You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@zeppelin.apache.org by "Noam (Jira)" <ji...@apache.org> on 2021/09/20 19:30:00 UTC
[jira] [Created] (ZEPPELIN-5531) Security on ssh impersonation with
pyspark
Noam created ZEPPELIN-5531:
------------------------------
Summary: Security on ssh impersonation with pyspark
Key: ZEPPELIN-5531
URL: https://issues.apache.org/jira/browse/ZEPPELIN-5531
Project: Zeppelin
Issue Type: Bug
Components: interpreter-setting, Interpreters, security
Affects Versions: 0.9.0
Reporter: Noam
I am trying to implement impersonation in zeppelin using SSH (ssh user1@localhost) following the documentation ([https://zeppelin.apache.org/docs/0.9.0/usage/interpreter/user_impersonation.html)]
This approach seems to work with the python and shell interpreters, but does not seem to be entirely working for the pyspark interpreter.
When logged into the zeppelin app as user1, running:
%pyspark
import os
os.popen('whoami').read()
outputs: 'zeppelin', instead of the expected output 'user1.
This creates security issues such as 'os.popen("cat conf/credentials.json")'
Is there a problem with how I configured impersonation, or is this an open issue in the spark interpreter?
Are there solutions for protecting 'credentials.json'?
--
This message was sent by Atlassian Jira
(v8.3.4#803005)