> On Oct. 31, 2016, 4:27 p.m., Robert Levas wrote:
> > This seems dangerous.  
> > 
> > I think it would be a better option to make this explicit by using a 
> > configuration attribute. For example:
> > 
> > '''
> >     <value-attributes>
> >       ...
> >       <type>kerberos_principal</type>
> >       ...
> >     </value-attributes>
> > '''
> > 
> > However I am not sure if this data is available at the time you would need 
> > it.
> 
> Amruta Borkar wrote:
>     Hello Robert,
>     Would it be ok if a new property type is defined to identify kerberos 
> principal EX: <property-type>kerberos-principal<property-type> rather than 
> defining it in <value-attribute> ? As we currently use 
> <property-type>password<property-type> to identify and filter out password 
> references while blueprint export.
> 
> Robert Levas wrote:
>     I think that will work too but we might need some more expertice on this. 
>  After making the change, can you add Jayush Luniya and Jaimin Jetly to the 
> review? Also, make sure you update `configuration-schema.xsd` and 
> `org.apache.ambari.server.state.PropertyInfo.PropertyType`

Updated the the patch based on suggestions. Also adding Jayush Luniya and 
Jaimin Jetly.


- Amruta


-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/53213/#review154274
-----------------------------------------------------------


On Oct. 28, 2016, 5:50 p.m., Amruta Borkar wrote:
> 
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/53213/
> -----------------------------------------------------------
> 
> (Updated Oct. 28, 2016, 5:50 p.m.)
> 
> 
> Review request for Ambari, Di Li, Robert Levas, and Robert Nettleton.
> 
> 
> Bugs: AMBARI-18692
>     https://issues.apache.org/jira/browse/AMBARI-18692
> 
> 
> Repository: ambari
> 
> 
> Description
> -------
> 
> Exporting blueprint from kerberos enabled cluster, exports hardcoded values 
> cluster name and realm in principal_name property.
> When the same blueprint is used to create another cluster with different 
> name, service start fail with following error:
> "resource_management.core.exceptions.Fail: Execution of '/usr/bin/kinit -kt 
> /etc/security/keytabs/hdfs.headless.keytab [keytab_name_in_blueprint] eturned 
> 1. kinit: Keytab contains no suitable keys for [keytab_name_in_blueprint] 
> while getting initial credentials"
> 
> 
> Diffs
> -----
> 
>   
> ambari-server/src/main/java/org/apache/ambari/server/controller/internal/BlueprintConfigurationProcessor.java
>  f890326 
>   
> ambari-server/src/test/java/org/apache/ambari/server/controller/internal/BlueprintConfigurationProcessorTest.java
>  5bedb9d 
> 
> Diff: https://reviews.apache.org/r/53213/diff/
> 
> 
> Testing
> -------
> 
> Tested manually. Suitable keytabs are generated automatically when not 
> mentioned in blueprint. Service starts succeeded with a blueprint exported 
> with the code change. 
> Modified existing unit test cases.
> 
> 
> Thanks,
> 
> Amruta Borkar
> 
>

Reply via email to