Return-Path: X-Original-To: apmail-falcon-dev-archive@minotaur.apache.org Delivered-To: apmail-falcon-dev-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id E348910D9D for ; Thu, 6 Feb 2014 06:58:52 +0000 (UTC) Received: (qmail 71498 invoked by uid 500); 6 Feb 2014 06:58:50 -0000 Delivered-To: apmail-falcon-dev-archive@falcon.apache.org Received: (qmail 71327 invoked by uid 500); 6 Feb 2014 06:58:44 -0000 Mailing-List: contact dev-help@falcon.incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@falcon.incubator.apache.org Delivered-To: mailing list dev@falcon.incubator.apache.org Received: (qmail 71121 invoked by uid 99); 6 Feb 2014 06:58:42 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 06 Feb 2014 06:58:42 +0000 X-ASF-Spam-Status: No, hits=-2000.5 required=5.0 tests=ALL_TRUSTED,RP_MATCHES_RCVD X-Spam-Check-By: apache.org Received: from [140.211.11.3] (HELO mail.apache.org) (140.211.11.3) by apache.org (qpsmtpd/0.29) with SMTP; Thu, 06 Feb 2014 06:58:40 +0000 Received: (qmail 67933 invoked by uid 99); 6 Feb 2014 06:58:15 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 06 Feb 2014 06:58:15 +0000 Date: Thu, 6 Feb 2014 06:58:15 +0000 (UTC) From: "Srikanth Sundarrajan (JIRA)" To: dev@falcon.incubator.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Commented] (FALCON-11) Add support for security in Falcon MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/FALCON-11?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13893113#comment-13893113 ] Srikanth Sundarrajan commented on FALCON-11: -------------------------------------------- Would be useful to add a comment in BasicAuthFilter around {code} if (httpRequest.getMethod().equals("OPTIONS")) { optionsServlet.service(request, response); {code} describing how KerberosAuthenticator works and why is the OPTIONS method required. Can the blacklisted users be defaulted to maintain compatibility {code} String blackListedUserConfig = StartupProperties.get().getProperty(BLACK_LISTED_USER, <>); {code} I am assuming that user.name query param is being passed from prism to server and since the channel between prism & server is being secured, there is no further challenge required from the server to validate prism. Please confirm One useful thing to document is * What elements are created by falcon under what location and with what permissions & ownership Am putting down some notes, as I review this patch {code} oozie coord/bundle xmls: ${cluster.staging-location}/workflows/{entity}/{entity-name} - owner: falcon, Permission: 644 app logs: ${cluster.staging-location}/workflows/{entity}/{entity-name}/logs - owner: falcon, Permission: 777 config-store - owner: falcon, Permission: 750 Shared libs: {cluster.working}/{lib,libext} - owner: falcon, Permission: 755 {code} LogProvider is creating a proxies file system to retrieve job logs, which are actually created by the falcon user. Proxy may be unnecessary. {code} // fs on behalf of the end user. FileSystem fs = HadoopClientFactory.get().createProxiedFileSystem(conf); String resolvedRunId = getResolvedRunId(fs, clusterObj, entity, instance, runId); {code} Latedata related data is written to ${cluster.staging-location}/workflows/{entity}/{entity-name}/logs/latedata and since this folder is owned by falcon with 777 permissions, there is no need to proxy the user in the LateDataHandler. Same thing applies for LateRerunConsumer & LateRerunHandler > Add support for security in Falcon > ---------------------------------- > > Key: FALCON-11 > URL: https://issues.apache.org/jira/browse/FALCON-11 > Project: Falcon > Issue Type: Improvement > Affects Versions: 0.3 > Reporter: Venkatesh Seetharam > Assignee: Venkatesh Seetharam > Labels: security > Attachments: FALCON-11.patch > > Original Estimate: 336h > Remaining Estimate: 336h > > The following is the break up of tasks for Falcon to be secure and work with secure Hadoop. > 1. Secure Falcon daemon - needs to login with keytabs > 2. Secure Hadoop client interface - HDFS > 3. Secure Oozie client interface > 4. Secure Falcon Web Interface > 5. Secure Falcon Client Interface > ..etc. -- This message was sent by Atlassian JIRA (v6.1.5#6160)