Uploaded image for project: 'Hadoop Common'
  1. Hadoop Common
  2. HADOOP-9888

KerberosName static initialization gets default realm, which is unneeded in non-secure deployment.

    Details

    • Type: Bug
    • Status: Resolved
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: 2.1.1-beta, 3.0.0-alpha1
    • Fix Version/s: 3.0.0-alpha1
    • Component/s: security
    • Labels:
      None

      Description

      KerberosName has a static initialization block that looks up the default realm. Running with Oracle JDK7, this code path triggers a DNS query. In some environments, we've seen this DNS query block and time out after 30 seconds. This is part of static initialization, and the class is referenced from UserGroupInformation#initialize, so every daemon and every shell command experiences this delay. This occurs even for non-secure deployments, which don't need the default realm.

      1. HADOOP-9888.001.patch
        2 kB
        Dmytro Kabakchei

        Issue Links

          Activity

          Hide
          cnauroth Chris Nauroth added a comment -

          So far, we've only seen the DNS timeout happen in Windows VMs running in Azure with Oracle JDK 7. As a workaround, we created a file named krb5.ini in \Windows with the following contents:

          [libdefaults]
               default_realm = FOO.COM
               dns_lookup_realm = false
               dns_lookup_kdc = false
          

          I propose that if security is not enabled, we skip getting the default realm and just fall back to a default. We'll need to verify that KerberosName#defaultRealm is only used in code paths where security is enabled.

          One tricky aspect is that KerberosName can be referenced from UserGroupInformation#isSecurityEnabled, so the static initialization block might run before initialization of UserGroupInformation has completed. We might need to start with something similar to the HADOOP-6913 patch for 0.22 to break this circular initialization.

          Show
          cnauroth Chris Nauroth added a comment - So far, we've only seen the DNS timeout happen in Windows VMs running in Azure with Oracle JDK 7. As a workaround, we created a file named krb5.ini in \Windows with the following contents: [libdefaults] default_realm = FOO.COM dns_lookup_realm = false dns_lookup_kdc = false I propose that if security is not enabled, we skip getting the default realm and just fall back to a default. We'll need to verify that KerberosName#defaultRealm is only used in code paths where security is enabled. One tricky aspect is that KerberosName can be referenced from UserGroupInformation#isSecurityEnabled , so the static initialization block might run before initialization of UserGroupInformation has completed. We might need to start with something similar to the HADOOP-6913 patch for 0.22 to break this circular initialization.
          Hide
          beard Dmytro Kabakchei added a comment -

          Created patch for this. Just moved static initialization block inside getter method. Now default realm is resolved only for secure deployments.

          Show
          beard Dmytro Kabakchei added a comment - Created patch for this. Just moved static initialization block inside getter method. Now default realm is resolved only for secure deployments.
          Hide
          hadoopqa Hadoop QA added a comment -
          -1 overall



          Vote Subsystem Runtime Comment
          0 reexec 0m 0s Docker mode activated.
          0 patch 10m 9s The patch file was not named according to hadoop's naming conventions. Please see https://wiki.apache.org/hadoop/HowToContribute for instructions.
          +1 @author 0m 0s The patch does not contain any @author tags.
          -1 test4tests 0m 0s The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch.
          +1 mvninstall 7m 44s trunk passed
          +1 compile 8m 7s trunk passed with JDK v1.8.0_66
          +1 compile 8m 54s trunk passed with JDK v1.7.0_91
          +1 checkstyle 0m 7s trunk passed
          +1 mvnsite 0m 20s trunk passed
          +1 mvneclipse 0m 13s trunk passed
          +1 findbugs 0m 27s trunk passed
          +1 javadoc 0m 11s trunk passed with JDK v1.8.0_66
          +1 javadoc 0m 14s trunk passed with JDK v1.7.0_91
          +1 mvninstall 0m 14s the patch passed
          +1 compile 7m 59s the patch passed with JDK v1.8.0_66
          +1 javac 7m 59s the patch passed
          +1 compile 8m 50s the patch passed with JDK v1.7.0_91
          +1 javac 8m 50s the patch passed
          +1 checkstyle 0m 8s the patch passed
          +1 mvnsite 0m 20s the patch passed
          +1 mvneclipse 0m 13s the patch passed
          +1 whitespace 0m 0s Patch has no whitespace issues.
          +1 findbugs 0m 33s the patch passed
          +1 javadoc 0m 12s the patch passed with JDK v1.8.0_66
          +1 javadoc 0m 14s the patch passed with JDK v1.7.0_91
          +1 unit 3m 37s hadoop-auth in the patch passed with JDK v1.8.0_66.
          +1 unit 3m 56s hadoop-auth in the patch passed with JDK v1.7.0_91.
          +1 asflicense 0m 26s Patch does not generate ASF License warnings.
          64m 16s



          Subsystem Report/Notes
          Docker Image:yetus/hadoop:0ca8df7
          JIRA Patch URL https://issues.apache.org/jira/secure/attachment/12780287/HADOOP-9888-v2.7.2-patch.diff
          JIRA Issue HADOOP-9888
          Optional Tests asflicense compile javac javadoc mvninstall mvnsite unit findbugs checkstyle
          uname Linux 04793c65ac8a 3.13.0-36-lowlatency #63-Ubuntu SMP PREEMPT Wed Sep 3 21:56:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
          Build tool maven
          Personality /testptch/hadoop/patchprocess/precommit/personality/provided.sh
          git revision trunk / 7dafee1
          Default Java 1.7.0_91
          Multi-JDK versions /usr/lib/jvm/java-8-oracle:1.8.0_66 /usr/lib/jvm/java-7-openjdk-amd64:1.7.0_91
          findbugs v3.0.0
          JDK v1.7.0_91 Test Results https://builds.apache.org/job/PreCommit-HADOOP-Build/8333/testReport/
          modules C: hadoop-common-project/hadoop-auth U: hadoop-common-project/hadoop-auth
          Max memory used 75MB
          Powered by Apache Yetus 0.2.0-SNAPSHOT http://yetus.apache.org
          Console output https://builds.apache.org/job/PreCommit-HADOOP-Build/8333/console

          This message was automatically generated.

          Show
          hadoopqa Hadoop QA added a comment - -1 overall Vote Subsystem Runtime Comment 0 reexec 0m 0s Docker mode activated. 0 patch 10m 9s The patch file was not named according to hadoop's naming conventions. Please see https://wiki.apache.org/hadoop/HowToContribute for instructions. +1 @author 0m 0s The patch does not contain any @author tags. -1 test4tests 0m 0s The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch. +1 mvninstall 7m 44s trunk passed +1 compile 8m 7s trunk passed with JDK v1.8.0_66 +1 compile 8m 54s trunk passed with JDK v1.7.0_91 +1 checkstyle 0m 7s trunk passed +1 mvnsite 0m 20s trunk passed +1 mvneclipse 0m 13s trunk passed +1 findbugs 0m 27s trunk passed +1 javadoc 0m 11s trunk passed with JDK v1.8.0_66 +1 javadoc 0m 14s trunk passed with JDK v1.7.0_91 +1 mvninstall 0m 14s the patch passed +1 compile 7m 59s the patch passed with JDK v1.8.0_66 +1 javac 7m 59s the patch passed +1 compile 8m 50s the patch passed with JDK v1.7.0_91 +1 javac 8m 50s the patch passed +1 checkstyle 0m 8s the patch passed +1 mvnsite 0m 20s the patch passed +1 mvneclipse 0m 13s the patch passed +1 whitespace 0m 0s Patch has no whitespace issues. +1 findbugs 0m 33s the patch passed +1 javadoc 0m 12s the patch passed with JDK v1.8.0_66 +1 javadoc 0m 14s the patch passed with JDK v1.7.0_91 +1 unit 3m 37s hadoop-auth in the patch passed with JDK v1.8.0_66. +1 unit 3m 56s hadoop-auth in the patch passed with JDK v1.7.0_91. +1 asflicense 0m 26s Patch does not generate ASF License warnings. 64m 16s Subsystem Report/Notes Docker Image:yetus/hadoop:0ca8df7 JIRA Patch URL https://issues.apache.org/jira/secure/attachment/12780287/HADOOP-9888-v2.7.2-patch.diff JIRA Issue HADOOP-9888 Optional Tests asflicense compile javac javadoc mvninstall mvnsite unit findbugs checkstyle uname Linux 04793c65ac8a 3.13.0-36-lowlatency #63-Ubuntu SMP PREEMPT Wed Sep 3 21:56:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Build tool maven Personality /testptch/hadoop/patchprocess/precommit/personality/provided.sh git revision trunk / 7dafee1 Default Java 1.7.0_91 Multi-JDK versions /usr/lib/jvm/java-8-oracle:1.8.0_66 /usr/lib/jvm/java-7-openjdk-amd64:1.7.0_91 findbugs v3.0.0 JDK v1.7.0_91 Test Results https://builds.apache.org/job/PreCommit-HADOOP-Build/8333/testReport/ modules C: hadoop-common-project/hadoop-auth U: hadoop-common-project/hadoop-auth Max memory used 75MB Powered by Apache Yetus 0.2.0-SNAPSHOT http://yetus.apache.org Console output https://builds.apache.org/job/PreCommit-HADOOP-Build/8333/console This message was automatically generated.
          Hide
          beard Dmytro Kabakchei added a comment -

          Wrong patch naming

          Show
          beard Dmytro Kabakchei added a comment - Wrong patch naming
          Hide
          beard Dmytro Kabakchei added a comment -

          The patch doesn't include tests because the only thing that was changed is a time and way of private field initialization. So the patch doesn't change expected behavior or any interface.

          Show
          beard Dmytro Kabakchei added a comment - The patch doesn't include tests because the only thing that was changed is a time and way of private field initialization. So the patch doesn't change expected behavior or any interface.
          Hide
          beard Dmytro Kabakchei added a comment -

          Somebody, please, review.

          Show
          beard Dmytro Kabakchei added a comment - Somebody, please, review.
          Hide
          hadoopqa Hadoop QA added a comment -
          -1 overall



          Vote Subsystem Runtime Comment
          0 reexec 0m 0s Docker mode activated.
          +1 @author 0m 0s The patch does not contain any @author tags.
          -1 test4tests 0m 0s The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch.
          +1 mvninstall 7m 43s trunk passed
          +1 compile 9m 9s trunk passed with JDK v1.8.0_66
          +1 compile 8m 38s trunk passed with JDK v1.7.0_91
          +1 checkstyle 0m 9s trunk passed
          +1 mvnsite 0m 22s trunk passed
          +1 mvneclipse 0m 13s trunk passed
          +1 findbugs 0m 26s trunk passed
          +1 javadoc 0m 12s trunk passed with JDK v1.8.0_66
          +1 javadoc 0m 14s trunk passed with JDK v1.7.0_91
          +1 mvninstall 0m 15s the patch passed
          +1 compile 7m 36s the patch passed with JDK v1.8.0_66
          +1 javac 7m 36s the patch passed
          +1 compile 8m 32s the patch passed with JDK v1.7.0_91
          +1 javac 8m 32s the patch passed
          +1 checkstyle 0m 7s the patch passed
          +1 mvnsite 0m 20s the patch passed
          +1 mvneclipse 0m 12s the patch passed
          +1 whitespace 0m 0s Patch has no whitespace issues.
          +1 findbugs 0m 35s the patch passed
          +1 javadoc 0m 12s the patch passed with JDK v1.8.0_66
          +1 javadoc 0m 14s the patch passed with JDK v1.7.0_91
          +1 unit 3m 36s hadoop-auth in the patch passed with JDK v1.8.0_66.
          +1 unit 3m 58s hadoop-auth in the patch passed with JDK v1.7.0_91.
          +1 asflicense 0m 24s Patch does not generate ASF License warnings.
          67m 3s



          Subsystem Report/Notes
          Docker Image:yetus/hadoop:0ca8df7
          JIRA Patch URL https://issues.apache.org/jira/secure/attachment/12780572/HADOOP-9888.001.patch
          JIRA Issue HADOOP-9888
          Optional Tests asflicense compile javac javadoc mvninstall mvnsite unit findbugs checkstyle
          uname Linux e9d104a9d05b 3.13.0-36-lowlatency #63-Ubuntu SMP PREEMPT Wed Sep 3 21:56:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
          Build tool maven
          Personality /testptch/hadoop/patchprocess/precommit/personality/provided.sh
          git revision trunk / 96d8f1d
          Default Java 1.7.0_91
          Multi-JDK versions /usr/lib/jvm/java-8-oracle:1.8.0_66 /usr/lib/jvm/java-7-openjdk-amd64:1.7.0_91
          findbugs v3.0.0
          JDK v1.7.0_91 Test Results https://builds.apache.org/job/PreCommit-HADOOP-Build/8341/testReport/
          modules C: hadoop-common-project/hadoop-auth U: hadoop-common-project/hadoop-auth
          Max memory used 76MB
          Powered by Apache Yetus 0.2.0-SNAPSHOT http://yetus.apache.org
          Console output https://builds.apache.org/job/PreCommit-HADOOP-Build/8341/console

          This message was automatically generated.

          Show
          hadoopqa Hadoop QA added a comment - -1 overall Vote Subsystem Runtime Comment 0 reexec 0m 0s Docker mode activated. +1 @author 0m 0s The patch does not contain any @author tags. -1 test4tests 0m 0s The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch. +1 mvninstall 7m 43s trunk passed +1 compile 9m 9s trunk passed with JDK v1.8.0_66 +1 compile 8m 38s trunk passed with JDK v1.7.0_91 +1 checkstyle 0m 9s trunk passed +1 mvnsite 0m 22s trunk passed +1 mvneclipse 0m 13s trunk passed +1 findbugs 0m 26s trunk passed +1 javadoc 0m 12s trunk passed with JDK v1.8.0_66 +1 javadoc 0m 14s trunk passed with JDK v1.7.0_91 +1 mvninstall 0m 15s the patch passed +1 compile 7m 36s the patch passed with JDK v1.8.0_66 +1 javac 7m 36s the patch passed +1 compile 8m 32s the patch passed with JDK v1.7.0_91 +1 javac 8m 32s the patch passed +1 checkstyle 0m 7s the patch passed +1 mvnsite 0m 20s the patch passed +1 mvneclipse 0m 12s the patch passed +1 whitespace 0m 0s Patch has no whitespace issues. +1 findbugs 0m 35s the patch passed +1 javadoc 0m 12s the patch passed with JDK v1.8.0_66 +1 javadoc 0m 14s the patch passed with JDK v1.7.0_91 +1 unit 3m 36s hadoop-auth in the patch passed with JDK v1.8.0_66. +1 unit 3m 58s hadoop-auth in the patch passed with JDK v1.7.0_91. +1 asflicense 0m 24s Patch does not generate ASF License warnings. 67m 3s Subsystem Report/Notes Docker Image:yetus/hadoop:0ca8df7 JIRA Patch URL https://issues.apache.org/jira/secure/attachment/12780572/HADOOP-9888.001.patch JIRA Issue HADOOP-9888 Optional Tests asflicense compile javac javadoc mvninstall mvnsite unit findbugs checkstyle uname Linux e9d104a9d05b 3.13.0-36-lowlatency #63-Ubuntu SMP PREEMPT Wed Sep 3 21:56:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Build tool maven Personality /testptch/hadoop/patchprocess/precommit/personality/provided.sh git revision trunk / 96d8f1d Default Java 1.7.0_91 Multi-JDK versions /usr/lib/jvm/java-8-oracle:1.8.0_66 /usr/lib/jvm/java-7-openjdk-amd64:1.7.0_91 findbugs v3.0.0 JDK v1.7.0_91 Test Results https://builds.apache.org/job/PreCommit-HADOOP-Build/8341/testReport/ modules C: hadoop-common-project/hadoop-auth U: hadoop-common-project/hadoop-auth Max memory used 76MB Powered by Apache Yetus 0.2.0-SNAPSHOT http://yetus.apache.org Console output https://builds.apache.org/job/PreCommit-HADOOP-Build/8341/console This message was automatically generated.
          Hide
          drankye Kai Zheng added a comment -

          The patch looks good to me. I would suggest we move the following block along the static value to KerberosUtil so that all the places that need the default realm and call KerberosUtil#getDefaultRealm() can be updated to share the value.

          +  public static synchronized String getDefaultRealm() {
          +    if (defaultRealm == null) {
          +      try {
          +        defaultRealm = KerberosUtil.getDefaultRealm();
          +      } catch (Exception ke) {
          +        LOG.debug("Kerberos krb5 configuration not found, setting default realm to empty");
          +        defaultRealm = "";
          +      }
          +    }
               return defaultRealm;
             }
          
          Show
          drankye Kai Zheng added a comment - The patch looks good to me. I would suggest we move the following block along the static value to KerberosUtil so that all the places that need the default realm and call KerberosUtil#getDefaultRealm() can be updated to share the value. + public static synchronized String getDefaultRealm() { + if (defaultRealm == null ) { + try { + defaultRealm = KerberosUtil.getDefaultRealm(); + } catch (Exception ke) { + LOG.debug( "Kerberos krb5 configuration not found, setting default realm to empty" ); + defaultRealm = ""; + } + } return defaultRealm; }
          Hide
          beard Dmytro Kabakchei added a comment -

          Got your point. Completely agree with you.
          I'll move that block to KerberosUtil and reorganize everything to catch up changes.

          Show
          beard Dmytro Kabakchei added a comment - Got your point. Completely agree with you. I'll move that block to KerberosUtil and reorganize everything to catch up changes.
          Hide
          beard Dmytro Kabakchei added a comment -

          I've finished reviewing of what changes refactoring proposed by Kai Zheng would require.
          It requires changes to KerberosUtil, KerberosName, HadoopKerberosName, RegistrySecurity classes and some tests. Although such changes are possible, but solutions to resolve exceptions handing logic for those classes are very ugly. I'm afraid that such refactoring would bring some overhead and make code very ugly.
          Nevertheless, DNS lookup stays as it was, but now it is skipped for non-secure deployments.

          Somebody, please, review the patch and approve or reject it with explanation.

          Show
          beard Dmytro Kabakchei added a comment - I've finished reviewing of what changes refactoring proposed by Kai Zheng would require. It requires changes to KerberosUtil, KerberosName, HadoopKerberosName, RegistrySecurity classes and some tests. Although such changes are possible, but solutions to resolve exceptions handing logic for those classes are very ugly. I'm afraid that such refactoring would bring some overhead and make code very ugly. Nevertheless, DNS lookup stays as it was, but now it is skipped for non-secure deployments. Somebody, please, review the patch and approve or reject it with explanation.
          Hide
          hadoopqa Hadoop QA added a comment -
          -1 overall



          Vote Subsystem Runtime Comment
          0 reexec 0m 17s Docker mode activated.
          +1 @author 0m 0s The patch does not contain any @author tags.
          -1 test4tests 0m 0s The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch.
          +1 mvninstall 7m 3s trunk passed
          +1 compile 6m 50s trunk passed
          +1 checkstyle 0m 13s trunk passed
          +1 mvnsite 0m 16s trunk passed
          +1 mvneclipse 0m 11s trunk passed
          +1 findbugs 0m 22s trunk passed
          +1 javadoc 0m 12s trunk passed
          +1 mvninstall 0m 12s the patch passed
          +1 compile 7m 2s the patch passed
          +1 javac 7m 2s the patch passed
          +1 checkstyle 0m 13s hadoop-common-project/hadoop-auth: The patch generated 0 new + 11 unchanged - 2 fixed = 11 total (was 13)
          +1 mvnsite 0m 17s the patch passed
          +1 mvneclipse 0m 11s the patch passed
          +1 whitespace 0m 0s The patch has no whitespace issues.
          +1 findbugs 0m 29s the patch passed
          +1 javadoc 0m 13s the patch passed
          +1 unit 3m 24s hadoop-auth in the patch passed.
          +1 asflicense 0m 22s The patch does not generate ASF License warnings.
          29m 9s



          Subsystem Report/Notes
          Docker Image:yetus/hadoop:85209cc
          JIRA Patch URL https://issues.apache.org/jira/secure/attachment/12780572/HADOOP-9888.001.patch
          JIRA Issue HADOOP-9888
          Optional Tests asflicense compile javac javadoc mvninstall mvnsite unit findbugs checkstyle
          uname Linux 3ec6cd2d1c85 3.13.0-36-lowlatency #63-Ubuntu SMP PREEMPT Wed Sep 3 21:56:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
          Build tool maven
          Personality /testptch/hadoop/patchprocess/precommit/personality/provided.sh
          git revision trunk / 23c3ff8
          Default Java 1.8.0_91
          findbugs v3.0.0
          Test Results https://builds.apache.org/job/PreCommit-HADOOP-Build/9885/testReport/
          modules C: hadoop-common-project/hadoop-auth U: hadoop-common-project/hadoop-auth
          Console output https://builds.apache.org/job/PreCommit-HADOOP-Build/9885/console
          Powered by Apache Yetus 0.4.0-SNAPSHOT http://yetus.apache.org

          This message was automatically generated.

          Show
          hadoopqa Hadoop QA added a comment - -1 overall Vote Subsystem Runtime Comment 0 reexec 0m 17s Docker mode activated. +1 @author 0m 0s The patch does not contain any @author tags. -1 test4tests 0m 0s The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch. +1 mvninstall 7m 3s trunk passed +1 compile 6m 50s trunk passed +1 checkstyle 0m 13s trunk passed +1 mvnsite 0m 16s trunk passed +1 mvneclipse 0m 11s trunk passed +1 findbugs 0m 22s trunk passed +1 javadoc 0m 12s trunk passed +1 mvninstall 0m 12s the patch passed +1 compile 7m 2s the patch passed +1 javac 7m 2s the patch passed +1 checkstyle 0m 13s hadoop-common-project/hadoop-auth: The patch generated 0 new + 11 unchanged - 2 fixed = 11 total (was 13) +1 mvnsite 0m 17s the patch passed +1 mvneclipse 0m 11s the patch passed +1 whitespace 0m 0s The patch has no whitespace issues. +1 findbugs 0m 29s the patch passed +1 javadoc 0m 13s the patch passed +1 unit 3m 24s hadoop-auth in the patch passed. +1 asflicense 0m 22s The patch does not generate ASF License warnings. 29m 9s Subsystem Report/Notes Docker Image:yetus/hadoop:85209cc JIRA Patch URL https://issues.apache.org/jira/secure/attachment/12780572/HADOOP-9888.001.patch JIRA Issue HADOOP-9888 Optional Tests asflicense compile javac javadoc mvninstall mvnsite unit findbugs checkstyle uname Linux 3ec6cd2d1c85 3.13.0-36-lowlatency #63-Ubuntu SMP PREEMPT Wed Sep 3 21:56:12 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux Build tool maven Personality /testptch/hadoop/patchprocess/precommit/personality/provided.sh git revision trunk / 23c3ff8 Default Java 1.8.0_91 findbugs v3.0.0 Test Results https://builds.apache.org/job/PreCommit-HADOOP-Build/9885/testReport/ modules C: hadoop-common-project/hadoop-auth U: hadoop-common-project/hadoop-auth Console output https://builds.apache.org/job/PreCommit-HADOOP-Build/9885/console Powered by Apache Yetus 0.4.0-SNAPSHOT http://yetus.apache.org This message was automatically generated.
          Hide
          aw Allen Wittenauer added a comment -

          +1 committed to trunk.

          Thanks!

          Show
          aw Allen Wittenauer added a comment - +1 committed to trunk. Thanks!
          Hide
          hudson Hudson added a comment -

          SUCCESS: Integrated in Hadoop-trunk-Commit #10027 (See https://builds.apache.org/job/Hadoop-trunk-Commit/10027/)
          HADOOP-9888. KerberosName static initialization gets default realm, (aw: rev be38e530bb23b134758e29c9101f98cf4e1d2c38)

          • hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/util/KerberosName.java
          Show
          hudson Hudson added a comment - SUCCESS: Integrated in Hadoop-trunk-Commit #10027 (See https://builds.apache.org/job/Hadoop-trunk-Commit/10027/ ) HADOOP-9888 . KerberosName static initialization gets default realm, (aw: rev be38e530bb23b134758e29c9101f98cf4e1d2c38) hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/util/KerberosName.java

            People

            • Assignee:
              beard Dmytro Kabakchei
              Reporter:
              cnauroth Chris Nauroth
            • Votes:
              0 Vote for this issue
              Watchers:
              11 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved:

                Development