-
Notifications
You must be signed in to change notification settings - Fork 588
HDDS-10328. Support cross realm Kerberos out of box. #6192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
smengcl
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm. Thanks @jojochuang !
|
Thank for the patch @jojochuang . I have two minor questions: The default value |
|
@Galsza yes this configuration value addresses the issue. IMO Or put this way: if a user can easily work around this level of protection with a command line property, then it's not really giving any more safety. |
|
@jojochuang Thanks for both of the detailed answers it's clear to me now. LGTM +1 |
szetszwo
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1 the change looks good.
…che#6192) Change-Id: Ie07925cd4eae991a681d81c52171b048f4891f29
What changes were proposed in this pull request?
Add a default value "*" for the configuration property ozone.om.kerberos.principal.pattern to support accessing Ozone cluster in other Kerberos realms.
Please describe your PR in detail:
hdfs dfs -Dozone.om.kerberos.principal.pattern=* -ls ofs://ozone1707264383/vol1/bucket1/What is the link to the Apache JIRA
https://issues.apache.org/jira/browse/HDDS-10328
How was this patch tested?