stack_descriptors.js 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342
  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. module.exports = {
  19. "Artifacts": {
  20. "artifact_name": "kerberos_descriptor",
  21. "stack_name": "HDP",
  22. "stack_version": "2.2"
  23. },
  24. "KerberosDescriptor": {
  25. "kerberos_descriptor": {
  26. "properties": {
  27. "realm": "${cluster-env/kerberos_domain}",
  28. "keytab_dir": "/etc/security/keytabs"
  29. },
  30. "identities": [
  31. {
  32. "principal": {
  33. "value": "HTTP/_HOST@${realm}",
  34. "configuration": null
  35. },
  36. "name": "spnego",
  37. "keytab": {
  38. "file": "${keytab_dir}/spnego.service.keytab",
  39. "owner": {
  40. "name": "root",
  41. "access": "r"
  42. },
  43. "configuration": null,
  44. "group": {
  45. "name": "${hadoop-env/user_group}",
  46. "access": "r"
  47. }
  48. }
  49. },
  50. {
  51. "principal": {
  52. "value": "hdfs@${realm}",
  53. "configuration": "cluster-env/hdfs_principal_name"
  54. },
  55. "name": "hdfs",
  56. "keytab": {
  57. "file": "${keytab_dir}/hdfs.headless.keytab",
  58. "owner": {
  59. "name": "root",
  60. "access": "r"
  61. },
  62. "configuration": "hadoop-env/hdfs_user_keytab",
  63. "group": {
  64. "name": "${cluster-env/user_group}",
  65. "access": "r"
  66. }
  67. }
  68. },
  69. {
  70. "principal": {
  71. "value": "hbase@${realm}",
  72. "configuration": "hbase-env/hbase_principal_name"
  73. },
  74. "name": "hbase",
  75. "keytab": {
  76. "file": "${keytab_dir}/hbase.headless.keytab",
  77. "owner": {
  78. "name": "root",
  79. "access": "r"
  80. },
  81. "configuration": "hbase-env/hbase_user_keytab",
  82. "group": {
  83. "name": "${cluster-env/user_group}",
  84. "access": "r"
  85. }
  86. }
  87. },
  88. {
  89. "principal": {
  90. "value": "ambari-qa@${realm}",
  91. "configuration": "cluster-env/smokeuser_principal_name"
  92. },
  93. "name": "smokeuser",
  94. "keytab": {
  95. "file": "${keytab_dir}/smokeuser.headless.keytab",
  96. "owner": {
  97. "name": "root",
  98. "access": "r"
  99. },
  100. "configuration": "cluster-env/smokeuser_keytab",
  101. "group": {
  102. "name": "${cluster-env/user_group}",
  103. "access": "r"
  104. }
  105. }
  106. }
  107. ],
  108. "configurations": [
  109. {
  110. "core-site": {
  111. "hadoop.security.authentication": "kerberos",
  112. "hadoop.rpc.protection": "authentication; integrity; privacy",
  113. "hadoop.security.authorization": "true"
  114. }
  115. }
  116. ],
  117. "services": [
  118. {
  119. "name": "HDFS",
  120. "components": [
  121. {
  122. "name": "NAMENODE",
  123. "identities": [
  124. {
  125. "name": "namenode_nn",
  126. "principal": {
  127. "value": "nn/_HOST@${realm}",
  128. "configuration": "hdfs-site/dfs.namenode.kerberos.principal"
  129. },
  130. "keytab": {
  131. "file": "${keytab_dir}/nn.service.keytab",
  132. "owner": {
  133. "name": "${hadoop-env/hdfs_user}",
  134. "access": "r"
  135. },
  136. "group": {
  137. "name": "${cluster-env/user_group}",
  138. "access": ""
  139. },
  140. "configuration": "hdfs-site/dfs.namenode.keytab.file"
  141. }
  142. },
  143. {
  144. "name": "namenode_host",
  145. "principal": {
  146. "value": "host/_HOST@${realm}",
  147. "configuration": "hdfs-site/dfs.namenode.kerberos.https.principal"
  148. },
  149. "keytab": {
  150. "file": "${keytab_dir}/host.keytab",
  151. "owner": {
  152. "name": "${hadoop-env/hdfs_user}",
  153. "access": "r"
  154. },
  155. "group": {
  156. "name": "${cluster-env/user_group}",
  157. "access": ""
  158. },
  159. "configuration": "hdfs-site/dfs.namenode.keytab.file"
  160. }
  161. },
  162. {
  163. "name": "/spnego",
  164. "principal": {
  165. "configuration": "hdfs-site/dfs.web.authentication.kerberos.principal"
  166. },
  167. "keytab": {
  168. "configuration": "hdfs/dfs.web.authentication.kerberos.keytab"
  169. }
  170. }
  171. ]
  172. },
  173. {
  174. "name": "DATANODE",
  175. "identities": [
  176. {
  177. "name": "datanode_dn",
  178. "principal": {
  179. "value": "dn/_HOST@${realm}",
  180. "configuration": "hdfs-site/dfs.namenode.kerberos.principal"
  181. },
  182. "keytab": {
  183. "file": "${keytab_dir}/dn.service.keytab",
  184. "owner": {
  185. "name": "${hadoop-env/hdfs_user}",
  186. "access": "r"
  187. },
  188. "group": {
  189. "name": "${cluster-env/user_group}",
  190. "access": ""
  191. },
  192. "configuration": "hdfs-site/dfs.namenode.keytab.file"
  193. }
  194. },
  195. {
  196. "name": "datanode_host",
  197. "principal": {
  198. "value": "host/_HOST@${realm}",
  199. "configuration": "hdfs-site/dfs.datanode.kerberos.https.principal"
  200. },
  201. "keytab": {
  202. "file": "${keytab_dir}/host.keytab.file",
  203. "owner": {
  204. "name": "${hadoop-env/hdfs_user}",
  205. "access": "r"
  206. },
  207. "group": {
  208. "name": "${cluster-env/user_group}",
  209. "access": ""
  210. },
  211. "configuration": "hdfs-site/dfs.namenode.secondary.keytab.file"
  212. }
  213. }
  214. ]
  215. },
  216. {
  217. "name": "SECONDARY_NAMENODE",
  218. "identities": [
  219. {
  220. "name": "secondary_namenode_nn",
  221. "principal": {
  222. "value": "nn/_HOST@${realm}",
  223. "configuration": "hdfs-site/dfs.namenode.secondary.kerberos.principal"
  224. },
  225. "keytab": {
  226. "file": "${keytab_dir}/snn.service.keytab",
  227. "owner": {
  228. "name": "${hadoop-env/hdfs_user}",
  229. "access": "r"
  230. },
  231. "group": {
  232. "name": "${cluster-env/user_group}",
  233. "access": ""
  234. },
  235. "configuration": "hdfs-site/dfs.namenode.secondary.keytab.file"
  236. }
  237. },
  238. {
  239. "name": "secondary_namenode_host",
  240. "principal": {
  241. "value": "host/_HOST@${realm}",
  242. "configuration": "hdfs-site/dfs.namenode.secondary.kerberos.https.principal"
  243. },
  244. "keytab": {
  245. "file": "${keytab_dir}/host.keytab.file",
  246. "owner": {
  247. "name": "${hadoop-env/hdfs_user}",
  248. "access": "r"
  249. },
  250. "group": {
  251. "name": "${cluster-env/user_group}",
  252. "access": ""
  253. },
  254. "configuration": "hdfs-site/dfs.namenode.secondary.keytab.file"
  255. }
  256. },
  257. {
  258. "name": "/spnego",
  259. "principal": {
  260. "configuration": "hdfs-site/dfs.web.authentication.kerberos.principal"
  261. },
  262. "keytab": {
  263. "configuration": "hdfs/dfs.web.authentication.kerberos.keytab"
  264. }
  265. }
  266. ]
  267. }
  268. ]
  269. },
  270. {
  271. "name": "FALCON",
  272. "identities": [
  273. {
  274. "name": "/spnego"
  275. },
  276. {
  277. "name": "/smokeuser"
  278. },
  279. {
  280. "name": "/hdfs"
  281. }
  282. ],
  283. "configurations": [
  284. {
  285. "falcon-startup.properties": {
  286. "*.falcon.http.authentication.type": "kerberos",
  287. "*.falcon.authentication.type": "kerberos",
  288. "*.dfs.namenode.kerberos.principal": "nn/_HOST@${realm}"
  289. }
  290. }
  291. ],
  292. "components": [
  293. {
  294. "name": "FALCON_SERVER",
  295. "identities": [
  296. {
  297. "principal": {
  298. "value": "falcon/${host}@${realm}",
  299. "configuration": "falcon-startup.properties/*.falcon.service.authentication.kerberos.principal"
  300. },
  301. "name": "falcon_server",
  302. "keytab": {
  303. "file": "${keytab_dir}/falcon.service.keytab",
  304. "owner": {
  305. "name": "${falcon-env/falcon_user}",
  306. "access": "r"
  307. },
  308. "configuration": "falcon-startup.properties/*.falcon.service.authentication.kerberos.keytab",
  309. "group": {
  310. "name": "${cluster-env/user_group}",
  311. "access": ""
  312. }
  313. }
  314. },
  315. {
  316. "principal": {
  317. "value": "HTTP/${host}@${realm}",
  318. "configuration": "falcon-startup.properties/oozie.authentication.kerberos.principal"
  319. },
  320. "name": "/spnego",
  321. "keytab": {
  322. "file": null,
  323. "owner": {
  324. "name": null,
  325. "access": null
  326. },
  327. "configuration": "falcon-startup.properties/oozie.authentication.kerberos.keytab",
  328. "group": {
  329. "name": null,
  330. "access": null
  331. }
  332. }
  333. }
  334. ]
  335. }
  336. ]
  337. }
  338. ]
  339. }
  340. }
  341. };