Skip to content

Commit bb24370

Browse files
jlopezmallampenate
authored andcommitted
added dynamic authentication (apache#38)
1 parent 6bd88f4 commit bb24370

File tree

3 files changed

+20
-448
lines changed

3 files changed

+20
-448
lines changed

DockerfileHistory

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ RUN yum -y update \
77
&& yum -y install java-1.8.0-openjdk curl wget\
88
&& yum -y clean all \
99
&& wget https://github.com/stedolan/jq/releases/download/jq-1.5/jq-linux64 \
10+
&& curl -o /root/kms_utils-0.2.1.sh http://sodio.stratio.com/repository/paas/kms_utils/0.2.1/kms_utils-0.2.1.sh \
1011
&& mv jq-linux64 /usr/local/bin/jq \
1112
&& chmod 755 /usr/local/bin/jq \
1213
&& ln -s /usr/local/bin/jq /usr/bin/ \
@@ -18,7 +19,6 @@ COPY dist /opt/sds/spark
1819

1920
COPY docker/historyServer/entrypoint.sh /
2021
COPY docker/historyServer/commons.sh /
21-
COPY docker/historyServer/kms_utils.sh /
2222

2323
ENTRYPOINT ["/usr/local/bin/dumb-init", "/entrypoint.sh"]
2424

docker/historyServer/entrypoint.sh

Lines changed: 19 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
#!/bin/bash
22

3-
source kms_utils.sh
3+
source /root/kms_utils-0.2.1.sh
4+
45
source commons.sh
56

67
# Create krb5.conf file
@@ -28,10 +29,14 @@ EOM
2829
function main() {
2930
HDFS_HADOOP_SECURITY_AUTH_TO_LOCAL=${HDFS_HADOOP_SECURITY_AUTH_TO_LOCAL:=${auth_to_local_value}}
3031
VAULT_PORT=${VAULT_PORT:=8200}
31-
VAULT_TOKEN=${VAULT_TOKEN:=1111111-2222-3333-4444-5555555555555}
32+
VAULT_HOSTS=$VAULT_HOST
33+
SERVICE_ID=$APP_NAME
34+
INSTANCE=$APP_NAME
35+
VAULT_URI="$VAULT_PROTOCOL://$VAULT_HOSTS:$VAULT_PORT"
36+
3237
SPARK_HOME=/opt/sds/spark
3338
FQDN=${HISTORY_SERVER_FQDN:="history-server"}
34-
INSTANCE=${HISTORY_SERVER_FQDN:=$FQDN}
39+
INSTANCE=${HISTORY_SERVER_FQDN:="history-server"}
3540

3641
mkdir -p $HADOOP_CONF_DIR
3742

@@ -47,14 +52,19 @@ function main() {
4752

4853
if [[ "$HDFS_KRB_ENABLE" == "true" ]]
4954
then
50-
SPARK_KEYTAB_PATH="/etc/sds/spark/security"
51-
getKrb userland $INSTANCE $FQDN "$SPARK_KEYTAB_PATH" HISTORY_SERVER_PRINCIPAL_NAME
5255

53-
generate_krb-conf "${KERBEROS_REALM}" "${KERBEROS_KDC_HOST}" "${KERBEROS_KADMIN_HOST}"
54-
mv "/tmp/krb5.conf.tmp" "/etc/krb5.conf"
55-
SPARK_HISTORY_OPTS="-Dspark.history.kerberos.principal=${HISTORY_SERVER_PRINCIPAL_NAME} -Dspark.history.kerberos.keytab=${SPARK_KEYTAB_PATH}/${FQDN}.keytab -Dspark.history.kerberos.enabled=true ${SPARK_HISTORY_OPTS}"
56+
if [ ! -z "$VAULT_ROLE_ID" ]; then
57+
echo "Vault role id proved, signing in"
58+
login
59+
fi
60+
SPARK_KEYTAB_PATH="/etc/sds/spark/security"
61+
getKrb userland $INSTANCE $FQDN "$SPARK_KEYTAB_PATH" HISTORY_SERVER_PRINCIPAL_NAME
62+
63+
generate_krb-conf "${KERBEROS_REALM}" "${KERBEROS_KDC_HOST}" "${KERBEROS_KADMIN_HOST}"
64+
mv "/tmp/krb5.conf.tmp" "/etc/krb5.conf"
65+
SPARK_HISTORY_OPTS="-Dspark.history.kerberos.principal=${HISTORY_SERVER_PRINCIPAL_NAME} -Dspark.history.kerberos.keytab=${SPARK_KEYTAB_PATH}/${FQDN}.keytab -Dspark.history.kerberos.enabled=true ${SPARK_HISTORY_OPTS}"
5666
else
57-
echo 'HDFS SECURITY IS NOT ENABLE'
67+
echo 'HDFS SECURITY IS NOT ENABLE'
5868
fi
5969

6070
generate_core-site "${HDFS_FS_DEFAULTFS}" "${HDFS_HADOOP_SECURITY_AUTHORIZATION}" "${HDFS_HADOOP_SECURITY_AUTHENTICATION}" "${HDFS_HADOOP_SECURITY_AUTH_TO_LOCAL}"

0 commit comments

Comments
 (0)