You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-issues@hadoop.apache.org by "Santhosh G Nayak (JIRA)" <ji...@apache.org> on 2017/04/04 10:25:41 UTC

[jira] [Updated] (HADOOP-14273) Azure: Initialize kerberosSupportEnabled in NativeAzureFileSystem using the value of fs.azure.enable.kerberos.support configuration property

     [ https://issues.apache.org/jira/browse/HADOOP-14273?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Santhosh G Nayak updated HADOOP-14273:
--------------------------------------
    Attachment: HADOOP-14273.1.patch

Attaching the patch containing proposed changes.

> Azure: Initialize kerberosSupportEnabled in NativeAzureFileSystem using the value of fs.azure.enable.kerberos.support configuration property
> --------------------------------------------------------------------------------------------------------------------------------------------
>
>                 Key: HADOOP-14273
>                 URL: https://issues.apache.org/jira/browse/HADOOP-14273
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: fs/azure
>    Affects Versions: 2.8.0
>            Reporter: Santhosh G Nayak
>            Assignee: Santhosh G Nayak
>         Attachments: HADOOP-14273.1.patch
>
>
> Currently, WASB driver uses the default value {{false}} for {{kerberosSupportEnabled}} in {{org.apache.hadoop.fs.azure.NativeAzureFileSystem}} which results in skipping the logic of fetching the delegation token from the remote service in secure mode (introduced in HADOOP-13945), which is incorrect. 
> Fix is to initialize {{kerberosSupportEnabled}} instance member with value of the configuration property {{fs.azure.enable.kerberos.support}}.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: common-issues-unsubscribe@hadoop.apache.org
For additional commands, e-mail: common-issues-help@hadoop.apache.org