Package | Description |
---|---|
org.apache.hadoop.fs.s3a |
S3A Filesystem.
|
org.apache.hadoop.fs.s3a.auth |
Authentication and permissions support.
|
org.apache.hadoop.fs.s3a.auth.delegation |
Extensible delegation token support for the S3A connector.
|
org.apache.hadoop.fs.s3a.s3guard |
This package contains classes related to S3Guard: a feature of S3A to mask
the eventual consistency behavior of S3 and optimize access patterns by
coordinating with a strongly consistent external store for file system
metadata.
|
Modifier and Type | Method and Description |
---|---|
List<RoleModel.Statement> |
S3AFileSystem.listAWSPolicyRules(Set<AWSPolicyProvider.AccessLevel> access)
Build the AWS policy for restricted access to the resources needed
by this bucket.
|
Modifier and Type | Field and Description |
---|---|
static RoleModel.Statement |
RolePolicies.STATEMENT_ALL_DDB
Statement to allow all DDB access.
|
static RoleModel.Statement |
RolePolicies.STATEMENT_ALL_S3
Allow all S3 Operations.
|
static RoleModel.Statement |
RolePolicies.STATEMENT_ALL_S3_GET_BUCKET_LOCATION
The s3:GetBucketLocation permission is for all buckets, not for
any named bucket, which complicates permissions.
|
static RoleModel.Statement |
RolePolicies.STATEMENT_ALLOW_SSE_KMS_READ
Statement to allow read access to KMS keys, so the ability
to read SSE-KMS data,, but not decrypt it.
|
static RoleModel.Statement |
RolePolicies.STATEMENT_ALLOW_SSE_KMS_RW
Statement to allow KMS R/W access access, so full use of
SSE-KMS.
|
static RoleModel.Statement |
RolePolicies.STATEMENT_S3GUARD_CLIENT
Statement to allow all client operations needed for S3Guard,
but none of the admin operations.
|
Modifier and Type | Field and Description |
---|---|
List<RoleModel.Statement> |
RoleModel.Policy.statement |
Modifier and Type | Method and Description |
---|---|
RoleModel.Statement |
RoleModel.Statement.addActions(Collection<String> actions) |
RoleModel.Statement |
RoleModel.Statement.addActions(String... actions) |
RoleModel.Statement |
RoleModel.Statement.addResources(Collection<String> resources)
Add a list of resources.
|
RoleModel.Statement |
RoleModel.Statement.addResources(String... resources) |
static RoleModel.Statement |
RolePolicies.allowAllDynamoDBOperations(String tableArn) |
static RoleModel.Statement |
RolePolicies.allowS3GuardClientOperations(String tableArn) |
RoleModel.Statement |
RoleModel.Statement.setAllowed(boolean f) |
static RoleModel.Statement |
RoleModel.statement(boolean allow,
org.apache.hadoop.fs.Path path,
boolean isDirectory,
boolean wildcards,
Collection<String> actions)
Create a statement.
|
static RoleModel.Statement |
RoleModel.statement(boolean allow,
org.apache.hadoop.fs.Path path,
boolean isDirectory,
boolean wildcards,
String... actions)
Create a statement.
|
static RoleModel.Statement |
RoleModel.statement(boolean allow,
String scope,
Collection<String> actions)
Create a statement.
|
static RoleModel.Statement |
RoleModel.statement(boolean allow,
String scope,
String... actions)
Create a statement.
|
Modifier and Type | Method and Description |
---|---|
static List<RoleModel.Statement> |
RolePolicies.allowS3Operations(String bucket,
boolean write)
From an S3 bucket name, build an ARN to refer to it.
|
Modifier and Type | Method and Description |
---|---|
void |
RoleModel.Policy.add(RoleModel.Statement stat)
Add a single statement.
|
static RoleModel.Policy |
RoleModel.policy(RoleModel.Statement... statements)
From a set of statements, create a policy.
|
Modifier and Type | Method and Description |
---|---|
void |
RoleModel.Policy.add(Collection<RoleModel.Statement> statements)
Add a collection of statements.
|
static RoleModel.Policy |
RoleModel.policy(List<RoleModel.Statement> statements)
From a set of statements, create a policy.
|
Constructor and Description |
---|
Policy(RoleModel.Statement... statements) |
Constructor and Description |
---|
Policy(List<RoleModel.Statement> statement) |
Modifier and Type | Method and Description |
---|---|
List<RoleModel.Statement> |
AWSPolicyProvider.listAWSPolicyRules(Set<AWSPolicyProvider.AccessLevel> access)
Get the AWS policy statements required for accessing this service.
|
Modifier and Type | Method and Description |
---|---|
List<RoleModel.Statement> |
DynamoDBMetadataStore.listAWSPolicyRules(Set<AWSPolicyProvider.AccessLevel> access)
The administrative policy includes all DDB table operations;
application access is restricted to those operations S3Guard operations
require when working with data in a guarded bucket.
|
Copyright © 2008–2020 Apache Software Foundation. All rights reserved.