[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-08 Thread Hudson (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17281131#comment-17281131
 ] 

Hudson commented on HBASE-25543:


Results for branch branch-1
[build #82 on 
builds.a.o|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-1/82/]:
 (x) *{color:red}-1 overall{color}*

details (if available):

(/) {color:green}+1 general checks{color}
-- For more information [see general 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-1/82//General_Nightly_Build_Report/]


(x) {color:red}-1 jdk7 checks{color}
-- For more information [see jdk7 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-1/82//JDK7_Nightly_Build_Report/]


(x) {color:red}-1 jdk8 hadoop2 checks{color}
-- For more information [see jdk8 (hadoop2) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-1/82//JDK8_Nightly_Build_Report_(Hadoop2)/]




(x) {color:red}-1 source release artifact{color}
-- See build output for details.


> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
> Fix For: 3.0.0-alpha-1, 1.7.0, 2.2.7, 2.5.0, 2.3.5, 2.4.2
>
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-06 Thread Hudson (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17280256#comment-17280256
 ] 

Hudson commented on HBASE-25543:


Results for branch branch-2
[build #171 on 
builds.a.o|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2/171/]:
 (x) *{color:red}-1 overall{color}*

details (if available):

(x) {color:red}-1 general checks{color}
-- For more information [see general 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2/171/General_20Nightly_20Build_20Report/]




(/) {color:green}+1 jdk8 hadoop2 checks{color}
-- For more information [see jdk8 (hadoop2) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2/171/JDK8_20Nightly_20Build_20Report_20_28Hadoop2_29/]


(/) {color:green}+1 jdk8 hadoop3 checks{color}
-- For more information [see jdk8 (hadoop3) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2/171/JDK8_20Nightly_20Build_20Report_20_28Hadoop3_29/]


(/) {color:green}+1 jdk11 hadoop3 checks{color}
-- For more information [see jdk11 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2/171/JDK11_20Nightly_20Build_20Report_20_28Hadoop3_29/]


(/) {color:green}+1 source release artifact{color}
-- See build output for details.


(/) {color:green}+1 client integration test{color}


> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
> Fix For: 3.0.0-alpha-1, 2.2.7, 2.5.0, 2.3.5, 2.4.2
>
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-06 Thread Hudson (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17280246#comment-17280246
 ] 

Hudson commented on HBASE-25543:


Results for branch branch-2.3
[build #164 on 
builds.a.o|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.3/164/]:
 (/) *{color:green}+1 overall{color}*

details (if available):

(/) {color:green}+1 general checks{color}
-- For more information [see general 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.3/164/General_20Nightly_20Build_20Report/]




(/) {color:green}+1 jdk8 hadoop2 checks{color}
-- For more information [see jdk8 (hadoop2) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.3/164/JDK8_20Nightly_20Build_20Report_20_28Hadoop2_29/]


(/) {color:green}+1 jdk8 hadoop3 checks{color}
-- For more information [see jdk8 (hadoop3) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.3/164/JDK8_20Nightly_20Build_20Report_20_28Hadoop3_29/]


(/) {color:green}+1 jdk11 hadoop3 checks{color}
-- For more information [see jdk11 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.3/164/JDK11_20Nightly_20Build_20Report_20_28Hadoop3_29/]


(/) {color:green}+1 source release artifact{color}
-- See build output for details.


(/) {color:green}+1 client integration test{color}


> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
> Fix For: 3.0.0-alpha-1, 2.2.7, 2.5.0, 2.3.5, 2.4.2
>
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-06 Thread Hudson (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17280177#comment-17280177
 ] 

Hudson commented on HBASE-25543:


Results for branch master
[build #204 on 
builds.a.o|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/master/204/]:
 (/) *{color:green}+1 overall{color}*

details (if available):

(/) {color:green}+1 general checks{color}
-- For more information [see general 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/master/204/General_20Nightly_20Build_20Report/]






(/) {color:green}+1 jdk8 hadoop3 checks{color}
-- For more information [see jdk8 (hadoop3) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/master/204/JDK8_20Nightly_20Build_20Report_20_28Hadoop3_29/]


(/) {color:green}+1 jdk11 hadoop3 checks{color}
-- For more information [see jdk11 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/master/204/JDK11_20Nightly_20Build_20Report_20_28Hadoop3_29/]


(/) {color:green}+1 source release artifact{color}
-- See build output for details.


(/) {color:green}+1 client integration test{color}


> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
> Fix For: 3.0.0-alpha-1, 2.2.7, 2.5.0, 2.3.5, 2.4.2
>
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-05 Thread Hudson (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17280054#comment-17280054
 ] 

Hudson commented on HBASE-25543:


Results for branch branch-2.4
[build #46 on 
builds.a.o|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.4/46/]:
 (/) *{color:green}+1 overall{color}*

details (if available):

(/) {color:green}+1 general checks{color}
-- For more information [see general 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.4/46/General_20Nightly_20Build_20Report/]




(/) {color:green}+1 jdk8 hadoop2 checks{color}
-- For more information [see jdk8 (hadoop2) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.4/46/JDK8_20Nightly_20Build_20Report_20_28Hadoop2_29/]


(/) {color:green}+1 jdk8 hadoop3 checks{color}
-- For more information [see jdk8 (hadoop3) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.4/46/JDK8_20Nightly_20Build_20Report_20_28Hadoop3_29/]


(/) {color:green}+1 jdk11 hadoop3 checks{color}
-- For more information [see jdk11 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.4/46/JDK11_20Nightly_20Build_20Report_20_28Hadoop3_29/]


(/) {color:green}+1 source release artifact{color}
-- See build output for details.


(/) {color:green}+1 client integration test{color}


> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
> Fix For: 3.0.0-alpha-1, 2.2.7, 2.5.0, 2.3.5, 2.4.2
>
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-05 Thread Hudson (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17280019#comment-17280019
 ] 

Hudson commented on HBASE-25543:


Results for branch branch-2.2
[build #165 on 
builds.a.o|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.2/165/]:
 (x) *{color:red}-1 overall{color}*

details (if available):

(x) {color:red}-1 general checks{color}
-- For more information [see general 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.2/165//General_Nightly_Build_Report/]




(x) {color:red}-1 jdk8 hadoop2 checks{color}
-- For more information [see jdk8 (hadoop2) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.2/165//JDK8_Nightly_Build_Report_(Hadoop2)/]


(x) {color:red}-1 jdk8 hadoop3 checks{color}
-- For more information [see jdk8 (hadoop3) 
report|https://ci-hadoop.apache.org/job/HBase/job/HBase%20Nightly/job/branch-2.2/165//JDK8_Nightly_Build_Report_(Hadoop3)/]


(/) {color:green}+1 source release artifact{color}
-- See build output for details.


(/) {color:green}+1 client integration test{color}


> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
> Fix For: 3.0.0-alpha-1, 2.2.7, 2.5.0, 2.3.5, 2.4.2
>
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-05 Thread Viraj Jasani (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17279808#comment-17279808
 ] 

Viraj Jasani commented on HBASE-25543:
--

Let me close this Jira, and once you open PR for branch-1, I will reopen this 
while merging it. Once done, will mark resolved again.

[~reidchan] since 2.2.7 is going to happen soon, just wanted to keep fixVersion 
in sync with commits.

> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-05 Thread Viraj Jasani (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17279806#comment-17279806
 ] 

Viraj Jasani commented on HBASE-25543:
--

[~xytss123] I have merged branch-2 PR to all active branch-2.x. Can you please 
also raise PR for branch-1? Once done, we can close this Jira.

Thanks

> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-04 Thread Reid Chan (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17279429#comment-17279429
 ] 

Reid Chan commented on HBASE-25543:
---

Nice catch [~xytss123] , please also provide PRs for branch-1 and branch-2. 

> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (HBASE-25543) When configuration "hadoop.security.authorization" is set to false, the system will still try to authorize an RPC and raise AccessDeniedException

2021-02-02 Thread Viraj Jasani (Jira)


[ 
https://issues.apache.org/jira/browse/HBASE-25543?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17277064#comment-17277064
 ] 

Viraj Jasani commented on HBASE-25543:
--

Thanks for your interest [~xytss123], I have provided you with contributor 
access on Jira. Going forward, you can assign Jiras to yourself.

> When configuration "hadoop.security.authorization" is set to false,  the 
> system will still try to authorize an RPC and raise AccessDeniedException
> --
>
> Key: HBASE-25543
> URL: https://issues.apache.org/jira/browse/HBASE-25543
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC
>Reporter: Yutong Xiao
>Assignee: Yutong Xiao
>Priority: Minor
>
> In method processOneRpc(Bytebuffer buf) in RpcServer.java (branch-1), 
> ServerRpcConnection.java (branch-2, master), if connectionHeadRead is set to 
> false, the method authorizeConnection() will be invoked whatever the boolean 
> authorize is true or false.
> {code:java}
> if (!authorizeConnection()) {
>   // Throw FatalConnectionException wrapping ACE so client does right thing 
> and closes
>   // down the connection instead of trying to read non-existent retun.
>   throw new AccessDeniedException("Connection from " + this + " for service " 
> +
> connectionHeader.getServiceName() + " is unauthorized for user: " + ugi);
> }
> {code}
> In method authorizeConnection()
> {code:java}
> if (ugi != null && ugi.getRealUser() != null
> && (authMethod != AuthMethod.DIGEST)) {
>   ProxyUsers.authorize(ugi, this.getHostAddress(), conf);
> }{code}
> ProxyUsers.authorize() will raise AuthorizationException.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)