[
https://issues.apache.org/jira/browse/HBASE-14475?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14907607#comment-14907607
]
Hadoop QA commented on HBASE-14475:
-----------------------------------
{color:red}-1 overall{color}. Here are the results of testing the latest
attachment
http://issues.apache.org/jira/secure/attachment/12762293/14475-v2.txt
against master branch at commit 8db7a6eb079018e3f94cc366ef85211d7a90f749.
ATTACHMENT ID: 12762293
{color:green}+1 @author{color}. The patch does not contain any @author
tags.
{color:green}+1 tests included{color}. The patch appears to include 3 new
or modified tests.
{color:green}+1 hadoop versions{color}. The patch compiles with all
supported hadoop versions (2.4.0 2.4.1 2.5.0 2.5.1 2.5.2 2.6.0 2.7.0 2.7.1)
{color:green}+1 javac{color}. The applied patch does not increase the
total number of javac compiler warnings.
{color:green}+1 protoc{color}. The applied patch does not increase the
total number of protoc compiler warnings.
{color:green}+1 javadoc{color}. The javadoc tool did not generate any
warning messages.
{color:green}+1 checkstyle{color}. The applied patch does not increase the
total number of checkstyle errors
{color:green}+1 findbugs{color}. The patch does not introduce any new
Findbugs (version 2.0.3) warnings.
{color:green}+1 release audit{color}. The applied patch does not increase
the total number of release audit warnings.
{color:green}+1 lineLengths{color}. The patch does not introduce lines
longer than 100
{color:green}+1 site{color}. The mvn post-site goal succeeds with this patch.
{color:red}-1 core tests{color}. The patch failed these unit tests:
org.apache.hadoop.hbase.master.procedure.TestWALProcedureStoreOnHDFS
{color:red}-1 core zombie tests{color}. There are 1 zombie test(s):
at
org.apache.hadoop.hbase.regionserver.TestHRegion.testFlushCacheWhileScanning(TestHRegion.java:3756)
Test results:
https://builds.apache.org/job/PreCommit-HBASE-Build/15732//testReport/
Release Findbugs (version 2.0.3) warnings:
https://builds.apache.org/job/PreCommit-HBASE-Build/15732//artifact/patchprocess/newFindbugsWarnings.html
Checkstyle Errors:
https://builds.apache.org/job/PreCommit-HBASE-Build/15732//artifact/patchprocess/checkstyle-aggregate.html
Console output:
https://builds.apache.org/job/PreCommit-HBASE-Build/15732//console
This message is automatically generated.
> Region split requests are always audited with "hbase" user rather than
> request user
> -----------------------------------------------------------------------------------
>
> Key: HBASE-14475
> URL: https://issues.apache.org/jira/browse/HBASE-14475
> Project: HBase
> Issue Type: Bug
> Reporter: Enis Soztutar
> Assignee: Ted Yu
> Fix For: 2.0.0, 1.2.0, 1.3.0, 0.98.15, 1.0.3, 1.1.3
>
> Attachments: 14475-v2.txt
>
>
> [~madhan.neethiraj] from Ranger reported that when a region split request is
> initiated from the user, we always audit (and do the permission check)
> against the hbase user, not the request user.
> The issue is that a split request that is coming from the user is only
> processed at a later time from the CompactSplitThread asynchronously to the
> splitRegion RPC.
> RSRpcServices.splitRegion() only does a flush from the handler thread and
> then calls regionServer.compactSplitThread.requestSplit() which puts a
> SplitRequest to the split queue. The split request is handled by the split
> executor from CompactSplitThread.
> Since the split is actually executed from the compact split thread, the
> preSplit() for the AccessController is called from the executor thread. In
> this thread, we no longer have the user who initially requested the split, so
> the user in the context (UGI) is "hbase", causing the AC.preSplit() access
> control check to be always be performed against the hbase user, not the user
> who have submitted the request. The audit log also contains "hbase" user
> rather than the actual user.
> Luckily, the split forces a flush to the region in-line (from the handler
> thread), which requires a {{CREATE|ADMIN}} permission. split requires
> {{ADMIN}}, but due to this bug {{CREATE}} is also sufficient (although we
> have not verified it manually). {{CREATE}} permission can do flush and
> compactions, so this is not a security issue (I think).
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)