You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ozone.apache.org by GitBox <gi...@apache.org> on 2021/03/22 14:46:34 UTC

[GitHub] [ozone] avijayanhwx commented on a change in pull request #2059: HDDS-4945. Initial prototype for MultiTenant support for Ozone.

avijayanhwx commented on a change in pull request #2059:
URL: https://github.com/apache/ozone/pull/2059#discussion_r598773473



##########
File path: hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/multitenant/AccessPolicy.java
##########
@@ -0,0 +1,32 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with this
+ * work for additional information regarding copyright ownership.  The ASF
+ * licenses this file to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+ * License for the specific language governing permissions and limitations under
+ * the License.
+ */
+package org.apache.hadoop.ozone.om.multitenant;
+
+import java.security.Principal;
+
+import org.apache.hadoop.hdds.annotation.InterfaceAudience;
+import org.apache.hadoop.hdds.annotation.InterfaceStability;
+
+@InterfaceAudience.LimitedPrivate({"HDFS", "Yarn", "Ranger", "Hive", "HBase"})
+@InterfaceStability.Evolving
+public interface AccessPolicy {
+
+  void createPolicy(String policyJsonString);

Review comment:
       As discussed offline, can we find a way to not use JSON argument in the interface contract? 

##########
File path: hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/multitenant/MultiTenantGateKeeperRangerPlugin.java
##########
@@ -0,0 +1,358 @@
+package org.apache.hadoop.ozone.om.multitenant;
+
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_CREATE_GROUP_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_CREATE_POLICY_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_CREATE_USER_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_DELETE_GROUP_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_DELETE_POLICY_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_DELETE_USER_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_OM_RANGER_HTTPS_ADMIN_API_PASSWD;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_OM_RANGER_HTTPS_ADMIN_API_USER;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_HTTPS_ADDRESS_KEY;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_CONNECTION_REQUEST_TIMEOUT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_CONNECTION_REQUEST_TIMEOUT_DEFAULT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_CONNECTION_TIMEOUT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_CONNECTION_TIMEOUT_DEFAULT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_IGNORE_SERVER_CERT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_IGNORE_SERVER_CERT_DEFAULT;
+
+import java.io.BufferedReader;
+import java.io.IOException;
+import java.io.InputStreamReader;
+import java.io.OutputStream;
+import java.net.URL;
+import java.nio.charset.StandardCharsets;
+import java.util.List;
+import java.util.concurrent.TimeUnit;
+import java.util.stream.Collectors;
+
+import javax.net.ssl.HttpsURLConnection;
+import javax.net.ssl.SSLContext;
+import javax.net.ssl.TrustManager;
+import javax.net.ssl.X509TrustManager;
+
+import org.apache.hadoop.conf.Configuration;
+import org.apache.commons.net.util.Base64;
+import org.apache.hadoop.hdds.conf.OzoneConfiguration;
+import org.apache.hadoop.ozone.om.exceptions.OMException;
+import org.apache.hadoop.ozone.security.acl.IOzoneObj;
+import org.apache.hadoop.ozone.security.acl.RequestContext;
+import org.apache.hadoop.security.authentication.client.AuthenticationException;
+import org.codehaus.jettison.json.JSONObject;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+import com.oracle.javafx.jmx.json.JSONException;
+
+import javafx.util.Pair;
+
+public class MultiTenantGateKeeperRangerPlugin implements
+    MultiTenantGateKeeper {
+  private static final Logger LOG = LoggerFactory
+      .getLogger(MultiTenantGateKeeperRangerPlugin.class);
+
+  private static OzoneConfiguration conf;
+  private static boolean ignoreServerCert = false;
+  private static int connectionTimeout;
+  private static int connectionRequestTimeout;
+  private static String authHeaderValue;
+
+  @Override
+  public void init(Configuration configuration) throws IOException {
+    conf = (OzoneConfiguration)configuration;
+    initializeRangerConnection();
+  }
+
+  private void initializeRangerConnection() {
+    setupRangerConnectionConfig();
+    if (ignoreServerCert) {
+      setupRangerIgnoreServerCertificate();
+    }
+    setupRangerConnectionAuthHeader();
+  }
+
+  private void setupRangerConnectionConfig() {
+    connectionTimeout = (int) conf.getTimeDuration(
+        OZONE_RANGER_OM_CONNECTION_TIMEOUT,
+        conf.get(
+            OZONE_RANGER_OM_CONNECTION_TIMEOUT,
+            OZONE_RANGER_OM_CONNECTION_TIMEOUT_DEFAULT),
+        TimeUnit.MILLISECONDS);
+    connectionRequestTimeout = (int)conf.getTimeDuration(
+        OZONE_RANGER_OM_CONNECTION_REQUEST_TIMEOUT,
+        conf.get(
+            OZONE_RANGER_OM_CONNECTION_REQUEST_TIMEOUT,
+            OZONE_RANGER_OM_CONNECTION_REQUEST_TIMEOUT_DEFAULT),
+        TimeUnit.MILLISECONDS
+    );
+    ignoreServerCert = (boolean) conf.getBoolean(
+        OZONE_RANGER_OM_IGNORE_SERVER_CERT,
+            OZONE_RANGER_OM_IGNORE_SERVER_CERT_DEFAULT);
+  }
+
+  private void setupRangerIgnoreServerCertificate() {
+    // Create a trust manager that does not validate certificate chains
+    TrustManager[] trustAllCerts = new TrustManager[]{
+        new X509TrustManager() {
+          public java.security.cert.X509Certificate[] getAcceptedIssuers() {
+            return null;
+          }
+          public void checkClientTrusted(
+              java.security.cert.X509Certificate[] certs, String authType) {
+          }
+          public void checkServerTrusted(
+              java.security.cert.X509Certificate[] certs, String authType) {
+          }
+        }
+    };
+
+    try {
+      SSLContext sc = SSLContext.getInstance("SSL");
+      sc.init(null, trustAllCerts, new java.security.SecureRandom());
+      HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());
+    } catch (Exception e) {
+      LOG.info("Setting DefaultSSLSocketFactory failed.");
+    }
+  }
+
+  private void setupRangerConnectionAuthHeader() {
+    String userName = conf.get(OZONE_OM_RANGER_HTTPS_ADMIN_API_USER);
+    String passwd = conf.get(OZONE_OM_RANGER_HTTPS_ADMIN_API_PASSWD);
+    String auth = userName + ":" + passwd;
+    byte[] encodedAuth =
+        Base64.encodeBase64(auth.getBytes(StandardCharsets.UTF_8));
+    authHeaderValue = "Basic " + new String(encodedAuth);
+  }
+
+
+  @Override
+  public void shutdown() throws Exception {
+    // TBD
+  }
+
+  @Override
+  public void grantAccess(BucketNameSpace bucketNameSpace,
+                          OzoneMultiTenantPrincipal user, ACLType aclType) {
+    // TBD
+  }
+
+  @Override
+  public void revokeAccess(BucketNameSpace bucketNameSpace,
+                           OzoneMultiTenantPrincipal user, ACLType aclType) {
+    // TBD
+  }
+
+  @Override
+  public void grantAccess(AccountNameSpace accountNameSpace,
+                          OzoneMultiTenantPrincipal user, ACLType aclType) {
+    // TBD
+  }
+
+  @Override
+  public void revokeAccess(AccountNameSpace accountNameSpace,
+                           OzoneMultiTenantPrincipal user, ACLType aclType) {
+    // TBD
+  }
+
+  @Override
+  public List<Pair<BucketNameSpace, ACLType>>
+  getAllBucketNameSpaceAccessess(OzoneMultiTenantPrincipal user) {
+    // TBD
+    return null;
+  }
+
+  @Override
+  public boolean checkAccess(BucketNameSpace bucketNameSpace,
+                             OzoneMultiTenantPrincipal user) {
+    // TBD
+    return true;
+  }
+
+  @Override
+  public boolean checkAccess(AccountNameSpace accountNameSpace,
+                             OzoneMultiTenantPrincipal user) {
+    // TBD
+    return true;
+  }
+
+  @Override
+  public boolean checkAccess(IOzoneObj ozoneObject, RequestContext context)
+      throws OMException {
+    // TBD
+    return true;
+  }
+  private String getCreateUserJsonString(String userName,
+                                         List<String> groupIDs)
+      throws Exception {
+    String groupIdList = groupIDs.stream().collect(Collectors.joining("\",\"",
+        "",""));
+    String jsonCreateUserString = "{ \"name\":\"" + userName  + "\"," +
+        "\"firstName\":\"" + userName + "\"," +
+        "  \"loginId\": \"" + userName + "\"," +
+        "  \"password\" : \"user1pass\"," +
+        "  \"userRoleList\":[\"ROLE_USER\"]," +
+        "  \"groupIdList\":[\"" + groupIdList +"\"] " +
+        " }";
+    return jsonCreateUserString;
+  }
+
+  public String createUser(String userName, List<String> groupIDs)
+      throws Exception {
+    String rangerHttpsAddress = conf.get(OZONE_RANGER_HTTPS_ADDRESS_KEY);
+    String rangerAdminUrl =
+        rangerHttpsAddress + OZONE_OM_RANGER_ADMIN_CREATE_USER_HTTP_ENDPOINT;
+
+    String jsonCreateUserString = getCreateUserJsonString(userName, groupIDs);
+
+    HttpsURLConnection conn = makeHttpsPostCall(rangerAdminUrl,
+        jsonCreateUserString,"POST", false);
+    String userInfo = getReponseData(conn);
+    String userIDCreated;
+    try {
+      JSONObject jObject = new JSONObject(userInfo.toString());
+      userIDCreated = jObject.getString("id");
+      System.out.println("User ID is : " + userIDCreated);
+    } catch (JSONException e) {
+      e.printStackTrace();
+      throw e;
+    }
+    return userIDCreated;
+  }
+
+  private String getCreateGroupJsonString(String groupName) throws Exception {
+    String jsonCreateGroupString = "{ \"name\":\"" + groupName + "\"," +
+        "  \"description\":\"test\" " +
+        " }";
+    return jsonCreateGroupString;
+  }
+
+  public String createGroup(String groupName) throws Exception {
+    String rangerHttpsAddress = conf.get(OZONE_RANGER_HTTPS_ADDRESS_KEY);

Review comment:
       nit. Can be a class variable.

##########
File path: hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/OMMultiTenantManager.java
##########
@@ -0,0 +1,237 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with this
+ * work for additional information regarding copyright ownership.  The ASF
+ * licenses this file to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ * <p>
+ * http://www.apache.org/licenses/LICENSE-2.0
+ * <p>
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+ * License for the specific language governing permissions and limitations under
+ * the License.
+ */
+package org.apache.hadoop.ozone.om;
+
+import java.io.IOException;
+import java.util.List;
+
+import org.apache.hadoop.hdds.conf.OzoneConfiguration;
+import org.apache.hadoop.ozone.om.multitenant.AccessPolicy;
+import org.apache.hadoop.ozone.om.multitenant.AccountNameSpace;
+import org.apache.hadoop.ozone.om.multitenant.BucketNameSpace;
+import org.apache.hadoop.ozone.om.multitenant.OzoneMultiTenantPrincipal;
+import org.apache.hadoop.ozone.om.multitenant.Tenant;
+
+import javafx.util.Pair;
+
+/**
+ * OM MultiTenant manager interface.
+ */
+public interface OMMultiTenantManager {
+  /**
+   * Start multi-tenant manager. Performs initialization e.g.
+   *  - Initialize Multi-Tenant-Gatekeeper-Plugin
+   *  - Validate Multi-Tenant Bucket-NameSpaces
+   *  - Validate Multi-Tenant Account-NameSpaces
+   *  - Validating various OM (Multi-Tenant state)tables and corresponding
+   *    state in IMultiTenantGateKeeperPlugin (Ranger/Native/AnyOtherPlugIn).
+   *  - Setup SuperUsers for Multi-Tenant environment from Ozone-Conf
+   *  - Periodic BackGround thread to keep MultiTenant-State consistent e.g.
+   *       . superusers  <-in-sync-> OzoneConf,
+   *       . OM-DB state <-in-sync-> IMultiTenantGateKeeperPluginState
+   *       . OM DB state is always the source of truth.
+   *
+   * @param configuration
+   * @throws IOException
+   */
+  void start(OzoneConfiguration configuration) throws IOException;
+
+  /**
+   * Stop multi-tenant manager.
+   */
+  void stop() throws Exception;
+
+  /**
+   * Returns the corresponding OzoneManager instance.
+   *
+   * @return OMMetadataManager
+   */
+  OMMetadataManager getOzoneManager();
+
+  /**
+   * Given a TenantID String, Create and return Tenant Interface.
+   *
+   * @param tenantID
+   * @return Tenant interface.
+   */
+  Tenant createTenant(String tenantID) throws IOException;

Review comment:
       As discussed offline, all write operations defined here need to be integrated with the OM ratis request handling framework.

##########
File path: hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/multitenant/BucketNameSpace.java
##########
@@ -0,0 +1,37 @@
+package org.apache.hadoop.ozone.om.multitenant;
+
+import java.util.List;
+
+import org.apache.hadoop.hdds.annotation.InterfaceAudience;
+import org.apache.hadoop.hdds.annotation.InterfaceStability;
+import org.apache.hadoop.ozone.security.acl.OzoneObj;
+
+@InterfaceAudience.LimitedPrivate({"HDFS", "Yarn", "Ranger", "Hive", "HBase"})
+@InterfaceStability.Evolving
+public interface BucketNameSpace {

Review comment:
       Same doc request here.

##########
File path: hadoop-ozone/common/src/main/java/org/apache/hadoop/ozone/om/multitenant/AccountNameSpace.java
##########
@@ -0,0 +1,21 @@
+package org.apache.hadoop.ozone.om.multitenant;
+
+
+import org.apache.hadoop.hdds.annotation.InterfaceAudience;
+import org.apache.hadoop.hdds.annotation.InterfaceStability;
+
+@InterfaceAudience.LimitedPrivate({"HDFS", "Yarn", "Ranger", "Hive", "HBase"})
+@InterfaceStability.Evolving
+
+public interface AccountNameSpace {

Review comment:
       Can we write some documentation on what constitutes an Account Namespace here? It will be a useful reference in the future. And this interface only seems to have a getter & setter?

##########
File path: hadoop-ozone/integration-test/src/test/java/org/apache/hadoop/ozone/om/multitenant/TestMultiTenantGateKeeperRangerPlugin.java
##########
@@ -0,0 +1,143 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with this
+ * work for additional information regarding copyright ownership.  The ASF
+ * licenses this file to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ * <p>
+ * http://www.apache.org/licenses/LICENSE-2.0
+ * <p>
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+ * License for the specific language governing permissions and limitations under
+ * the License.
+ */
+package org.apache.hadoop.ozone.om.multitenant;
+
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_CREATE_GROUP_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_CREATE_POLICY_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_CREATE_USER_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_DELETE_GROUP_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_DELETE_POLICY_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.OzoneConsts.OZONE_OM_RANGER_ADMIN_DELETE_USER_HTTP_ENDPOINT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_OM_RANGER_HTTPS_ADMIN_API_PASSWD;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_OM_RANGER_HTTPS_ADMIN_API_USER;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_HTTPS_ADDRESS_KEY;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_CONNECTION_REQUEST_TIMEOUT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_CONNECTION_REQUEST_TIMEOUT_DEFAULT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_CONNECTION_TIMEOUT;
+import static org.apache.hadoop.ozone.om.OMConfigKeys.OZONE_RANGER_OM_CONNECTION_TIMEOUT_DEFAULT;
+
+import java.io.BufferedReader;
+import java.io.IOException;
+import java.io.InputStreamReader;
+import java.io.OutputStream;
+import java.net.URL;
+import java.nio.charset.StandardCharsets;
+import java.util.ArrayList;
+import java.util.List;
+import java.util.concurrent.TimeUnit;
+
+import javax.net.ssl.HttpsURLConnection;
+import javax.net.ssl.SSLContext;
+import javax.net.ssl.TrustManager;
+import javax.net.ssl.X509TrustManager;
+
+import org.apache.commons.net.util.Base64;
+import org.apache.hadoop.hdds.conf.OzoneConfiguration;
+import org.apache.hadoop.security.authentication.client.AuthenticationException;
+import org.codehaus.jettison.json.JSONException;
+import org.codehaus.jettison.json.JSONObject;
+import org.junit.AfterClass;
+import org.junit.Assert;
+import org.junit.BeforeClass;
+import org.junit.Ignore;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.rules.Timeout;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+
+/**
+ * Tests TestMultiTenantGateKeeperImplWithRanger.
+ * Marking it as Ignore because it needs Ranger access point.
+ */
+public class TestMultiTenantGateKeeperRangerPlugin {
+  private static final Logger LOG = LoggerFactory
+      .getLogger(TestMultiTenantGateKeeperRangerPlugin.class);
+
+  /**
+   * Set a timeout for each test.
+   */
+  @Rule
+  public Timeout timeout = new Timeout(300000);
+
+  // The following values need to be set before this test can be enabled.
+  private static final String RANGER_ENDPOINT =
+      "https://s3-tenant-1.s3-tenant.root.hwx.site:6182";

Review comment:
       Can we remove this internal host detail?

##########
File path: hadoop-ozone/ozone-manager/src/main/java/org/apache/hadoop/ozone/om/OMMultiTenantManager.java
##########
@@ -0,0 +1,237 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with this
+ * work for additional information regarding copyright ownership.  The ASF
+ * licenses this file to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ * <p>
+ * http://www.apache.org/licenses/LICENSE-2.0
+ * <p>
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+ * License for the specific language governing permissions and limitations under
+ * the License.
+ */
+package org.apache.hadoop.ozone.om;
+
+import java.io.IOException;
+import java.util.List;
+
+import org.apache.hadoop.hdds.conf.OzoneConfiguration;
+import org.apache.hadoop.ozone.om.multitenant.AccessPolicy;
+import org.apache.hadoop.ozone.om.multitenant.AccountNameSpace;
+import org.apache.hadoop.ozone.om.multitenant.BucketNameSpace;
+import org.apache.hadoop.ozone.om.multitenant.OzoneMultiTenantPrincipal;
+import org.apache.hadoop.ozone.om.multitenant.Tenant;
+
+import javafx.util.Pair;
+
+/**
+ * OM MultiTenant manager interface.
+ */
+public interface OMMultiTenantManager {
+  /**
+   * Start multi-tenant manager. Performs initialization e.g.
+   *  - Initialize Multi-Tenant-Gatekeeper-Plugin
+   *  - Validate Multi-Tenant Bucket-NameSpaces
+   *  - Validate Multi-Tenant Account-NameSpaces
+   *  - Validating various OM (Multi-Tenant state)tables and corresponding
+   *    state in IMultiTenantGateKeeperPlugin (Ranger/Native/AnyOtherPlugIn).
+   *  - Setup SuperUsers for Multi-Tenant environment from Ozone-Conf
+   *  - Periodic BackGround thread to keep MultiTenant-State consistent e.g.
+   *       . superusers  <-in-sync-> OzoneConf,
+   *       . OM-DB state <-in-sync-> IMultiTenantGateKeeperPluginState
+   *       . OM DB state is always the source of truth.
+   *
+   * @param configuration
+   * @throws IOException
+   */
+  void start(OzoneConfiguration configuration) throws IOException;
+
+  /**
+   * Stop multi-tenant manager.
+   */
+  void stop() throws Exception;
+
+  /**
+   * Returns the corresponding OzoneManager instance.
+   *
+   * @return OMMetadataManager
+   */
+  OMMetadataManager getOzoneManager();

Review comment:
       nit. getOmMetadataManager() ?




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
users@infra.apache.org



---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@ozone.apache.org
For additional commands, e-mail: issues-help@ozone.apache.org