[ https://issues.apache.org/jira/browse/HADOOP-11651?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14341460#comment-14341460 ]
Hadoop QA commented on HADOOP-11651: ------------------------------------ {color:red}-1 overall{color}. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12701570/HADOOP-11651-001.patch against trunk revision 2e44b75. {color:green}+1 @author{color}. The patch does not contain any @author tags. {color:red}-1 tests included{color}. The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch. {color:green}+1 javac{color}. The applied patch does not increase the total number of javac compiler warnings. {color:green}+1 javadoc{color}. There were no new javadoc warning messages. {color:green}+1 eclipse:eclipse{color}. The patch built with eclipse:eclipse. {color:green}+1 findbugs{color}. The patch does not introduce any new Findbugs (version 2.0.3) warnings. {color:green}+1 release audit{color}. The applied patch does not increase the total number of release audit warnings. {color:green}+1 core tests{color}. The patch passed unit tests in hadoop-common-project/hadoop-auth. Test results: https://builds.apache.org/job/PreCommit-HADOOP-Build/5798//testReport/ Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/5798//console This message is automatically generated. > Handle kerberos authentication where there is no principal of HTTP/host@REALM > ----------------------------------------------------------------------------- > > Key: HADOOP-11651 > URL: https://issues.apache.org/jira/browse/HADOOP-11651 > Project: Hadoop Common > Issue Type: Bug > Components: security > Affects Versions: 2.6.0 > Reporter: zhouyingchao > Assignee: zhouyingchao > Attachments: HADOOP-11651-001.patch > > > In a testing cluster, the HTTP service principal is just HTTP/hdtst@REALM > rather than HTTP/hostname@REALM. In this case, the following exception is > thrown on active HDFS namenode when bootstrap the standy HDFS namenode: > 2015-02-28,16:08:44,106 WARN > org.apache.hadoop.security.authentication.server.AuthenticationFilter: > Authentication exception: GSSException: No valid credentials provided > (Mechanism level: Failed to find any Kerberos Key) > org.apache.hadoop.security.authentication.client.AuthenticationException: > GSSException: No valid credentials provided (Mechanism level: Failed to find > any Kerberos Key) > at > org.apache.hadoop.security.authentication.server.KerberosAuthenticationHandler.authenticate(KerberosAuthenticationHandler.java:412) > at > org.apache.hadoop.security.authentication.server.AuthenticationFilter.doFilter(AuthenticationFilter.java:507) > at > org.mortbay.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1212) > at > org.apache.hadoop.http.HttpServer2$QuotingInputFilter.doFilter(HttpServer2.java:1224) > at > org.mortbay.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1212) > at > org.apache.hadoop.http.NoCacheFilter.doFilter(NoCacheFilter.java:45) > at > org.mortbay.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1212) > at > org.mortbay.jetty.servlet.ServletHandler.handle(ServletHandler.java:399) > .... > Caused by: GSSException: No valid credentials provided (Mechanism level: > Failed to find any Kerberos Key) > at > sun.security.jgss.krb5.Krb5AcceptCredential.getInstance(Krb5AcceptCredential.java:95) > at > sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:111) > at > sun.security.jgss.GSSManagerImpl.getCredentialElement(GSSManagerImpl.java:178) > at > sun.security.jgss.spnego.SpNegoMechFactory.getCredentialElement(SpNegoMechFactory.java:109) > at > sun.security.jgss.GSSManagerImpl.getCredentialElement(GSSManagerImpl.java:178) > at sun.security.jgss.GSSCredentialImpl.add(GSSCredentialImpl.java:384) > at > sun.security.jgss.GSSCredentialImpl.<init>(GSSCredentialImpl.java:57) > at > sun.security.jgss.GSSManagerImpl.createCredential(GSSManagerImpl.java:145) > at > org.apache.hadoop.security.authentication.server.KerberosAuthenticationHandler$2.run(KerberosAuthenticationHandler.java:363) > ... > We think our configuration is a valid use case and we should fix the issue. > The attached patch has been tested and it works fine on our testing cluster. -- This message was sent by Atlassian JIRA (v6.3.4#6332)