You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-issues@hadoop.apache.org by "Hudson (JIRA)" <ji...@apache.org> on 2017/04/26 23:54:04 UTC

[jira] [Commented] (HADOOP-14351) Azure: RemoteWasbAuthorizerImpl and RemoteSASKeyGeneratorImpl should not use Kerberos interactive user cache

    [ https://issues.apache.org/jira/browse/HADOOP-14351?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15985766#comment-15985766 ] 

Hudson commented on HADOOP-14351:
---------------------------------

SUCCESS: Integrated in Jenkins build Hadoop-trunk-Commit #11636 (See [https://builds.apache.org/job/Hadoop-trunk-Commit/11636/])
HADOOP-14351. Azure: RemoteWasbAuthorizerImpl and (liuml07: rev 8b5f2c372e70999f3ee0a0bd685a494e06bc3652)
* (edit) hadoop-tools/hadoop-azure/src/main/java/org/apache/hadoop/fs/azure/RemoteSASKeyGeneratorImpl.java
* (edit) hadoop-tools/hadoop-azure/src/main/java/org/apache/hadoop/fs/azure/RemoteWasbAuthorizerImpl.java
* (edit) hadoop-tools/hadoop-azure/src/main/java/org/apache/hadoop/fs/azure/security/WasbTokenRenewer.java
* (edit) hadoop-tools/hadoop-azure/src/main/java/org/apache/hadoop/fs/azure/NativeAzureFileSystem.java


> Azure: RemoteWasbAuthorizerImpl and RemoteSASKeyGeneratorImpl should not use Kerberos interactive user cache
> ------------------------------------------------------------------------------------------------------------
>
>                 Key: HADOOP-14351
>                 URL: https://issues.apache.org/jira/browse/HADOOP-14351
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: fs/azure
>    Affects Versions: 2.9.0
>            Reporter: Santhosh G Nayak
>            Assignee: Santhosh G Nayak
>             Fix For: 2.9.0, 3.0.0-alpha3
>
>         Attachments: HADOOP-14351.1.patch, HADOOP-14351.2.patch
>
>
> Currently, {{RemoteWasbAuthorizerImpl.getRelativeBlobSASUri()}},  {{RemoteWasbAuthorizerImpl.getContainerSASUri()}} and {{RemoteSASKeyGeneratorImpl.authorize()}} use Kerberos interactive user's ticket cache if the kerberos credential is not available for {{UserGroupInformation.getCurrentUser()}} or {{UserGroupInformation.getRealUser()}}.
> It results in usage of interactive user's ticket for impersonation, whenever services try to do File System operations as another user, which is incorrect.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: common-issues-unsubscribe@hadoop.apache.org
For additional commands, e-mail: common-issues-help@hadoop.apache.org