-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/53629/
-----------------------------------------------------------

(Updated Nov. 10, 2016, 6:49 a.m.)


Review request for Ambari, Andrew Onischuk, Laszlo Puskas, and Robert Levas.


Bugs: AMBARI-18836
    https://issues.apache.org/jira/browse/AMBARI-18836


Repository: ambari


Description
-------

The Smoke and “Headless” Service users are used by Ambari to perform service 
“smoke” checks and run alert health checks. 
The permission for hdfs.headless.keytab is 440. But it will cause security 
concern to allow other service user in hadoop group to kinit hdfs headless 
principal using hdfs.headless.keytab. In this way, other service user could 
"pretend" to be hdfs user and be granted hdfs user's authorities.


Diffs
-----

  ambari-server/src/main/resources/common-services/HDFS/2.1.0.2.0/kerberos.json 
3d6e25c 
  
ambari-server/src/main/resources/common-services/HIVE/0.12.0.2.0/package/scripts/webhcat.py
 816b6af 

Diff: https://reviews.apache.org/r/53629/diff/


Testing
-------

Hi Robert, 
What will be your opinion on this?
Is it necessary to set 440 permission to hdfs headless keytab? The kinit hdfs 
headless principal operation for webhcat seems useless, I kdestroy the hdfs 
ticket for hcat user and hive service check/start/stop all works fine. Is there 
any other tests I should try? Thanks.


Thanks,

Shi Wang

Reply via email to