Arun Suresh created HADOOP-11341:
------------------------------------
Summary: Check if user is present in default key ACL if user does
not have explicit key ACLS
Key: HADOOP-11341
URL: https://issues.apache.org/jira/browse/HADOOP-11341
Project: Hadoop Common
Issue Type: Bug
Components: kms, security
Reporter: Arun Suresh
Assignee: Arun Suresh
As reported by [~dian.fu] :
Key based ACL in KMS is currently implemented as whitelist. So if I configure
as follows in kms-acl.xml,
{code}
<property>
<name>key.acl.testKey.DECRYPT_EEK</name>
<value>testUser</value>
</property>
{code}, then only {{testUser}} user can do {{DECRYPT_EEK}} call on key
{{testKey}}. If I want {{yarn}} user can also do {{DECRYPT_EEK}} call on
{{testKey}} key, I need add {{yarn}} user to the above configuration value
manually. This means that if I want to configure key based ACL({{DECRYPT_EEK}})
for {{some key}}, I need also add {{yarn}} user to configuration
{{DECRYPT_EEK}} for that key. As I don't know if {{yarn}} user will later need
to do {{DECRYPT_EEK}} for this key, such as the described example in the
description of this JIRA. This is inconvenient and tricky.
This can be alleviated by slightly modifying the key ACL logic in KMS first
checks if the user, in this case {{yarn}}, is present in
{{key.acl.<key-name>.<OP-name>}} list. And if not, then also check if the user
is present in {{default.key.acl.<OP-name>}} before. If yes, then grant access..
else deny.
Currently, {{default.key.acl.<OP-name>}} is consulted only if NO
{{key.acl.<key-name>.<OP-name>}} is specified.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)