HDFS-3400. DNs should be able start with jsvc even if security is disabled. Contributed by Aaron T. Myers
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/trunk@1337017 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
ba6360e493
commit
8def56e51e
|
@ -451,6 +451,9 @@ Release 2.0.0 - UNRELEASED
|
|||
|
||||
HDFS-3401. Cleanup DatanodeDescriptor creation in the tests. (eli)
|
||||
|
||||
HDFS-3400. DNs should be able start with jsvc even if security is disabled.
|
||||
(atm via eli)
|
||||
|
||||
OPTIMIZATIONS
|
||||
|
||||
HDFS-3024. Improve performance of stringification in addStoredBlock (todd)
|
||||
|
|
|
@ -56,6 +56,7 @@ shift
|
|||
|
||||
# Determine if we're starting a secure datanode, and if so, redefine appropriate variables
|
||||
if [ "$COMMAND" == "datanode" ] && [ "$EUID" -eq 0 ] && [ -n "$HADOOP_SECURE_DN_USER" ]; then
|
||||
if [ -n "$JSVC_HOME" ]; then
|
||||
if [ -n "$HADOOP_SECURE_DN_PID_DIR" ]; then
|
||||
HADOOP_PID_DIR=$HADOOP_SECURE_DN_PID_DIR
|
||||
fi
|
||||
|
@ -66,6 +67,10 @@ if [ "$COMMAND" == "datanode" ] && [ "$EUID" -eq 0 ] && [ -n "$HADOOP_SECURE_DN_
|
|||
|
||||
HADOOP_IDENT_STRING=$HADOOP_SECURE_DN_USER
|
||||
starting_secure_dn="true"
|
||||
else
|
||||
echo "It looks like you're trying to start a secure DN, but \$JSVC_HOME"\
|
||||
"isn't set. Falling back to starting insecure DN."
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "$COMMAND" = "namenode" ] ; then
|
||||
|
|
|
@ -29,6 +29,7 @@ import org.apache.hadoop.conf.Configuration;
|
|||
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
||||
import org.apache.hadoop.hdfs.server.common.HdfsServerConstants;
|
||||
import org.apache.hadoop.http.HttpServer;
|
||||
import org.apache.hadoop.security.UserGroupInformation;
|
||||
import org.mortbay.jetty.nio.SelectChannelConnector;
|
||||
|
||||
/**
|
||||
|
@ -60,10 +61,7 @@ public class SecureDataNodeStarter implements Daemon {
|
|||
@Override
|
||||
public void init(DaemonContext context) throws Exception {
|
||||
System.err.println("Initializing secure datanode resources");
|
||||
// We should only start up a secure datanode in a Kerberos-secured cluster
|
||||
Configuration conf = new Configuration(); // Skip UGI method to not log in
|
||||
if(!conf.get(HADOOP_SECURITY_AUTHENTICATION).equals("kerberos"))
|
||||
throw new RuntimeException("Cannot start secure datanode in unsecure cluster");
|
||||
Configuration conf = new Configuration();
|
||||
|
||||
// Stash command-line arguments for regular datanode
|
||||
args = context.getArguments();
|
||||
|
@ -98,7 +96,8 @@ public class SecureDataNodeStarter implements Daemon {
|
|||
System.err.println("Successfully obtained privileged resources (streaming port = "
|
||||
+ ss + " ) (http listener port = " + listener.getConnection() +")");
|
||||
|
||||
if (ss.getLocalPort() >= 1023 || listener.getPort() >= 1023) {
|
||||
if ((ss.getLocalPort() >= 1023 || listener.getPort() >= 1023) &&
|
||||
UserGroupInformation.isSecurityEnabled()) {
|
||||
throw new RuntimeException("Cannot start secure datanode with unprivileged ports");
|
||||
}
|
||||
System.err.println("Opened streaming server at " + streamingAddr);
|
||||
|
|
Loading…
Reference in New Issue