|
@@ -0,0 +1,127 @@
|
|
|
+/**
|
|
|
+ * Licensed to the Apache Software Foundation (ASF) under one
|
|
|
+ * or more contributor license agreements. See the NOTICE file
|
|
|
+ * distributed with this work for additional information
|
|
|
+ * regarding copyright ownership. The ASF licenses this file
|
|
|
+ * to you under the Apache License, Version 2.0 (the
|
|
|
+ * "License"); you may not use this file except in compliance
|
|
|
+ * with the License. You may obtain a copy of the License at
|
|
|
+ *
|
|
|
+ * http://www.apache.org/licenses/LICENSE-2.0
|
|
|
+ *
|
|
|
+ * Unless required by applicable law or agreed to in writing, software
|
|
|
+ * distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+ * See the License for the specific language governing permissions and
|
|
|
+ * limitations under the License.
|
|
|
+ */
|
|
|
+
|
|
|
+package org.apache.ambari.server.controller.utilities;
|
|
|
+
|
|
|
+import com.google.inject.Inject;
|
|
|
+import com.sun.security.auth.callback.TextCallbackHandler;
|
|
|
+import org.apache.ambari.server.AmbariException;
|
|
|
+import org.apache.ambari.server.configuration.Configuration;
|
|
|
+import org.slf4j.Logger;
|
|
|
+import org.slf4j.LoggerFactory;
|
|
|
+
|
|
|
+import javax.security.auth.login.AppConfigurationEntry;
|
|
|
+import javax.security.auth.login.LoginContext;
|
|
|
+import javax.security.auth.login.LoginException;
|
|
|
+import java.io.File;
|
|
|
+import java.util.Map;
|
|
|
+
|
|
|
+public class KerberosChecker {
|
|
|
+
|
|
|
+ private static final String HTTP_SPNEGO_STANDARD_ENTRY =
|
|
|
+ "com.sun.security.jgss.krb5.initiate";
|
|
|
+ private static final String KRB5_LOGIN_MODULE =
|
|
|
+ "com.sun.security.auth.module.Krb5LoginModule";
|
|
|
+ public static final String JAVA_SECURITY_AUTH_LOGIN_CONFIG =
|
|
|
+ "java.security.auth.login.config";
|
|
|
+
|
|
|
+ static Logger LOG = LoggerFactory.getLogger(KerberosChecker.class);
|
|
|
+
|
|
|
+ @Inject
|
|
|
+ static Configuration config;
|
|
|
+
|
|
|
+ /**
|
|
|
+ * Checks Ambari Server with a Kerberos principal and keytab to allow views
|
|
|
+ * to authenticate via SPNEGO against cluster components.
|
|
|
+ *
|
|
|
+ * @throws AmbariException
|
|
|
+ */
|
|
|
+ public static void checkJaasConfiguration() throws AmbariException {
|
|
|
+
|
|
|
+ if (config.isKerberosJaasConfigurationCheckEnabled()) {
|
|
|
+ LOG.info("Checking Ambari Server Kerberos credentials.");
|
|
|
+
|
|
|
+ String jaasConfPath = System.getProperty(JAVA_SECURITY_AUTH_LOGIN_CONFIG);
|
|
|
+
|
|
|
+ javax.security.auth.login.Configuration jaasConf =
|
|
|
+ javax.security.auth.login.Configuration.getConfiguration();
|
|
|
+
|
|
|
+ AppConfigurationEntry[] jaasConfEntries =
|
|
|
+ jaasConf.getAppConfigurationEntry(HTTP_SPNEGO_STANDARD_ENTRY);
|
|
|
+
|
|
|
+ if (jaasConfEntries == null) {
|
|
|
+ LOG.warn("Can't find " + HTTP_SPNEGO_STANDARD_ENTRY + " entry in " +
|
|
|
+ jaasConfPath);
|
|
|
+ } else {
|
|
|
+ boolean krb5LoginModulePresent = false;
|
|
|
+ for (AppConfigurationEntry ace : jaasConfEntries) {
|
|
|
+ if (KRB5_LOGIN_MODULE.equals(ace.getLoginModuleName())) {
|
|
|
+ krb5LoginModulePresent = true;
|
|
|
+ Map<String, ?> options = ace.getOptions();
|
|
|
+ if ((options != null)) {
|
|
|
+ if (options.containsKey("keyTab")) {
|
|
|
+ String keytabPath = (String) options.get("keyTab");
|
|
|
+ File keytabFile = new File(keytabPath);
|
|
|
+ if (!keytabFile.exists()) {
|
|
|
+ LOG.warn(keytabPath + " doesn't exist.");
|
|
|
+ } else if (!keytabFile.canRead()) {
|
|
|
+ LOG.warn("Unable to read " + keytabPath +
|
|
|
+ " Please check the file access permissions for user " +
|
|
|
+ System.getProperty("user.name"));
|
|
|
+ }
|
|
|
+ } else {
|
|
|
+ LOG.warn("Can't find keyTab option in " + KRB5_LOGIN_MODULE +
|
|
|
+ " module of " + HTTP_SPNEGO_STANDARD_ENTRY + " entry in " +
|
|
|
+ jaasConfPath); }
|
|
|
+
|
|
|
+ if (!options.containsKey("principal")) {
|
|
|
+ LOG.warn("Can't find principal option in " + KRB5_LOGIN_MODULE +
|
|
|
+ " module of " + HTTP_SPNEGO_STANDARD_ENTRY + " entry in " +
|
|
|
+ jaasConfPath);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ if (!krb5LoginModulePresent) {
|
|
|
+ LOG.warn("Can't find " + KRB5_LOGIN_MODULE + " module in " +
|
|
|
+ HTTP_SPNEGO_STANDARD_ENTRY + " entry in " + jaasConfPath);
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ TextCallbackHandler textHandler = new TextCallbackHandler();
|
|
|
+ try {
|
|
|
+ LoginContext loginContext = new LoginContext(HTTP_SPNEGO_STANDARD_ENTRY,
|
|
|
+ textHandler);
|
|
|
+
|
|
|
+ loginContext.login();
|
|
|
+ loginContext.logout();
|
|
|
+ }
|
|
|
+ catch (LoginException le) {
|
|
|
+ LOG.error(le.getMessage());
|
|
|
+ throw new AmbariException(
|
|
|
+ "Ambari Server Kerberos credentials check failed. \n" +
|
|
|
+ "Check KDC availability and JAAS configuration in " + jaasConfPath);
|
|
|
+ }
|
|
|
+
|
|
|
+ LOG.info("Ambari Server Kerberos credentials check passed.");
|
|
|
+ } else {
|
|
|
+ LOG.info("Skipping Ambari Server Kerberos credentials check.");
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+}
|