[ 
https://issues.apache.org/jira/browse/AMBARI-21760?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16133883#comment-16133883
 ] 

Di Li commented on AMBARI-21760:
--------------------------------

related jira: https://issues.apache.org/jira/browse/AMBARI-13498

> POST config via Ambari REST API doesn't get the password mask revolved back 
> to the real pwd
> -------------------------------------------------------------------------------------------
>
>                 Key: AMBARI-21760
>                 URL: https://issues.apache.org/jira/browse/AMBARI-21760
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-sever
>    Affects Versions: 2.5.2
>            Reporter: Di Li
>             Fix For: 2.5.2
>
>
> we are hitting a kind of weird issue in the BigSQL upgrade process.  We do 
> the following:
> * BigSQL backup takes a backup of the bigsql configurations using Ambari REST 
> API.  This gives use password fields which are masked like 
> SECRET:bigsql-users-env:1:bigsql_user_password
> * BigSQL upgrade updates the bigsql configurations using the Ambari REST API 
> by passing in the backup (including the masked fields)
> The end result is that the configuration stored in the DB for the password is 
> SECRET:bigsql-users-env:1:bigsql_user_password.  Once BIGSQL is added back to 
> the cluster and we attempt to start it, that masked password value is 
> included in the command json rather than the unmasked password.
> So my questions are:
> 1) Is there a way of properly updating the configurations when they contain 
> these masked passwords such that the passwords in the DB will actually be 
> resolved?
> 2) Is this just an Ambari defect, in that it should unmask the password when 
> it includes the value in the command json?  As a note, kerberization of the 
> cluster actually attempts to determine the actual password value by using the 
> org.apache.ambari.server.utils.SecretReference (edited)
> [4:58] 
> @here Please note this is a critical defect for us.  It results in several 
> problems, first we update the bigsql user OS password using the masked 
> password value which means we can't log in using the normal password.  
> Second, we are hitting DB consistency warnings from the old BigSQL 
> configurations which got disassociated from BigSQL when it was removed from 
> the cluster.  If we clean up these old configurations and then enable 
> kerberos post migration, the kerberization will fail because it can't resolve 
> the masked password reference (in other words the SecretReference class 
> throws an exception about missing a config version).
> Please note the issue we hit wasn't during blueprint installation. it was 
> during bigsql upgrade, here is the workflow
> 1. bigsql backup before Ambari upgrade - bigsql will use ambari rest api to 
> read all bigsql configurations. the rest api returns 
> "SECRET:bigsql-users-env:1:bigsql_user_password" for the password field ( 
> instead of the real pwd, this is expected , by design)
> 2. Ambari upgrade then EU
> 3. Bigsql upgrade- bigsql will use ambari server rest api to HTTP PUT the 
> data exported in step 1 back to the database. bigsql does not modify the 
> mask. in other words, "SECRET:bigsql-users-env:1:bigsql_user_passwords" got 
> stored back in to the db.
> 4. bigsql perform some ambari custom command, where it expects the password 
> to be resolved in the command-[task_id].json file.
> _Step 4 is where the issue happened. The mask remained in the command json 
> file, instead of the real pwd._
> The weird part is that our QA hit it on migration (Ambari at 2.2/2.4.0 
> level), but didn't hit it on HDP 2.5.3/BigSQL 4.2.5 to HDP 2.6.2/BigSQL 5.0.1 
> upgrade.
> So I am wondering if this has anything to do with starting with a cluser with 
> Ambari 2.4.x ( thus me asked you for an HDP Ambari build)



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to