step2_controller.js 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299
  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. var App = require('app');
  19. require('controllers/wizard/step7_controller');
  20. App.KerberosWizardStep2Controller = App.WizardStep7Controller.extend(App.KDCCredentialsControllerMixin, {
  21. name: "kerberosWizardStep2Controller",
  22. isKerberosWizard: true,
  23. selectedServiceNames: ['KERBEROS'],
  24. allSelectedServiceNames: ['KERBEROS'],
  25. componentName: 'KERBEROS_CLIENT',
  26. installedServiceNames: [],
  27. servicesInstalled: false,
  28. addMiscTabToPage: false,
  29. /**
  30. * @type {boolean} true if test connection to hosts is in progress
  31. */
  32. testConnectionInProgress: false,
  33. /**
  34. * Should Back-button be disabled
  35. * @type {boolean}
  36. */
  37. isBackBtnDisabled: function() {
  38. return this.get('testConnectionInProgress');
  39. }.property('testConnectionInProgress'),
  40. /**
  41. * Should Next-button be disabled
  42. * @type {boolean}
  43. */
  44. isSubmitDisabled: function () {
  45. if (!this.get('stepConfigs.length') || this.get('testConnectionInProgress') || this.get('submitButtonClicked')) return true;
  46. return (!this.get('stepConfigs').filterProperty('showConfig', true).everyProperty('errorCount', 0) || this.get("miscModalVisible"));
  47. }.property('stepConfigs.@each.errorCount', 'miscModalVisible', 'submitButtonClicked', 'testConnectionInProgress'),
  48. hostNames: function () {
  49. return App.get('allHostNames');
  50. }.property('App.allHostNames'),
  51. serviceConfigTags: [],
  52. clearStep: function () {
  53. this._super();
  54. this.set('configs', []);
  55. this.get('serviceConfigTags').clear();
  56. this.set('servicesInstalled', false);
  57. },
  58. isConfigsLoaded: function () {
  59. return this.get('wizardController.stackConfigsLoaded');
  60. }.property('wizardController.stackConfigsLoaded'),
  61. /**
  62. * On load function
  63. * @method loadStep
  64. */
  65. loadStep: function () {
  66. console.log("TRACE: Loading step2: Configure Kerberos");
  67. if (!App.StackService.find().someProperty('serviceName', 'KERBEROS') || !this.get('isConfigsLoaded')) {
  68. return;
  69. }
  70. this.clearStep();
  71. //STEP 2: Load on-site configs by service from local DB
  72. var storedConfigs = this.get('content.serviceConfigProperties');
  73. //STEP 3: Merge pre-defined configs with loaded on-site configs
  74. this.set('configs', App.config.mergePreDefinedWithStack(this.get('selectedServiceNames')));
  75. App.config.setPreDefinedServiceConfigs(this.get('addMiscTabToPage'));
  76. this.filterConfigs(this.get('configs'));
  77. if (App.get('supports.storeKDCCredentials') && !this.get('wizardController.skipClientInstall')) {
  78. this.initilizeKDCStoreProperties(this.get('configs'));
  79. }
  80. this.applyServicesConfigs(this.get('configs'), storedConfigs);
  81. },
  82. /**
  83. * Make Active Directory specific configs visible if user has selected AD option
  84. * @param configs
  85. */
  86. filterConfigs: function (configs) {
  87. var kdcType = this.get('content.kerberosOption');
  88. var adConfigNames = ['ldap_url', 'container_dn', 'ad_create_attributes_template'];
  89. var mitConfigNames = ['kdc_create_attributes'];
  90. var kerberosWizardController = this.controllers.get('kerberosWizardController');
  91. var manageIdentitiesConfig = configs.findProperty('name', 'manage_identities');
  92. if (kdcType === Em.I18n.t('admin.kerberos.wizard.step1.option.manual')) {
  93. if (kerberosWizardController.get('skipClientInstall')) {
  94. kerberosWizardController.overrideVisibility(configs, false, kerberosWizardController.get('exceptionsOnSkipClient'));
  95. }
  96. return;
  97. } else if (manageIdentitiesConfig) {
  98. manageIdentitiesConfig.isVisible = false;
  99. manageIdentitiesConfig.value = 'true';
  100. }
  101. adConfigNames.forEach(function (_configName) {
  102. var config = configs.findProperty('name', _configName);
  103. if (config) {
  104. config.isVisible = kdcType === Em.I18n.t('admin.kerberos.wizard.step1.option.ad');
  105. }
  106. }, this);
  107. mitConfigNames.forEach(function (_configName) {
  108. var config = configs.findProperty('name', _configName);
  109. if (config) {
  110. config.isVisible = kdcType === Em.I18n.t('admin.kerberos.wizard.step1.option.kdc');
  111. }
  112. }, this);
  113. },
  114. submit: function () {
  115. if (this.get('isSubmitDisabled')) return false;
  116. this.set('isSubmitDisabled', true);
  117. var self = this;
  118. this.deleteKerberosService().always(function () {
  119. self.configureKerberos();
  120. if (App.get('supports.storeKDCCredentials') && !self.get('wizardController.skipClientInstall')) {
  121. self.createKDCCredentials(self.get('stepConfigs.0.configs'));
  122. }
  123. });
  124. },
  125. configureKerberos: function () {
  126. var self = this;
  127. var wizardController = App.router.get(this.get('content.controllerName'));
  128. var callback = function () {
  129. self.createConfigurations().done(function () {
  130. self.createKerberosAdminSession().done(function () {
  131. App.router.send('next');
  132. });
  133. });
  134. };
  135. if (wizardController.get('skipClientInstall')) {
  136. callback();
  137. } else {
  138. wizardController.createKerberosResources(callback);
  139. }
  140. },
  141. /**
  142. * Delete Kerberos service if it exists
  143. */
  144. deleteKerberosService: function () {
  145. var serviceName = this.selectedServiceNames[0];
  146. if (App.cache.services.someProperty('ServiceInfo.service_name', 'KERBEROS')) {
  147. App.cache.services.removeAt(App.cache.services.indexOf(App.cache.services.findProperty('ServiceInfo.service_name', 'KERBEROS')));
  148. }
  149. if (App.Service.find().someProperty('serviceName', 'KERBEROS')) {
  150. App.serviceMapper.deleteRecord(App.Service.find('KERBEROS'));
  151. }
  152. return App.ajax.send({
  153. name: 'common.delete.service',
  154. sender: this,
  155. data: {
  156. serviceName: serviceName
  157. }
  158. });
  159. },
  160. createConfigurations: function () {
  161. var service = App.StackService.find().findProperty('serviceName', 'KERBEROS');
  162. var serviceConfigTags = [];
  163. var tag = 'version' + (new Date).getTime();
  164. Object.keys(service.get('configTypes')).forEach(function (type) {
  165. if (!serviceConfigTags.someProperty('type', type)) {
  166. var obj = this.createKerberosSiteObj(type, tag);
  167. obj.service_config_version_note = Em.I18n.t('admin.kerberos.wizard.configuration.note');
  168. serviceConfigTags.pushObject(obj);
  169. }
  170. }, this);
  171. var allConfigData = [];
  172. var serviceConfigData = [];
  173. Object.keys(service.get('configTypesRendered')).forEach(function (type) {
  174. var serviceConfigTag = serviceConfigTags.findProperty('type', type);
  175. if (serviceConfigTag) {
  176. serviceConfigData.pushObject(serviceConfigTag);
  177. }
  178. }, this);
  179. if (serviceConfigData.length) {
  180. allConfigData.pushObject(JSON.stringify({
  181. Clusters: {
  182. desired_config: serviceConfigData
  183. }
  184. }));
  185. }
  186. return App.ajax.send({
  187. name: 'common.across.services.configurations',
  188. sender: this,
  189. data: {
  190. data: '[' + allConfigData.toString() + ']'
  191. }
  192. });
  193. },
  194. createKerberosSiteObj: function (site, tag) {
  195. var properties = {};
  196. var content = this.get('stepConfigs')[0].get('configs');
  197. var configs = content.filterProperty('filename', site + '.xml');
  198. // properties that should be formated as hosts
  199. var hostProperties = ['kdc_host', 'realm'];
  200. configs.forEach(function (_configProperty) {
  201. // do not pass any globals whose name ends with _host or _hosts
  202. if (_configProperty.isRequiredByAgent !== false) {
  203. if (hostProperties.contains(_configProperty.name)) {
  204. properties[_configProperty.name] = App.config.trimProperty({displayType: 'host', value: _configProperty.value});
  205. } else {
  206. properties[_configProperty.name] = App.config.trimProperty(_configProperty);
  207. }
  208. }
  209. }, this);
  210. this.tweakKdcTypeValue(properties);
  211. this.tweakManualKdcProperties(properties);
  212. return {"type": site, "tag": tag, "properties": properties};
  213. },
  214. tweakKdcTypeValue: function (properties) {
  215. for (var prop in App.router.get('mainAdminKerberosController.kdcTypesValues')) {
  216. if (App.router.get('mainAdminKerberosController.kdcTypesValues').hasOwnProperty(prop)) {
  217. if (App.router.get('mainAdminKerberosController.kdcTypesValues')[prop] === properties['kdc_type']) {
  218. properties['kdc_type'] = prop;
  219. }
  220. }
  221. }
  222. },
  223. tweakManualKdcProperties: function (properties) {
  224. var kerberosWizardController = this.controllers.get('kerberosWizardController');
  225. if (properties['kdc_type'] === 'none' || kerberosWizardController.get('skipClientInstall')) {
  226. if (properties.hasOwnProperty('manage_identities')) {
  227. properties['manage_identities'] = 'false';
  228. }
  229. if (properties.hasOwnProperty('install_packages')) {
  230. properties['install_packages'] = 'false';
  231. }
  232. if (properties.hasOwnProperty('manage_krb5_conf')) {
  233. properties['manage_krb5_conf'] = 'false';
  234. }
  235. }
  236. },
  237. /**
  238. * puts kerberos admin credentials in the live cluster session
  239. * @returns {*} jqXHr
  240. */
  241. createKerberosAdminSession: function (configs) {
  242. configs = configs || this.get('stepConfigs')[0].get('configs');
  243. var adminPrincipalValue = configs.findProperty('name', 'admin_principal').value;
  244. var adminPasswordValue = configs.findProperty('name', 'admin_password').value;
  245. return App.ajax.send({
  246. name: 'common.cluster.update',
  247. sender: this,
  248. data: {
  249. clusterName: App.get('clusterName') || App.clusterStatus.get('clusterName'),
  250. data: [{
  251. session_attributes: {
  252. kerberos_admin: {principal: adminPrincipalValue, password: adminPasswordValue}
  253. }
  254. }]
  255. }
  256. });
  257. },
  258. /**
  259. * shows popup with to warn user
  260. * @param primary
  261. */
  262. showConnectionInProgressPopup: function(primary) {
  263. var primaryText = Em.I18n.t('common.exitAnyway');
  264. var msg = Em.I18n.t('services.service.config.connection.exitPopup.msg');
  265. App.showConfirmationPopup(primary, msg, null, null, primaryText)
  266. }
  267. });