Return-Path: X-Original-To: apmail-hadoop-hdfs-issues-archive@minotaur.apache.org Delivered-To: apmail-hadoop-hdfs-issues-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 9DF45E72D for ; Mon, 11 Mar 2013 18:13:14 +0000 (UTC) Received: (qmail 41022 invoked by uid 500); 11 Mar 2013 18:13:14 -0000 Delivered-To: apmail-hadoop-hdfs-issues-archive@hadoop.apache.org Received: (qmail 40975 invoked by uid 500); 11 Mar 2013 18:13:14 -0000 Mailing-List: contact hdfs-issues-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: hdfs-issues@hadoop.apache.org Delivered-To: mailing list hdfs-issues@hadoop.apache.org Received: (qmail 40966 invoked by uid 99); 11 Mar 2013 18:13:14 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 11 Mar 2013 18:13:14 +0000 Date: Mon, 11 Mar 2013 18:13:14 +0000 (UTC) From: "Alejandro Abdelnur (JIRA)" To: hdfs-issues@hadoop.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Commented] (HDFS-3367) WebHDFS doesn't use the logged in user when opening connections MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/HDFS-3367?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13599079#comment-13599079 ] Alejandro Abdelnur commented on HDFS-3367: ------------------------------------------ AFAIK secure clients should fallback to pseudo if the target cluster is configured as pseudo. > WebHDFS doesn't use the logged in user when opening connections > --------------------------------------------------------------- > > Key: HDFS-3367 > URL: https://issues.apache.org/jira/browse/HDFS-3367 > Project: Hadoop HDFS > Issue Type: Sub-task > Components: webhdfs > Affects Versions: 0.23.0, 1.0.2, 2.0.0-alpha, 3.0.0 > Reporter: Jakob Homan > Assignee: Daryn Sharp > Priority: Critical > Attachments: HDFS-3367.branch-23.patch, HDFS-3367.branch-23.patch, HDFS-3367.patch, HDFS-3367.patch, HDFS-3367.patch > > > Something along the lines of > {noformat} > UserGroupInformation.loginUserFromKeytab() > Filesystem fs = FileSystem.get(new URI("webhdfs://blah"), conf) > {noformat} > doesn't work as webhdfs doesn't use the correct context and the user shows up to the spnego filter without kerberos credentials: > {noformat}Exception in thread "main" java.io.IOException: Authentication failed, url=http://:50070/webhdfs/v1/?op=GETDELEGATIONTOKEN&user.name= > at org.apache.hadoop.hdfs.web.WebHdfsFileSystem.getHttpUrlConnection(WebHdfsFileSystem.java:337) > at org.apache.hadoop.hdfs.web.WebHdfsFileSystem.httpConnect(WebHdfsFileSystem.java:347) > at org.apache.hadoop.hdfs.web.WebHdfsFileSystem.run(WebHdfsFileSystem.java:403) > at org.apache.hadoop.hdfs.web.WebHdfsFileSystem.getDelegationToken(WebHdfsFileSystem.java:675) > at org.apache.hadoop.hdfs.web.WebHdfsFileSystem.initDelegationToken(WebHdfsFileSystem.java:176) > at org.apache.hadoop.hdfs.web.WebHdfsFileSystem.initialize(WebHdfsFileSystem.java:160) > at org.apache.hadoop.fs.FileSystem.createFileSystem(FileSystem.java:1386) > ... > Caused by: org.apache.hadoop.security.authentication.client.AuthenticationException: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt) > at org.apache.hadoop.security.authentication.client.KerberosAuthenticator.doSpnegoSequence(KerberosAuthenticator.java:232) > at org.apache.hadoop.security.authentication.client.KerberosAuthenticator.authenticate(KerberosAuthenticator.java:141) > at org.apache.hadoop.security.authentication.client.AuthenticatedURL.openConnection(AuthenticatedURL.java:217) > at org.apache.hadoop.hdfs.web.WebHdfsFileSystem.getHttpUrlConnection(WebHdfsFileSystem.java:332) > ... 16 more > Caused by: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt) > at sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:130) > ...{noformat} > Explicitly getting the current user's context via a doAs block works, but this should be done by webhdfs. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira