You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-issues@hadoop.apache.org by "Santhosh G Nayak (JIRA)" <ji...@apache.org> on 2017/04/04 10:25:41 UTC
[jira] [Updated] (HADOOP-14273) Azure: Initialize
kerberosSupportEnabled in NativeAzureFileSystem using the value of
fs.azure.enable.kerberos.support configuration property
[ https://issues.apache.org/jira/browse/HADOOP-14273?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Santhosh G Nayak updated HADOOP-14273:
--------------------------------------
Attachment: HADOOP-14273.1.patch
Attaching the patch containing proposed changes.
> Azure: Initialize kerberosSupportEnabled in NativeAzureFileSystem using the value of fs.azure.enable.kerberos.support configuration property
> --------------------------------------------------------------------------------------------------------------------------------------------
>
> Key: HADOOP-14273
> URL: https://issues.apache.org/jira/browse/HADOOP-14273
> Project: Hadoop Common
> Issue Type: Bug
> Components: fs/azure
> Affects Versions: 2.8.0
> Reporter: Santhosh G Nayak
> Assignee: Santhosh G Nayak
> Attachments: HADOOP-14273.1.patch
>
>
> Currently, WASB driver uses the default value {{false}} for {{kerberosSupportEnabled}} in {{org.apache.hadoop.fs.azure.NativeAzureFileSystem}} which results in skipping the logic of fetching the delegation token from the remote service in secure mode (introduced in HADOOP-13945), which is incorrect.
> Fix is to initialize {{kerberosSupportEnabled}} instance member with value of the configuration property {{fs.azure.enable.kerberos.support}}.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)
---------------------------------------------------------------------
To unsubscribe, e-mail: common-issues-unsubscribe@hadoop.apache.org
For additional commands, e-mail: common-issues-help@hadoop.apache.org