You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@kafka.apache.org by "Matthias J. Sax (Jira)" <ji...@apache.org> on 2020/04/09 17:56:00 UTC

[jira] [Reopened] (KAFKA-9187) kafka.api.SaslGssapiSslEndToEndAuthorizationTest.testNoDescribeProduceOrConsumeWithoutTopicDescribeAcl

     [ https://issues.apache.org/jira/browse/KAFKA-9187?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Matthias J. Sax reopened KAFKA-9187:
------------------------------------

This test failed again with a different error message ([https://builds.apache.org/job/kafka-pr-jdk11-scala2.13/5711/testReport/junit/kafka.api/SaslGssapiSslEndToEndAuthorizationTest/testNoDescribeProduceOrConsumeWithoutTopicDescribeAcl/])
{quote}org.apache.kafka.common.protocol.types.SchemaException: Error reading field 'responses': Error reading array of size 65542, only 6 bytes available at org.apache.kafka.common.protocol.types.Schema.read(Schema.java:110) at org.apache.kafka.common.protocol.ApiKeys.parseResponse(ApiKeys.java:319) at org.apache.kafka.clients.NetworkClient.parseStructMaybeUpdateThrottleTimeMetrics(NetworkClient.java:725) at org.apache.kafka.clients.NetworkClient.handleCompletedReceives(NetworkClient.java:839) at org.apache.kafka.clients.NetworkClient.poll(NetworkClient.java:558) at org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:262) at org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:233) at org.apache.kafka.clients.consumer.KafkaConsumer.pollForFetches(KafkaConsumer.java:1297) at org.apache.kafka.clients.consumer.KafkaConsumer.poll(KafkaConsumer.java:1237) at org.apache.kafka.clients.consumer.KafkaConsumer.poll(KafkaConsumer.java:1205) at kafka.utils.TestUtils$.pollUntilAtLeastNumRecords(TestUtils.scala:795) at kafka.utils.TestUtils$.consumeRecords(TestUtils.scala:1354) at kafka.api.EndToEndAuthorizationTest.consumeRecords(EndToEndAuthorizationTest.scala:537) at kafka.api.EndToEndAuthorizationTest.consumeRecordsIgnoreOneAuthorizationException(EndToEndAuthorizationTest.scala:556) at kafka.api.EndToEndAuthorizationTest.testNoDescribeProduceOrConsumeWithoutTopicDescribeAcl(EndToEndAuthorizationTest.scala:376){quote}

> kafka.api.SaslGssapiSslEndToEndAuthorizationTest.testNoDescribeProduceOrConsumeWithoutTopicDescribeAcl
> ------------------------------------------------------------------------------------------------------
>
>                 Key: KAFKA-9187
>                 URL: https://issues.apache.org/jira/browse/KAFKA-9187
>             Project: Kafka
>          Issue Type: Test
>          Components: core
>            Reporter: Bill Bejeck
>            Priority: Major
>              Labels: flaky-test
>             Fix For: 2.4.0
>
>
> Failed in [https://builds.apache.org/job/kafka-pr-jdk8-scala2.11/26593/]
>  
> {noformat}
> Error Messageorg.scalatest.exceptions.TestFailedException: Consumed 0 records before timeout instead of the expected 1 recordsStacktraceorg.scalatest.exceptions.TestFailedException: Consumed 0 records before timeout instead of the expected 1 records
> 	at org.scalatest.Assertions$class.newAssertionFailedException(Assertions.scala:530)
> 	at org.scalatest.Assertions$.newAssertionFailedException(Assertions.scala:1389)
> 	at org.scalatest.Assertions$class.fail(Assertions.scala:1091)
> 	at org.scalatest.Assertions$.fail(Assertions.scala:1389)
> 	at kafka.utils.TestUtils$.waitUntilTrue(TestUtils.scala:842)
> 	at kafka.utils.TestUtils$.pollRecordsUntilTrue(TestUtils.scala:793)
> 	at kafka.utils.TestUtils$.pollUntilAtLeastNumRecords(TestUtils.scala:1334)
> 	at kafka.utils.TestUtils$.consumeRecords(TestUtils.scala:1343)
> 	at kafka.api.EndToEndAuthorizationTest.consumeRecords(EndToEndAuthorizationTest.scala:530)
> 	at kafka.api.EndToEndAuthorizationTest.testNoDescribeProduceOrConsumeWithoutTopicDescribeAcl(EndToEndAuthorizationTest.scala:369)
> 	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> 	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> 	at java.lang.reflect.Method.invoke(Method.java:498)
> 	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
> 	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
> 	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56)
> 	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
> 	at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> 	at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> 	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:305)
> 	at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
> 	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:365)
> 	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
> 	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
> 	at org.junit.runners.ParentRunner$4.run(ParentRunner.java:330)
> 	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:78)
> 	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:328)
> 	at org.junit.runners.ParentRunner.access$100(ParentRunner.java:65)
> 	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:292)
> 	at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
> 	at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27)
> 	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:305)
> 	at org.junit.runners.ParentRunner.run(ParentRunner.java:412)
> 	at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.runTestClass(JUnitTestClassExecutor.java:110)
> 	at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.execute(JUnitTestClassExecutor.java:58)
> 	at org.gradle.api.internal.tasks.testing.junit.JUnitTestClassExecutor.execute(JUnitTestClassExecutor.java:38)
> 	at org.gradle.api.internal.tasks.testing.junit.AbstractJUnitTestClassProcessor.processTestClass(AbstractJUnitTestClassProcessor.java:62)
> 	at org.gradle.api.internal.tasks.testing.SuiteTestClassProcessor.processTestClass(SuiteTestClassProcessor.java:51)
> 	at sun.reflect.GeneratedMethodAccessor12.invoke(Unknown Source)
> 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> 	at java.lang.reflect.Method.invoke(Method.java:498)
> 	at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:36)
> 	at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
> 	at org.gradle.internal.dispatch.ContextClassLoaderDispatch.dispatch(ContextClassLoaderDispatch.java:33)
> 	at org.gradle.internal.dispatch.ProxyDispatchAdapter$DispatchingInvocationHandler.invoke(ProxyDispatchAdapter.java:94)
> 	at com.sun.proxy.$Proxy2.processTestClass(Unknown Source)
> 	at org.gradle.api.internal.tasks.testing.worker.TestWorker.processTestClass(TestWorker.java:118)
> 	at sun.reflect.GeneratedMethodAccessor11.invoke(Unknown Source)
> 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> 	at java.lang.reflect.Method.invoke(Method.java:498)
> 	at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:36)
> 	at org.gradle.internal.dispatch.ReflectionDispatch.dispatch(ReflectionDispatch.java:24)
> 	at org.gradle.internal.remote.internal.hub.MessageHubBackedObjectConnection$DispatchWrapper.dispatch(MessageHubBackedObjectConnection.java:182)
> 	at org.gradle.internal.remote.internal.hub.MessageHubBackedObjectConnection$DispatchWrapper.dispatch(MessageHubBackedObjectConnection.java:164)
> 	at org.gradle.internal.remote.internal.hub.MessageHub$Handler.run(MessageHub.java:412)
> 	at org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:64)
> 	at org.gradle.internal.concurrent.ManagedExecutorImpl$1.run(ManagedExecutorImpl.java:48)
> 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
> 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
> 	at org.gradle.internal.concurrent.ThreadFactoryImpl$ManagedThreadRunnable.run(ThreadFactoryImpl.java:56)
> 	at java.lang.Thread.run(Thread.java:748)
> Standard OutputAdding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka6956053092858073839.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka7544779694857809493.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka7544779694857809493.tmp refreshKrb5Config is false principal is client2@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client2@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> [2019-11-14 00:05:16,760] ERROR [Consumer clientId=consumer-group-64, groupId=group] Topic authorization failed for topics [e2etopic] (org.apache.kafka.clients.Metadata:283)
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka1164866442124187878.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka5859610215295612432.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Create from hosts: * 
> [2019-11-14 00:05:27,930] ERROR [Consumer clientId=consumer-group-65, groupId=group] Topic authorization failed for topics [e2etopic] (org.apache.kafka.clients.Metadata:283)
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> [2019-11-14 00:05:28,437] ERROR [Consumer clientId=consumer-group-65, groupId=group] Topic authorization failed for topics [topic2] (org.apache.kafka.clients.Metadata:283)
> [2019-11-14 00:05:28,440] ERROR [Consumer clientId=consumer-group-65, groupId=group] Topic authorization failed for topics [topic2] (org.apache.kafka.clients.Metadata:283)
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka8747414312546582585.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2e, patternType=PREFIXED)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=gr, patternType=PREFIXED)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:PREFIXED:e2e`: 
>  	User:client has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Group:PREFIXED:gr`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka9087269612476946936.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka8309184149332187367.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka1141175465808765899.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka4492820688667369631.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka7127417062223263778.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka4842878770720273118.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=topic2, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:topic2`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=topic2, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:topic2`: 
>  	User:client has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka5625345472493495489.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka5120046464615928618.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=*, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:client has Allow permission for operations: Write from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Read from hosts: *
> 	User:kafka has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: * 
> Current ACLs for resource `Group:LITERAL:*`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka8065847533733093202.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka5718433880170346361.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka2477903581865723182.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka2468726472607360276.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka5732682815670095435.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Create from hosts: * 
> [2019-11-14 00:06:46,746] ERROR [Consumer clientId=consumer-group-72, groupId=group] Topic authorization failed for topics [e2etopic] (org.apache.kafka.clients.Metadata:283)
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka2013270490890764303.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka2326244927512378494.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka8457104099673983066.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka2302048904671721331.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka6086036635542397633.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka8629762638726138051.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> [2019-11-14 00:07:19,447] ERROR [Producer clientId=producer-178] Topic authorization failed for topics [e2etopic] (org.apache.kafka.clients.Metadata:283)
> [2019-11-14 00:07:19,472] ERROR [Consumer clientId=consumer-group-74, groupId=group] Topic authorization failed for topics [e2etopic] (org.apache.kafka.clients.Metadata:283)
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=topic2, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:topic2`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=topic2, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:topic2`: 
>  	User:client has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> [2019-11-14 00:07:20,026] ERROR [Producer clientId=producer-178] Topic authorization failed for topics [e2etopic] (org.apache.kafka.clients.Metadata:283)
> [2019-11-14 00:07:20,128] ERROR [Producer clientId=producer-178] Topic authorization failed for topics [e2etopic] (org.apache.kafka.clients.Metadata:283)
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> [2019-11-14 00:07:21,067] ERROR [Consumer clientId=consumer-group-74, groupId=group] Topic authorization failed for topics [e2etopic] (org.apache.kafka.clients.Metadata:283)
> Adding ACLs for resource `ResourcePattern(resourceType=CLUSTER, name=kafka-cluster, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=CLUSTER_ACTION, permissionType=ALLOW) 
> Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
>  	User:kafka has Allow permission for operations: ClusterAction from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=*, patternType=LITERAL)`: 
>  	(principal=User:kafka, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:*`: 
>  	User:kafka has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka3830268151830041256.tmp refreshKrb5Config is false principal is kafka/localhost@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is kafka/localhost@EXAMPLE.COM
> Will use keytab
> Commit Succeeded 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=CREATE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=WRITE, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Adding ACLs for resource `ResourcePattern(resourceType=TOPIC, name=e2etopic, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=DESCRIBE, permissionType=ALLOW)
> 	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Adding ACLs for resource `ResourcePattern(resourceType=GROUP, name=group, patternType=LITERAL)`: 
>  	(principal=User:client, host=*, operation=READ, permissionType=ALLOW) 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: 
>  	User:client has Allow permission for operations: Read from hosts: *
> 	User:client has Allow permission for operations: Describe from hosts: *
> 	User:client has Allow permission for operations: Create from hosts: *
> 	User:client has Allow permission for operations: Write from hosts: * 
> Current ACLs for resource `Group:LITERAL:group`: 
>  	User:client has Allow permission for operations: Read from hosts: * 
> Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt false ticketCache is null isInitiator true KeyTab is /tmp/kafka3967813509415878539.tmp refreshKrb5Config is false principal is client@EXAMPLE.COM tryFirstPass is false useFirstPass is false storePass is false clearPass is false
> principal is client@EXAMPLE.COM
> Will use keytab
> Commit Succeeded {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)