzoneObjInfo;
import org.apache.hadoop.security.UserGroupInformation;
@@ -213,12 +211,12 @@ public void testKeyDefaultACL() throws Exception {
List<OzoneAcl> acls = objectStore.getAcl(obj);
assertEquals(3, acls.size());
assertEquals(AclTests.ADMIN_UGI.getShortUserName(),
acls.get(0).getName());
- OzoneAclConfig aclConfig =
cluster().getConf().getObject(OzoneAclConfig.class);
- assertArrayEquals(aclConfig.getUserDefaultRights(),
acls.get(0).getAclList().toArray());
+ OmConfig omConfig = cluster().getOzoneManager().getConfig();
+ assertEquals(omConfig.getUserDefaultRights(), acls.get(0).getAclSet());
assertEquals(AclTests.ADMIN_UGI.getPrimaryGroupName(),
acls.get(1).getName());
- assertArrayEquals(aclConfig.getGroupDefaultRights(),
acls.get(1).getAclList().toArray());
+ assertEquals(omConfig.getGroupDefaultRights(), acls.get(1).getAclSet());
assertEquals("WORLD", acls.get(2).getName());
- assertArrayEquals(aclConfig.getUserDefaultRights(),
acls.get(2).getAclList().toArray());
+ assertEquals(omConfig.getUserDefaultRights(), acls.get(2).getAclSet());
}
// set LoginUser as user3
@@ -239,10 +237,10 @@ public void testKeyDefaultACL() throws Exception {
List<OzoneAcl> acls = objectStore.getAcl(obj);
assertEquals(2, acls.size());
assertEquals(user3.getShortUserName(), acls.get(0).getName());
- OzoneAclConfig aclConfig =
cluster().getConf().getObject(OzoneAclConfig.class);
- assertArrayEquals(aclConfig.getUserDefaultRights(),
acls.get(0).getAclList().toArray());
+ OmConfig omConfig = cluster().getOzoneManager().getConfig();
+ assertEquals(omConfig.getUserDefaultRights(), acls.get(0).getAclSet());
assertEquals(user3.getPrimaryGroupName(), acls.get(1).getName());
- assertArrayEquals(aclConfig.getGroupDefaultRights(),
acls.get(1).getAclList().toArray());
+ assertEquals(omConfig.getGroupDefaultRights(), acls.get(1).getAclSet());
// verify key default ACLs
int length = 10;
@@ -256,9 +254,9 @@ public void testKeyDefaultACL() throws Exception {
acls = objectStore.getAcl(obj);
assertEquals(2, acls.size());
assertEquals(user3.getShortUserName(), acls.get(0).getName());
- assertArrayEquals(aclConfig.getUserDefaultRights(),
acls.get(0).getAclList().toArray());
+ assertEquals(omConfig.getUserDefaultRights(), acls.get(0).getAclSet());
assertEquals(user3.getPrimaryGroupName(), acls.get(1).getName());
- assertArrayEquals(aclConfig.getGroupDefaultRights(),
acls.get(1).getAclList().toArray());
+ assertEquals(omConfig.getGroupDefaultRights(), acls.get(1).getAclSet());
}
}
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/bucket/OMBucketCreateRequest.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/bucket/OMBucketCreateRequest.java
index 0ac5f509407..09d7c20e457 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/bucket/OMBucketCreateRequest.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/bucket/OMBucketCreateRequest.java
@@ -323,7 +323,7 @@ private void addDefaultAcls(OmBucketInfo omBucketInfo,
OmVolumeArgs omVolumeArgs, OzoneManager ozoneManager) throws OMException
{
List<OzoneAcl> acls = new ArrayList<>();
// Add default acls
- acls.addAll(getDefaultAclList(createUGIForApi(),
ozoneManager.getConfiguration()));
+ acls.addAll(getDefaultAclList(createUGIForApi(),
ozoneManager.getConfig()));
if (omBucketInfo.getAcls() != null) {
// Add acls for bucket creator.
acls.addAll(omBucketInfo.getAcls());
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMDirectoryCreateRequest.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMDirectoryCreateRequest.java
index 311017bed1b..9c8d7c2dc9b 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMDirectoryCreateRequest.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMDirectoryCreateRequest.java
@@ -181,7 +181,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
dirKeyInfo = createDirectoryKeyInfoWithACL(keyName, keyArgs, baseObjId,
omBucketInfo, omPathInfo, trxnLogIndex,
- ozoneManager.getDefaultReplicationConfig(),
ozoneManager.getConfiguration());
+ ozoneManager.getDefaultReplicationConfig(),
ozoneManager.getConfig());
missingParentInfos = getAllParentInfo(ozoneManager, keyArgs,
missingParents, omBucketInfo, omPathInfo, trxnLogIndex);
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMDirectoryCreateRequestWithFSO.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMDirectoryCreateRequestWithFSO.java
index 3ad7cbd17fe..eca6554c504 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMDirectoryCreateRequestWithFSO.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMDirectoryCreateRequestWithFSO.java
@@ -152,7 +152,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
omPathInfo.getLeafNodeName(),
keyArgs, omPathInfo.getLeafNodeObjectId(),
omPathInfo.getLastKnownParentId(), trxnLogIndex,
- omBucketInfo, omPathInfo, ozoneManager.getConfiguration());
+ omBucketInfo, omPathInfo, ozoneManager.getConfig());
OMFileRequest.addDirectoryTableCacheEntries(omMetadataManager,
volumeId, bucketId, trxnLogIndex,
missingParentInfos, dirInfo);
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMFileCreateRequest.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMFileCreateRequest.java
index 1d65363463a..f8747ac07dd 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMFileCreateRequest.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMFileCreateRequest.java
@@ -244,7 +244,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
keyArgs.getDataSize(), locations, getFileEncryptionInfo(keyArgs),
ozoneManager.getPrefixManager(), omBucketInfo, pathInfo,
trxnLogIndex,
ozoneManager.getObjectIdFromTxId(trxnLogIndex),
- repConfig, ozoneManager.getConfiguration());
+ repConfig, ozoneManager.getConfig());
validateEncryptionKeyInfo(omBucketInfo, keyArgs);
long openVersion = omKeyInfo.getLatestVersionLocations().getVersion();
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMFileCreateRequestWithFSO.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMFileCreateRequestWithFSO.java
index 6b9a9d76aae..3f5b16ec363 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMFileCreateRequestWithFSO.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/file/OMFileCreateRequestWithFSO.java
@@ -168,7 +168,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
getFileEncryptionInfo(keyArgs), ozoneManager.getPrefixManager(),
bucketInfo, pathInfoFSO, trxnLogIndex,
pathInfoFSO.getLeafNodeObjectId(),
- repConfig, ozoneManager.getConfiguration());
+ repConfig, ozoneManager.getConfig());
validateEncryptionKeyInfo(bucketInfo, keyArgs);
long openVersion = omFileInfo.getLatestVersionLocations().getVersion();
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyCreateRequest.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyCreateRequest.java
index 8874fc4f582..477b9d8a928 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyCreateRequest.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyCreateRequest.java
@@ -274,7 +274,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
keyArgs.getDataSize(), locations, getFileEncryptionInfo(keyArgs),
ozoneManager.getPrefixManager(), bucketInfo, pathInfo, trxnLogIndex,
ozoneManager.getObjectIdFromTxId(trxnLogIndex),
- replicationConfig, ozoneManager.getConfiguration());
+ replicationConfig, ozoneManager.getConfig());
validateEncryptionKeyInfo(bucketInfo, keyArgs);
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyCreateRequestWithFSO.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyCreateRequestWithFSO.java
index 806a640b9a9..3672899163b 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyCreateRequestWithFSO.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyCreateRequestWithFSO.java
@@ -152,7 +152,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
getFileEncryptionInfo(keyArgs), ozoneManager.getPrefixManager(),
bucketInfo, pathInfoFSO, trxnLogIndex,
pathInfoFSO.getLeafNodeObjectId(),
- repConfig, ozoneManager.getConfiguration());
+ repConfig, ozoneManager.getConfig());
validateEncryptionKeyInfo(bucketInfo, keyArgs);
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyRequest.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyRequest.java
index 0a1d4215e84..3242f0f436a 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyRequest.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/key/OMKeyRequest.java
@@ -53,7 +53,6 @@
import org.apache.hadoop.hdds.client.ContainerBlockID;
import org.apache.hadoop.hdds.client.ECReplicationConfig;
import org.apache.hadoop.hdds.client.ReplicationConfig;
-import org.apache.hadoop.hdds.conf.OzoneConfiguration;
import org.apache.hadoop.hdds.protocol.proto.HddsProtos;
import org.apache.hadoop.hdds.scm.container.common.helpers.AllocatedBlock;
import org.apache.hadoop.hdds.scm.container.common.helpers.ExcludeList;
@@ -68,6 +67,7 @@
import org.apache.hadoop.ozone.om.OMConfigKeys;
import org.apache.hadoop.ozone.om.OMMetadataManager;
import org.apache.hadoop.ozone.om.OMMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OzoneManager;
import org.apache.hadoop.ozone.om.PrefixManager;
import org.apache.hadoop.ozone.om.ResolvedBucket;
@@ -403,7 +403,7 @@ public EncryptedKeyVersion run() throws IOException {
protected List<OzoneAcl> getAclsForKey(KeyArgs keyArgs,
OmBucketInfo bucketInfo, OMFileRequest.OMPathInfo omPathInfo,
- PrefixManager prefixManager, OzoneConfiguration config) throws
OMException {
+ PrefixManager prefixManager, OmConfig config) throws OMException {
List<OzoneAcl> acls = new ArrayList<>();
acls.addAll(getDefaultAclList(createUGIForApi(), config));
@@ -463,7 +463,7 @@ protected List<OzoneAcl> getAclsForKey(KeyArgs keyArgs,
* @return Acls which inherited parent DEFAULT and keyArgs ACCESS acls.
*/
protected List<OzoneAcl> getAclsForDir(KeyArgs keyArgs, OmBucketInfo
bucketInfo,
- OMFileRequest.OMPathInfo omPathInfo, OzoneConfiguration config) throws
OMException {
+ OMFileRequest.OMPathInfo omPathInfo, OmConfig config) throws OMException
{
// Acls inherited from parent or bucket will convert to DEFAULT scope
List<OzoneAcl> acls = new ArrayList<>();
// add default ACLs
@@ -528,7 +528,7 @@ protected List<OmDirectoryInfo> getAllMissingParentDirInfo(
missingKey);
OmDirectoryInfo dirInfo = createDirectoryInfoWithACL(missingKey,
keyArgs, nextObjId, lastKnownParentId, trxnLogIndex,
- bucketInfo, pathInfo, ozoneManager.getConfiguration());
+ bucketInfo, pathInfo, ozoneManager.getConfig());
objectCount++;
missingParentInfos.add(dirInfo);
@@ -584,7 +584,7 @@ protected List<OmKeyInfo> getAllParentInfo(OzoneManager
ozoneManager,
OmKeyInfo parentKeyInfo =
createDirectoryKeyInfoWithACL(missingKey, keyArgs, nextObjId,
bucketInfo, omPathInfo, trxnLogIndex,
- ozoneManager.getDefaultReplicationConfig(),
ozoneManager.getConfiguration());
+ ozoneManager.getDefaultReplicationConfig(),
ozoneManager.getConfig());
objectCount++;
missingParentInfos.add(parentKeyInfo);
@@ -609,7 +609,7 @@ protected OmDirectoryInfo createDirectoryInfoWithACL(
String dirName, KeyArgs keyArgs, long objectId,
long parentObjectId, long transactionIndex,
OmBucketInfo bucketInfo, OMFileRequest.OMPathInfo omPathInfo,
- OzoneConfiguration config) throws OMException {
+ OmConfig config) throws OMException {
return OmDirectoryInfo.newBuilder()
.setName(dirName)
.setOwner(keyArgs.getOwnerName())
@@ -640,7 +640,7 @@ protected OmDirectoryInfo createDirectoryInfoWithACL(
protected OmKeyInfo createDirectoryKeyInfoWithACL(String keyName,
KeyArgs keyArgs, long objectId, OmBucketInfo bucketInfo,
OMFileRequest.OMPathInfo omPathInfo, long transactionIndex,
- ReplicationConfig serverDefaultReplConfig, OzoneConfiguration config)
throws OMException {
+ ReplicationConfig serverDefaultReplConfig, OmConfig config) throws
OMException {
return dirKeyInfoBuilderNoACL(keyName, keyArgs, objectId,
serverDefaultReplConfig)
.setAcls(getAclsForDir(keyArgs, bucketInfo, omPathInfo, config))
@@ -1006,7 +1006,7 @@ protected OmKeyInfo prepareKeyInfo(
@Nullable OmBucketInfo omBucketInfo,
OMFileRequest.OMPathInfo omPathInfo,
long transactionLogIndex, long objectID,
- ReplicationConfig replicationConfig, OzoneConfiguration config)
+ ReplicationConfig replicationConfig, OmConfig config)
throws IOException {
return prepareFileInfo(omMetadataManager, keyArgs, dbKeyInfo, size,
@@ -1030,7 +1030,7 @@ protected OmKeyInfo prepareFileInfo(
OMFileRequest.OMPathInfo omPathInfo,
long transactionLogIndex, long objectID,
ReplicationConfig replicationConfig,
- OzoneConfiguration config) throws IOException {
+ OmConfig config) throws IOException {
if (keyArgs.getIsMultipartKey()) {
return prepareMultipartFileInfo(omMetadataManager, keyArgs,
size, locations, encInfo, prefixManager, omBucketInfo,
@@ -1095,7 +1095,7 @@ protected OmKeyInfo createFileInfo(
@Nullable OmBucketInfo omBucketInfo,
OMFileRequest.OMPathInfo omPathInfo,
long transactionLogIndex, long objectID,
- OzoneConfiguration config) throws OMException {
+ OmConfig config) throws OMException {
OmKeyInfo.Builder builder = new OmKeyInfo.Builder();
builder.setVolumeName(keyArgs.getVolumeName())
.setBucketName(keyArgs.getBucketName())
@@ -1143,7 +1143,7 @@ private OmKeyInfo prepareMultipartFileInfo(
@Nullable OmBucketInfo omBucketInfo,
OMFileRequest.OMPathInfo omPathInfo,
@Nonnull long transactionLogIndex, long objectID,
- OzoneConfiguration configuration) throws IOException {
+ OmConfig configuration) throws IOException {
Preconditions.checkArgument(args.getMultipartNumber() > 0,
"PartNumber Should be greater than zero");
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3InitiateMultipartUploadRequest.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3InitiateMultipartUploadRequest.java
index a87eb4ae596..519ed3024cb 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3InitiateMultipartUploadRequest.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3InitiateMultipartUploadRequest.java
@@ -207,7 +207,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
.setOmKeyLocationInfos(Collections.singletonList(
new OmKeyLocationInfoGroup(0, new ArrayList<>(), true)))
.setAcls(getAclsForKey(keyArgs, bucketInfo, pathInfo,
- ozoneManager.getPrefixManager(),
ozoneManager.getConfiguration()))
+ ozoneManager.getPrefixManager(), ozoneManager.getConfig()))
.setObjectID(objectID)
.setUpdateID(transactionLogIndex)
.setFileEncryptionInfo(keyArgs.hasFileEncryptionInfo() ?
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3InitiateMultipartUploadRequestWithFSO.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3InitiateMultipartUploadRequestWithFSO.java
index c4110c1ea41..3dcbcc96943 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3InitiateMultipartUploadRequestWithFSO.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3InitiateMultipartUploadRequestWithFSO.java
@@ -181,7 +181,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
.setOmKeyLocationInfos(Collections.singletonList(
new OmKeyLocationInfoGroup(0, new ArrayList<>(), true)))
.setAcls(getAclsForKey(keyArgs, bucketInfo, pathInfoFSO,
- ozoneManager.getPrefixManager(),
ozoneManager.getConfiguration()))
+ ozoneManager.getPrefixManager(), ozoneManager.getConfig()))
.setObjectID(pathInfoFSO.getLeafNodeObjectId())
.setUpdateID(transactionLogIndex)
.setFileEncryptionInfo(keyArgs.hasFileEncryptionInfo() ?
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3MultipartUploadCompleteRequest.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3MultipartUploadCompleteRequest.java
index 09685eacd6d..4355dc13b2a 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3MultipartUploadCompleteRequest.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/s3/multipart/S3MultipartUploadCompleteRequest.java
@@ -230,7 +230,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
.setOmKeyLocationInfos(Collections.singletonList(
new OmKeyLocationInfoGroup(0, new ArrayList<>(), true)))
.setAcls(getAclsForKey(keyArgs, omBucketInfo, pathInfoFSO,
- ozoneManager.getPrefixManager(),
ozoneManager.getConfiguration()))
+ ozoneManager.getPrefixManager(), ozoneManager.getConfig()))
.setObjectID(pathInfoFSO.getLeafNodeObjectId())
.setUpdateID(trxnLogIndex)
.setFileEncryptionInfo(keyArgs.hasFileEncryptionInfo() ?
diff --git
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/volume/OMVolumeCreateRequest.java
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/volume/OMVolumeCreateRequest.java
index 6507351522a..43afb3f7359 100644
---
a/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/volume/OMVolumeCreateRequest.java
+++
b/hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/request/volume/OMVolumeCreateRequest.java
@@ -156,7 +156,7 @@ public OMClientResponse validateAndUpdateCache(OzoneManager
ozoneManager, Execut
// Add default ACL for volume
List<OzoneAcl> listOfAcls =
getDefaultAclList(UserGroupInformation.createRemoteUser(owner),
- ozoneManager.getConfiguration());
+ ozoneManager.getConfig());
// ACLs from VolumeArgs
if (omVolumeArgs.getAcls() != null) {
listOfAcls.addAll(omVolumeArgs.getAcls());
diff --git
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/ratis/TestOzoneManagerDoubleBufferWithOMResponse.java
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/ratis/TestOzoneManagerDoubleBufferWithOMResponse.java
index cae1a33b703..3f1d1df52f3 100644
---
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/ratis/TestOzoneManagerDoubleBufferWithOMResponse.java
+++
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/ratis/TestOzoneManagerDoubleBufferWithOMResponse.java
@@ -47,6 +47,7 @@
import org.apache.hadoop.ozone.om.OMConfigKeys;
import org.apache.hadoop.ozone.om.OMMetadataManager;
import org.apache.hadoop.ozone.om.OMMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OmMetadataManagerImpl;
import org.apache.hadoop.ozone.om.OzoneManager;
import org.apache.hadoop.ozone.om.execution.flowcontrol.ExecutionContext;
@@ -104,6 +105,7 @@ public void setup() throws IOException {
auditLogger = mock(AuditLogger.class);
when(ozoneManager.getAuditLogger()).thenReturn(auditLogger);
when(ozoneManager.getConfiguration()).thenReturn(ozoneConfiguration);
+
when(ozoneManager.getConfig()).thenReturn(ozoneConfiguration.getObject(OmConfig.class));
doNothing().when(auditLogger).logWrite(any(AuditMessage.class));
doubleBuffer = OzoneManagerDoubleBuffer.newBuilder()
.setOmMetadataManager(omMetadataManager)
diff --git
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/bucket/TestBucketRequest.java
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/bucket/TestBucketRequest.java
index 81e227bbce0..018e60633a5 100644
---
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/bucket/TestBucketRequest.java
+++
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/bucket/TestBucketRequest.java
@@ -32,6 +32,7 @@
import org.apache.hadoop.ozone.om.OMConfigKeys;
import org.apache.hadoop.ozone.om.OMMetadataManager;
import org.apache.hadoop.ozone.om.OMMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OmMetadataManagerImpl;
import org.apache.hadoop.ozone.om.OzoneManager;
import org.apache.hadoop.ozone.om.ResolvedBucket;
@@ -63,6 +64,7 @@ public void setup() throws Exception {
ozoneConfiguration.set(OMConfigKeys.OZONE_OM_DB_DIRS,
folder.toAbsolutePath().toString());
when(ozoneManager.getConfiguration()).thenReturn(ozoneConfiguration);
+
when(ozoneManager.getConfig()).thenReturn(ozoneConfiguration.getObject(OmConfig.class));
omMetadataManager = new OmMetadataManagerImpl(ozoneConfiguration,
ozoneManager);
when(ozoneManager.getMetrics()).thenReturn(omMetrics);
diff --git
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/file/TestOMDirectoryCreateRequest.java
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/file/TestOMDirectoryCreateRequest.java
index 65cc1c0d7e5..1cdf808ff3d 100644
---
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/file/TestOMDirectoryCreateRequest.java
+++
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/file/TestOMDirectoryCreateRequest.java
@@ -51,6 +51,7 @@
import org.apache.hadoop.ozone.om.OMConfigKeys;
import org.apache.hadoop.ozone.om.OMMetadataManager;
import org.apache.hadoop.ozone.om.OMMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OmMetadataManagerImpl;
import org.apache.hadoop.ozone.om.OzoneManager;
import org.apache.hadoop.ozone.om.ResolvedBucket;
@@ -97,6 +98,7 @@ public void setup() throws Exception {
omMetadataManager = new OmMetadataManagerImpl(ozoneConfiguration,
ozoneManager);
when(ozoneManager.getConfiguration()).thenReturn(ozoneConfiguration);
+
when(ozoneManager.getConfig()).thenReturn(ozoneConfiguration.getObject(OmConfig.class));
when(ozoneManager.getMetrics()).thenReturn(omMetrics);
when(ozoneManager.getMetadataManager()).thenReturn(omMetadataManager);
AuditLogger auditLogger = mock(AuditLogger.class);
diff --git
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/file/TestOMDirectoryCreateRequestWithFSO.java
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/file/TestOMDirectoryCreateRequestWithFSO.java
index 0c36d57da4c..2f8fdffc5f5 100644
---
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/file/TestOMDirectoryCreateRequestWithFSO.java
+++
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/file/TestOMDirectoryCreateRequestWithFSO.java
@@ -51,6 +51,7 @@
import org.apache.hadoop.ozone.om.OMConfigKeys;
import org.apache.hadoop.ozone.om.OMMetadataManager;
import org.apache.hadoop.ozone.om.OMMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OmMetadataManagerImpl;
import org.apache.hadoop.ozone.om.OzoneManager;
import org.apache.hadoop.ozone.om.ResolvedBucket;
@@ -97,6 +98,7 @@ public void setup() throws Exception {
omMetadataManager = new OmMetadataManagerImpl(ozoneConfiguration,
ozoneManager);
when(ozoneManager.getConfiguration()).thenReturn(ozoneConfiguration);
+
when(ozoneManager.getConfig()).thenReturn(ozoneConfiguration.getObject(OmConfig.class));
when(ozoneManager.getMetrics()).thenReturn(omMetrics);
when(ozoneManager.getMetadataManager()).thenReturn(omMetadataManager);
auditLogger = mock(AuditLogger.class);
diff --git
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/key/TestOMKeyCreateRequest.java
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/key/TestOMKeyCreateRequest.java
index 2a763270517..78d30550e82 100644
---
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/key/TestOMKeyCreateRequest.java
+++
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/key/TestOMKeyCreateRequest.java
@@ -58,6 +58,7 @@
import org.apache.hadoop.hdds.protocol.proto.HddsProtos.KeyValue;
import org.apache.hadoop.ozone.OzoneAcl;
import org.apache.hadoop.ozone.OzoneConsts;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.PrefixManager;
import org.apache.hadoop.ozone.om.PrefixManagerImpl;
import org.apache.hadoop.ozone.om.exceptions.OMException;
@@ -783,6 +784,7 @@ public void testKeyCreateWithFileSystemPathsEnabled(
OzoneConfiguration configuration = getOzoneConfiguration();
configuration.setBoolean(OZONE_OM_ENABLE_FILESYSTEM_PATHS, true);
when(ozoneManager.getConfiguration()).thenReturn(configuration);
+
when(ozoneManager.getConfig()).thenReturn(configuration.getObject(OmConfig.class));
when(ozoneManager.getEnableFileSystemPaths()).thenReturn(true);
when(ozoneManager.getOzoneLockProvider()).thenReturn(
new OzoneLockProvider(setKeyPathLock, true));
diff --git
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/key/TestOMKeyRequest.java
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/key/TestOMKeyRequest.java
index dae04b2e0ed..8ddb1a23d13 100644
---
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/key/TestOMKeyRequest.java
+++
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/key/TestOMKeyRequest.java
@@ -66,6 +66,7 @@
import org.apache.hadoop.ozone.om.OMMetadataManager;
import org.apache.hadoop.ozone.om.OMMetrics;
import org.apache.hadoop.ozone.om.OMPerformanceMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OmMetadataManagerImpl;
import org.apache.hadoop.ozone.om.OmMetadataReader;
import org.apache.hadoop.ozone.om.OmSnapshotManager;
@@ -153,6 +154,7 @@ public void setup() throws Exception {
when(ozoneManager.getDeletionMetrics()).thenReturn(delMetrics);
when(ozoneManager.getMetadataManager()).thenReturn(omMetadataManager);
when(ozoneManager.getConfiguration()).thenReturn(ozoneConfiguration);
+
when(ozoneManager.getConfig()).thenReturn(ozoneConfiguration.getObject(OmConfig.class));
OMLayoutVersionManager lvm = mock(OMLayoutVersionManager.class);
when(lvm.isAllowed(anyString())).thenReturn(true);
when(ozoneManager.getVersionManager()).thenReturn(lvm);
diff --git
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/s3/multipart/TestS3MultipartRequest.java
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/s3/multipart/TestS3MultipartRequest.java
index a2883678288..ce224d9895a 100644
---
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/s3/multipart/TestS3MultipartRequest.java
+++
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/s3/multipart/TestS3MultipartRequest.java
@@ -40,6 +40,7 @@
import org.apache.hadoop.ozone.om.OMConfigKeys;
import org.apache.hadoop.ozone.om.OMMetadataManager;
import org.apache.hadoop.ozone.om.OMMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OmMetadataManagerImpl;
import org.apache.hadoop.ozone.om.OmMetadataReader;
import org.apache.hadoop.ozone.om.OzoneManager;
@@ -110,6 +111,7 @@ public void setup() throws Exception {
when(lvm.getMetadataLayoutVersion()).thenReturn(0);
when(ozoneManager.getVersionManager()).thenReturn(lvm);
when(ozoneManager.getConfiguration()).thenReturn(ozoneConfiguration);
+
when(ozoneManager.getConfig()).thenReturn(ozoneConfiguration.getObject(OmConfig.class));
}
@AfterEach
diff --git
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/volume/TestOMVolumeRequest.java
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/volume/TestOMVolumeRequest.java
index 80b3d26f339..9a4b4e76c6d 100644
---
a/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/volume/TestOMVolumeRequest.java
+++
b/hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/om/request/volume/TestOMVolumeRequest.java
@@ -31,6 +31,7 @@
import org.apache.hadoop.ozone.om.OMConfigKeys;
import org.apache.hadoop.ozone.om.OMMetadataManager;
import org.apache.hadoop.ozone.om.OMMetrics;
+import org.apache.hadoop.ozone.om.OmConfig;
import org.apache.hadoop.ozone.om.OmMetadataManagerImpl;
import org.apache.hadoop.ozone.om.OzoneManager;
import org.apache.hadoop.ozone.om.upgrade.OMLayoutVersionManager;
@@ -75,6 +76,7 @@ public void setup() throws Exception {
when(ozoneManager.getAuditLogger()).thenReturn(auditLogger);
doNothing().when(auditLogger).logWrite(any(AuditMessage.class));
when(ozoneManager.getConfiguration()).thenReturn(ozoneConfiguration);
+
when(ozoneManager.getConfig()).thenReturn(ozoneConfiguration.getObject(OmConfig.class));
}
@AfterEach
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]