From 9c804d803174b35fbffcb6156abb94ef287d642f Mon Sep 17 00:00:00 2001 From: Nick Dimiduk Date: Wed, 17 Sep 2014 10:59:15 -0400 Subject: [PATCH] HBASE-12003 Fix SecureBulkLoadEndpoint class javadoc formatting --- .../security/access/SecureBulkLoadEndpoint.java | 29 +++++++++++----------- 1 file changed, 15 insertions(+), 14 deletions(-) diff --git a/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/SecureBulkLoadEndpoint.java b/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/SecureBulkLoadEndpoint.java index b240545..3819307 100644 --- a/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/SecureBulkLoadEndpoint.java +++ b/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/SecureBulkLoadEndpoint.java @@ -73,22 +73,23 @@ import java.util.List; * security in HBase. * * This service addresses two issues: - * - * 1. Moving files in a secure filesystem wherein the HBase Client - * and HBase Server are different filesystem users. - * 2. Does moving in a secure manner. Assuming that the filesystem - * is POSIX compliant. + *
    + *
  1. Moving files in a secure filesystem wherein the HBase Client + * and HBase Server are different filesystem users.
  2. + *
  3. Does moving in a secure manner. Assuming that the filesystem + * is POSIX compliant.
  4. + *
* * The algorithm is as follows: - * - * 1. Create an hbase owned staging directory which is - * world traversable (711): /hbase/staging - * 2. A user writes out data to his secure output directory: /user/foo/data - * 3. A call is made to hbase to create a secret staging directory - * which globally rwx (777): /user/staging/averylongandrandomdirectoryname - * 4. The user moves the data into the random staging directory, - * then calls bulkLoadHFiles() - * + *
    + *
  1. Create an hbase owned staging directory which is + * world traversable (711): {@code /hbase/staging}
  2. + *
  3. A user writes out data to his secure output directory: {@code /user/foo/data}
  4. + *
  5. A call is made to hbase to create a secret staging directory + * which globally rwx (777): {@code /user/staging/averylongandrandomdirectoryname}
  6. + *
  7. The user moves the data into the random staging directory, + * then calls bulkLoadHFiles()
  8. + *
* Like delegation tokens the strength of the security lies in the length * and randomness of the secret directory. * -- 1.9.0