You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ambari.apache.org by "Hadoop QA (JIRA)" <ji...@apache.org> on 2015/01/21 04:29:34 UTC
[jira] [Commented] (AMBARI-9209) Add the ability to append a random
value to values in LDAP attributes when generating principals in Active
Directory
[ https://issues.apache.org/jira/browse/AMBARI-9209?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14285106#comment-14285106 ]
Hadoop QA commented on AMBARI-9209:
-----------------------------------
{color:green}+1 overall{color}. Here are the results of testing the latest attachment
http://issues.apache.org/jira/secure/attachment/12693473/AMBARI-9209_01.patch
against trunk revision .
{color:green}+1 @author{color}. The patch does not contain any @author tags.
{color:green}+1 tests included{color}. The patch appears to include 2 new or modified test files.
{color:green}+1 javac{color}. The applied patch does not increase the total number of javac compiler warnings.
{color:green}+1 release audit{color}. The applied patch does not increase the total number of release audit warnings.
{color:green}+1 core tests{color}. The patch passed unit tests in ambari-server.
Test results: https://builds.apache.org/job/Ambari-trunk-test-patch/1408//testReport/
Console output: https://builds.apache.org/job/Ambari-trunk-test-patch/1408//console
This message is automatically generated.
> Add the ability to append a random value to values in LDAP attributes when generating principals in Active Directory
> --------------------------------------------------------------------------------------------------------------------
>
> Key: AMBARI-9209
> URL: https://issues.apache.org/jira/browse/AMBARI-9209
> Project: Ambari
> Issue Type: Task
> Components: ambari-server
> Affects Versions: 2.0.0
> Reporter: Robert Levas
> Assignee: Robert Levas
> Labels: active_directory, kerberos
> Fix For: 2.0.0
>
> Attachments: AMBARI-9209_01.patch
>
>
> Add ability to append a random value to values in LDAP attributes when generating principals in Active Directory.
> For example the {{cn}} and {{sAMAccountName}} attributes must be unique. In some caes the {{cn}} is not allowed to have {{/}} characters and in all cases the {{sAMAccountName}} is not allow to have {{/}} characters. Therefore to generate values for these attributes, the _instance_ part of the principal needs to be stripped off and a random string needs to be appended.
> This can be seen where the principal is {{nn/c6501.ambari.apache.org@EXAMPLE.COM}}. The {{cn}} would typically be {{nn/c6501.ambari.apache.org}}. Providing for a random string would allow the {{cn}} value to be something like {{nn-ythnskdtarsjko5fsdfdsb}}. Since the {{sAMAccountName}} can be at most 20 characters, it would be {{nn-ythnskdtarsjko5fs}}.
> Since the generation of the attributes and values is done using a Velocity template, this random string will need to be generated and stored in the Velocity engine context before processing the template.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)