[ 
https://issues.apache.org/jira/browse/HADOOP-9293?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13575472#comment-13575472
 ] 

Steve Loughran commented on HADOOP-9293:
----------------------------------------

This would work for clients where the file is on the local fs, but wouldn't 
work across a cluster, because the credential file wouldn't travel with the 
job. 

# Credentials can already be managed through a -site.xml file, though you'd 
need to trust all users -which is the same trust you'd need if the credentials 
were kept on a shared-readable file throughout the filesystem.
# we can import files from a fixed location today, which is how I make sure my 
secrets don't creep into SCM: 
{code}
   <!-- 
    # DO NOT ADD TO REVISION CONTROL
    -->
    <include xmlns="http://www.w3.org/2001/XInclude";
             href="auth-keys.xml"/>
{code}

Because the credentials file doesn't travel with jobs, I don't see it being the 
right approach for managing keys & secrets.
                
> For S3 use credentials file
> ---------------------------
>
>                 Key: HADOOP-9293
>                 URL: https://issues.apache.org/jira/browse/HADOOP-9293
>             Project: Hadoop Common
>          Issue Type: Improvement
>          Components: fs/s3
>    Affects Versions: 1.0.2
>         Environment: Linux
>            Reporter: Andy Sautins
>            Priority: Minor
>              Labels: features, newbie
>         Attachments: HADOOP-9293.patch
>
>   Original Estimate: 2h
>  Remaining Estimate: 2h
>
> The following document describes the current way that S3 credentials can be 
> specified ( http://wiki.apache.org/hadoop/AmazonS3 ).  In summary they are:
>   * in the S3 URI.
>   * in the hadoop-site.xml file as 
>   ** fs.s3.awsAccessKeyId
>   ** fs.s3.awsSecretAccessKey 
>   ** fs.s3n.awsAccessKeyId
>   ** fs.s3n.aswSecretAccessKey
> The amazon EMR tool elastic-mapreduce already provide the ability to use a 
> credentials file ( see 
> http://s3.amazonaws.com/awsdocs/ElasticMapReduce/latest/emr-qrc.pdf ).  
> I would propose that we allow roughly the same access to credentials through 
> a credentials file that is currently provided by elastic-mapreduce.  This 
> should allow for centralized administration of credentials which should be 
> positive for security.
> I propose the following properties:
> {quote}
>    
> <property><name>f3.s3.awsCredentialsFile</name><value>/path/to/file</value></property>
>    
> <property><name>fs.s3n.awsCredentialsFile</name><value>/path/to/file</value></property>
> {quote}

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to