[ https://issues.apache.org/jira/browse/SLIDER-1035?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15089220#comment-15089220 ]
Steve Loughran commented on SLIDER-1035: ---------------------------------------- And when the user is logged out. command fails, error "41" (i.e. 401) {code} ~/P/H/P/s/slider-funtest (feature/SLIDER-1035_Kdiag_enhancements) $ slider kdiag 2016-01-08 13:50:43,037 [main] DEBUG utility.LaunchedWorkflowCompositeService (bindArgs(80)) - Binding 1 Arguments: 2016-01-08 13:50:43,040 [main] DEBUG utility.LaunchedWorkflowCompositeService (bindArgs(86)) - "kdiag" 2016-01-08 13:50:43,179 [main] DEBUG params.CommonArgs (validate(241)) - action=kdiag 2016-01-08 13:50:43,507 [main] DEBUG tools.ConfigHelper (loadFromResource(515)) - loaded resources from file:/Users/stevel/Projects/Hortonworks/Projects/clusterconfigs/clusters/devix/slider/slider-client.xml == Kerberos Diagnostics scan at Fri Jan 08 13:50:43 GMT 2016 == Maximum AES encryption key length 2147483647 == System Properties == java.security.krb5.conf = "(unset)" java.security.krb5.realm = "(unset)" sun.security.krb5.debug = "(unset)" sun.security.spnego.debug = "(unset)" == Environment Variables == HADOOP_JAAS_DEBUG = "true" KRB5CCNAME = "(unset)" HADOOP_USER_NAME = "(unset)" HADOOP_PROXY_USER = "(unset)" HADOOP_TOKEN_FILE_LOCATION = "(unset)" hadoop.kerberos.kinit.command = "kinit" hadoop.security.authentication = "kerberos" hadoop.security.authorization = "true" hadoop.kerberos.min.seconds.before.relogin = "(unset)" hadoop.security.dns.interface = "(unset)" hadoop.security.dns.nameserver = "(unset)" hadoop.rpc.protection = "authentication" hadoop.security.saslproperties.resolver.class = "(unset)" hadoop.security.crypto.codec.classes = "(unset)" hadoop.security.group.mapping = "org.apache.hadoop.security.JniBasedUnixGroupsMappingWithFallback" hadoop.security.impersonation.provider.class = "(unset)" dfs.data.transfer.protection = "(unset)" hadoop.kerberos.kinit.command = kinit Executable kinit is relative -must be on the PATH == Resolving SASL property hadoop.security.saslproperties.resolver.class == Resolver is class org.apache.hadoop.security.SaslPropertiesResolver == Resolving SASL property dfs.data.transfer.saslproperties.resolver.class == Resolver is class org.apache.hadoop.security.SaslPropertiesResolver == Logging in == Java config name: null Native config name: /etc/krb5.conf Loaded from native config 2016-01-08 13:50:44,383 [main] DEBUG security.Groups (getUserToGroupsMappingService(301)) - Creating new Groups object 2016-01-08 13:50:44,386 [main] DEBUG security.JniBasedUnixGroupsMappingWithFallback (<init>(45)) - Group mapping impl=org.apache.hadoop.security.ShellBasedUnixGroupsMapping 2016-01-08 13:50:44,507 [main] DEBUG security.Groups (<init>(112)) - Group mapping impl=org.apache.hadoop.security.JniBasedUnixGroupsMappingWithFallback; cacheTimeout=300000; warningDeltaMs=5000 [UnixLoginModule]: succeeded importing info: uid = 503 gid = 20 supp gid = 20 supp gid = 501 supp gid = 12 supp gid = 61 supp gid = 79 supp gid = 80 supp gid = 81 supp gid = 98 supp gid = 399 supp gid = 33 supp gid = 100 supp gid = 204 supp gid = 395 supp gid = 398 Debug is true storeKey false useTicketCache true useKeyTab false doNotPrompt true ticketCache is null isInitiator true KeyTab is null refreshKrb5Config is false principal is null tryFirstPass is false useFirstPass is false storePass is false clearPass is false Acquire TGT from Cache >>>KinitOptions cache name is /Users/stevel/krb5cc_stevel >> Acquire default native Credentials Using builtin default etypes for default_tkt_enctypes default etypes for default_tkt_enctypes: 18 17 16 23 1 3. >>> Found no TGT's in LSA Principal is null null credentials from Ticket Cache [Krb5LoginModule] authentication failed Unable to obtain Princpal Name for authentication 2016-01-08 13:50:44,536 [main] DEBUG security.UserGroupInformation (login(221)) - hadoop login [UnixLoginModule]: added UnixPrincipal, UnixNumericUserPrincipal, UnixNumericGroupPrincipal(s), to Subject 2016-01-08 13:50:44,537 [main] DEBUG security.UserGroupInformation (commit(156)) - hadoop login commit 2016-01-08 13:50:44,538 [main] DEBUG security.UserGroupInformation (commit(170)) - using kerberos user:null 2016-01-08 13:50:44,540 [main] DEBUG security.UserGroupInformation (commit(186)) - using local user:UnixPrincipal: stevel == Log in user == UGI=stevel (auth:KERBEROS) 2016-01-08 13:50:44,540 [main] DEBUG security.UserGroupInformation (commit(192)) - Using user: "UnixPrincipal: stevel" with name stevel Has kerberos credentials: false Authentication method: KERBEROS Real Authentication method: KERBEROS == Group names == 2016-01-08 13:50:44,540 [main] DEBUG security.UserGroupInformation (commit(202)) - User entry: "stevel" 2016-01-08 13:50:44,542 [main] DEBUG security.UserGroupInformation (loginUserFromSubject(826)) - UGI loginUser:stevel (auth:KERBEROS) staff access_bpf everyone localaccounts _appserverusr admin _appserveradm _lpadmin com.apple.access_ssh _appstore _lpoperator _developer com.apple.access_ftp com.apple.access_screensharing == Credentials == == Secret keys == (none) == Token Count: 0 == Ticket based login: false Keytab based login: false 2016-01-08 13:50:44,584 [main] ERROR client.SliderClient (actionKDiag(3801)) - org.apache.hadoop.security.KerberosDiags$KerberosDiagsFailure: Login user: No kerberos credentials for stevel (auth:KERBEROS) 2016-01-08 13:50:44,585 [main] DEBUG client.SliderClient (actionKDiag(3802)) - org.apache.hadoop.security.KerberosDiags$KerberosDiagsFailure: Login user: No kerberos credentials for stevel (auth:KERBEROS) org.apache.hadoop.security.KerberosDiags$KerberosDiagsFailure: Login user: No kerberos credentials for stevel (auth:KERBEROS) at org.apache.hadoop.security.KerberosDiags.fail(KerberosDiags.java:395) at org.apache.hadoop.security.KerberosDiags.failif(KerberosDiags.java:409) at org.apache.hadoop.security.KerberosDiags.validateUser(KerberosDiags.java:275) at org.apache.hadoop.security.KerberosDiags.execute(KerberosDiags.java:172) at org.apache.slider.client.SliderClient.actionKDiag(SliderClient.java:3799) at org.apache.slider.client.SliderClient.exec(SliderClient.java:397) at org.apache.slider.client.SliderClient.runService(SliderClient.java:326) at org.apache.slider.core.main.ServiceLauncher.launchService(ServiceLauncher.java:188) at org.apache.slider.core.main.ServiceLauncher.launchServiceRobustly(ServiceLauncher.java:475) at org.apache.slider.core.main.ServiceLauncher.launchServiceAndExit(ServiceLauncher.java:403) at org.apache.slider.core.main.ServiceLauncher.serviceMain(ServiceLauncher.java:630) at org.apache.slider.Slider.main(Slider.java:49) ~/P/H/P/s/slider-funtest (feature/SLIDER-1035_Kdiag_enhancements) $ echo $status 41 {code} > Kdiag enhancements > ------------------ > > Key: SLIDER-1035 > URL: https://issues.apache.org/jira/browse/SLIDER-1035 > Project: Slider > Issue Type: Improvement > Components: client, security > Affects Versions: Slider 0.90.2 > Environment: Kerberos > Reporter: Steve Loughran > Assignee: Steve Loughran > Fix For: Slider 0.91 > > > Proposed enhancements > # make easier to run server-side. the sysprops to enable com.sun debugging > should be cached and then restored —and only set if a -verbose flag is set. > # check for Java Crypto Extensions having full key length; fail fast if not > # list tokens > # add option to check networking (hostname resolves) > # look up KDCs and fail if none are reachable > # maybe each {{title()}} call should force flush stderr, to try and keep JDK > output in sync with stdout. > # am to have option to display this and also fail fast > # implement `--services` probes for : yarn, hdfs, registry, timeline. This > can't go into any hadoop-common lib, a list of probes classes can be provided > to execute as the provided UGI. -- This message was sent by Atlassian JIRA (v6.3.4#6332)