HADOOP-11554. Expose HadoopKerberosName as a hadoop subcommand (aw)
This commit is contained in:
parent
c3da2db48f
commit
cfd8a2174a
@ -27,6 +27,8 @@ Trunk (Unreleased)
|
||||
HADOOP-8934. Shell command ls should include sort options (Jonathan Allen
|
||||
via aw)
|
||||
|
||||
HADOOP-11554. Expose HadoopKerberosName as a hadoop subcommand (aw)
|
||||
|
||||
IMPROVEMENTS
|
||||
|
||||
HADOOP-8017. Configure hadoop-main pom to get rid of M2E plugin execution
|
||||
|
@ -38,6 +38,7 @@ function hadoop_usage()
|
||||
echo " note: please use \"yarn jar\" to launch"
|
||||
echo " YARN applications, not this command."
|
||||
echo " jnipath prints the java.library.path"
|
||||
echo " kerbname show auth_to_local principal conversion"
|
||||
echo " key manage keys via the KeyProvider"
|
||||
echo " trace view and modify Hadoop tracing settings"
|
||||
echo " version print the version"
|
||||
@ -156,6 +157,9 @@ case ${COMMAND} in
|
||||
echo "${JAVA_LIBRARY_PATH}"
|
||||
exit 0
|
||||
;;
|
||||
kerbname)
|
||||
CLASS=org.apache.hadoop.security.HadoopKerberosName
|
||||
;;
|
||||
key)
|
||||
CLASS=org.apache.hadoop.crypto.key.KeyShell
|
||||
;;
|
||||
|
@ -146,7 +146,7 @@ call :updatepath %HADOOP_BIN_PATH%
|
||||
)
|
||||
)
|
||||
|
||||
set corecommands=fs version jar checknative distcp daemonlog archive classpath credential key
|
||||
set corecommands=fs version jar checknative distcp daemonlog archive classpath credential kerbname key
|
||||
for %%i in ( %corecommands% ) do (
|
||||
if %hadoop-command% == %%i set corecommand=true
|
||||
)
|
||||
@ -215,6 +215,10 @@ call :updatepath %HADOOP_BIN_PATH%
|
||||
set CLASS=org.apache.hadoop.security.alias.CredentialShell
|
||||
goto :eof
|
||||
|
||||
:kerbname
|
||||
set CLASS=org.apache.hadoop.security.HadoopKerberosName
|
||||
goto :eof
|
||||
|
||||
:key
|
||||
set CLASS=org.apache.hadoop.crypto.key.KeyShell
|
||||
goto :eof
|
||||
|
@ -27,6 +27,7 @@
|
||||
* [fs](#fs)
|
||||
* [jar](#jar)
|
||||
* [jnipath](#jnipath)
|
||||
* [kerbname](#kerbname)
|
||||
* [key](#key)
|
||||
* [trace](#trace)
|
||||
* [version](#version)
|
||||
@ -175,6 +176,15 @@ Usage: `hadoop jnipath`
|
||||
|
||||
Print the computed java.library.path.
|
||||
|
||||
### `kerbname`
|
||||
|
||||
Usage: <<<hadoop kerbname principal>>>
|
||||
|
||||
Convert the named principal via the auth_to_local rules to the Hadoop
|
||||
user name.
|
||||
|
||||
Example: <<<hadoop kerbname user@EXAMPLE.COM>>>
|
||||
|
||||
### `key`
|
||||
|
||||
Manage keys via the KeyProvider.
|
||||
|
@ -162,6 +162,8 @@ Hadoop maps Kerberos principal to OS user account using the rule specified by `h
|
||||
|
||||
By default, it picks the first component of principal name as a user name if the realms matches to the `default_realm` (usually defined in /etc/krb5.conf). For example, `host/full.qualified.domain.name@REALM.TLD` is mapped to `host` by default rule.
|
||||
|
||||
Custom rules can be tested using the <<<hadoop kerbname>>> command. This command allows one to specify a principal and apply Hadoop's current auth_to_local ruleset. The output will be what identity Hadoop will use for its usage.
|
||||
|
||||
### Mapping from user to group
|
||||
|
||||
Though files on HDFS are associated to owner and group, Hadoop does not have the definition of group by itself. Mapping from user to group is done by OS or LDAP.
|
||||
|
Loading…
Reference in New Issue
Block a user