[ 
https://issues.apache.org/jira/browse/OOZIE-2877?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16501869#comment-16501869
 ] 

Clay B. edited comment on OOZIE-2877 at 6/5/18 2:34 PM:
--------------------------------------------------------

My understanding was [~gezapeti]'s original request was to ensure the 
credential as stored on HDFS were secure; and if it was not, then we should 
warn (or error) to the user – the same as SSH does for your private SSH key 
(e.g. see [Stack Overflow 
#9270734|[https://stackoverflow.com/questions/9270734/ssh-permissions-are-too-open-error]|https://stackoverflow.com/questions/9270734/ssh-permissions-are-too-open-error]).

In the case of YARN Credentials, how would one provide that to the Oozie job 
for on-going use? Does the Oozie REST API support some notion of the YARN 
credentials or is this only at job launch and {{git clone}} time? I would 
expect if the later, then it could be useful but I do not expect more security 
unless run on an insecure cluster where all jobs are run as the same user (e.g. 
{{yarn}} instead of the user submitting the job) or where local-filesystem 
permissions are otherwise non-standard for a secure deployment?


was (Author: clayb):
My understanding was [~gezapeti]'s original request was to ensure the 
credential as stored on HDFS were secure; and if it was not, then we should 
warn (or error) to the user – the same as SSH does for your private SSH key 
(e.g. see [Stack Overflow 
#9270734|[https://stackoverflow.com/questions/9270734/ssh-permissions-are-too-open-error]).]]).

In the case of YARN Credentials, how would one provide that to the Oozie job 
for on-going use? Does the Oozie REST API support some notion of the YARN 
credentials or is this only at job launch and {{git clone}} time? I would 
expect if the later, then it could be useful but I do not expect more security 
unless run on an insecure cluster where all jobs are run as the same user (e.g. 
{{yarn}} instead of the user submitting the job) or where local-filesystem 
permissions are otherwise non-standard for a secure deployment?

> Oozie Git Action
> ----------------
>
>                 Key: OOZIE-2877
>                 URL: https://issues.apache.org/jira/browse/OOZIE-2877
>             Project: Oozie
>          Issue Type: Sub-task
>          Components: action
>            Reporter: Clay B.
>            Assignee: Clay B.
>            Priority: Major
>              Labels: action
>             Fix For: trunk
>
>         Attachments: 0001-OOZIE-2877-Oozie-Git-Action.patch, 
> 0002-OOZIE-2877-Oozie-Git-Action.patch, 
> 0003-OOZIE-2877-Oozie-Git-Action.patch, 
> 0004-OOZIE-2877-Oozie-Git-Action.patch, 
> 0005-OOZIE-2877-Oozie-Git-Action.patch, 
> 0006-OOZIE-2877-Oozie-Git-Action.patch, 
> 0007-OOZIE-2877-Oozie-Git-Action.patch, 
> 0008-OOZIE-2877-Oozie-Git-Action.patch, 
> 0009-OOZIE-2877-Oozie-Git-Action.patch, OOZIE-2877.010.patch, 
> OOZIE-2877.011.patch, OOZIE-2877.012.patch
>
>
> To aide in deploying ASCII artifacts to clusters, let's provide a tie-in for 
> a source-code management system. Git would be my preferred choice.
> Ideally, this could handle a user's key material e.g. for an ssh key to pull 
> down from a secured repository. This would free users from handling their own 
> key staging and clean-up on YARN nodes and only require them to store the key 
> secured in HDFS.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to