[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2016-02-08 Thread Greg Senia (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Greg Senia updated HADOOP-9969:
---
Affects Version/s: 2.7.2

> TGT expiration doesn't trigger Kerberos relogin
> ---
>
> Key: HADOOP-9969
> URL: https://issues.apache.org/jira/browse/HADOOP-9969
> Project: Hadoop Common
>  Issue Type: Bug
>  Components: ipc, security
>Affects Versions: 2.1.0-beta, 2.7.2
> Environment: IBM JDK7
>Reporter: Yu Gao
> Attachments: HADOOP-9969.patch, JobTracker.log
>
>
> In HADOOP-9698 & HADOOP-9850, RPC client and Sasl client have been changed to 
> respect the auth method advertised from server, instead of blindly attempting 
> the configured one at client side. However, when TGT has expired, an 
> exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
> authType), and at this time the authMethod still holds the initial value 
> which is SIMPLE and never has a chance to be updated with the expected one 
> requested by server, so kerberos relogin will not happen.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2016-02-08 Thread Greg Senia (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Greg Senia updated HADOOP-9969:
---
Affects Version/s: 2.8.0
   2.6.0
   2.6.1
   2.6.3

> TGT expiration doesn't trigger Kerberos relogin
> ---
>
> Key: HADOOP-9969
> URL: https://issues.apache.org/jira/browse/HADOOP-9969
> Project: Hadoop Common
>  Issue Type: Bug
>  Components: ipc, security
>Affects Versions: 2.1.0-beta, 2.6.0, 2.6.1, 2.8.0, 2.7.2, 2.6.3
> Environment: IBM JDK7
>Reporter: Yu Gao
> Attachments: HADOOP-9969.patch, JobTracker.log
>
>
> In HADOOP-9698 & HADOOP-9850, RPC client and Sasl client have been changed to 
> respect the auth method advertised from server, instead of blindly attempting 
> the configured one at client side. However, when TGT has expired, an 
> exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
> authType), and at this time the authMethod still holds the initial value 
> which is SIMPLE and never has a chance to be updated with the expected one 
> requested by server, so kerberos relogin will not happen.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2016-02-08 Thread Greg Senia (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Greg Senia updated HADOOP-9969:
---
Affects Version/s: 2.5.0
   2.5.1
   2.5.2
   2.7.1
   2.6.2

> TGT expiration doesn't trigger Kerberos relogin
> ---
>
> Key: HADOOP-9969
> URL: https://issues.apache.org/jira/browse/HADOOP-9969
> Project: Hadoop Common
>  Issue Type: Bug
>  Components: ipc, security
>Affects Versions: 2.1.0-beta, 2.5.0, 2.5.2, 2.6.0, 2.6.1, 2.8.0, 2.7.1, 
> 2.6.2, 2.6.3
> Environment: IBM JDK7
>Reporter: Yu Gao
> Attachments: HADOOP-9969.patch, JobTracker.log
>
>
> In HADOOP-9698 & HADOOP-9850, RPC client and Sasl client have been changed to 
> respect the auth method advertised from server, instead of blindly attempting 
> the configured one at client side. However, when TGT has expired, an 
> exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
> authType), and at this time the authMethod still holds the initial value 
> which is SIMPLE and never has a chance to be updated with the expected one 
> requested by server, so kerberos relogin will not happen.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2016-02-08 Thread Greg Senia (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Greg Senia updated HADOOP-9969:
---
Affects Version/s: (was: 2.7.2)
   (was: 2.5.1)

> TGT expiration doesn't trigger Kerberos relogin
> ---
>
> Key: HADOOP-9969
> URL: https://issues.apache.org/jira/browse/HADOOP-9969
> Project: Hadoop Common
>  Issue Type: Bug
>  Components: ipc, security
>Affects Versions: 2.1.0-beta, 2.5.0, 2.5.2, 2.6.0, 2.6.1, 2.8.0, 2.7.1, 
> 2.6.2, 2.6.3
> Environment: IBM JDK7
>Reporter: Yu Gao
> Attachments: HADOOP-9969.patch, JobTracker.log
>
>
> In HADOOP-9698 & HADOOP-9850, RPC client and Sasl client have been changed to 
> respect the auth method advertised from server, instead of blindly attempting 
> the configured one at client side. However, when TGT has expired, an 
> exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
> authType), and at this time the authMethod still holds the initial value 
> which is SIMPLE and never has a chance to be updated with the expected one 
> requested by server, so kerberos relogin will not happen.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2016-01-18 Thread Steve Loughran (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Steve Loughran updated HADOOP-9969:
---
Status: Patch Available  (was: Open)

> TGT expiration doesn't trigger Kerberos relogin
> ---
>
> Key: HADOOP-9969
> URL: https://issues.apache.org/jira/browse/HADOOP-9969
> Project: Hadoop Common
>  Issue Type: Bug
>  Components: ipc, security
>Affects Versions: 2.1.0-beta
> Environment: IBM JDK7
>Reporter: Yu Gao
> Attachments: HADOOP-9969.patch, JobTracker.log
>
>
> In HADOOP-9698 & HADOOP-9850, RPC client and Sasl client have been changed to 
> respect the auth method advertised from server, instead of blindly attempting 
> the configured one at client side. However, when TGT has expired, an 
> exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
> authType), and at this time the authMethod still holds the initial value 
> which is SIMPLE and never has a chance to be updated with the expected one 
> requested by server, so kerberos relogin will not happen.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2015-11-19 Thread Steve Loughran (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Steve Loughran updated HADOOP-9969:
---
Environment: IBM JDK7

> TGT expiration doesn't trigger Kerberos relogin
> ---
>
> Key: HADOOP-9969
> URL: https://issues.apache.org/jira/browse/HADOOP-9969
> Project: Hadoop Common
>  Issue Type: Bug
>  Components: ipc, security
>Affects Versions: 2.1.0-beta
> Environment: IBM JDK7
>Reporter: Yu Gao
> Attachments: HADOOP-9969.patch, JobTracker.log
>
>
> In HADOOP-9698 & HADOOP-9850, RPC client and Sasl client have been changed to 
> respect the auth method advertised from server, instead of blindly attempting 
> the configured one at client side. However, when TGT has expired, an 
> exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
> authType), and at this time the authMethod still holds the initial value 
> which is SIMPLE and never has a chance to be updated with the expected one 
> requested by server, so kerberos relogin will not happen.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2013-09-20 Thread Yu Gao (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Yu Gao updated HADOOP-9969:
---

Attachment: JobTracker.log

 TGT expiration doesn't trigger Kerberos relogin
 ---

 Key: HADOOP-9969
 URL: https://issues.apache.org/jira/browse/HADOOP-9969
 Project: Hadoop Common
  Issue Type: Bug
  Components: ipc, security
Affects Versions: 2.1.0-beta
Reporter: Yu Gao
 Attachments: HADOOP-9969.patch, JobTracker.log


 In HADOOP-9698  HADOOP-9850, RPC client and Sasl client have been changed to 
 respect the auth method advertised from server, instead of blindly attempting 
 the configured one at client side. However, when TGT has expired, an 
 exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
 authType), and at this time the authMethod still holds the initial value 
 which is SIMPLE and never has a chance to be updated with the expected one 
 requested by server, so kerberos relogin will not happen.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2013-09-16 Thread Yu Gao (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Yu Gao updated HADOOP-9969:
---

Description: In HADOOP-9698  HADOOP-9850, RPC client and Sasl client have 
been changed to respect the auth method advertised from server, instead of 
blindly attempting the configured one at client side. However, when TGT has 
expired, an exception will be thrown from 
SaslRpcClient#createSaslClient(SaslAuth authType), and at this time the 
authMethod still holds the initial value which is SIMPLE and never has a chance 
to be updated with the expected one requested by server, so kerberos relogin 
will not happen.  (was: In HADOOP 9698  HADOOP 9850, RPC client and Sasl 
client have been changed to respect the auth method advertised from server, 
instead of blindly attempting the configured one at client side. However, when 
TGT has expired, an exception will be thrown from 
SaslRpcClient#createSaslClient(SaslAuth authType), and at this time the 
authMethod still holds the initial value which is SIMPLE and never has a chance 
to be updated with the expected one requested by server, so kerberos relogin 
will not happen.)

 TGT expiration doesn't trigger Kerberos relogin
 ---

 Key: HADOOP-9969
 URL: https://issues.apache.org/jira/browse/HADOOP-9969
 Project: Hadoop Common
  Issue Type: Bug
  Components: ipc, security
Affects Versions: 2.1.0-beta
Reporter: Yu Gao

 In HADOOP-9698  HADOOP-9850, RPC client and Sasl client have been changed to 
 respect the auth method advertised from server, instead of blindly attempting 
 the configured one at client side. However, when TGT has expired, an 
 exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
 authType), and at this time the authMethod still holds the initial value 
 which is SIMPLE and never has a chance to be updated with the expected one 
 requested by server, so kerberos relogin will not happen.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HADOOP-9969) TGT expiration doesn't trigger Kerberos relogin

2013-09-16 Thread Yu Gao (JIRA)

 [ 
https://issues.apache.org/jira/browse/HADOOP-9969?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Yu Gao updated HADOOP-9969:
---

Attachment: HADOOP-9969.patch

 TGT expiration doesn't trigger Kerberos relogin
 ---

 Key: HADOOP-9969
 URL: https://issues.apache.org/jira/browse/HADOOP-9969
 Project: Hadoop Common
  Issue Type: Bug
  Components: ipc, security
Affects Versions: 2.1.0-beta
Reporter: Yu Gao
 Attachments: HADOOP-9969.patch


 In HADOOP-9698  HADOOP-9850, RPC client and Sasl client have been changed to 
 respect the auth method advertised from server, instead of blindly attempting 
 the configured one at client side. However, when TGT has expired, an 
 exception will be thrown from SaslRpcClient#createSaslClient(SaslAuth 
 authType), and at this time the authMethod still holds the initial value 
 which is SIMPLE and never has a chance to be updated with the expected one 
 requested by server, so kerberos relogin will not happen.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira