secure_mapping.js 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478
  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. module.exports = [
  19. {
  20. "name": "hadoop.security.authentication",
  21. "templateName": [],
  22. "foreignKey": null,
  23. "value": "kerberos",
  24. "filename": "core-site.xml",
  25. "serviceName": "HDFS"
  26. },
  27. {
  28. "name": "hadoop.security.authorization",
  29. "templateName": [],
  30. "foreignKey": null,
  31. "value": "true",
  32. "filename": "core-site.xml",
  33. "serviceName": "HDFS"
  34. },
  35. {
  36. "name": "hadoop.security.auth_to_local",
  37. "templateName": ["jobtracker_primary_name", "kerberos_domain", "mapred_user", "tasktracker_primary_name", "namenode_primary_name", "hdfs_user", "datanode_primary_name", "hbase_primary_name", "hbase_user"],
  38. "foreignKey": null,
  39. "value": "RULE:[2:$1@$0](<templateName[0]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[3]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[4]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[6]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nDEFAULT",
  40. "filename": "core-site.xml",
  41. "serviceName": "HDFS"
  42. },
  43. {
  44. "name": "dfs.namenode.kerberos.principal",
  45. "templateName": ["namenode_principal_name", "kerberos_domain"],
  46. "foreignKey": null,
  47. "value": "<templateName[0]>@<templateName[1]>",
  48. "filename": "hdfs-site.xml",
  49. "serviceName": "HDFS"
  50. },
  51. {
  52. "name": "dfs.namenode.keytab.file",
  53. "templateName": ["namenode_keytab"],
  54. "foreignKey": null,
  55. "value": "<templateName[0]>",
  56. "filename": "hdfs-site.xml",
  57. "serviceName": "HDFS"
  58. },
  59. {
  60. "name": "dfs.secondary.namenode.kerberos.principal",
  61. "templateName": ["namenode_principal_name", "kerberos_domain"],
  62. "foreignKey": null,
  63. "value": "<templateName[0]>@<templateName[1]>",
  64. "filename": "hdfs-site.xml"
  65. },
  66. {
  67. "name": "dfs.secondary.namenode.keytab.file",
  68. "templateName": ["namenode_keytab"],
  69. "foreignKey": null,
  70. "value": "<templateName[0]>",
  71. "filename": "hdfs-site.xml",
  72. "serviceName": "HDFS"
  73. },
  74. {
  75. "name": "dfs.web.authentication.kerberos.principal",
  76. "templateName": ["hadoop_http_principal_name", "kerberos_domain"],
  77. "foreignKey": null,
  78. "value": "<templateName[0]>@<templateName[1]>",
  79. "filename": "hdfs-site.xml",
  80. "serviceName": "HDFS"
  81. },
  82. {
  83. "name": "dfs.web.authentication.kerberos.keytab",
  84. "templateName": ["hadoop_http_keytab"],
  85. "foreignKey": null,
  86. "value": "<templateName[0]>",
  87. "filename": "hdfs-site.xml",
  88. "serviceName": "HDFS"
  89. },
  90. {
  91. "name": "dfs.datanode.kerberos.principal",
  92. "templateName": ["datanode_principal_name", "kerberos_domain"],
  93. "foreignKey": null,
  94. "value": "<templateName[0]>@<templateName[1]>",
  95. "filename": "hdfs-site.xml",
  96. "serviceName": "HDFS"
  97. },
  98. {
  99. "name": "dfs.datanode.keytab.file",
  100. "templateName": ["datanode_keytab"],
  101. "foreignKey": null,
  102. "value": "<templateName[0]>",
  103. "filename": "hdfs-site.xml",
  104. "serviceName": "HDFS"
  105. },
  106. {
  107. "name": "dfs.namenode.kerberos.internal.spnego.principal",
  108. "templateName": [],
  109. "foreignKey": null,
  110. "value": "${dfs.web.authentication.kerberos.principal}",
  111. "filename": "hdfs-site.xml",
  112. "serviceName": "HDFS"
  113. },
  114. {
  115. "name": "dfs.secondary.namenode.kerberos.internal.spnego.principal",
  116. "templateName": [],
  117. "foreignKey": null,
  118. "value": "${dfs.web.authentication.kerberos.principal}",
  119. "filename": "hdfs-site.xml",
  120. "serviceName": "HDFS"
  121. },
  122. {
  123. "name": "dfs.datanode.address",
  124. "templateName": ["dfs_datanode_address"],
  125. "foreignKey": null,
  126. "value": "0.0.0.0:<templateName[0]>",
  127. "filename": "hdfs-site.xml",
  128. "serviceName": "HDFS"
  129. },
  130. {
  131. "name": "dfs.datanode.http.address",
  132. "templateName": ["dfs_datanode_http_address"],
  133. "foreignKey": null,
  134. "value": "0.0.0.0:<templateName[0]>",
  135. "filename": "hdfs-site.xml",
  136. "serviceName": "HDFS"
  137. },
  138. {
  139. "name": "mapreduce.jobtracker.kerberos.principal",
  140. "templateName": ["jobtracker_principal_name", "kerberos_domain"],
  141. "foreignKey": null,
  142. "value": "<templateName[0]>@<templateName[1]>",
  143. "filename": "mapred-site.xml",
  144. "serviceName": "MAPREDUCE"
  145. },
  146. {
  147. "name": "mapreduce.jobtracker.keytab.file",
  148. "templateName": ["jobtracker_keytab"],
  149. "foreignKey": null,
  150. "value": "<templateName[0]>",
  151. "filename": "mapred-site.xml",
  152. "serviceName": "MAPREDUCE"
  153. },
  154. {
  155. "name": "mapreduce.jobhistory.kerberos.principal",
  156. "templateName": ["jobtracker_principal_name", "kerberos_domain"],
  157. "foreignKey": null,
  158. "value": "<templateName[0]>@<templateName[1]>",
  159. "filename": "mapred-site.xml",
  160. "serviceName": "MAPREDUCE"
  161. },
  162. {
  163. "name": "mapreduce.jobhistory.keytab.file",
  164. "templateName": ["jobtracker_keytab"],
  165. "foreignKey": null,
  166. "value": "<templateName[0]>",
  167. "filename": "mapred-site.xml",
  168. "serviceName": "MAPREDUCE"
  169. },
  170. {
  171. "name": "mapreduce.tasktracker.kerberos.principal",
  172. "templateName": ["tasktracker_principal_name", "kerberos_domain"],
  173. "foreignKey": null,
  174. "value": "<templateName[0]>@<templateName[1]>",
  175. "filename": "mapred-site.xml",
  176. "serviceName": "MAPREDUCE"
  177. },
  178. {
  179. "name": "mapreduce.tasktracker.keytab.file",
  180. "templateName": ["tasktracker_keytab"],
  181. "foreignKey": null,
  182. "value": "<templateName[0]>",
  183. "filename": "mapred-site.xml",
  184. "serviceName": "MAPREDUCE"
  185. },
  186. {
  187. "name": "hbase.master.kerberos.principal",
  188. "templateName": ["hbase_principal_name", "kerberos_domain"],
  189. "foreignKey": null,
  190. "value": "<templateName[0]>@<templateName[1]>",
  191. "filename": "hbase-site.xml",
  192. "serviceName": "HBASE"
  193. },
  194. {
  195. "name": "hbase.master.keytab.file",
  196. "templateName": ["hbase_service_keytab"],
  197. "foreignKey": null,
  198. "value": "<templateName[0]>",
  199. "filename": "hbase-site.xml",
  200. "serviceName": "HBASE"
  201. },
  202. {
  203. "name": "hbase.regionserver.kerberos.principal",
  204. "templateName": ["hbase_principal_name", "kerberos_domain"],
  205. "foreignKey": null,
  206. "value": "<templateName[0]>@<templateName[1]>",
  207. "filename": "hbase-site.xml",
  208. "serviceName": "HBASE"
  209. },
  210. {
  211. "name": "hbase.regionserver.keytab.file",
  212. "templateName": ["hbase_service_keytab"],
  213. "foreignKey": null,
  214. "value": "<templateName[0]>",
  215. "filename": "hbase-site.xml",
  216. "serviceName": "HBASE"
  217. },
  218. {
  219. "name": "hive.metastore.sasl.enabled",
  220. "templateName": [],
  221. "foreignKey": null,
  222. "value": "true",
  223. "filename": "hive-site.xml",
  224. "serviceName": "HIVE"
  225. },
  226. {
  227. "name": "hive.server2.authentication",
  228. "templateName": [],
  229. "foreignKey": null,
  230. "value": "KERBEROS",
  231. "filename": "hive-site.xml",
  232. "serviceName": "HIVE"
  233. },
  234. {
  235. "name": "hive.metastore.kerberos.principal",
  236. "templateName": ["hive_metastore_principal_name", "kerberos_domain"],
  237. "foreignKey": null,
  238. "value": "<templateName[0]>@<templateName[1]>",
  239. "filename": "hive-site.xml",
  240. "serviceName": "HIVE"
  241. },
  242. {
  243. "name": "hive.metastore.kerberos.keytab.file",
  244. "templateName": ["hive_metastore__keytab"],
  245. "foreignKey": null,
  246. "value": "<templateName[0]>",
  247. "filename": "hive-site.xml",
  248. "serviceName": "HIVE"
  249. },
  250. {
  251. "name": "hive.server2.authentication.kerberos.principal",
  252. "templateName": ["hive_metastore_principal_name", "kerberos_domain"],
  253. "foreignKey": null,
  254. "value": "<templateName[0]>@<templateName[1]>",
  255. "filename": "hive-site.xml",
  256. "serviceName": "HIVE"
  257. },
  258. {
  259. "name": "hive.server2.authentication.kerberos.keytab",
  260. "templateName": ["hive_metastore__keytab"],
  261. "foreignKey": null,
  262. "value": "<templateName[0]>",
  263. "filename": "hive-site.xml",
  264. "serviceName": "HIVE"
  265. },
  266. {
  267. "name": "oozie.service.AuthorizationService.authorization.enabled",
  268. "templateName": [],
  269. "foreignKey": null,
  270. "value": "true",
  271. "filename": "oozie-site.xml",
  272. "serviceName": "OOZIE"
  273. },
  274. {
  275. "name": "oozie.service.HadoopAccessorService.kerberos.enabled",
  276. "templateName": [],
  277. "foreignKey": null,
  278. "value": "true",
  279. "filename": "oozie-site.xml",
  280. "serviceName": "OOZIE"
  281. },
  282. {
  283. "name": "local.realm",
  284. "templateName": ["kerberos_domain"],
  285. "foreignKey": null,
  286. "value": "<templateName[0]>",
  287. "filename": "oozie-site.xml",
  288. "serviceName": "OOZIE"
  289. },
  290. {
  291. "name": "oozie.service.HadoopAccessorService.keytab.file",
  292. "templateName": ["oozie_keytab"],
  293. "foreignKey": null,
  294. "value": "<templateName[0]>",
  295. "filename": "oozie-site.xml",
  296. "serviceName": "OOZIE"
  297. },
  298. {
  299. "name": "oozie.service.HadoopAccessorService.kerberos.principal",
  300. "templateName": ["oozie_principal_name", "kerberos_domain"],
  301. "foreignKey": null,
  302. "value": "<templateName[0]>@<templateName[1]>",
  303. "filename": "oozie-site.xml",
  304. "serviceName": "OOZIE"
  305. },
  306. {
  307. "name": "oozie.authentication.type",
  308. "templateName": [],
  309. "foreignKey": null,
  310. "value": "kerberos",
  311. "filename": "oozie-site.xml",
  312. "serviceName": "OOZIE"
  313. },
  314. {
  315. "name": "oozie.authentication.kerberos.principal",
  316. "templateName": ["oozie_http_principal_name", "kerberos_domain"],
  317. "foreignKey": null,
  318. "value": "<templateName[0]>@<templateName[1]>",
  319. "filename": "oozie-site.xml",
  320. "serviceName": "OOZIE"
  321. },
  322. {
  323. "name": "oozie.authentication.kerberos.keytab",
  324. "templateName": ["hadoop_http_keytab"],
  325. "foreignKey": null,
  326. "value": "<templateName[0]>",
  327. "filename": "oozie-site.xml",
  328. "serviceName": "OOZIE"
  329. },
  330. {
  331. "name": "oozie.authentication.kerberos.name.rules",
  332. "templateName": ["jobtracker_primary_name", "kerberos_domain", "mapred_user", "tasktracker_primary_name", "namenode_primary_name", "hdfs_user", "datanode_primary_name", "hbase_primary_name", "hbase_user"],
  333. "foreignKey": null,
  334. "value": "RULE:[2:$1@$0](<templateName[0]>@.*<templateName[1]>)s/.*/<templateName[2]>/ RULE:[2:$1@$0](<templateName[3]>@.*<templateName[1]>)s/.*/<templateName[2]>/ RULE:[2:$1@$0](<templateName[4]>@.*<templateName[1]>)s/.*/<templateName[5]>/ RULE:[2:$1@$0](<templateName[6]>@.*<templateName[1]>)s/.*/<templateName[5]>/ RULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/ DEFAULT",
  335. "filename": "oozie-site.xml",
  336. "serviceName": "OOZIE"
  337. },
  338. {
  339. "name": "templeton.kerberos.principal",
  340. "templateName": ["webHCat_http_principal_name", "kerberos_domain"],
  341. "foreignKey": null,
  342. "value": "<templateName[0]>@<templateName[1]>",
  343. "filename": "webhcat-site.xml",
  344. "serviceName": "WEBHCAT"
  345. },
  346. {
  347. "name": "templeton.kerberos.keytab",
  348. "templateName": ["hadoop_http_keytab"],
  349. "foreignKey": null,
  350. "value": "<templateName[0]>",
  351. "filename": "webhcat-site.xml",
  352. "serviceName": "WEBHCAT"
  353. },
  354. {
  355. "name": "templeton.kerberos.secret",
  356. "templateName": [""],
  357. "foreignKey": null,
  358. "value": "secret",
  359. "filename": "webhcat-site.xml",
  360. "serviceName": "WEBHCAT"
  361. },
  362. {
  363. "name": "templeton.hive.properties",
  364. "templateName": ["hivemetastore_host","hive_metastore_principal_name","kerberos_domain"],
  365. "foreignKey": null,
  366. "value": "hive.metastore.local=false, hive.metastore.uris=thrift://<templateName[0]>:9083, hive." +
  367. "metastore.sasl.enabled=true,hive.metastore.execute.setugi=true, hive.exec.mode.local.auto=false, hive.metastore.kerberos.principal=<templateName[1]>@<templateName[2]>",
  368. "filename": "webhcat-site.xml",
  369. "serviceName": "WEBHCAT"
  370. },
  371. {
  372. "name": "hbase.coprocessor.master.classes",
  373. "templateName": [],
  374. "foreignKey": null,
  375. "value": "org.apache.hadoop.hbase.security.access.AccessController",
  376. "filename": "hbase-site.xml",
  377. "serviceName": "HBASE"
  378. },
  379. {
  380. "name": "hbase.coprocessor.region.classes",
  381. "templateName": [],
  382. "foreignKey": null,
  383. "value": "org.apache.hadoop.hbase.security.token.TokenProvider,org.apache.hadoop.hbase.security.access.SecureBulkLoadEndpoint,org.apache.hadoop.hbase.security.access.AccessController",
  384. "filename": "hbase-site.xml",
  385. "serviceName": "HBASE"
  386. },
  387. {
  388. "name": "hbase.security.authentication",
  389. "templateName": [],
  390. "foreignKey": null,
  391. "value": "kerberos",
  392. "filename": "hbase-site.xml",
  393. "serviceName": "HBASE"
  394. },
  395. {
  396. "name": "hbase.rpc.engine",
  397. "templateName": [],
  398. "foreignKey": null,
  399. "value": "org.apache.hadoop.hbase.ipc.SecureRpcEngine",
  400. "filename": "hbase-site.xml",
  401. "serviceName": "HBASE"
  402. },
  403. {
  404. "name": "hbase.security.authorization",
  405. "templateName": [],
  406. "foreignKey": null,
  407. "value": "true",
  408. "filename": "hbase-site.xml",
  409. "serviceName": "HBASE"
  410. },
  411. {
  412. "name": "hbase.bulkload.staging.dir",
  413. "templateName": [],
  414. "foreignKey": null,
  415. "value": "/apps/hbase/staging",
  416. "filename": "hbase-site.xml",
  417. "serviceName": "HBASE"
  418. },
  419. {
  420. "name": "zookeeper.znode.parent",
  421. "templateName": [],
  422. "foreignKey": null,
  423. "value": "/hbase-secure",
  424. "filename": "hbase-site.xml",
  425. "serviceName": "HBASE"
  426. },
  427. {
  428. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  429. "templateName": ["proxyuser_group"],
  430. "foreignKey": ["hive_metastore_primary_name"],
  431. "value": "<templateName[0]>",
  432. "filename": "core-site.xml",
  433. "serviceName": "HIVE"
  434. },
  435. {
  436. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  437. "templateName": ["hivemetastore_host"],
  438. "foreignKey": ["hive_metastore_primary_name"],
  439. "value": "<templateName[0]>",
  440. "filename": "core-site.xml",
  441. "serviceName": "HIVE"
  442. },
  443. {
  444. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  445. "templateName": ["proxyuser_group"],
  446. "foreignKey": ["oozie_primary_name"],
  447. "value": "<templateName[0]>",
  448. "filename": "core-site.xml",
  449. "serviceName": "OOZIE"
  450. },
  451. {
  452. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  453. "templateName": ["oozieserver_host"],
  454. "foreignKey": ["oozie_primary_name"],
  455. "value": "<templateName[0]>",
  456. "filename": "core-site.xml",
  457. "serviceName": "OOZIE"
  458. },
  459. {
  460. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  461. "templateName": ["proxyuser_group"],
  462. "foreignKey": ["webHCat_http_primary_name"],
  463. "value": "<templateName[0]>",
  464. "filename": "core-site.xml",
  465. "serviceName": "WEBHCAT"
  466. },
  467. {
  468. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  469. "templateName": ["webhcat_server"],
  470. "foreignKey": ["webHCat_http_primary_name"],
  471. "value": "<templateName[0]>",
  472. "filename": "core-site.xml",
  473. "serviceName": "WEBHCAT"
  474. }
  475. ];