You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-issues@hadoop.apache.org by "Steve Loughran (JIRA)" <ji...@apache.org> on 2009/12/23 21:12:29 UTC
[jira] Commented: (HADOOP-5731) IPC call can raise security
exceptions when the remote node is running under a security manager
[ https://issues.apache.org/jira/browse/HADOOP-5731?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12794205#action_12794205 ]
Steve Loughran commented on HADOOP-5731:
----------------------------------------
HADOOP-6452 is the root cause of the RMI-related stack trace. With that patch in, there is one less reason why you can't run Hadoop under a security manager if you so desire.
> IPC call can raise security exceptions when the remote node is running under a security manager
> -----------------------------------------------------------------------------------------------
>
> Key: HADOOP-5731
> URL: https://issues.apache.org/jira/browse/HADOOP-5731
> Project: Hadoop Common
> Issue Type: Bug
> Components: ipc
> Affects Versions: 0.21.0
> Reporter: Steve Loughran
> Assignee: Steve Loughran
> Priority: Minor
>
> I'm getting a security exception (java.lang.reflect.ReflectPermission suppressAccessChecks) in RPC.Server.call(), when calling a datanode brought up under a security manager, in method.setAccessible(true)
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.