Return-Path: X-Original-To: apmail-accumulo-notifications-archive@minotaur.apache.org Delivered-To: apmail-accumulo-notifications-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id A71251787A for ; Tue, 24 Feb 2015 17:14:05 +0000 (UTC) Received: (qmail 48706 invoked by uid 500); 24 Feb 2015 17:14:04 -0000 Delivered-To: apmail-accumulo-notifications-archive@accumulo.apache.org Received: (qmail 48606 invoked by uid 500); 24 Feb 2015 17:14:04 -0000 Mailing-List: contact notifications-help@accumulo.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: jira@apache.org Delivered-To: mailing list notifications@accumulo.apache.org Received: (qmail 48244 invoked by uid 99); 24 Feb 2015 17:14:04 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 24 Feb 2015 17:14:04 +0000 Date: Tue, 24 Feb 2015 17:14:04 +0000 (UTC) From: "Josh Elser (JIRA)" To: notifications@accumulo.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Created] (ACCUMULO-3620) Consider removing check on UGI-logged-in user in KerberosToken MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 Josh Elser created ACCUMULO-3620: ------------------------------------ Summary: Consider removing check on UGI-logged-in user in KerberosToken Key: ACCUMULO-3620 URL: https://issues.apache.org/jira/browse/ACCUMULO-3620 Project: Accumulo Issue Type: Improvement Components: client Reporter: Josh Elser Assignee: Josh Elser Fix For: 1.7.0 Fixing a bunch of tests, I've found that the following is hard to work around: {code:title=KerberosToken.java} public KerberosToken() throws IOException { this(UserGroupInformation.getCurrentUser().getUserName()); } {code} It makes the client API harder to manage because you have to be logged in as the user you intend to be acting as. So, things like creating a new user "user" as a different user "root" is non-intuitive. Server-side, I know there is at least one place that we construct a KerberosToken which only works because the server is already logged in (but it's just used as a place holder and not as a substitute for some other user's credentials). I think we want to remove the check (make it an empty constructor), but I'm not sure what other checks would be desired/necessary to the constructors that accept arguments. -- This message was sent by Atlassian JIRA (v6.3.4#6332)