Skip to content

[core] Preserve external UGI when paimon has no kerberos credentials#7862

Merged
JingsongLi merged 1 commit into
apache:masterfrom
kerwin-zk:fix-paimon-preserve-external-ugi-kerberos
May 19, 2026
Merged

[core] Preserve external UGI when paimon has no kerberos credentials#7862
JingsongLi merged 1 commit into
apache:masterfrom
kerwin-zk:fix-paimon-preserve-external-ugi-kerberos

Conversation

@kerwin-zk
Copy link
Copy Markdown
Contributor

Purpose

When no explicit Kerberos credentials (security.kerberos.login.keytab / security.kerberos.login.principal) are provided in catalog options, HadoopModule.install() calls
UserGroupInformation.setConfiguration() and resets the JVM-global UGI auth method.

This can wipe out a Kerberos TGT already established by the host process — e.g. by Spark via spark.kerberos.principal / spark.kerberos.keytab — and cause downstream SASL / HMS calls
to fail with:

GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)

Therefore, preserve the externally-established UGI when paimon has no credentials to install.

Tests

CI

@JingsongLi JingsongLi merged commit 1d0f005 into apache:master May 19, 2026
12 of 13 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants