Uploaded image for project: 'Bigtop'
  1. Bigtop
  2. BIGTOP-530

[puppet] We currently xst the HTTP principal multiple times, each time invalidating the previous one

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Closed
    • Minor
    • Resolution: Fixed
    • 0.4.0
    • 0.4.0
    • deployment
    • None

    Description

      The HTTP principal is required for SPNEGO, so we now generate it and then include it in all of the service keytabs. Unfortunately, we add it to these keytabs using kadmin's xst command, which generates a new set of credentials for the HTTP principal and invalidates the old ones. A more correct approach would be to export the credential once and then inject it into the service keytabs using ktutil (though that doesn't change the fact that the way we get the service keytabs onto the hadoop nodes is insecure). Attaching a patch that implements this approach.

      Attachments

        1. patch.txt
          5 kB
          Patrick Taylor Ramsey

        Activity

          People

            ptr Patrick Taylor Ramsey
            ptr Patrick Taylor Ramsey
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: