MetaStoreUtils.getMetaStoreSaslProperties(conf, useSSL)); } else { LOG.debug("HMSC::open(): Could not find delegation token. Creating KERBEROS-based thrift connection."); transport = authBridge.createClientTransport( principalConfig, store.getHost(), "KERBEROS", null, transport, MetaStoreUtils.getMetaStoreSaslProperties(conf, useSSL));
MetaStoreUtils.getMetaStoreSaslProperties(conf, useSSL)); } else { LOG.info("HMSC::open(): Could not find delegation token. Creating KERBEROS-based thrift connection."); transport = authBridge.createClientTransport( principalConfig, host, "KERBEROS", null, transport, MetaStoreUtils.getMetaStoreSaslProperties(conf, useSSL));
MetaStoreUtils.getMetaStoreSaslProperties(conf, useSSL)); } else { LOG.info("HMSC::open(): Could not find delegation token. Creating KERBEROS-based thrift connection."); transport = authBridge.createClientTransport( principalConfig, store.getHost(), "KERBEROS", null, transport, MetaStoreUtils.getMetaStoreSaslProperties(conf, useSSL));
saslServer.setSecretManager(delegationTokenManager.getSecretManager()); transFactory = saslServer.createTransportFactory( MetaStoreUtils.getMetaStoreSaslProperties(conf, useSSL)); processor = saslServer.wrapProcessor( new ThriftHiveMetastore.Processor<>(handler));
saslServer.setSecretManager(delegationTokenManager.getSecretManager()); transFactory = saslServer.createTransportFactory( MetaStoreUtils.getMetaStoreSaslProperties(conf, useSSL)); processor = saslServer.wrapProcessor( new ThriftHiveMetastore.Processor<>(handler));