[
https://issues.apache.org/jira/browse/HADOOP-6929?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13038279#comment-13038279
]
Luke Lu commented on HADOOP-6929:
---------------------------------
bq. In particular, you don't want to put class names in configuration
This is a pervasive anti-pattern used in hadoop all over the place, HADOOP-7150
is supposed to address that.
bq. and certainly don't want the new SecurityContext to replace the current one.
Agreed. This is a major flaw of the current patch, though the flawed mechanism
is still workable if the new security info implements the fallback mechanism.
bq. private static ServiceLoader<SecurityInfo> securityInfoProviders = new
ServiceLoader<SecurityInfo>(SecurityInfo.class);
The usage should be:
{code}
ServiceLoader<SecurityInfo> securityInfoProviders =
ServiceLoader.load(SecurityInfo.class);
{code}
> RPC should have a way to pass Security information other than protocol
> annotations
> ----------------------------------------------------------------------------------
>
> Key: HADOOP-6929
> URL: https://issues.apache.org/jira/browse/HADOOP-6929
> Project: Hadoop Common
> Issue Type: Improvement
> Components: ipc, security
> Reporter: Sharad Agarwal
> Assignee: Sharad Agarwal
> Attachments: Hadoop-6929_v1.patch
>
>
> Currently Hadoop RPC allows protocol annotations as the only way to pass
> security information. This becomes a problem if protocols are generated and
> not hand written. For example protocols generated via Avro and passed over
> Avro tunnel (AvroRpcEngine.java) can't pass the security information.
--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira