kerberos.json 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120
  1. {
  2. "services": [
  3. {
  4. "name": "STORM",
  5. "identities": [
  6. {
  7. "name": "/spnego"
  8. },
  9. {
  10. "name": "/smokeuser"
  11. },
  12. {
  13. "name": "storm_components",
  14. "principal": {
  15. "value": "${storm-env/storm_user}-${cluster_name|toLower()}@${realm}",
  16. "type": "user",
  17. "configuration": "storm-env/storm_principal_name"
  18. },
  19. "keytab": {
  20. "file": "${keytab_dir}/storm.headless.keytab",
  21. "owner": {
  22. "name": "${storm-env/storm_user}",
  23. "access": "r"
  24. },
  25. "group": {
  26. "name": "${cluster-env/user_group}",
  27. "access": ""
  28. },
  29. "configuration": "storm-env/storm_keytab"
  30. }
  31. }
  32. ],
  33. "configurations": [
  34. {
  35. "storm-site": {
  36. "nimbus.authorizer": "backtype.storm.security.auth.authorizer.SimpleACLAuthorizer",
  37. "drpc.authorizer": "backtype.storm.security.auth.authorizer.DRPCSimpleACLAuthorizer",
  38. "ui.filter": "org.apache.hadoop.security.authentication.server.AuthenticationFilter",
  39. "storm.principal.tolocal": "backtype.storm.security.auth.KerberosPrincipalToLocal",
  40. "supervisor.enable": "true",
  41. "storm.zookeeper.superACL": "sasl:{{storm_bare_jaas_principal}}",
  42. "java.security.auth.login.config": "{{conf_dir}}/storm_jaas.conf",
  43. "nimbus.admins": "['{{storm_bare_jaas_principal}}']",
  44. "nimbus.supervisor.users": "['{{storm_bare_jaas_principal}}']",
  45. "ui.filter.params": "{'type': 'kerberos', 'kerberos.principal': '{{storm_ui_jaas_principal}}', 'kerberos.keytab': '{{storm_ui_keytab_path}}', 'kerberos.name.rules': 'DEFAULT'}"
  46. }
  47. }
  48. ],
  49. "components": [
  50. {
  51. "name": "STORM_UI_SERVER",
  52. "identities": [
  53. {
  54. "name": "/spnego",
  55. "principal": {
  56. "configuration": "storm-env/storm_ui_principal_name"
  57. },
  58. "keytab": {
  59. "configuration": "storm-env/storm_ui_keytab"
  60. }
  61. }
  62. ]
  63. },
  64. {
  65. "name": "NIMBUS",
  66. "identities": [
  67. {
  68. "name": "nimbus_server",
  69. "principal": {
  70. "value": "nimbus/_HOST@${realm}",
  71. "type": "service",
  72. "configuration": "storm-env/nimbus_principal_name"
  73. },
  74. "keytab": {
  75. "file": "${keytab_dir}/nimbus.service.keytab",
  76. "owner": {
  77. "name": "${storm-env/storm_user}",
  78. "access": "r"
  79. },
  80. "group": {
  81. "name": "${cluster-env/user_group}",
  82. "access": ""
  83. },
  84. "configuration": "storm-env/nimbus_keytab"
  85. }
  86. }
  87. ]
  88. },
  89. {
  90. "name": "DRPC_SERVER",
  91. "identities": [
  92. {
  93. "name": "nimbus_server",
  94. "principal": {
  95. "value": "nimbus/_HOST@${realm}",
  96. "type": "service",
  97. "configuration": "storm-env/nimbus_principal_name"
  98. },
  99. "keytab": {
  100. "file": "${keytab_dir}/nimbus.service.keytab",
  101. "owner": {
  102. "name": "${storm-env/storm_user}",
  103. "access": "r"
  104. },
  105. "group": {
  106. "name": "${cluster-env/user_group}",
  107. "access": ""
  108. },
  109. "configuration": "storm-env/nimbus_keytab"
  110. }
  111. }
  112. ]
  113. },
  114. {
  115. "name" : "SUPERVISOR"
  116. }
  117. ]
  118. }
  119. ]
  120. }