drill-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "ASF GitHub Bot (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (DRILL-4280) Kerberos Authentication
Date Tue, 07 Feb 2017 18:51:41 GMT

    [ https://issues.apache.org/jira/browse/DRILL-4280?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15856535#comment-15856535
] 

ASF GitHub Bot commented on DRILL-4280:
---------------------------------------

Github user sudheeshkatkam commented on a diff in the pull request:

    https://github.com/apache/drill/pull/578#discussion_r99898177
  
    --- Diff: exec/java-exec/src/test/java/org/apache/drill/exec/rpc/user/security/TestCustomUserAuthenticator.java
---
    @@ -56,16 +68,27 @@ public void positiveUserAuth() throws Exception {
         runTest(TEST_USER_2, TEST_USER_2_PASSWORD);
       }
     
    -
       @Test
       public void negativeUserAuth() throws Exception {
         negativeAuthHelper(TEST_USER_1, "blah.. blah..");
         negativeAuthHelper(TEST_USER_2, "blah.. blah..");
    -    negativeAuthHelper(TEST_USER_2, "");
         negativeAuthHelper("invalidUserName", "blah.. blah..");
       }
     
       @Test
    +  public void emptyPassword() throws Exception {
    +    try {
    +      runTest(TEST_USER_2, "");
    +      fail("Expected an exception.");
    +    } catch (RpcException e) {
    +      final String exMsg = e.getMessage();
    +      assertThat(exMsg, containsString("Insufficient credentials"));
    --- End diff --
    
    Not part of Kerberos testing, I just followed how the tests were written previously.


> Kerberos Authentication
> -----------------------
>
>                 Key: DRILL-4280
>                 URL: https://issues.apache.org/jira/browse/DRILL-4280
>             Project: Apache Drill
>          Issue Type: Improvement
>            Reporter: Keys Botzum
>            Assignee: Sudheesh Katkam
>              Labels: security
>
> Drill should support Kerberos based authentication from clients. This means that both
the ODBC and JDBC drivers as well as the web/REST interfaces should support inbound Kerberos.
For Web this would most likely be SPNEGO while for ODBC and JDBC this will be more generic
Kerberos.
> Since Hive and much of Hadoop supports Kerberos there is a potential for a lot of reuse
of ideas if not implementation.
> Note that this is related to but not the same as https://issues.apache.org/jira/browse/DRILL-3584




--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Mime
View raw message