15
15
ENCRYPT_DATA_TRANSFER=" false"
16
16
fi
17
17
18
+ CONF_KMS_PROVIDER=" "
19
+ TRANSPARENT_ENCRYPTION=${TRANSPARENT_ENCRYPTION-" false" }
20
+ if [ $TRANSPARENT_ENCRYPTION = " true" ]; then
21
+ CONF_KMS_PROVIDER=" kms://http@localhost:9600/kms"
22
+ fi
23
+
18
24
CONF_AUTHENTICATION=" simple"
19
25
KERBEROS_REALM=" EXAMPLE.COM"
20
26
KERBEROS_PRINCIPLE=" administrator"
50
56
sudo apt-get install -y krb5-user krb5-kdc krb5-admin-server
51
57
52
58
printf " $KERBEROS_PASSWORD \n$KERBEROS_PASSWORD " | sudo kdb5_util -r " $KERBEROS_REALM " create -s
53
- for p in nn dn $USER gohdfs1 gohdfs2; do
59
+ for p in nn dn kms $USER gohdfs1 gohdfs2; do
54
60
sudo kadmin.local -q " addprinc -randkey $p /$HOSTNAME @$KERBEROS_REALM "
55
61
sudo kadmin.local -q " addprinc -randkey $p /localhost@$KERBEROS_REALM "
56
62
sudo kadmin.local -q " xst -k /tmp/$p .keytab $p /$HOSTNAME @$KERBEROS_REALM "
@@ -116,6 +122,10 @@ sudo tee $HADOOP_ROOT/etc/hadoop/core-site.xml <<EOF
116
122
<name>hadoop.rpc.protection</name>
117
123
<value>$RPC_PROTECTION </value>
118
124
</property>
125
+ <property>
126
+ <name>hadoop.security.key.provider.path</name>
127
+ <value>$CONF_KMS_PROVIDER </value>
128
+ </property>
119
129
</configuration>
120
130
EOF
121
131
@@ -172,6 +182,40 @@ $HADOOP_ROOT/bin/hdfs namenode -format
172
182
sudo groupadd hadoop
173
183
sudo usermod -a -G hadoop $USER
174
184
185
+ sudo tee $HADOOP_ROOT /etc/hadoop/kms-site.xml << EOF
186
+ <configuration>
187
+ <property>
188
+ <name>hadoop.kms.key.provider.uri</name>
189
+ <value>jceks://file@/tmp/hdfs/kms.keystore</value>
190
+ </property>
191
+ <property>
192
+ <name>hadoop.security.keystore.java-keystore-provider.password-file</name>
193
+ <value>kms.keystore.password</value>
194
+ </property>
195
+ <property>
196
+ <name>hadoop.kms.authentication.type</name>
197
+ <value>$CONF_AUTHENTICATION </value>
198
+ </property>
199
+ <property>
200
+ <name>hadoop.kms.authentication.kerberos.keytab</name>
201
+ <value>/tmp/kms.keytab</value>
202
+ </property>
203
+ <property>
204
+ <name>hadoop.kms.authentication.kerberos.principal</name>
205
+ <value>kms/localhost@$KERBEROS_REALM </value>
206
+ </property>
207
+ </configuration>
208
+ EOF
209
+
210
+ sudo tee $HADOOP_ROOT /etc/hadoop/kms.keystore.password << EOF
211
+ 123456
212
+ EOF
213
+
214
+ if [ $TRANSPARENT_ENCRYPTION = " true" ]; then
215
+ echo " Starting KMS..."
216
+ $HADOOP_ROOT /bin/hadoop kms > /tmp/hdfs/kms.log 2>&1 &
217
+ fi
218
+
175
219
echo " Starting namenode..."
176
220
$HADOOP_ROOT /bin/hdfs namenode > /tmp/hdfs/namenode.log 2>&1 &
177
221
@@ -183,5 +227,12 @@ sleep 5
183
227
echo " Waiting for cluster to exit safe mode..."
184
228
$HADOOP_ROOT /bin/hdfs dfsadmin -safemode wait
185
229
230
+ $HADOOP_ROOT /bin/hadoop fs -mkdir -p /_test/kms
231
+ if [ $TRANSPARENT_ENCRYPTION = " true" ]; then
232
+ echo " Prepare encrypted zone"
233
+ $HADOOP_ROOT /bin/hadoop key create key1
234
+ $HADOOP_ROOT /bin/hdfs crypto -createZone -keyName key1 -path /_test/kms
235
+ fi
236
+
186
237
echo " HADOOP_CONF_DIR=$( pwd) /$HADOOP_ROOT /etc/hadoop" >> $GITHUB_ENV
187
- echo " $( pwd) /$HADOOP_ROOT /bin" >> $GITHUB_PATH
238
+ echo " $( pwd) /$HADOOP_ROOT /bin" >> $GITHUB_PATH
0 commit comments