[
https://issues.apache.org/jira/browse/AMBARI-8678?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14249010#comment-14249010
]
Hadoop QA commented on AMBARI-8678:
-----------------------------------
{color:green}+1 overall{color}. Here are the results of testing the latest
attachment
http://issues.apache.org/jira/secure/attachment/12687571/AMBARI-8678.3.patch
against trunk revision .
{color:green}+1 @author{color}. The patch does not contain any @author
tags.
{color:green}+1 tests included{color}. The patch appears to include 1 new
or modified test files.
{color:green}+1 javac{color}. The applied patch does not increase the
total number of javac compiler warnings.
{color:green}+1 release audit{color}. The applied patch does not increase
the total number of release audit warnings.
{color:green}+1 core tests{color}. The patch passed unit tests in
ambari-server.
Test results:
https://builds.apache.org/job/Ambari-trunk-test-patch/958//testReport/
Console output:
https://builds.apache.org/job/Ambari-trunk-test-patch/958//console
This message is automatically generated.
> create kerberos principals in Active Directory programmatically
> ---------------------------------------------------------------
>
> Key: AMBARI-8678
> URL: https://issues.apache.org/jira/browse/AMBARI-8678
> Project: Ambari
> Issue Type: New Feature
> Components: ambari-server
> Affects Versions: 2.0.0
> Reporter: Dilli Arumugam
> Assignee: Dilli Arumugam
> Fix For: 2.0.0
>
> Attachments: AMBARI-8678.3.patch
>
>
> We should be able to create Kerberos Service Principals for hadoop services
> in Active Directory making programmatic calls from Ambari Server.
> We would do this by an implementation of
> org.apache.ambari.server.serveraction.kerberos.KerberosOperationHandler.
> The implementation would use JNDI to create principals in AD.
> The implementation also would support checking for presence of principal,
> updating password and removing principal.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)