hadoop-common-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Hadoop QA (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (HADOOP-10863) KMS should have a blacklist for decrypting EEKs
Date Wed, 03 Sep 2014 06:11:52 GMT

    [ https://issues.apache.org/jira/browse/HADOOP-10863?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14119426#comment-14119426

Hadoop QA commented on HADOOP-10863:

{color:red}-1 overall{color}.  Here are the results of testing the latest attachment 
  against trunk revision 08a9ac7.

    {color:green}+1 @author{color}.  The patch does not contain any @author tags.

    {color:green}+1 tests included{color}.  The patch appears to include 2 new or modified
test files.

    {color:green}+1 javac{color}.  The applied patch does not increase the total number of
javac compiler warnings.

    {color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

    {color:green}+1 eclipse:eclipse{color}.  The patch built with eclipse:eclipse.

    {color:green}+1 findbugs{color}.  The patch does not introduce any new Findbugs (version
2.0.3) warnings.

    {color:green}+1 release audit{color}.  The applied patch does not increase the total number
of release audit warnings.

    {color:red}-1 core tests{color}.  The patch failed these unit tests in hadoop-common-project/hadoop-common


    {color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: https://builds.apache.org/job/PreCommit-HADOOP-Build/4635//testReport/
Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/4635//console

This message is automatically generated.

> KMS should have a blacklist for decrypting EEKs
> -----------------------------------------------
>                 Key: HADOOP-10863
>                 URL: https://issues.apache.org/jira/browse/HADOOP-10863
>             Project: Hadoop Common
>          Issue Type: Improvement
>          Components: security
>    Affects Versions: 3.0.0
>            Reporter: Alejandro Abdelnur
>            Assignee: Arun Suresh
>         Attachments: HADOOP-10863.1.patch, HADOOP-10863.2.patch, HADOOP-10863.3.patch,
HADOOP-10863.4.patch, HADOOP-10863.5.patch
> In particular, we'll need to put HDFS admin user there by default to prevent an HDFS
admin from getting file encryption keys.

This message was sent by Atlassian JIRA

View raw message