[ 
https://issues.apache.org/jira/browse/HADOOP-13278?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15334120#comment-15334120
 ] 

Chris Nauroth commented on HADOOP-13278:
----------------------------------------

[~apetresc], I admit I hadn't considered interaction with IAM policies before, 
but I definitely see how this could be useful, and it's interesting to think 
about it.  Unfortunately, I don't see a viable way to satisfy the full range of 
possible authorization requirements that users have come to expect from a file 
system.

For the specific case that we started talking about here (walking up the 
ancestry to verify that there are no pre-existing files), it might work if that 
policy was changed slightly, so that the user was granted full access to 
/a/b/c/\*, and also granted read-only access to /\*.  I expect read access 
would be sufficient for the ancestry-checking logic.  Of course, if you also 
want to block read access to /, then this policy wouldn't satisfy the 
requirement.  It would only block write access on /.

Another consideration is handling of what we call a "fake directory", which is 
a pure metadata object used to indicate the presence of an empty directory.  
For example, consider an administrator allocating a bucket, bootstrapping the 
initial /a/b/c directory structure by running mkdir, and then applying the 
policy I described above.  At this point, S3A has persisted /a/b/c to the 
bucket as what we call a "fake directory", which is a pure metadata object that 
indicates the presence of an empty directory.  After the first file put, say 
/a/b/c/d, S3A no longer needs that pure metadata object to indicate the 
presence of the directory.  Instead, the directory exists implicitly via the 
existence of the file /a/b/c/d.  At that point, S3A would clean up the fake 
directory by deleting /a/b/c.  That implies the user would need to be granted 
delete access to /a/b/c itself, not just /a/b/c/*.  Now if we further consider 
the user deleting /a/b/c/d after that, then S3A needs to recreate the fake 
directory at /a/b/c, so the user is going to need put access on /a/b/c.

bq. Is this correct? If so, I'm not sure a separate issue is needed; the use 
case would simply be unsupported and I'll have to move my S3A filesystem to a 
bucket that grants Hadoop/Spark root access.

Definitely the typical usage is to dedicate the whole bucket to persistence of 
a single S3A file system, with the understanding of the authorization 
limitations that come with that.  Anyone who has credentials to access the 
bucket effectively has full access to that whole file system.  This is a known 
limitation, and it's common to other object store file systems like WASB too.  
I'm not aware of anyone trying to use IAM policies to restrict access to a 
sub-tree.  Certainly it's not something we actively test within the project 
right now, so in that sense, it's unsupported and you'd be treading new ground.

> S3AFileSystem mkdirs does not need to validate parent path components
> ---------------------------------------------------------------------
>
>                 Key: HADOOP-13278
>                 URL: https://issues.apache.org/jira/browse/HADOOP-13278
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: fs/s3, tools
>            Reporter: Adrian Petrescu
>            Priority: Minor
>
> According to S3 semantics, there is no conflict if a bucket contains a key 
> named {{a/b}} and also a directory named {{a/b/c}}. "Directories" in S3 are, 
> after all, nothing but prefixes.
> However, the {{mkdirs}} call in {{S3AFileSystem}} does go out of its way to 
> traverse every parent path component for the directory it's trying to create, 
> making sure there's no file with that name. This is suboptimal for three main 
> reasons:
>  * Wasted API calls, since the client is getting metadata for each path 
> component 
>  * This can cause *major* problems with buckets whose permissions are being 
> managed by IAM, where access may not be granted to the root bucket, but only 
> to some prefix. When you call {{mkdirs}}, even on a prefix that you have 
> access to, the traversal up the path will cause you to eventually hit the 
> root bucket, which will fail with a 403 - even though the directory creation 
> call would have succeeded.
>  * Some people might actually have a file that matches some other file's 
> prefix... I can't see why they would want to do that, but it's not against 
> S3's rules.
> I've opened a pull request with a simple patch that just removes this portion 
> of the check. I have tested it with my team's instance of Spark + Luigi, and 
> can confirm it works, and resolves the aforementioned permissions issue for a 
> bucket on which we only had prefix access.
> This is my first ticket/pull request against Hadoop, so let me know if I'm 
> not following some convention properly :)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to