2
2
3
3
set -e
4
4
5
- KERBEROS=${KERBEROS-" false" }
5
+ KERBEROS=" ${KERBEROS-false} "
6
6
AES=${AES-" false" }
7
7
if [ " $DATA_TRANSFER_PROTECTION " = " privacy" ]; then
8
8
KERBEROS=" true"
15
15
ENCRYPT_DATA_TRANSFER=" false"
16
16
fi
17
17
18
+ CONF_KMS_PROVIDER=" "
19
+ TRANSPARENT_ENCRYPTION=false
20
+ if [ " $HADOOP_VERSION " != " 2.10.1" ]; then
21
+ TRANSPARENT_ENCRYPTION=true
22
+ CONF_KMS_PROVIDER=" kms://http@localhost:9600/kms"
23
+ fi
24
+
18
25
CONF_AUTHENTICATION=" simple"
19
26
KERBEROS_REALM=" EXAMPLE.COM"
20
27
KERBEROS_PRINCIPLE=" administrator"
21
28
KERBEROS_PASSWORD=" password1234"
22
- if [ $KERBEROS = " true" ]; then
29
+ if [ " $KERBEROS " = " true" ]; then
23
30
CONF_AUTHENTICATION=" kerberos"
24
31
25
32
HOSTNAME=$( hostname)
50
57
sudo apt-get install -y krb5-user krb5-kdc krb5-admin-server
51
58
52
59
printf " $KERBEROS_PASSWORD \n$KERBEROS_PASSWORD " | sudo kdb5_util -r " $KERBEROS_REALM " create -s
53
- for p in nn dn $USER gohdfs1 gohdfs2; do
60
+ for p in nn dn kms $USER gohdfs1 gohdfs2; do
54
61
sudo kadmin.local -q " addprinc -randkey $p /$HOSTNAME @$KERBEROS_REALM "
55
62
sudo kadmin.local -q " addprinc -randkey $p /localhost@$KERBEROS_REALM "
56
63
sudo kadmin.local -q " xst -k /tmp/$p .keytab $p /$HOSTNAME @$KERBEROS_REALM "
@@ -116,6 +123,10 @@ sudo tee $HADOOP_ROOT/etc/hadoop/core-site.xml <<EOF
116
123
<name>hadoop.rpc.protection</name>
117
124
<value>$RPC_PROTECTION </value>
118
125
</property>
126
+ <property>
127
+ <name>hadoop.security.key.provider.path</name>
128
+ <value>$CONF_KMS_PROVIDER </value>
129
+ </property>
119
130
</configuration>
120
131
EOF
121
132
@@ -172,6 +183,41 @@ $HADOOP_ROOT/bin/hdfs namenode -format
172
183
sudo groupadd hadoop
173
184
sudo usermod -a -G hadoop $USER
174
185
186
+ sudo tee $HADOOP_ROOT /etc/hadoop/kms-site.xml << EOF
187
+ <configuration>
188
+ <property>
189
+ <name>hadoop.kms.key.provider.uri</name>
190
+ <value>jceks://file@/tmp/hdfs/kms.keystore</value>
191
+ </property>
192
+ <property>
193
+ <name>hadoop.security.keystore.java-keystore-provider.password-file</name>
194
+ <value>kms.keystore.password</value>
195
+ </property>
196
+ <property>
197
+ <name>hadoop.kms.authentication.type</name>
198
+ <value>$CONF_AUTHENTICATION </value>
199
+ </property>
200
+ <property>
201
+ <name>hadoop.kms.authentication.kerberos.keytab</name>
202
+ <value>/tmp/kms.keytab</value>
203
+ </property>
204
+ <property>
205
+ <name>hadoop.kms.authentication.kerberos.principal</name>
206
+ <value>kms/localhost@$KERBEROS_REALM </value>
207
+ </property>
208
+ </configuration>
209
+ EOF
210
+
211
+ sudo tee $HADOOP_ROOT /etc/hadoop/kms.keystore.password << EOF
212
+ 123456
213
+ EOF
214
+
215
+ if [ " $TRANSPARENT_ENCRYPTION " = " true" ]; then
216
+ echo " Starting KMS..."
217
+ rm $HADOOP_ROOT /etc/hadoop/kms-log4j.properties
218
+ $HADOOP_ROOT /bin/hadoop kms > /tmp/hdfs/kms.log 2>&1 &
219
+ fi
220
+
175
221
echo " Starting namenode..."
176
222
$HADOOP_ROOT /bin/hdfs namenode > /tmp/hdfs/namenode.log 2>&1 &
177
223
@@ -183,5 +229,13 @@ sleep 5
183
229
echo " Waiting for cluster to exit safe mode..."
184
230
$HADOOP_ROOT /bin/hdfs dfsadmin -safemode wait
185
231
232
+ $HADOOP_ROOT /bin/hadoop fs -mkdir -p /_test/kms
233
+ if [ " $TRANSPARENT_ENCRYPTION " = " true" ]; then
234
+ echo " Prepare encrypted zone"
235
+ $HADOOP_ROOT /bin/hadoop key create key1
236
+ $HADOOP_ROOT /bin/hdfs crypto -createZone -keyName key1 -path /_test/kms
237
+ fi
238
+
186
239
echo " HADOOP_CONF_DIR=$( pwd) /$HADOOP_ROOT /etc/hadoop" >> $GITHUB_ENV
187
- echo " $( pwd) /$HADOOP_ROOT /bin" >> $GITHUB_PATH
240
+ echo " TRANSPARENT_ENCRYPTION=$TRANSPARENT_ENCRYPTION " >> $GITHUB_ENV
241
+ echo " $( pwd) /$HADOOP_ROOT /bin" >> $GITHUB_PATH
0 commit comments