[ 
https://issues.apache.org/jira/browse/HADOOP-11479?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14279284#comment-14279284
 ] 

Charles Lamb commented on HADOOP-11479:
---------------------------------------

[~ranadip],

Just to confirm, you are running the hdfs crypto command as user 'ranadip' 
(assuming your cli prompt is showing user@host) and you are running your 
namenode as hdfs (as indicated by the KMS message "User [hdfs] is not..."). 
Assuming the NN is running as user hdfs, then user 'hdfs' is the hdfs superuser 
and it must have (as you have noted) GENERATE_EEK and READ access to ranskey1. 
As [~hitliuyi] said, the hdfs crypto -createZone command can only be run by the 
superuser.

Charles


> hdfs crypto -createZone fails to impersonate the real user in a kerberised 
> environment
> --------------------------------------------------------------------------------------
>
>                 Key: HADOOP-11479
>                 URL: https://issues.apache.org/jira/browse/HADOOP-11479
>             Project: Hadoop Common
>          Issue Type: Bug
>    Affects Versions: 2.6.0
>         Environment: CentOS
>            Reporter: Ranadip
>         Attachments: KMS-test-acl.txt
>
>
> The problem occurs when KMS key level acl is created for the key before the 
> encryption zone is created. The command tried to create the encryption zone 
> using "hdfs" user's identity and not the real user's identity.
> Steps:
> In a kerberised environment:
> 1. Create key level ACL in KMS for a new key.
> 2. Create encryption key now. (Goes through fine)
> 3. Create encryption zone. (Fails)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to