Skip to content

Commit 93e733d

Browse files
author
Fabian Morgan
committed
pr review updates for mneethiraj: remove additional s3 prefix
1 parent 83175c1 commit 93e733d

2 files changed

Lines changed: 8 additions & 8 deletions

File tree

hadoop-ozone/common/src/test/java/org/apache/hadoop/ozone/security/acl/TestAssumeRoleRequest.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ public void testConstructorAndGetters() {
6262
assertEquals(permissions, grant.getPermissions());
6363
assertEquals(s3Actions, grant.getS3Actions());
6464
// Ensure the s3 actions are not modifiable
65-
assertThrows(UnsupportedOperationException.class, () -> grant.getS3Actions().add("s3:GetObject"));
65+
assertThrows(UnsupportedOperationException.class, () -> grant.getS3Actions().add("GetObject"));
6666

6767
assertEquals("host", assumeRoleRequest1.getHost());
6868
assertNull(assumeRoleRequest1.getIp());
@@ -94,8 +94,8 @@ public void testGrantsWithS3Actions() {
9494
final Set<IAccessAuthorizer.ACLType> permissions = Collections.singleton(IAccessAuthorizer.ACLType.READ);
9595

9696
final Set<String> s3Actions = new LinkedHashSet<>();
97-
s3Actions.add("s3:GetObject");
98-
s3Actions.add("s3:PutObject");
97+
s3Actions.add("GetObject");
98+
s3Actions.add("PutObject");
9999

100100
final AssumeRoleRequest.OzoneGrant grantWithActions = new AssumeRoleRequest.OzoneGrant(
101101
objects, permissions, s3Actions);

hadoop-ozone/ozone-manager/src/test/java/org/apache/hadoop/ozone/security/acl/TestRequestContext.java

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ public void testToBuilderWithNoModifications() {
6161
final String serviceId = "testServiceId";
6262
final String ownerName = "testOwner";
6363
final String sessionPolicy = "{\"Statement\":[{\"Effect\":\"Allow\"}]}";
64-
final String s3IamAction = "s3:GetObject";
64+
final String s3Action = "GetObject";
6565

6666
final RequestContext original = RequestContext.newBuilder()
6767
.setHost(host)
@@ -72,7 +72,7 @@ public void testToBuilderWithNoModifications() {
7272
.setOwnerName(ownerName)
7373
.setRecursiveAccessCheck(true)
7474
.setSessionPolicy(sessionPolicy)
75-
.setS3Action(s3IamAction)
75+
.setS3Action(s3Action)
7676
.build();
7777

7878
// Use toBuilder to create a new builder
@@ -90,7 +90,7 @@ public void testToBuilderWithNoModifications() {
9090
assertTrue(original.isRecursiveAccessCheck(), "RecursiveAccessCheck should be preserved");
9191
assertEquals(original.getSessionPolicy(), requestCtxFromToBuilder.getSessionPolicy(),
9292
"SessionPolicy should be preserved");
93-
assertEquals(original.getS3Action(), requestCtxFromToBuilder.getS3Action(), "S3 IAM action should be preserved");
93+
assertEquals(original.getS3Action(), requestCtxFromToBuilder.getS3Action(), "S3 action should be preserved");
9494
}
9595

9696
@Test
@@ -116,7 +116,7 @@ public void testToBuilderWithModifications() {
116116
.setOwnerName("owner2")
117117
.setRecursiveAccessCheck(true)
118118
.setSessionPolicy("{\"Statement\":[]}")
119-
.setS3Action("s3:DeleteObject")
119+
.setS3Action("DeleteObject")
120120
.build();
121121

122122
// Verify original is unchanged
@@ -135,6 +135,6 @@ public void testToBuilderWithModifications() {
135135
assertEquals("owner2", modified.getOwnerName(), "Modified owner should be updated");
136136
assertTrue(modified.isRecursiveAccessCheck(), "Modified recursive flag should be updated");
137137
assertEquals("{\"Statement\":[]}", modified.getSessionPolicy(), "Modified session policy should be updated");
138-
assertEquals("s3:DeleteObject", modified.getS3Action(), "Modified S3 action should be updated");
138+
assertEquals("DeleteObject", modified.getS3Action(), "Modified S3 action should be updated");
139139
}
140140
}

0 commit comments

Comments
 (0)