You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@kyuubi.apache.org by GitBox <gi...@apache.org> on 2021/09/24 03:01:16 UTC

[GitHub] [incubator-kyuubi] yaooqinn opened a new issue #1145: [Bug] Suppress MiniDFS/YARNCluster/ Kerberos output in tests

yaooqinn opened a new issue #1145:
URL: https://github.com/apache/incubator-kyuubi/issues/1145


   ### Code of Conduct
   
   - [X] I agree to follow this project's [Code of Conduct](https://www.apache.org/foundation/policies/conduct)
   
   
   ### Search before asking
   
   - [X] I have searched in the [issues](https://github.com/apache/incubator-kyuubi/issues?q=is%3Aissue) and found no similar issues.
   
   
   ### Describe the bug
   
   ```
   HadoopFsDelegationTokenProviderSuite:
   >>>DEBUG: TCPClient reading 173 bytes
   >>> KrbKdcReq send: #bytes read=173
   >>>Pre-Authentication Data:
   	 PA-DATA type = 19
   	 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   >>> KdcAccessibility: remove localhost:50936
   >>> KDCRep: init() encoding tag is 126 req type is 11
   >>>KRBError:
   	 sTime is Fri Sep 24 10:40:47 CST 2021 1632451247000
   	 suSec is 100
   	 error code is 25
   	 error Message is Additional pre-authentication required
   	 sname is client/localhost@KERBERIZEDTESTHELPER.COM
   	 eData provided.
   	 msgType is 30
   >>>Pre-Authentication Data:
   	 PA-DATA type = 19
   	 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   KRBError received: Additional pre-authentication required
   KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
   default etypes for default_tkt_enctypes: 17.
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=260
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=260
   >>>DEBUG: TCPClient reading 620 bytes
   >>> KrbKdcReq send: #bytes read=620
   >>> KdcAccessibility: remove localhost:50936
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsRep cons in KrbAsReq.getReply client/localhost
   Java config name: /Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf
   Loaded from Java config
   >>> KdcAccessibility: reset
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=172
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=172
   >>>DEBUG: TCPClient reading 173 bytes
   >>> KrbKdcReq send: #bytes read=173
   >>>Pre-Authentication Data:
   	 PA-DATA type = 19
   	 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   >>> KdcAccessibility: remove localhost:50936
   >>> KDCRep: init() encoding tag is 126 req type is 11
   >>>KRBError:
   	 sTime is Fri Sep 24 10:40:48 CST 2021 1632451248000
   	 suSec is 100
   	 error code is 25
   	 error Message is Additional pre-authentication required
   	 sname is client/localhost@KERBERIZEDTESTHELPER.COM
   	 eData provided.
   	 msgType is 30
   >>>Pre-Authentication Data:
   	 PA-DATA type = 19
   	 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   KRBError received: Additional pre-authentication required
   KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
   default etypes for default_tkt_enctypes: 17.
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=260
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=260
   >>>DEBUG: TCPClient reading 620 bytes
   >>> KrbKdcReq send: #bytes read=620
   >>> KdcAccessibility: remove localhost:50936
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsRep cons in KrbAsReq.getReply client/localhost
   Formatting using clusterid: testClusterID
   Java config name: /Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf
   Loaded from Java config
   >>> KdcAccessibility: reset
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=172
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=172
   >>>DEBUG: TCPClient reading 173 bytes
   >>> KrbKdcReq send: #bytes read=173
   >>>Pre-Authentication Data:
   	 PA-DATA type = 19
   	 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   >>> KdcAccessibility: remove localhost:50936
   >>> KDCRep: init() encoding tag is 126 req type is 11
   >>>KRBError:
   	 sTime is Fri Sep 24 10:40:49 CST 2021 1632451249000
   	 suSec is 100
   	 error code is 25
   	 error Message is Additional pre-authentication required
   	 sname is client/localhost@KERBERIZEDTESTHELPER.COM
   	 eData provided.
   	 msgType is 30
   >>>Pre-Authentication Data:
   	 PA-DATA type = 19
   	 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   KRBError received: Additional pre-authentication required
   KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
   default etypes for default_tkt_enctypes: 17.
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=260
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=260
   >>>DEBUG: TCPClient reading 620 bytes
   >>> KrbKdcReq send: #bytes read=620
   >>> KdcAccessibility: remove localhost:50936
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsRep cons in KrbAsReq.getReply client/localhost
   isSaslEnabled:false
   Opened streaming server at /0.0.0.0:1025
   Successfully obtained privileged resources (streaming port = ServerSocket[addr=/0:0:0:0:0:0:0:0,localport=1025] ) (http listener port = 9864)
   Opened info server at /0.0.0.0:9864
   Java config name: /Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf
   Loaded from Java config
   >>> KdcAccessibility: reset
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=172
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=172
   >>>DEBUG: TCPClient reading 173 bytes
   >>> KrbKdcReq send: #bytes read=173
   >>>Pre-Authentication Data:
   	 PA-DATA type = 19
   	 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   >>> KdcAccessibility: remove localhost:50936
   >>> KDCRep: init() encoding tag is 126 req type is 11
   >>>KRBError:
   	 sTime is Fri Sep 24 10:40:54 CST 2021 1632451254000
   	 suSec is 100
   	 error code is 25
   	 error Message is Additional pre-authentication required
   	 sname is client/localhost@KERBERIZEDTESTHELPER.COM
   	 eData provided.
   	 msgType is 30
   >>>Pre-Authentication Data:
   	 PA-DATA type = 19
   	 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   KRBError received: Additional pre-authentication required
   KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
   default etypes for default_tkt_enctypes: 17.
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=260
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=260
   >>>DEBUG: TCPClient reading 620 bytes
   >>> KrbKdcReq send: #bytes read=620
   >>> KdcAccessibility: remove localhost:50936
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsRep cons in KrbAsReq.getReply client/localhost
   Found ticket for client/localhost@KERBERIZEDTESTHELPER.COM to go to krbtgt/KERBERIZEDTESTHELPER.COM@KERBERIZEDTESTHELPER.COM expiring on Thu Jun 20 10:40:54 CST 2024
   Entered Krb5Context.initSecContext with state=STATE_NEW
   Found ticket for client/localhost@KERBERIZEDTESTHELPER.COM to go to krbtgt/KERBERIZEDTESTHELPER.COM@KERBERIZEDTESTHELPER.COM expiring on Thu Jun 20 10:40:54 CST 2024
   Service ticket not found in the subject
   >>> Credentials acquireServiceCreds: same realm
   default etypes for default_tgs_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> CksumType: sun.security.krb5.internal.crypto.HmacSha1Aes128CksumType
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=639
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=639
   >>>DEBUG: TCPClient reading 585 bytes
   >>> KrbKdcReq send: #bytes read=585
   >>> KdcAccessibility: remove localhost:50936
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbApReq: APOptions are 00100000 00000000 00000000 00000000
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   Krb5Context setting mySeqNumber to: 954773118
   Created InitSecContextToken:
   0000: 01 00 6E 82 02 0B 30 82   02 07 A0 03 02 01 05 A1  ..n...0.........
   0010: 03 02 01 0E A2 07 03 05   00 20 00 00 00 A3 82 01  ......... ......
   0020: 16 61 82 01 12 30 82 01   0E A0 03 02 01 05 A1 1A  .a...0..........
   0030: 1B 18 4B 45 52 42 45 52   49 5A 45 44 54 45 53 54  ..KERBERIZEDTEST
   0040: 48 45 4C 50 45 52 2E 43   4F 4D A2 1E 30 1C A0 03  HELPER.COM..0...
   0050: 02 01 00 A1 15 30 13 1B   06 63 6C 69 65 6E 74 1B  .....0...client.
   0060: 09 6C 6F 63 61 6C 68 6F   73 74 A3 81 CA 30 81 C7  .localhost...0..
   0070: A0 03 02 01 11 A1 03 02   01 01 A2 81 BA 04 81 B7  ................
   0080: 0C 42 B8 BB FD 65 27 29   10 44 E1 37 9D C0 65 2C  .B...e').D.7..e,
   0090: 1D 97 1A A4 A9 91 F2 C4   CE 02 97 A2 F4 65 15 6A  .............e.j
   00A0: F7 79 01 7B 57 EE 67 75   64 47 D4 E6 BB 6A 00 69  .y..W.gudG...j.i
   00B0: 16 62 AE 00 2E 11 88 F3   6E 17 6E 2F 37 C6 F7 64  .b......n.n/7..d
   00C0: 7A 80 F7 8E A4 EA 9E BD   AE 58 D4 F4 5C 0B A2 39  z........X..\..9
   00D0: 8C B0 B6 A5 D3 2E EB F2   2C E5 A4 E2 52 9F 0C F8  ........,...R...
   00E0: F7 3F 48 A5 59 5C ED B7   37 AF E5 E5 E5 36 96 B9  .?H.Y\..7....6..
   00F0: 20 70 0F 6C DE 47 67 23   94 5C FF 99 EE 50 40 90   p.l.Gg#.\...P@.
   0100: 56 B7 CA 54 ED 9E 0E 07   97 C5 EE 80 D5 28 2B CD  V..T.........(+.
   0110: FE A2 31 F2 28 DE 71 6B   E6 B7 99 E0 66 45 6C 00  ..1.(.qk....fEl.
   0120: 69 48 51 B1 74 BF 0C 74   48 EA 76 C5 30 27 39 D4  iHQ.t..tH.v.0'9.
   0130: 56 45 9F 03 F0 35 C4 A4   81 D7 30 81 D4 A0 03 02  VE...5....0.....
   0140: 01 11 A2 81 CC 04 81 C9   E0 9C A4 A0 F5 71 D0 BC  .............q..
   0150: DC 65 A4 64 AE 75 D3 BE   43 98 38 71 AF 26 D1 5B  .e.d.u..C.8q.&.[
   0160: EC B4 E2 30 7A 36 C0 69   2E FC D8 54 C5 C7 86 AB  ...0z6.i...T....
   0170: E4 84 A6 A9 5D 50 5D 0A   5A CC 27 62 52 7D 1E 7F  ....]P].Z.'bR...
   0180: C4 EA A4 96 3E 28 91 02   BB 86 D8 97 E6 84 A2 18  ....>(..........
   0190: 8B 36 6B F1 0E F1 7F 3A   2B 93 F1 9C B2 83 62 D3  .6k....:+.....b.
   01A0: 98 24 41 ED 6B B5 75 7A   2D D8 74 30 5E 9F 75 FA  .$A.k.uz-.t0^.u.
   01B0: D2 3C 27 4F B3 C4 D8 B1   56 9F 0B 12 56 B5 DC 8A  .<'O....V...V...
   01C0: B9 E4 96 6B 74 1E 05 A8   03 97 5D 4C 2F 4F 91 A3  ...kt.....]L/O..
   01D0: 0B 50 61 D3 98 0F 40 F0   5A 0D 9B C3 CA 70 DA 3A  .Pa...@.Z....p.:
   01E0: CC 03 DA 21 D0 68 24 67   63 AE C6 53 B3 C2 63 32  ...!.h$gc..S..c2
   01F0: 5D A0 6E FD D3 44 FA 75   7E B5 6C 77 04 DC 23 05  ].n..D.u..lw..#.
   0200: D4 02 4F A0 3F 08 DA EB   B1 EB 0A A7 86 FE 97 76  ..O.?..........v
   0210: 08                                                 .
   
   Found KeyTab /Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/kyuubi-test.keytab for client/localhost@KERBERIZEDTESTHELPER.COM
   Found ticket for client/localhost@KERBERIZEDTESTHELPER.COM to go to krbtgt/KERBERIZEDTESTHELPER.COM@KERBERIZEDTESTHELPER.COM expiring on Thu Jun 20 10:40:54 CST 2024
   Entered Krb5Context.acceptSecContext with state=STATE_NEW
   Looking for keys for: client/localhost@KERBERIZEDTESTHELPER.COM
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   Using builtin default etypes for permitted_enctypes
   default etypes for permitted_enctypes: 18 17 16 23.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   MemoryCache: add 1632451256/735901/950FAB11DE5DBEE5A294D0BC8AE2C51A/client/localhost@KERBERIZEDTESTHELPER.COM to client/localhost@KERBERIZEDTESTHELPER.COM|client/localhost@KERBERIZEDTESTHELPER.COM
   >>> KrbApReq: authenticate succeed.
   Krb5Context setting peerSeqNumber to: 954773118
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   Krb5Context setting mySeqNumber to: 765865618
   Entered Krb5Context.initSecContext with state=STATE_IN_PROCESS
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   Krb5Context setting peerSeqNumber to: 765865618
   Krb5Context.wrap: data=[01 01 00 00 ]
   Krb5Context.wrap: token=[05 04 01 ff 00 0c 00 00 00 00 00 00 2d a6 2e 92 01 01 00 00 80 c3 92 55 fb 89 0d 21 28 c7 5f 2d ]
   Krb5Context.unwrap: token=[05 04 01 ff 00 0c 00 00 00 00 00 00 2d a6 2e 92 01 01 00 00 80 c3 92 55 fb 89 0d 21 28 c7 5f 2d ]
   Krb5Context.unwrap: data=[01 01 00 00 ]
   Krb5Context.wrap: data=[01 01 00 00 ]
   Krb5Context.wrap: token=[05 04 00 ff 00 0c 00 00 00 00 00 00 38 e8 ae 7e 01 01 00 00 56 63 d4 57 f6 33 9b 63 94 ce 7f e3 ]
   Krb5Context.unwrap: token=[05 04 00 ff 00 0c 00 00 00 00 00 00 38 e8 ae 7e 01 01 00 00 56 63 d4 57 f6 33 9b 63 94 ce 7f e3 ]
   Krb5Context.unwrap: data=[01 01 00 00 ]
   Found ticket for client/localhost@KERBERIZEDTESTHELPER.COM to go to krbtgt/KERBERIZEDTESTHELPER.COM@KERBERIZEDTESTHELPER.COM expiring on Thu Jun 20 10:40:54 CST 2024
   Entered Krb5Context.initSecContext with state=STATE_NEW
   Found ticket for client/localhost@KERBERIZEDTESTHELPER.COM to go to krbtgt/KERBERIZEDTESTHELPER.COM@KERBERIZEDTESTHELPER.COM expiring on Thu Jun 20 10:40:54 CST 2024
   Found ticket for client/localhost@KERBERIZEDTESTHELPER.COM to go to client/localhost@KERBERIZEDTESTHELPER.COM expiring on Thu Jun 20 10:40:56 CST 2024
   Found service ticket in the subjectTicket (hex) =
   0000: 61 82 01 12 30 82 01 0E   A0 03 02 01 05 A1 1A 1B  a...0...........
   0010: 18 4B 45 52 42 45 52 49   5A 45 44 54 45 53 54 48  .KERBERIZEDTESTH
   0020: 45 4C 50 45 52 2E 43 4F   4D A2 1E 30 1C A0 03 02  ELPER.COM..0....
   0030: 01 00 A1 15 30 13 1B 06   63 6C 69 65 6E 74 1B 09  ....0...client..
   0040: 6C 6F 63 61 6C 68 6F 73   74 A3 81 CA 30 81 C7 A0  localhost...0...
   0050: 03 02 01 11 A1 03 02 01   01 A2 81 BA 04 81 B7 0C  ................
   0060: 42 B8 BB FD 65 27 29 10   44 E1 37 9D C0 65 2C 1D  B...e').D.7..e,.
   0070: 97 1A A4 A9 91 F2 C4 CE   02 97 A2 F4 65 15 6A F7  ............e.j.
   0080: 79 01 7B 57 EE 67 75 64   47 D4 E6 BB 6A 00 69 16  y..W.gudG...j.i.
   0090: 62 AE 00 2E 11 88 F3 6E   17 6E 2F 37 C6 F7 64 7A  b......n.n/7..dz
   00A0: 80 F7 8E A4 EA 9E BD AE   58 D4 F4 5C 0B A2 39 8C  ........X..\..9.
   00B0: B0 B6 A5 D3 2E EB F2 2C   E5 A4 E2 52 9F 0C F8 F7  .......,...R....
   00C0: 3F 48 A5 59 5C ED B7 37   AF E5 E5 E5 36 96 B9 20  ?H.Y\..7....6..
   00D0: 70 0F 6C DE 47 67 23 94   5C FF 99 EE 50 40 90 56  p.l.Gg#.\...P@.V
   00E0: B7 CA 54 ED 9E 0E 07 97   C5 EE 80 D5 28 2B CD FE  ..T.........(+..
   00F0: A2 31 F2 28 DE 71 6B E6   B7 99 E0 66 45 6C 00 69  .1.(.qk....fEl.i
   0100: 48 51 B1 74 BF 0C 74 48   EA 76 C5 30 27 39 D4 56  HQ.t..tH.v.0'9.V
   0110: 45 9F 03 F0 35 C4                                  E...5.
   
   Client Principal = client/localhost@KERBERIZEDTESTHELPER.COM
   Server Principal = client/localhost@KERBERIZEDTESTHELPER.COM
   Session Key = EncryptionKey: keyType=17 keyBytes (hex dump)=
   0000: 4F 14 BD EC 31 C6 85 B6   AA 00 78 63 36 B8 40 D1  O...1.....xc6.@.
   ```
   
   we shall suppress these noises
   
   ### Affects Version(s)
   
   1.4.0
   
   ### Kyuubi Server Log Output
   
   _No response_
   
   ### Kyuubi Engine Log Output
   
   _No response_
   
   ### Kyuubi Server Configurations
   
   _No response_
   
   ### Kyuubi Engine Configurations
   
   _No response_
   
   ### Additional context
   
   _No response_
   
   ### Are you willing to submit PR?
   
   - [ ] Yes I am willing to submit a PR!


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscribe@kyuubi.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org



[GitHub] [incubator-kyuubi] yaooqinn commented on issue #1145: [Bug] Suppress MiniDFS/YARNCluster/ Kerberos output in tests

Posted by GitBox <gi...@apache.org>.
yaooqinn commented on issue #1145:
URL: https://github.com/apache/incubator-kyuubi/issues/1145#issuecomment-926305650


   cc @zhouyifan279 


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscribe@kyuubi.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org



[GitHub] [incubator-kyuubi] pan3793 closed issue #1145: [Bug] Suppress MiniDFS/YARNCluster/ Kerberos output in tests

Posted by GitBox <gi...@apache.org>.
pan3793 closed issue #1145:
URL: https://github.com/apache/incubator-kyuubi/issues/1145


   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscribe@kyuubi.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org