Details
-
Bug
-
Status: Closed
-
Critical
-
Resolution: Fixed
-
None
-
None
-
None
-
Reviewed
Description
Based on the discussion on HADOOP-10670, this jira proposes to remove StringSecretProvider as it opens up possibilities for misconfiguration and security vulnerabilities.
My understanding is that the use case of inlining the secret is never supported. The property is used to pass the secret internally. The way it works before
HADOOP-10868is the following:
- Users specify the initializer of the authentication filter in the configuration.
- AuthenticationFilterInitializer reads the secret file. The server will not start if the secret file does not exists. The initializer will set the property if it read the file correctly.
*There is no way to specify the secret in the configuration out-of-the-box – the secret is always overwritten by AuthenticationFilterInitializer.
Attachments
Attachments
Issue Links
- breaks
-
HADOOP-12902 JavaDocs for SignerSecretProvider are out-of-date in AuthenticationFilter
- Closed
-
OOZIE-2300 TestAuthFilterAuthOozieClient.testClientAuthTokenCache fails with Hadoop 2.7.0 and later
- Closed
- is broken by
-
HADOOP-10868 Create a ZooKeeper-backed secret provider
- Closed
- relates to
-
HADOOP-10670 Allow AuthenticationFilters to load secret from signature secret files
- Closed