You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-issues@hadoop.apache.org by "Steve Loughran (JIRA)" <ji...@apache.org> on 2009/12/23 21:12:29 UTC

[jira] Commented: (HADOOP-5731) IPC call can raise security exceptions when the remote node is running under a security manager

    [ https://issues.apache.org/jira/browse/HADOOP-5731?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12794205#action_12794205 ] 

Steve Loughran commented on HADOOP-5731:
----------------------------------------

HADOOP-6452 is the root cause of the RMI-related stack trace. With that patch in, there is one less reason why you can't run Hadoop under a security manager if you so desire.

> IPC call can raise security exceptions when the remote node is running under a security manager
> -----------------------------------------------------------------------------------------------
>
>                 Key: HADOOP-5731
>                 URL: https://issues.apache.org/jira/browse/HADOOP-5731
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: ipc
>    Affects Versions: 0.21.0
>            Reporter: Steve Loughran
>            Assignee: Steve Loughran
>            Priority: Minor
>
> I'm getting a security exception (java.lang.reflect.ReflectPermission suppressAccessChecks) in RPC.Server.call(), when calling a datanode brought up under a security manager, in method.setAccessible(true)

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.