[jira] [Commented] (KAFKA-8114) Flaky Test DelegationTokenEndToEndAuthorizationTest#testNoGroupAcl

2019-03-16 Thread ASF GitHub Bot (JIRA)


[ 
https://issues.apache.org/jira/browse/KAFKA-8114?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16794217#comment-16794217
 ] 

ASF GitHub Bot commented on KAFKA-8114:
---

rajinisivaram commented on pull request #6452: KAFKA-8114: Wait for SCRAM 
credential propagation in DelegationTokenEdToEndAuthorizationTest
URL: https://github.com/apache/kafka/pull/6452
 
 
   
 

This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


> Flaky Test DelegationTokenEndToEndAuthorizationTest#testNoGroupAcl
> --
>
> Key: KAFKA-8114
> URL: https://issues.apache.org/jira/browse/KAFKA-8114
> Project: Kafka
>  Issue Type: Bug
>  Components: core, unit tests
>Affects Versions: 2.3.0
>Reporter: Matthias J. Sax
>Priority: Critical
>  Labels: flaky-test
> Fix For: 2.3.0
>
>
> [https://builds.apache.org/job/kafka-pr-jdk11-scala2.12/3254/testReport/junit/kafka.api/DelegationTokenEndToEndAuthorizationTest/testNoGroupAcl/]
> {quote}java.util.concurrent.ExecutionException: 
> org.apache.kafka.common.errors.SaslAuthenticationException: Authentication 
> failed during authentication due to invalid credentials with SASL mechanism 
> SCRAM-SHA-256 at 
> org.apache.kafka.common.internals.KafkaFutureImpl.wrapAndThrow(KafkaFutureImpl.java:45)
>  at 
> org.apache.kafka.common.internals.KafkaFutureImpl.access$000(KafkaFutureImpl.java:32)
>  at 
> org.apache.kafka.common.internals.KafkaFutureImpl$SingleWaiter.await(KafkaFutureImpl.java:89)
>  at 
> org.apache.kafka.common.internals.KafkaFutureImpl.get(KafkaFutureImpl.java:260)
>  at 
> kafka.api.DelegationTokenEndToEndAuthorizationTest.createDelegationToken(DelegationTokenEndToEndAuthorizationTest.scala:88)
>  at 
> kafka.api.DelegationTokenEndToEndAuthorizationTest.configureSecurityAfterServersStart(DelegationTokenEndToEndAuthorizationTest.scala:63)
>  at 
> kafka.integration.KafkaServerTestHarness.setUp(KafkaServerTestHarness.scala:107)
>  at kafka.api.IntegrationTestHarness.doSetup(IntegrationTestHarness.scala:81) 
> at kafka.api.IntegrationTestHarness.setUp(IntegrationTestHarness.scala:73) at 
> kafka.api.EndToEndAuthorizationTest.setUp(EndToEndAuthorizationTest.scala:183)
>  at 
> kafka.api.DelegationTokenEndToEndAuthorizationTest.setUp(DelegationTokenEndToEndAuthorizationTest.scala:74){quote}
> STDOUT
> {quote}Adding ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
> User:scram-admin has Allow permission for operations: ClusterAction from 
> hosts: * Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
> User:scram-admin has Allow permission for operations: ClusterAction from 
> hosts: * Adding ACLs for resource `Topic:LITERAL:*`: User:scram-admin has 
> Allow permission for operations: Read from hosts: * Current ACLs for resource 
> `Topic:LITERAL:*`: User:scram-admin has Allow permission for operations: Read 
> from hosts: * Completed Updating config for entity: user-principal 
> 'scram-admin'. Completed Updating config for entity: user-principal 
> 'scram-user'. Adding ACLs for resource `Topic:LITERAL:e2etopic`: 
> User:scram-user has Allow permission for operations: Write from hosts: * 
> User:scram-user has Allow permission for operations: Create from hosts: * 
> User:scram-user has Allow permission for operations: Describe from hosts: * 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: User:scram-user has Allow 
> permission for operations: Write from hosts: * User:scram-user has Allow 
> permission for operations: Create from hosts: * User:scram-user has Allow 
> permission for operations: Describe from hosts: * Adding ACLs for resource 
> `Group:LITERAL:group`: User:scram-user has Allow permission for operations: 
> Read from hosts: * Current ACLs for resource `Group:LITERAL:group`: 
> User:scram-user has Allow permission for operations: Read from hosts: * 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: User:scram-user has Allow 
> permission for operations: Write from hosts: * User:scram-user has Allow 
> permission for operations: Create from hosts: * Current ACLs for resource 
> `Topic:LITERAL:e2etopic`: User:scram-user has Allow permission for 
> operations: Create from hosts: * [2019-03-15 09:58:16,481] ERROR [Consumer 
> clientId=consumer-99, groupId=group] Topic authorization failed for topics 
> [e2etopic] (org.apache.kafka.clients.Metadata:297) [2019-03-15 09:58:17,527] 
> WARN Unable to read additional data from client sessionid 0x104549c2b88000a, 
> likely client has closed socket 
> (org.apache.zookeeper.server.NIOServerCnxn:376) Adding ACLs for 

[jira] [Commented] (KAFKA-8114) Flaky Test DelegationTokenEndToEndAuthorizationTest#testNoGroupAcl

2019-03-16 Thread ASF GitHub Bot (JIRA)


[ 
https://issues.apache.org/jira/browse/KAFKA-8114?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16794163#comment-16794163
 ] 

ASF GitHub Bot commented on KAFKA-8114:
---

omkreddy commented on pull request #6452: KAFKA-8114: Wait for SCRAM credential 
propagation in DelegationTokenEdToEndAuthorizationTest
URL: https://github.com/apache/kafka/pull/6452
 
 
   
   
   ### Committer Checklist (excluded from commit message)
   - [ ] Verify design and implementation 
   - [ ] Verify test coverage and CI build status
   - [ ] Verify documentation (including upgrade notes)
   
 

This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


> Flaky Test DelegationTokenEndToEndAuthorizationTest#testNoGroupAcl
> --
>
> Key: KAFKA-8114
> URL: https://issues.apache.org/jira/browse/KAFKA-8114
> Project: Kafka
>  Issue Type: Bug
>  Components: core, unit tests
>Affects Versions: 2.3.0
>Reporter: Matthias J. Sax
>Priority: Critical
>  Labels: flaky-test
> Fix For: 2.3.0
>
>
> [https://builds.apache.org/job/kafka-pr-jdk11-scala2.12/3254/testReport/junit/kafka.api/DelegationTokenEndToEndAuthorizationTest/testNoGroupAcl/]
> {quote}java.util.concurrent.ExecutionException: 
> org.apache.kafka.common.errors.SaslAuthenticationException: Authentication 
> failed during authentication due to invalid credentials with SASL mechanism 
> SCRAM-SHA-256 at 
> org.apache.kafka.common.internals.KafkaFutureImpl.wrapAndThrow(KafkaFutureImpl.java:45)
>  at 
> org.apache.kafka.common.internals.KafkaFutureImpl.access$000(KafkaFutureImpl.java:32)
>  at 
> org.apache.kafka.common.internals.KafkaFutureImpl$SingleWaiter.await(KafkaFutureImpl.java:89)
>  at 
> org.apache.kafka.common.internals.KafkaFutureImpl.get(KafkaFutureImpl.java:260)
>  at 
> kafka.api.DelegationTokenEndToEndAuthorizationTest.createDelegationToken(DelegationTokenEndToEndAuthorizationTest.scala:88)
>  at 
> kafka.api.DelegationTokenEndToEndAuthorizationTest.configureSecurityAfterServersStart(DelegationTokenEndToEndAuthorizationTest.scala:63)
>  at 
> kafka.integration.KafkaServerTestHarness.setUp(KafkaServerTestHarness.scala:107)
>  at kafka.api.IntegrationTestHarness.doSetup(IntegrationTestHarness.scala:81) 
> at kafka.api.IntegrationTestHarness.setUp(IntegrationTestHarness.scala:73) at 
> kafka.api.EndToEndAuthorizationTest.setUp(EndToEndAuthorizationTest.scala:183)
>  at 
> kafka.api.DelegationTokenEndToEndAuthorizationTest.setUp(DelegationTokenEndToEndAuthorizationTest.scala:74){quote}
> STDOUT
> {quote}Adding ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
> User:scram-admin has Allow permission for operations: ClusterAction from 
> hosts: * Current ACLs for resource `Cluster:LITERAL:kafka-cluster`: 
> User:scram-admin has Allow permission for operations: ClusterAction from 
> hosts: * Adding ACLs for resource `Topic:LITERAL:*`: User:scram-admin has 
> Allow permission for operations: Read from hosts: * Current ACLs for resource 
> `Topic:LITERAL:*`: User:scram-admin has Allow permission for operations: Read 
> from hosts: * Completed Updating config for entity: user-principal 
> 'scram-admin'. Completed Updating config for entity: user-principal 
> 'scram-user'. Adding ACLs for resource `Topic:LITERAL:e2etopic`: 
> User:scram-user has Allow permission for operations: Write from hosts: * 
> User:scram-user has Allow permission for operations: Create from hosts: * 
> User:scram-user has Allow permission for operations: Describe from hosts: * 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: User:scram-user has Allow 
> permission for operations: Write from hosts: * User:scram-user has Allow 
> permission for operations: Create from hosts: * User:scram-user has Allow 
> permission for operations: Describe from hosts: * Adding ACLs for resource 
> `Group:LITERAL:group`: User:scram-user has Allow permission for operations: 
> Read from hosts: * Current ACLs for resource `Group:LITERAL:group`: 
> User:scram-user has Allow permission for operations: Read from hosts: * 
> Current ACLs for resource `Topic:LITERAL:e2etopic`: User:scram-user has Allow 
> permission for operations: Write from hosts: * User:scram-user has Allow 
> permission for operations: Create from hosts: * Current ACLs for resource 
> `Topic:LITERAL:e2etopic`: User:scram-user has Allow permission for 
> operations: Create from hosts: * [2019-03-15 09:58:16,481] ERROR [Consumer 
> clientId=consumer-99, groupId=group] Topic authorization failed for topics 
> [e2etopic] (org.apache.kafka.clients.Metadata:297)