HADOOP-6612. Protocols RefreshUserToGroupMappingsProtocol and RefreshAuthorizationPolicyProtocol will fail with security enabled (boryas)

git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/trunk@944397 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
Boris Shkolnik 2010-05-14 19:00:18 +00:00
parent d9b6103f8f
commit 1e15cf0355
5 changed files with 18 additions and 0 deletions

View File

@ -12,6 +12,9 @@ Trunk (unreleased changes)
BUG FIXES BUG FIXES
HADOOP-6612. Protocols RefreshUserToGroupMappingsProtocol and
RefreshAuthorizationPolicyProtocol will fail with security enabled (boryas)
HADOOP-6764. Remove verbose logging from the Groups class. (Boris Shkolnik) HADOOP-6764. Remove verbose logging from the Groups class. (Boris Shkolnik)
HADOOP-6730. Bug in FileContext#copy and provide base class for FileContext HADOOP-6730. Bug in FileContext#copy and provide base class for FileContext

View File

@ -152,5 +152,7 @@ public class CommonConfigurationKeys {
*/ */
public final static String HADOOP_CLUSTER_ADMINISTRATORS_PROPERTY = public final static String HADOOP_CLUSTER_ADMINISTRATORS_PROPERTY =
"hadoop.cluster.administrators"; "hadoop.cluster.administrators";
public static final String HADOOP_SECURITY_SERVICE_USER_NAME_KEY =
"hadoop.security.service.user.name.key";
} }

View File

@ -255,6 +255,11 @@ public class Client {
if (krbInfo != null) { if (krbInfo != null) {
String serverKey = krbInfo.serverPrincipal(); String serverKey = krbInfo.serverPrincipal();
if (serverKey != null) { if (serverKey != null) {
if(LOG.isDebugEnabled()) {
LOG.info("server principal key for protocol="
+ protocol.getCanonicalName() + " is " + serverKey +
" and val =" + conf.get(serverKey));
}
serverPrincipal = conf.get(serverKey); serverPrincipal = conf.get(serverKey);
} }
} }

View File

@ -20,12 +20,16 @@ package org.apache.hadoop.security;
import java.io.IOException; import java.io.IOException;
import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.fs.CommonConfigurationKeys;
import org.apache.hadoop.ipc.VersionedProtocol; import org.apache.hadoop.ipc.VersionedProtocol;
import org.apache.hadoop.security.KerberosInfo;
/** /**
* Protocol use * Protocol use
* *
*/ */
@KerberosInfo(
serverPrincipal=CommonConfigurationKeys.HADOOP_SECURITY_SERVICE_USER_NAME_KEY)
public interface RefreshUserToGroupMappingsProtocol extends VersionedProtocol { public interface RefreshUserToGroupMappingsProtocol extends VersionedProtocol {
/** /**

View File

@ -19,11 +19,15 @@ package org.apache.hadoop.security.authorize;
import java.io.IOException; import java.io.IOException;
import org.apache.hadoop.fs.CommonConfigurationKeys;
import org.apache.hadoop.ipc.VersionedProtocol; import org.apache.hadoop.ipc.VersionedProtocol;
import org.apache.hadoop.security.KerberosInfo;
/** /**
* Protocol which is used to refresh the authorization policy in use currently. * Protocol which is used to refresh the authorization policy in use currently.
*/ */
@KerberosInfo(
serverPrincipal=CommonConfigurationKeys.HADOOP_SECURITY_SERVICE_USER_NAME_KEY)
public interface RefreshAuthorizationPolicyProtocol extends VersionedProtocol { public interface RefreshAuthorizationPolicyProtocol extends VersionedProtocol {
/** /**