FAQ
[ https://issues.apache.org/jira/browse/HADOOP-2632?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Robert Chansler resolved HADOOP-2632.
-------------------------------------

Resolution: Fixed
Fix Version/s: 0.18.0

No outstanding problems.
Discussion of fsck operation in the permissions regime
------------------------------------------------------

Key: HADOOP-2632
URL: https://issues.apache.org/jira/browse/HADOOP-2632
Project: Hadoop Core
Issue Type: Task
Components: dfs
Affects Versions: 0.16.0
Reporter: Robert Chansler
Assignee: Robert Chansler
Fix For: 0.18.0


Proposal: In 0.16, with permission checking enabled, fsck will just work regardless of permission settings.
The normal operation of fsck can reveal information about the name system that would otherwise be unavailable to a user via other commands that would be subject to permission checking. While not best, this situation seems tolerable for 0.16.
1. It not certain what permission checking should be done, other than perhaps just restricting fsck to the superuser.
2. The information revealed is not too privileged.
3. The mischievous user has better things to do.
4. fsck does not fit with either of the existing models for permission checking.
fsck is implemented as HTTP GET of a well-known URL. As such, the first thought is that it should operate with the permissions of web UI client. In 0.16, the web UI client is presumed to have the identity of some cluster-configured user. If the cluster-configured user is the superuser, web UI clients can browse the contents of any file. If the user is any other identity, the user would not have full access to the name space necessary for fsck to operate unless every directory had mode a+r. The alternative is to treat fsck according to the rules of other administrative commands. At present, fsck does no RPC requests, and so there is no option to apply the permission checking rules used by other commands.
If it is important to change 0.16 so that fsck checked user identity, an implementation would have to use a new RPC to obtain a ticket that authorized access to the fsck URL. The ticket would be passed as a parameter to HTTP GET. The implementation of fsck would check the the proffered ticket was valid before traversing the name space.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Search Discussions

Related Discussions

Discussion Navigation
viewthread | post
Discussion Overview
groupcommon-dev @
categorieshadoop
postedAug 14, '08 at 10:36p
activeAug 14, '08 at 10:36p
posts1
users1
websitehadoop.apache.org...
irc#hadoop

1 user in discussion

Robert Chansler (JIRA): 1 post

People

Translate

site design / logo © 2022 Grokbase