Java Code Examples for org.apache.hadoop.security.UserGroupInformation#isLoginKeytabBased()
The following examples show how to use
org.apache.hadoop.security.UserGroupInformation#isLoginKeytabBased() .
These examples are extracted from open source projects.
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
Source Project: dr-elephant File: HadoopSecurity.java License: Apache License 2.0 | 6 votes |
public void checkLogin() throws IOException { if (_loginUser == null) { logger.info("No login user. Creating login user"); logger.info("Logging with " + _keytabUser + " and " + _keytabLocation); UserGroupInformation.loginUserFromKeytab(_keytabUser, _keytabLocation); _loginUser = UserGroupInformation.getLoginUser(); logger.info("Logged in with user " + _loginUser); if(UserGroupInformation.isLoginKeytabBased()) { logger.info("Login is keytab based"); } else { logger.info("Login is not keytab based"); } } else { _loginUser.checkTGTAndReloginFromKeytab(); } }
Example 2
Source Project: atlas File: KafkaNotification.java License: Apache License 2.0 | 5 votes |
@VisibleForTesting boolean isLoginKeytabBased() { boolean ret = false; try { ret = UserGroupInformation.isLoginKeytabBased(); } catch (Exception excp) { LOG.warn("Error in determining keytab for KafkaClient-JAAS config", excp); } return ret; }
Example 3
Source Project: incubator-atlas File: AtlasHook.java License: Apache License 2.0 | 5 votes |
private static boolean isLoginKeytabBased() { boolean ret = false; try { ret = UserGroupInformation.isLoginKeytabBased(); } catch (Exception excp) { LOG.warn("Error in determining keytab for KafkaClient-JAAS config", excp); } return ret; }
Example 4
Source Project: zeppelin File: JDBCSecurityImpl.java License: Apache License 2.0 | 5 votes |
/*** * @param properties */ public static void createSecureConfiguration(Properties properties, AuthenticationMethod authType) { switch (authType) { case KERBEROS: Configuration conf = new org.apache.hadoop.conf.Configuration(); conf.set("hadoop.security.authentication", KERBEROS.toString()); UserGroupInformation.setConfiguration(conf); try { // Check TGT before calling login // Ref: https://github.com/apache/hadoop/blob/release-3.0.1-RC1/hadoop-common-project/ // hadoop-common/src/main/java/org/apache/hadoop/security/UserGroupInformation.java#L1232 if (!UserGroupInformation.isSecurityEnabled() || UserGroupInformation.getCurrentUser().getAuthenticationMethod() != KERBEROS || !UserGroupInformation.isLoginKeytabBased()) { UserGroupInformation.loginUserFromKeytab( properties.getProperty("zeppelin.jdbc.principal"), properties.getProperty("zeppelin.jdbc.keytab.location")); } else { LOGGER.info("The user has already logged in using Keytab and principal, " + "no action required"); } } catch (IOException e) { LOGGER.error("Failed to get either keytab location or principal name in the " + "interpreter", e); } } }
Example 5
Source Project: zeppelin File: JDBCInterpreter.java License: Apache License 2.0 | 5 votes |
@Override protected boolean runKerberosLogin() { try { if (UserGroupInformation.isLoginKeytabBased()) { UserGroupInformation.getLoginUser().reloginFromKeytab(); return true; } else if (UserGroupInformation.isLoginTicketBased()) { UserGroupInformation.getLoginUser().reloginFromTicketCache(); return true; } } catch (Exception e) { LOGGER.error("Unable to run kinit for zeppelin", e); } return false; }
Example 6
Source Project: hbase File: GssSaslClientAuthenticationProvider.java License: Apache License 2.0 | 5 votes |
@Override public void relogin() throws IOException { // Check if UGI thinks we need to do another login if (UserGroupInformation.isLoginKeytabBased()) { UserGroupInformation.getLoginUser().reloginFromKeytab(); } else { UserGroupInformation.getLoginUser().reloginFromTicketCache(); } }