kerberos.js 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596
  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. var App = require('app');
  19. require('controllers/main/admin/kerberos/step4_controller');
  20. App.MainAdminKerberosController = App.KerberosWizardStep4Controller.extend({
  21. name: 'mainAdminKerberosController',
  22. securityEnabled: false,
  23. defaultKerberosLoaded: false,
  24. dataIsLoaded: false,
  25. isRecommendedLoaded: true,
  26. isEditMode: false,
  27. kdc_type: '',
  28. kdcTypesValues: {
  29. 'mit-kdc': Em.I18n.t('admin.kerberos.wizard.step1.option.kdc'),
  30. 'active-directory': Em.I18n.t('admin.kerberos.wizard.step1.option.ad'),
  31. 'none': Em.I18n.t('admin.kerberos.wizard.step1.option.manual')
  32. },
  33. getAddSecurityWizardStatus: function () {
  34. return App.db.getSecurityWizardStatus();
  35. },
  36. setAddSecurityWizardStatus: function (status) {
  37. App.db.setSecurityWizardStatus(status);
  38. },
  39. setDisableSecurityStatus: function (status) {
  40. App.db.setDisableSecurityStatus(status);
  41. },
  42. getDisableSecurityStatus: function (status) {
  43. return App.db.getDisableSecurityStatus();
  44. },
  45. notifySecurityOff: false,
  46. notifySecurityAdd: false,
  47. notifySecurityOffPopup: function () {
  48. var self = this;
  49. this.checkServiceWarnings().then(function() {
  50. App.ModalPopup.show({
  51. header: Em.I18n.t('popup.confirmation.commonHeader'),
  52. primary: Em.I18n.t('ok'),
  53. onPrimary: function () {
  54. App.db.setSecurityDeployCommands(undefined);
  55. self.setDisableSecurityStatus("RUNNING");
  56. App.router.transitionTo('disableSecurity');
  57. this.hide();
  58. },
  59. bodyClass: Ember.View.extend({
  60. templateName: require('templates/main/admin/kerberos/notify_security_off_popup')
  61. })
  62. });
  63. });
  64. },
  65. /**
  66. * Show confirmation popup for regenerate keytabs
  67. * @method regenerateKeytabs
  68. * @param callback function (optional)
  69. * @return {App.ModalPopup}
  70. */
  71. regenerateKeytabs: function (callback) {
  72. var self = this;
  73. return App.ModalPopup.show({
  74. /**
  75. * True - regenerate keytabs only for missing hosts and components, false - regenerate for all hosts and components
  76. * @type {boolean}
  77. */
  78. regenerateKeytabsOnlyForMissing: false,
  79. header: Em.I18n.t('admin.kerberos.button.regenerateKeytabs'),
  80. bodyClass: Em.View.extend({
  81. templateName: require('templates/main/admin/kerberos/regenerate_keytabs_popup_body')
  82. }),
  83. onPrimary: function () {
  84. this._super();
  85. return self.restartServicesAfterRegenerate(this.get('regenerateKeytabsOnlyForMissing'), callback);
  86. }
  87. });
  88. },
  89. /**
  90. * Show confirmation popup for restarting all services and after confirmation regenerate keytabs
  91. *
  92. * @param regenerateKeytabsOnlyForMissing {Boolean}
  93. * @param callback (optional)
  94. * @returns {*}
  95. */
  96. restartServicesAfterRegenerate: function (regenerateKeytabsOnlyForMissing, callback) {
  97. var self = this;
  98. return App.ModalPopup.show({
  99. /**
  100. * True - automatically restart services, false - user will have to restart required services manually
  101. * @type {boolean}
  102. */
  103. restartComponents: false,
  104. header: Em.I18n.t('admin.kerberos.button.regenerateKeytabs'),
  105. bodyClass: Em.View.extend({
  106. templateName: require('templates/main/admin/kerberos/restart_services_after_regenerate_body')
  107. }),
  108. onPrimary: function () {
  109. this._super();
  110. var popupContext = this;
  111. // Keytabs can either be regenerated directly or after updating kerberos descriptor in the callback function
  112. if (Em.typeOf(callback) === 'function') {
  113. callback().done(function () {
  114. self.regenerateKeytabsRequest(regenerateKeytabsOnlyForMissing, popupContext.get('restartComponents'));
  115. });
  116. } else {
  117. self.regenerateKeytabsRequest(regenerateKeytabsOnlyForMissing, popupContext.get('restartComponents'));
  118. }
  119. }
  120. });
  121. },
  122. /**
  123. * Send request to regenerate keytabs
  124. * @param {boolean} missingOnly determines type of regeneration - missing|all
  125. * @param {boolean} withAutoRestart determines if the system should automatically restart all services or not after regeneration
  126. * @returns {$.ajax}
  127. */
  128. regenerateKeytabsRequest: function (missingOnly, withAutoRestart) {
  129. missingOnly = missingOnly || false;
  130. return App.ajax.send({
  131. name: "admin.kerberos_security.regenerate_keytabs",
  132. sender: this,
  133. data: {
  134. type: missingOnly ? 'missing' : 'all',
  135. withAutoRestart: withAutoRestart || false
  136. },
  137. success: "regenerateKeytabsSuccess"
  138. });
  139. },
  140. /**
  141. * Success callback of <code>regenerateKeytabs</code>
  142. * show background operations popup if appropriate option is set
  143. *
  144. * @param data
  145. * @param opt
  146. * @param params
  147. * @param request
  148. */
  149. regenerateKeytabsSuccess: function (data, opt, params, request) {
  150. var self = this;
  151. App.router.get('userSettingsController').dataLoading('show_bg').done(function (initValue) {
  152. if (initValue) {
  153. App.router.get('backgroundOperationsController').showPopup();
  154. }
  155. self.set('needsRestartAfterRegenerate', params.withAutoRestart);
  156. });
  157. },
  158. /**
  159. * Do request to server for restarting all services
  160. * @method restartAllServices
  161. * @return {$.ajax}
  162. */
  163. restartAllServices: function () {
  164. if (!App.router.get('backgroundOperationsController.allOperationsCount')) {
  165. if (this.get('needsRestartAfterRegenerate')) {
  166. this.set('needsRestartAfterRegenerate', false);
  167. App.router.get('mainServiceController').restartAllServices();
  168. }
  169. }
  170. }.observes('controllers.backgroundOperationsController.allOperationsCount'),
  171. /**
  172. * performs cluster check before kerbefos security
  173. * wizard starts if <code>preKerberizeCheck<code> supports is true
  174. * otherwise runs <code>startKerberosWizard<code>
  175. * @method checkAndStartKerberosWizard
  176. */
  177. checkAndStartKerberosWizard: function () {
  178. if (App.get('supports.preKerberizeCheck')) {
  179. App.ajax.send({
  180. name: "admin.kerberos_security.checks",
  181. sender: this,
  182. success: "runSecurityCheckSuccess"
  183. });
  184. } else {
  185. this.startKerberosWizard();
  186. }
  187. },
  188. /**
  189. * success callback of <code>checkAndStartKerberosWizard()</code>
  190. * if there are some fails - it shows popup else open security wizard
  191. * @param data {object}
  192. * @param opt {object}
  193. * @param params {object}
  194. */
  195. runSecurityCheckSuccess: function (data, opt, params) {
  196. //TODO correct check
  197. if (data.items.someProperty('UpgradeChecks.status', "FAIL")) {
  198. var
  199. hasFails = data.items.someProperty('UpgradeChecks.status', 'FAIL'),
  200. header = Em.I18n.t('popup.clusterCheck.Security.header').format(params.label),
  201. title = Em.I18n.t('popup.clusterCheck.Security.title'),
  202. alert = Em.I18n.t('popup.clusterCheck.Security.alert');
  203. App.showClusterCheckPopup(data, {
  204. header: header,
  205. failTitle: title,
  206. failAlert: alert,
  207. noCallbackCondition: hasFails
  208. });
  209. } else {
  210. this.startKerberosWizard();
  211. }
  212. },
  213. startKerberosWizard: function () {
  214. var self = this;
  215. this.checkServiceWarnings().then(function() {
  216. self.setAddSecurityWizardStatus('RUNNING');
  217. App.router.get('kerberosWizardController').setDBProperty('onClosePath', 'main.admin.adminKerberos.index');
  218. App.router.transitionTo('adminKerberos.adminAddKerberos');
  219. });
  220. },
  221. /**
  222. * Loads the security status from server (security_enabled property in cluster-env configuration)
  223. */
  224. loadSecurityStatusFromServer: function () {
  225. if (App.get('testMode')) {
  226. this.set('securityEnabled', !App.get('testEnableSecurity'));
  227. this.set('dataIsLoaded', true);
  228. } else {
  229. //get Security Status From Server
  230. this.getSecurityType();
  231. return this.getSecurityStatus();
  232. }
  233. },
  234. /**
  235. * Load security status from server.
  236. * @returns {$.Deferred}
  237. */
  238. getSecurityStatus: function () {
  239. var self = this;
  240. var dfd = $.Deferred();
  241. if (App.get('testMode')) {
  242. this.set('securityEnabled', !App.get('testEnableSecurity'));
  243. this.set('dataIsLoaded', true);
  244. dfd.resolve();
  245. } else {
  246. //get Security Status From Server
  247. App.ajax.send({
  248. name: 'admin.security_status',
  249. sender: this,
  250. success: 'getSecurityStatusSuccessCallback',
  251. error: 'errorCallback'
  252. })
  253. .always(function() {
  254. self.getSecurityType(function() {
  255. dfd.resolve();
  256. });
  257. });
  258. }
  259. return dfd.promise();
  260. },
  261. getSecurityStatusSuccessCallback: function (data) {
  262. this.set('dataIsLoaded', true);
  263. var securityType = data.Clusters.security_type;
  264. this.set('securityEnabled', securityType === 'KERBEROS');
  265. },
  266. errorCallback: function (jqXHR) {
  267. this.set('dataIsLoaded', true);
  268. // Show the error popup if the API call received a response from the server.
  269. // jqXHR.status will be empty when browser cancels the request. Refer to AMBARI-5921 for more info
  270. if (!!jqXHR.status) {
  271. this.showSecurityErrorPopup();
  272. }
  273. },
  274. showSecurityErrorPopup: function () {
  275. App.ModalPopup.show({
  276. header: Em.I18n.t('common.error'),
  277. secondary: false,
  278. bodyClass: Ember.View.extend({
  279. template: Ember.Handlebars.compile('<p>{{t admin.security.status.error}}</p>')
  280. })
  281. });
  282. },
  283. /**
  284. * Override <code>App.KerberosWizardStep4Controller</code>
  285. */
  286. clearStep: function() {
  287. this.set('isEditMode', false);
  288. this._super();
  289. },
  290. /**
  291. * Override <code>App.KerberosWizardStep4Controller</code>
  292. *
  293. * @param {App.ServiceConfigProperty[]} properties
  294. */
  295. setStepConfigs: function (properties) {
  296. this.get('stepConfigs').clear();
  297. this._super(properties);
  298. this.get('stepConfigs').forEach(function (serviceConfig) {
  299. serviceConfig.set('initConfigsLength', serviceConfig.get('configs.length'));
  300. });
  301. },
  302. /**
  303. * Override <code>App.KerberosWizardStep4Controller</code>
  304. *
  305. * @param {App.ServiceConfigProperty[]} configs
  306. * @returns {App.ServiceConfigProperty[]}
  307. */
  308. prepareConfigProperties: function (configs) {
  309. var self = this;
  310. var configProperties = configs.slice(0);
  311. var siteProperties = App.configsCollection.getAll();
  312. var installedServiceNames = ['Cluster'].concat(App.Service.find().mapProperty('serviceName'));
  313. configProperties = configProperties.filter(function (item) {
  314. return installedServiceNames.contains(item.get('serviceName'));
  315. });
  316. configProperties.setEach('isSecureConfig', false);
  317. configProperties.forEach(function (property, item, allConfigs) {
  318. if (['spnego_keytab', 'spnego_principal'].contains(property.get('name'))) {
  319. property.addObserver('value', self, 'spnegoPropertiesObserver');
  320. }
  321. if (property.get('observesValueFrom')) {
  322. var observedValue = allConfigs.findProperty('name', property.get('observesValueFrom')).get('value');
  323. property.set('value', observedValue);
  324. property.set('recommendedValue', observedValue);
  325. }
  326. if (property.get('serviceName') == 'Cluster') {
  327. property.set('category', 'Global');
  328. } else {
  329. property.set('category', property.get('serviceName'));
  330. }
  331. // All user identity should be grouped under "Ambari Principals" category
  332. if (property.get('identityType') == 'user') property.set('category', 'Ambari Principals');
  333. var siteProperty = siteProperties.findProperty('name', property.get('name'));
  334. if (siteProperty) {
  335. if (siteProperty.category === property.get('category')) {
  336. property.set('displayName', siteProperty.displayName);
  337. if (siteProperty.index) {
  338. property.set('index', siteProperty.index);
  339. }
  340. }
  341. if (siteProperty.displayType) {
  342. property.set('displayType', siteProperty.displayType);
  343. }
  344. }
  345. });
  346. configProperties.setEach('isEditable', false);
  347. return configProperties;
  348. },
  349. getKDCSessionState: function (callback, kdcCancelHandler) {
  350. var self = this;
  351. if (this.get('securityEnabled') || App.get('isKerberosEnabled')) {
  352. this.getSecurityType(function () {
  353. if (!self.get('isManualKerberos')) {
  354. App.ajax.send({
  355. name: 'kerberos.session.state',
  356. sender: self,
  357. data: {
  358. callback: callback
  359. },
  360. success: 'checkState',
  361. kdcCancelHandler: kdcCancelHandler
  362. })
  363. } else {
  364. callback();
  365. }
  366. });
  367. } else {
  368. callback();
  369. }
  370. },
  371. /**
  372. * Determines security type.
  373. *
  374. * @param {function} [callback] callback function to execute
  375. * @returns {$.Deferred|null}
  376. */
  377. getSecurityType: function (callback) {
  378. if (this.get('securityEnabled') || App.get('isKerberosEnabled')) {
  379. if (!this.get('kdc_type')) {
  380. return App.ajax.send({
  381. name: 'admin.security.cluster_configs.kerberos',
  382. sender: this,
  383. data: {
  384. clusterName: App.get('clusterName'),
  385. additionalCallback: callback
  386. },
  387. success: 'getSecurityTypeSuccess'
  388. });
  389. } else {
  390. if (Em.typeOf(callback) === 'function') {
  391. callback();
  392. }
  393. return $.Deferred().resolve().promise;
  394. }
  395. } else if (Em.typeOf(callback) === 'function') {
  396. callback();
  397. } else {
  398. return $.Deferred().resolve().promise;
  399. }
  400. },
  401. getSecurityTypeSuccess: function (data, opt, params) {
  402. var kdcType = data.items && data.items[0] &&
  403. Em.getWithDefault(Em.getWithDefault(data.items[0], 'configurations', []).findProperty('type', 'kerberos-env') || {}, 'properties.kdc_type', 'none') || 'none';
  404. this.set('kdc_type', kdcType);
  405. if (Em.typeOf(params.additionalCallback) === 'function') {
  406. params.additionalCallback();
  407. }
  408. },
  409. isManualKerberos: Em.computed.equal('kdc_type', 'none'),
  410. checkState: function (data, opt, params) {
  411. var res = Em.get(data, 'Services.attributes.kdc_validation_result');
  412. var message = Em.get(data, 'Services.attributes.kdc_validation_failure_details');
  413. if (res.toUpperCase() === "OK") {
  414. params.callback();
  415. } else {
  416. App.showInvalidKDCPopup(opt, App.format.kdcErrorMsg(message, false));
  417. }
  418. },
  419. /**
  420. * Determines if some config value is changed
  421. * @type {boolean}
  422. */
  423. isPropertiesChanged: Em.computed.someBy('stepConfigs', 'isPropertiesChanged', true),
  424. /**
  425. * Determines if the save button is disabled
  426. */
  427. isSaveButtonDisabled: Em.computed.or('isSubmitDisabled', '!isPropertiesChanged'),
  428. /**
  429. * Determines if the `Disbale Kerberos` and `Regenerate Keytabs` button are disabled
  430. */
  431. isKerberosButtonsDisabled: Em.computed.not('isSaveButtonDisabled'),
  432. makeConfigsEditable: function () {
  433. if (this.get('stepConfigs') && this.get('stepConfigs.length')) {
  434. this.set('isEditMode', true);
  435. this.get('stepConfigs').forEach(function (_stepConfig) {
  436. _stepConfig.get('configs').setEach('isEditable', true);
  437. _stepConfig.get('configs').forEach(function (_config) {
  438. _config.set('isEditable', _config.get('name') != 'realm');
  439. });
  440. }, this);
  441. }
  442. },
  443. _updateConfigs: function () {
  444. this.makeConfigsUneditable(true);
  445. },
  446. makeConfigsUneditable: function (configsUpdated) {
  447. this.set('isEditMode', false);
  448. this.get('stepConfigs').forEach(function (_stepConfig) {
  449. _stepConfig.get('configs').forEach(function (_config) {
  450. if (configsUpdated === true) { // configsUpdated should be checked for boolean true
  451. _config.set('savedValue', _config.get('value'));
  452. _config.set('defaultValue', _config.get('value'));
  453. } else {
  454. _config.set('value', _config.get('savedValue'));
  455. }
  456. _config.set('isEditable', false);
  457. });
  458. }, this);
  459. },
  460. /**
  461. * Update kerberos descriptor and regenerate keytabs
  462. */
  463. submit: function (context) {
  464. var callback;
  465. var self = this;
  466. var kerberosDescriptor = this.get('kerberosDescriptor');
  467. var configs = [];
  468. this.get('stepConfigs').forEach(function (_stepConfig) {
  469. configs = configs.concat(_stepConfig.get('configs'));
  470. });
  471. callback = function () {
  472. return App.ajax.send({
  473. name: 'admin.kerberos.cluster.artifact.update',
  474. sender: self,
  475. data: {
  476. artifactName: 'kerberos_descriptor',
  477. data: {
  478. artifact_data: kerberosDescriptor
  479. }
  480. },
  481. success: '_updateConfigs'
  482. });
  483. };
  484. this.updateKerberosDescriptor(kerberosDescriptor, configs);
  485. if (this.get('isManualKerberos')) {
  486. callback().done(function () {
  487. self.regenerateKeytabsRequest(false,false);
  488. });
  489. } else {
  490. this.restartServicesAfterRegenerate(false, callback);
  491. }
  492. },
  493. /**
  494. * List of the warnings regarding specific services before enabling/disabling Kerberos.
  495. *
  496. * @type {String[]}
  497. */
  498. serviceAlerts: function() {
  499. var messages = [];
  500. var serviceAlertMap = {
  501. YARN: Em.I18n.t('admin.kerberos.service.alert.yarn')
  502. };
  503. var installedServices = App.Service.find().mapProperty('serviceName');
  504. Em.keys(serviceAlertMap).forEach(function(serviceName) {
  505. if (installedServices.contains(serviceName)) {
  506. messages.push(serviceAlertMap[serviceName]);
  507. }
  508. });
  509. return messages;
  510. }.property(),
  511. /**
  512. * Check for additional info to display before enabling/disabling kerberos and show appropriate
  513. * messages in popup if needed.
  514. * @returns {$.Deferred} - promise
  515. */
  516. checkServiceWarnings: function() {
  517. var dfd = $.Deferred();
  518. this.displayServiceWarnings(this.get('serviceAlerts'), dfd);
  519. return dfd.promise();
  520. },
  521. /**
  522. * Show appropriate message regarding changes affected after enabling/disabling Kerberos
  523. *
  524. * @param {String[]} messages - list of the messages to display
  525. * @param {$.Deferred} dfd - used to break recursive calls and reject/resolve promise returned by <code>checkServiceWarnings</code>
  526. */
  527. displayServiceWarnings: function(messages, dfd) {
  528. var self = this;
  529. if (!messages.get('length')) {
  530. dfd.resolve();
  531. } else {
  532. App.showConfirmationPopup(function() {
  533. self.displayServiceWarnings(messages.slice(1), dfd);
  534. }, messages[0], function() {
  535. dfd.reject();
  536. }, Em.I18n.t('common.warning'), Em.I18n.t('common.proceedAnyway'));
  537. }
  538. },
  539. showManageKDCCredentialsPopup: function() {
  540. return App.showManageCredentialsPopup();
  541. }
  542. });