Skip to content

[core] Preserve external UGI when paimon has no kerberos credentials#7862

Open
kerwin-zk wants to merge 1 commit into
apache:masterfrom
kerwin-zk:fix-paimon-preserve-external-ugi-kerberos
Open

[core] Preserve external UGI when paimon has no kerberos credentials#7862
kerwin-zk wants to merge 1 commit into
apache:masterfrom
kerwin-zk:fix-paimon-preserve-external-ugi-kerberos

Conversation

@kerwin-zk
Copy link
Copy Markdown
Contributor

Purpose

When no explicit Kerberos credentials (security.kerberos.login.keytab / security.kerberos.login.principal) are provided in catalog options, HadoopModule.install() calls
UserGroupInformation.setConfiguration() and resets the JVM-global UGI auth method.

This can wipe out a Kerberos TGT already established by the host process — e.g. by Spark via spark.kerberos.principal / spark.kerberos.keytab — and cause downstream SASL / HMS calls
to fail with:

GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)

Therefore, preserve the externally-established UGI when paimon has no credentials to install.

Tests

CI

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants