123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539 |
- /**
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
- var App = require('app');
- require('controllers/main/admin/kerberos/step4_controller');
- App.MainAdminKerberosController = App.KerberosWizardStep4Controller.extend({
- name: 'mainAdminKerberosController',
- securityEnabled: false,
- defaultKerberosLoaded: false,
- dataIsLoaded: false,
- isRecommendedLoaded: true,
- isEditMode: false,
- kdc_type: '',
- kdcTypesValues: {
- 'mit-kdc': Em.I18n.t('admin.kerberos.wizard.step1.option.kdc'),
- 'active-directory': Em.I18n.t('admin.kerberos.wizard.step1.option.ad'),
- 'none': Em.I18n.t('admin.kerberos.wizard.step1.option.manual')
- },
- getAddSecurityWizardStatus: function () {
- return App.db.getSecurityWizardStatus();
- },
- setAddSecurityWizardStatus: function (status) {
- App.db.setSecurityWizardStatus(status);
- },
- setDisableSecurityStatus: function (status) {
- App.db.setDisableSecurityStatus(status);
- },
- getDisableSecurityStatus: function (status) {
- return App.db.getDisableSecurityStatus();
- },
- notifySecurityOff: false,
- notifySecurityAdd: false,
- notifySecurityOffPopup: function () {
- var self = this;
- App.ModalPopup.show({
- header: Em.I18n.t('popup.confirmation.commonHeader'),
- primary: Em.I18n.t('ok'),
- onPrimary: function () {
- App.db.setSecurityDeployCommands(undefined);
- self.setDisableSecurityStatus("RUNNING");
- App.router.transitionTo('disableSecurity');
- this.hide();
- },
- bodyClass: Ember.View.extend({
- templateName: require('templates/main/admin/kerberos/notify_security_off_popup')
- })
- });
- },
- /**
- * Show confirmation popup for regenerate keytabs
- * @method regenerateKeytabs
- * @param callback function (optional)
- * @return {App.ModalPopup}
- */
- regenerateKeytabs: function (callback) {
- var self = this;
- return App.ModalPopup.show({
- /**
- * True - regenerate keytabs only for missing hosts and components, false - regenerate for all hosts and components
- * @type {boolean}
- */
- regenerateKeytabsOnlyForMissing: false,
- header: Em.I18n.t('admin.kerberos.button.regenerateKeytabs'),
- bodyClass: Em.View.extend({
- templateName: require('templates/main/admin/kerberos/regenerate_keytabs_popup_body')
- }),
- onPrimary: function () {
- this._super();
- return self.restartServicesAfterRegenerate(this.get('regenerateKeytabsOnlyForMissing'), callback);
- }
- });
- },
- /**
- * Show confirmation popup for restarting all services and after confirmation regenerate keytabs
- *
- * @param regenerateKeytabsOnlyForMissing {Boolean}
- * @param callback (optional)
- * @returns {*}
- */
- restartServicesAfterRegenerate: function (regenerateKeytabsOnlyForMissing, callback) {
- var self = this;
- return App.ModalPopup.show({
- /**
- * True - automatically restart services, false - user will have to restart required services manually
- * @type {boolean}
- */
- restartComponents: false,
- header: Em.I18n.t('admin.kerberos.button.regenerateKeytabs'),
- bodyClass: Em.View.extend({
- templateName: require('templates/main/admin/kerberos/restart_services_after_regenerate_body')
- }),
- onPrimary: function () {
- this._super();
- var popupContext = this;
- // Keytabs can either be regenerated directly or after updating kerberos descriptor in the callback function
- if (Em.typeOf(callback) === 'function') {
- callback().done(function () {
- self.regenerateKeytabsRequest(regenerateKeytabsOnlyForMissing, popupContext.get('restartComponents'));
- });
- } else {
- self.regenerateKeytabsRequest(regenerateKeytabsOnlyForMissing, popupContext.get('restartComponents'));
- }
- }
- });
- },
- /**
- * Send request to regenerate keytabs
- * @param {boolean} missingOnly determines type of regeneration - missing|all
- * @param {boolean} withAutoRestart determines if the system should automatically restart all services or not after regeneration
- * @returns {$.ajax}
- */
- regenerateKeytabsRequest: function (missingOnly, withAutoRestart) {
- missingOnly = missingOnly || false;
- return App.ajax.send({
- name: "admin.kerberos_security.regenerate_keytabs",
- sender: this,
- data: {
- type: missingOnly ? 'missing' : 'all',
- withAutoRestart: withAutoRestart || false
- },
- success: "regenerateKeytabsSuccess"
- });
- },
- /**
- * Success callback of <code>regenerateKeytabs</code>
- * show background operations popup if appropriate option is set
- *
- * @param data
- * @param opt
- * @param params
- * @param request
- */
- regenerateKeytabsSuccess: function (data, opt, params, request) {
- var self = this;
- App.router.get('applicationController').dataLoading().done(function (initValue) {
- if (initValue) {
- App.router.get('backgroundOperationsController').showPopup();
- }
- self.set('needsRestartAfterRegenerate', params.withAutoRestart);
- });
- },
- /**
- * Do request to server for restarting all services
- * @method restartAllServices
- * @return {$.ajax}
- */
- restartAllServices: function () {
- if (!App.router.get('backgroundOperationsController.allOperationsCount')) {
- if (this.get('needsRestartAfterRegenerate')) {
- this.set('needsRestartAfterRegenerate', false);
- App.router.get('mainServiceController').restartAllServices();
- }
- }
- }.observes('controllers.backgroundOperationsController.allOperationsCount'),
- getUpdatedSecurityStatus: function () {
- this.getSecurityStatus();
- return this.get('securityEnabled');
- },
- /**
- * performs cluster check before kerbefos security
- * wizard starts if <code>preKerberizeCheck<code> supports is true
- * otherwise runs <code>startKerberosWizard<code>
- * @method checkAndStartKerberosWizard
- */
- checkAndStartKerberosWizard: function () {
- if (App.get('supports.preKerberizeCheck')) {
- App.ajax.send({
- name: "admin.kerberos_security.checks",
- sender: this,
- success: "runSecurityCheckSuccess"
- });
- } else {
- this.startKerberosWizard();
- }
- },
- /**
- * success callback of <code>checkAndStartKerberosWizard()</code>
- * if there are some fails - it shows popup else open security wizard
- * @param data {object}
- * @param opt {object}
- * @param params {object}
- */
- runSecurityCheckSuccess: function (data, opt, params) {
- //TODO correct check
- if (data.items.someProperty('UpgradeChecks.status', "FAIL")) {
- var header = Em.I18n.t('popup.clusterCheck.Security.header').format(params.label);
- var title = Em.I18n.t('popup.clusterCheck.Security.title');
- var alert = Em.I18n.t('popup.clusterCheck.Security.alert');
- App.showClusterCheckPopup(data, header, title, alert);
- } else {
- this.startKerberosWizard();
- }
- },
- startKerberosWizard: function () {
- this.setAddSecurityWizardStatus('RUNNING');
- App.router.get('kerberosWizardController').setDBProperty('onClosePath', 'main.admin.adminKerberos.index');
- App.router.transitionTo('adminKerberos.adminAddKerberos');
- },
- /**
- * Loads the security status from server (security_enabled property in cluster-env configuration)
- */
- loadSecurityStatusFromServer: function () {
- if (App.get('testMode')) {
- this.set('securityEnabled', !App.get('testEnableSecurity'));
- this.set('dataIsLoaded', true);
- } else {
- //get Security Status From Server
- this.getSecurityType();
- return this.getSecurityStatus();
- }
- },
- /**
- * Load security status from server.
- * @returns {$.Deferred}
- */
- getSecurityStatus: function () {
- var self = this;
- var dfd = $.Deferred();
- if (App.get('testMode')) {
- this.set('securityEnabled', !App.get('testEnableSecurity'));
- this.set('dataIsLoaded', true);
- dfd.resolve();
- } else {
- //get Security Status From Server
- App.ajax.send({
- name: 'admin.security_status',
- sender: this,
- success: 'getSecurityStatusSuccessCallback',
- error: 'errorCallback'
- })
- .always(this.getSecurityType.bind(this))
- .always(function () {
- // check for kerberos descriptor artifact
- if (self.get('securityEnabled')) {
- self.loadClusterDescriptorConfigs().then(function () {
- dfd.resolve();
- }, function () {
- // if kerberos descriptor doesn't exist in cluster artifacts get the default descriptor
- self.loadStackDescriptorConfigs().then(function () {
- self.set('defaultKerberosLoaded', true);
- dfd.resolve();
- }, function () {
- self.set('securityEnabled', false);
- dfd.resolve();
- });
- });
- } else {
- dfd.resolve();
- }
- });
- }
- return dfd.promise();
- },
- getSecurityStatusSuccessCallback: function (data) {
- this.set('dataIsLoaded', true);
- var securityType = data.Clusters.security_type;
- this.set('securityEnabled', securityType === 'KERBEROS');
- },
- errorCallback: function (jqXHR) {
- this.set('dataIsLoaded', true);
- // Show the error popup if the API call received a response from the server.
- // jqXHR.status will be empty when browser cancels the request. Refer to AMBARI-5921 for more info
- if (!!jqXHR.status) {
- this.showSecurityErrorPopup();
- }
- },
- showSecurityErrorPopup: function () {
- App.ModalPopup.show({
- header: Em.I18n.t('common.error'),
- secondary: false,
- bodyClass: Ember.View.extend({
- template: Ember.Handlebars.compile('<p>{{t admin.security.status.error}}</p>')
- })
- });
- },
- /**
- * Override <code>App.KerberosWizardStep4Controller</code>
- *
- * @param {App.ServiceConfigProperty[]} properties
- */
- setStepConfigs: function (properties) {
- this.get('stepConfigs').clear();
- this._super(properties);
- this.get('stepConfigs').forEach(function (serviceConfig) {
- serviceConfig.set('initConfigsLength', serviceConfig.get('configs.length'));
- });
- },
- /**
- * Override <code>App.KerberosWizardStep4Controller</code>
- *
- * @param {App.ServiceConfigProperty[]} configs
- * @returns {App.ServiceConfigProperty[]}
- */
- prepareConfigProperties: function (configs) {
- var self = this;
- var configProperties = configs.slice(0);
- var siteProperties = App.config.get('preDefinedSiteProperties');
- var installedServiceNames = ['Cluster'].concat(App.Service.find().mapProperty('serviceName'));
- configProperties = configProperties.filter(function (item) {
- return installedServiceNames.contains(item.get('serviceName'));
- });
- configProperties.setEach('isSecureConfig', false);
- configProperties.forEach(function (property, item, allConfigs) {
- if (['spnego_keytab', 'spnego_principal'].contains(property.get('name'))) {
- property.addObserver('value', self, 'spnegoPropertiesObserver');
- }
- if (property.get('observesValueFrom')) {
- var observedValue = allConfigs.findProperty('name', property.get('observesValueFrom')).get('value');
- property.set('value', observedValue);
- property.set('recommendedValue', observedValue);
- }
- if (property.get('serviceName') == 'Cluster') {
- property.set('category', 'Global');
- } else {
- property.set('category', property.get('serviceName'));
- }
- // All user identity should be grouped under "Ambari Principals" category
- if (property.get('identityType') == 'user') property.set('category', 'Ambari Principals');
- var siteProperty = siteProperties.findProperty('name', property.get('name'));
- if (siteProperty) {
- if (siteProperty.category === property.get('category')) {
- property.set('displayName', siteProperty.displayName);
- if (siteProperty.index) {
- property.set('index', siteProperty.index);
- }
- }
- if (siteProperty.displayType) {
- property.set('displayType', siteProperty.displayType);
- }
- }
- });
- configProperties.setEach('isEditable', false);
- return configProperties;
- },
- getKDCSessionState: function (callback, kdcCancelHandler) {
- if (this.get('securityEnabled') || App.get('isKerberosEnabled')) {
- App.ajax.send({
- name: 'kerberos.session.state',
- sender: this,
- data: {
- callback: callback
- },
- success: 'checkState',
- kdcCancelHandler: kdcCancelHandler
- })
- } else {
- callback();
- }
- },
- getSecurityType: function (callback) {
- if (this.get('securityEnabled') || App.get('isKerberosEnabled')) {
- return App.ajax.send({
- name: 'admin.security.cluster_configs.kerberos',
- sender: this,
- data: {
- clusterName: App.get('clusterName'),
- additionalCallback: callback
- },
- success: 'getSecurityTypeSuccess'
- });
- } else if (Em.typeOf(callback) === 'function') {
- callback();
- } else {
- return $.Deferred().resolve().promise;
- }
- },
- getSecurityTypeSuccess: function (data, opt, params) {
- var kdcType = data.items && data.items[0] &&
- Em.getWithDefault(Em.getWithDefault(data.items[0], 'configurations', {}).findProperty('type', 'kerberos-env') || {}, 'properties.kdc_type', 'none') || 'none';
- this.set('kdc_type', kdcType);
- if (Em.typeOf(params.additionalCallback) === 'function') {
- params.additionalCallback();
- }
- },
- isManualKerberos: function () {
- return this.get('kdc_type') === 'none';
- }.property('kdc_type'),
- checkState: function (data, opt, params) {
- var res = Em.get(data, 'Services.attributes.kdc_validation_result');
- var message = Em.get(data, 'Services.attributes.kdc_validation_failure_details');
- if (res.toUpperCase() === "OK") {
- params.callback();
- } else {
- App.showInvalidKDCPopup(opt, App.format.kdcErrorMsg(message, false));
- }
- },
- /**
- * @Override <code>App.AddSecurityConfigs</code>
- * Wrap kerberos properties to App.ServiceConfigProperty model class instances.
- *
- * @param {object} kerberosProperties
- * @param {string} serviceName
- * @param {string} filename
- * @returns {App.ServiceConfigProperty[]}
- */
- expandKerberosStackDescriptorProps: function (kerberosProperties, serviceName, filename) {
- var configs = [];
- for (var propertyName in kerberosProperties) {
- var propertyObject = {
- name: propertyName,
- value: kerberosProperties[propertyName],
- defaultValue: kerberosProperties[propertyName],
- savedValue: kerberosProperties[propertyName],
- serviceName: serviceName,
- filename: filename,
- displayName: serviceName == "Cluster" ? App.format.normalizeName(propertyName) : propertyName,
- isOverridable: false,
- isEditable: true,
- isSecureConfig: true
- };
- configs.push(App.ServiceConfigProperty.create(propertyObject));
- }
- return configs;
- },
- /**
- * Determines if some config value is changed
- * @type {boolean}
- */
- isPropertiesChanged: function () {
- return this.get('stepConfigs').someProperty('isPropertiesChanged', true);
- }.property('stepConfigs.@each.isPropertiesChanged'),
- /**
- * Determines if the save button is disabled
- */
- isSaveButtonDisabled: function () {
- return this.get('isSubmitDisabled') || !this.get('isPropertiesChanged');
- }.property('isSubmitDisabled', 'isPropertiesChanged'),
- makeConfigsEditable: function () {
- this.set('isEditMode', true);
- this.get('stepConfigs').forEach(function(_stepConfig){
- _stepConfig.get('configs').setEach('isEditable', true);
- }, this);
- },
- makeConfigsNonEditable: function () {
- this.set('isEditMode', false);
- this.loadStep();
- },
- /**
- * Update kerberos descriptor and regenerate keytabs
- */
- submit: function (context) {
- var callback;
- var self = this;
- if (this.get('isPropertiesChanged')) {
- var kerberosDescriptor = this.get('kerberosDescriptor');
- var configs = [];
- this.get('stepConfigs').forEach(function (_stepConfig) {
- configs = configs.concat(_stepConfig.get('configs'));
- });
- this.updateKerberosDescriptor(kerberosDescriptor, configs);
- callback = function () {
- return App.ajax.send({
- name: 'admin.kerberos.cluster.artifact.update',
- sender: self,
- data: {
- artifactName: 'kerberos_descriptor',
- data: {
- artifact_data: kerberosDescriptor
- }
- },
- success: 'makeConfigsNonEditable'
- });
- };
- } else {
- callback = function() {
- var dfd = $.Deferred();
- self.makeConfigsNonEditable();
- dfd.resolve();
- return dfd.promise();
- }
- }
- this.regenerateKeytabs(callback);
- },
- });
|