secure_mapping.js 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503
  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. module.exports = [
  19. {
  20. "name": "hadoop.security.authentication",
  21. "templateName": [],
  22. "foreignKey": null,
  23. "value": "kerberos",
  24. "filename": "core-site.xml",
  25. "serviceName": "HDFS"
  26. },
  27. {
  28. "name": "hadoop.security.authorization",
  29. "templateName": [],
  30. "foreignKey": null,
  31. "value": "true",
  32. "filename": "core-site.xml",
  33. "serviceName": "HDFS"
  34. },
  35. {
  36. "name": "hadoop.security.auth_to_local",
  37. "templateName": ["jobtracker_primary_name", "kerberos_domain", "mapred_user", "tasktracker_primary_name", "namenode_primary_name", "hdfs_user", "datanode_primary_name", "hbase_master_primary_name", "hbase_user","hbase_regionserver_primary_name","oozie_primary_name","oozie_user"],
  38. "foreignKey": null,
  39. "value": "RULE:[2:$1@$0](<templateName[0]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[3]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[4]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[6]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[10]>@.*<templateName[1]>)s/.*/<templateName[11]>/\nDEFAULT",
  40. "filename": "core-site.xml",
  41. "serviceName": "HDFS",
  42. "dependedServiceName": [{name: "HBASE", replace: "\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/"},{name: "OOZIE",replace: "\nRULE:[2:$1@$0](<templateName[10]>@.*<templateName[1]>)s/.*/<templateName[11]>/"}]
  43. },
  44. {
  45. "name": "dfs.namenode.kerberos.principal",
  46. "templateName": ["namenode_principal_name", "kerberos_domain"],
  47. "foreignKey": null,
  48. "value": "<templateName[0]>@<templateName[1]>",
  49. "filename": "hdfs-site.xml",
  50. "serviceName": "HDFS"
  51. },
  52. {
  53. "name": "dfs.namenode.keytab.file",
  54. "templateName": ["namenode_keytab"],
  55. "foreignKey": null,
  56. "value": "<templateName[0]>",
  57. "filename": "hdfs-site.xml",
  58. "serviceName": "HDFS"
  59. },
  60. {
  61. "name": "dfs.secondary.namenode.kerberos.principal",
  62. "templateName": ["snamenode_principal_name", "kerberos_domain"],
  63. "foreignKey": null,
  64. "value": "<templateName[0]>@<templateName[1]>",
  65. "filename": "hdfs-site.xml"
  66. },
  67. {
  68. "name": "dfs.secondary.namenode.keytab.file",
  69. "templateName": ["snamenode_keytab"],
  70. "foreignKey": null,
  71. "value": "<templateName[0]>",
  72. "filename": "hdfs-site.xml",
  73. "serviceName": "HDFS"
  74. },
  75. {
  76. "name": "dfs.web.authentication.kerberos.principal",
  77. "templateName": ["hadoop_http_principal_name", "kerberos_domain"],
  78. "foreignKey": null,
  79. "value": "<templateName[0]>@<templateName[1]>",
  80. "filename": "hdfs-site.xml",
  81. "serviceName": "HDFS"
  82. },
  83. {
  84. "name": "dfs.web.authentication.kerberos.keytab",
  85. "templateName": ["hadoop_http_keytab"],
  86. "foreignKey": null,
  87. "value": "<templateName[0]>",
  88. "filename": "hdfs-site.xml",
  89. "serviceName": "HDFS"
  90. },
  91. {
  92. "name": "dfs.datanode.kerberos.principal",
  93. "templateName": ["datanode_principal_name", "kerberos_domain"],
  94. "foreignKey": null,
  95. "value": "<templateName[0]>@<templateName[1]>",
  96. "filename": "hdfs-site.xml",
  97. "serviceName": "HDFS"
  98. },
  99. {
  100. "name": "dfs.datanode.keytab.file",
  101. "templateName": ["datanode_keytab"],
  102. "foreignKey": null,
  103. "value": "<templateName[0]>",
  104. "filename": "hdfs-site.xml",
  105. "serviceName": "HDFS"
  106. },
  107. {
  108. "name": "dfs.namenode.kerberos.internal.spnego.principal",
  109. "templateName": [],
  110. "foreignKey": null,
  111. "value": "${dfs.web.authentication.kerberos.principal}",
  112. "filename": "hdfs-site.xml",
  113. "serviceName": "HDFS"
  114. },
  115. {
  116. "name": "dfs.secondary.namenode.kerberos.internal.spnego.principal",
  117. "templateName": [],
  118. "foreignKey": null,
  119. "value": "${dfs.web.authentication.kerberos.principal}",
  120. "filename": "hdfs-site.xml",
  121. "serviceName": "HDFS"
  122. },
  123. {
  124. "name": "ambari.dfs.datanode.port",
  125. "templateName": ["dfs_datanode_address"],
  126. "foreignKey": null,
  127. "value": "<templateName[0]>",
  128. "filename": "hdfs-site.xml",
  129. "serviceName": "HDFS"
  130. },
  131. {
  132. "name": "ambari.dfs.datanode.http.port",
  133. "templateName": ["dfs_datanode_http_address"],
  134. "foreignKey": null,
  135. "value": "<templateName[0]>",
  136. "filename": "hdfs-site.xml",
  137. "serviceName": "HDFS"
  138. },
  139. {
  140. "name": "mapreduce.jobtracker.kerberos.principal",
  141. "templateName": ["jobtracker_principal_name", "kerberos_domain"],
  142. "foreignKey": null,
  143. "value": "<templateName[0]>@<templateName[1]>",
  144. "filename": "mapred-site.xml",
  145. "serviceName": "MAPREDUCE"
  146. },
  147. {
  148. "name": "mapreduce.jobtracker.keytab.file",
  149. "templateName": ["jobtracker_keytab"],
  150. "foreignKey": null,
  151. "value": "<templateName[0]>",
  152. "filename": "mapred-site.xml",
  153. "serviceName": "MAPREDUCE"
  154. },
  155. {
  156. "name": "mapreduce.jobhistory.kerberos.principal",
  157. "templateName": ["jobtracker_principal_name", "kerberos_domain"],
  158. "foreignKey": null,
  159. "value": "<templateName[0]>@<templateName[1]>",
  160. "filename": "mapred-site.xml",
  161. "serviceName": "MAPREDUCE"
  162. },
  163. {
  164. "name": "mapreduce.jobhistory.keytab.file",
  165. "templateName": ["jobtracker_keytab"],
  166. "foreignKey": null,
  167. "value": "<templateName[0]>",
  168. "filename": "mapred-site.xml",
  169. "serviceName": "MAPREDUCE"
  170. },
  171. {
  172. "name": "mapreduce.tasktracker.kerberos.principal",
  173. "templateName": ["tasktracker_principal_name", "kerberos_domain"],
  174. "foreignKey": null,
  175. "value": "<templateName[0]>@<templateName[1]>",
  176. "filename": "mapred-site.xml",
  177. "serviceName": "MAPREDUCE"
  178. },
  179. {
  180. "name": "mapreduce.tasktracker.keytab.file",
  181. "templateName": ["tasktracker_keytab"],
  182. "foreignKey": null,
  183. "value": "<templateName[0]>",
  184. "filename": "mapred-site.xml",
  185. "serviceName": "MAPREDUCE"
  186. },
  187. {
  188. "name": "mapred.task.tracker.task-controller",
  189. "templateName": ["tasktracker_task_controller"],
  190. "foreignKey": null,
  191. "value": "<templateName[0]>",
  192. "filename": "mapred-site.xml",
  193. "serviceName": "MAPREDUCE"
  194. },
  195. {
  196. "name": "hbase.master.kerberos.principal",
  197. "templateName": ["hbase_master_principal_name", "kerberos_domain"],
  198. "foreignKey": null,
  199. "value": "<templateName[0]>@<templateName[1]>",
  200. "filename": "hbase-site.xml",
  201. "serviceName": "HBASE"
  202. },
  203. {
  204. "name": "hbase.master.keytab.file",
  205. "templateName": ["hbase_master_keytab"],
  206. "foreignKey": null,
  207. "value": "<templateName[0]>",
  208. "filename": "hbase-site.xml",
  209. "serviceName": "HBASE"
  210. },
  211. {
  212. "name": "hbase.regionserver.kerberos.principal",
  213. "templateName": ["hbase_regionserver_principal_name", "kerberos_domain"],
  214. "foreignKey": null,
  215. "value": "<templateName[0]>@<templateName[1]>",
  216. "filename": "hbase-site.xml",
  217. "serviceName": "HBASE"
  218. },
  219. {
  220. "name": "hbase.regionserver.keytab.file",
  221. "templateName": ["hbase_regionserver_keytab"],
  222. "foreignKey": null,
  223. "value": "<templateName[0]>",
  224. "filename": "hbase-site.xml",
  225. "serviceName": "HBASE"
  226. },
  227. {
  228. "name": "hive.metastore.sasl.enabled",
  229. "templateName": [],
  230. "foreignKey": null,
  231. "value": "true",
  232. "filename": "hive-site.xml",
  233. "serviceName": "HIVE"
  234. },
  235. {
  236. "name": "hive.security.authorization.enabled",
  237. "templateName": [],
  238. "foreignKey": null,
  239. "value": "true",
  240. "filename": "hive-site.xml",
  241. "serviceName": "HIVE"
  242. },
  243. {
  244. "name": "hive.server2.authentication",
  245. "templateName": [],
  246. "foreignKey": null,
  247. "value": "KERBEROS",
  248. "filename": "hive-site.xml",
  249. "serviceName": "HIVE"
  250. },
  251. {
  252. "name": "hive.metastore.kerberos.principal",
  253. "templateName": ["hive_metastore_principal_name", "kerberos_domain"],
  254. "foreignKey": null,
  255. "value": "<templateName[0]>@<templateName[1]>",
  256. "filename": "hive-site.xml",
  257. "serviceName": "HIVE"
  258. },
  259. {
  260. "name": "hive.metastore.kerberos.keytab.file",
  261. "templateName": ["hive_metastore_keytab"],
  262. "foreignKey": null,
  263. "value": "<templateName[0]>",
  264. "filename": "hive-site.xml",
  265. "serviceName": "HIVE"
  266. },
  267. {
  268. "name": "hive.server2.authentication.kerberos.principal",
  269. "templateName": ["hive_metastore_principal_name", "kerberos_domain"],
  270. "foreignKey": null,
  271. "value": "<templateName[0]>@<templateName[1]>",
  272. "filename": "hive-site.xml",
  273. "serviceName": "HIVE"
  274. },
  275. {
  276. "name": "hive.server2.authentication.kerberos.keytab",
  277. "templateName": ["hive_metastore_keytab"],
  278. "foreignKey": null,
  279. "value": "<templateName[0]>",
  280. "filename": "hive-site.xml",
  281. "serviceName": "HIVE"
  282. },
  283. {
  284. "name": "oozie.service.AuthorizationService.authorization.enabled",
  285. "templateName": [],
  286. "foreignKey": null,
  287. "value": "true",
  288. "filename": "oozie-site.xml",
  289. "serviceName": "OOZIE"
  290. },
  291. {
  292. "name": "oozie.service.HadoopAccessorService.kerberos.enabled",
  293. "templateName": [],
  294. "foreignKey": null,
  295. "value": "true",
  296. "filename": "oozie-site.xml",
  297. "serviceName": "OOZIE"
  298. },
  299. {
  300. "name": "local.realm",
  301. "templateName": ["kerberos_domain"],
  302. "foreignKey": null,
  303. "value": "<templateName[0]>",
  304. "filename": "oozie-site.xml",
  305. "serviceName": "OOZIE"
  306. },
  307. {
  308. "name": "oozie.service.HadoopAccessorService.keytab.file",
  309. "templateName": ["oozie_keytab"],
  310. "foreignKey": null,
  311. "value": "<templateName[0]>",
  312. "filename": "oozie-site.xml",
  313. "serviceName": "OOZIE"
  314. },
  315. {
  316. "name": "oozie.service.HadoopAccessorService.kerberos.principal",
  317. "templateName": ["oozie_principal_name", "kerberos_domain"],
  318. "foreignKey": null,
  319. "value": "<templateName[0]>@<templateName[1]>",
  320. "filename": "oozie-site.xml",
  321. "serviceName": "OOZIE"
  322. },
  323. {
  324. "name": "oozie.authentication.type",
  325. "templateName": [],
  326. "foreignKey": null,
  327. "value": "kerberos",
  328. "filename": "oozie-site.xml",
  329. "serviceName": "OOZIE"
  330. },
  331. {
  332. "name": "oozie.authentication.kerberos.principal",
  333. "templateName": ["oozie_http_principal_name", "kerberos_domain"],
  334. "foreignKey": null,
  335. "value": "<templateName[0]>@<templateName[1]>",
  336. "filename": "oozie-site.xml",
  337. "serviceName": "OOZIE"
  338. },
  339. {
  340. "name": "oozie.authentication.kerberos.keytab",
  341. "templateName": ["oozie_http_keytab"],
  342. "foreignKey": null,
  343. "value": "<templateName[0]>",
  344. "filename": "oozie-site.xml",
  345. "serviceName": "OOZIE"
  346. },
  347. {
  348. "name": "oozie.authentication.kerberos.name.rules",
  349. "templateName": ["jobtracker_primary_name", "kerberos_domain", "mapred_user", "tasktracker_primary_name", "namenode_primary_name", "hdfs_user", "datanode_primary_name", "hbase_master_primary_name", "hbase_user","hbase_regionserver_primary_name"],
  350. "foreignKey": null,
  351. "value": "RULE:[2:$1@$0](<templateName[0]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[3]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[4]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[6]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nDEFAULT",
  352. "filename": "oozie-site.xml",
  353. "serviceName": "OOZIE",
  354. "dependedServiceName": [{name: "HBASE", replace: "\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/"}]
  355. },
  356. {
  357. "name": "templeton.kerberos.principal",
  358. "templateName": ["webHCat_http_principal_name", "kerberos_domain"],
  359. "foreignKey": null,
  360. "value": "<templateName[0]>@<templateName[1]>",
  361. "filename": "webhcat-site.xml",
  362. "serviceName": "WEBHCAT"
  363. },
  364. {
  365. "name": "templeton.kerberos.keytab",
  366. "templateName": ["webhcat_http_keytab"],
  367. "foreignKey": null,
  368. "value": "<templateName[0]>",
  369. "filename": "webhcat-site.xml",
  370. "serviceName": "WEBHCAT"
  371. },
  372. {
  373. "name": "templeton.kerberos.secret",
  374. "templateName": [""],
  375. "foreignKey": null,
  376. "value": "secret",
  377. "filename": "webhcat-site.xml",
  378. "serviceName": "WEBHCAT"
  379. },
  380. {
  381. "name": "templeton.hive.properties",
  382. "templateName": ["hivemetastore_host","hive_metastore_principal_name","kerberos_domain"],
  383. "foreignKey": null,
  384. "value": "hive.metastore.local=false,hive.metastore.uris=thrift://<templateName[0]>:9083,hive." +
  385. "metastore.sasl.enabled=true,hive.metastore.execute.setugi=true,hive.metastore.warehouse.dir=/apps/hive/warehouse,hive.exec.mode.local.auto=false,hive.metastore.kerberos.principal=<templateName[1]>@<templateName[2]>",
  386. "filename": "webhcat-site.xml",
  387. "serviceName": "WEBHCAT"
  388. },
  389. {
  390. "name": "hbase.coprocessor.master.classes",
  391. "templateName": [],
  392. "foreignKey": null,
  393. "value": "org.apache.hadoop.hbase.security.access.AccessController",
  394. "filename": "hbase-site.xml",
  395. "serviceName": "HBASE"
  396. },
  397. {
  398. "name": "hbase.coprocessor.region.classes",
  399. "templateName": [],
  400. "foreignKey": null,
  401. "value": "org.apache.hadoop.hbase.security.token.TokenProvider,org.apache.hadoop.hbase.security.access.SecureBulkLoadEndpoint,org.apache.hadoop.hbase.security.access.AccessController",
  402. "filename": "hbase-site.xml",
  403. "serviceName": "HBASE"
  404. },
  405. {
  406. "name": "hbase.security.authentication",
  407. "templateName": [],
  408. "foreignKey": null,
  409. "value": "kerberos",
  410. "filename": "hbase-site.xml",
  411. "serviceName": "HBASE"
  412. },
  413. {
  414. "name": "hbase.rpc.engine",
  415. "templateName": [],
  416. "foreignKey": null,
  417. "value": "org.apache.hadoop.hbase.ipc.SecureRpcEngine",
  418. "filename": "hbase-site.xml",
  419. "serviceName": "HBASE"
  420. },
  421. {
  422. "name": "hbase.security.authorization",
  423. "templateName": [],
  424. "foreignKey": null,
  425. "value": "true",
  426. "filename": "hbase-site.xml",
  427. "serviceName": "HBASE"
  428. },
  429. {
  430. "name": "hbase.coprocessor.region.classes",
  431. "templateName": [],
  432. "foreignKey": null,
  433. "value": "org.apache.hadoop.hbase.security.token.TokenProvider,org.apache.hadoop.hbase.security.access.SecureBulkLoadEndpoint,org.apache.hadoop.hbase.security.access.AccessController",
  434. "filename": "hbase-site.xml"
  435. },
  436. {
  437. "name": "hbase.bulkload.staging.dir",
  438. "templateName": [],
  439. "foreignKey": null,
  440. "value": "/apps/hbase/staging",
  441. "filename": "hbase-site.xml",
  442. "serviceName": "HBASE"
  443. },
  444. {
  445. "name": "zookeeper.znode.parent",
  446. "templateName": [],
  447. "foreignKey": null,
  448. "value": "/hbase-secure",
  449. "filename": "hbase-site.xml",
  450. "serviceName": "HBASE"
  451. },
  452. {
  453. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  454. "templateName": ["proxyuser_group"],
  455. "foreignKey": ["hive_metastore_primary_name"],
  456. "value": "<templateName[0]>",
  457. "filename": "core-site.xml",
  458. "serviceName": "HIVE"
  459. },
  460. {
  461. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  462. "templateName": ["hivemetastore_host"],
  463. "foreignKey": ["hive_metastore_primary_name"],
  464. "value": "<templateName[0]>",
  465. "filename": "core-site.xml",
  466. "serviceName": "HIVE"
  467. },
  468. {
  469. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  470. "templateName": ["proxyuser_group"],
  471. "foreignKey": ["oozie_primary_name"],
  472. "value": "<templateName[0]>",
  473. "filename": "core-site.xml",
  474. "serviceName": "OOZIE"
  475. },
  476. {
  477. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  478. "templateName": ["oozieserver_host"],
  479. "foreignKey": ["oozie_primary_name"],
  480. "value": "<templateName[0]>",
  481. "filename": "core-site.xml",
  482. "serviceName": "OOZIE"
  483. },
  484. {
  485. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  486. "templateName": ["proxyuser_group"],
  487. "foreignKey": ["webHCat_http_primary_name"],
  488. "value": "<templateName[0]>",
  489. "filename": "core-site.xml",
  490. "serviceName": "WEBHCAT"
  491. },
  492. {
  493. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  494. "templateName": ["webhcat_server"],
  495. "foreignKey": ["webHCat_http_primary_name"],
  496. "value": "<templateName[0]>",
  497. "filename": "core-site.xml",
  498. "serviceName": "WEBHCAT"
  499. }
  500. ];