Details
Description
After HADOOP-14445, KMS client always authenticates itself using the credentials from login user, rather than current user.
2018-12-07 15:58:30,663 DEBUG [main] org.apache.hadoop.crypto.key.kms.KMSClientProvider: Using loginUser when Kerberos is enabled but the actual user does not have either KMS Delegation Token or Kerberos Credentials
The log message "Using loginUser when Kerberos is enabled but the actual user does not have either KMS Delegation Token or Kerberos Credentials" is printed because KMSClientProvider#containsKmsDt() is null when it definitely has the kms delegation token.
In fact, KMSClientProvider#containsKmsDt() should select delegation token using clientTokenProvider.selectDelegationToken(creds) rather than checking if its dtService is in the user credentials.
This is done correctly in KMSClientProvider#createAuthenticatedURL though.
We found this bug when it broke Cloudera's Backup and Disaster Recovery tool.
daryn xiaochen mind taking a look? HADOOP-14445 is a huge patch but it is almost perfect except for this bug.
Attachments
Attachments
Issue Links
- is broken by
-
HADOOP-14445 Use DelegationTokenIssuer to create KMS delegation tokens that can authenticate to all KMS instances
- Resolved