public boolean isSecurityEnabled () { return SliderUtils.isHadoopClusterSecure(configuration); }
public boolean isSecurityEnabled () { return SliderUtils.isHadoopClusterSecure(configuration); }
/** * Init security if the cluster configuration declares the cluster is secure * @param conf configuration to look at * @return true if the cluster is secure * @throws IOException cluster is secure * @throws SliderException the configuration/process is invalid */ public static boolean maybeInitSecurity(Configuration conf) throws IOException, SliderException { boolean clusterSecure = isHadoopClusterSecure(conf); if (clusterSecure) { log.debug("Enabling security"); initProcessSecurity(conf); } return clusterSecure; }
/** * Init security if the cluster configuration declares the cluster is secure * @param conf configuration to look at * @return true if the cluster is secure * @throws IOException cluster is secure * @throws SliderException the configuration/process is invalid */ public static boolean maybeInitSecurity(Configuration conf) throws IOException, SliderException { boolean clusterSecure = isHadoopClusterSecure(conf); if (clusterSecure) { log.debug("Enabling security"); initProcessSecurity(conf); } return clusterSecure; }
private void actionDiagnosticCredentials() throws BadConfigException, IOException { if (isHadoopClusterSecure(loadSliderClientXML())) { String credentialCacheFileDescription = null; try { credentialCacheFileDescription = checkCredentialCacheFile(); } catch (BadConfigException e) { log.error("The credential config is not valid: " + e.toString()); throw e; } catch (IOException e) { log.error("Unable to read the credential file: " + e.toString()); throw e; } log.info("Credential cache file for the current user: " + credentialCacheFileDescription); } else { log.info("the cluster is not in secure mode"); } }
private void actionDiagnosticCredentials() throws BadConfigException, IOException { if (isHadoopClusterSecure(loadSliderClientXML())) { String credentialCacheFileDescription = null; try { credentialCacheFileDescription = checkCredentialCacheFile(); } catch (BadConfigException e) { log.error("The credential config is not valid: " + e.toString()); throw e; } catch (IOException e) { log.error("Unable to read the credential file: " + e.toString()); throw e; } log.info("Credential cache file for the current user: " + credentialCacheFileDescription); } else { log.info("the cluster is not in secure mode"); } }
if (isHadoopClusterSecure(config)) { println("Hadoop Cluster is secure"); println("Login user is %s", UserGroupInformation.getLoginUser());
if (isHadoopClusterSecure(config)) { println("Hadoop Cluster is secure"); println("Login user is %s", UserGroupInformation.getLoginUser());
if (SliderUtils.isHadoopClusterSecure(conf)) { log.info("Secure mode with kerberos realm {}", SliderUtils.getKerberosRealm());
if (SliderUtils.isHadoopClusterSecure(conf)) { log.info("Secure mode with kerberos realm {}", SliderUtils.getKerberosRealm());
@Override protected void serviceInit(Configuration conf) throws Exception { Configuration clientConf = loadSliderClientXML(); ConfigHelper.mergeConfigurations(conf, clientConf, SLIDER_CLIENT_XML, true); serviceArgs.applyDefinitions(conf); serviceArgs.applyFileSystemBinding(conf); AbstractActionArgs coreAction = serviceArgs.getCoreAction(); // init security with our conf if (!coreAction.disableSecureLogin() && isHadoopClusterSecure(conf)) { forceLogin(); initProcessSecurity(conf); } if (coreAction.getHadoopServicesRequired()) { initHadoopBinding(); } super.serviceInit(conf); }
@Override protected void serviceInit(Configuration conf) throws Exception { Configuration clientConf = loadSliderClientXML(); ConfigHelper.mergeConfigurations(conf, clientConf, SLIDER_CLIENT_XML, true); serviceArgs.applyDefinitions(conf); serviceArgs.applyFileSystemBinding(conf); AbstractActionArgs coreAction = serviceArgs.getCoreAction(); // init security with our conf if (!coreAction.disableSecureLogin() && isHadoopClusterSecure(conf)) { forceLogin(); initProcessSecurity(conf); } if (coreAction.getHadoopServicesRequired()) { initHadoopBinding(); } super.serviceInit(conf); }
if (SliderUtils.isHadoopClusterSecure(getConfig())) { localizeServiceKeytabs(launcher, instanceDefinition, fileSystem);
if (SliderUtils.isHadoopClusterSecure(getConfig())) { localizeServiceKeytabs(launcher, instanceDefinition, fileSystem);
Configuration config = getConfig(); lookupZKQuorum(); boolean clusterSecure = isHadoopClusterSecure(config);
Configuration config = getConfig(); lookupZKQuorum(); boolean clusterSecure = isHadoopClusterSecure(config);