ambari-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Hadoop QA (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (AMBARI-11362) Kerberos: Creating principals in AD when special characters are involved causes failures
Date Sun, 24 May 2015 16:40:17 GMT

    [ https://issues.apache.org/jira/browse/AMBARI-11362?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14557781#comment-14557781
] 

Hadoop QA commented on AMBARI-11362:
------------------------------------

{color:green}+1 overall{color}.  Here are the results of testing the latest attachment 
  http://issues.apache.org/jira/secure/attachment/12735070/AMBARI-11362_01.patch
  against trunk revision .

    {color:green}+1 @author{color}.  The patch does not contain any @author tags.

    {color:green}+1 tests included{color}.  The patch appears to include 1 new or modified
test files.

    {color:green}+1 javac{color}.  The applied patch does not increase the total number of
javac compiler warnings.

    {color:green}+1 release audit{color}.  The applied patch does not increase the total number
of release audit warnings.

    {color:green}+1 core tests{color}.  The patch passed unit tests in ambari-server.

Test results: https://builds.apache.org/job/Ambari-trunk-test-patch/2854//testReport/
Console output: https://builds.apache.org/job/Ambari-trunk-test-patch/2854//console

This message is automatically generated.

> Kerberos: Creating principals in AD when special characters are involved causes failures
> ----------------------------------------------------------------------------------------
>
>                 Key: AMBARI-11362
>                 URL: https://issues.apache.org/jira/browse/AMBARI-11362
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-server
>    Affects Versions: 2.0.0
>            Reporter: Robert Levas
>            Assignee: Robert Levas
>            Priority: Critical
>              Labels: active-directory, active_directory, kerberos
>             Fix For: 2.1.0
>
>         Attachments: AMBARI-11362_01.patch
>
>
> Creating principals in AD when special characters are involved causes failures.
> The following characters in the CN need to be escaped:
> {noformat}
> / , \ # + < > ; " =
> {noformat}
> *Note:* javax.naming.ldap.Rdn will properly escape relative distinguished name parts.
> The following characters in the sAMAccountName need to be removed or replaced:
> {noformat}
> [ ] : ; | = + * ? < > / \
> {noformat}
> *Note:* This needs to be done explicitly within the attributes set if a relevant entry
exists.
> {code}
> // Replace the following _illegal_ characters: [ ] : ; | = + * ? < > / \
> value = value.toString().replaceAll("\\[|\\]|\\:|\\;|\\||\\=|\\+|\\*|\\?|\\<|\\>|\\/|\\\\",
"_");
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Mime
View raw message