kerberos.js 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539
  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. var App = require('app');
  19. require('controllers/main/admin/kerberos/step4_controller');
  20. App.MainAdminKerberosController = App.KerberosWizardStep4Controller.extend({
  21. name: 'mainAdminKerberosController',
  22. securityEnabled: false,
  23. defaultKerberosLoaded: false,
  24. dataIsLoaded: false,
  25. isRecommendedLoaded: true,
  26. isEditMode: false,
  27. kdc_type: '',
  28. kdcTypesValues: {
  29. 'mit-kdc': Em.I18n.t('admin.kerberos.wizard.step1.option.kdc'),
  30. 'active-directory': Em.I18n.t('admin.kerberos.wizard.step1.option.ad'),
  31. 'none': Em.I18n.t('admin.kerberos.wizard.step1.option.manual')
  32. },
  33. getAddSecurityWizardStatus: function () {
  34. return App.db.getSecurityWizardStatus();
  35. },
  36. setAddSecurityWizardStatus: function (status) {
  37. App.db.setSecurityWizardStatus(status);
  38. },
  39. setDisableSecurityStatus: function (status) {
  40. App.db.setDisableSecurityStatus(status);
  41. },
  42. getDisableSecurityStatus: function (status) {
  43. return App.db.getDisableSecurityStatus();
  44. },
  45. notifySecurityOff: false,
  46. notifySecurityAdd: false,
  47. notifySecurityOffPopup: function () {
  48. var self = this;
  49. App.ModalPopup.show({
  50. header: Em.I18n.t('popup.confirmation.commonHeader'),
  51. primary: Em.I18n.t('ok'),
  52. onPrimary: function () {
  53. App.db.setSecurityDeployCommands(undefined);
  54. self.setDisableSecurityStatus("RUNNING");
  55. App.router.transitionTo('disableSecurity');
  56. this.hide();
  57. },
  58. bodyClass: Ember.View.extend({
  59. templateName: require('templates/main/admin/kerberos/notify_security_off_popup')
  60. })
  61. });
  62. },
  63. /**
  64. * Show confirmation popup for regenerate keytabs
  65. * @method regenerateKeytabs
  66. * @param callback function (optional)
  67. * @return {App.ModalPopup}
  68. */
  69. regenerateKeytabs: function (callback) {
  70. var self = this;
  71. return App.ModalPopup.show({
  72. /**
  73. * True - regenerate keytabs only for missing hosts and components, false - regenerate for all hosts and components
  74. * @type {boolean}
  75. */
  76. regenerateKeytabsOnlyForMissing: false,
  77. header: Em.I18n.t('admin.kerberos.button.regenerateKeytabs'),
  78. bodyClass: Em.View.extend({
  79. templateName: require('templates/main/admin/kerberos/regenerate_keytabs_popup_body')
  80. }),
  81. onPrimary: function () {
  82. this._super();
  83. return self.restartServicesAfterRegenerate(this.get('regenerateKeytabsOnlyForMissing'), callback);
  84. }
  85. });
  86. },
  87. /**
  88. * Show confirmation popup for restarting all services and after confirmation regenerate keytabs
  89. *
  90. * @param regenerateKeytabsOnlyForMissing {Boolean}
  91. * @param callback (optional)
  92. * @returns {*}
  93. */
  94. restartServicesAfterRegenerate: function (regenerateKeytabsOnlyForMissing, callback) {
  95. var self = this;
  96. return App.ModalPopup.show({
  97. /**
  98. * True - automatically restart services, false - user will have to restart required services manually
  99. * @type {boolean}
  100. */
  101. restartComponents: false,
  102. header: Em.I18n.t('admin.kerberos.button.regenerateKeytabs'),
  103. bodyClass: Em.View.extend({
  104. templateName: require('templates/main/admin/kerberos/restart_services_after_regenerate_body')
  105. }),
  106. onPrimary: function () {
  107. this._super();
  108. var popupContext = this;
  109. // Keytabs can either be regenerated directly or after updating kerberos descriptor in the callback function
  110. if (Em.typeOf(callback) === 'function') {
  111. callback().done(function () {
  112. self.regenerateKeytabsRequest(regenerateKeytabsOnlyForMissing, popupContext.get('restartComponents'));
  113. });
  114. } else {
  115. self.regenerateKeytabsRequest(regenerateKeytabsOnlyForMissing, popupContext.get('restartComponents'));
  116. }
  117. }
  118. });
  119. },
  120. /**
  121. * Send request to regenerate keytabs
  122. * @param {boolean} missingOnly determines type of regeneration - missing|all
  123. * @param {boolean} withAutoRestart determines if the system should automatically restart all services or not after regeneration
  124. * @returns {$.ajax}
  125. */
  126. regenerateKeytabsRequest: function (missingOnly, withAutoRestart) {
  127. missingOnly = missingOnly || false;
  128. return App.ajax.send({
  129. name: "admin.kerberos_security.regenerate_keytabs",
  130. sender: this,
  131. data: {
  132. type: missingOnly ? 'missing' : 'all',
  133. withAutoRestart: withAutoRestart || false
  134. },
  135. success: "regenerateKeytabsSuccess"
  136. });
  137. },
  138. /**
  139. * Success callback of <code>regenerateKeytabs</code>
  140. * show background operations popup if appropriate option is set
  141. *
  142. * @param data
  143. * @param opt
  144. * @param params
  145. * @param request
  146. */
  147. regenerateKeytabsSuccess: function (data, opt, params, request) {
  148. var self = this;
  149. App.router.get('applicationController').dataLoading().done(function (initValue) {
  150. if (initValue) {
  151. App.router.get('backgroundOperationsController').showPopup();
  152. }
  153. self.set('needsRestartAfterRegenerate', params.withAutoRestart);
  154. });
  155. },
  156. /**
  157. * Do request to server for restarting all services
  158. * @method restartAllServices
  159. * @return {$.ajax}
  160. */
  161. restartAllServices: function () {
  162. if (!App.router.get('backgroundOperationsController.allOperationsCount')) {
  163. if (this.get('needsRestartAfterRegenerate')) {
  164. this.set('needsRestartAfterRegenerate', false);
  165. App.router.get('mainServiceController').restartAllServices();
  166. }
  167. }
  168. }.observes('controllers.backgroundOperationsController.allOperationsCount'),
  169. getUpdatedSecurityStatus: function () {
  170. this.getSecurityStatus();
  171. return this.get('securityEnabled');
  172. },
  173. /**
  174. * performs cluster check before kerbefos security
  175. * wizard starts if <code>preKerberizeCheck<code> supports is true
  176. * otherwise runs <code>startKerberosWizard<code>
  177. * @method checkAndStartKerberosWizard
  178. */
  179. checkAndStartKerberosWizard: function () {
  180. if (App.get('supports.preKerberizeCheck')) {
  181. App.ajax.send({
  182. name: "admin.kerberos_security.checks",
  183. sender: this,
  184. success: "runSecurityCheckSuccess"
  185. });
  186. } else {
  187. this.startKerberosWizard();
  188. }
  189. },
  190. /**
  191. * success callback of <code>checkAndStartKerberosWizard()</code>
  192. * if there are some fails - it shows popup else open security wizard
  193. * @param data {object}
  194. * @param opt {object}
  195. * @param params {object}
  196. */
  197. runSecurityCheckSuccess: function (data, opt, params) {
  198. //TODO correct check
  199. if (data.items.someProperty('UpgradeChecks.status', "FAIL")) {
  200. var header = Em.I18n.t('popup.clusterCheck.Security.header').format(params.label);
  201. var title = Em.I18n.t('popup.clusterCheck.Security.title');
  202. var alert = Em.I18n.t('popup.clusterCheck.Security.alert');
  203. App.showClusterCheckPopup(data, header, title, alert);
  204. } else {
  205. this.startKerberosWizard();
  206. }
  207. },
  208. startKerberosWizard: function () {
  209. this.setAddSecurityWizardStatus('RUNNING');
  210. App.router.get('kerberosWizardController').setDBProperty('onClosePath', 'main.admin.adminKerberos.index');
  211. App.router.transitionTo('adminKerberos.adminAddKerberos');
  212. },
  213. /**
  214. * Loads the security status from server (security_enabled property in cluster-env configuration)
  215. */
  216. loadSecurityStatusFromServer: function () {
  217. if (App.get('testMode')) {
  218. this.set('securityEnabled', !App.get('testEnableSecurity'));
  219. this.set('dataIsLoaded', true);
  220. } else {
  221. //get Security Status From Server
  222. this.getSecurityType();
  223. return this.getSecurityStatus();
  224. }
  225. },
  226. /**
  227. * Load security status from server.
  228. * @returns {$.Deferred}
  229. */
  230. getSecurityStatus: function () {
  231. var self = this;
  232. var dfd = $.Deferred();
  233. if (App.get('testMode')) {
  234. this.set('securityEnabled', !App.get('testEnableSecurity'));
  235. this.set('dataIsLoaded', true);
  236. dfd.resolve();
  237. } else {
  238. //get Security Status From Server
  239. App.ajax.send({
  240. name: 'admin.security_status',
  241. sender: this,
  242. success: 'getSecurityStatusSuccessCallback',
  243. error: 'errorCallback'
  244. })
  245. .always(this.getSecurityType.bind(this))
  246. .always(function () {
  247. // check for kerberos descriptor artifact
  248. if (self.get('securityEnabled')) {
  249. self.loadClusterDescriptorConfigs().then(function () {
  250. dfd.resolve();
  251. }, function () {
  252. // if kerberos descriptor doesn't exist in cluster artifacts get the default descriptor
  253. self.loadStackDescriptorConfigs().then(function () {
  254. self.set('defaultKerberosLoaded', true);
  255. dfd.resolve();
  256. }, function () {
  257. self.set('securityEnabled', false);
  258. dfd.resolve();
  259. });
  260. });
  261. } else {
  262. dfd.resolve();
  263. }
  264. });
  265. }
  266. return dfd.promise();
  267. },
  268. getSecurityStatusSuccessCallback: function (data) {
  269. this.set('dataIsLoaded', true);
  270. var securityType = data.Clusters.security_type;
  271. this.set('securityEnabled', securityType === 'KERBEROS');
  272. },
  273. errorCallback: function (jqXHR) {
  274. this.set('dataIsLoaded', true);
  275. // Show the error popup if the API call received a response from the server.
  276. // jqXHR.status will be empty when browser cancels the request. Refer to AMBARI-5921 for more info
  277. if (!!jqXHR.status) {
  278. this.showSecurityErrorPopup();
  279. }
  280. },
  281. showSecurityErrorPopup: function () {
  282. App.ModalPopup.show({
  283. header: Em.I18n.t('common.error'),
  284. secondary: false,
  285. bodyClass: Ember.View.extend({
  286. template: Ember.Handlebars.compile('<p>{{t admin.security.status.error}}</p>')
  287. })
  288. });
  289. },
  290. /**
  291. * Override <code>App.KerberosWizardStep4Controller</code>
  292. *
  293. * @param {App.ServiceConfigProperty[]} properties
  294. */
  295. setStepConfigs: function (properties) {
  296. this.get('stepConfigs').clear();
  297. this._super(properties);
  298. this.get('stepConfigs').forEach(function (serviceConfig) {
  299. serviceConfig.set('initConfigsLength', serviceConfig.get('configs.length'));
  300. });
  301. },
  302. /**
  303. * Override <code>App.KerberosWizardStep4Controller</code>
  304. *
  305. * @param {App.ServiceConfigProperty[]} configs
  306. * @returns {App.ServiceConfigProperty[]}
  307. */
  308. prepareConfigProperties: function (configs) {
  309. var self = this;
  310. var configProperties = configs.slice(0);
  311. var siteProperties = App.config.get('preDefinedSiteProperties');
  312. var installedServiceNames = ['Cluster'].concat(App.Service.find().mapProperty('serviceName'));
  313. configProperties = configProperties.filter(function (item) {
  314. return installedServiceNames.contains(item.get('serviceName'));
  315. });
  316. configProperties.setEach('isSecureConfig', false);
  317. configProperties.forEach(function (property, item, allConfigs) {
  318. if (['spnego_keytab', 'spnego_principal'].contains(property.get('name'))) {
  319. property.addObserver('value', self, 'spnegoPropertiesObserver');
  320. }
  321. if (property.get('observesValueFrom')) {
  322. var observedValue = allConfigs.findProperty('name', property.get('observesValueFrom')).get('value');
  323. property.set('value', observedValue);
  324. property.set('recommendedValue', observedValue);
  325. }
  326. if (property.get('serviceName') == 'Cluster') {
  327. property.set('category', 'Global');
  328. } else {
  329. property.set('category', property.get('serviceName'));
  330. }
  331. // All user identity should be grouped under "Ambari Principals" category
  332. if (property.get('identityType') == 'user') property.set('category', 'Ambari Principals');
  333. var siteProperty = siteProperties.findProperty('name', property.get('name'));
  334. if (siteProperty) {
  335. if (siteProperty.category === property.get('category')) {
  336. property.set('displayName', siteProperty.displayName);
  337. if (siteProperty.index) {
  338. property.set('index', siteProperty.index);
  339. }
  340. }
  341. if (siteProperty.displayType) {
  342. property.set('displayType', siteProperty.displayType);
  343. }
  344. }
  345. });
  346. configProperties.setEach('isEditable', false);
  347. return configProperties;
  348. },
  349. getKDCSessionState: function (callback, kdcCancelHandler) {
  350. if (this.get('securityEnabled') || App.get('isKerberosEnabled')) {
  351. App.ajax.send({
  352. name: 'kerberos.session.state',
  353. sender: this,
  354. data: {
  355. callback: callback
  356. },
  357. success: 'checkState',
  358. kdcCancelHandler: kdcCancelHandler
  359. })
  360. } else {
  361. callback();
  362. }
  363. },
  364. getSecurityType: function (callback) {
  365. if (this.get('securityEnabled') || App.get('isKerberosEnabled')) {
  366. return App.ajax.send({
  367. name: 'admin.security.cluster_configs.kerberos',
  368. sender: this,
  369. data: {
  370. clusterName: App.get('clusterName'),
  371. additionalCallback: callback
  372. },
  373. success: 'getSecurityTypeSuccess'
  374. });
  375. } else if (Em.typeOf(callback) === 'function') {
  376. callback();
  377. } else {
  378. return $.Deferred().resolve().promise;
  379. }
  380. },
  381. getSecurityTypeSuccess: function (data, opt, params) {
  382. var kdcType = data.items && data.items[0] &&
  383. Em.getWithDefault(Em.getWithDefault(data.items[0], 'configurations', {}).findProperty('type', 'kerberos-env') || {}, 'properties.kdc_type', 'none') || 'none';
  384. this.set('kdc_type', kdcType);
  385. if (Em.typeOf(params.additionalCallback) === 'function') {
  386. params.additionalCallback();
  387. }
  388. },
  389. isManualKerberos: function () {
  390. return this.get('kdc_type') === 'none';
  391. }.property('kdc_type'),
  392. checkState: function (data, opt, params) {
  393. var res = Em.get(data, 'Services.attributes.kdc_validation_result');
  394. var message = Em.get(data, 'Services.attributes.kdc_validation_failure_details');
  395. if (res.toUpperCase() === "OK") {
  396. params.callback();
  397. } else {
  398. App.showInvalidKDCPopup(opt, App.format.kdcErrorMsg(message, false));
  399. }
  400. },
  401. /**
  402. * @Override <code>App.AddSecurityConfigs</code>
  403. * Wrap kerberos properties to App.ServiceConfigProperty model class instances.
  404. *
  405. * @param {object} kerberosProperties
  406. * @param {string} serviceName
  407. * @param {string} filename
  408. * @returns {App.ServiceConfigProperty[]}
  409. */
  410. expandKerberosStackDescriptorProps: function (kerberosProperties, serviceName, filename) {
  411. var configs = [];
  412. for (var propertyName in kerberosProperties) {
  413. var propertyObject = {
  414. name: propertyName,
  415. value: kerberosProperties[propertyName],
  416. defaultValue: kerberosProperties[propertyName],
  417. savedValue: kerberosProperties[propertyName],
  418. serviceName: serviceName,
  419. filename: filename,
  420. displayName: serviceName == "Cluster" ? App.format.normalizeName(propertyName) : propertyName,
  421. isOverridable: false,
  422. isEditable: true,
  423. isSecureConfig: true
  424. };
  425. configs.push(App.ServiceConfigProperty.create(propertyObject));
  426. }
  427. return configs;
  428. },
  429. /**
  430. * Determines if some config value is changed
  431. * @type {boolean}
  432. */
  433. isPropertiesChanged: function () {
  434. return this.get('stepConfigs').someProperty('isPropertiesChanged', true);
  435. }.property('stepConfigs.@each.isPropertiesChanged'),
  436. /**
  437. * Determines if the save button is disabled
  438. */
  439. isSaveButtonDisabled: function () {
  440. return this.get('isSubmitDisabled') || !this.get('isPropertiesChanged');
  441. }.property('isSubmitDisabled', 'isPropertiesChanged'),
  442. makeConfigsEditable: function () {
  443. this.set('isEditMode', true);
  444. this.get('stepConfigs').forEach(function(_stepConfig){
  445. _stepConfig.get('configs').setEach('isEditable', true);
  446. }, this);
  447. },
  448. makeConfigsNonEditable: function () {
  449. this.set('isEditMode', false);
  450. this.loadStep();
  451. },
  452. /**
  453. * Update kerberos descriptor and regenerate keytabs
  454. */
  455. submit: function (context) {
  456. var callback;
  457. var self = this;
  458. if (this.get('isPropertiesChanged')) {
  459. var kerberosDescriptor = this.get('kerberosDescriptor');
  460. var configs = [];
  461. this.get('stepConfigs').forEach(function (_stepConfig) {
  462. configs = configs.concat(_stepConfig.get('configs'));
  463. });
  464. this.updateKerberosDescriptor(kerberosDescriptor, configs);
  465. callback = function () {
  466. return App.ajax.send({
  467. name: 'admin.kerberos.cluster.artifact.update',
  468. sender: self,
  469. data: {
  470. artifactName: 'kerberos_descriptor',
  471. data: {
  472. artifact_data: kerberosDescriptor
  473. }
  474. },
  475. success: 'makeConfigsNonEditable'
  476. });
  477. };
  478. } else {
  479. callback = function() {
  480. var dfd = $.Deferred();
  481. self.makeConfigsNonEditable();
  482. dfd.resolve();
  483. return dfd.promise();
  484. }
  485. }
  486. this.regenerateKeytabs(callback);
  487. },
  488. });