secure_mapping.js 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780
  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. // All of the "name" properties have to coincide with how they will appear in the *-site.xml file
  19. // The "template" properties can come from the config properties in site_properties.js or secure_properties.js .
  20. module.exports = [
  21. {
  22. "name": "hadoop.security.authentication",
  23. "templateName": [],
  24. "foreignKey": null,
  25. "value": "kerberos",
  26. "nonSecureValue": "simple",
  27. "filename": "core-site.xml",
  28. "serviceName": "HDFS"
  29. },
  30. {
  31. "name": "hadoop.security.authorization",
  32. "templateName": [],
  33. "foreignKey": null,
  34. "value": "true",
  35. "nonSecureValue": "false",
  36. "filename": "core-site.xml",
  37. "serviceName": "HDFS"
  38. },
  39. {
  40. "name": "hadoop.security.auth_to_local",
  41. "templateName": ["resourcemanager_primary_name", "kerberos_domain", "yarn_user", "nodemanager_primary_name", "namenode_primary_name", "hdfs_user", "datanode_primary_name", "hbase_master_primary_name", "hbase_user","hbase_regionserver_primary_name","oozie_primary_name","oozie_user","jobhistory_primary_name","mapred_user","journalnode_principal_name","falcon_primary_name","falcon_user"],
  42. "foreignKey": null,
  43. "value": "RULE:[2:$1@$0](<templateName[0]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[3]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[4]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[6]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[10]>@.*<templateName[1]>)s/.*/<templateName[11]>/\nRULE:[2:$1@$0](<templateName[12]>@.*<templateName[1]>)s/.*/<templateName[13]>/\nRULE:[2:$1@$0](<templateName[14]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[15]>@.*<templateName[1]>)s/.*/<templateName[16]>/\nDEFAULT",
  44. "filename": "core-site.xml",
  45. "serviceName": "HDFS",
  46. "dependedServiceName": [{name: "HBASE", replace: "\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/"},{name: "OOZIE",replace: "\nRULE:[2:$1@$0](<templateName[10]>@.*<templateName[1]>)s/.*/<templateName[11]>/"},{name: "MAPREDUCE2",replace: "\nRULE:[2:$1@$0](<templateName[12]>@.*<templateName[1]>)s/.*/<templateName[13]>/"}]
  47. },
  48. {
  49. "name": "dfs.namenode.kerberos.principal",
  50. "templateName": ["namenode_principal_name", "kerberos_domain"],
  51. "foreignKey": null,
  52. "value": "<templateName[0]>@<templateName[1]>",
  53. "filename": "hdfs-site.xml",
  54. "serviceName": "HDFS"
  55. },
  56. {
  57. "name": "dfs.namenode.keytab.file",
  58. "templateName": ["namenode_keytab"],
  59. "foreignKey": null,
  60. "value": "<templateName[0]>",
  61. "filename": "hdfs-site.xml",
  62. "serviceName": "HDFS"
  63. },
  64. {
  65. "name": "dfs.secondary.namenode.kerberos.principal",
  66. "templateName": ["snamenode_principal_name", "kerberos_domain"],
  67. "foreignKey": null,
  68. "value": "<templateName[0]>@<templateName[1]>",
  69. "filename": "hdfs-site.xml",
  70. "serviceName": "HDFS"
  71. },
  72. {
  73. "name": "dfs.secondary.namenode.keytab.file",
  74. "templateName": ["snamenode_keytab"],
  75. "foreignKey": null,
  76. "value": "<templateName[0]>",
  77. "filename": "hdfs-site.xml",
  78. "serviceName": "HDFS"
  79. },
  80. {
  81. "name": "dfs.web.authentication.kerberos.principal",
  82. "templateName": ["hadoop_http_principal_name", "kerberos_domain"],
  83. "foreignKey": null,
  84. "value": "<templateName[0]>@<templateName[1]>",
  85. "filename": "hdfs-site.xml",
  86. "serviceName": "HDFS"
  87. },
  88. {
  89. "name": "dfs.web.authentication.kerberos.keytab",
  90. "templateName": ["hadoop_http_keytab"],
  91. "foreignKey": null,
  92. "value": "<templateName[0]>",
  93. "filename": "hdfs-site.xml",
  94. "serviceName": "HDFS"
  95. },
  96. {
  97. "name": "dfs.datanode.kerberos.principal",
  98. "templateName": ["datanode_principal_name", "kerberos_domain"],
  99. "foreignKey": null,
  100. "value": "<templateName[0]>@<templateName[1]>",
  101. "filename": "hdfs-site.xml",
  102. "serviceName": "HDFS"
  103. },
  104. {
  105. "name": "dfs.datanode.keytab.file",
  106. "templateName": ["datanode_keytab"],
  107. "foreignKey": null,
  108. "value": "<templateName[0]>",
  109. "filename": "hdfs-site.xml",
  110. "serviceName": "HDFS"
  111. },
  112. {
  113. "name": "dfs.namenode.kerberos.internal.spnego.principal",
  114. "templateName": [],
  115. "foreignKey": null,
  116. "value": "${dfs.web.authentication.kerberos.principal}",
  117. "filename": "hdfs-site.xml",
  118. "serviceName": "HDFS"
  119. },
  120. {
  121. "name": "dfs.secondary.namenode.kerberos.internal.spnego.principal",
  122. "templateName": [],
  123. "foreignKey": null,
  124. "value": "${dfs.web.authentication.kerberos.principal}",
  125. "filename": "hdfs-site.xml",
  126. "serviceName": "HDFS"
  127. },
  128. {
  129. "name": "dfs.journalnode.kerberos.principal",
  130. "templateName": ["journalnode_principal_name", "kerberos_domain"],
  131. "foreignKey": null,
  132. "value": "<templateName[0]>@<templateName[1]>",
  133. "filename": "hdfs-site.xml",
  134. "serviceName": "HDFS"
  135. },
  136. {
  137. "name": "dfs.journalnode.kerberos.internal.spnego.principal",
  138. "templateName": ["hadoop_http_principal_name", "kerberos_domain"],
  139. "foreignKey": null,
  140. "value": "<templateName[0]>@<templateName[1]>",
  141. "filename": "hdfs-site.xml",
  142. "serviceName": "HDFS"
  143. },
  144. {
  145. "name": "dfs.journalnode.keytab.file",
  146. "templateName": ["journalnode_keytab"],
  147. "foreignKey": null,
  148. "value": "<templateName[0]>",
  149. "filename": "hdfs-site.xml",
  150. "serviceName": "HDFS"
  151. },
  152. {
  153. "name": "dfs.datanode.address",
  154. "templateName": ["dfs_datanode_address"],
  155. "foreignKey": null,
  156. "value": "0.0.0.0:<templateName[0]>",
  157. "nonSecureValue": "0.0.0.0:50010",
  158. "filename": "hdfs-site.xml",
  159. "serviceName": "HDFS"
  160. },
  161. {
  162. "name": "dfs.datanode.http.address",
  163. "templateName": ["dfs_datanode_http_address"],
  164. "foreignKey": null,
  165. "value": "0.0.0.0:<templateName[0]>",
  166. "nonSecureValue": "0.0.0.0:50075",
  167. "filename": "hdfs-site.xml",
  168. "serviceName": "HDFS"
  169. },
  170. {
  171. "name": "mapreduce.jobhistory.principal",
  172. "templateName": ["jobhistory_principal_name", "kerberos_domain"],
  173. "foreignKey": null,
  174. "value": "<templateName[0]>@<templateName[1]>",
  175. "filename": "mapred-site.xml",
  176. "serviceName": "MAPREDUCE2"
  177. },
  178. {
  179. "name": "mapreduce.jobhistory.keytab",
  180. "templateName": ["jobhistory_keytab"],
  181. "foreignKey": null,
  182. "value": "<templateName[0]>",
  183. "filename": "mapred-site.xml",
  184. "serviceName": "MAPREDUCE2"
  185. },
  186. {
  187. "name": "mapreduce.jobhistory.webapp.spnego-principal",
  188. "templateName": ["jobhistory_http_principal_name", "kerberos_domain"],
  189. "foreignKey": null,
  190. "value": "<templateName[0]>@<templateName[1]>",
  191. "filename": "mapred-site.xml",
  192. "serviceName": "MAPREDUCE2"
  193. },
  194. {
  195. "name": "mapreduce.jobhistory.webapp.spnego-keytab-file",
  196. "templateName": ["jobhistory_http_keytab"],
  197. "foreignKey": null,
  198. "value": "<templateName[0]>",
  199. "filename": "mapred-site.xml",
  200. "serviceName": "MAPREDUCE2"
  201. },
  202. {
  203. "name": "yarn.timeline-service.enabled",
  204. "templateName": [],
  205. "foreignKey": null,
  206. "value": "false",
  207. "nonSecureValue": "false",
  208. "filename": "yarn-site.xml",
  209. "serviceName": "YARN"
  210. },
  211. {
  212. "name": "yarn.acl.enable",
  213. "templateName": [],
  214. "foreignKey": null,
  215. "value": "true",
  216. "nonSecureValue": "false",
  217. "filename": "yarn-site.xml",
  218. "serviceName": "YARN"
  219. },
  220. // YARN Timeline Service
  221. // These "http-authentication" properties are supported in HDP Champlain
  222. {
  223. "name": "yarn.timeline-service.principal",
  224. "templateName": ["apptimelineserver_principal_name", "kerberos_domain"],
  225. "foreignKey": null,
  226. "value": "<templateName[0]>@<templateName[1]>",
  227. "filename": "yarn-site.xml",
  228. "serviceName": "YARN"
  229. },
  230. {
  231. "name": "yarn.timeline-service.keytab",
  232. "templateName": ["apptimelineserver_keytab"],
  233. "foreignKey": null,
  234. "value": "<templateName[0]>",
  235. "filename": "yarn-site.xml",
  236. "serviceName": "YARN"
  237. },
  238. {
  239. "name": "yarn.timeline-service.http-authentication.type",
  240. "templateName": [],
  241. "foreignKey": null,
  242. "value": "kerberos",
  243. "filename": "yarn-site.xml",
  244. "serviceName": "YARN"
  245. },
  246. {
  247. "name": "yarn.timeline-service.http-authentication.kerberos.principal",
  248. "templateName": ["apptimelineserver_http_principal_name", "kerberos_domain"],
  249. "foreignKey": null,
  250. "value": "<templateName[0]>@<templateName[1]>",
  251. "filename": "yarn-site.xml",
  252. "serviceName": "YARN"
  253. },
  254. {
  255. "name": "yarn.timeline-service.http-authentication.kerberos.keytab",
  256. "templateName": ["apptimelineserver_http_keytab"],
  257. "foreignKey": null,
  258. "value": "<templateName[0]>",
  259. "filename": "yarn-site.xml",
  260. "serviceName": "YARN"
  261. },
  262. // YARN Resource Manager
  263. {
  264. "name": "yarn.resourcemanager.principal",
  265. "templateName": ["resourcemanager_principal_name", "kerberos_domain"],
  266. "foreignKey": null,
  267. "value": "<templateName[0]>@<templateName[1]>",
  268. "filename": "yarn-site.xml",
  269. "serviceName": "YARN"
  270. },
  271. {
  272. "name": "yarn.resourcemanager.keytab",
  273. "templateName": ["resourcemanager_keytab"],
  274. "foreignKey": null,
  275. "value": "<templateName[0]>",
  276. "filename": "yarn-site.xml",
  277. "serviceName": "YARN"
  278. },
  279. {
  280. "name": "yarn.nodemanager.principal",
  281. "templateName": ["nodemanager_principal_name", "kerberos_domain"],
  282. "foreignKey": null,
  283. "value": "<templateName[0]>@<templateName[1]>",
  284. "filename": "yarn-site.xml",
  285. "serviceName": "YARN"
  286. },
  287. {
  288. "name": "yarn.nodemanager.keytab",
  289. "templateName": ["nodemanager_keytab"],
  290. "foreignKey": null,
  291. "value": "<templateName[0]>",
  292. "filename": "yarn-site.xml",
  293. "serviceName": "YARN"
  294. },
  295. {
  296. "name": "yarn.resourcemanager.webapp.spnego-principal",
  297. "templateName": ["resourcemanager_http_principal_name", "kerberos_domain"],
  298. "foreignKey": null,
  299. "value": "<templateName[0]>@<templateName[1]>",
  300. "filename": "yarn-site.xml",
  301. "serviceName": "YARN"
  302. },
  303. {
  304. "name": "yarn.resourcemanager.webapp.spnego-keytab-file",
  305. "templateName": ["resourcemanager_http_keytab"],
  306. "foreignKey": null,
  307. "value": "<templateName[0]>",
  308. "filename": "yarn-site.xml",
  309. "serviceName": "YARN"
  310. },
  311. {
  312. "name": "yarn.nodemanager.webapp.spnego-principal",
  313. "templateName": ["nodemanager_http_principal_name", "kerberos_domain"],
  314. "foreignKey": null,
  315. "value": "<templateName[0]>@<templateName[1]>",
  316. "filename": "yarn-site.xml",
  317. "serviceName": "YARN"
  318. },
  319. {
  320. "name": "yarn.nodemanager.webapp.spnego-keytab-file",
  321. "templateName": ["nodemanager_http_keytab"],
  322. "foreignKey": null,
  323. "value": "<templateName[0]>",
  324. "filename": "yarn-site.xml",
  325. "serviceName": "YARN"
  326. },
  327. {
  328. "name": "yarn.nodemanager.container-executor.class",
  329. "templateName": ["yarn_nodemanager_container-executor_class"],
  330. "foreignKey": null,
  331. "value": "<templateName[0]>",
  332. "nonSecureValue": "org.apache.hadoop.yarn.server.nodemanager.DefaultContainerExecutor",
  333. "filename": "yarn-site.xml",
  334. "serviceName": "YARN"
  335. },
  336. {
  337. "name": "hbase.master.kerberos.principal",
  338. "templateName": ["hbase_master_principal_name", "kerberos_domain"],
  339. "foreignKey": null,
  340. "value": "<templateName[0]>@<templateName[1]>",
  341. "filename": "hbase-site.xml",
  342. "serviceName": "HBASE"
  343. },
  344. {
  345. "name": "hbase.master.keytab.file",
  346. "templateName": ["hbase_master_keytab"],
  347. "foreignKey": null,
  348. "value": "<templateName[0]>",
  349. "filename": "hbase-site.xml",
  350. "serviceName": "HBASE"
  351. },
  352. {
  353. "name": "hbase.regionserver.kerberos.principal",
  354. "templateName": ["hbase_regionserver_principal_name", "kerberos_domain"],
  355. "foreignKey": null,
  356. "value": "<templateName[0]>@<templateName[1]>",
  357. "filename": "hbase-site.xml",
  358. "serviceName": "HBASE"
  359. },
  360. {
  361. "name": "hbase.regionserver.keytab.file",
  362. "templateName": ["hbase_regionserver_keytab"],
  363. "foreignKey": null,
  364. "value": "<templateName[0]>",
  365. "filename": "hbase-site.xml",
  366. "serviceName": "HBASE"
  367. },
  368. {
  369. "name": "hive.metastore.sasl.enabled",
  370. "templateName": [],
  371. "foreignKey": null,
  372. "value": "true",
  373. "nonSecureValue": "false",
  374. "filename": "hive-site.xml",
  375. "serviceName": "HIVE"
  376. },
  377. {
  378. "name": "hive.security.authorization.enabled",
  379. "templateName": [],
  380. "foreignKey": null,
  381. "value": "true",
  382. "nonSecureValue": "false",
  383. "filename": "hive-site.xml",
  384. "serviceName": "HIVE"
  385. },
  386. {
  387. "name": "hive.server2.authentication",
  388. "templateName": [],
  389. "foreignKey": null,
  390. "value": "KERBEROS",
  391. "nonSecureValue": "NONE",
  392. "filename": "hive-site.xml",
  393. "serviceName": "HIVE"
  394. },
  395. {
  396. "name": "hive.metastore.kerberos.principal",
  397. "templateName": ["hive_metastore_principal_name", "kerberos_domain"],
  398. "foreignKey": null,
  399. "value": "<templateName[0]>@<templateName[1]>",
  400. "filename": "hive-site.xml",
  401. "serviceName": "HIVE"
  402. },
  403. {
  404. "name": "hive.metastore.kerberos.keytab.file",
  405. "templateName": ["hive_metastore_keytab"],
  406. "foreignKey": null,
  407. "value": "<templateName[0]>",
  408. "filename": "hive-site.xml",
  409. "serviceName": "HIVE"
  410. },
  411. {
  412. "name": "hive.server2.authentication.kerberos.principal",
  413. "templateName": ["hive_metastore_principal_name", "kerberos_domain"],
  414. "foreignKey": null,
  415. "value": "<templateName[0]>@<templateName[1]>",
  416. "filename": "hive-site.xml",
  417. "serviceName": "HIVE"
  418. },
  419. {
  420. "name": "hive.server2.authentication.kerberos.keytab",
  421. "templateName": ["hive_metastore_keytab"],
  422. "foreignKey": null,
  423. "value": "<templateName[0]>",
  424. "filename": "hive-site.xml",
  425. "serviceName": "HIVE"
  426. },
  427. {
  428. "name": "hive.server2.authentication.spnego.principal",
  429. "templateName": ["hive_metastore_http_principal_name", "kerberos_domain"],
  430. "foreignKey": null,
  431. "value": "<templateName[0]>@<templateName[1]>",
  432. "filename": "hive-site.xml",
  433. "serviceName": "HIVE"
  434. },
  435. {
  436. "name": "hive.server2.authentication.spnego.keytab",
  437. "templateName": ["hive_metastore_http_keytab"],
  438. "foreignKey": null,
  439. "value": "<templateName[0]>",
  440. "filename": "hive-site.xml",
  441. "serviceName": "HIVE"
  442. },
  443. {
  444. "name": "oozie.service.AuthorizationService.authorization.enabled",
  445. "templateName": [],
  446. "foreignKey": null,
  447. "value": "true",
  448. "filename": "oozie-site.xml",
  449. "serviceName": "OOZIE"
  450. },
  451. {
  452. "name": "oozie.service.HadoopAccessorService.kerberos.enabled",
  453. "templateName": [],
  454. "foreignKey": null,
  455. "value": "true",
  456. "nonSecureValue": "false",
  457. "filename": "oozie-site.xml",
  458. "serviceName": "OOZIE"
  459. },
  460. {
  461. "name": "local.realm",
  462. "templateName": ["kerberos_domain"],
  463. "foreignKey": null,
  464. "value": "<templateName[0]>",
  465. "filename": "oozie-site.xml",
  466. "serviceName": "OOZIE"
  467. },
  468. {
  469. "name": "oozie.service.HadoopAccessorService.keytab.file",
  470. "templateName": ["oozie_keytab"],
  471. "foreignKey": null,
  472. "value": "<templateName[0]>",
  473. "filename": "oozie-site.xml",
  474. "serviceName": "OOZIE"
  475. },
  476. {
  477. "name": "oozie.service.HadoopAccessorService.kerberos.principal",
  478. "templateName": ["oozie_principal_name", "kerberos_domain"],
  479. "foreignKey": null,
  480. "value": "<templateName[0]>@<templateName[1]>",
  481. "filename": "oozie-site.xml",
  482. "serviceName": "OOZIE"
  483. },
  484. {
  485. "name": "oozie.authentication.type",
  486. "templateName": [],
  487. "foreignKey": null,
  488. "value": "kerberos",
  489. "nonSecureValue": "simple",
  490. "filename": "oozie-site.xml",
  491. "serviceName": "OOZIE"
  492. },
  493. {
  494. "name": "oozie.authentication.kerberos.principal",
  495. "templateName": ["oozie_http_principal_name", "kerberos_domain"],
  496. "foreignKey": null,
  497. "value": "<templateName[0]>@<templateName[1]>",
  498. "filename": "oozie-site.xml",
  499. "serviceName": "OOZIE"
  500. },
  501. {
  502. "name": "oozie.authentication.kerberos.keytab",
  503. "templateName": ["oozie_http_keytab"],
  504. "foreignKey": null,
  505. "value": "<templateName[0]>",
  506. "filename": "oozie-site.xml",
  507. "serviceName": "OOZIE"
  508. },
  509. {
  510. "name": "oozie.authentication.kerberos.name.rules",
  511. "templateName": ["resourcemanager_primary_name", "kerberos_domain", "yarn_user", "nodemanager_primary_name", "namenode_primary_name", "hdfs_user", "datanode_primary_name", "hbase_master_primary_name", "hbase_user","hbase_regionserver_primary_name"],
  512. "foreignKey": null,
  513. "value": "RULE:[2:$1@$0](<templateName[0]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[3]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[4]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[6]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nDEFAULT",
  514. "filename": "oozie-site.xml",
  515. "serviceName": "OOZIE",
  516. "dependedServiceName": [{name: "HBASE", replace: "\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/"}]
  517. },
  518. {
  519. "name": "templeton.kerberos.principal",
  520. "templateName": ["webHCat_http_principal_name", "kerberos_domain"],
  521. "foreignKey": null,
  522. "value": "<templateName[0]>@<templateName[1]>",
  523. "filename": "webhcat-site.xml",
  524. "serviceName": "HIVE"
  525. },
  526. {
  527. "name": "templeton.kerberos.keytab",
  528. "templateName": ["webhcat_http_keytab"],
  529. "foreignKey": null,
  530. "value": "<templateName[0]>",
  531. "filename": "webhcat-site.xml",
  532. "serviceName": "HIVE"
  533. },
  534. {
  535. "name": "templeton.kerberos.secret",
  536. "templateName": [""],
  537. "foreignKey": null,
  538. "value": "secret",
  539. "filename": "webhcat-site.xml",
  540. "serviceName": "HIVE"
  541. },
  542. {
  543. "name": "templeton.hive.properties",
  544. "templateName": ["hivemetastore_host","hive_metastore_principal_name","kerberos_domain"],
  545. "foreignKey": null,
  546. "value": "hive.metastore.local=false,hive.metastore.uris=thrift://<templateName[0]>:9083,hive." +
  547. "metastore.sasl.enabled=true,hive.metastore.execute.setugi=true,hive.metastore.warehouse.dir=/apps/hive/warehouse,hive.exec.mode.local.auto=false,hive.metastore.kerberos.principal=<templateName[1]>@<templateName[2]>",
  548. "filename": "webhcat-site.xml",
  549. "serviceName": "HIVE"
  550. },
  551. {
  552. "name": "hbase.coprocessor.master.classes",
  553. "templateName": [],
  554. "foreignKey": null,
  555. "value": "org.apache.hadoop.hbase.security.access.AccessController",
  556. "filename": "hbase-site.xml",
  557. "serviceName": "HBASE"
  558. },
  559. {
  560. "name": "hbase.coprocessor.region.classes",
  561. "templateName": [],
  562. "foreignKey": null,
  563. "value": "org.apache.hadoop.hbase.security.token.TokenProvider,org.apache.hadoop.hbase.security.access.SecureBulkLoadEndpoint,org.apache.hadoop.hbase.security.access.AccessController",
  564. "filename": "hbase-site.xml",
  565. "serviceName": "HBASE"
  566. },
  567. {
  568. "name": "hbase.security.authentication",
  569. "templateName": [],
  570. "foreignKey": null,
  571. "value": "kerberos",
  572. "nonSecureValue": "simple",
  573. "filename": "hbase-site.xml",
  574. "serviceName": "HBASE"
  575. },
  576. {
  577. "name": "hbase.security.authorization",
  578. "templateName": [],
  579. "foreignKey": null,
  580. "value": "true",
  581. "nonSecureValue": "false",
  582. "filename": "hbase-site.xml",
  583. "serviceName": "HBASE"
  584. },
  585. {
  586. "name": "hbase.coprocessor.region.classes",
  587. "templateName": [],
  588. "foreignKey": null,
  589. "value": "org.apache.hadoop.hbase.security.token.TokenProvider,org.apache.hadoop.hbase.security.access.SecureBulkLoadEndpoint,org.apache.hadoop.hbase.security.access.AccessController",
  590. "filename": "hbase-site.xml",
  591. "serviceName": "HBASE"
  592. },
  593. {
  594. "name": "hbase.bulkload.staging.dir",
  595. "templateName": [],
  596. "foreignKey": null,
  597. "value": "/apps/hbase/staging",
  598. "filename": "hbase-site.xml",
  599. "serviceName": "HBASE"
  600. },
  601. {
  602. "name": "zookeeper.znode.parent",
  603. "templateName": [],
  604. "foreignKey": null,
  605. "value": "/hbase-secure",
  606. "nonSecureValue": "/hbase-unsecure",
  607. "filename": "hbase-site.xml",
  608. "serviceName": "HBASE"
  609. },
  610. /***************************************FALCON***********************************************/
  611. {
  612. "name": "*.falcon.authentication.type",
  613. "templateName": [],
  614. "foreignKey": null,
  615. "value": "kerberos",
  616. "nonSecureValue": "simple",
  617. "filename": "falcon-startup.properties.xml",
  618. "serviceName": "FALCON"
  619. },
  620. {
  621. "name": "*.falcon.http.authentication.type",
  622. "templateName": [],
  623. "foreignKey": null,
  624. "value": "kerberos",
  625. "nonSecureValue": "simple",
  626. "filename": "falcon-startup.properties.xml",
  627. "serviceName": "FALCON"
  628. },
  629. {
  630. "name": "*.falcon.service.authentication.kerberos.principal",
  631. "templateName": ["falcon_principal_name", "kerberos_domain"],
  632. "foreignKey": null,
  633. "value": "<templateName[0]>@<templateName[1]>",
  634. "filename": "falcon-startup.properties.xml",
  635. "serviceName": "FALCON"
  636. },
  637. {
  638. "name": "*.falcon.service.authentication.kerberos.keytab",
  639. "templateName": ["falcon_keytab"],
  640. "foreignKey": null,
  641. "value": "<templateName[0]>",
  642. "filename": "falcon-startup.properties.xml",
  643. "serviceName": "FALCON"
  644. },
  645. {
  646. "name": "*.falcon.http.authentication.kerberos.principal",
  647. "templateName": ["falcon_http_principal_name", "kerberos_domain"],
  648. "foreignKey": null,
  649. "value": "<templateName[0]>@<templateName[1]>",
  650. "filename": "falcon-startup.properties.xml",
  651. "serviceName": "FALCON"
  652. },
  653. {
  654. "name": "*.falcon.http.authentication.kerberos.keytab",
  655. "templateName": ["falcon_http_keytab"],
  656. "foreignKey": null,
  657. "value": "<templateName[0]>",
  658. "filename": "falcon-startup.properties.xml",
  659. "serviceName": "FALCON"
  660. },
  661. {
  662. "name": "*.dfs.namenode.kerberos.principal",
  663. "templateName": ["namenode_principal_name_falcon", "kerberos_domain"],
  664. "foreignKey": null,
  665. "value": "<templateName[0]>@<templateName[1]>",
  666. "filename": "falcon-startup.properties.xml",
  667. "serviceName": "FALCON"
  668. },
  669. /***************************************KNOX***********************************************/
  670. {
  671. "name": "gateway.hadoop.kerberos.secured",
  672. "templateName": [],
  673. "foreignKey": null,
  674. "value": "true",
  675. "nonSecureValue": "false",
  676. "filename": "gateway-site.xml",
  677. "serviceName": "KNOX"
  678. },
  679. {
  680. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  681. "templateName": ["proxyuser_group"],
  682. "foreignKey": ["knox_primary_name"],
  683. "value": "<templateName[0]>",
  684. "filename": "core-site.xml",
  685. "serviceName": "KNOX"
  686. },
  687. {
  688. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  689. "templateName": ["knox_gateway_hosts"],
  690. "foreignKey": ["knox_primary_name"],
  691. "value": "<templateName[0]>",
  692. "filename": "core-site.xml",
  693. "serviceName": "KNOX"
  694. },
  695. {
  696. "name": "webhcat.proxyuser.<foreignKey[0]>.groups",
  697. "templateName": ["proxyuser_group"],
  698. "foreignKey": ["knox_primary_name"],
  699. "value": "<templateName[0]>",
  700. "filename": "webhcat-site.xml",
  701. "serviceName": "KNOX"
  702. },
  703. {
  704. "name": "webhcat.proxyuser.<foreignKey[0]>.hosts",
  705. "templateName": ["knox_gateway_hosts"],
  706. "foreignKey": ["knox_primary_name"],
  707. "value": "<templateName[0]>",
  708. "filename": "webhcat-site.xml",
  709. "serviceName": "KNOX"
  710. },
  711. {
  712. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  713. "templateName": ["proxyuser_group"],
  714. "foreignKey": ["knox_primary_name"],
  715. "value": "<templateName[0]>",
  716. "filename": "oozie-site.xml",
  717. "serviceName": "KNOX"
  718. },
  719. {
  720. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  721. "templateName": ["knox_gateway_hosts"],
  722. "foreignKey": ["knox_primary_name"],
  723. "value": "<templateName[0]>",
  724. "filename": "oozie-site.xml",
  725. "serviceName": "KNOX"
  726. },
  727. /***************************************core-site***************************************************/
  728. {
  729. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  730. "templateName": ["proxyuser_group"],
  731. "foreignKey": ["hive_metastore_primary_name"],
  732. "value": "<templateName[0]>",
  733. "filename": "core-site.xml",
  734. "serviceName": "HIVE"
  735. },
  736. {
  737. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  738. "templateName": ["hivemetastore_host"],
  739. "foreignKey": ["hive_metastore_primary_name"],
  740. "value": "<templateName[0]>",
  741. "filename": "core-site.xml",
  742. "serviceName": "HIVE"
  743. },
  744. {
  745. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  746. "templateName": ["proxyuser_group"],
  747. "foreignKey": ["oozie_primary_name"],
  748. "value": "<templateName[0]>",
  749. "filename": "core-site.xml",
  750. "serviceName": "OOZIE"
  751. },
  752. {
  753. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  754. "templateName": ["oozieserver_host"],
  755. "foreignKey": ["oozie_primary_name"],
  756. "value": "<templateName[0]>",
  757. "filename": "core-site.xml",
  758. "serviceName": "OOZIE"
  759. },
  760. {
  761. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  762. "templateName": ["proxyuser_group"],
  763. "foreignKey": ["webHCat_http_primary_name"],
  764. "value": "<templateName[0]>",
  765. "filename": "core-site.xml",
  766. "serviceName": "HIVE"
  767. },
  768. {
  769. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  770. "templateName": ["webhcat_server"],
  771. "foreignKey": ["webHCat_http_primary_name"],
  772. "value": "<templateName[0]>",
  773. "filename": "core-site.xml",
  774. "serviceName": "HIVE"
  775. }
  776. ];