123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405 |
- #!/usr/bin/env python2.6
- '''
- Licensed to the Apache Software Foundation (ASF) under one
- or more contributor license agreements. See the NOTICE file
- distributed with this work for additional information
- regarding copyright ownership. The ASF licenses this file
- to you under the Apache License, Version 2.0 (the
- "License"); you may not use this file except in compliance
- with the License. You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- '''
- import optparse
- from pprint import pprint
- import shlex
- import sys
- import os
- import signal
- import subprocess
- import re
- import string
- import glob
- import platform
- import shutil
- import stat
- import fileinput
- import urllib2
- import time
- import getpass
- import socket
- import datetime
- import socket
- import tempfile
- import random
- import pwd
- # debug settings
- VERBOSE = False
- SILENT = False
- SERVER_START_DEBUG = False
- # action commands
- SETUP_ACTION = "setup"
- START_ACTION = "start"
- STOP_ACTION = "stop"
- RESET_ACTION = "reset"
- UPGRADE_ACTION = "upgrade"
- UPGRADE_STACK_ACTION = "upgradestack"
- UPDATE_METAINFO_ACTION = "update-metainfo"
- STATUS_ACTION = "status"
- SETUP_HTTPS_ACTION = "setup-https"
- LDAP_SETUP_ACTION = "setup-ldap"
- ENCRYPT_PASSWORDS_ACTION = "encrypt-passwords"
- # selinux commands
- GET_SE_LINUX_ST_CMD = "/usr/sbin/sestatus"
- SE_SETENFORCE_CMD = "setenforce 0"
- SE_STATUS_DISABLED = "disabled"
- SE_STATUS_ENABLED = "enabled"
- SE_MODE_ENFORCING = "enforcing"
- SE_MODE_PERMISSIVE = "permissive"
- # iptables commands
- IP_TBLS_ST_CMD = "/sbin/service iptables status"
- IP_TBLS_STOP_CMD = "/sbin/service iptables stop"
- IP_TBLS_ENABLED = "Firewall is running"
- IP_TBLS_DISABLED = "Firewall is stopped.\n"
- IP_TBLS_SRVC_NT_FND = "iptables: unrecognized service"
- # server commands
- ambari_provider_module_option = ""
- ambari_provider_module = os.environ.get('AMBARI_PROVIDER_MODULE')
- # Non-root user setup commands
- NR_USER_PROPERTY = "ambari-server.user"
- NR_USER_COMMENT = "Ambari user"
- NR_GET_OWNER_CMD = 'stat -c "%U" {0}'
- NR_USERADD_CMD = 'useradd -M --comment "{1}" ' \
- '--shell /sbin/nologin -d /var/lib/ambari-server/keys/ {0}'
- NR_SET_USER_COMMENT_CMD = 'usermod -c "{0}" {1}'
- NR_CHMOD_CMD = 'chmod {0} {1} {2}'
- NR_CHOWN_CMD = 'chown {0} {1} {2}'
- RECURSIVE_RM_CMD = 'rm -rf {0}'
- # openssl command
- EXPRT_KSTR_CMD = "openssl pkcs12 -export -in {0} -inkey {1} -certfile {0} -out {3} -password pass:{2} -passin pass:{2}"
- CHANGE_KEY_PWD_CND = 'openssl rsa -in {0} -des3 -out {0}.secured -passout pass:{1}'
- GET_CRT_INFO_CMD = 'openssl x509 -dates -subject -in {0}'
- # constants
- STACK_NAME_VER_SEP = "-"
- JAVA_SHARE_PATH="/usr/share/java"
- # terminal styles
- BOLD_ON='\033[1m'
- BOLD_OFF='\033[0m'
- #Common messages
- PRESS_ENTER_MSG="Press <enter> to continue."
- #SSL certificate metainfo
- COMMON_NAME_ATTR='CN'
- NOT_BEFORE_ATTR='notBefore'
- NOT_AFTER_ATTR='notAfter'
- if ambari_provider_module is not None:
- ambari_provider_module_option = "-Dprovider.module.class=" +\
- ambari_provider_module + " "
- SERVER_START_CMD="{0}" + os.sep + "bin" + os.sep +\
- "java -server -XX:NewRatio=3 "\
- "-XX:+UseConcMarkSweepGC " +\
- "-XX:-UseGCOverheadLimit -XX:CMSInitiatingOccupancyFraction=60 " +\
- ambari_provider_module_option +\
- os.getenv('AMBARI_JVM_ARGS','-Xms512m -Xmx2048m') +\
- " -cp {1}"+ os.pathsep + "{2}" +\
- " org.apache.ambari.server.controller.AmbariServer "\
- ">/var/log/ambari-server/ambari-server.out 2>&1 &" \
- " echo $! > {3}" # Writing pidfile
- SERVER_START_CMD_DEBUG="{0}" + os.sep + "bin" + os.sep +\
- "java -server -XX:NewRatio=2 -XX:+UseConcMarkSweepGC " +\
- ambari_provider_module_option +\
- os.getenv('AMBARI_JVM_ARGS','-Xms512m -Xmx2048m') +\
- " -Xdebug -Xrunjdwp:transport=dt_socket,address=5005,"\
- "server=y,suspend=n -cp {1}"+ os.pathsep + "{2}" +\
- " org.apache.ambari.server.controller.AmbariServer &" \
- " echo $! > {3}" # Writing pidfile
- SECURITY_PROVIDER_GET_CMD="{0}" + os.sep + "bin" + os.sep + "java -cp {1}" +\
- os.pathsep + "{2} " +\
- "org.apache.ambari.server.security.encryption" +\
- ".CredentialProvider GET {3} {4} {5} " +\
- "> /var/log/ambari-server/ambari-server.out 2>&1"
- SECURITY_PROVIDER_PUT_CMD="{0}" + os.sep + "bin" + os.sep + "java -cp {1}" +\
- os.pathsep + "{2} " +\
- "org.apache.ambari.server.security.encryption" +\
- ".CredentialProvider PUT {3} {4} {5} " +\
- "> /var/log/ambari-server/ambari-server.out 2>&1"
- SECURITY_PROVIDER_KEY_CMD="{0}" + os.sep + "bin" + os.sep + "java -cp {1}" +\
- os.pathsep + "{2} " +\
- "org.apache.ambari.server.security.encryption" +\
- ".MasterKeyServiceImpl {3} {4} {5} " +\
- "> /var/log/ambari-server/ambari-server.out 2>&1"
- SECURITY_KEYS_DIR = "security.server.keys_dir"
- SECURITY_MASTER_KEY_LOCATION = "security.master.key.location"
- SECURITY_KEY_IS_PERSISTED = "security.master.key.ispersisted"
- SECURITY_KEY_ENV_VAR_NAME = "AMBARI_SECURITY_MASTER_KEY"
- SECURITY_MASTER_KEY_FILENAME = "master"
- SECURITY_IS_ENCRYPTION_ENABLED = "security.passwords.encryption.enabled"
- SSL_KEY_DIR = 'security.server.keys_dir'
- SSL_API_PORT = 'client.api.ssl.port'
- SSL_API = 'api.ssl'
- SSL_SERVER_CERT_NAME = 'client.api.ssl.cert_name'
- SSL_SERVER_KEY_NAME = 'client.api.ssl.key_name'
- SSL_CERT_FILE_NAME = "https.crt"
- SSL_KEY_FILE_NAME = "https.key"
- SSL_KEYSTORE_FILE_NAME = "https.keystore.p12"
- SSL_KEY_PASSWORD_FILE_NAME = "https.pass.txt"
- SSL_KEY_PASSWORD_LENGTH = 50
- DEFAULT_SSL_API_PORT = 8443
- SSL_DATE_FORMAT = '%b %d %H:%M:%S %Y GMT'
- JDBC_RCA_PASSWORD_ALIAS = "ambari.db.password"
- CLIENT_SECURITY_KEY = "client.security"
- LDAP_MGR_PASSWORD_ALIAS = "ambari.ldap.manager.password"
- LDAP_MGR_PASSWORD_PROPERTY = "authentication.ldap.managerPassword"
- LDAP_MGR_USERNAME_PROPERTY = "authentication.ldap.managerDn"
- SSL_TRUSTSTORE_PATH_PROPERTY = "ssl.trustStore.path"
- SSL_TRUSTSTORE_PASSWORD_PROPERTY = "ssl.trustStore.password"
- SSL_TRUSTSTORE_TYPE_PROPERTY = "ssl.trustStore.type"
- AMBARI_CONF_VAR="AMBARI_CONF_DIR"
- AMBARI_SERVER_LIB="AMBARI_SERVER_LIB"
- JAVA_HOME="JAVA_HOME"
- PID_DIR="/var/run/ambari-server"
- BOOTSTRAP_DIR_PROPERTY="bootstrap.dir"
- PID_NAME="ambari-server.pid"
- AMBARI_PROPERTIES_FILE="ambari.properties"
- AMBARI_PROPERTIES_RPMSAVE_FILE="ambari.properties.rpmsave"
- RESOURCES_DIR_PROPERTY="resources.dir"
- SETUP_DB_CMD = ['su', '-', 'postgres',
- '--command=psql -f {0} -v username=\'"{1}"\' -v password="\'{2}\'"']
- UPGRADE_STACK_CMD = ['su', 'postgres',
- '--command=psql -f {0} -v stack_name="\'{1}\'" -v stack_version="\'{2}\'"']
- UPDATE_METAINFO_CMD = 'curl -X PUT "http://{0}:{1}/api/v1/stacks2" -u "{2}":"{3}"'
- PG_ST_CMD = "/sbin/service postgresql status"
- PG_INITDB_CMD = "/sbin/service postgresql initdb"
- PG_START_CMD = "/sbin/service postgresql start"
- PG_RESTART_CMD = "/sbin/service postgresql restart"
- PG_STATUS_RUNNING = "running"
- PG_HBA_DIR = "/var/lib/pgsql/data/"
- PG_HBA_CONF_FILE = PG_HBA_DIR + "pg_hba.conf"
- PG_HBA_CONF_FILE_BACKUP = PG_HBA_DIR + "pg_hba_bak.conf.old"
- POSTGRESQL_CONF_FILE = PG_HBA_DIR + "postgresql.conf"
- PG_HBA_RELOAD_CMD = "su postgres --command='pg_ctl -D {0} reload'"
- PG_DEFAULT_PASSWORD = "bigdata"
- JDBC_DATABASE_PROPERTY = "server.jdbc.database"
- JDBC_HOSTNAME_PROPERTY = "server.jdbc.hostname"
- JDBC_PORT_PROPERTY = "server.jdbc.port"
- JDBC_SCHEMA_PROPERTY = "server.jdbc.schema"
- JDBC_USER_NAME_PROPERTY = "server.jdbc.user.name"
- JDBC_PASSWORD_PROPERTY = "server.jdbc.user.passwd"
- JDBC_PASSWORD_FILENAME = "password.dat"
- JDBC_RCA_PASSWORD_FILENAME = "rca_password.dat"
- CLIENT_API_PORT_PROPERTY = "client.api.port"
- CLIENT_API_PORT = "8080"
- PERSISTENCE_TYPE_PROPERTY = "server.persistence.type"
- JDBC_DRIVER_PROPERTY = "server.jdbc.driver"
- JDBC_URL_PROPERTY = "server.jdbc.url"
- JDBC_RCA_DATABASE_PROPERTY = "server.jdbc.database"
- JDBC_RCA_HOSTNAME_PROPERTY = "server.jdbc.hostname"
- JDBC_RCA_PORT_PROPERTY = "server.jdbc.port"
- JDBC_RCA_SCHEMA_PROPERTY = "server.jdbc.schema"
- JDBC_RCA_DRIVER_PROPERTY = "server.jdbc.rca.driver"
- JDBC_RCA_URL_PROPERTY = "server.jdbc.rca.url"
- JDBC_RCA_USER_NAME_PROPERTY = "server.jdbc.rca.user.name"
- JDBC_RCA_PASSWORD_FILE_PROPERTY = "server.jdbc.rca.user.passwd"
- CHECK_COMMAND_EXIST_CMD = "type {0}"
- DATABASE_INDEX = 0
- PROMPT_DATABASE_OPTIONS = False
- USERNAME_PATTERN = "^[a-zA-Z_][a-zA-Z0-9_\-]*$"
- PASSWORD_PATTERN = "^[a-zA-Z0-9_-]*$"
- DATABASE_NAMES =["postgres", "oracle"]
- DATABASE_STORAGE_NAMES =["Database","Service","Schema"]
- DATABASE_PORTS =["5432", "1521", "3306"]
- DATABASE_DRIVER_NAMES = ["org.postgresql.Driver", "oracle.jdbc.driver.OracleDriver", "com.mysql.jdbc.Driver"]
- DATABASE_CONNECTION_STRINGS = [
- "jdbc:postgresql://{0}:{1}/{2}",
- "jdbc:oracle:thin:@{0}:{1}/{2}",
- "jdbc:mysql://{0}:{1}/{2}"]
- DATABASE_CONNECTION_STRINGS_ALT = [
- "jdbc:postgresql://{0}:{1}/{2}",
- "jdbc:oracle:thin:@{0}:{1}:{2}",
- "jdbc:mysql://{0}:{1}/{2}"]
- DATABASE_CLI_TOOLS = [["psql"], ["sqlplus", "sqlplus64"], ["mysql"]]
- DATABASE_CLI_TOOLS_DESC = ["psql", "sqlplus", "mysql"]
- DATABASE_CLI_TOOLS_USAGE = ['su -postgres --command=psql -f {0} -v username=\'"{1}"\' -v password="\'{2}\'"',
- 'sqlplus {1}/{2} < {0} ',
- 'mysql --user={1} --password={2} {3}<{0}']
- DATABASE_INIT_SCRIPTS = ['/var/lib/ambari-server/resources/Ambari-DDL-Postgres-REMOTE-CREATE.sql',
- '/var/lib/ambari-server/resources/Ambari-DDL-Oracle-CREATE.sql',
- '/var/lib/ambari-server/resources/Ambari-DDL-MySQL-CREATE.sql']
- DATABASE_DROP_SCRIPTS = ['/var/lib/ambari-server/resources/Ambari-DDL-Postgres-REMOTE-DROP.sql',
- '/var/lib/ambari-server/resources/Ambari-DDL-Oracle-DROP.sql',
- '/var/lib/ambari-server/resources/Ambari-DDL-MySQL-DROP.sql']
- REGEX_IP_ADDRESS = "^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$"
- REGEX_HOSTNAME = "^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\-]*[A-Za-z0-9])$"
- REGEX_HOSTNAME_PORT = "^(.*:[0-9]{1,5}$)"
- REGEX_TRUE_FALSE = "^(true|false)?$"
- REGEX_ANYTHING = ".*"
- POSTGRES_EXEC_ARGS = "-h {0} -p {1} -d {2} -U {3} -f {4} -v username='\"{3}\"'"
- ORACLE_EXEC_ARGS = "-S '{0}/{1}@(description=(address=(protocol=TCP)(host={2})(port={3}))(connect_data=(sid={4})))' @{5} {0}"
- MYSQL_EXEC_ARGS = "--host={0} --port={1} --user={2} --password={3} {4} " \
- "-e\"set @schema=\'{4}\'; set @username=\'{2}\'; source {5};\""
- JDBC_PATTERNS = {"oracle":"*ojdbc*.jar", "mysql":"*mysql*.jar"}
- DATABASE_FULL_NAMES = {"oracle":"Oracle", "mysql":"MySQL", "postgres":"PostgreSQL"}
- ORACLE_DB_ID_TYPES = ["Service Name", "Service ID"]
- # jdk commands
- JDK_LOCAL_FILENAME = "jdk-6u31-linux-x64.bin"
- JDK_MIN_FILESIZE = 5000
- JDK_INSTALL_DIR = "/usr/jdk64"
- CREATE_JDK_DIR_CMD = "/bin/mkdir -p " + JDK_INSTALL_DIR
- MAKE_FILE_EXECUTABLE_CMD = "chmod a+x {0}"
- JAVA_HOME_PROPERTY = "java.home"
- JDK_URL_PROPERTY='jdk.url'
- JCE_URL_PROPERTY='jce_policy.url'
- OS_TYPE_PROPERTY = "server.os_type"
- GET_FQDN_SERVICE_URL="agent.fqdn.service.url"
- JDK_DOWNLOAD_CMD = "curl --create-dirs -o {0} {1}"
- JDK_DOWNLOAD_SIZE_CMD = "curl -I {0}"
- #JCE Policy files
- JCE_POLICY_FILENAME = "jce_policy-6.zip"
- JCE_DOWNLOAD_CMD = "curl -o {0} {1}"
- JCE_MIN_FILESIZE = 5000
- #Apache License Header
- ASF_LICENSE_HEADER = '''
- # Copyright 2011 The Apache Software Foundation
- #
- # Licensed to the Apache Software Foundation (ASF) under one
- # or more contributor license agreements. See the NOTICE file
- # distributed with this work for additional information
- # regarding copyright ownership. The ASF licenses this file
- # to you under the Apache License, Version 2.0 (the
- # "License"); you may not use this file except in compliance
- # with the License. You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- '''
- def get_conf_dir():
- try:
- conf_dir = os.environ[AMBARI_CONF_VAR]
- return conf_dir
- except KeyError:
- default_conf_dir = "/etc/ambari-server/conf"
- print AMBARI_CONF_VAR + " is not set, using default " + default_conf_dir
- return default_conf_dir
- def find_properties_file():
- conf_file = search_file(AMBARI_PROPERTIES_FILE, get_conf_dir())
- if conf_file is None:
- err = 'File %s not found in search path $%s: %s' % (AMBARI_PROPERTIES_FILE,
- AMBARI_CONF_VAR, get_conf_dir())
- print err
- raise FatalException(1, err)
- else:
- print_info_msg ('Loading properties from ' + conf_file)
- return conf_file
- def update_ambari_properties():
- prev_conf_file = search_file(AMBARI_PROPERTIES_RPMSAVE_FILE, get_conf_dir())
- conf_file = search_file(AMBARI_PROPERTIES_FILE, get_conf_dir())
- # Previous config file does not exist
- if (not prev_conf_file) or (prev_conf_file is None):
- print_warning_msg("Can not find ambari.properties.rpmsave file from previous version, skipping import of settings")
- return 0
- try:
- old_properties = Properties()
- old_properties.load(open(prev_conf_file))
- except Exception, e:
- print 'Could not read "%s": %s' % (prev_conf_file, e)
- return -1
- try:
- new_properties = Properties()
- new_properties.load(open(conf_file))
- for prop_key, prop_value in old_properties.getPropertyDict().items():
- new_properties.process_pair(prop_key,prop_value)
- # Adding custom user name property if it is absent
- # In previous versions without custom user support server was started as
- # "root" anyway so it's a reasonable default
- if not NR_USER_PROPERTY in new_properties.keys():
- new_properties.process_pair(NR_USER_PROPERTY, "root")
- new_properties.store(open(conf_file,'w'))
- except Exception, e:
- print 'Could not write "%s": %s' % (conf_file, e)
- return -1
- timestamp = datetime.datetime.now()
- format = '%Y%m%d%H%M%S'
- os.rename(prev_conf_file, prev_conf_file + '.' + timestamp.strftime(format))
- return 0
- NR_CONF_DIR = get_conf_dir()
- # ownership/permissions mapping
- # path - permissions - user - group - recursive
- # Rules are executed in the same order as they are listed
- # {0} in user/group will be replaced by customized ambari-server username
- NR_ADJUST_OWNERSHIP_LIST =[
- ( "/var/log/ambari-server", "644", "{0}", True ),
- ( "/var/log/ambari-server", "755", "{0}", False ),
- ( "/var/run/ambari-server", "644", "{0}", True),
- ( "/var/run/ambari-server", "755", "{0}", False),
- ( "/var/run/ambari-server/bootstrap", "755", "{0}", False ),
- ( "/var/lib/ambari-server/ambari-env.sh", "700", "{0}", False ),
- ( "/var/lib/ambari-server/keys", "600", "{0}", True ),
- ( "/var/lib/ambari-server/keys", "700", "{0}", False ),
- ( "/var/lib/ambari-server/keys/db", "700", "{0}", False ),
- ( "/var/lib/ambari-server/keys/db/newcerts", "700", "{0}", False ),
- ( "/var/lib/ambari-server/keys/.ssh", "700", "{0}", False ),
- ( "/etc/ambari-server/conf", "644", "{0}", True ),
- ( "/etc/ambari-server/conf", "755", "{0}", False ),
- ( "/etc/ambari-server/conf/password.dat", "640", "{0}", False ),
- # Also, /etc/ambari-server/conf/password.dat
- # is generated later at store_password_file
- ]
- ### System interaction ###
- class FatalException(Exception):
- def __init__(self, code, reason):
- self.code = code
- self.reason = reason
- def __str__(self):
- return repr("Fatal exception: %s, exit code %s" % (self.reason, self.code))
- def _get_message(self):
- return str(self)
- class NonFatalException(Exception):
- def __init__(self, reason):
- self.reason = reason
- def __str__(self):
- return repr("NonFatal exception: %s" % self.reason)
- def _get_message(self):
- return str(self)
- def is_root():
- '''
- Checks effective UUID
- Returns True if a program is running under root-level privileges.
- '''
- return os.geteuid() == 0
- def get_exec_path(cmd):
- cmd = 'which {0}'.format(cmd)
- ret, out, err = run_in_shell(cmd)
- if ret == 0:
- return out.strip()
- else:
- return None
- def run_in_shell(cmd):
- print_info_msg('about to run command: ' + str(cmd))
- process = subprocess.Popen(cmd,
- stdout=subprocess.PIPE,
- stdin=subprocess.PIPE,
- stderr=subprocess.PIPE,
- shell=True
- )
- (stdoutdata, stderrdata) = process.communicate()
- return process.returncode, stdoutdata, stderrdata
- def run_os_command(cmd):
- print_info_msg('about to run command: ' + str(cmd))
- if type(cmd) == str:
- cmd = shlex.split(cmd)
- process = subprocess.Popen(cmd,
- stdout=subprocess.PIPE,
- stdin=subprocess.PIPE,
- stderr=subprocess.PIPE
- )
- (stdoutdata, stderrdata) = process.communicate()
- return process.returncode, stdoutdata, stderrdata
- #
- # Updates metainfo information from stack root. Re-cache information from
- # repoinfo.xml , metainfo.xml files , etc.
- #
- def update_metainfo(args):
- configure_update_metainfo_args(args)
- hostname = args.hostname
- port = args.port
- username = args.username
- password = args.password
- command = UPDATE_METAINFO_CMD
- command = command.format(hostname, port, username, password)
- retcode, outdata, errdata = run_os_command(command)
- if outdata.find("Bad credentials") > 0:
- print 'Incorrect credential provided. Please try again.'
- if not retcode == 0:
- print errdata
- return retcode
- def configure_update_metainfo_args(args):
- conf_file = search_file(AMBARI_PROPERTIES_FILE, get_conf_dir())
- properties = Properties()
- try:
- properties.load(open(conf_file))
- except Exception, e:
- print 'Could not read ambari config file "%s": %s' % (conf_file, e)
- return -1
- default_username = "admin"
- username_prompt = 'Username [' + default_username + ']: '
- password_prompt = 'Password: '
- input_pattern = "^[a-zA-Z_][a-zA-Z0-9_\-]*$"
- hostname = socket.gethostname()
- port = properties[CLIENT_API_PORT_PROPERTY]
- if not port:
- port = CLIENT_API_PORT
- input_descr = "Invalid characters in received. Start with _ or alpha "\
- "followed by alphanumeric or _ or - characters"
- print 'Full authentication is required to access the Ambari API'
- username = get_validated_string_input(username_prompt, default_username,
- input_pattern, input_descr, False)
- password = get_validated_string_input(password_prompt, "", input_pattern,
- input_descr, True)
- args.hostname = hostname
- args.port = port
- args.username = username
- args.password = password
- #
- # Checks SELinux
- #
- def check_selinux():
- try:
- retcode, out, err = run_os_command(GET_SE_LINUX_ST_CMD)
- se_status = re.search('(disabled|enabled)', out).group(0)
- print "SELinux status is '" + se_status + "'"
- if se_status == SE_STATUS_DISABLED:
- return 0
- else:
- try:
- se_mode = re.search('(enforcing|permissive)', out).group(0)
- except AttributeError:
- err = "Error determining SELinux mode. Exiting."
- raise FatalException(1, err)
- print "SELinux mode is '" + se_mode + "'"
- if se_mode == SE_MODE_ENFORCING:
- print "Temporarily disabling SELinux"
- run_os_command(SE_SETENFORCE_CMD)
- print_warning_msg(
- "SELinux is set to 'permissive' mode and temporarily disabled.")
- ok = get_YN_input("OK to continue [y/n] (y)? ", True)
- if not ok:
- raise FatalException(1, None)
- return 0
- except OSError:
- print_warning_msg("Could not run {0}: OK".format(GET_SE_LINUX_ST_CMD))
- return 0
- def read_ambari_user():
- '''
- Reads ambari user from properties file
- '''
- conf_file = find_properties_file()
- try:
- properties = Properties()
- properties.load(open(conf_file))
- user = properties[NR_USER_PROPERTY]
- if user:
- return user
- else:
- return None
- except Exception, e:
- print_error_msg('Could not read "%s": %s' % (conf_file, e))
- return None
- def adjust_directory_permissions(ambari_user):
- properties = get_ambari_properties()
- bootstrap_dir = get_value_from_properties(properties, BOOTSTRAP_DIR_PROPERTY)
- print "Cleaning bootstrap directory ({0}) contents...".format(bootstrap_dir)
- cmd = RECURSIVE_RM_CMD.format(bootstrap_dir)
- run_os_command(cmd)
- os.mkdir(bootstrap_dir)
- # Add master key and credential store if exists
- keyLocation = get_master_key_location(properties)
- masterKeyFile = search_file(SECURITY_MASTER_KEY_FILENAME, keyLocation)
- if masterKeyFile:
- NR_ADJUST_OWNERSHIP_LIST.append((masterKeyFile, "600", "{0}", "{0}", False))
- credStoreFile = get_credential_store_location(properties)
- if os.path.exists(credStoreFile):
- NR_ADJUST_OWNERSHIP_LIST.append((credStoreFile, "600", "{0}", "{0}", False))
- print "Adjusting ambari-server permissions and ownership..."
- for pack in NR_ADJUST_OWNERSHIP_LIST:
- file = pack[0]
- mod = pack[1]
- user = pack[2].format(ambari_user)
- recursive = pack[3]
- set_file_permissions(file, mod, user, recursive)
- def set_file_permissions(file, mod, user, recursive):
- WARN_MSG = "Command {0} returned exit code {1} with message: {2}"
- if recursive:
- params = " -R "
- else:
- params = ""
- if os.path.exists(file):
- command = NR_CHMOD_CMD.format(params, mod, file)
- retcode, out, err = run_os_command(command)
- if retcode != 0 :
- print_warning_msg(WARN_MSG.format(command, file, err))
- command = NR_CHOWN_CMD.format(params, user, file)
- retcode, out, err = run_os_command(command)
- if retcode != 0 :
- print_warning_msg(WARN_MSG.format(command, file, err))
- else:
- print_info_msg("File %s does not exist" % file)
- def create_custom_user():
- user = get_validated_string_input(
- "Enter user account for ambari-server daemon (root):",
- "root",
- "^[a-z_][a-z0-9_-]{1,31}$",
- "Invalid username.",
- False
- )
- print_info_msg("Trying to create user {0}".format(user))
- command = NR_USERADD_CMD.format(user, NR_USER_COMMENT)
- retcode, out, err = run_os_command(command)
- if retcode == 9: # 9 = username already in use
- print_info_msg("User {0} already exists, "
- "skipping user creation".format(user))
- elif retcode != 0: # fail
- print_warning_msg("Can't create user {0}. Command {1} "
- "finished with {2}: \n{3}".format(user, command, retcode, err))
- return retcode, None
- print_info_msg("User configuration is done.")
- return 0, user
- def check_ambari_user():
- try:
- user = read_ambari_user()
- create_user = False
- update_user_setting = False
- if user is not None:
- create_user = get_YN_input("Ambari-server daemon is configured to run under user '{0}'."
- " Change this setting [y/n] (n)? ".format(user), False)
- update_user_setting = create_user # Only if we will create another user
- else: # user is not configured yet
- update_user_setting = True # Write configuration anyway
- create_user = get_YN_input("Customize user account for ambari-server "
- "daemon [y/n] (n)? ", False)
- if not create_user:
- user = "root"
- if create_user:
- (retcode, user) = create_custom_user()
- if retcode != 0:
- return retcode
- if update_user_setting:
- write_property(NR_USER_PROPERTY, user)
- adjust_directory_permissions(user)
- except OSError:
- print_error_msg("Failed: %s" % OSError.message)
- return 4
- except Exception as e:
- print_error_msg("Unexpected error %s" % e.message)
- return 1
- return 0
- #
- # Checks iptables
- #
- def check_iptables():
- # not used
- # retcode, out, err = run_os_command(IP_TBLS_ST_CMD)
- ''' This check doesn't work on CentOS 6.2 if firewall AND
- iptables service are running if out == IP_TBLS_ENABLED:
- print 'iptables is enabled now'
- print 'Stopping iptables service'
- '''
- retcode, out, err = run_os_command(IP_TBLS_STOP_CMD)
- print 'iptables is disabled now. please reenable later.'
- if not retcode == 0 and err and len(err) > 0:
- print err
- if err.strip() == IP_TBLS_SRVC_NT_FND:
- return 0
- else:
- return retcode, out
- ### Postgres ###
- def configure_pg_hba_ambaridb_users():
- args = optparse.Values()
- configure_database_username_password(args)
- with open(PG_HBA_CONF_FILE, "a") as pgHbaConf:
- pgHbaConf.write("\n")
- pgHbaConf.write("local all " + args.database_username +
- ",mapred md5")
- pgHbaConf.write("\n")
- pgHbaConf.write("host all " + args.database_username +
- ",mapred 0.0.0.0/0 md5")
- pgHbaConf.write("\n")
- pgHbaConf.write("host all " + args.database_username +
- ",mapred ::/0 md5")
- pgHbaConf.write("\n")
- command = PG_HBA_RELOAD_CMD.format(PG_HBA_DIR)
- retcode, out, err = run_os_command(command)
- if not retcode == 0:
- raise FatalException(retcode, err)
- def configure_pg_hba_postgres_user():
- postgresString = "all postgres"
- for line in fileinput.input(PG_HBA_CONF_FILE, inplace=1):
- print re.sub('all\s*all', postgresString, line),
- os.chmod(PG_HBA_CONF_FILE, 0644)
- def configure_postgresql_conf():
- listenAddress = "listen_addresses = '*' #"
- for line in fileinput.input(POSTGRESQL_CONF_FILE, inplace=1):
- print re.sub('#+listen_addresses.*?(#|$)', listenAddress, line),
- os.chmod(POSTGRESQL_CONF_FILE, 0644)
- def configure_postgres():
- if os.path.isfile(PG_HBA_CONF_FILE):
- if not os.path.isfile(PG_HBA_CONF_FILE_BACKUP):
- shutil.copyfile(PG_HBA_CONF_FILE, PG_HBA_CONF_FILE_BACKUP)
- else:
- #Postgres has been configured before, must not override backup
- print "Backup for pg_hba found, reconfiguration not required"
- return 0
- configure_pg_hba_postgres_user()
- configure_pg_hba_ambaridb_users()
- os.chmod(PG_HBA_CONF_FILE, 0644)
- configure_postgresql_conf()
- #restart postgresql if already running
- pg_status = get_postgre_status()
- if pg_status == PG_STATUS_RUNNING:
- retcode = restart_postgres()
- return retcode
- return 0
- def restart_postgres():
- print "Restarting PostgreSQL"
- process = subprocess.Popen(PG_RESTART_CMD.split(' '),
- stdout=subprocess.PIPE,
- stdin=subprocess.PIPE,
- stderr=subprocess.PIPE
- )
- time.sleep(5)
- result = process.poll()
- if result is None:
- print_info_msg("Killing restart PostgresSQL process")
- process.kill()
- pg_status = get_postgre_status()
- # SUSE linux set status of stopped postgresql proc to unused
- if pg_status == "unused" or pg_status == "stopped":
- print_info_msg("PostgreSQL is stopped. Restarting ...")
- retcode, out, err = run_os_command(PG_START_CMD)
- return retcode
- return 0
- # todo: check if the scheme is already exist
- def write_property(key, value):
- conf_file = find_properties_file()
- properties = Properties()
- try:
- properties.load(open(conf_file))
- except Exception, e:
- print_error_msg('Could not read ambari config file "%s": %s' % (conf_file, e))
- return -1
- properties.process_pair(key, value)
- try:
- properties.store(open(conf_file, "w"))
- except Exception, e:
- print_error_msg('Could not write ambari config file "%s": %s' % (conf_file, e))
- return -1
- return 0
- def setup_db(args):
- #password access to ambari-server and mapred
- configure_database_username_password(args)
- dbname = args.database_name
- scriptFile = args.init_script_file
- username = args.database_username
- password = args.database_password
- command = SETUP_DB_CMD[:]
- command[-1] = command[-1].format(scriptFile, username, password)
- retcode, outdata, errdata = run_os_command(command)
- if not retcode == 0:
- print errdata
- return retcode
- def store_password_file(password, filename):
- conf_file = find_properties_file()
- passFilePath = os.path.join(os.path.dirname(conf_file),
- filename)
- with open(passFilePath, 'w+') as passFile:
- passFile.write(password)
- print_info_msg("Adjusting filesystem permissions")
- ambari_user = read_ambari_user()
- set_file_permissions(passFilePath, "660", ambari_user, False)
- return passFilePath
- def remove_password_file(filename):
- conf_file = find_properties_file()
- passFilePath = os.path.join(os.path.dirname(conf_file),
- filename)
- if os.path.exists(passFilePath):
- try:
- os.remove(passFilePath)
- except Exception, e:
- print_warning_msg('Unable to remove password file: ' + str(e))
- return 1
- pass
- return 0
- def execute_db_script(args, file):
- #password access to ambari-server and mapred
- configure_database_username_password(args)
- dbname = args.database_name
- username = args.database_username
- password = args.database_password
- command = SETUP_DB_CMD[:]
- command[-1] = command[-1].format(file, username, password)
- retcode, outdata, errdata = run_os_command(command)
- if not retcode == 0:
- print errdata
- return retcode
- def check_db_consistency(args, file):
- #password access to ambari-server and mapred
- configure_database_username_password(args)
- dbname = args.database_name
- username = args.database_username
- password = args.database_password
- command = SETUP_DB_CMD[:]
- command[-1] = command[-1].format(file, username, password)
- retcode, outdata, errdata = run_os_command(command)
- if not retcode == 0:
- print errdata
- return retcode
- else:
- # Assumes that the output is of the form ...\n<count>
- print_info_msg("Parsing output: " + outdata)
- lines = outdata.splitlines()
- if (lines[-1] == '3' or lines[-1] == '0'):
- return 0
- return -1
- def get_postgre_status():
- retcode, out, err = run_os_command(PG_ST_CMD)
- try:
- pg_status = re.search('(stopped|running)', out).group(0)
- except AttributeError:
- pg_status = None
- return pg_status
- def check_postgre_up():
- pg_status = get_postgre_status()
- if pg_status == PG_STATUS_RUNNING:
- print_info_msg ("PostgreSQL is running")
- return 0
- else:
- print "Running initdb: This may take upto a minute."
- retcode, out, err = run_os_command(PG_INITDB_CMD)
- if retcode == 0:
- print out
- print "About to start PostgreSQL"
- try:
- process = subprocess.Popen(PG_START_CMD.split(' '),
- stdout=subprocess.PIPE,
- stdin=subprocess.PIPE,
- stderr=subprocess.PIPE
- )
- time.sleep(20)
- result = process.poll()
- print_info_msg("Result of postgres start cmd: " + str(result))
- if result is None:
- process.kill()
- pg_status = get_postgre_status()
- if pg_status == PG_STATUS_RUNNING:
- print_info_msg("Postgres process is running. Returning...")
- return 0
- else:
- retcode = result
- except (Exception), e:
- pg_status = get_postgre_status()
- if pg_status == PG_STATUS_RUNNING:
- return 0
- else:
- print_error_msg("Postgres start failed. " + str(e))
- return 1
- return retcode
- def get_validated_db_name(database_name):
- return get_validated_string_input(
- DATABASE_STORAGE_NAMES[DATABASE_INDEX] + " Name ["
- + database_name + "]:",
- database_name,
- ".*",
- "Invalid " + DATABASE_STORAGE_NAMES[DATABASE_INDEX] + " name.",
- False
- )
-
- def get_validated_service_name(service_name, index):
- return get_validated_string_input(
- ORACLE_DB_ID_TYPES[index] + " [" + service_name + "]:",
- service_name,
- ".*",
- "Invalid " + ORACLE_DB_ID_TYPES[index] + ".",
- False
- )
- def read_password(passwordDefault=PG_DEFAULT_PASSWORD,
- passwordPattern=PASSWORD_PATTERN,
- passwordPrompt=None,
- passwordDescr=None):
- # setup password
- if passwordPrompt is None:
- passwordPrompt = 'Password [' + passwordDefault + ']: '
- if passwordDescr is None:
- passwordDescr = "Invalid characters in password. Use only alphanumeric or " \
- "_ or - characters"
- password = get_validated_string_input(passwordPrompt, passwordDefault,
- passwordPattern, passwordDescr, True)
- if not password:
- print 'Password cannot be blank.'
- read_password(passwordDefault, passwordPattern, passwordPrompt, passwordDescr)
- if password != passwordDefault:
- password1 = get_validated_string_input("Re-enter password: ",
- passwordDefault, passwordPattern, passwordDescr, True)
- if password != password1:
- print "Passwords do not match"
- password = read_password(passwordDefault, passwordPattern, passwordPrompt, passwordDescr)
- return password
- def get_pass_file_path(conf_file):
- return os.path.join(os.path.dirname(conf_file),
- JDBC_PASSWORD_FILENAME)
- # Set database properties to default values
- def load_default_db_properties(args):
- args.database=DATABASE_NAMES[DATABASE_INDEX]
- args.database_host = "localhost"
- args.database_port = DATABASE_PORTS[DATABASE_INDEX]
- args.database_name = "ambari"
- args.database_username = "ambari"
- args.database_password = "bigdata"
- args.sid_or_sname = "sname"
- pass
- # Ask user for database conenction properties
- def prompt_db_properties(args):
- global DATABASE_INDEX
- if PROMPT_DATABASE_OPTIONS:
- load_default_db_properties(args)
- ok = get_YN_input("Enter advanced database configuration [y/n] (n)? ", False)
- if ok:
- database_num = str(DATABASE_INDEX + 1)
- database_num = get_validated_string_input(
- "Select database:\n1 - Postgres(Embedded)\n2 - Oracle\n[" + database_num + "]:",
- database_num,
- "^[12]$",
- "Invalid number.",
- False
- )
- DATABASE_INDEX = int(database_num) - 1
- args.database = DATABASE_NAMES[DATABASE_INDEX]
-
- if args.database != "postgres" :
- args.database_host = get_validated_string_input(
- "Hostname [" + args.database_host + "]:",
- args.database_host,
- "^[a-zA-Z0-9.\-]*$",
- "Invalid hostname.",
- False
- )
-
- args.database_port=DATABASE_PORTS[DATABASE_INDEX]
- args.database_port = get_validated_string_input(
- "Port [" + args.database_port + "]:",
- args.database_port,
- "^([0-9]{1,4}|[1-5][0-9]{4}|6[0-4][0-9]{3}|65[0-4][0-9]{2}|655[0-2][0-9]|6553[0-5])$",
- "Invalid port.",
- False
- )
- if args.database == "oracle":
- # Oracle uses service name or service id
- idType = "1"
- idType = get_validated_string_input(
- "Select type of id to use:\n1 - " + ORACLE_DB_ID_TYPES[0] +
- "\n2 - " + ORACLE_DB_ID_TYPES[1] + "\n[" + idType + "]:",
- idType,
- "^[12]$",
- "Invalid number.",
- False
- )
- if idType == "2":
- args.sid_or_sname = "sid"
- IDTYPE_INDEX = int(idType) - 1
- args.database_name = get_validated_service_name(args.database_name,
- IDTYPE_INDEX)
- else:
- # MySQL and other DB types
- pass
- pass
- else:
- args.database_host = "localhost"
- args.database_port = DATABASE_PORTS[DATABASE_INDEX]
- args.database_name = get_validated_db_name(args.database_name)
- pass
-
- # Username is common for Oracle/MySQL/Postgres
- args.database_username = get_validated_string_input(
- 'Username [' + args.database_username + ']: ',
- args.database_username,
- USERNAME_PATTERN,
- "Invalid characters in username. Start with _ or alpha "
- "followed by alphanumeric or _ or - characters",
- False
- )
- args.database_password = configure_database_password(True)
- print_info_msg('Using database options: {database},{host},{port},{schema},{user},{password}'.format(
- database=args.database,
- host=args.database_host,
- port=args.database_port,
- schema=args.database_name,
- user=args.database_username,
- password=args.database_password
- ))
- # Store set of properties for remote database connection
- def store_remote_properties(args):
- properties = get_ambari_properties()
- if properties == -1:
- print_error_msg ("Error getting ambari properties")
- return -1
- isSecure = properties.get_property(SECURITY_IS_ENCRYPTION_ENABLED)
- if isSecure and isSecure.lower() == 'true':
- isSecure = True
- else:
- isSecure = False
- properties.process_pair(PERSISTENCE_TYPE_PROPERTY, "remote")
- properties.process_pair(JDBC_DATABASE_PROPERTY, args.database)
- properties.process_pair(JDBC_HOSTNAME_PROPERTY, args.database_host)
- properties.process_pair(JDBC_PORT_PROPERTY, args.database_port)
- properties.process_pair(JDBC_SCHEMA_PROPERTY, args.database_name)
- properties.process_pair(JDBC_DRIVER_PROPERTY, DATABASE_DRIVER_NAMES[DATABASE_INDEX])
- # fully qualify the hostname to make sure all the other hosts can connect
- # to the jdbc hostname since its passed onto the agents for RCA
- jdbc_hostname = args.database_host
- if (args.database_host == "localhost"):
- jdbc_hostname = socket.getfqdn();
-
- connectionStringFormat = DATABASE_CONNECTION_STRINGS
- if args.sid_or_sname == "sid":
- connectionStringFormat = DATABASE_CONNECTION_STRINGS_ALT
- properties.process_pair(JDBC_URL_PROPERTY, connectionStringFormat[DATABASE_INDEX].format(jdbc_hostname, args.database_port, args.database_name))
- properties.process_pair(JDBC_USER_NAME_PROPERTY, args.database_username)
- if isSecure:
- properties.process_pair(JDBC_PASSWORD_PROPERTY,
- encrypt_password(JDBC_RCA_PASSWORD_ALIAS, args.database_password))
- else:
- properties.process_pair(JDBC_PASSWORD_PROPERTY,
- store_password_file(args.database_password, JDBC_PASSWORD_FILENAME))
- properties.process_pair(JDBC_RCA_DRIVER_PROPERTY, DATABASE_DRIVER_NAMES[DATABASE_INDEX])
- properties.process_pair(JDBC_RCA_URL_PROPERTY, connectionStringFormat[DATABASE_INDEX].format(jdbc_hostname, args.database_port, args.database_name))
- properties.process_pair(JDBC_RCA_USER_NAME_PROPERTY, args.database_username)
- if isSecure:
- properties.process_pair(JDBC_RCA_PASSWORD_FILE_PROPERTY,
- encrypt_password(JDBC_RCA_PASSWORD_ALIAS, args.database_password))
- else:
- properties.process_pair(JDBC_RCA_PASSWORD_FILE_PROPERTY,
- store_password_file(args.database_password, JDBC_PASSWORD_FILENAME))
- conf_file = properties.fileName
- try:
- properties.store(open(conf_file, "w"))
- except Exception, e:
- print 'Could not write ambari config file "%s": %s' % (conf_file, e)
- return -1
- return 0
- # Initialize remote database schema
- def setup_remote_db(args):
- not_found_msg = "Cannot find {0} {1} client in the path to load the Ambari Server schema.\
- Before starting Ambari Server, you must run the following DDL against the database to create \
- the schema ".format(DATABASE_NAMES[DATABASE_INDEX], str(DATABASE_CLI_TOOLS_DESC[DATABASE_INDEX]))
- client_usage_cmd = DATABASE_CLI_TOOLS_USAGE[DATABASE_INDEX].format(DATABASE_INIT_SCRIPTS[DATABASE_INDEX], args.database_username,
- args.database_password, args.database_name)
- retcode, out, err = execute_remote_script(args, DATABASE_INIT_SCRIPTS[DATABASE_INDEX])
- if retcode != 0:
- if retcode == -1:
- print_warning_msg(not_found_msg + os.linesep + client_usage_cmd)
- if not SILENT:
- raw_input(PRESS_ENTER_MSG)
- return retcode
- print err
- print_error_msg('Database bootstrap failed. Please, provide correct connection properties.')
- return retcode
- return 0
- # Get database client executable path
- def get_db_cli_tool(args):
- for tool in DATABASE_CLI_TOOLS[DATABASE_INDEX]:
- cmd =CHECK_COMMAND_EXIST_CMD.format(tool)
- ret, out, err = run_in_shell(cmd)
- if ret == 0:
- return get_exec_path(tool)
- return None
- #execute SQL script on remote database
- def execute_remote_script(args, scriptPath):
- tool = get_db_cli_tool(args)
- if not tool:
- args.warnings.append('{0} not found. Please, run DDL script manually'.format(DATABASE_CLI_TOOLS[DATABASE_INDEX]))
- if VERBOSE:
- print_warning_msg('{0} not found'.format(DATABASE_CLI_TOOLS[DATABASE_INDEX]))
- return -1, "Client wasn't found", "Client wasn't found"
- if args.database == "postgres":
- os.environ["PGPASSWORD"] = args.database_password
- retcode, out, err = run_in_shell('{0} {1}'.format(tool, POSTGRES_EXEC_ARGS.format(
- args.database_host,
- args.database_port,
- args.database_name,
- args.database_username,
- scriptPath
- )))
- return retcode, out, err
- elif args.database == "oracle":
- retcode, out, err = run_in_shell('{0} {1}'.format(tool, ORACLE_EXEC_ARGS.format(
- args.database_username,
- args.database_password,
- args.database_host,
- args.database_port,
- args.database_name,
- scriptPath
- )))
- return retcode, out, err
- elif args.database=="mysql":
- retcode, out, err = run_in_shell('{0} {1}'.format(tool, MYSQL_EXEC_ARGS.format(
- args.database_host,
- args.database_port,
- args.database_username,
- args.database_password,
- args.database_name,
- scriptPath
- )))
- return retcode, out, err
- return -2, "Wrong database", "Wrong database"
- def configure_database_password(showDefault=True):
- passwordDefault = PG_DEFAULT_PASSWORD
- if showDefault:
- passwordPrompt = 'Enter Database Password [' + passwordDefault + ']: '
- else:
- passwordPrompt = 'Enter Database Password: '
- passwordPattern = "^[a-zA-Z0-9_-]*$"
- passwordDescr = "Invalid characters in password. Use only alphanumeric or "\
- "_ or - characters"
- password = read_password(passwordDefault, passwordPattern, passwordPrompt,
- passwordDescr)
- return password
- def configure_database_username_password(args):
- properties = get_ambari_properties()
- if properties == -1:
- print_error_msg ("Error getting ambari properties")
- return -1
- username = properties[JDBC_USER_NAME_PROPERTY]
- passwordProp = properties[JDBC_PASSWORD_PROPERTY]
- if username and passwordProp:
- print_info_msg("Database username + password already configured")
- args.database_username=username
- if is_alias_string(passwordProp):
- args.database_password = decrypt_password_for_alias(JDBC_RCA_PASSWORD_ALIAS)
- else:
- if os.path.exists(passwordProp):
- with open(passwordProp, 'r') as file:
- args.database_password = file.read()
- return 1
- else:
- print_error_msg("Connection properties not set in config file.")
- # Store local database connection properties
- def store_local_properties(args):
- properties = get_ambari_properties()
- if properties == -1:
- print_error_msg ("Error getting ambari properties")
- return -1
- properties.removeOldProp(JDBC_SCHEMA_PROPERTY)
- properties.removeOldProp(JDBC_HOSTNAME_PROPERTY)
- properties.removeOldProp(JDBC_DATABASE_PROPERTY)
- properties.removeOldProp(JDBC_RCA_DRIVER_PROPERTY)
- properties.removeOldProp(JDBC_RCA_URL_PROPERTY)
- properties.removeOldProp(JDBC_PORT_PROPERTY)
- properties.removeOldProp(JDBC_PORT_PROPERTY)
- properties.removeOldProp(JDBC_DRIVER_PROPERTY)
- properties.removeOldProp(JDBC_URL_PROPERTY)
- properties.removeOldProp(JDBC_DATABASE_PROPERTY)
- properties.process_pair(PERSISTENCE_TYPE_PROPERTY, "local")
- properties.process_pair(JDBC_USER_NAME_PROPERTY, args.database_username)
- isSecure = properties.get_property(SECURITY_IS_ENCRYPTION_ENABLED)
- if isSecure and isSecure.lower() == 'true':
- properties.process_pair(JDBC_PASSWORD_PROPERTY,
- encrypt_password(JDBC_RCA_PASSWORD_ALIAS, args.database_password))
- else:
- properties.process_pair(JDBC_PASSWORD_PROPERTY,
- store_password_file(args.database_password, JDBC_PASSWORD_FILENAME))
- conf_file = properties.fileName
- try:
- properties.store(open(conf_file, "w"))
- except Exception, e:
- print 'Could not write ambari config file "%s": %s' % (conf_file, e)
- return -1
- return 0
- # Load ambari properties and return dict with values
- def get_ambari_properties():
- conf_file = find_properties_file()
- properties = None
- try:
- properties = Properties()
- properties.load(open(conf_file))
- except (Exception), e:
- print 'Could not read "%s": %s' % (conf_file, e)
- return -1
- return properties
- # Load database connection properties from conf file
- def parse_properties_file(args):
- properties = get_ambari_properties()
- if properties == -1:
- print_error_msg ("Error getting ambari properties")
- return -1
- args.persistence_type = properties[PERSISTENCE_TYPE_PROPERTY]
- if not args.persistence_type:
- args.persistence_type = "local"
- if args.persistence_type == 'remote':
- args.database = properties[JDBC_DATABASE_PROPERTY]
- args.database_host = properties[JDBC_HOSTNAME_PROPERTY]
- args.database_port = properties[JDBC_PORT_PROPERTY]
- args.database_name = properties[JDBC_SCHEMA_PROPERTY]
- global DATABASE_INDEX
- try:
- DATABASE_INDEX = DATABASE_NAMES.index(args.database)
- except ValueError:
- pass
- args.database_username = properties[JDBC_USER_NAME_PROPERTY]
- args.database_password_file = properties[JDBC_PASSWORD_PROPERTY]
- if args.database_password_file:
- if not is_alias_string(args.database_password_file):
- args.database_password = open(properties[JDBC_PASSWORD_PROPERTY]).read()
- else:
- args.database_password = args.database_password_file
- return 0
- ### JDK ###
- def get_ambari_jars():
- try:
- conf_dir = os.environ[AMBARI_SERVER_LIB]
- return conf_dir
- except KeyError:
- default_jar_location = "/usr/lib/ambari-server"
- print_info_msg(AMBARI_SERVER_LIB + " is not set, using default "
- + default_jar_location)
- return default_jar_location
- def get_share_jars():
- share_jars = ""
- file_list = []
- file_list.extend(glob.glob(JAVA_SHARE_PATH + os.sep + "*mysql*"))
- file_list.extend(glob.glob(JAVA_SHARE_PATH + os.sep + "*ojdbc*"))
- if len(file_list) > 0:
- share_jars = string.join(file_list, os.pathsep)
- return share_jars
- def get_ambari_classpath():
- ambari_cp = get_ambari_jars() + os.sep + "*"
- share_cp = get_share_jars()
- if len(share_cp) > 0:
- ambari_cp = ambari_cp + os.pathsep + share_cp
- return ambari_cp
- def search_file(filename, search_path, pathsep=os.pathsep):
- """ Given a search path, find file with requested name """
- for path in string.split(search_path, pathsep):
- candidate = os.path.join(path, filename)
- if os.path.exists(candidate): return os.path.abspath(candidate)
- return None
- def dlprogress(base_name, count, blockSize, totalSize):
- percent = int(count * blockSize * 100 / totalSize)
- if (totalSize < blockSize):
- sys.stdout.write("\r" + base_name + "... %d%%" % (100))
- else:
- sys.stdout.write("\r" + base_name + "... %d%% (%.1f MB of %.1f MB)" % (
- percent, count * blockSize / 1024 / 1024.0, totalSize / 1024 / 1024.0))
- if (percent == 100 or totalSize < blockSize):
- sys.stdout.write("\n")
- sys.stdout.flush()
- def track_jdk(base_name, url, local_name):
- u = urllib2.urlopen(url)
- h = u.info()
- totalSize = int(h["Content-Length"])
- fp = open(local_name, "wb")
- blockSize = 8192
- count = 0
- percent = 0
- while True:
- chunk = u.read(blockSize)
- if not chunk:
- break
- fp.write(chunk)
- count += 1
- dlprogress(base_name, count, blockSize, totalSize)
- fp.flush()
- fp.close()
- def install_jce_manualy(args):
- properties = get_ambari_properties()
- if properties == -1:
- err = "Error getting ambari properties"
- raise FatalException(-1, err)
- if args.jce_policy and os.path.exists(args.jce_policy):
- jce_destination = os.path.join(properties[RESOURCES_DIR_PROPERTY], JCE_POLICY_FILENAME)
- shutil.copy(args.jce_policy, jce_destination)
- print "JCE policy copied from " + args.jce_policy + " to " + jce_destination
- return 0
- else:
- return 1
- #
- # Downloads the JDK
- #
- def download_jdk(args):
- jce_installed = install_jce_manualy(args)
- properties = get_ambari_properties()
- if properties == -1:
- err = "Error getting ambari properties"
- raise FatalException(-1, err)
- conf_file = properties.fileName
- ok = False
- if get_JAVA_HOME():
- pass # do nothing
- elif args.java_home and os.path.exists(args.java_home):
- print_warning_msg("JAVA_HOME " + args.java_home
- + " must be valid on ALL hosts")
- write_property(JAVA_HOME_PROPERTY, args.java_home)
- else:
- try:
- jdk_url = properties[JDK_URL_PROPERTY]
- resources_dir = properties[RESOURCES_DIR_PROPERTY]
- except (KeyError), e:
- err = 'Property ' + str(e) + ' is not defined at ' + conf_file
- raise FatalException(1, err)
- dest_file = resources_dir + os.sep + JDK_LOCAL_FILENAME
- if os.path.exists(dest_file):
- print "JDK already exists, using " + dest_file
- elif args.jdk_location and os.path.exists(args.jdk_location):
- print "Copying local JDK file {0} to {1}".format(args.jdk_location, dest_file)
- try:
- shutil.copyfile(args.jdk_location, dest_file)
- except Exception, e:
- err = "Can not copy file {0} to {1} due to: {2} . Please check file " \
- "permissions and free disk space.".format(args.jdk_location,
- dest_file, e.message)
- raise FatalException(1, err)
- else:
- print 'Downloading JDK from ' + jdk_url + ' to ' + dest_file
- jdk_download_fail_msg = " Failed to download JDK: {0}. Please check that Oracle " \
- "JDK is available at {1}. Also you may specify JDK file " \
- "location in local filesystem using --jdk-location command " \
- "line argument.".format("{0}", jdk_url)
- try:
- size_command = JDK_DOWNLOAD_SIZE_CMD.format(jdk_url);
- #Get Header from url,to get file size then
- retcode, out, err = run_os_command(size_command)
- if out.find("Content-Length") == -1:
- err = jdk_download_fail_msg.format("Request header doesn't contain Content-Length")
- raise FatalException(1, err)
- start_with = int(out.find("Content-Length") + len("Content-Length") + 2)
- end_with = out.find("\r\n", start_with)
- src_size = int(out[start_with:end_with])
- print 'JDK distribution size is ' + str(src_size) + ' bytes'
- file_exists = os.path.isfile(dest_file)
- file_size = -1
- if file_exists:
- file_size = os.stat(dest_file).st_size
- if file_exists and file_size == src_size:
- print_info_msg("File already exists")
- else:
- track_jdk(JDK_LOCAL_FILENAME, jdk_url, dest_file)
- print 'Successfully downloaded JDK distribution to ' + dest_file
- except FatalException:
- raise
- except Exception, e:
- err = jdk_download_fail_msg.format(str(e))
- raise FatalException(1, err)
- downloaded_size = os.stat(dest_file).st_size
- if downloaded_size != src_size or downloaded_size < JDK_MIN_FILESIZE:
- err = 'Size of downloaded JDK distribution file is ' \
- + str(downloaded_size) + ' bytes, it is probably \
- damaged or incomplete'
- raise FatalException(1, err)
- try:
- out, ok = install_jdk(dest_file)
- jdk_version = re.search('Creating (jdk.*)/jre', out).group(1)
- except Exception, e:
- print "Installation of JDK has failed: %s\n" % e.message
- file_exists = os.path.isfile(dest_file)
- if file_exists:
- ok = get_YN_input("JDK found at "+dest_file+". "
- "Would you like to re-download the JDK [y/n] (y)? ", True)
- if not ok:
- err = "Unable to install JDK. Please remove JDK file found at "+ \
- dest_file +" and re-run Ambari Server setup"
- raise FatalException(1, err)
- else:
- track_jdk(JDK_LOCAL_FILENAME, jdk_url, dest_file)
- print 'Successfully re-downloaded JDK distribution to ' + dest_file
- try:
- out, ok = install_jdk(dest_file)
- jdk_version = re.search('Creating (jdk.*)/jre', out).group(1)
- except Exception, e:
- print "Installation of JDK was failed: %s\n" % e.message
- err = "Unable to install JDK. Please remove JDK, file found at "+ \
- dest_file +" and re-run Ambari Server setup"
- raise FatalException(1, err)
- else:
- err = "Unable to install JDK. File "+ dest_file +" does not exist, " \
- "please re-run Ambari Server setup"
- raise FatalException(1, err)
- print "Successfully installed JDK to {0}/{1}".\
- format(JDK_INSTALL_DIR, jdk_version)
- write_property(JAVA_HOME_PROPERTY, "{0}/{1}".
- format(JDK_INSTALL_DIR, jdk_version))
- if jce_installed != 0:
- try:
- download_jce_policy(properties, ok)
- except FatalException as e:
- print "JCE Policy files are required for secure HDP setup. Please ensure " \
- " all hosts have the JCE unlimited strength policy 6, files."
- print_error_msg("Failed to download JCE policy files:")
- if e.reason is not None:
- print_error_msg("Reason: {0}".format(e.reason))
- # TODO: We don't fail installation if download_jce_policy fails. Is it OK?
- return 0
- def download_jce_policy(properties, accpeted_bcl):
- try:
- jce_url = properties[JCE_URL_PROPERTY]
- resources_dir = properties[RESOURCES_DIR_PROPERTY]
- except KeyError, e:
- err = 'Property ' + str(e) + ' is not defined in properties file'
- raise FatalException(1, err)
- dest_file = resources_dir + os.sep + JCE_POLICY_FILENAME
- if not os.path.exists(dest_file):
- print 'Downloading JCE Policy archive from ' + jce_url + ' to ' + dest_file
- jce_download_fail_msg = " Failed to download JCE Policy archive : {0}. " \
- "Please check that JCE Policy archive is available " \
- "at {1} . Also you may install JCE Policy archive manually using " \
- "--jce-policy command line argument.".format("{0}", jce_url)
- try:
- size_command = JDK_DOWNLOAD_SIZE_CMD.format(jce_url);
- #Get Header from url,to get file size then
- retcode, out, err = run_os_command(size_command)
- if out.find("Content-Length") == -1:
- err = jce_download_fail_msg.format(
- "Request header doesn't contain Content-Length")
- raise FatalException(1, err)
- start_with = int(out.find("Content-Length") + len("Content-Length") + 2)
- end_with = out.find("\r\n", start_with)
- src_size = int(out[start_with:end_with])
- print_info_msg('JCE zip distribution size is ' + str(src_size) + ' bytes')
- file_exists = os.path.isfile(dest_file)
- file_size = -1
- if file_exists:
- file_size = os.stat(dest_file).st_size
- if file_exists and file_size == src_size:
- print_info_msg("File already exists")
- else:
- #BCL license before download
- jce_download_cmd = JCE_DOWNLOAD_CMD.format(dest_file, jce_url)
- print_info_msg("JCE download cmd: " + jce_download_cmd)
- if accpeted_bcl:
- retcode, out, err = run_os_command(jce_download_cmd)
- if retcode == 0:
- print 'Successfully downloaded JCE Policy archive to ' + dest_file
- else:
- raise FatalException(1, err)
- else:
- ok = get_YN_input("To download the JCE Policy archive you must "
- "accept the license terms found at "
- "http://www.oracle.com/technetwork/java/javase"
- "/terms/license/index.html"
- "Not accepting might result in failure when "
- "setting up HDP security. \nDo you accept the "
- "Oracle Binary Code License Agreement [y/n] (y)? ", True)
- if ok:
- retcode, out, err = run_os_command(jce_download_cmd)
- if retcode == 0:
- print 'Successfully downloaded JCE Policy archive to ' + dest_file
- else:
- raise FatalException(1, None)
- except FatalException:
- raise
- except Exception, e:
- err = 'Failed to download JCE Policy archive: ' + str(e)
- raise FatalException(1, err)
- downloaded_size = os.stat(dest_file).st_size
- if downloaded_size != src_size or downloaded_size < JCE_MIN_FILESIZE:
- err = 'Size of downloaded JCE Policy archive is ' \
- + str(downloaded_size) + ' bytes, it is probably \
- damaged or incomplete'
- raise FatalException(1, err)
- else:
- print "JCE Policy archive already exists, using " + dest_file
- class RetCodeException(Exception): pass
- def install_jdk(dest_file):
- ok = get_YN_input("To install the Oracle JDK you must accept the "
- "license terms found at "
- "http://www.oracle.com/technetwork/java/javase/"
- "downloads/jdk-6u21-license-159167.txt. Not accepting will "
- "cancel the Ambari Server setup.\nDo you accept the "
- "Oracle Binary Code License Agreement [y/n] (y)? ", True)
- if not ok:
- raise FatalException(1, None)
- print "Installing JDK to {0}".format(JDK_INSTALL_DIR)
- retcode, out, err = run_os_command(CREATE_JDK_DIR_CMD)
- savedPath = os.getcwd()
- os.chdir(JDK_INSTALL_DIR)
- retcode, out, err = run_os_command(MAKE_FILE_EXECUTABLE_CMD.format(dest_file))
- retcode, out, err = run_os_command(dest_file + ' -noregister')
- os.chdir(savedPath)
- if retcode != 0:
- err = "Installation of JDK returned exit code %s" % retcode
- raise FatalException(retcode, err)
- return out, ok
- #
- # Configures the OS settings in ambari properties.
- #
- def configure_os_settings():
- properties = get_ambari_properties()
- if properties == -1:
- print_error_msg ("Error getting ambari properties")
- return -1
- try:
- conf_os_type = properties[OS_TYPE_PROPERTY]
- if conf_os_type != '':
- print_info_msg ("os_type already setting in properties file")
- return 0
- except (KeyError), e:
- print_error_msg ("os_type is not set in properties file")
- os_system = platform.system()
- if os_system != 'Linux':
- print_error_msg ("Non-Linux systems are not supported")
- return -1
- os_info = platform.linux_distribution(
- None, None, None, ['SuSE', 'redhat' ], 0
- )
- os_name = os_info[0].lower()
- if os_name == 'suse':
- os_name = 'sles'
- os_version = os_info[1].split('.', 1)[0]
- master_os_type = os_name + os_version
- write_property(OS_TYPE_PROPERTY, master_os_type)
- return 0
- def get_JAVA_HOME():
- properties = get_ambari_properties()
- if properties == -1:
- print_error_msg ("Error getting ambari properties")
- return None
-
- java_home = properties[JAVA_HOME_PROPERTY]
- if (not 0 == len(java_home)) and (os.path.exists(java_home)):
- return java_home
- return None
- #
- # Finds the available JDKs.
- #
- def find_jdk():
- if get_JAVA_HOME():
- return get_JAVA_HOME()
- print "Looking for available JDKs at " + JDK_INSTALL_DIR
- jdks = glob.glob(JDK_INSTALL_DIR + os.sep + "jdk*")
- jdks.sort()
- print "Found: " + str(jdks)
- count = len(jdks)
- if count == 0:
- return
- jdkPath = jdks[count - 1]
- print "Selected JDK {0}".format(jdkPath)
- return jdkPath
- #
- # Checks if options determine local DB configuration
- #
- def is_local_database(options):
- if options.database == DATABASE_NAMES[0] \
- and options.database_host == "localhost" \
- and options.database_port == DATABASE_PORTS[0] \
- and options.database_name == "ambari":
- return True
- return False
- #Check if required jdbc drivers present
- def find_jdbc_driver(args):
- if args.database in JDBC_PATTERNS.keys():
- drivers = []
- drivers.extend(glob.glob(JAVA_SHARE_PATH + os.sep + JDBC_PATTERNS[args.database]))
- if drivers:
- return drivers
- return -1
- return 0
- def copy_files(files, dest_dir):
- if os.path.isdir(dest_dir):
- for filepath in files:
- shutil.copy(filepath, dest_dir)
- return 0
- else:
- return -1
- def check_jdbc_drivers(args):
- properties = get_ambari_properties()
- if properties == -1:
- print_error_msg ("Error getting ambari properties")
- return -1
-
- result = find_jdbc_driver(args)
-
- msg = 'Before starting Ambari Server, ' \
- 'you must copy the {0} JDBC driver JAR file to {1}.'.format(
- DATABASE_FULL_NAMES[args.database],
- JAVA_SHARE_PATH)
-
- if result == -1:
-
- if SILENT:
- print_error_msg(msg)
- raise FatalException(-1, msg)
- else:
- print_warning_msg(msg)
- raw_input(PRESS_ENTER_MSG)
- result = find_jdbc_driver(args)
- if result == -1:
- print_error_msg(msg)
- raise FatalException(-1, msg)
-
- # Check if selected RDBMS requires drivers to copy
- if type(result) is not int:
- print 'Copying JDBC drivers to server resources...'
- try:
- resources_dir = properties[RESOURCES_DIR_PROPERTY]
- except KeyError:
- print_error_msg("There is no value for " + RESOURCES_DIR_PROPERTY + "in " + AMBARI_PROPERTIES_FILE)
- return -1
- copy_status = copy_files(result, resources_dir)
-
- if not copy_status == 0:
- raise FatalException(-1, "Failed to copy JDBC drivers to server resources")
- return 0
- #
- # Setup the Ambari Server.
- #
- def setup(args):
- if not is_root():
- err = 'Ambari-server setup should be run with '\
- 'root-level privileges'
- raise FatalException(4, err)
- print 'Checking SELinux...'
- retcode = check_selinux()
- if not retcode == 0:
- err = 'Failed to disable SELinux. Exiting.'
- raise FatalException(retcode, err)
- # Create ambari user, if needed
- retcode = check_ambari_user()
- if not retcode == 0:
- err = 'Failed to create user. Exiting.'
- raise FatalException(retcode, err)
- print 'Checking iptables...'
- retcode, out = check_iptables()
- if not retcode == 0 and out == IP_TBLS_ENABLED:
- err = 'Failed to stop iptables. Exiting.'
- raise FatalException(retcode, err)
- print 'Checking JDK...'
- try:
- download_jdk(args)
- except FatalException as e:
- err = 'Downloading or installing JDK failed: {0}. Exiting.'.format(e)
- raise FatalException(e.code, err)
- print 'Completing setup...'
- retcode = configure_os_settings()
- if not retcode == 0:
- err = 'Configure of OS settings in ambari.properties failed. Exiting.'
- raise FatalException(retcode, err)
- print 'Configuring database...'
- prompt_db_properties(args)
- #DB setup should be done last after doing any setup.
-
- if is_local_database(args):
- print 'Default properties detected. Using built-in database.'
- store_local_properties(args)
- print 'Checking PostgreSQL...'
- retcode = check_postgre_up()
- if not retcode == 0:
- err = 'Unable to start PostgreSQL server. Exiting'
- raise FatalException(retcode, err)
- print 'Configuring local database...'
- retcode = setup_db(args)
- if not retcode == 0:
- err = 'Running database init script was failed. Exiting.'
- raise FatalException(retcode, err)
- print 'Configuring PostgreSQL...'
- retcode = configure_postgres()
- if not retcode == 0:
- err = 'Unable to configure PostgreSQL server. Exiting'
- raise FatalException(retcode, err)
- else:
- retcode = store_remote_properties(args)
- if retcode != 0:
- err = 'Unable to save config file'
- raise FatalException(retcode, err)
- check_jdbc_drivers(args)
- print 'Configuring remote database connection properties...'
- retcode = setup_remote_db(args)
- if retcode == -1:
- err = "The cli was not found"
- raise NonFatalException(err)
- if not retcode == 0:
- err = 'Error while configuring connection properties. Exiting'
- raise FatalException(retcode, err)
- check_jdbc_drivers(args)
- #
- # Resets the Ambari Server.
- #
- def reset(args):
- if not is_root():
- err = 'Ambari-server reset should be run with ' \
- 'root-level privileges'
- raise FatalException(4, err)
- choice = get_YN_input("**** WARNING **** You are about to reset and clear the "
- "Ambari Server database. This will remove all cluster "
- "host and configuration information from the database. "
- "You will be required to re-configure the Ambari server "
- "and re-run the cluster wizard. \n"
- "Are you SURE you want to perform the reset "
- "[yes/no]? ", True)
- okToRun = choice
- if not okToRun:
- err = "Ambari Server 'reset' cancelled"
- raise FatalException(1, err)
- okToRun = get_YN_input("Confirm server reset [yes/no]? ", True)
- if not okToRun:
- err = "Ambari Server 'reset' cancelled"
- raise FatalException(1, err)
- print "Resetting the Server database..."
- parse_properties_file(args)
- # configure_database_username_password(args)
- if args.persistence_type=="remote":
- client_desc = DATABASE_NAMES[DATABASE_INDEX] + ' ' + DATABASE_CLI_TOOLS_DESC[DATABASE_INDEX]
- client_usage_cmd_drop = DATABASE_CLI_TOOLS_USAGE[DATABASE_INDEX].format(DATABASE_DROP_SCRIPTS[DATABASE_INDEX], args.database_username,
- args.database_password, args.database_name)
- client_usage_cmd_init = DATABASE_CLI_TOOLS_USAGE[DATABASE_INDEX].format(DATABASE_INIT_SCRIPTS[DATABASE_INDEX], args.database_username,
- args.database_password, args.database_name)
- if get_db_cli_tool(args) != -1:
- retcode, out, err = execute_remote_script(args, DATABASE_DROP_SCRIPTS[DATABASE_INDEX])
- if not retcode == 0:
- if retcode == -1:
- print_warning_msg('Cannot find ' + client_desc +
- ' client in the path to reset the Ambari Server ' +
- ' schema. To reset Ambari Server schema ' +
- 'you must run the following DDL against the database ' +
- 'to drop the schema:' + os.linesep + client_usage_cmd_drop
- + os.linesep + ', then you must run the following DDL '
- + 'against the database to create the schema ' + os.linesep
- + client_usage_cmd_init + os.linesep )
- raise NonFatalException(err)
- retcode, out, err = execute_remote_script(args, DATABASE_INIT_SCRIPTS[DATABASE_INDEX])
- if not retcode == 0:
- if retcode == -1:
- print_warning_msg('Cannot find ' + client_desc + ' client in the path to ' +
- 'reset the Ambari Server schema. To reset Ambari Server schema ' +
- 'you must run the following DDL against the database to '
- + 'drop the schema:' + os.linesep + client_usage_cmd_drop
- + os.linesep + ', then you must run the following DDL ' +
- 'against the database to create the schema ' + os.linesep +
- client_usage_cmd_init + os.linesep )
- raise NonFatalException(err)
- else:
- err = 'Cannot find ' + client_desc + ' client in the path to reset the Ambari ' +\
- 'Server schema. To reset Ambari Server schema ' + \
- 'you must run the following DDL against the database to drop the schema:' + \
- os.linesep + client_usage_cmd_drop + os.linesep + \
- ', then you must run the following DDL against the database to create the ' + \
- 'schema ' + os.linesep + client_usage_cmd_init + os.linesep
- raise NonFatalException(err)
- else:
- dbname = args.database_name
- filename = args.drop_script_file
- username = args.database_username
- password = args.database_password
- command = SETUP_DB_CMD[:]
- command[-1] = command[-1].format(filename, username, password)
- retcode, outdata, errdata = run_os_command(command)
- if not retcode == 0:
- raise FatalException(1, errdata)
- print_info_msg ("About to run database setup")
- setup_db(args)
- #
- # Starts the Ambari Server.
- #
- def start(args):
- current_user = getpass.getuser()
- ambari_user = read_ambari_user()
- if ambari_user is None:
- err = "Can not detect a system user for Ambari. " \
- "Please run \"setup\" command to create such user "
- raise FatalException(1, err)
- if current_user != ambari_user and not is_root():
- err = "Can not start ambari-server as user {0}. Please either run \"start\" " \
- "command as root or as user {1}".format(current_user, ambari_user)
- raise FatalException(1, err)
- parse_properties_file(args)
- if os.path.exists(PID_DIR + os.sep + PID_NAME):
- f = open(PID_DIR + os.sep + PID_NAME, "r")
- pid = int(f.readline())
- f.close()
- try:
- os.kill(pid, 0)
- err = "Server is already running."
- raise FatalException(1, err)
- except OSError as e:
- print_info_msg("Server is not running...")
- conf_dir = get_conf_dir()
- jdk_path = find_jdk()
- if jdk_path is None:
- err = "No JDK found, please run the \"setup\" " \
- "command to install a JDK automatically or install any " \
- "JDK manually to " + JDK_INSTALL_DIR
- raise FatalException(1, err)
- # Preparations
- if is_root():
- print "Have root privileges."
- if args.persistence_type == "local":
- retcode = check_postgre_up()
- if not retcode == 0:
- err = "Unable to start PostgreSQL server. Exiting"
- raise FatalException(retcode, err)
- print 'Checking iptables...'
- retcode, out = check_iptables()
- if not retcode == 0 and out == IP_TBLS_ENABLED:
- err = "Failed to stop iptables. Exiting"
- raise FatalException(retcode, err)
- else: # Skipping actions that require root permissions
- print "Can not check iptables status when starting "\
- "without root privileges."
- print "Please don't forget to disable or adjust iptables if needed"
- if args.persistence_type == "local":
- print "Can not check PostgreSQL server status when starting " \
- "without root privileges."
- print "Please don't forget to start PostgreSQL server."
- properties = get_ambari_properties()
- isSecure = properties.get_property(SECURITY_IS_ENCRYPTION_ENABLED)
- isSecure = True if isSecure and isSecure.lower() == 'true' else False
- keyLocation = get_master_key_location(properties)
- masterKeyFile = search_file(SECURITY_MASTER_KEY_FILENAME, keyLocation)
- environ = os.environ.copy()
- # Need to handle master key not persisted scenario
- if isSecure and not masterKeyFile:
- prompt = False
- masterKey = environ.get(SECURITY_KEY_ENV_VAR_NAME)
- if masterKey is not None and masterKey != "":
- pass
- else:
- keyLocation = environ.get(SECURITY_MASTER_KEY_LOCATION)
- if keyLocation is not None:
- try:
- # Verify master key can be read by the java process
- with open(keyLocation, 'r') : pass
- except IOError:
- print_warning_msg("Cannot read Master key from path specified in "
- "environemnt.")
- prompt = True
- else:
- # Key not provided in the environment
- prompt = True
- if prompt:
- masterKey = get_validated_string_input("Please provide master key " +\
- "for unlocking credential store: ", "", ".*", "", True, False)
- tempDir = tempfile.gettempdir()
- tempFilePath = tempDir + os.sep + "masterkey"
- save_master_key(masterKey, tempFilePath, True)
- if ambari_user != current_user:
- uid = pwd.getpwnam(ambari_user).pw_uid
- gid = pwd.getpwnam(ambari_user).pw_gid
- os.chown(tempFilePath, uid, gid)
- else:
- os.chmod(tempFilePath, stat.S_IREAD | stat.S_IWRITE)
- if tempFilePath is not None:
- environ[SECURITY_MASTER_KEY_LOCATION] = tempFilePath
- pidfile = PID_DIR + os.sep + PID_NAME
- command_base = SERVER_START_CMD_DEBUG if (SERVER_DEBUG_MODE or SERVER_START_DEBUG) else SERVER_START_CMD
- command = command_base.format(jdk_path, conf_dir, get_ambari_classpath(), pidfile)
- if is_root() and ambari_user != "root":
- # To inherit exported environment variables (especially AMBARI_PASSPHRASE),
- # from subprocess, we have to skip --login option of su command. That's why
- # we change dir to / (otherwise subprocess can face with 'permission denied'
- # errors while trying to list current directory
- os.chdir("/")
- param_list = ["/bin/su", ambari_user, "-s", "/bin/sh", "-c", command]
- else:
- param_list = ["/bin/sh", "-c", command]
- print "Running server: " + str(param_list)
- server_process = subprocess.Popen(param_list, env=environ)
- #
- # Stops the Ambari Server.
- #
- def stop(args):
- if (args != None):
- args.exit_message = None
- if os.path.exists(PID_DIR + os.sep + PID_NAME):
- f = open(PID_DIR + os.sep + PID_NAME, "r")
- pid = int(f.readline())
- try:
- os.killpg(os.getpgid(pid), signal.SIGKILL)
- except OSError, e:
- print_info_msg( "Unable to stop Ambari Server - " + str(e) )
- return
- f.close()
- os.remove(f.name)
- print "Ambari Server stopped"
- else:
- print "Ambari Server is not running"
- ### Stack upgrade ###
- def upgrade_stack(args, stack_id):
- if not is_root():
- err = 'Ambari-server upgradestack should be run with ' \
- 'root-level privileges'
- raise FatalException(4, err)
- #password access to ambari-server and mapred
- configure_database_username_password(args)
- dbname = args.database_name
- file = args.upgrade_stack_script_file
- stack_name, stack_version = stack_id.split(STACK_NAME_VER_SEP)
- command = UPGRADE_STACK_CMD[:]
- command[-1] = command[-1].format(file, stack_name, stack_version)
- retcode, outdata, errdata = run_os_command(command)
- if not retcode == 0:
- raise FatalException(retcode, errdata)
- return retcode
- #
- # Upgrades the Ambari Server.
- #
- def upgrade(args):
- if not is_root():
- err = 'Ambari-server upgrade should be run with ' \
- 'root-level privileges'
- raise FatalException(4, err)
- print 'Updating properties in ' + AMBARI_PROPERTIES_FILE + ' ...'
- retcode = update_ambari_properties()
- if not retcode == 0:
- err = AMBARI_PROPERTIES_FILE + ' file can\'t be updated. Exiting'
- raise FatalException(retcode, err)
- parse_properties_file(args)
- if args.persistence_type == "remote":
- pass
- else:
- print 'Checking PostgreSQL...'
- retcode = check_postgre_up()
- if not retcode == 0:
- err = 'PostgreSQL server not running. Exiting'
- raise FatalException(retcode, err)
- file = args.upgrade_script_file
- print 'Upgrading database...'
- retcode = execute_db_script(args, file)
- if not retcode == 0:
- err = 'Database upgrade script has failed. Exiting.'
- raise FatalException(retcode, err)
- print 'Checking database integrity...'
- check_file = file[:-3] + "Check" + file[-4:]
- retcode = check_db_consistency(args, check_file)
- if not retcode == 0:
- print 'Found inconsistency. Trying to fix...'
- fix_file = file[:-3] + "Fix" + file[-4:]
- retcode = execute_db_script(args, fix_file)
- if not retcode == 0:
- err = 'Database cannot be fixed. Exiting.'
- raise FatalException(retcode, err)
- else:
- print 'Database is consistent.'
- user = read_ambari_user()
- if user is None:
- warn = 'Can not determine custom ambari user. Please run ' \
- '"ambari-server setup" before starting server'
- print_warning_msg(warn)
- else:
- adjust_directory_permissions(user)
- #
- # The Ambari Server status.
- #
- def status(args):
- args.exit_message = None
- status, pid = is_server_runing()
- if status:
- print "Ambari Server running"
- print "Found Ambari Server PID: '" + str(pid) + " at: " + PID_DIR + os.sep + PID_NAME
- else:
- print "Ambari Server not running. Stale PID File at: " + PID_DIR + os.sep + PID_NAME
- #
- # Prints an "info" messsage.
- #
- def print_info_msg(msg):
- if VERBOSE:
- print("INFO: " + msg)
- #
- # Prints an "error" messsage.
- #
- def print_error_msg(msg):
- print("ERROR: " + msg)
- #
- # Prints a "warning" messsage.
- #
- def print_warning_msg(msg, bold=False):
- if bold:
- print(BOLD_ON + "WARNING: " + msg + BOLD_OFF)
- else:
- print("WARNING: " + msg)
- #
- # Gets the y/n input.
- #
- # return True if 'y' or False if 'n'
- #
- def get_YN_input(prompt,default):
- yes = set(['yes','ye', 'y'])
- no = set(['no','n'])
- return get_choice_string_input(prompt,default,yes,no)
- def get_choice_string_input(prompt,default,firstChoice,secondChoice):
- if SILENT:
- print(prompt)
- return default
- choice = raw_input(prompt).lower()
- if choice in firstChoice:
- return True
- elif choice in secondChoice:
- return False
- elif choice is "": # Just enter pressed
- return default
- else:
- print "input not recognized, please try again: "
- return get_choice_string_input(prompt,default,firstChoice,secondChoice)
- def get_validated_string_input(prompt, default, pattern, description,
- is_pass, allowEmpty=True):
- input = ""
- while not input:
- if SILENT:
- print (prompt)
- input = default
- elif is_pass:
- input = getpass.getpass(prompt)
- else:
- input = raw_input(prompt)
- if not input.strip():
- # Empty input - if default available use default
- if not allowEmpty and not default:
- print 'Property cannot be blank.'
- input = ""
- continue
- else:
- input = default
- break #done here and picking up default
- else:
- if not pattern==None and not re.search(pattern,input.strip()):
- print description
- input= ""
- return input
- def get_value_from_properties(properties, key, default=""):
- try:
- value = properties.get_property(key)
- if not value:
- value = default
- except:
- return default
- return value
- def get_prompt_default(defaultStr=None):
- if not defaultStr or defaultStr == "":
- return ""
- else:
- return '(' + defaultStr + ')'
- def setup_ldap():
- if not is_root():
- err = 'Ambari-server setup-ldap should be run with ' \
- 'root-level privileges'
- raise FatalException(4, err)
- properties = get_ambari_properties()
- # python2.x dict is not ordered
- ldap_property_list_reqd = ["authentication.ldap.primaryUrl",
- "authentication.ldap.secondaryUrl",
- "authentication.ldap.useSSL",
- "authentication.ldap.usernameAttribute",
- "authentication.ldap.baseDn",
- "authentication.ldap.bindAnonymously" ]
- ldap_property_list_opt = [ "authentication.ldap.managerDn",
- LDAP_MGR_PASSWORD_PROPERTY,
- SSL_TRUSTSTORE_TYPE_PROPERTY,
- SSL_TRUSTSTORE_PATH_PROPERTY,
- SSL_TRUSTSTORE_PASSWORD_PROPERTY]
- ldap_property_list_truststore=[SSL_TRUSTSTORE_TYPE_PROPERTY,
- SSL_TRUSTSTORE_PATH_PROPERTY,
- SSL_TRUSTSTORE_PASSWORD_PROPERTY]
- ldap_property_list_passwords=[LDAP_MGR_PASSWORD_PROPERTY,
- SSL_TRUSTSTORE_PASSWORD_PROPERTY]
- LDAP_PRIMARY_URL_DEFAULT = get_value_from_properties(properties, ldap_property_list_reqd[0])
- LDAP_SECONDARY_URL_DEFAULT = get_value_from_properties(properties, ldap_property_list_reqd[1])
- LDAP_USE_SSL_DEFAULT = get_value_from_properties(properties, ldap_property_list_reqd[2], "false")
- LDAP_USER_ATT_DEFAULT = get_value_from_properties(properties, ldap_property_list_reqd[3], "uid")
- LDAP_BASE_DN_DEFAULT = get_value_from_properties(properties, ldap_property_list_reqd[4])
- LDAP_BIND_DEFAULT = get_value_from_properties(properties, ldap_property_list_reqd[5], "false")
- LDAP_MGR_DN_DEFAULT = get_value_from_properties(properties, ldap_property_list_opt[0])
- SSL_TRUSTSTORE_TYPE_DEFAULT = get_value_from_properties(properties, SSL_TRUSTSTORE_TYPE_PROPERTY, "jks")
- SSL_TRUSTSTORE_PATH_DEFAULT = get_value_from_properties(properties, SSL_TRUSTSTORE_PATH_PROPERTY)
- ldap_properties_map_reqd =\
- {
- ldap_property_list_reqd[0]:(LDAP_PRIMARY_URL_DEFAULT, "Primary URL* {{host:port}} {0}: ".format(get_prompt_default(LDAP_PRIMARY_URL_DEFAULT)), False),\
- ldap_property_list_reqd[1]:(LDAP_SECONDARY_URL_DEFAULT, "Secondary URL {0}: ".format(get_prompt_default(LDAP_SECONDARY_URL_DEFAULT)), True),\
- ldap_property_list_reqd[2]:(LDAP_USE_SSL_DEFAULT, "Use SSL* [true/false] {0}: ".format(get_prompt_default(LDAP_USE_SSL_DEFAULT)), False),\
- ldap_property_list_reqd[3]:(LDAP_USER_ATT_DEFAULT, "User name attribute* {0}: ".format(get_prompt_default(LDAP_USER_ATT_DEFAULT)), False),\
- ldap_property_list_reqd[4]:(LDAP_BASE_DN_DEFAULT, "Base DN* {0}: ".format(get_prompt_default(LDAP_BASE_DN_DEFAULT)), False),\
- ldap_property_list_reqd[5]:(LDAP_BIND_DEFAULT, "Bind anonymously* [true/false] {0}: ".format(get_prompt_default(LDAP_BIND_DEFAULT)), False)\
- }
- ldap_property_value_map = {}
- for idx, key in enumerate(ldap_property_list_reqd):
- if idx == 0:
- pattern = REGEX_HOSTNAME_PORT
- elif idx in [2, 5]:
- pattern = REGEX_TRUE_FALSE
- else:
- pattern = REGEX_ANYTHING
- input = get_validated_string_input(ldap_properties_map_reqd[key][1],
- ldap_properties_map_reqd[key][0], pattern,
- "Invalid characters in the input!", False, ldap_properties_map_reqd[key][2])
- if input is not None and input != "":
- ldap_property_value_map[key] = input
- bindAnonymously = ldap_property_value_map["authentication.ldap.bindAnonymously"]
- anonymous = (bindAnonymously and bindAnonymously.lower() == 'true')
- password = None
- # Ask for manager credentials only if bindAnonymously is false
- if not anonymous:
- username = get_validated_string_input("Manager DN* {0}: ".format(
- get_prompt_default(LDAP_MGR_DN_DEFAULT)), LDAP_MGR_DN_DEFAULT, ".*",
- "Invalid characters in the input!", False, False)
- ldap_property_value_map[LDAP_MGR_USERNAME_PROPERTY] = username
- password = configure_ldap_password()
- ldap_property_value_map[LDAP_MGR_PASSWORD_PROPERTY] = password
- useSSL = ldap_property_value_map["authentication.ldap.useSSL"]
- ldaps = (useSSL and useSSL.lower() == 'true')
- if ldaps:
- truststore_default = "n"
- truststore_set = bool(SSL_TRUSTSTORE_PATH_DEFAULT)
- if truststore_set:
- truststore_default = "y"
- custom_trust_store = get_YN_input("Do you want to provide custom TrustStore for Ambari [y/n] ({0})?".
- format(truststore_default),
- truststore_set)
- if custom_trust_store:
- ts_type = get_validated_string_input(
- "TrustStore type [jks/jceks/pkcs12] {0}:".format(get_prompt_default(SSL_TRUSTSTORE_TYPE_DEFAULT)),
- SSL_TRUSTSTORE_TYPE_DEFAULT,
- "^(jks|jceks|pkcs12)?$", "Wrong type", False)
- ts_path = None
- while not ts_path:
- ts_path = get_validated_string_input(
- "Path to TrustStore file {0}:".format(get_prompt_default(SSL_TRUSTSTORE_PATH_DEFAULT)),
- SSL_TRUSTSTORE_PATH_DEFAULT,
- ".*", False, False)
- if not os.path.exists(ts_path):
- print 'File not found.'
- ts_password = read_password("", ".*", "Password for TrustStore:", "Invalid characters in password")
- ldap_property_value_map[SSL_TRUSTSTORE_TYPE_PROPERTY] = ts_type
- ldap_property_value_map[SSL_TRUSTSTORE_PATH_PROPERTY] = ts_path
- ldap_property_value_map[SSL_TRUSTSTORE_PASSWORD_PROPERTY] = ts_password
- pass
- else:
- properties.removeOldProp(SSL_TRUSTSTORE_TYPE_PROPERTY)
- properties.removeOldProp(SSL_TRUSTSTORE_PATH_PROPERTY)
- properties.removeOldProp(SSL_TRUSTSTORE_PASSWORD_PROPERTY)
- pass
- print '=' * 20
- print 'Review Settings'
- print '=' * 20
- for property in ldap_property_list_reqd:
- if property in ldap_property_value_map:
- print("%s: %s" % (property, ldap_property_value_map[property]))
- for property in ldap_property_list_opt:
- if ldap_property_value_map.has_key(property):
- if property not in ldap_property_list_passwords:
- print("%s: %s" % (property, ldap_property_value_map[property]))
- else:
- print("%s: %s" % (property, "****"))
- save_settings = get_YN_input("Save settings [y/n] (y)? ", True)
- if save_settings:
- ldap_property_value_map[CLIENT_SECURITY_KEY] = 'ldap'
- # Persisting values
- update_properties(properties, ldap_property_value_map)
- print 'Saving...done'
- return 0
- def read_master_key():
- passwordPattern = ".*"
- passwordDescr = "Invalid characters in password. Use only alphanumeric or "\
- "_ or - characters"
- passwordDefault = ""
- masterKey = get_validated_string_input(
- "Please provide master key for locking the credential store: ",
- passwordDefault, passwordPattern, passwordDescr, True, True)
- if not masterKey:
- print "Master Key cannot be empty!"
- return read_master_key()
- masterKey2 = get_validated_string_input( "Re-enter master key: ",
- passwordDefault, passwordPattern, passwordDescr, True, True)
- if masterKey != masterKey2:
- print "Master key did not match!"
- return read_master_key()
- return masterKey
- def encrypt_password(alias, password):
- properties = get_ambari_properties()
- if properties == -1:
- raise FatalException(1, None)
- isSecure = properties.get_property(SECURITY_IS_ENCRYPTION_ENABLED)
- if isSecure and isSecure.lower() == 'true':
- keyLocation = get_master_key_location(properties)
- masterKeyFile = search_file(SECURITY_MASTER_KEY_FILENAME, keyLocation)
- masterKey = None
- if not masterKeyFile:
- # Encryption enabled but no master key file found
- masterKey = get_validated_string_input("Please provide master key " +\
- "for unlocking credential store: ", "", ".*", "", False, False)
- retCode = save_passwd_for_alias(alias, password, masterKey)
- if retCode != 0:
- print 'Failed to save secure password!'
- return password
- else:
- return get_alias_string(alias)
- return password
- def decrypt_password_for_alias(alias):
- properties = get_ambari_properties()
- if properties == -1:
- raise FatalException(1, None)
- isSecure = properties.get_property(SECURITY_IS_ENCRYPTION_ENABLED)
- if isSecure and isSecure.lower() == 'true':
- keyLocation = get_master_key_location(properties)
- masterKeyFile = search_file(SECURITY_MASTER_KEY_FILENAME, keyLocation)
- masterKey = None
- if not masterKeyFile:
- # Encryption enabled but no master key file found
- masterKey = get_validated_string_input("Please provide master key " +\
- "for unlocking credential store: ", "", ".*", "", False, False)
- return read_passwd_for_alias(alias, masterKey)
- else:
- return alias
- def setup_master_key():
- if not is_root():
- err = 'Ambari-server setup should be run with '\
- 'root-level privileges'
- raise FatalException(4, err)
- properties = get_ambari_properties()
- if properties == -1:
- raise FatalException(1, "Failed to read properties file.")
- # Check configuration for location of master key
- keyLocation = get_master_key_location(properties)
- masterKeyFile = search_file(SECURITY_MASTER_KEY_FILENAME, keyLocation)
- isPersisted = True if masterKeyFile else False
- isSecure = properties.get_property(SECURITY_IS_ENCRYPTION_ENABLED)
- isSecure = True if isSecure and isSecure.lower() == 'true' else False
- db_password = properties.get_property(JDBC_PASSWORD_PROPERTY)
- # Read clear text password from from
- if db_password and not is_alias_string(db_password) and os.path.isfile(db_password):
- with open(db_password, 'r') as file:
- db_password = file.read()
-
- ldap_password = properties.get_property(LDAP_MGR_PASSWORD_PROPERTY)
- resetKey = False
- masterKey = None
- if isSecure:
- resetKey = get_YN_input("Password encryption is enabled. Do you want to "
- "reset master key? [y/n] (n): ", False)
- # For encrypting of only unencrypted passwords without resetting the key ask
- # for master key if not persisted.
- if isSecure and not isPersisted and not resetKey:
- masterKey = get_validated_string_input('Please provide master key for '
- 'the credential store: ', "", ".*", "", True, False)
- pass
- # Make sure both passwords are clear-text if master key is lost
- if resetKey:
- if not isPersisted:
- masterKey = get_validated_string_input('Please provide original master '
- 'key for the credential store. Press [Enter] to skip: ',
- "", ".*", "", True, True)
- if not masterKey:
- err = '{0} is already encrypted. Please call {1} to store unencrypted' \
- ' password and call "encrypt-passwords" again.'
- if db_password and is_alias_string(db_password):
- print err.format('Database password', '"' + SETUP_ACTION + '"')
- return 1
- if ldap_password and is_alias_string(ldap_password):
- print err.format('LDAP manager password', '"' + LDAP_SETUP_ACTION + '"')
- return 1
- pass
- pass
- pass
- # Read back any encrypted passwords
- if db_password and is_alias_string(db_password):
- db_password = read_passwd_for_alias(JDBC_RCA_PASSWORD_ALIAS, masterKey)
- if ldap_password and is_alias_string(ldap_password):
- ldap_password = read_passwd_for_alias(LDAP_MGR_PASSWORD_ALIAS, masterKey)
- # Read master key, if non-secure or reset is true
- if resetKey or not isSecure:
- masterKey = read_master_key()
- persist = get_YN_input("Do you want to persist master key. If you choose "\
- "not to persist, you need to provide the master "\
- "key while starting the ambari server as an env "\
- "variable named " + SECURITY_KEY_ENV_VAR_NAME +\
- " or the start will prompt for the master key."
- " Persist [y/n] (y)? ", True)
- if persist:
- save_master_key(masterKey, keyLocation + os.sep +
- SECURITY_MASTER_KEY_FILENAME, persist)
- elif not persist and masterKeyFile:
- try:
- os.remove(masterKeyFile)
- print_info_msg("Deleting master key file at location: " + str(
- masterKeyFile))
- except Exception, e:
- print 'Could not remove master key file. %s' % e
- pass
- pass
- if resetKey and masterKey:
- # Blow up the credential store made with previous key
- store_file = get_credential_store_location(properties)
- if os.path.exists(store_file):
- os.remove(store_file)
- pass
- propertyMap = {SECURITY_IS_ENCRYPTION_ENABLED : 'true'}
- # Encrypt only un-encrypted passwords
- if db_password and not is_alias_string(db_password):
- retCode = save_passwd_for_alias(JDBC_RCA_PASSWORD_ALIAS, db_password, masterKey)
- propertyMap[JDBC_PASSWORD_PROPERTY] = get_alias_string(JDBC_RCA_PASSWORD_ALIAS)
- if retCode != 0:
- print 'Failed to save secure database password.'
- else:
- remove_password_file(JDBC_PASSWORD_FILENAME)
- pass
- if ldap_password and not is_alias_string(ldap_password):
- retCode = save_passwd_for_alias(LDAP_MGR_PASSWORD_ALIAS, ldap_password, masterKey)
- propertyMap[LDAP_MGR_PASSWORD_PROPERTY] = get_alias_string(LDAP_MGR_PASSWORD_ALIAS)
- if retCode != 0:
- print 'Failed to save secure LDAP password.'
- pass
- update_properties(propertyMap)
- # Since files for store and master are created we need to ensure correct
- # permissions
- ambari_user = read_ambari_user()
- if ambari_user:
- adjust_directory_permissions(ambari_user)
- return 0
- def get_credential_store_location(properties):
- store_loc = properties[SECURITY_KEYS_DIR]
- if store_loc is None or store_loc == "":
- store_loc = "/var/lib/ambari-server/keys/credentials.jceks"
- else:
- store_loc += os.sep + "credentials.jceks"
- return store_loc
- def get_master_key_location(properties):
- keyLocation = properties[SECURITY_MASTER_KEY_LOCATION]
- if keyLocation is None or keyLocation == "":
- keyLocation = properties[SECURITY_KEYS_DIR]
- return keyLocation
- def is_alias_string(passwdStr):
- regex = re.compile("\$\{alias=[\w\.]+\}")
- # Match implies string at beginning of word
- r = regex.match(passwdStr)
- if r is not None:
- return True
- else:
- return False
- def get_alias_string(alias):
- return "${alias=" + alias + "}"
- def get_alias_from_alias_string(aliasStr):
- return aliasStr[8:-1]
- def read_passwd_for_alias(alias, masterKey=""):
- if alias:
- jdk_path = find_jdk()
- if jdk_path is None:
- print_error_msg("No JDK found, please run the \"setup\" "
- "command to install a JDK automatically or install any "
- "JDK manually to " + JDK_INSTALL_DIR)
- return 1
- tempFileName = "ambari.passwd"
- passwd = ""
- tempDir = tempfile.gettempdir()
- #create temporary file for writing
- tempFilePath = tempDir + os.sep + tempFileName
- file = open(tempFilePath, 'w+')
- os.chmod(tempFilePath, stat.S_IREAD | stat.S_IWRITE)
- file.close()
- if masterKey is None or masterKey == "":
- masterKey = "None"
- command = SECURITY_PROVIDER_GET_CMD.format(jdk_path,
- get_conf_dir(), get_ambari_classpath(), alias, tempFilePath, masterKey)
- (retcode, stdout, stderr) = run_os_command(command)
- print_info_msg("Return code from credential provider get passwd: " +
- str(retcode))
- if retcode != 0:
- print 'Unable to read password from store. alias = ' + alias
- else:
- passwd = open(tempFilePath, 'r').read()
- # Remove temporary file
- os.remove(tempFilePath)
- return passwd
- else:
- print_error_msg("Alias is unreadable.")
- def save_passwd_for_alias(alias, passwd, masterKey=""):
- if alias and passwd:
- jdk_path = find_jdk()
- if jdk_path is None:
- print_error_msg("No JDK found, please run the \"setup\" "
- "command to install a JDK automatically or install any "
- "JDK manually to " + JDK_INSTALL_DIR)
- return 1
- if masterKey is None or masterKey == "":
- masterKey = "None"
- command = SECURITY_PROVIDER_PUT_CMD.format(jdk_path, get_conf_dir(),
- get_ambari_classpath(), alias, passwd, masterKey)
- (retcode, stdout, stderr) = run_os_command(command)
- print_info_msg("Return code from credential provider save passwd: " +
- str(retcode))
- return retcode
- else:
- print_error_msg("Alias or password is unreadable.")
- def save_master_key(master_key, key_location, persist=True):
- if master_key:
- jdk_path = find_jdk()
- if jdk_path is None:
- print_error_msg("No JDK found, please run the \"setup\" "
- "command to install a JDK automatically or install any "
- "JDK manually to " + JDK_INSTALL_DIR)
- return 1
- command = SECURITY_PROVIDER_KEY_CMD.format(jdk_path,
- get_ambari_classpath(), get_conf_dir(), master_key, key_location, persist)
- (retcode, stdout, stderr) = run_os_command(command)
- print_info_msg("Return code from credential provider save KEY: " +
- str(retcode))
- else:
- print_error_msg("Master key cannot be None.")
- def configure_ldap_password():
- passwordDefault = ""
- passwordPrompt = 'Enter Manager Password* : '
- passwordPattern = ".*"
- passwordDescr = "Invalid characters in password."
- password = read_password(passwordDefault, passwordPattern, passwordPrompt,
- passwordDescr)
- return password
- # Copy file to /tmp and save with file.# (largest # is latest file)
- def backup_file_in_temp(filePath):
- if filePath is not None:
- tmpDir = tempfile.gettempdir()
- back_up_file_count = len(glob.glob1(tmpDir, AMBARI_PROPERTIES_FILE + "*"))
- try:
- shutil.copyfile(filePath, tmpDir + os.sep +
- AMBARI_PROPERTIES_FILE + "." + str(back_up_file_count + 1))
- except (Exception), e:
- print_error_msg('Could not backup file in temp "%s": %s' % (str(
- back_up_file_count, e)))
- return 0
- # update properties in a section-less properties file
- # Cannot use ConfigParser due to bugs in version 2.6
- def update_properties(propertyMap):
- conf_file = search_file(AMBARI_PROPERTIES_FILE, get_conf_dir())
- backup_file_in_temp(conf_file)
- if propertyMap is not None and conf_file is not None:
- properties = Properties()
- try:
- with open(conf_file, 'r') as file:
- properties.load(file)
- except (Exception), e:
- print_error_msg ('Could not read "%s": %s' % (conf_file, e))
- return -1
- #for key in propertyMap.keys():
- #properties[key] = propertyMap[key]
- for key in propertyMap.keys():
- properties.removeOldProp(key)
- properties.process_pair(key, str(propertyMap[key]))
- with open(conf_file, 'w') as file:
- properties.store(file)
- return 0
- def update_properties(properties, propertyMap):
- conf_file = search_file(AMBARI_PROPERTIES_FILE, get_conf_dir())
- backup_file_in_temp(conf_file)
- if conf_file is not None:
- if propertyMap is not None:
- for key in propertyMap.keys():
- properties.removeOldProp(key)
- properties.process_pair(key, str(propertyMap[key]))
- pass
- with open(conf_file, 'w') as file:
- properties.store(file)
- pass
- pass
- def setup_https(args):
- if not is_root():
- err = 'Ambari-server setup-https should be run with ' \
- 'root-level privileges'
- raise FatalException(4, err)
- args.exit_message = None
- if not SILENT:
- properties = get_ambari_properties()
- try:
- security_server_keys_dir = properties.get_property(SSL_KEY_DIR)
- client_api_ssl_port = DEFAULT_SSL_API_PORT if properties.get_property(SSL_API_PORT) in ("")\
- else properties.get_property(SSL_API_PORT)
- api_ssl = properties.get_property(SSL_API) in ['true']
- cert_was_imported = False
- cert_must_import = True
- if api_ssl:
- if get_YN_input("Do you want to disable SSL [y/n] n? ", False):
- properties.process_pair(SSL_API, "false")
- cert_must_import=False
- else:
- properties.process_pair(SSL_API_PORT, \
- get_validated_string_input(\
- "SSL port ["+str(client_api_ssl_port)+"] ? ",\
- str(client_api_ssl_port),\
- "^[0-9]{1,5}$", "Invalid port.", False))
- cert_was_imported = import_cert_and_key_action(security_server_keys_dir, properties)
- else:
- if get_YN_input("Do you want to configure HTTPS (y/n) y? ", True):
- properties.process_pair(SSL_API_PORT,\
- get_validated_string_input("SSL port ["+str(client_api_ssl_port)+"] ? ",\
- str(client_api_ssl_port), "^[0-9]{1,5}$", "Invalid port.", False))
- cert_was_imported = import_cert_and_key_action(security_server_keys_dir, properties)
- else:
- return
-
- if cert_must_import and not cert_was_imported:
- print 'Setup of HTTPS failed. Exiting.'
- return
- conf_file = find_properties_file()
- f = open(conf_file, 'w')
- properties.store(f, "Changed by 'ambari-server setup-https' command")
- if is_server_runing():
- print 'NOTE: Restart Ambari Server to apply changes'+\
- ' ("ambari-server restart|stop|start")'
- except (KeyError), e:
- err = 'Property ' + str(e) + ' is not defined at ' + conf_file
- raise FatalException(1, err)
- else:
- print "setup-https is not enabled in silent mode."
- ambari_user = read_ambari_user()
- if ambari_user:
- adjust_directory_permissions(ambari_user)
- def is_server_runing():
- if os.path.exists(PID_DIR + os.sep + PID_NAME):
- f = open(PID_DIR + os.sep + PID_NAME, "r")
- pid = int(f.readline())
- f.close()
- retcode, out, err = run_os_command("ps -p " + str(pid))
- if retcode == 0:
- return True, pid
- else:
- return False, None
- else:
- return False, None
-
- def import_cert_and_key_action(security_server_keys_dir, properties):
- if import_cert_and_key(security_server_keys_dir):
- properties.process_pair(SSL_SERVER_CERT_NAME, SSL_CERT_FILE_NAME)
- properties.process_pair(SSL_SERVER_KEY_NAME, SSL_KEY_FILE_NAME)
- properties.process_pair(SSL_API, "true")
- return True
- else:
- return False
-
- def import_cert_and_key(security_server_keys_dir):
- import_cert_path = get_validated_filepath_input(\
- "Please enter path to Certificate: ",\
- "Certificate not found")
- import_key_path = get_validated_filepath_input(\
- "Please enter path to Private Key: ", "Private Key not found")
- pem_password = get_validated_string_input("Please enter password for private key: ", "", None, None, True)
-
- certInfoDict = get_cert_info(import_cert_path)
-
- if not certInfoDict:
- print_warning_msg('Error getting certificate information')
- else:
- #Validate common name of certificate
- if not is_valid_cert_host(certInfoDict):
- print_warning_msg('Validation of certificate hostname failed')
-
- #Validate issue and expirations dates of certificate
- if not is_valid_cert_exp(certInfoDict):
- print_warning_msg('Validation of certificate issue and expiration dates failed')
- #jetty requires private key files with non-empty key passwords
- retcode = 0
- err = ''
- if not pem_password:
- print 'Generating random password for HTTPS keystore...done.'
- pem_password = generate_random_string()
- retcode, out, err = run_os_command(CHANGE_KEY_PWD_CND.format(
- import_key_path, pem_password))
- import_key_path += '.secured'
- if retcode == 0:
- keystoreFilePath = os.path.join(security_server_keys_dir,\
- SSL_KEYSTORE_FILE_NAME)
- passFilePath = os.path.join(security_server_keys_dir,\
- SSL_KEY_PASSWORD_FILE_NAME)
- retcode, out, err = run_os_command(EXPRT_KSTR_CMD.format(import_cert_path,\
- import_key_path, pem_password, keystoreFilePath))
- if retcode == 0:
- print 'Importing and saving certificate...done.'
- set_file_permissions(keystoreFilePath, "660", read_ambari_user(), False)
- with open(passFilePath, 'w+') as passFile:
- passFile.write(pem_password)
- pass
- set_file_permissions(passFilePath, "660", read_ambari_user(), False)
- import_file_to_keystore(import_cert_path, os.path.join(\
- security_server_keys_dir, SSL_CERT_FILE_NAME))
- import_file_to_keystore(import_key_path, os.path.join(\
- security_server_keys_dir, SSL_KEY_FILE_NAME))
- return True
- else:
- print_error_msg('Could not import Certificate and Private Key.')
- print 'SSL error on exporting keystore: ' + err.rstrip() + '.'
- return False
-
- def import_file_to_keystore(source, destination):
- shutil.copy(source, destination)
- set_file_permissions(destination, "660", read_ambari_user(), False)
- def generate_random_string(length=SSL_KEY_PASSWORD_LENGTH):
- chars = string.digits + string.ascii_letters
- return ''.join(random.choice(chars) for x in range(length))
-
- def get_validated_filepath_input(prompt, description, default=None):
- input = False
- while not input:
- if SILENT:
- print (prompt)
- return default
- else:
- input = raw_input(prompt)
- if not input==None:
- input = input.strip()
- if not input==None and not ""==input and os.path.exists(input):
- return input
- else:
- print description
- input=False
- def get_cert_info(path):
- retcode, out, err = run_os_command(GET_CRT_INFO_CMD.format(path))
-
- if retcode != 0:
- print 'Error during getting certificate info'
- print err
- return None
-
- if out:
- certInfolist = out.split(os.linesep)
- else:
- print 'Empty certificate info'
- return None
-
- notBefore = None
- notAfter = None
- subject = None
-
- for item in range(len(certInfolist)):
-
- if certInfolist[item].startswith('notAfter='):
- notAfter = certInfolist[item].split('=')[1]
- if certInfolist[item].startswith('notBefore='):
- notBefore = certInfolist[item].split('=')[1]
-
- if certInfolist[item].startswith('subject='):
- subject = certInfolist[item].split('=', 1)[1]
-
- #Convert subj to dict
- pattern = re.compile(r"[A-Z]{1,2}=[\w.-]{1,}")
- if subject:
- subjList = pattern.findall(subject)
- keys = [item.split('=')[0] for item in subjList]
- values = [item.split('=')[1] for item in subjList]
- subjDict = dict(zip(keys, values))
-
- result = subjDict
- result['notBefore'] = notBefore
- result['notAfter'] = notAfter
- result['subject'] = subject
-
- return result
- else:
- return {}
- def is_valid_cert_exp(certInfoDict):
- if certInfoDict.has_key(NOT_BEFORE_ATTR):
- notBefore = certInfoDict[NOT_BEFORE_ATTR]
- else:
- print_warning_msg('There is no Not Before value in certificate')
- return False
- if certInfoDict.has_key(NOT_AFTER_ATTR):
- notAfter = certInfoDict['notAfter']
- else:
- print_warning_msg('There is no Not After value in certificate')
- return False
-
-
- notBeforeDate = datetime.datetime.strptime(notBefore, SSL_DATE_FORMAT)
- notAfterDate = datetime.datetime.strptime(notAfter, SSL_DATE_FORMAT)
-
- currentDate = datetime.datetime.now()
-
- if currentDate > notAfterDate:
- print_warning_msg('Certificate was expired on: ' + str(notAfterDate))
- return False
-
- if currentDate < notBeforeDate:
- print_warning_msg('Certificate will be active from: ' + str(notBeforeDate))
- return False
- return True
- def is_valid_cert_host(certInfoDict):
- if certInfoDict.has_key(COMMON_NAME_ATTR):
- commonName = certInfoDict[COMMON_NAME_ATTR]
- else:
- print_warning_msg('There is no Common name in certificate')
- return False
- fqdn = get_fqdn()
- if not fqdn:
- print_warning_msg('Failed to get server FQDN')
- return False
-
- if commonName != fqdn:
- print_warning_msg('Common name in certificate: ' + commonName + ' doesn\'t matches the server hostname: ' + fqdn)
- return False
- return True
- def get_fqdn():
- properties = get_ambari_properties()
- if properties == -1:
- print "Error getting ambari properties"
- return None
- get_fqdn_service_url = properties[GET_FQDN_SERVICE_URL]
- try:
- handle = urllib2.urlopen(get_fqdn_service_url, '', 2)
- str = handle.read()
- handle.close()
- return str
- except Exception, e:
- return socket.getfqdn()
- #
- # Main.
- #
- def main():
- parser = optparse.OptionParser(usage="usage: %prog [options] action [stack_id]",)
- parser.add_option('-f', '--init-script-file',
- default='/var/lib/ambari-server/'
- 'resources/Ambari-DDL-Postgres-CREATE.sql',
- help="File with setup script")
- parser.add_option('-r', '--drop-script-file', default="/var/lib/"
- "ambari-server/resources/"
- "Ambari-DDL-Postgres-DROP.sql",
- help="File with drop script")
- parser.add_option('-u', '--upgrade-script-file', default="/var/lib/"
- "ambari-server/resources/upgrade/ddl/"
- "Ambari-DDL-Postgres-UPGRADE-1.3.0.sql",
- help="File with upgrade script")
- parser.add_option('-t', '--upgrade-stack-script-file', default="/var/lib/"
- "ambari-server/resources/upgrade/dml/"
- "Ambari-DML-Postgres-UPGRADE_STACK.sql",
- help="File with stack upgrade script")
- parser.add_option('-j', '--java-home', default=None,
- help="Use specified java_home. Must be valid on all hosts")
- parser.add_option('-i', '--jdk-location', dest="jdk_location", default=None,
- help="Use specified JDK file in local filesystem instead of downloading")
- parser.add_option('-c', '--jce-policy', default=None,
- help="Use specified jce_policy. Must be valid on all hosts", dest="jce_policy")
- parser.add_option("-v", "--verbose",
- action="store_true", dest="verbose", default=False,
- help="Print verbose status messages")
- parser.add_option("-s", "--silent",
- action="store_true", dest="silent", default=False,
- help="Silently accepts default prompt values")
- parser.add_option('-g', '--debug', action="store_true", dest='debug', default=False,
- help="Start ambari-server in debug mode")
- parser.add_option('--database', default=None, help ="Database to use postgres|oracle", dest="database")
- parser.add_option('--databasehost', default=None, help="Hostname of database server", dest="database_host")
- parser.add_option('--databaseport', default=None, help="Database port", dest="database_port")
- parser.add_option('--databasename', default=None, help="Database/Schema/Service name or ServiceID",
- dest="database_name")
- parser.add_option('--databaseusername', default=None, help="Database user login", dest="database_username")
- parser.add_option('--databasepassword', default=None, help="Database user password", dest="database_password")
- parser.add_option('--sidorsname', default="sname", help="Oracle database identifier type, Service ID/Service "
- "Name sid|sname", dest="sid_or_sname")
- (options, args) = parser.parse_args()
- # set verbose
- global VERBOSE
- VERBOSE = options.verbose
- # set silent
- global SILENT
- SILENT = options.silent
- # debug mode
- global SERVER_DEBUG_MODE
- SERVER_DEBUG_MODE = options.debug
- global DATABASE_INDEX
- global PROMPT_DATABASE_OPTIONS
- #perform checks
- options.warnings = []
- if options.database is None \
- and options.database_host is None \
- and options.database_port is None \
- and options.database_name is None \
- and options.database_username is None \
- and options.database_password is None:
- PROMPT_DATABASE_OPTIONS = True
- elif not (options.database is not None
- and options.database_host is not None
- and options.database_port is not None
- and options.database_name is not None
- and options.database_username is not None
- and options.database_password is not None):
- parser.error('All database options should be set. Please see help for the options.')
- #correct database
- if options.database is not None and options.database not in DATABASE_NAMES:
- parser.print_help()
- parser.error("Unsupported Database " + options.database)
- elif options.database is not None:
- options.database = options.database.lower()
- DATABASE_INDEX = DATABASE_NAMES.index(options.database)
- #correct port
- if options.database_port is not None:
- correct=False
- try:
- port = int(options.database_port)
- if 65536 > port > 0:
- correct = True
- except ValueError:
- pass
- if not correct:
- parser.print_help()
- parser.error("Incorrect database port " + options.database_port)
- if options.database is not None and options.database == "postgres":
- print "WARNING: HostName for postgres server " + options.database_host + \
- " will be ignored: using localhost."
- options.database_host = "localhost"
- if options.sid_or_sname.lower() not in ["sid", "sname"]:
- print "WARNING: Valid values for sid_or_sname are 'sid' or 'sname'. Use 'sid' if the db identifier type is " \
- "Service ID. Use 'sname' if the db identifier type is Service Name"
- parser.print_help()
- exit(-1)
- else:
- options.sid_or_sname = options.sid_or_sname.lower()
- if len(args) == 0:
- print parser.print_help()
- parser.error("No action entered")
- action = args[0]
- if action == UPGRADE_STACK_ACTION:
- args_number_required = 2
- else:
- args_number_required = 1
- if len(args) < args_number_required:
- print parser.print_help()
- parser.error("Invalid number of arguments. Entered: " + str(len(args)) + ", required: " + str(args_number_required))
- options.exit_message = "Ambari Server '%s' completed successfully." % action
- try:
- if action == SETUP_ACTION:
- setup(options)
- elif action == START_ACTION:
- start(options)
- elif action == STOP_ACTION:
- stop(options)
- elif action == RESET_ACTION:
- reset(options)
- elif action == STATUS_ACTION:
- status(options)
- elif action == UPGRADE_ACTION:
- upgrade(options)
- elif action == UPGRADE_STACK_ACTION:
- stack_id = args[1]
- upgrade_stack(options, stack_id)
- elif action == LDAP_SETUP_ACTION:
- setup_ldap()
- elif action == ENCRYPT_PASSWORDS_ACTION:
- setup_master_key()
- elif action == UPDATE_METAINFO_ACTION:
- update_metainfo(options)
- elif action == SETUP_HTTPS_ACTION:
- setup_https(options)
- else:
- parser.error("Invalid action")
- except FatalException as e:
- if e.reason is not None:
- print_error_msg("Exiting with exit code {0}. Reason: {1}".format(e.code, e.reason))
- sys.exit(e.code)
- except NonFatalException as e:
- options.exit_message = "Ambari Server '%s' completed with warnings." % action
- if e.reason is not None:
- print_warning_msg(e.reason)
- if options.exit_message is not None:
- print options.exit_message
- # A Python replacement for java.util.Properties
- # Based on http://code.activestate.com/recipes
- # /496795-a-python-replacement-for-javautilproperties/
- class Properties(object):
- def __init__(self, props=None):
- self._props = {}
- self._origprops = {}
- self._keymap = {}
- self.othercharre = re.compile(r'(?<!\\)(\s*\=)|(?<!\\)(\s*\:)')
- self.othercharre2 = re.compile(r'(\s*\=)|(\s*\:)')
- self.bspacere = re.compile(r'\\(?!\s$)')
- def __parse(self, lines):
- lineno = 0
- i = iter(lines)
- for line in i:
- lineno += 1
- line = line.strip()
- if not line: continue
- if line[0] == '#': continue
- escaped = False
- sepidx = -1
- flag = 0
- m = self.othercharre.search(line)
- if m:
- first, last = m.span()
- start, end = 0, first
- flag = 1
- wspacere = re.compile(r'(?<![\\\=\:])(\s)')
- else:
- if self.othercharre2.search(line):
- wspacere = re.compile(r'(?<![\\])(\s)')
- start, end = 0, len(line)
- m2 = wspacere.search(line, start, end)
- if m2:
- first, last = m2.span()
- sepidx = first
- elif m:
- first, last = m.span()
- sepidx = last - 1
- while line[-1] == '\\':
- nextline = i.next()
- nextline = nextline.strip()
- lineno += 1
- line = line[:-1] + nextline
- if sepidx != -1:
- key, value = line[:sepidx], line[sepidx + 1:]
- else:
- key, value = line, ''
- self.process_pair(key, value)
- def process_pair(self, key, value):
- oldkey = key
- oldvalue = value
- keyparts = self.bspacere.split(key)
- strippable = False
- lastpart = keyparts[-1]
- if lastpart.find('\\ ') != -1:
- keyparts[-1] = lastpart.replace('\\', '')
- elif lastpart and lastpart[-1] == ' ':
- strippable = True
- key = ''.join(keyparts)
- if strippable:
- key = key.strip()
- oldkey = oldkey.strip()
- oldvalue = self.unescape(oldvalue)
- value = self.unescape(value)
- self._props[key] = None if value is None else value.strip()
- if self._keymap.has_key(key):
- oldkey = self._keymap.get(key)
- self._origprops[oldkey] = None if oldvalue is None else oldvalue.strip()
- else:
- self._origprops[oldkey] = None if oldvalue is None else oldvalue.strip()
- self._keymap[key] = oldkey
-
- def unescape(self, value):
- newvalue = value
- if not value is None:
- newvalue = value.replace('\:', ':')
- newvalue = newvalue.replace('\=', '=')
- return newvalue
- def removeOldProp(self, key):
- if self._origprops.has_key(key):
- del self._origprops[key]
- pass
-
- def load(self, stream):
- if type(stream) is not file:
- raise TypeError, 'Argument should be a file object!'
- if stream.mode != 'r':
- raise ValueError, 'Stream should be opened in read-only mode!'
- try:
- self.fileName = os.path.abspath(stream.name)
- lines = stream.readlines()
- self.__parse(lines)
- except IOError, e:
- raise
- def get_property(self, key):
- return self._props.get(key, '')
- def propertyNames(self):
- return self._props.keys()
- def getPropertyDict(self):
- return self._props
- def __getitem__(self, name):
- return self.get_property(name)
- def __getattr__(self, name):
- try:
- return self.__dict__[name]
- except KeyError:
- if hasattr(self._props, name):
- return getattr(self._props, name)
- def store(self, out, header=""):
- """ Write the properties list to the stream 'out' along
- with the optional 'header' """
- if out.mode[0] != 'w':
- raise ValueError,'Steam should be opened in write mode!'
- try:
- out.write(''.join(('#', ASF_LICENSE_HEADER, '\n')))
- out.write(''.join(('#',header,'\n')))
- # Write timestamp
- tstamp = time.strftime('%a %b %d %H:%M:%S %Z %Y', time.localtime())
- out.write(''.join(('#',tstamp,'\n')))
- # Write properties from the pristine dictionary
- for prop, val in self._origprops.items():
- if val is not None:
- out.write(''.join((prop,'=',val,'\n')))
- out.close()
- except IOError, e:
- raise
- if __name__ == "__main__":
- try:
- main()
- except (KeyboardInterrupt, EOFError):
- print("\nAborting ... Keyboard Interrupt.")
- sys.exit(1)
|