HADOOP-8347. Hadoop Common logs misspell 'successful'. Contributed by Philip Zeyliger
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/trunk@1333321 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
470b1197be
commit
d948998777
@ -284,6 +284,9 @@ Release 2.0.0 - UNRELEASED
|
|||||||
|
|
||||||
HADOOP-8214. make hadoop script recognize a full set of deprecated commands (rvs via tucu)
|
HADOOP-8214. make hadoop script recognize a full set of deprecated commands (rvs via tucu)
|
||||||
|
|
||||||
|
HADOOP-8347. Hadoop Common logs misspell 'successful'.
|
||||||
|
(Philip Zeyliger via eli)
|
||||||
|
|
||||||
OPTIMIZATIONS
|
OPTIMIZATIONS
|
||||||
|
|
||||||
BUG FIXES
|
BUG FIXES
|
||||||
|
@ -217,7 +217,7 @@ public static RpcInvoker getRpcInvoker(RPC.RpcKind rpcKind) {
|
|||||||
public static final Log AUDITLOG =
|
public static final Log AUDITLOG =
|
||||||
LogFactory.getLog("SecurityLogger."+Server.class.getName());
|
LogFactory.getLog("SecurityLogger."+Server.class.getName());
|
||||||
private static final String AUTH_FAILED_FOR = "Auth failed for ";
|
private static final String AUTH_FAILED_FOR = "Auth failed for ";
|
||||||
private static final String AUTH_SUCCESSFULL_FOR = "Auth successfull for ";
|
private static final String AUTH_SUCCESSFUL_FOR = "Auth successful for ";
|
||||||
|
|
||||||
private static final ThreadLocal<Server> SERVER = new ThreadLocal<Server>();
|
private static final ThreadLocal<Server> SERVER = new ThreadLocal<Server>();
|
||||||
|
|
||||||
@ -1234,7 +1234,7 @@ public Object run() throws SaslException {
|
|||||||
LOG.debug("SASL server successfully authenticated client: " + user);
|
LOG.debug("SASL server successfully authenticated client: " + user);
|
||||||
}
|
}
|
||||||
rpcMetrics.incrAuthenticationSuccesses();
|
rpcMetrics.incrAuthenticationSuccesses();
|
||||||
AUDITLOG.info(AUTH_SUCCESSFULL_FOR + user);
|
AUDITLOG.info(AUTH_SUCCESSFUL_FOR + user);
|
||||||
saslContextEstablished = true;
|
saslContextEstablished = true;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
@ -59,7 +59,7 @@ public class ServiceAuthorizationManager {
|
|||||||
public static final Log AUDITLOG =
|
public static final Log AUDITLOG =
|
||||||
LogFactory.getLog("SecurityLogger."+ServiceAuthorizationManager.class.getName());
|
LogFactory.getLog("SecurityLogger."+ServiceAuthorizationManager.class.getName());
|
||||||
|
|
||||||
private static final String AUTHZ_SUCCESSFULL_FOR = "Authorization successfull for ";
|
private static final String AUTHZ_SUCCESSFUL_FOR = "Authorization successful for ";
|
||||||
private static final String AUTHZ_FAILED_FOR = "Authorization failed for ";
|
private static final String AUTHZ_FAILED_FOR = "Authorization failed for ";
|
||||||
|
|
||||||
|
|
||||||
@ -108,7 +108,7 @@ public void authorize(UserGroupInformation user,
|
|||||||
" is not authorized for protocol " + protocol +
|
" is not authorized for protocol " + protocol +
|
||||||
", expected client Kerberos principal is " + clientPrincipal);
|
", expected client Kerberos principal is " + clientPrincipal);
|
||||||
}
|
}
|
||||||
AUDITLOG.info(AUTHZ_SUCCESSFULL_FOR + user + " for protocol="+protocol);
|
AUDITLOG.info(AUTHZ_SUCCESSFUL_FOR + user + " for protocol="+protocol);
|
||||||
}
|
}
|
||||||
|
|
||||||
public synchronized void refresh(Configuration conf,
|
public synchronized void refresh(Configuration conf,
|
||||||
|
@ -70,7 +70,7 @@ Java_org_apache_hadoop_security_JniBasedUnixGroupsNetgroupMapping_getUsersForNet
|
|||||||
|
|
||||||
// set the name of the group for subsequent calls to getnetgrent
|
// set the name of the group for subsequent calls to getnetgrent
|
||||||
// note that we want to end group lokup regardless whether setnetgrent
|
// note that we want to end group lokup regardless whether setnetgrent
|
||||||
// was successfull or not (as long as it was called we need to call
|
// was successful or not (as long as it was called we need to call
|
||||||
// endnetgrent)
|
// endnetgrent)
|
||||||
setnetgrentCalledFlag = 1;
|
setnetgrentCalledFlag = 1;
|
||||||
if(setnetgrent(cgroup) == 1) {
|
if(setnetgrent(cgroup) == 1) {
|
||||||
|
Loading…
Reference in New Issue
Block a user