- Where Developers Learn, Share, & Build Careers


I have created a new whoami command for which a fake username is required and / Path by adding it to .profile is designed in a way that is written in the written form which is called whoami before the actual yonamite

The main reason for doing this is that I have a Hadoop cluster I'm using remotely to access and copy the files under the duplicate usernames I received.

When I call whoami in the shell and even call $ PATH, then all this works well, before all of my Shrimated shows the way to humami. But for some reasons, when Hadop is called, then it does not take the created 'Jomi'

>

Most users do not use whoami to define a user's username or group. For example, to get more detailed information about you or id [username] (like id root ), enter id You can also use groups with groups to get more detailed information about other users, in addition to various programming languages ​​like C to determine user identity Are your ways Ase that getuid () command.

If you actually "need" your account as a cheating user, you will need to go to the OS level and make a hook in the kernel / API that handles those methods.

Is it possible that you simply copy chown files after this?

Update:

It appears that some of the releases of Hadop actually use whoami (

In this incident, the best (one word used loose) suggestion is valid valid whoami to be executable and a password shell script which goes to its place Custom script should validate the current user and if it is "hello", then return whatever you want - otherwise Answer pronounced Output Return Igor will work in this case.

Comments

Popular posts from this blog

Python SQLAlchemy:AttributeError: Neither 'Column' object nor 'Comparator' object has an attribute 'schema' -

java - How not to audit a join table and related entities using Hibernate Envers? -

mongodb - CakePHP paginator ignoring order, but only for certain values -