-
Notifications
You must be signed in to change notification settings - Fork 406
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Subtask] Support Kerberos client authentication in gvfs #2711
Comments
2 tasks
jerryshao
pushed a commit
that referenced
this issue
May 11, 2024
…vfs (#3314) ### What changes were proposed in this pull request? Support using Kerberos authentication type to initialize Gravitino client in gvfs. ### Why are the changes needed? Fix: #2711 ### How was this patch tested? Add some uts for: 1. use principal and keytab to auth. 2. kerberos configs for gvfs. 3. some invalid kerberos case. Test locally and use `kerberos ticket cache` to initialize gvfs. The steps are as follows: 1. Deploy the KDC server locally, refer to the doc: https://blog.csdn.net/lo085213/article/details/105057186. 2. Register the service account `HTTP/[email protected]` and client account `[email protected]` in the KDC server. 3. Execute the `kinit -kt client.keytab [email protected]` command locally. 4. Use the `klist` command to check the environment for tickets containing `[email protected]`. 5. Write a unit test to load metalake through gvfs with the kerberos ticket cache.    --------- Co-authored-by: xiaojiebao <[email protected]>
github-actions bot
pushed a commit
that referenced
this issue
May 11, 2024
…vfs (#3314) ### What changes were proposed in this pull request? Support using Kerberos authentication type to initialize Gravitino client in gvfs. ### Why are the changes needed? Fix: #2711 ### How was this patch tested? Add some uts for: 1. use principal and keytab to auth. 2. kerberos configs for gvfs. 3. some invalid kerberos case. Test locally and use `kerberos ticket cache` to initialize gvfs. The steps are as follows: 1. Deploy the KDC server locally, refer to the doc: https://blog.csdn.net/lo085213/article/details/105057186. 2. Register the service account `HTTP/[email protected]` and client account `[email protected]` in the KDC server. 3. Execute the `kinit -kt client.keytab [email protected]` command locally. 4. Use the `klist` command to check the environment for tickets containing `[email protected]`. 5. Write a unit test to load metalake through gvfs with the kerberos ticket cache.    --------- Co-authored-by: xiaojiebao <[email protected]>
qqqttt123
pushed a commit
that referenced
this issue
May 11, 2024
…vfs (#3340) ### What changes were proposed in this pull request? Support using Kerberos authentication type to initialize Gravitino client in gvfs. ### Why are the changes needed? Fix: #2711 ### How was this patch tested? Add some uts for: 1. use principal and keytab to auth. 2. kerberos configs for gvfs. 3. some invalid kerberos case. Test locally and use `kerberos ticket cache` to initialize gvfs. The steps are as follows: 1. Deploy the KDC server locally, refer to the doc: https://blog.csdn.net/lo085213/article/details/105057186. 2. Register the service account `HTTP/[email protected]` and client account `[email protected]` in the KDC server. 3. Execute the `kinit -kt client.keytab [email protected]` command locally. 4. Use the `klist` command to check the environment for tickets containing `[email protected]`. 5. Write a unit test to load metalake through gvfs with the kerberos ticket cache.    Co-authored-by: xloya <[email protected]> Co-authored-by: xiaojiebao <[email protected]>
diqiu50
pushed a commit
to diqiu50/gravitino
that referenced
this issue
Jun 13, 2024
…n in gvfs (apache#3314) ### What changes were proposed in this pull request? Support using Kerberos authentication type to initialize Gravitino client in gvfs. ### Why are the changes needed? Fix: apache#2711 ### How was this patch tested? Add some uts for: 1. use principal and keytab to auth. 2. kerberos configs for gvfs. 3. some invalid kerberos case. Test locally and use `kerberos ticket cache` to initialize gvfs. The steps are as follows: 1. Deploy the KDC server locally, refer to the doc: https://blog.csdn.net/lo085213/article/details/105057186. 2. Register the service account `HTTP/[email protected]` and client account `[email protected]` in the KDC server. 3. Execute the `kinit -kt client.keytab [email protected]` command locally. 4. Use the `klist` command to check the environment for tickets containing `[email protected]`. 5. Write a unit test to load metalake through gvfs with the kerberos ticket cache.    --------- Co-authored-by: xiaojiebao <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the subtask
Support connecting
Gravitino Server
throughKerberos
in gvfs.Parent issue
#2301
The text was updated successfully, but these errors were encountered: