[ 
https://issues.apache.org/jira/browse/HADOOP-12389?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14737041#comment-14737041
 ] 

Allen Wittenauer commented on HADOOP-12389:
-------------------------------------------

bq.  do you have any trouble or usecase for this?

I hit it several times while playing around with WebHDFS on an unsecure 
cluster.  This particular case is almost certainly more fallout from the 
2.4/2.5 hack job on WebHDFS auth.

bq.   I think it is not problem to prohibit impersonation without explicit 
configuration.

How about this: if there is no proxy entry for a given user, then self 
impersonation is allowed.  This protects against the few cases where self 
impersonation would be a bad thing, because at least in all the cases I'm 
thinking of, those services always have a proxy entry anyway.

> allow self-impersonation
> ------------------------
>
>                 Key: HADOOP-12389
>                 URL: https://issues.apache.org/jira/browse/HADOOP-12389
>             Project: Hadoop Common
>          Issue Type: Bug
>    Affects Versions: 3.0.0
>            Reporter: Allen Wittenauer
>              Labels: 3
>
> This is kind of dumb:
> org.apache.hadoop.security.authorize.AuthorizationException: User: aw is not 
> allowed to impersonate aw
> Users should be able to impersonate themselves in secure and non-secure cases 
> automatically, for free.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to