-
Notifications
You must be signed in to change notification settings - Fork 28.9k
[SPARK-15754] [yarn] Not letting the credentials containing hdfs delegation tokens to be added in current user credential. #13499
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[SPARK-15754] [yarn] Not letting the credentials containing hdfs delegation tokens to be added in current user credential. #13499
Conversation
…kens to be added in current user credential.
|
ok to test |
|
Test build #59938 has finished for PR 13499 at commit
|
|
@subrotosanyal could you update the title to follow the convention? |
|
@vanzin |
|
BTW the change looks fine, I just want to take a look at the rest of the code (the parts you're not touching) and also run some tests internally with kerberos enabled. |
|
|
||
| import org.apache.spark.{SparkContext, SparkException} | ||
| import org.apache.spark.deploy.yarn.{Client, ClientArguments, YarnSparkHadoopUtil} | ||
| import org.apache.spark.SparkContext |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These changes are unnecessary, and in fact we prefer the previous style.
|
Test build #59955 has finished for PR 13499 at commit
|
|
hi @vanzin |
|
Test build #59958 has finished for PR 13499 at commit
|
|
Ran some kerberos tests here and all looks good, so I'm merging this (will also try 1.6.x if there are no conflicts). Thanks! |
…ation tokens to be added in current user credential. ## What changes were proposed in this pull request? The credentials are not added to the credentials of UserGroupInformation.getCurrentUser(). Further if the client has possibility to login using keytab then the updateDelegationToken thread is not started on client. ## How was this patch tested? ran dev/run-tests Author: Subroto Sanyal <[email protected]> Closes #13499 from subrotosanyal/SPARK-15754-save-ugi-from-changing. (cherry picked from commit 61d729a) Signed-off-by: Marcelo Vanzin <[email protected]>
…ation tokens to be added in current user credential. ## What changes were proposed in this pull request? The credentials are not added to the credentials of UserGroupInformation.getCurrentUser(). Further if the client has possibility to login using keytab then the updateDelegationToken thread is not started on client. ## How was this patch tested? ran dev/run-tests Author: Subroto Sanyal <[email protected]> Closes #13499 from subrotosanyal/SPARK-15754-save-ugi-from-changing. (cherry picked from commit 61d729a) Signed-off-by: Marcelo Vanzin <[email protected]>
…ation tokens to be added in current user credential. ## What changes were proposed in this pull request? The credentials are not added to the credentials of UserGroupInformation.getCurrentUser(). Further if the client has possibility to login using keytab then the updateDelegationToken thread is not started on client. ## How was this patch tested? ran dev/run-tests Author: Subroto Sanyal <[email protected]> Closes apache#13499 from subrotosanyal/SPARK-15754-save-ugi-from-changing. (cherry picked from commit 61d729a) Signed-off-by: Marcelo Vanzin <[email protected]> (cherry picked from commit a0cf7d0)
What changes were proposed in this pull request?
The credentials are not added to the credentials of UserGroupInformation.getCurrentUser(). Further if the client has possibility to login using keytab then the updateDelegationToken thread is not started on client.
How was this patch tested?
ran dev/run-tests